Contents
- Cisco Intercloud Fabric Provider Platform Release Notes
- New and Changed Information
- Cisco Intercloud Fabric Provider Platform
- New Features and Enhancements
- System Requirements
- Hypervisor Requirements
- Port Requirements
- Important Notes
- Open and Resolved Bugs
- Using the Bug Search Tool
- Open Bugs
- Related Documentation for Cisco Intercloud Fabric Provider Platform
- Documentation Feedback
- Obtaining Documentation and Submitting a Service Request
First Published: April 19, 2015
Last Updated: August 04, 2015
Cisco Intercloud Fabric Provider Platform Release Notes
This document describes the features, limitations, and caveats for the Cisco Intercloud Fabric Provider Platform 2.2.1 release.
New and Changed Information
The following table describes information that has been added or changed since the initial release of this document.
Cisco Intercloud Fabric Provider Platform
Cisco Intercloud Fabric Provider Platform (ICFPP) simplifies the complexity involved in working with a variety of public cloud APIs, and enables cloud API support for service providers who currently do not have API support. Cisco ICFPP provides an extensible adapter framework that allows integration with a variety of provider cloud infrastructure management platforms, such as OpenStack, CloudStack, VMware vCloud Director, and any other API that can be integrated through a software development kit (SDK) provided by Cisco.
Currently, service providers have their own proprietary cloud APIs—such as Amazon EC2 and Windows Azure—that give customers limited choices and do not provide an easy method for moving from one provider to another. Cisco ICFPP abstracts this complexity and translates Cisco Intercloud Fabric cloud API calls to cloud platform APIs of different provider infrastructure platforms, giving customers the option of moving their workloads regardless of the cloud API used by the service provider.
Many service providers do not provide cloud APIs that Cisco Intercloud Fabric can use to deploy customers' workloads. One option for these providers is to provide direct access to their virtual machine (VM) manager's SDK or API, such as vCenter or System Center, which exposes the provider environment and is not a preferred option for service providers due to security concerns. Cisco ICFPP, as the first point of authentication for the customer cloud when requesting cloud resources, enforces highly secure access to the provider environment. In addition, Cisco ICFPP provides the cloud APIs that are required for service providers to be part of the provider ecosystem for Cisco Intercloud Fabric.
As the interface between the Cisco Intercloud Fabric from customer cloud environments and provider clouds (public and virtual private clouds), Cisco ICFPP provides the following benefits:
Standardizes and brings uniformity to cloud APIs, making it easier for Cisco Intercloud Fabric to consume cloud services from service providers that are part of the Cisco Intercloud Fabric ecosystem.
Helps secure access to a service provider's underlying cloud platform.
Limits the utilization rate per customer or tenant environment.
Provides northbound APIs for service providers for integration with existing management platforms.
Supports multitenancy.
Monitors resource usage per tenant.
Meters resource usage per tenant.
New Features and Enhancements
Cisco ICFPP 2.2.1 includes the following features, enhancements, and support:
Support for deployment on Red Hat Enterprise Linux for OpenStack
Inclusion of a 90-day evaluation license with support for 20 virtual machines (VMs)
Deployment or configuration in a standalone node, primary node, or service node role
Support for standalone and multiple-node cluster configurations
Remote syslog server configuration
NFS server configuration
Upgrade support for adapters, Cisco ICFPP bug fixes, and infrastructure-related patches
Multiple-node cluster support includes:
Cisco ICFPP nodes configured in a high availability (HA) pair that provides database services
Cisco ICFPP nodes configured as service nodes that respond to service requests
Configuration or reconfiguration of nodes in the cluster
Configuration or reconfiguration of virtual IP (VIP) addresses
New logs available from the Cisco ICFPP GUI or syslog
New options in the ShellAdmin console for clusters and their components
The Cisco ICFPP 2.2.1 GUI enables you to:
Specify the API Key and Secret Key for a tenant on a CloudStack cloud instance
Import a Java KeyStore (JKS) file
Download logs for HA and cluster deployments
Configure remote syslog servers
The Cisco ICFPP 2.2.1 ShellAdmin console includes menu options that are tailored for the current node: standalone, primary, or service. New options in the menu enable you to:
Configure a standalone node as a primary node or a service node
Configure NFS
Configure an HA pair, including a virtual IP address
Reconfigure primary nodes or service nodes for changes in IP addresses or the HA virtual IP address
View summary or detailed HA status
View HA syslog messages
Cisco ICFPP 2.2.1 includes the following new northbound APIs and API options:
System Requirements
You can deploy a Cisco ICFPP virtual appliance on a system that meets the following requirements:
Port Requirements
Ports must be configured as described in the following tables to ensure that Cisco ICFPP can communicate effectively on the internal private network and the public network (Internet).
Table 1 Public Internet Inbound Protocol
Port
Allow / Deny
Description
TCP
443
ALLOW
Allows inbound HTTPS traffic from the Internet so that Cisco Intercloud Fabric for Business can reach Cisco ICFPP.
Table 2 Public Internet Outbound Protocol
Port
Allow / Deny
Description
All
All
DENY
Cisco ICFPP does not need to send outbound traffic to the Internet.
Table 3 Internal Network Inbound Protocol
Port
Allow / Deny
Description
TCP
443
ALLOW
Allows inbound HTTPS traffic from the internal network, so that the Cisco ICFPP web-based GUI can be accessed.
TCP
22
ALLOW
Allows inbound SSH traffic from the internal network for Cisco ICFPP administration.
TCP
3306
ALLOW
Allows inbound MySQL traffic from the internal network.
Required if Cisco ICFPP is configured in a multiple-node cluster.
TCP
8080
ALLOW
Allows inbound HTTP traffic for template uploads to CloudStack.
Required if using the CloudStack adapter.
Note
The ports in the following table must be open on any firewalls on the internal network between Cisco ICFPP and destination systems to ensure that the destination systems receive communications from Cisco ICFPP.
Table 4 Internal Network Outbound Protocol
Firewall Port
Allow / Deny
Description
TCP
443
ALLOW
Allows HTTPS traffic to the internal network.
Required to reach the cloud provider API/SDK gateway if it is running on HTTPS.
TCP
80
ALLOW
Allows HTTP traffic to the internal network.
Required to reach the cloud provider API/SDK gateway if it is running on HTTP.
TCP
3306
ALLOW
Allows outbound MySQL traffic to other Cisco ICFPP nodes on the internal network.
Required if Cisco ICFPP is configured in a multiple-node cluster.
TCP/UDP
514
ALLOW
Allows syslog traffic from Cisco ICFPP to the syslog server.
Important Notes
The following items contain important information for using Cisco ICFPP:
If a valid tenant login session does not exist for a username- and password-based cloud, the Cisco ICFPP administrator must use the tenant credentials to perform any operation on a tenant cloud resource, such as deleting a tenant VM. The loss of a valid tenant login session can occur immediately after Cisco ICFPP is rebooted or Cisco ICFPP services are restarted.
For security reasons, Cisco ICFPP does not store tenant passwords in the Cisco ICFPP database. As a result, operations that affect tenant cloud resources (such as tenant VMs or templates) are possible only when the tenant has a valid login session from Cisco Intercloud Fabric for Business.
Any mention of Dimension Data or DiData in the Cisco ICFPP GUI or documentation refers to the product Cisco Intercloud Services – V.
Open and Resolved Bugs
The open and resolved bugs for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about bugs and vulnerabilities in this product and other Cisco hardware and software products.
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
Using the Bug Search Tool
ProcedureYou can use the Bug Search Tool to search for a specific bug or to search for all bugs in a release.
Step 1 Go to Cisco Bug Search Tool. Step 2 In the Log In screen, enter your registered Cisco.com username and password, and then click Log In. The Bug Search page opens.
Note If you do not have a Cisco.com username and password, you can register for them at http://tools.cisco.com/RPF/register/register.do. Step 3 To search for a specific bug, enter the bug ID in the Search For field and press Enter. Step 4 To search for bugs in the current release:
Open Bugs
The following table lists the open bugs in Cisco Intercloud Fabric Provider Platform 2.2.1:
Related Documentation for Cisco Intercloud Fabric Provider Platform
The documentation listed below is available for Cisco Intercloud Fabric Provider Platform at the following URL:
Cisco Intercloud Fabric Documentation
The documentation listed below is available for Cisco Intercloud Fabric at the following URL:
Cisco Intercloud Fabric Release Notes
Cisco Intercloud Fabric Getting Started Guide
Cisco Intercloud Fabric Director REST API Guide
Cisco Intercloud Fabric Configuration Guide
Cisco Intercloud Fabric Firewall Configuration Guide
Cisco vPath and vServices Reference Guide for Intercloud Fabric
Cisco Intercloud Fabric User Guide
Cisco Intercloud Fabric Troubleshooting Guide
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments to: intercloud-fabric-doc-feedback@cisco.com.
We appreciate your feedback.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation, at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html.
Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and delivers content directly to your desktop using a reader application. The RSS feeds are a free service.
Copyright © 2015, Cisco Systems, Inc. All rights reserved.