Pivotal Platform v2.8 Breaking Changes

Page last updated:

This topic describes the breaking changes you need to be aware of when upgrading to Pivotal Platform v2.8. For more information about important preparation steps you must follow before beginning an upgrade, see Upgrading Pivotal Platform.

Ops Manager

There are no breaking changes in this release of Ops Manager.

Pivotal Application Service (PAS)

See the following PAS breaking changes:

Incorrect HTTP(S) Proxy Configuration Breaks CredHub Interpolation for Apps in PAS v2.8.12 and Later

In PAS v2.8.12 and later, apps that have an incorrect HTTP(S) Proxy configuration fail to stage or restart due to a CredHub interpolation error.

Before you upgrade to PAS v2.8.12 or later, you must fix the HTTP(S) Proxy configuration of any impacted applications:

  1. Determine whether your apps are impacted by following the resolution procedure in Knowledgebase Article 9305.
  2. Update all impacted apps to use the recommended proxy settings that are documented in Configuring Proxy Settings for All Apps.
  3. Restart modified apps.

PAS v2.8.4 Stability Issues

WARNING: Pivotal advises that you do not upgrade to PAS v2.8.4 at this time. Pivotal is investigating issues reported with the stability of PAS v2.8.4.

If you have already upgraded to PAS v2.8.4 and are experiencing instability in your PAS deployment, such as cf push failure, contact Support.

CredHub Requires At Least One CredHub Instance

PAS v2.8 and later requires at least one CredHub instance. If the number of CredHub instances is set to 0, the deployment fails.

If you scaled the number of CredHub instances to 0 in PAS v2.7, check the number of CredHub instances in the Resource Config pane of the PAS v2.8 tile and increase to one or more instances before you apply changes for the upgrade.

For more information, see PAS Must Use At Least One CredHub VM in Pivotal Application Service v2.8 Release Notes.

Syslog Adapters Are Removed

Syslog Adapters are not supported in PAS v2.8. If you disabled Syslog Agents in PAS v2.7.7, you must enable Syslog Agents before you upgrade to PAS v2.8. If you do not enable Syslog Agents prior to upgrade, the upgrade fails in order to prevent potential log loss.

To enable Syslog Agents on PAS v2.7.7, do one of the following:

  • Go to the System Logging pane in the PAS tile and select the Enable syslog egress through Syslog Agents checkbox.

  • Set the properties.syslog_agent_enabled property to true.

Additional Metadata Tags for Metrics and App Logs

In PAS v2.8, metadata tags for app logs and metrics appear after the header of each syslog message and before the syslog message text. If your external monitoring depends on a specific format for app logs, you must update the configuration.

The new metadata tags appear in syslogs in the following format:

956 <14>1 2020-03-31T12:11:02.529497+00:00 My-org.My-space.my-app-blue ec3cd4e4-baf9-456d-965a-96bcb2c61a47
[APP/PROC/WEB/0] - [tags@47450 app_id="ec3cd4e4-baf9-456d-965a-96bcb2c61a47" app_name="my-app-blue"
deployment="cf-78e7a9442158adb53366" index="c57b95c6-d79f-4cfb-b7f3-08a770946b7a" instance_id="0"
ip="10.214.110.84" job="diego_cell" organization_id="c23f6fb2-beeb-4d2f-8c1d-693be5bd502c"
organization_name="My-org" origin="rep" process_id="ec3cd4e4-baf9-456d-965a-96bcb2c61a47"
process_instance_id="1cf3854e-29d8-4825-7685-11ec" process_type="web" product="Pivotal Application Service"
source_id="ec3cd4e4-baf9-456d-965a-96bcb2c61a47" source_type="APP/PROC/WEB"
space_id="93e9f375-1567-4ea4-b2a1-ef6fd7e0125b" space_name="My-space"
system_domain="example.mydomain.io"] 2020-03-31 07:11:02.529
INFO [my-app,B2347215-T21118008-COWF/35558169/38311791] --- [http-nio-8080-exec-5]
c.c.b.t.p.s.p.b.BatchPostProcessor : Report file created in 47 ms

For more information, see Human-Friendly Metadata in Identifying the Source Deployment of Metrics.

Agent-Based Syslog Egress Cannot Be Disabled

If you disabled Agent-based syslog egress in PAS v2.7.7 or later, then you must update your external monitoring configuration.

Agent-based syslog egress is always enabled in PAS v2.8.0. Agent-based syslog egress was enabled by default in PAS v2.7.0, but you could optionally disable the egress in PAS v2.7.7 and later. For more information, see Agent-Based Syslog Egress Is Enabled by Default in the Pivotal Application Service v2.7 Release Notes.

Pivotal Application Service for Windows (PASW)

See the following PASW v2.8 breaking change:

Incorrect HTTP(S) Proxy Configuration Breaks CredHub Interpolation for Apps in PASW v2.8.12 and Later

In PASW v2.8.12 and later, apps that have an incorrect HTTP(S) Proxy configuration fail to stage or restart due to a CredHub interpolation error.

Before you upgrade to PASW v2.8.12 or later, you must fix the HTTP(S) Proxy configuration of any impacted applications:

  1. Determine whether your apps are impacted by following the resolution procedure in Knowledgebase Article 9305.
  2. Update all impacted apps to use the recommended proxy settings that are documented in Configuring Proxy Settings for All Apps.
  3. Restart modified apps.

Pivotal Isolation Segment

See the following Pivotal Isolation Segment breaking changes:

Incorrect HTTP(S) Proxy Configuration Breaks CredHub Interpolation for Apps in Pivotal Isolation Segment v2.8.12 and Later

In Pivotal Isolation Segment v2.8.12 and later, apps that have an incorrect HTTP(S) Proxy configuration fail to stage or restart due to a CredHub interpolation error.

Before you upgrade to Pivotal Isolation Segment v2.8.12 or later, you must fix the HTTP(S) Proxy configuration of any impacted applications:

  1. Determine whether your apps are impacted by following the resolution procedure in Knowledgebase Article 9305.
  2. Update all impacted apps to use the recommended proxy settings that are documented in Configuring Proxy Settings for All Apps.
  3. Restart modified apps.

Segment Name Property Is Renamed

The property .isolated_diego_cell.placement_tag is renamed .properties.compute_isolation and includes three new inputs. This may impact your platform automation scripts.

.properties.compute_isolation contains the following inputs:

  • .properties.compute_isolation.disabled to disable compute isolation

  • .properties.compute_isolation.enabled to enable compute isolation

  • .properties.compute_isolation.enabled.isolation_segment_name to add a placement tag for your Diego Cells when compute isolation is enabled

You must update any platform automation scripts that include .isolated_diego_cell.placement_tag to use the new .properties.compute_isolation name and inputs. You must either disable compute isolation or enable compute isolation and specify a placement tag with these inputs.

For more information, see Compute and Networking Isolation in Pivotal Isolation Segment v2.8 Release Notes.

For guidance on setting configuration values, see Compute and Networking Isolation in Installing Pivotal Isolation Segment.

Compute Isolation Must Be Enabled If Networking Isolation Is Enabled

In the Pivotal Isolation Segment v2.8 tile, you cannot disable compute isolation and enable networking isolation at the same time. In the Compute and Network Isolation pane, you can disable compute isolation by selecting Disable under Compute isolation. If you disable compute isolation, you must set Router sharding mode to No isolation segment. If Compute isolation is disabled and Router sharding mode is set to Isolation segment only, the apps in your isolation segment fail to schedule.

Compute isolation is enabled by default. However, isolation segments do not require compute isolation. For more information, see Compute and Networking Isolation in Pivotal Isolation Segment v2.8 Release Notes.

For more information about configuring or disabling compute and networking isolation, see Compute and Networking Isolation in Installing Pivotal Isolation Segment.