An official website of the United States government US flag signifying that this is a United States federal government website

Updates

For blog posts, see cloud.gov on the 18F blog.

May 24, 2017

Get what you need from cloud.gov

What’s new

The web interface helps you learn and use cloud.gov concepts

The dashboard is the web-based interface for managing apps and services on cloud.gov. With the dashboard, you don’t need to use the command line to handle some of the basic tasks of managing applications on the platform. You can orient yourself more easily now with information we’ve added to some of the dashboard’s core tools. Meaningful error messages (for example, alerts about data retrieval issues) can help you troubleshoot. Prompts in empty fields (for example, an empty list of applications or users) help you figure out how to get started. If you have a cloud.gov account, log in to get started. If you don’t but you have a federal government email address, you can create a free sandbox to explore.

Example of the text prompt that appears to someone who is the only user in their organization. It describes the user's ability to invite other users and then offers a link to more information about how to do so. If you’re the only user in your organization, this prompt helps you figure out how to add more users. cloud.gov now has more information like this to help you orient yourself.

Strengthen your cloud.gov know-how with Cloud Foundry

cloud.gov is built on the open source Cloud Foundry project, which means Cloud Foundry materials will help you learn about cloud.gov, as well. The Cloud Foundry Foundation is creating new training resources that you might want to check out. The first is a free Intro to Cloud Foundry course that can help you learn more about building and hosting applications on the platform. And next month they’re launching additional courses. And if you’d like to meet other users or learn what’s coming next in cloud platforms, check out an upcoming event, whether it’s the Cloud Foundry Summit or a smaller event near you.

Build tools for managing and auditing cloud.gov usage

cloud.gov was built with compliance in mind. We want the tools your agency uses to meet your management and compliance needs to work as seamlessly as they can with your cloud.gov applications and spaces. Now you can share specific information about your cloud.gov usage with a cloud.gov identity provider service instance. When you create that instance, you can configure it to ask people who use your tools to surface information about their cloud.gov accounts to those tools. This is just one option for building tools that work with cloud.gov data; you can also use the Cloud Foundry API.

Interested in using cloud.gov?

We can help you figure out whether the platform meets your needs.

Email us at cloud-gov-inquiries@gsa.gov and we will contact you with next steps shortly.

You can also try a free sandbox space.

Anyone with a federal government email address can now create a free, limited sandbox space for themselves. Instead of getting an invite from the cloud.gov team or someone else at your organization, you can now go to https://account.fr.cloud.gov/signup and send yourself an invite. You don’t need paperwork with us; you don’t even need to know what sort of app you want to build. Sandboxes are for experimenting, not for production or information with security requirements. But if you’re considering cloud.gov, or you’re already a user and want to explore doing something new, a sandbox is a great place to get started.

Help us make cloud.gov better

The cloud.gov team is looking to make the cloud.gov platform easier to evaluate and use, and we’re recruiting volunteers to help us do that. Usually this takes the form of walking through a few aspects of the platform or changes we’re working on and sharing your feedback with us. If you’d be interested in talking with us, let us know at cloud-gov-inquiries@gsa.gov.

May 22, 2017

Platform Release Notes: May 22, 2017

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Volunteers needed

The cloud.gov team is looking to make the cloud.gov platform easier to evaluate and use, and we’re recruiting volunteers to help us do that. If you’re interested, let us know at cloud-gov-inquiries@gsa.gov. We’ll ask you a few questions and ask you to walk us through using some aspect of the platform via screenshare.

Added

  • We’ve published a cost estimator spreadsheet (in XLSX and ODS formats) that your team can use to get a sense of how much cloud.gov will cost for your organization. If you’re interested in switching from a sandbox to a paid cloud.gov package, or if you want to expand your use of the platform to additional applications, use the estimator to get a sense of what the access package and usage quota fees will be across all your cloud.gov systems.
  • The Defense Information Systems Agency (DISA) has issued a provisional authorization for Department of Defense teams to use cloud.gov’s FedRAMP P-ATO for systems at the DISA level 2 impact level. This is a followup to the P-ATO; Level 2 is equivalent to FedRAMP Moderate.
  • The latest version of the PHP buildpack supports PHP 7.1.4 and 7.0.18.

Fixed

We’ve improved our automated process for updating the part of cloud.gov that routes traffic to your application. Previously, you might have seen occasional 502 errors in your application when we made updates.

Removed

The latest version of the PHP buildpack removes support for PHP 7.1.2 and 7.0.16. If your applications rely on one of these versions, update your application to use a supported version of PHP.

Platform releases

We upgraded the Cloud Foundry deployment to v258. This upgrade addresses these security vulnerabilities: - CVE-2017-4972: Blind SQL Injection in UAA - CVE-2017-4973: Privilege Escalation in UAA

Restage your application to incorporate fixes in the base filesystem and ensure you’re running the most recent language version supported by your buildpack.

Additional upgrades

See also

If you’re interested in details about recent dashboard updates, you can also see the dashboard release notes.

May 5, 2017

Platform Release Notes: May 5, 2017

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past five weeks.

Changed

  • logs.fr.cloud.gov, where you can view and search your logs on the web, has been upgraded to a newer version of Kibana (the open source project that powers the log viewer). The new version includes bug fixes and provides a slightly different look. For help navigating the new interface, start with our logs documentation. The Kibana user guide provides more information about the most recent version.
  • You can now migrate to the cloud.gov CDN broker with zero downtime. You can create a TXT record to be validated by Let’s Encrypt before you migrate, whereas before you needed to start by pointing your domain at the cloud.gov CDN to create a certificate.
  • cloud.gov’s web-based dashboard now provides more useful information if you have an empty org or space. For example, if you’re the only user in your organization, the dashboard gives you more information about inviting new users.

Deprecated

Python 3.3 has been deprecated with an anticipated end-of-life (EOL) in October 2017. The latest Python buildpacks no longer include 3.3.

Removed

Ruby 2.1 is now at EOL. If your app relies on Ruby 2.1 it will stop working following your next push. You should upgrade as soon as possible.

Production releases

We upgraded the Cloud Foundry deployment to v257. This addresses several security vulnerabilities. You should restage your application to incorporate fixes in the base filesystem and ensure you’re running the most recent language version supported by your buildpack.

Additional upgrades

See also

If you’re interested in details about recent dashboard updates, you can also see the dashboard release notes.

March 27, 2017

Platform Release Notes: March 27, 2017

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Added

When you create a cloud.gov identity provider service instance, you can now add scopes from a whitelist of approved scopes. This makes it easier to enable specific permissions and access for additional types of users in your applications.

Changed

We recommend updating to the latest version (6.25) of the Cloud Foundry command line interface (CLI). This can prevent errors when using the cf CLI. You can check your currently-installed version using cf -v

Fixed

The cloud.gov dashboard’s loading icon no longer displays after pages finish loading. Before, they would continue indefinitely.

Deprecated

  • On March 15th, we deprecated support for building and deployment on the cloud.gov East/West environment. This is in preparation for an upcoming shutdown of that environment. We are supporting a few customers in the process of migrating from East/West to GovCloud, but in all other cases we now support the GovCloud environment exclusively.
  • The latest Go buildpack deprecates support for Go 1.6. The next Go release will remove support for 1.6.

Removed

The latest Go buildpack no longer supports Go 1.5.

Security

We upgraded the Cloud Foundry deployment to v254. We have also upgraded the following buildpacks to versions newer than the buildpacks included in CF v254:

As part of the Cloud Foundry upgrade, the base filesystem used for running your application has been updated to address several security vulnerabilities. You should restage your application to incorporate fixes in the base filesystem and ensure you’re running the most recent language version supported by your buildpack.

See also

If you’re interested in details about recent dashboard updates, you can also see the dashboard release notes.

March 14, 2017

Platform Release Notes: March 14, 2017

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Added

The cloud.gov dashboard now alerts you when it’s unable to fetch recent data. This can help you when you’re troubleshooting problems with your application.

Changed

cf logs now accesses logs over port 443 instead of the previous port 4443, to increase the number of people who can use cf logs without errors. In many workplaces port 4443 is blocked, which leads cf logs to return an error.

Security

We upgraded the Cloud Foundry deployment to v252. We have also upgraded the following buildpacks to versions newer than the buildpacks included in CF v252:

As part of the Cloud Foundry upgrade, the base filesystem used for running your application has been updated to address several security vulnerabilities. You should restage your application to incorporate fixes in the base filesystem and ensure you’re running the most recent language version supported by your buildpack.

See also

If you’re interested in details about recent dashboard updates, you can also see the dashboard release notes.

February 28, 2017

Platform Release Notes: February 28, 2017

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Added

People who have a federal government email address can create a free sandbox space using https://account.fr.cloud.gov/signup. Previously, they had to send an email requesting an invite.

Changed

  • You can configure CDN instances that pass the original host to your application. This lets you set up relative redirects with your own domain name rather than with *.app.cloud.gov. Related, the commands for creating a new CDN service instance have changed slightly.
  • To accept a cloud.gov invitation, you have to click a button after visiting the link in the invitation email. This prevents invitations from expiring before use. Some government agencies use services that scan URLs in incoming emails by automatically clicking them, which caused earlier invites to expire before they could be used.

Fixed

Available services appear consistently in the cloud.gov dashboard. Previously, the UI sometimes acted as though it was loading them without ever serving them to you.

See also

If you’re interested in details about recent dashboard updates, you can also see the dashboard release notes.

February 10, 2017

Platform Release Notes: February 10, 2017

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Added

You can download the cloud.gov Control Implementation Summary + Customer Responsibility Matrix, a summary from the FedRAMP JAB P-ATO documentation. It lists whether each Low and Moderate security control is handled by cloud.gov, shared responsibility, or customer responsibility.

Fixed

  • In the dashboard, when you reach the end of your activity log, the log no longer displays a “Show more” button. Previously this button implied there might be more content when there was not.
  • If you’re a member of many organizations, the dashboard can now display all of the spaces and apps for which you’re a member. Previously, on the overview page, some organizations would appear empty or with some spaces and apps missing.

Security

cloud.gov is now included in the 18F vulnerability disclosure policy, which gives guidelines for security researchers from the public.

See also

If you’re interested in details about recent dashboard updates, you can also see the dashboard release notes.

February 2, 2017

cloud.gov is now FedRAMP Authorized.

Now it’s easier than ever to get started with cloud.gov.

We’re delighted to announce that cloud.gov has received a FedRAMP Joint Authorization Board (JAB) Provisional Authority to Operate (P-ATO) at the Moderate impact level. This means that cloud.gov successfully completed a comprehensive security and compliance assessment performed by a board of the CIOs and their teams from the General Services Administration, the Department of Defense, and the Department of Homeland Security. cloud.gov is the first completely open source service to receive FedRAMP authorization. Teams can now use cloud.gov with less upfront work, so they can use cloud.gov to deliver services even faster.

Read more about how this new authorization can help your team.

Other new and improved features

Native multifactor authentication

For teams that cannot integrate their agency single sign-on authentication provider with cloud.gov, or for teammates who don’t have access to agency accounts (such as some contractors), cloud.gov now provides a built-in authentication option with multifactor authentication. This is not yet included in the FedRAMP Authorization, but teams can use it if their agency approves.

Clearer pricing and product information

We’ve been making changes to the cloud.gov website in order to make our pricing model and our offerings clearer. We will continue to make improvements to the website and can only do so with feedback from our visitors. If you have anything to share with us, drop us a line at cloud-gov-inquiries@gsa.gov.

A more functional dashboard for using cloud.gov without using the command line

Our web-based dashboard gives people an easy web-based way to manage their applications. You can see an overview of your apps, spaces, and their current state. The dashboard now offers more visual clarity between activities. And now you can edit limits on your applications with a few clicks.

Demonstration of edit mode on the cloud.gov dashboard app panel. User clicks “Modify allocation and scale” to change their application’s allocated memory and disk space.

Interested in using cloud.gov?

We can help you figure out whether the platform meets your needs.

Please complete this interest survey and we will contact you with next steps shortly.

You can also try a free Sandbox account.

If you’re curious to see how the platform works, explore cloud.gov on your own with a limited free Sandbox account. If you have a GSA or EPA email address, you can just log in. Anyone else with a .gov or .mil email address can request an invitation by emailing cloud-gov-inquiries@gsa.gov. No paperwork required.

February 1, 2017

Platform Release Notes: February 1, 2017

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past six weeks.

Added

  • cloud.gov account holders in the GovCloud environment get automated notifications of expiring passwords, starting ten days before expiration.
  • The dashboard provides a start button for stopped apps (on the app page).

Changed

  • The dashboard homepage shows a more detailed summary of all your orgs, spaces, and apps.

Fixed

  • In the dashboard on the app page’s route creation panel, available domains now appear instead of returning an error.

Security

We upgraded the Cloud Foundry deployment to v251. The base filesystem used for running your application has been updated to address several security vulnerabilities. You should restage your application to incorporate fixes in the base filesystem and ensure you’re running the most recent language version supported by your buildpack.

See also

If you’re interested in details about recent dashboard updates, you can also see the dashboard release notes.

December 28, 2016

Platform Release Notes

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Added

  • You can now create S3 service keys to get direct access to your cloud.gov S3 buckets.

Changed

  • We upgraded Cloud Foundry (the underlying open source project that powers cloud.gov) to Release v250, which includes updates to buildpacks and improvements for internal components.

Security

The Cloud Foundry upgrade included updates for the base filesystem used for running your application, addressing several security vulnerabilities in that filesystem. You can restage your application to ensure you incorporate fixes in the base filesystem and are running the most recent language version supported by your buildpack.

December 21, 2016

East/West Sandbox Deprecation Notice

Update: since the time of this posting, we have postponed the cutoff date from January 15th to a new date that we expect to confirm and announce soon.

The original cloud.gov environment in AWS East/West is now officially deprecated and will be retired. We will be in touch to assist with migration of Prototyping, FISMA Moderate, and FISMA Low organizations to the new environment shortly.

Sandbox organizations in AWS East/West will be retired as of January 15. We will be deleting these sandbox organizations after this date. If you have hosted anything in a sandbox space that you would like to preserve, you must back it up or migrate it to the new environment yourself.

Required steps

  1. Create a GovCloud sandbox space.
    • EPA, FDIC and GSA users log into dashboard.fr.cloud.gov.
    • All others please request an invitation by contacting cloud-gov-inquiries@gsa.gov.
  2. Using the Cloud Foundry command line interface (CLI) cf run the command cf login -a api.fr.cloud.gov --sso and follow the instructions.
  3. (Optional) Migrate your application.

Background

We heard loud and clear that a FedRAMP Moderate JAB P-ATO for cloud.gov would be critical to ensuring cloud.gov could be used in production for most federal agencies. Getting that ATO required hosting on AWS GovCloud instead of AWS East/West so we have created a new and improved version of cloud.gov there. We anticipate receiving JAB P-ATO for cloud.gov in January, 2017. The new version of cloud.gov includes additional features that many have asked for, including: more reliable and faster SSH, better services, easy custom domains and IPv6 support. We are now opening access to this new environment to everyone. Find out more about the changes.

December 14, 2016

Platform Release Notes

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Added

  • New dashboard features:
    • On an application page, you can now edit the number of application instances, instance memory, and disk quota.
    • Org and space level views now include a quick overview of the health of application instances.

Changed

  • We upgraded Cloud Foundry (the underlying open source project that powers cloud.gov) to Release v249 (see also Release v248), which includes updates to buildpacks and improvements for internal components.
  • Changes in Cloud Foundry require an upgrade to the latest version of the command line interface (CLI) client (cf) in order for cf logs to work properly. Please upgrade your local version to the latest version (installation instructions).

Fixed

  • The latest Cloud Foundry command line interface client (available here) addresses an issue where inspecting application logs returned errors.
  • We updated the cloud.gov account creation form to include previously-missing information about password requirements.

Security

The Cloud Foundry upgrade included updates for the base filesystem used for running your application, addressing several security vulnerabilities in that filesystem. You can restage your application to ensure you incorporate fixes in the base filesystem and are running the most recent language version supported by your buildpack.

November 30, 2016

Platform Release Notes

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past two weeks.

Added

  • The dashboard now allows restarting of apps from the app page.

Changed

  • We upgraded Cloud Foundry (the underlying open source project that powers cloud.gov) to Release v247, which includes updates to buildpacks and improvements for internal components.

Fixed

  • Dashboard: We fixed an issue that prevented creating service instances on the marketplace page.

Security

The base filesystem used for running your application has been updated to address several security vulnerabilities. You can restage your application to ensure you incorporate fixes in the base filesystem and are running the most recent language version supported by your buildpack.

November 18, 2016

Platform Release Notes

Curious what’s new that you might find helpful as a cloud.gov application developer? Here are highlights from our platform updates over the past four weeks.

Added

  • cloud.gov supports the .NET Core buildpack (learn about buildpacks).
  • You can invite teammates who aren’t in agencies with supported single-sign-on authentication (GSA, EPA, FDIC). After you invite them, they can log in by creating a cloud.gov account with multi-factor authentication.
  • The dashboard shows the current memory, disk usage and quota limits for apps.
  • You can create deployer accounts programmatically.
  • For FDIC users: you can log into cloud.gov using your agency single-sign-on credentials.

Changed

  • We upgraded Cloud Foundry (the underlying open source project that powers cloud.gov) to Release v246, which includes updates to buildpacks and improvements for internal components.

Security

You can restage your application to incorporate the latest security fixes and ensure you’re running the most recent language version supported.

July 19, 2016

Full steam ahead on FedRAMP assessment

Over on the 18F team blog, we’ve posted an update on cloud.gov’s FedRAMP assessment progress. In short: we’ve passed the FedRAMP Ready milestone, and we expect to receive FedRAMP Joint Authorization Board (JAB) Provisional Authority to Operate (P-ATO) in November. More details in the post!

July 7, 2016

Today’s Dashboard update (formerly the “Deck”)

Today we released a new version of the cloud.gov Deck (now Dashboard). The best part is invisible: we refactored the codebase so we can improve it much faster than we could with the old version. But it has visible changes too, so here’s what’s new, what we have in mind, and how to tell us what you think.

We’ll keep the old Deck around for about a week and then will redirect it to this new version. Let us know if this would cause problems for you.

What’s new and different

  • Name: We took this opportunity to rename it from the “Deck” to the “Dashboard”, since that’s what people usually call it.
  • Style: It fits into the overall cloud.gov style and navigation! So for example, when you’re in the Dashboard troubleshooting something, you can easily go look at documentation and status.
  • Navigation: Navigating to your orgs, spaces, and apps is simpler: the sidebar displays a straightforward list of the orgs and spaces in your account, along with the marketplaces available for your orgs. You won’t have to click as many menus to do common tasks.
  • Labels: Data about your apps has unit labels to identify whether numbers are in GB or MB.
  • Code: The Dashboard’s refactored codebase has better tests and less repetition.
  • More potential for open source collaboration: This improved codebase will help us encourage reuse and contributions by outside-18F teams that are also building tools on top of Cloud Foundry.

What’s missing in this version

  • App management options: This version doesn’t include all the earlier Deck’s options for managing apps (such as starting/stopping them, binding services, and updating routes). Instead, it links to documentation for those tasks on the command line. These web options weren’t used much, and we’re researching whether we should prioritize rebuilding them. (We’re curious what you think.)
  • App logs and events: The Dashboard now points to logs.cloud.gov for viewing app logs and events, instead of duplicating it.
  • Quota meter: We didn’t re-implement the small quota indicator from the old Deck, since it was mostly mysterious to people. We’re researching how to helpfully explain your quota usage.
  • Perfectly bug-free experience: We have a list of known bugs — please feel free to file more if you notice something weird or broken.

What we’ve heard that people want

As we figure out next steps, we know that people want the Dashboard to help them:

  • Understand how to use cloud.gov
  • Troubleshoot apps that are having problems
  • Do more tasks that are only available on the command line
  • Get insight into quotas and billing

We’d like your thoughts

Everyone can file issues for bugs and suggestions. If you’re in 18F, come talk to us about the Dashboard in #cloud-gov-navigator. If you’re a cloud.gov user outside 18F, you can send thoughts and questions to us at cloud-gov-support@gsa.gov.

June 15, 2016

Changes to login and cf-ssh

Earlier this month we updated cloud.gov login and cf-ssh in ways that mean most cloud.gov users need to change how they use them. You’ve probably already made these changes if you need to (we sent email notifications to people who should log in using the new system), but here are the details as a handy reference.

For GSA and EPA, your cloud.gov login is now your agency login

We updated how @gsa.gov and @epa.gov accounts authenticate with cloud.gov. When you log in, use your official agency credentials instead of your old cloud.gov-specific username and password. Here’s how:

  • On the web: At https://login.cloud.gov/, select the button for your agency and enter your agency credentials (the same credentials you use for your agency’s own services).
  • On the command line: Use the new command listed at Setting up the command line for agency accounts: cf login -a api.cloud.gov --sso

This update improves the security of these accounts because you’re now using your agency’s existing multi-factor authentication system. This is a step in our progress toward FedRAMP compliance and certification for cloud.gov.

Use the new version of cf-ssh

If you use cf-ssh for running one-off commands, we released version 3 on June 2. Please download and use that latest version.

If you haven’t updated cf-ssh, you may get this error when you try to use it:

Initiating tmate connection...success
ssh: Could not resolve hostname tmate.18f.us: nodename nor servname provided, or not known

That usually means you need to update cf-ssh to our latest version.

February 12, 2016

Logging service

New feature: Zero-setup persistent logs.

Given the universal need for compliant logging, we’ve recently added a common logging facility to cloud.gov. Now, logs and events for every cloud.gov application are stored and indexed automatically, with zero setup required.

For more information about this feature, please see our documentation about logging.

Now that cloud.gov provides platform-level logging, the ELK service we previously provided will be deprecated. If you are still using it, we recommend you delete the instance whenever is convenient to reduce your resource usage (and hence costs).

If you have feedback about this service, please don’t hesitate to contact us.

September 14, 2015

Even more console features and a new home for updates

Now you can view log and event data for your apps and adjust permissions for your org and spaces via the web. We’re also publishing these updates via cloud.gov.

View log and event data for your apps in the console

When you take a look at the details for an application via the cloud.gov console, you’ll now be able to see any recent logs generated by your application, as well as a list of recent deployment events from cloud.gov itself.

Adjust permissions for your orgs and spaces in the console

It’s now possible to inspect and adjust the permissions for the individual orgs and spaces you control.

Updates now published via the cloud.gov website

We’ve also started consolidating announcement about updates to cloud.gov, like this one, on cloud.gov! Check it out.

Want to know more?

Follow our team:

That’s all for now…

September 1, 2015

Status page and console additions

We’ve added a new status page to show you the state of the cloud.gov platform, and we’ve made significant upgrades in your ability to manage your apps via the web.

Status Page

As production use of cloud.gov ramps up, it’s important that you have a constant picture of the platform’s status, which may affect your product’s operations and availability.

We’re now providing this visibility via the cloud.gov Status Page, where you’ll be able to see at a glance:

  • When there are any ongoing or recent degradations in service
  • When any maintenance is planned or recently completed

We’ve proactively subscribed existing users to that page, so there’s no need for any action on your part… You’ll be notified via e-mail whenever problems are identified, or when planned maintenance is expected to impact your application’s availability. However, you can also use the subscription control at the upper-right of the page to subscribe to updates via texts or Atom/RSS feed if you so choose.

Console Improvements

In addition to the command-line client, the cloud.gov web-based console has now entered an alpha state. You can use the console to review your organizations and spaces, and manage the state of your applications, services, and routes. Creation of accounts, orgs, and spaces is still managed via GitHub request.

Here are examples of actions now possible via the magic of your Interweb-capable browsing apparatus:

  • Traverse the layout of your accessible organizations and spaces
  • Control access to your owned orgs and spaces for other accounts
  • Browse a list of available services and provision new instances
  • Bind service instances with specific applications
  • Edit the routes that will bring user traffic to an application
  • Inspect the live resource utilization of a running application
  • Restart stopped or misbehaving applications

If you’ve not taken a look in a while, please check it out!

Note I said above the console is in “alpha” state, and really it’s more of an MVP. Please report problems or feature requests or better yet, make pull-requests via GitHub. (Side note: We are short-handed on front-end/design/UI resources, so any quick help anyone can offer, even if it’s just some help with our IA, would be very VERY welcome!)

Other stuff

We’re now publishing our roadmap in story-map form in case anyone wants to get a peek at what we’re focused on now and what we’re juggling for the future. Our focus right now is: Buttoning up loose ends that prevent us from offering cloud.gov to other agencies.

Our intra-sprint kanban board is also visible, as is the calendar of cloud.gov team rituals for anyone who would like to attend.

That’s all for now…

May 29, 2015

Updates for the week of 5/29/2015

Platform:

  • Upgraded to release 210
  • Binary and Static buildpacks are now built in the deployment
  • Added Newrelic Insights and Plugins for platform monitoring data

Services:

  • The rds service now encrypts the passwords