3 - Add bash command-line completion support for ovs-appctl/ovs-dpctl/
4 ovs-ofctl/ovsdb-tool commands. Please check
5 utilities/ovs-command-compgen.INSTALL.md for how to use.
6 - The "learn" action supports a new flag "delete_learned" that causes
7 the learned flows to be deleted when the flow with the "learn" action
9 - Basic support for the Geneve tunneling protocol. It is not yet
10 possible to generate or match options. This is planned for a future
11 release. The protocol is documented at
12 http://tools.ietf.org/html/draft-gross-geneve-00
13 - The OVS database now reports controller rate limiting statistics.
14 - ovs-dpctl functionality is now available for datapaths integrated
15 into ovs-vswitchd, via ovs-appctl. Some existing ovs-appctl
16 commands are now redundant and will be removed in a future
17 release. See ovs-vswitchd(8) for details.
19 * OpenFlow 1.5 (draft) extended registers are now supported.
20 * OpenFlow 1.5 (draft) Copy-Field action is now supported.
21 * OpenFlow 1.5 (draft) masked Set-Field action is now supported.
22 * OpenFlow 1.3+ table features requests are now supported (read-only).
23 * Nicira extension "move" actions may now be included in action sets.
24 * "resubmit" actions may now be included in action sets. The resubmit
25 is executed last, and only if the action set has no "output" or "group"
27 - ovs-pki: Changed message digest algorithm from MD5 to SHA-1 because
28 MD5 is no longer secure and some operating systems have started to disable
30 - ovsdb-server: New OVSDB protocol extension allows inequality tests on
31 "optional scalar" columns. See ovsdb-server(1) for details.
32 - ovs-vsctl now permits immutable columns in a new row to be modified in
33 the same transaction that creates the row.
34 - test-controller has been renamed ovs-testcontroller at request of users
35 who find it useful for testing basic OpenFlow setups. It is still not
36 a necessary or desirable part of most Open vSwitch deployments.
37 - Support for travis-ci.org based continuous integration builds has been
38 added. Build failures are reported to build@openvswitch.org. See INSTALL.md
39 file for additional details.
40 - Experimental support for the Rapid Spanning Tree Protocol
41 (IEEE 802.1D-2004). More conformance and interoperability testing is
42 still needed, so this should not be enabled on production environments.
43 - Stats are no longer updated on fake bond interface.
44 - Keep active bond slave selection across OVS restart.
45 - A simple wrapper script, 'ovs-docker', to integrate OVS with Docker
46 containers. If and when there is a native integration of Open vSwitch
47 with Docker, the wrapper script will be retired.
52 - OpenFlow 1.1, 1.2, and 1.3 are now enabled by default in
54 - Linux kernel datapath now has an exact match cache optimizing the
55 flow matching process.
56 - Datapath flows now have partially wildcarded tranport port field
57 matches. This reduces userspace upcalls, but increases the
58 number of different masks in the datapath. The kernel datapath
59 exact match cache removes the overhead of matching the incoming
60 packets with the larger number of masks, but when paired with an
61 older kernel module, some workloads may perform worse with the
63 - Support for multicast snooping (IGMPv1 and IGMPv2)
64 - Compatibility with autoconf 2.63 (previously >=2.64)
66 v2.2.0 - Internal Release
68 - Internal ports are no longer brought up by default, because it
69 should be an administrator task to bring up devices as they are
71 - ovs-vsctl now reports when ovs-vswitchd fails to create a new port or
73 - Port creation and configuration errors are now stored in a new error
74 column of the Interface table and included in 'ovs-vsctl show'.
75 - The "ovsdbmonitor" graphical tool has been removed, because it was
76 poorly maintained and not widely used.
77 - New "check-ryu" Makefile target for running Ryu tests for OpenFlow
78 controllers against Open vSwitch. See INSTALL.md for details.
79 - Added IPFIX support for SCTP flows and templates for ICMPv4/v6 flows.
80 - Upon the receipt of a SIGHUP signal, ovs-vswitchd no longer reopens its
81 log file (it will terminate instead). Please use 'ovs-appctl vlog/reopen'
83 - Support for Linux kernels up to 3.14. From Kernel 3.12 onwards OVS uses
84 tunnel API for GRE and VXLAN.
86 - Added support for custom vlog patterns in Python
91 - Address prefix tracking support for flow tables. New columns
92 "prefixes" in OVS-DB table "Flow_Table" controls which packet
93 header fields are used for address prefix tracking. Prefix
94 tracking allows the classifier to skip rules with longer than
95 necessary prefixes, resulting in better wildcarding for datapath
96 flows. Default configuration is to not use any fields for prefix
97 tracking. However, if any flow tables contain both exact matches
98 and masked matches for IP address fields, OVS performance may be
99 increased by using this feature.
100 * As of now, the fields for which prefix lookup can be enabled
101 are: 'tun_id', 'tun_src', 'tun_dst', 'nw_src', 'nw_dst' (or
102 aliases 'ip_src' and 'ip_dst'), 'ipv6_src', and 'ipv6_dst'.
103 (Using this feature for 'tun_id' would only make sense if the
104 tunnel IDs have prefix structure similar to IP addresses.)
105 * There is a maximum number of fields that can be enabled for any
106 one flow table. Currently this limit is 3.
108 $ ovs-vsctl set Bridge br0 flow_tables:0=@N1 -- \
109 --id=@N1 create Flow_Table name=table0
110 $ ovs-vsctl set Bridge br0 flow_tables:1=@N1 -- \
111 --id=@N1 create Flow_Table name=table1
112 $ ovs-vsctl set Flow_Table table0 prefixes=ip_dst,ip_src
113 $ ovs-vsctl set Flow_Table table1 prefixes=[]
114 - TCP flags matching: OVS now supports matching of TCP flags. This
115 has an adverse performance impact when using OVS userspace 1.10
116 or older (no megaflows support) together with the new OVS kernel
117 module. It is recommended that the kernel and userspace modules
118 both are upgraded at the same time.
119 - The default OpenFlow and OVSDB ports will change to
120 IANA-assigned numbers in a future release. Consider updating
121 your installations to specify port numbers instead of using the
124 * The OpenFlow 1.1+ "Write-Actions" instruction is now supported.
125 * OVS limits the OpenFlow port numbers it assigns to port 32767 and
126 below, leaving port numbers above that range free for assignment
128 * ovs-vswitchd now honors changes to the "ofport_request" column
129 in the Interface table by changing the port's OpenFlow port
131 - ovs-vswitchd.conf.db.5 man page will contain graphviz/dot
132 diagram only if graphviz package was installed at the build time.
133 - Support for Linux kernels up to 3.11
135 The "show" command also displays mega flow mask stats.
137 * New command "ofp-parse-pcap" to dump OpenFlow from PCAP files.
138 - ovs-controller has been renamed test-controller. It is no longer
139 packaged or installed by default, because too many users assumed
140 incorrectly that ovs-controller was a necessary or desirable part
141 of an Open vSwitch deployment.
142 - Added vlog option to export to a UDP syslog sink.
144 * The "monitor" command can now monitor all tables in a database,
145 instead of being limited to a single table.
146 - The flow-eviction-threshold has been replaced by the flow-limit which is a
147 hard limit on the number of flows in the datapath. It defaults to 200,000
148 flows. OVS automatically adjusts this number depending on network
150 - Added IPv6 support for active and passive socket communications.
154 ---------------------
155 - The ovs-vswitchd process is no longer single-threaded. Multiple
156 threads are now used to handle flow set up and asynchronous
159 * Experimental support for OpenFlow 1.1 (in addition to 1.2 and
160 1.3, which had experimental support in 1.10).
161 * Experimental protocol support for OpenFlow 1.1+ groups. This
162 does not yet include an implementation in the Open vSwitch
164 * Experimental protocol support for OpenFlow 1.2+ meters. This
165 does not yet include an implementation in the Open vSwitch
167 * New support for matching outer source and destination IP address
168 of tunneled packets, for tunnel ports configured with the newly
169 added "remote_ip=flow" and "local_ip=flow" options.
170 * Support for matching on metadata 'pkt_mark' for interacting with
171 other system components. On Linux this corresponds to the skb
173 * Support matching, rewriting SCTP ports
174 - The Interface table in the database has a new "ifindex" column to
175 report the interface's OS-assigned ifindex.
176 - New "check-oftest" Makefile target for running OFTest against Open
177 vSwitch. See README-OFTest for details.
178 - The flow eviction threshold has been moved to the Open_vSwitch table.
179 - Database names are now mandatory when specifying ovsdb-server options
180 through database paths (e.g. Private key option with the database name
181 should look like "--private-key=db:Open_vSwitch,SSL,private_key").
182 - Added ovs-dev.py, a utility script helpful for Open vSwitch developers.
183 - Support for Linux kernels up to 3.10
185 * New "ofp-parse" for printing OpenFlow messages read from a file.
186 * New commands for OpenFlow 1.1+ groups.
187 - Added configurable flow caching support to IPFIX exporter.
188 - Dropped support for Linux pre-2.6.32.
189 - Log file timestamps and ovsdb commit timestamps are now reported
190 with millisecond resolution. (Previous versions only reported
194 v1.11.0 - 28 Aug 2013
195 ---------------------
196 - Support for megaflows, which allows wildcarding in the kernel (and
197 any dpif implementation that supports wildcards). Depending on
198 the flow table and switch configuration, flow set up rates are
199 close to the Linux bridge.
200 - The "tutorial" directory contains a new tutorial for some advanced
201 Open vSwitch features.
202 - Stable bond mode has been removed.
203 - The autopath action has been removed.
204 - New support for the data encapsulation format of the LISP tunnel
205 protocol (RFC 6830). An external control plane or manual flow
206 setup is required for EID-to-RLOC mapping.
208 * The "dec_mpls_ttl" and "set_mpls_ttl" actions from OpenFlow
209 1.1 and later are now implemented.
210 * New "stack" extension for use in actions, to push and pop from
212 * The "load" and "set_field" actions can now modify the "in_port". (This
213 allows one to enable output to a flow's input port by setting the
214 in_port to some unused value, such as OFPP_NONE.)
216 * New debugging commands "add-flow", "mod-flow", "del-flow".
217 * "dump-flows" now has a -m option to increase output verbosity.
218 - In dpif-based bridges, cache action translations, which can improve
219 flow set up performance by 80% with a complicated flow table.
220 - New syslog format, prefixed with "ovs|", to be easier to filter.
221 - RHEL: Removes the default firewall rule that allowed GRE traffic to
222 pass through. Any users that relied on this automatic firewall hole
223 will have to manually configure it. The ovs-ctl(8) manpage documents
224 the "enable-protocol" command that can be used as an alternative.
225 - New CFM demand mode which uses data traffic to indicate interface
228 v1.10.0 - 01 May 2013
229 ---------------------
230 - Bridge compatibility support has been removed. Any uses that
231 rely on ovs-brcompatd will have to stick with Open vSwitch 1.9.x
232 or adapt to native Open vSwitch support (e.g. use ovs-vsctl instead
234 - The maximum size of the MAC learning table is now configurable.
235 - With the Linux datapath, packets for new flows are now queued
236 separately on a per-port basis, so it should no longer be
237 possible for a large number of new flows arriving on one port to
238 prevent new flows from being processed on other ports.
240 * Previously ovs-vsctl would retry connecting to the database forever,
241 causing it to hang if ovsdb-server was not running. Now, ovs-vsctl
242 only tries once by default (use --retry to try forever). This change
243 means that you may want to remove uses of --timeout to avoid hangs
245 * Many "ovs-vsctl" database commands now accept an --if-exists option.
246 Please refer to the ovs-vsctl manpage for details.
248 - Experimental support for newer versions of OpenFlow. See
249 the "What versions of OpenFlow does Open vSwitch support?"
250 question in the FAQ for more details.
251 - The OpenFlow "dp_desc" may now be configured by setting the
252 value of other-config:dp-desc in the Bridge table.
253 - It is possible to request the OpenFlow port number with the
254 "ofport_request" column in the Interface table.
255 - The NXM flow_removed message now reports the OpenFlow table ID
256 from which the flow was removed.
258 - New support for the VXLAN tunnel protocol (see the IETF draft here:
259 http://tools.ietf.org/html/draft-mahalingam-dutt-dcops-vxlan-03).
260 - Tunneling requires the version of the kernel module paired with
261 Open vSwitch 1.9.0 or later.
262 - Inheritance of the Don't Fragment bit in IP tunnels (df_inherit)
263 is no longer supported.
264 - Path MTU discovery is no longer supported.
265 - CAPWAP tunneling support removed.
266 - Tunnels with multicast destination ports are no longer supported.
268 - The "dump-flows" and "del-flows" no longer require an argument
269 if only one datapath exists.
271 - New "vlog/disable-rate-limit" and "vlog/enable-rate-limit"
272 commands available allow control over logging rate limits.
273 - New "dpif/dump-dps", "dpif/show", and "dpif/dump-flows" command
274 that mimic the equivalent ovs-dpctl commands.
275 - The ofproto library is now responsible for assigning OpenFlow port
276 numbers. An ofproto implementation should assign them when
277 port_construct() is called.
278 - All dpif-based bridges of a particular type share a common
279 datapath called "ovs-<type>", e.g. "ovs-system". The ovs-dpctl
280 commands will now return information on that shared datapath. To
281 get the equivalent bridge-specific information, use the new
282 "ovs-appctl dpif/*" commands.
283 - Backward-incompatible changes:
284 - Earlier Open vSwitch versions treated ANY as a wildcard in flow
285 syntax. OpenFlow 1.1 adds a port named ANY, which introduces a
286 conflict. ANY was rarely used in flow syntax, so we chose to
287 retire that meaning of ANY in favor of the OpenFlow 1.1 meaning.
288 - Patch ports no longer require kernel support, so they now work
289 with FreeBSD and the kernel module built into Linux 3.3 and later.
290 - New "sample" action.
294 ------------------------
296 - Support for ipv6 set action.
297 - SKB mark matching and setting.
298 - support for Linux kernels up to 3.8
299 - FreeBSD is now a supported platform, thanks to code contributions from
300 Gaetano Catalli, Ed Maste, and Giuseppe Lettieri.
301 - ovs-bugtool: New --ovs option to report only OVS related information.
302 - New %t and %T log escapes to identify the subprogram within a
303 cooperating group of processes or threads that emitted a log message.
304 The default log patterns now include this information.
306 - Allow bitwise masking for SHA and THA fields in ARP, SLL and TLL
307 fields in IPv6 neighbor discovery messages, and IPv6 flow label.
308 - Adds support for writing to the metadata field for a flow.
310 - The tunneling code no longer assumes input and output keys are
311 symmetric. If they are not, PMTUD needs to be disabled for
312 tunneling to work. Note this only applies to flow-based keys.
313 - New support for a nonstandard form of GRE that supports a 64-bit key.
314 - Tunnel Path MTU Discovery default value was set to 'disabled'.
315 This feature is deprecated and will be removed soon.
316 - Tunnel header caching removed.
318 - Commands and actions that accept port numbers now also accept keywords
319 that represent those ports (such as LOCAL, NONE, and ALL). This is
320 also the recommended way to specify these ports, for compatibility
321 with OpenFlow 1.1 and later (which use the OpenFlow 1.0 numbers
322 for these ports for different purposes).
324 - Support requesting the port number with the "port_no" option in
325 the "add-if" command.
326 - ovs-pki: The "online PKI" features have been removed, along with
327 the ovs-pki-cgi program that facilitated it, because of some
328 alarmist insecurity claims. We do not believe that these claims
329 are true, but because we do not know of any users for this
330 feature it seems better on balance to remove it. (The ovs-pki-cgi
331 program was not included in distribution packaging.)
332 - ovsdb-server now enforces the immutability of immutable columns. This
333 was not enforced in earlier versions due to an oversight.
334 - The following features are now deprecated. They will be removed no
335 earlier than February 2013. Please email dev@openvswitch.org with
337 - Bridge compatibility.
339 - The autopath action.
340 - Interface type "null".
341 - Numeric values for reserved ports (see "ovs-ofctl" note above).
342 - Tunnel Path MTU Discovery.
343 - CAPWAP tunnel support.
344 - The data in the RARP packets can now be matched in the same way as the
349 ------------------------
350 *** Internal only release ***
351 - New FAQ. Please send updates and additions!
352 - Authors of controllers, please read the new section titled "Action
353 Reproduction" in DESIGN, which describes an Open vSwitch change in
354 behavior in corner cases that may affect some controllers.
356 - A new test utility that can create L3 tunnel between two Open
357 vSwitches and detect connectivity issues.
359 - New --sort and --rsort options for "dump-flows" command.
360 - "mod-port" command can now control all OpenFlow config flags.
362 - Allow general bitwise masking for IPv4 and IPv6 addresses in
363 IPv4, IPv6, and ARP packets. (Previously, only CIDR masks
365 - Allow support for arbitrary Ethernet masks. (Previously, only
366 the multicast bit in the destination address could be individually
368 - New field OXM_OF_METADATA, to align with OpenFlow 1.1.
369 - The OFPST_QUEUE request now reports an error if a specified port or
370 queue does not exist, or for requests for a specific queue on all
371 ports, if the specified queue does not exist on any port. (Previous
372 versions generally reported an empty set of results.)
373 - New "flow monitor" feature to allow controllers to be notified of
374 flow table changes as they happen.
375 - Additional protocols are not mirrored and dropped when forward-bpdu is
376 false. For a full list, see the ovs-vswitchd.conf.db man page.
377 - Open vSwitch now sends RARP packets in situations where it previously
378 sent a custom protocol, making it consistent with behavior of QEMU and
380 - All Open vSwitch programs and log files now show timestamps in UTC,
381 instead the local timezone, by default.
385 ------------------------
386 - kernel modules are renamed. openvswitch_mod.ko is now
387 openvswitch.ko and brcompat_mod.ko is now brcompat.ko.
388 - Increased the number of NXM registers to 8.
389 - Added ability to configure DSCP setting for manager and controller
390 connections. By default, these connections have a DSCP value of
391 Internetwork Control (0xc0).
392 - Added the granular link health statistics, 'cfm_health', to an
395 - Added support to mask nd_target for ICMPv6 neighbor discovery flows.
396 - Added support for OpenFlow 1.3 port description (OFPMP_PORT_DESC)
399 - Added the "dump-ports-desc" command to retrieve port
400 information using the new port description multipart messages.
402 - Added support for spawning ovs-test server from the client.
403 - Now ovs-test is able to automatically create test bridges and ports.
404 - "ovs-dpctl dump-flows" now prints observed TCP flags in TCP flows.
405 - Tripled flow setup performance.
406 - The "coverage/log" command previously available through ovs-appctl
407 has been replaced by "coverage/show". The new command replies with
408 coverage counter values, instead of logging them.
412 ------------------------
413 - Allow OFPP_CONTROLLER as the in_port for packet-out messages.
417 ------------------------
418 *** Internal only release ***
420 - LACP bonds no longer fall back to balance-slb when negotiations fail.
421 Instead they drop traffic.
422 - The default bond_mode changed from SLB to active-backup, to protect
423 unsuspecting users from the significant risks of SLB bonds (which are
424 documented in vswitchd/INTERNALS).
425 - Load balancing can be disabled by setting the bond-rebalance-interval
428 - Added support for bitwise matching on TCP and UDP ports.
429 See ovs-ofctl(8) for more information.
430 - NXM flow dumps now include times elapsed toward idle and hard
432 - Added an OpenFlow extension NXT_SET_ASYNC_CONFIG that allows
433 controllers more precise control over which OpenFlow messages they
434 receive asynchronously.
435 - New "fin_timeout" action.
436 - Added "fin_timeout" support to "learn" action.
437 - New Nicira action NXAST_CONTROLLER that offers additional features
438 over output to OFPP_CONTROLLER.
439 - When QoS settings for an interface do not configure a default queue
440 (queue 0), Open vSwitch now uses a default configuration for that
441 queue, instead of dropping all packets as in previous versions.
443 - Logging to console and file will have UTC timestamp as a default for
444 all the daemons. An example of the default format is
445 2012-01-27T16:35:17Z. ovs-appctl can be used to change the default
447 - The syntax of commands and options to set log levels was simplified,
448 to make it easier to remember.
449 - New support for limiting the number of flows in an OpenFlow flow
450 table, with configurable policy for evicting flows upon
451 overflow. See the Flow_Table table in ovs-vswitch.conf.db(5)
452 for more information.
453 - New "enable-async-messages" column in the Controller table. If set to
454 false, OpenFlow connections to the controller will initially have all
455 asynchronous messages disabled, overriding normal OpenFlow behavior.
456 - ofproto-provider interface:
457 - "struct rule" has a new member "used" that ofproto implementations
458 should maintain by updating with ofproto_rule_update_used().
460 - The new option --timestamp causes the "monitor" command to print
461 a timestamp with every update.
462 - CFM module CCM broadcasts can now be tagged with an 802.1p priority.
466 ------------------------
468 - Added support for querying, modifying, and deleting flows
469 based on flow cookie when using NXM.
470 - Added new NXM_PACKET_IN format.
471 - Added new NXAST_DEC_TTL action.
473 - Added daemonization support to the monitor and snoop commands.
475 - The "find" command supports new set relational operators
476 {=}, {!=}, {<}, {>}, {<=}, and {>=}.
477 - ovsdb-tool now uses the typical database and schema installation
478 directories as defaults.
479 - The default MAC learning timeout has been increased from 60 seconds
480 to 300 seconds. The MAC learning timeout is now configurable.
484 ------------------------
485 - Compatible with Open vSwitch kernel module included in Linux 3.3.
486 - New "VLAN splinters" feature to work around buggy device drivers
487 in old Linux versions. (This feature is deprecated. When
488 broken device drivers are no longer in widespread use, we will
489 delete this feature.) See ovs-vswitchd.conf.db(5) for more
492 - Added ability to match on IPv6 flow label through NXM.
493 - Added ability to match on ECN bits in IPv4 and IPv6 through NXM.
494 - Added ability to match on TTL in IPv4 and IPv6 through NXM.
495 - Added ability to modify ECN bits in IPv4.
496 - Added ability to modify TTL in IPv4.
498 - Don't require the "normal" action to use mirrors. Traffic will
499 now be properly mirrored for any flows, regardless of their
501 - Track packet and byte statistics sent on mirrors.
502 - The sFlow implementation can now usually infer the correct agent
503 device instead of having to be told explicitly.
505 - New "fdb/flush" command to flush bridge's MAC learning table.
507 - A new distributed testing tool that allows one to diagnose performance
508 and connectivity issues. This tool currently is not included in RH or
510 - RHEL packaging now supports integration with Red Hat network scripts.
512 - Post 1.4.*, OVS will be changing the default bond mode from balance-slb
513 to active-backup. SLB bonds carry significant risks with them
514 (documented vswitchd/INTERNALS) which we want to prevent unsuspecting
515 users from running into. Users are advised to update any scripts or
516 configuration which may be negatively impacted by explicitly setting
517 the bond mode which they want to use.
521 ------------------------
523 - Added an OpenFlow extension which allows the "output" action to accept
525 - Added an OpenFlow extension for flexible learning.
526 - Bumped number of NXM registers from four to five.
528 - New "version" command to determine version of running daemon.
529 - If no argument is provided for "cfm/show", displays detailed
530 information about all interfaces with CFM enabled.
531 - If no argument is provided for "lacp/show", displays detailed
532 information about all ports with LACP enabled.
534 - New "set-if" command to modify a datapath port's configuration.
536 - The software switch now supports 255 OpenFlow tables, instead
537 of just one. By default, only table 0 is consulted, but the
538 new NXAST_RESUBMIT_TABLE action can look up in additional
539 tables. Tables 128 and above are reserved for use by the
540 switch itself; please use only tables 0 through 127.
541 - Add support for 802.1D spanning tree (STP).
542 - Fragment handling extensions:
543 - New OFPC_FRAG_NX_MATCH fragment handling mode, in which L4
544 fields are made available for matching in fragments with
546 - New NXM_NX_IP_FRAG match field for matching IP fragments (usable
547 via "ip_frag" in ovs-ofctl).
548 - New ovs-ofctl "get-frags" and "set-frags" commands to get and set
549 fragment handling policy.
550 - CAPWAP tunneling now supports an extension to transport a 64-bit key.
551 By default it remains compatible with the old version and other
552 standards-based implementations.
553 - Flow setups are now processed in a round-robin manner across ports
554 to prevent any single client from monopolizing the CPU and conducting
555 a denial of service attack.
556 - Added support for native VLAN tagging. A new "vlan_mode"
557 parameter can be set for "port". Possible values: "access",
558 "trunk", "native-tagged" and "native-untagged".
559 - test-openflowd has been removed. Please use ovs-vswitchd instead.
562 ------------------------
563 - New "ofproto" abstraction layer to ease porting to hardware
565 - Packaging for Red Hat Enterprise Linux 5.6 and 6.0.
566 - Datapath support for Linux kernels up to 3.0.
568 - New "bundle" and "bundle_load" action extensions.
570 - Implement table unique constraints.
571 - Support cooperative locking between callers.
573 - New "-s" option for "show" command prints packet and byte
574 counters for each port.
576 - New "--readd" option for "replace-flows".
578 - New "show" command to print an overview of configuration.
579 - New "comment" command to add remark that explains intentions.
580 - ovs-brcompatd has been rewritten to fix long-standing bugs.
581 - ovs-openflowd has been renamed test-openflowd and moved into the
582 tests directory. Its presence confused too many users. Please
583 use ovs-vswitchd instead.
584 - New ovs-benchmark utility to test flow setup performance.
585 - A new log level "off" has been added. Configuring a log facility
586 "off" prevents any messages from being logged to it. Previously,
587 "emer" was effectively "off" because no messages were ever logged at
588 level "emer". Now, errors that cause a process to exit are logged
590 - "configure" option --with-l26 has been renamed --with-linux, and
591 --with-l26-source has been renamed --with-linux-source. The old
592 names will be removed after the next release, so please update
594 - The "-2.6" suffix has been dropped from the datapath/linux-2.6 and
595 datapath/linux-2.6/compat-2.6 directories.
597 - Dropped support for "tun_id_from_cookie" OpenFlow extension.
598 Please use the extensible match extensions instead.
599 - Removed the Maintenance_Point and Monitor tables in an effort
600 to simplify 802.1ag configuration.
601 - Performance and scalability improvements
605 ------------------------
606 - Ability to define policies over IPv6
609 - Support for extensible match extensions to OpenFlow
611 - Support for HFSC qdisc.
612 - Queue used by in-band control can now be configured.
614 - Kernel<->userspace interface has been reworked and should be
615 close to a stable ABI now.
616 - "Port group" concept has been dropped.
617 - GRE over IPSEC tunnels
619 - New active backup bonding mode.
620 - New L4 hashing support when LACP is enabled.
621 - Source MAC hash now includes VLAN field also.
623 - Greatly improved handling of large flow tables
625 - "show" command now prints full vport configuration.
626 - "dump-groups" command removed since kernel support for
627 port groups was dropped.
629 - New commands for working with the new Managers table.
630 - "list" command enhanced with new formatting options and --columns
632 - "get" command now accepts new --id option.
633 - New "find" command.
635 - New "queue-stats" command for printing queue stats.
636 - New commands "replace-flows" and "diff-flows".
637 - Commands to add and remove flows can now read from files.
638 - New --flow-format option to enable or disable NXM.
639 - New --more option to increase OpenFlow message verbosity.
640 - Removed "tun-cookie" command, which is no longer useful.
641 - ovs-controller enhancements for testing various features.
642 - New ovs-vlan-test command for testing for Linux kernel driver VLAN
643 bugs. New ovs-vlan-bug-workaround command for enabling and
644 disabling a workaround for these driver bugs.
646 - "Resubmit" actions now update flow statistics.
647 - New "register" extension for use in matching and actions, via NXM.
648 - New "multipath" experimental action extension.
649 - New support for matching multicast Ethernet frames, via NXM.
650 - New extension for OpenFlow vendor error codes.
651 - New extension to set the QoS output queue without actually
652 sending to an output port.
653 - Open vSwitch now reports a single flow table, instead of
654 separate hash and wildcard tables. This better models the
655 current implementation.
656 - New experimental "note" action.
657 - New "ofproto/trace" ovs-appctl command and associated utilities
658 to ease debugging complex flow tables.
660 - Schema documentation now includes an entity-relationship diagram.
661 - The database is now garbage collected. In most tables,
662 unreferenced rows will be deleted automatically.
663 - Many tables now include statistics updated periodically by
664 ovs-vswitchd or ovsdb-server.
665 - Every table now has an "external-ids" column for use by OVS
667 - There is no default controller anymore. Each bridge must have its
668 controller individually specified.
669 - The "fail-mode" is now a property of a Bridge instead of a Controller.
670 - New versioning and checksum features.
671 - New Managers table and manager_options column in Open_vSwitch table
672 for specifying managers. The old "managers" column in the
673 Open_vSwitch table has been removed.
674 - Many "name" columns are now immutable.
676 - Dropped support for XenServer pre-5.6.100.
677 - Dropped support for Linux pre-2.6.18.
678 - Dropped controller discovery support.
679 - Dropped "ovs-ofctl status" and the OpenFlow extension that it used.
680 Statistics reporting in the database is a rough equivalent.
681 - Dropped the "corekeeper" package (now separate, at
682 http://openvswitch.org/cgi-bin/gitweb.cgi?p=corekeeper).
683 - Performance and scalability improvements
686 v1.1.0pre2 - 13 Sep 2010
687 ------------------------
690 v1.1.0pre1 - 31 Aug 2010
691 ------------------------
692 - OpenFlow 1.0 slicing (QoS) functionality
693 - Python bindings for configuration database (no write support)
694 - Performance and scalability improvements
699 - New "patch" interface type
704 - Configuration database with remote management
707 - Support for XenServer 5.5 and 5.6
708 - Performance and scalability improvements
711 v0.99.2 - 18 Feb 2010
712 ---------------------
715 v0.99.1 - 25 Jan 2010
716 ---------------------
717 - Add support for sFlow(R)
718 - Make headers compatible with C++
721 v0.99.0 - 14 Jan 2010
722 ---------------------
723 - User-space forwarding engine
726 v0.90.7 - 29 Nov 2009
727 ---------------------
728 - Add support for NetFlow active timeouts
735 v0.90.5 - 21 Sep 2009
736 ---------------------
737 - Generalize in-band control to more diverse network setups