With Chrome 80, the default behavior changed for which conditions cookies are sent to the servers:
In TAS for VMs, the cookie __VCAP_ID__ will be set for sticky sessions, when an app adds the JSESSIONID cookie [2]. Currently, the value of SameSite for the __VCAP_ID__ cookie is not directly configurable. What you will see is that the __VCAP_ID__ cookie inherits the value of Secure from the JSESSIONID and that SameSite is empty.
Before Chrome version 80, because SameSite for the __VCAP_ID__ cookie is set to None by default, the __VCAP_ID__ cookie will be sent by Chrome in a third-party context, to any hosts which don't match the cookie's domain.
Starting with Chrome version 80, because of SameSite default change from None to Lax and it's not configurable for __VCAP_ID__ cookie, Chrome will send the cookie only to hosts which match the cookie's domain, as first-party cookies.
VMware is in the process of upgrading TAS for VMs to handle this change, but this will take time and will not happen before the release of Chrome 80.
We suggest reviewing any apps that depend on the sticky session support in TAS for VMs and confirm if the __VCAP_ID__ cookie is currently being used as third-party cookie. This won't work with Chrome 80 as it did for Chrome versions before Chrome 80.
[1] https://www.chromestatus.com/feature/5088147346030592
[2] https://docs.cloudfoundry.org/concepts/http-routing.html#sessions
With Chrome 80, the default behaviour is changed under which conditions cookies are sent to the servers:
In Cloud Foundry, the cookie __VCAP_ID__ will be set for sticky sessions, when an app adds the JSESSIONID cookie[2]. Currently, the value of SameSite for the __VCAP_ID__ cookie is not directly configurable. What you will see is that the __VCAP_ID__ cookie inherits the value of Secure from the JSESSIONID and that SameSite is empty.
Before Chrome version 80, because SameSite for __VCAP_ID__ cookie is set to None by default, the __VCAP_ID__ cookie will be sent by Chrome in a third-party context, to any hosts which don't match the cookie's domain.
Starting with Chrome version 80, because of SameSite default change from None to Lax and it's not configurable for __VCAP_ID__ cookie, Chrome will send the cookie only to hosts which match the cookie's domain, as first-party cookies.
Pivotal is in the process of upgrading Cloud Foundry to handle this change, but this will take time and will not happen before the release of Chrome 80. Pivotal suggests reviewing your apps which depend on the sticky session support in Cloud Foundry and confirm if the __VCAP_ID__ cookie is currently being used as third-party cookie. This won't work with Chrome 80 as it did with before Chrome 80.
[1] https://www.chromestatus.com/feature/5088147346030592
[2] https://docs.cloudfoundry.org/concepts/http-routing.html#sessions