Skip to content

tcp_router job from routing/0.296.0

Github source: 41c42017 or master branch

Properties

dns_health_check_host

Host to ping for confirmation of DNS resolution

Default
uaa.service.cf.internal

metron

port

The port used to emit dropsonde messages to the Metron agent.

Default
3457

reserved_system_component_ports

This should come via a bosh link from the routing_api job. This property is here in case it needs to be overwritten.

routing_api

auth_disabled

Disables UAA authentication

Default
false

ca_cert

Routing API Certificate Authority

client_cert

Routing API Client Certificate

client_private_key

Routing API Client Private Key

port

Port of routing api

uri

URL where the routing API can be reached internally

Default
https://routing-api.service.cf.internal

skip_ssl_validation

Skip TLS verification when talking to UAA

Default
false

tcp_router

debug_address

Address at which to serve debug info

Default
127.0.0.1:17002

enable_nontls_health_checks

Toggles on/off whether or not to listen for load balancer health check requests on the non-tls tcp_router.health_check_port port

Default
true

fail_on_router_port_conflicts

Fail the tcp router if routing_api.reserved_system_component_ports conflict with ports in existing router groups.

Default
"false"

health_check_port

Load balancer in front of TCP Routers should be configured to check the health of TCP Router instances by establishing a TCP connection on this port

Default
80

isolation_segments

Routes with these isolation segments will be registered. Used in combination with routing_table_sharding_mode.

Default
[]

log_level

Log level

Default
info

oauth_secret

OAuth client secret used to obtain token for Routing API from UAA.

request_timeout_in_seconds

Server and client timeouts in seconds

Default
300

tcp_stats_collection_interval

String representing interval for collecting statistic metrics from tcp proxy. Units: ms, s, m h

Default
1m

tls_health_check_cert

TLS certificate to use on the TCP Router’s TLS health check port

tls_health_check_key

TLS private key to use on the TCP Router’s TLS health check port

tls_health_check_port

Load balancer in front of TCP Routers should be configured to check the health of TCP Router instances by establishing a TLS connection on this port

Default
443

uaa

ca_cert

Certificate authority for communication between clients and uaa.

Default
""

tls_port

Port on which UAA is listening for TLS connections. This is required for obtaining an OAuth token for Routing API.

token_endpoint

UAA token endpoint host name. Do not include a scheme in this value; TCP Router will always use TLS to connect to UAA.

Default
uaa.service.cf.internal

Templates

Templates are rendered and placed onto corresponding instances during the deployment process. This job's templates will be placed into /var/vcap/jobs/tcp_router/ directory (learn more).

  • bin/bpm-pre-start (from bpm-pre-start.erb)
  • bin/haproxy_reloader (from haproxy_reloader)
  • bin/tcp_router_ctl (from tcp_router_ctl.erb)
  • config/bpm.yml (from bpm.yml.erb)
  • config/certs/health.pem (from tcp_router_health_check_certificate.pem.erb)
  • config/certs/routing-api/ca_cert.crt (from routing_api_ca_certificate.crt.erb)
  • config/certs/routing-api/client.crt (from routing_api_client_certificate.crt.erb)
  • config/certs/uaa/ca.crt (from uaa_ca.crt.erb)
  • config/haproxy.conf (from haproxy.conf.erb)
  • config/haproxy.conf.template (from haproxy.conf.template.erb)
  • config/keys/routing-api/client.key (from routing_api_client_private.key.erb)
  • config/tcp_router.yml (from tcp_router.yml.erb)

Packages

Packages are compiled and placed onto corresponding instances during the deployment process. Packages will be placed into /var/vcap/packages/ directory.