loggregator_trafficcontroller job from cf/264
Github source:
8274c52f
or
master branch
Properties¶
cc
¶
srv_api_uri
¶API URI of cloud controller
doppler
¶
grpc_port
¶Port for outgoing log messages via GRPC
- Default
8082
outgoing_port
¶Port for outgoing doppler messages
- Default
8081
loggregator
¶
etcd
¶
ca_cert
¶PEM-encoded CA certificate
- Default
""
machines
¶IPs pointing to the ETCD cluster
maxconcurrentrequests
¶Number of concurrent requests to ETCD
- Default
10
require_ssl
¶Enable ssl for all communication with etcd
- Default
false
outgoing_dropsonde_port
¶Port for outgoing dropsonde messages
- Default
8081
tls
¶
ca_cert
¶CA root required for key/cert verification
trafficcontroller
¶
cert
¶TLS certificate for trafficcontroller
key
¶TLS key for trafficcontroller
uaa
¶
client
¶Doppler’s client id to connect to UAA
- Default
doppler
client_secret
¶Doppler’s client secret to connect to UAA
uaa_client_id
¶DEPRECATED in favor of loggregator.uaa.client.
- Default
""
login
¶
protocol
¶Protocol to use to connect to UAA (used in case uaa.url is not set)
- Default
https
metric_emitter
¶
interval
¶The interval that metrics are emitted to the metron.
- Default
1m
metron_endpoint
¶
dropsonde_port
¶The port used to emit dropsonde messages to the Metron agent
- Default
3457
grpc_port
¶The port used to emit grpc messages to the Metron agent
- Default
3458
host
¶The host used to emit messages to the Metron agent
- Default
127.0.0.1
router
¶
cipher_suites
¶An ordered list of golang supported standard SSL cipher suites containing golang tls constants (https://github.com/golang/go/blob/release-branch.go1.7/src/crypto/tls/cipher_suites.go#L269-L285) separated by colons. The cipher suite will be chosen according to this order during SSL handshake
- Default
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ssl
¶
skip_cert_verify
¶when connecting over https, ignore bad ssl certificates
- Default
false
system_domain
¶
Domain reserved for CF operator, base URL where the login, uaa, and other non-user apps listen
traffic_controller
¶
disable_access_control
¶Traffic controller bypasses authentication with the UAA and CC
- Default
false
etcd
¶
client_cert
¶PEM-encoded client certificate
- Default
""
client_key
¶PEM-encoded client key
- Default
""
locked_memory_limit
¶Size (KB) of shell’s locked memory limit. Set to ‘kernel’ to use the kernel’s default. Non-numeric values other than ‘kernel’, ‘soft’, ‘hard’, and ‘unlimited’ will result in an error.
- Default
unlimited
pprof_port
¶The pprof port for runtime profiling data
- Default
0
security_event_logging
¶
enabled
¶Enable logging of all requests made to the Traffic Controller in CEF format
- Default
false
uaa
¶
url
¶URL of UAA
Templates¶
Templates are rendered and placed onto corresponding
instances during the deployment process. This job's templates
will be placed into /var/vcap/jobs/loggregator_trafficcontroller/
directory
(learn more).
bin/dns_health_check
(fromdns_health_check.erb
)bin/loggregator_trafficcontroller_ctl
(fromloggregator_trafficcontroller_ctl.erb
)config/certs/etcd-ca.crt
(frometcd-ca.crt.erb
)config/certs/etcd-client.crt
(frometcd-client.crt.erb
)config/certs/etcd-client.key
(frometcd-client.key.erb
)config/certs/loggregator_ca.crt
(fromloggregator_ca.crt.erb
)config/certs/trafficcontroller.crt
(fromtrafficcontroller.crt.erb
)config/certs/trafficcontroller.key
(fromtrafficcontroller.key.erb
)config/loggregator_trafficcontroller.json
(fromloggregator_trafficcontroller.json.erb
)
Packages¶
Packages are compiled and placed onto corresponding
instances during the deployment process. Packages will be
placed into /var/vcap/packages/
directory.