Skip to content

loggregator_trafficcontroller job from loggregator/107.0.1

Github source: 040cbd2b or master branch

Properties

cc

internal_service_hostname

Internal hostname used to resolve the address of the Cloud Controller

mutual_tls

ca_cert

PEM-encoded CA certificate for secure, mutually authenticated TLS communication

tls_port

Port for internal TLS communication

Default
9023

doppler

grpc_port

Port for outgoing log messages via GRPC

Default
8082

logging

format

timestamp

Format for timestamp in component logs. Valid values are ‘deprecated’ and ‘rfc3339’.

Default
deprecated

loggregator

doppler

addrs

The addresses of Dopplers (alternative to doppler link)

outgoing_cert

TLS cert for outgoing dropsonde connection

outgoing_dropsonde_port

Port for outgoing dropsonde messages

Default
8081

outgoing_key

TLS key for outgoing dropsonde connection

tls

ca_cert

CA root required for key/cert verification

cc_trafficcontroller
cert

TLS certificate for communication between Cloud Controller and trafficcontroller

key

TLS key for communication between Cloud Controller and trafficcontroller

trafficcontroller
cert

TLS certificate for trafficcontroller

key

TLS key for trafficcontroller

uaa

client

Doppler’s client id to connect to UAA

Default
doppler
client_secret

Doppler’s client secret to connect to UAA

uaa_client_id

DEPRECATED in favor of loggregator.uaa.client.

Default
""

metric_emitter

interval

The interval that metrics are emitted to the metron.

Default
1m

metron_endpoint

dropsonde_port

The port used to emit dropsonde messages to the Metron agent

Default
3457

grpc_port

The port used to emit grpc messages to the Metron agent

Default
3458

host

The host used to emit messages to the Metron agent

Default
127.0.0.1

ssl

skip_cert_verify

when connecting over https, ignore bad ssl certificates

Default
false

system_domain

Domain reserved for CF operator, base URL where the login, uaa, and other non-user apps listen

traffic_controller

disable_access_control

Traffic controller bypasses authentication with the UAA and CC

Default
false

enabled

Enable v1 Firehose

Default
true

pprof_port

The pprof port for runtime profiling data

Default
0

security_event_logging

enabled

Enable logging of all requests made to the Traffic Controller in CEF format

Default
false

uaa

ca_cert

PEM encoded CA certificate for secure communication to UAA. Required if uaa.internal_url is provided.

Default
""

internal_url

Internal URL of UAA

Default
""
Example
https://uaa.service.cf.internal:8443

Templates

Templates are rendered and placed onto corresponding instances during the deployment process. This job's templates will be placed into /var/vcap/jobs/loggregator_trafficcontroller/ directory (learn more).

  • bin/dns_health_check (from dns_health_check.erb)
  • bin/drain (from drain.erb)
  • bin/profile.sh (from profile.sh.erb)
  • config/bpm.yml (from bpm.yml.erb)
  • config/certs/cc_trafficcontroller.crt (from cc_trafficcontroller.crt.erb)
  • config/certs/cc_trafficcontroller.key (from cc_trafficcontroller.key.erb)
  • config/certs/loggregator_ca.crt (from loggregator_ca.crt.erb)
  • config/certs/mutual_tls_ca.crt (from mutual_tls_ca.crt.erb)
  • config/certs/trafficcontroller.crt (from trafficcontroller.crt.erb)
  • config/certs/trafficcontroller.key (from trafficcontroller.key.erb)
  • config/certs/trafficcontroller_outgoing.crt (from trafficcontroller_outgoing.crt.erb)
  • config/certs/trafficcontroller_outgoing.key (from trafficcontroller_outgoing.key.erb)
  • config/certs/uaa_ca.crt (from uaa_ca.crt.erb)

Packages

Packages are compiled and placed onto corresponding instances during the deployment process. Packages will be placed into /var/vcap/packages/ directory.