tcp_router job from routing/0.296.0
Github source:
41c42017 or
master branch
Properties¶
dns_health_check_host¶
Host to ping for confirmation of DNS resolution
- Default
uaa.service.cf.internal
metron¶
port¶The port used to emit dropsonde messages to the Metron agent.
- Default
3457
reserved_system_component_ports¶
This should come via a bosh link from the routing_api job. This property is here in case it needs to be overwritten.
routing_api¶
auth_disabled¶Disables UAA authentication
- Default
false
ca_cert¶Routing API Certificate Authority
client_cert¶Routing API Client Certificate
client_private_key¶Routing API Client Private Key
port¶Port of routing api
uri¶URL where the routing API can be reached internally
- Default
https://routing-api.service.cf.internal
skip_ssl_validation¶
Skip TLS verification when talking to UAA
- Default
false
tcp_router¶
debug_address¶Address at which to serve debug info
- Default
127.0.0.1:17002
enable_nontls_health_checks¶Toggles on/off whether or not to listen for load balancer health check requests on the non-tls
tcp_router.health_check_portport
- Default
true
fail_on_router_port_conflicts¶Fail the tcp router if routing_api.reserved_system_component_ports conflict with ports in existing router groups.
- Default
"false"
health_check_port¶Load balancer in front of TCP Routers should be configured to check the health of TCP Router instances by establishing a TCP connection on this port
- Default
80
isolation_segments¶Routes with these isolation segments will be registered. Used in combination with routing_table_sharding_mode.
- Default
[]
log_level¶Log level
- Default
info
oauth_secret¶OAuth client secret used to obtain token for Routing API from UAA.
request_timeout_in_seconds¶Server and client timeouts in seconds
- Default
300
tcp_stats_collection_interval¶String representing interval for collecting statistic metrics from tcp proxy. Units: ms, s, m h
- Default
1m
tls_health_check_cert¶TLS certificate to use on the TCP Router’s TLS health check port
tls_health_check_key¶TLS private key to use on the TCP Router’s TLS health check port
tls_health_check_port¶Load balancer in front of TCP Routers should be configured to check the health of TCP Router instances by establishing a TLS connection on this port
- Default
443
uaa¶
ca_cert¶Certificate authority for communication between clients and uaa.
- Default
""
tls_port¶Port on which UAA is listening for TLS connections. This is required for obtaining an OAuth token for Routing API.
token_endpoint¶UAA token endpoint host name. Do not include a scheme in this value; TCP Router will always use TLS to connect to UAA.
- Default
uaa.service.cf.internal
Templates¶
Templates are rendered and placed onto corresponding
instances during the deployment process. This job's templates
will be placed into /var/vcap/jobs/tcp_router/ directory
(learn more).
bin/bpm-pre-start(frombpm-pre-start.erb)bin/haproxy_reloader(fromhaproxy_reloader)bin/tcp_router_ctl(fromtcp_router_ctl.erb)config/bpm.yml(frombpm.yml.erb)config/certs/health.pem(fromtcp_router_health_check_certificate.pem.erb)config/certs/routing-api/ca_cert.crt(fromrouting_api_ca_certificate.crt.erb)config/certs/routing-api/client.crt(fromrouting_api_client_certificate.crt.erb)config/certs/uaa/ca.crt(fromuaa_ca.crt.erb)config/haproxy.conf(fromhaproxy.conf.erb)config/haproxy.conf.template(fromhaproxy.conf.template.erb)config/keys/routing-api/client.key(fromrouting_api_client_private.key.erb)config/tcp_router.yml(fromtcp_router.yml.erb)
Packages¶
Packages are compiled and placed onto corresponding
instances during the deployment process. Packages will be
placed into /var/vcap/packages/ directory.