|
13 | 13 | networks:
|
14 | 14 | - name: default
|
15 | 15 | jobs:
|
| 16 | + - name: bosh-dns-adapter |
| 17 | + properties: |
| 18 | + internal_domains: ["apps.internal."] |
| 19 | + dnshttps: |
| 20 | + client: |
| 21 | + tls: ((cf_app_sd_client_tls)) |
| 22 | + server: |
| 23 | + ca: ((cf_app_sd_client_tls.ca)) |
| 24 | + release: cf-networking |
16 | 25 | - name: cflinuxfs4-rootfs-setup
|
17 | 26 | release: cflinuxfs4
|
18 | 27 | properties:
|
|
29 | 38 | garden:
|
30 | 39 | containerd_mode: true
|
31 | 40 | cleanup_process_dirs_on_wait: true
|
| 41 | + debug_listen_address: 127.0.0.1:17019 |
32 | 42 | default_container_grace_time: 0
|
33 | 43 | destroy_containers_on_start: true
|
34 |
| - graph_cleanup_threshold_in_mb: 0 |
35 | 44 | deny_networks:
|
36 | 45 | - 0.0.0.0/0
|
| 46 | + network_plugin: /var/vcap/packages/runc-cni/bin/garden-external-networker |
| 47 | + network_plugin_extra_args: |
| 48 | + - --configFile=/var/vcap/jobs/garden-cni/config/adapter.json |
37 | 49 | logging:
|
38 | 50 | format:
|
39 | 51 | timestamp: "rfc3339"
|
|
51 | 63 | - cflinuxfs4:/var/vcap/packages/cflinuxfs4/rootfs.tar
|
52 | 64 | placement_tags:
|
53 | 65 | - persistent_isolation_segment
|
| 66 | + trusted_ca_certificates: |
| 67 | + - ((diego_instance_identity_ca.ca)) |
| 68 | + - ((credhub_tls.ca)) |
| 69 | + - ((uaa_ssl.ca)) |
54 | 70 | containers:
|
55 | 71 | proxy:
|
56 | 72 | enabled: true
|
|
79 | 95 | logging:
|
80 | 96 | format:
|
81 | 97 | timestamp: "rfc3339"
|
| 98 | + - name: cfdot |
| 99 | + release: diego |
| 100 | + properties: |
| 101 | + tls: &cfdot_tls_client_properties |
| 102 | + ca_certificate: "((diego_rep_client.ca))" |
| 103 | + certificate: "((diego_rep_client.certificate))" |
| 104 | + private_key: "((diego_rep_client.private_key))" |
82 | 105 | - name: route_emitter
|
83 | 106 | release: diego
|
84 | 107 | properties:
|
|
111 | 134 | uaa:
|
112 | 135 | ca_cert: "((uaa_ssl.ca))"
|
113 | 136 | client_secret: "((uaa_clients_tcp_emitter_secret))"
|
| 137 | + - name: garden-cni |
| 138 | + release: cf-networking |
| 139 | + properties: |
| 140 | + cni_plugin_dir: /var/vcap/packages/silk-cni/bin |
| 141 | + cni_config_dir: /var/vcap/jobs/silk-cni/config/cni |
| 142 | + - name: netmon |
| 143 | + release: silk |
| 144 | + - name: vxlan-policy-agent |
| 145 | + release: silk |
| 146 | + properties: |
| 147 | + ca_cert: ((network_policy_client.ca)) |
| 148 | + client_cert: ((network_policy_client.certificate)) |
| 149 | + client_key: ((network_policy_client.private_key)) |
| 150 | + provides: |
| 151 | + vpa: nil |
| 152 | + loggregator: |
| 153 | + use_v2_api: true |
| 154 | + ca_cert: "((loggregator_tls_agent.ca))" |
| 155 | + cert: "((loggregator_tls_agent.certificate))" |
| 156 | + key: "((loggregator_tls_agent.private_key))" |
| 157 | + - name: silk-daemon |
| 158 | + release: silk |
| 159 | + properties: |
| 160 | + ca_cert: ((silk_daemon.ca)) |
| 161 | + client_cert: ((silk_daemon.certificate)) |
| 162 | + client_key: ((silk_daemon.private_key)) |
| 163 | + - name: silk-cni |
| 164 | + release: silk |
| 165 | + properties: |
| 166 | + dns_servers: |
| 167 | + - 169.254.0.2 |
| 168 | + provides: |
| 169 | + cni_config: |
| 170 | + nil |
| 171 | + - name: silk-datastore-syncer |
| 172 | + release: silk |
| 173 | + - name: loggr-udp-forwarder |
| 174 | + release: loggregator-agent |
| 175 | + properties: &loggr-udp-forwarder-properties |
| 176 | + loggregator: |
| 177 | + tls: |
| 178 | + ca: "((loggregator_tls_agent.ca))" |
| 179 | + cert: "((loggregator_tls_agent.certificate))" |
| 180 | + key: "((loggregator_tls_agent.private_key))" |
| 181 | + metrics: |
| 182 | + ca_cert: "((loggr_udp_forwarder_tls.ca))" |
| 183 | + cert: "((loggr_udp_forwarder_tls.certificate))" |
| 184 | + key: "((loggr_udp_forwarder_tls.private_key))" |
| 185 | + server_name: loggr_udp_forwarder_metrics |
0 commit comments