forked from cloudfoundry/docs-cf-admin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
supporting-websockets.html.md.erb
62 lines (39 loc) · 5.31 KB
/
supporting-websockets.html.md.erb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
---
title: Supporting WebSockets
owner: CF for VMs Networking
---
This topic explains how <%= vars.app_runtime_first %> uses WebSockets, why developers use WebSockets in their apps, and how operators can configure their load balancer to support WebSockets.
Operators who use a load balancer to distribute incoming traffic across <%= vars.app_runtime_abbr %> router instances must configure their load balancer for WebSockets. Otherwise, the Loggregator system cannot stream app logs to developers, or app event data and component metrics to third-party aggregation services. Additionally, developers cannot use WebSockets in their apps.
## <a id='overview'></a> Overview
The WebSocket protocol provides full-duplex communication over a single TCP connection. Apps can use WebSockets to perform real-time data exchange between a client and a server more efficiently than HTTP.
<%= vars.app_runtime_abbr %> uses WebSockets for the following metrics and logging purposes:
1. To stream all app event data and component metrics from the Doppler server instances to the Traffic Controller.
1. To stream app logs from the Traffic Controller to developers using the Cloud Foundry Command Line Interface (cf CLI) <%= vars.or_apps_man2 %>.
1. To stream all app event data and component metrics from the Traffic Controller over the Firehose endpoint to external apps or services.
For more information about these Loggregator components, see [Loggregator Architecture](../loggregator/architecture.html).
## <a id='config'></a> Configure Your Load Balancer for WebSockets
To form a WebSocket connection, the client sends an HTTP request that contains an `Upgrade` header and other headers required to complete the WebSocket handshake. You must configure your load balancer to not upgrade the HTTP request, but rather to pass the `Upgrade` header through to the <%= vars.app_runtime_abbr %> router. The procedures required to configure your load balancer depends on your IaaS and load balancer. The following list includes several possible approaches:
* Some load balancers can recognize the `Upgrade` header and pass these requests through to the <%= vars.app_runtime_abbr %> router without returning the WebSocket handshake response. This may or may not be default behavior, and may require additional configuration.
* Some load balancers do not support passing WebSocket handshake requests containing the `Upgrade` header to the <%= vars.app_runtime_abbr %> router. For instance, the Amazon Web Services (AWS) Elastic Load Balancer (ELB) does not support this behavior. In this scenario, you must configure your load balancer to forward TCP traffic to your <%= vars.app_runtime_abbr %> router to support WebSockets. If your load balancer does not support TCP pass-through of WebSocket requests on the same port as other HTTP requests, you can do one of the following:
* Configure your load balancer to listen on a non-standard port (the built-in <%= vars.app_runtime_abbr %> load balancer listens on 8443 by default for this purpose), and forward requests for this port in TCP mode. App clients must make WebSockets upgrade requests to this port. If you choose this strategy, you must follow the steps in [Set Your Loggregator Port](#modify).
* If a non-standard port is not acceptable, add a load balancer that will handle WebSocket traffic (or another IP on an existing load balancer) and configure it to listen on standard ports 80 and 443 in TCP mode. Configure DNS with a new hostname, such as `ws.cf.example.com`, to be used for WebSockets. This hostname should resolve to the new load balancer interface.
<p class="note"><strong>Note:</strong> Regardless of your IaaS and configuration, you must configure your load balancer to send the X-Forwarded-For and X-Forwarded-Proto headers for non-WebSocket HTTP requests on ports 80 and 443. For more information, see <a href='../adminguide/securing-traffic.html'>Securing Traffic into <%= vars.app_runtime_abbr %></a>.</p>
<p class="note"><strong>Note:</strong> Gorouter rejects WebSockets requests for routes that are bound to route services.
These requests return a 503 error and a <code>X-Cf-Routererror
route_service_unsupported</code> header.</p>
<p class="note"><strong>Note:</strong> Gorouter does not support WebSockets over HTTP/2.
For more information, see <a href='https://datatracker.ietf.org/doc/html/rfc8441'>RFC 8441</a>.
Configure your load balancer to always send WebSocket requests to Gorouter over HTTP/1.1.
For more information, see <a href='./supporting-http2.html#load-balancer'>Configuring HTTP/2 Support</a>.</p>
## <a id='modify'></a> Set Your Loggregator Port
<% if vars.platform_code == 'CF' %>
By default, the <%= vars.app_runtime_abbr %> release manifest assigns port 4443 for TCP/WebSocket communications. If you have configured your load balancer to use a port other than 4443 for TCP/WebSocket traffic, you must edit your <%= vars.app_runtime_abbr %> manifest to set the value of `properties.logger_endpoint.port` to the correct port. Locate the following section of your <%= vars.app_runtime_abbr %> manifest and replace `YOUR-WEBSOCKET-PORT` with the appropriate value:
```
properties:
logger_endpoint:
port: YOUR-WEBSOCKET-PORT
```
<% else %>
<%= vars.supporting_websockets %>
<img alt="Find Loggregator Port field underneath the HAProxy Trusted CIDRs" src="<%= vars.om_link %>/common/images/loggregator-port.png">
<% end %>