ping bbs.service.cf.internal
times out (or any *.service.cf.internal
)
changing the listen address of the bosh-dns agent from 169.254.0.2
to 127.0.0.1
. note that requires disabling consul
#!/usr/bin/env bash | |
source /var/vcap/jobs/cfdot/bin/setup | |
desired_lrps=$(cfdot desired-lrps | jq -r '.process_guid + " " + (.instances | tostring)') | |
export IFS=$'\n' | |
for i in $desired_lrps; do | |
guid=$(echo $i | awk '{print $1}') | |
instances=$(echo $i | awk '{print $2}') | |
running=$(cfdot actual-lrp-groups-for-guid $guid | jq -r -c .instance.state | egrep 'RUNNING|CLAIMED' | wc -l) | |
if [ $running -ne $instances ]; then |
ps axo pid,ppid,comm,state,eip,esp,wchan | grep 'D\|Z' |
[2017-12-12 00:41:22.151][56][debug][upstream] source/server/lds_subscription.cc:43] lds: parsing response | |
[2017-12-12 00:41:22.152][56][debug][misc] source/common/protobuf/utility.cc:21] Proto validation error; throwing Proto constraint validation failed (ListenerValidationError.FilterChains[i]: ["embedded message failed validation"] | caused by FilterChainValidationError.TlsC\ | |
ontext: ["embedded message failed validation"] | caused by DownstreamTlsContextValidationError.CommonTlsContext: ["embedded message failed validation"] | caused by CommonTlsContextValidationError.ValidationContext: ["embedded message failed validation"] | caused by Certifi\ | |
cateValidationContextValidationError.TrustedCa: ["embedded message failed validation"] | caused by DataSourceValidationError.Filename: ["value length must be at least " '\x01' " bytes"]): name: "listener-8080" | |
address { | |
socket_address { | |
address: "0.0.0.0" | |
port_value: 61001 | |
} | |
} |
initializing | |
running ci/run-wats/run | |
+ '[' -f -nodes ']' | |
++ mktemp -t watsXXXXX | |
+ CONFIG_FILE=/tmp/watszWZbJ | |
+ trap 'rm -f /tmp/watszWZbJ' EXIT | |
+ : api.electron-cannon.cf-app.com | |
+ : admin | |
+ : n4yni664nxy80indky1s | |
+ : electron-cannon.cf-app.com |
admin: | |
access_log_path: /dev/null | |
address: | |
socket_address: | |
address: 127.0.0.1 | |
port_value: 9901 | |
static_resources: | |
clusters: | |
- name: 0-service-cluster |
TITLE: Feature request: Would like a way to refuse subsequent TCP connections while allowing current connections enough time to drain
This feature request was originally opened as envoyproxy/envoy#2920, but was too specific about the implementation. This issue updates the title and content to clarify the goals and be flexible about the implementation.
Given I've configured Envoy with LDS serving a TCP proxy listener on some port and there are connections in flight I would like a way to refuse subsequent TCP connections to that port while allowing current established connections to drain
table | column | data type | Encrypted | description |
---|---|---|---|---|
actual_lrps | process_guid | character varying(255) | No | DesiredLRP unique identifier (foreign key) |
instance_index | integer | No | ActualLRP index | |
evacuating | boolean | No | True if the LRP is on an evacuating cell, false otherwise |
==> /proc/39622/fd/1 <== | |
==> /proc/39622/fd/2 <== | |
==> /proc/39623/fd/1 <== | |
==> /proc/39623/fd/2 <== | |
Running Suite: Auction Suite | |
============================ | |
Random Seed: 1584736481 | |
Will run 14 specs | |
Running in parallel across 7 nodes | |
P [PENDING] | |
Auction | |
/home/ubuntu/workspace/diego-release/src/code.cloudfoundry.org/auction/simulation/simulation_test.go:22 |