The tables here show Loggregator internal network communication paths with other VMware Tanzu Application Service for VMs (TAS for VMs) components.
For more information about Loggregator components and architecture, see Loggregator components and architecture.
The following table lists network communication paths for Loggregator:
Source VM | Destination VM | Port | Transport Layer Protocol | App Layer Protocol | Security and Authentication |
---|---|---|---|---|---|
Any* | loggregator_trafficcontroller | 8081 | TCP | HTTP/WebSocket | OAuth |
Any VM running Loggregator Agent | doppler | 8082 | TCP | gRPC over HTTP/2 | Mutual TLS |
loggregator_trafficcontroller | doppler | 8082 | TCP | gRPC over HTTP/2 | Mutual TLS |
loggregator_trafficcontroller | uaa | 8443 | TCP | HTTPS | TLS |
loggregator_trafficcontroller | cloud_controller | 9023 | TCP | HTTPS | Mutual TLS |
loggregator_trafficcontroller (Reverse Log Proxy) | doppler | 8082 | TCP | gRPC over HTTP/2 | Mutual TLS |
loggregator_trafficcontroller (Route Registrar) | nats | 4222 | TCP | NATS | Basic authentication |
loggregator_trafficcontroller (Metrics Forwarder) | BOSH Director (Metrics Server) | 25555 and 8443 | TCP | gRPC over HTTP/2 | Mutual TLS |
loggregator_trafficcontroller | log_cache | 8080 | TCP | gRPC over HTTP/2 | Mutual TLS |
loggregator_trafficcontroller (Reverse Log Proxy Gateway) | cloud_controller | 9023 | TCP | HTTPS | Mutual TLS |
Any* | loggregator_trafficcontroller (Reverse Log Proxy Gateway) | 8088 | TCP | HTTP/Server Sent Events | OAuth |
*Any source VM can send requests to the specified destination within its subnet.
**Any host configured through a user-provided service binding with a syslog URL.
***Any port configured through a user-provided service binding with syslog URL.
****Basic authentication only supported for HTTPS syslog drains.
The following table lists network communication paths for Log Cache:
Source VM | Destination VM | Port | Transport Layer Protocol | App Layer Protocol | Security and Authentication |
---|---|---|---|---|---|
Any VM running Loggregator Syslog Agent* | log_cache | 6067 | TCP | Syslog | TLS or Mutual TLS (configurable) |
Any** | log_cache | 8080 | TCP | gRPC over HTTP/2 | Mutual TLS |
log_cache (Nozzle)*** | loggregator_trafficcontroller (Reverse Log Proxy) | 8082 | TCP | gRPC over HTTP/2 | Mutual TLS |
gorouter | log_cache (Auth Proxy) | 8083 | TCP | HTTP | OAuth |
log_cache (Auth Proxy) | uaa | 8443 | TCP | HTTPS | TLS |
log_cache (Auth Proxy) | cloud_controller | 9024 | TCP | HTTPS | TLS |
*When Log Cache is configured to use Syslog ingestion.
**Any source VM can send requests to the specified destination within its subnet.
***When Log Cache is configured to use Reverse Log Proxy ingestion.
The OpenTelemetry Collector (OTel Collector) sends requests to destinations specified by the operator. Destination hostname, port, protocol, and security settings are configured in the exporters
section of configuration code entered in the TAS for VMs tile > System Logging pane > OpenTelemetry Collector Configuration field.
Note that while exporters generally make egress requests to drain destinations, the prometheus exporter in particular will expose an endpoint for an external client to send scrape requests.
By default, TAS for VMs components and app containers look up services using the BOSH DNS service discovery mechanism. To support this lookup, BOSH Director co-locates a BOSH DNS server on every deployed VM. For more information, see BOSH DNS network communications.