Skip to main content
Version: Develop

Configuration and Features

This document describes configurations and features related to a9s Messaging.

Audit Logs

An extensive log of actions executed on an a9s Messaging instance can be valuable for your organization for various reasons, including:

  • Ensuring that your applications are functioning correctly.
  • Investigating incidents by reviewing a chronological record of events.
  • Validating that only known apps/users are accessing the a9s Messaging platform.

For these reasons we have an audit log feature for a9s Messaging that takes internal events from RabbitMQ (e.g. connection.created, queue.created, binding.created, ...) and delivers them as Syslog (rfc5424) over TCP to an endpoint of your choice (maybe an a9s LogMe2 instance).

Enable Globally

It can be achieved by using the following a9s Messaging custom parameters in the a9s SPI configuration or in the service plans configuration for the a9s Messaging.

Example when configuring the SPI:

(...)
rabbitmq-spi:
service_instance:
custom_param_config:
audit-log-endpoint:
default_value: syslog-tls://myd5963ba-fluentd.service.dc1.dsf2.a9ssvc:6514
modifiable: false
audit-log-ca-crt:
modifiable: false
default_value: |
-----BEGIN CERTIFICATE-----
(...) <ca-content-here>
-----END CERTIFICATE-----
(...)

Take a look at Custom Parameter Configuration documentation.

Legacy Port

In previous releases of a9s Messaging SSL and TCP listeners have been configured on the same port (5672). If you need to maintain this behavior we provide an OPS file ops/rabbitmq-legacy-port.yml.

Deploying with the OPS file

bosh deploy -d rabbitmq-service rabbitmq-service/rabbitmq-service.yml \
-o ops/rabbitmq-legacy-port.yml -l config/iaas-config.yml -l config/rabbitmq.yml

Management UI

The RabbitMQ Management UI can be enabled by using the Ops file ops/rabbitmq-enable-management-ui-as-route.yml which can be found in anynines-deployment. Since each a9s Messaging Service Instance provides its own RabbitMQ Management UI, we use the Route Registrar to dynamically register these routes. Therefore, you need a router that can dynamically update its routes based on a NATS message bus such as gorouter to use this feature.

When the Ops file is applied, a link is added to the a9s Service Dashboard so that the Application Developer can access it.

note

Due to the internal workings of the a9s Data Services the Ops file ops/rabbitmq-enable-management-ui-as-route.yml references another Ops file which is used by the a9s Template Uploader Errand. For more information see Template Uploader Errand: Template Ops Files.

TLS Configuration

As described in https://www.rabbitmq.com/ssl.html the operator can specify TLS/SSL configuration that changes a RabbitMQ server's behavior when it comes to SSL/TLS connections.

In particular the options rabbitmq.ssl.verify and rabbitmq.ssl.fail_if_no_peer_cert can be set. The settings' meaning is described in https://www.rabbitmq.com/ssl.html#peer-verification. E.g. set rabbitmq.ssl.verify to value verify_peer and rabbitmq.ssl.fail_if_no_peer_cert to value true in order for a RabbitMQ server to demand a TLS certificate from any client connecting. You can also enable it for existing instances with cf update-service [INSTANCE_NAME] -c '{"fail_if_no_peer_cert": true, "verify":"verify_peer"}'. In addition, this certificate must have been signed by a certificate authority that the RabbitMQ server trusts.