Сравнение конфигурационных файлов
В разделе приведено сравнение параметров конфигурационных файлов модуля osmax-core
для текущей и предыдущей версий продукта, где:
-
строки с символом «-», выделенные желтым цветом — устаревшие названия параметров/комментариев, которые были частично изменены, полностью заменены или удалены в текущей версии продукта;
-
строки с символом «+», выделенные бледно-зеленым цветом — обновленные названия параметров/комментариев, актуальные для текущей версии продукта;
-
строки с символом «+», выделенные зеленым цветом — новые строки в файле, появившиеся в текущей версии продукта.
-
дополнительно:
-
розовым цветом подсвечены измененные/удаленные элементы;
-
ярко-зеленым цветом подсвечены новые элементы.
-
| Описание параметров см. в разделе «Конфигурация модуля osmax-core». |
Конфигурационный файл модуля osmax-core
application.properties.1.11.0 → application.properties.1.11.1
|
@@ -1,443 +1,451 @@
|
|
|
1
1
|
## This is an example of `application.properties` file as main configuration file for osmax-core backend
|
|
2
2
|
|
|
3
3
|
###############################################################################
|
|
4
4
|
# HTTP server properties section #
|
|
5
5
|
###############################################################################
|
|
6
6
|
|
|
7
7
|
## Main application port
|
|
8
8
|
quarkus.http.port=8081
|
|
9
9
|
|
|
10
10
|
## HTTP body limit, can be changed to big files uploading
|
|
11
11
|
quarkus.http.limits.max-body-size=10M
|
|
12
12
|
|
|
13
13
|
## SSL configuration section.
|
|
14
14
|
## To enable serving requests via HTTPS uncomment the following parameters:
|
|
15
15
|
#quarkus.http.insecure-requests=disabled
|
|
16
16
|
#quarkus.http.ssl-port=8081
|
|
17
17
|
#quarkus.http.ssl.certificate.key-store-file=/opt/osmax-core/keystore.jks
|
|
18
18
|
#quarkus.http.ssl.certificate.key-store-password=keystore@12345
|
|
19
19
|
|
|
20
20
|
###############################################################################
|
|
21
21
|
# Authentication & Authorization section #
|
|
22
22
|
###############################################################################
|
|
23
23
|
|
|
24
24
|
## Enable/disable authentication
|
|
25
25
|
osmax.application.auth.disabled=false
|
|
26
26
|
## Enables kerberos authentication debug mode
|
|
27
27
|
#quarkus.kerberos.debug=true
|
|
28
28
|
## There are 2 alternative options for the kerberos credentials [principal realm, name and password] defining:
|
|
29
29
|
## 1) via direct defining;
|
|
30
30
|
## 2) via keytab file path defining
|
|
31
31
|
##
|
|
32
32
|
## Direct kerberos credentials defining:
|
|
33
33
|
quarkus.kerberos.service-principal-name=lcm_backend_svc
|
|
34
34
|
quarkus.kerberos.service-principal-realm=my.domain.com
|
|
35
35
|
quarkus.kerberos.service-principal-password=Password123
|
|
36
36
|
## Path to keytab:
|
|
37
37
|
#quarkus.kerberos.keytab-path=/opt/osmax-core/my_file.keytab
|
|
38
38
|
|
|
39
39
|
## Old deprecated authorization based on LDAP-groups only
|
|
40
40
|
## List of LDAP groups whose users are authorized in Admin Console
|
|
41
41
|
#osmax.authorization.user-groups-white-list[0]=CN=testGroup,CN=Users,DC=inno,DC=test
|
|
42
42
|
|
|
43
43
|
# New RBAC
|
|
44
44
|
osmax.authorization.rbac.enabled=false
|
|
45
45
|
# The following users will be mapped to the superuser role when the application starts
|
|
46
46
|
#osmax.authorization.rbac.super-users[0]=alice@INNO.TEST
|
|
47
47
|
#osmax.authorization.rbac.super-users[1]=bob@INNO.TEST
|
|
48
48
|
|
|
49
49
|
###############################################################################
|
|
50
50
|
# Database properties section #
|
|
51
51
|
###############################################################################
|
|
52
52
|
|
|
53
53
|
## Main datasource
|
|
54
54
|
quarkus.datasource."lcm-db".username=lcm
|
|
55
55
|
quarkus.datasource."lcm-db".password=password
|
|
56
56
|
quarkus.datasource."lcm-db".reactive.url=postgresql://localhost:5432/lcm
|
|
57
57
|
## If you need to specify default DB schema use the syntax below
|
|
58
58
|
#quarkus.datasource."lcm-db".reactive.url=postgresql://localhost:5432/lcm?search_path=lcm_schema_name
|
|
59
59
|
|
|
60
60
|
## If you need to specify few datasource connections for load-balancing or work with clustered db use the syntax below
|
|
61
61
|
#quarkus.datasource."lcm-db".reactive.url=postgresql://host1:5432/lcm,postgresql://host2:5432/lcm,postgresql://host3:5432/lcm
|
|
62
62
|
## Or this can also be written with indexed property syntax
|
|
63
63
|
#quarkus.datasource."lcm-db".reactive.url[0]=postgresql://host1:5432/lcm
|
|
64
64
|
#quarkus.datasource."lcm-db".reactive.url[1]=postgresql://host2:5432/lcm
|
|
65
65
|
#quarkus.datasource."lcm-db".reactive.url[2]=postgresql://host3:5432/lcm
|
|
66
66
|
|
|
67
67
|
## Main datasource Liquibase config
|
|
68
68
|
quarkus.datasource."lcm-db".jdbc.url=jdbc:postgresql://localhost:5432/lcm
|
|
69
69
|
quarkus.liquibase."lcm-db".default-schema-name=lcm
|
|
70
70
|
quarkus.liquibase."lcm-db".migrate-at-start=True
|
|
71
71
|
|
|
72
72
|
## Readonly datasource
|
|
73
73
|
quarkus.datasource."lcm-db-readonly".username=readonly
|
|
74
74
|
quarkus.datasource."lcm-db-readonly".password=password
|
|
75
75
|
quarkus.datasource."lcm-db-readonly".reactive.url=postgresql://localhost:5432/lcm
|
|
76
76
|
quarkus.datasource."lcm-db-readonly".jdbc.url=jdbc:postgresql://localhost:5432/lcm
|
|
77
77
|
|
|
78
78
|
###############################################################################
|
|
79
79
|
# Hardware inventory properties section #
|
|
80
80
|
###############################################################################
|
|
81
81
|
|
|
82
82
|
# Remote operation orders
|
|
83
83
|
# Every 10 minutes
|
|
84
84
|
osmax.inventory.job.remote-operation-expired-orders.cron.expression=0 */10 * ? * *
|
|
85
85
|
|
|
86
86
|
# Schedule for checking dynamic machine collections refresh executing time (quartz cron format), every 2 min
|
|
87
87
|
osmax.inventory.job.dynamic-collections-refresh-executing-time.cron.expr=0 */2 * ? * *
|
|
88
88
|
# Splay value in seconds for one-time task of dynamic machine collections refresh
|
|
89
89
|
osmax.inventory.job.dynamic-collections-refresh.splay=10
|
|
90
90
|
|
|
91
91
|
# Schedule for starting entity cleanup tasks (quartz cron format)
|
|
92
92
|
# Every 2 minutes
|
|
93
93
|
osmax.inventory.job.cleanup-tasks-starter-scheduler.cron.expr=0 */2 * ? * *
|
|
94
94
|
|
|
95
95
|
# Determines the maximum amount of machine custom attributes in one section
|
|
96
96
|
osmax.inventory.machine-attribute.section.size=20
|
|
97
97
|
|
|
98
98
|
# Determines the maximum amount of user custom attributes in one section
|
|
99
99
|
osmax.inventory.user-attribute.section.size=20
|
|
100
100
|
|
|
101
101
|
# The number of minutes since the last agent activity before the device goes into "Offline" status
|
|
102
102
|
osmax.inventory.settings.agent.minutes-to-become-offline=5
|
|
103
103
|
# Absolute file path to `wtmp` file which stores historical data of user logins and logouts
|
|
104
104
|
osmax.machines.user-sessions.linux.wtmp-absolute-path=/var/log/wtmp
|
|
105
105
|
# Absolute file path to `utmp` file which stores user sessions in real time
|
|
106
106
|
osmax.machines.user-sessions.linux.utmp-absolute-path=/var/run/utmp
|
|
107
107
|
# Option, which determines the considered Salt mode (single- or multimaster), can be true or false
|
|
108
108
|
osmax.agent-installation.settings.multi-master-mode=true
|
|
109
109
|
# Absolute path, containing all files which are to be included into bootstrap script configuration archive (.tar.gz)
|
|
110
110
|
osmax.salt.scripts.bootstrap-script-config-path=/config/script-configs/bootstrap/
|
|
111
111
|
# Optional parameters, matching salt-ssh connection settings,
|
|
112
112
|
# see https://docs.saltproject.io/en/latest/ref/runners/all/salt.runners.manage.html#salt.runners.manage.bootstrap
|
|
113
113
|
#osmax.agent-installation.settings.bootstrap-ssh-user=
|
|
114
114
|
#osmax.agent-installation.settings.bootstrap-ssh-password=
|
|
115
115
|
#osmax.agent-installation.settings.bootstrap-ssh-private-key-path=
|
|
116
116
|
|
|
117
117
|
###############################################################################
|
|
118
118
|
# LDAP integration properties section #
|
|
119
119
|
###############################################################################
|
|
120
120
|
|
|
121
121
|
#enable JNDI for the LDAP server discovery inside the MS AD domain when you define option 'osmax.inventory.ldap.datasource[i].dns-srv-record'
|
|
122
122
|
quarkus.naming.enable-jndi=true
|
|
123
123
|
## Determines the page size for any ldap query
|
|
124
124
|
osmax.inventory.ldap.search-page-size=200
|
|
125
125
|
## The first LDAP datasource configuration
|
|
126
126
|
osmax.inventory.ldap.datasource[0].name=my.domain.com
|
|
127
127
|
osmax.inventory.ldap.datasource[0].base-dn=DC=my,DC=domain,DC=com
|
|
128
128
|
## There are 2 options to set LDAP hostname pools
|
|
129
129
|
## 1) direct addresses defining
|
|
130
130
|
## 2) using DNS SRV records to discover LDAP servers from MS AS domain
|
|
131
131
|
##
|
|
132
132
|
## For the direct addresses defining of LDAP datasource please use the following options:
|
|
133
133
|
## osmax.inventory.ldap.datasource[i].host=
|
|
134
134
|
## osmax.inventory.ldap.datasource[i].port=
|
|
135
135
|
##
|
|
136
136
|
## extra hosts section is optional
|
|
137
137
|
## osmax.inventory.ldap.datasource[i].extra-hosts[j].host=
|
|
138
138
|
## osmax.inventory.ldap.datasource[i].extra-hosts[j].port=
|
|
139
139
|
|
|
140
140
|
## For the using DNS SRV records to discover LDAP servers from MS AS domain use the following options:
|
|
141
141
|
### osmax.inventory.ldap.datasource[i].dns-srv-record=
|
|
142
142
|
##
|
|
143
143
|
## example below:
|
|
144
144
|
osmax.inventory.ldap.datasource[0].host=localhost
|
|
145
145
|
osmax.inventory.ldap.datasource[0].port=636
|
|
146
146
|
osmax.inventory.ldap.datasource[0].username=administrator@my.domain.com
|
|
147
147
|
osmax.inventory.ldap.datasource[0].password=Welkom123
|
|
148
148
|
## Optional section for the LDAP datasource
|
|
149
149
|
# osmax.inventory.ldap.datasource[0].connect-timeout-millis=10000
|
|
150
150
|
# osmax.inventory.ldap.datasource[0].response-timeout=10000
|
|
151
151
|
# osmax.inventory.ldap.datasource[0].abandon-on-timeout=true
|
|
152
152
|
# osmax.inventory.ldap.datasource[0].allow-concurrent-socket-factory-use=true
|
|
153
153
|
|
|
154
154
|
## The second and subsequent LDAP datasource configurations are optional
|
|
155
155
|
#osmax.inventory.ldap.datasource[1].name=my2.domain.com
|
|
156
156
|
#osmax.inventory.ldap.datasource[1].base-dn=DC=my2,DC=domain,DC=com
|
|
157
157
|
#osmax.inventory.ldap.datasource[1].dns-srv-record=_ldap._tcp.dc._msdcs.mydomain.com
|
|
158
158
|
#osmax.inventory.ldap.datasource[1]...
|
|
159
159
|
|
|
160
160
|
## LDAPS (LDAP over SSL) parameters section.
|
|
161
161
|
|
|
162
162
|
# To configure LDAPS please use the following option
|
|
163
163
|
#osmax.inventory.ldap.datasource[i].ssl=...
|
|
164
164
|
# There are 3 options available for this option:
|
|
165
165
|
# value `false` - use this mode when you want to use LDAP without SSL (usually 389 port)
|
|
166
166
|
# value `true` - use this mode when you want to use LDAPS (usually 636 port), requires path to the certificate file or truststore file
|
|
167
167
|
# value `start-tls` - use this mode when you want to establish an insecure connection (usually 389 port),
|
|
168
168
|
# but then to immediately use the StartTLS extended operation to convert that insecure connection to a secure one
|
|
169
169
|
|
|
170
170
|
# If you want to trust all SSL certificates without direct certificate/truststore definition you can use the option
|
|
171
171
|
# osmax.inventory.ldap.datasource[i].trust-all-ssl-certificates=true
|
|
172
172
|
|
|
173
173
|
## The following example shows how to configure LDAPS with certificate file definition for the datasource
|
|
174
174
|
#osmax.inventory.ldap.datasource[0].ssl=true
|
|
175
175
|
#osmax.inventory.ldap.datasource[0].ssl-certificate=/opt/osmax-core/samba_cert.pem
|
|
176
176
|
|
|
177
177
|
## The following example shows how to configure LDAPS with truststore file definition for the datasource
|
|
178
178
|
#osmax.inventory.ldap.datasource[0].ssl=true
|
|
179
179
|
#osmax.inventory.ldap.datasource[0].ssl-trust-store=/opt/osmax-core/keystore.jks
|
|
180
180
|
#osmax.inventory.ldap.datasource[0].ssl-trust-store-type=PKCS12
|
|
181
181
|
#osmax.inventory.ldap.datasource[0].ssl-trust-store-password=keystore@12345
|
|
182
182
|
|
|
183
183
|
## The following example shows how to configure LDAPS with truststore file definition for all datasource
|
|
184
184
|
#osmax.inventory.ldap.ssl-trust-store=/opt/osmax-core/keystore.jks
|
|
185
185
|
#osmax.inventory.ldap.ssl-trust-store-type=JKS
|
|
186
186
|
#osmax.inventory.ldap.ssl-trust-store-password=keystore@12345
|
|
187
187
|
|
|
188
188
|
|
|
189
189
|
###############################################################################
|
|
190
190
|
# Application Store properties section #
|
|
191
191
|
###############################################################################
|
|
192
192
|
|
|
193
193
|
# Determines the amount of hours after which order is considered failed
|
|
194
194
|
osmax.order-management.completion.time.hours=12
|
|
195
195
|
# Schedule for tracking long-running orders as failed (quartz cron format)
|
|
196
196
|
# [At second :00 of minute :00 of every hour]
|
|
197
197
|
osmax.order-management.autocomplete.cron.expr=0 0 * ? * * *
|
|
198
198
|
|
|
199
199
|
###############################################################################
|
|
200
200
|
# Kafka messages section #
|
|
201
201
|
###############################################################################
|
|
202
202
|
|
|
203
203
|
## Kafka bootstrap servers (comma separated)
|
|
204
204
|
mp.messaging.connector.smallrye-kafka.bootstrap.servers=localhost:9092
|
|
205
205
|
# Kafka topic name
|
|
206
206
|
mp.messaging.incoming.salt-events-kafka.topic=salt-topic
|
|
207
207
|
mp.messaging.outgoing.core-os-reinstallation-machines.topic=osmax-core.os.reinstallation.machines
|
|
208
208
|
mp.messaging.incoming.provisioner-os-reinstallation-machine-registration-statuses.topic=osmax-provisioner.os.reinstallation.machines.registration.statuses
|
|
209
209
|
mp.messaging.incoming.provisioner-os-installed-events-kafka.topic=provisioner-topic
|
|
210
210
|
mp.messaging.incoming.provisioner-os-installed-events-kafka.dead-letter-queue.topic=provisioner-dlq-topic
|
|
211
211
|
|
|
212
212
|
## The provisioner-os-installed-events-kafka listener support retry strategy,
|
|
213
213
|
## default values are maxRetries=3, delay=100ms and jitter=0, to change retry settings use
|
|
214
214
|
#tech.inno.lcm.provisioner.events.ProvisionerEventsListener/consume/Retry/maxRetries=0
|
|
215
215
|
## See more info https://quarkus.io/guides/smallrye-fault-tolerance#runtime-configuration
|
|
216
216
|
## and available options https://github.com/eclipse/microprofile-fault-tolerance/blob/main/api/src/main/java/org/eclipse/microprofile/faulttolerance/Retry.java
|
|
217
217
|
|
|
218
218
|
## Kafka SSL connection parameters section.
|
|
219
219
|
## To enable SSL connection mode uncomment three following parameters:
|
|
220
220
|
#mp.messaging.connector.smallrye-kafka.security.protocol=SSL
|
|
221
221
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.location=/etc/ssl/certs/java/cacerts
|
|
222
222
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.password=changeit
|
|
223
223
|
## Optionally if the custom truststore is used:
|
|
224
224
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
225
225
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.type=PKCS12
|
|
226
226
|
|
|
227
227
|
## To enable mutual TLS connection mode uncomment three following parameters, along with configuration above:
|
|
228
228
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.location=/opt/osmax-core/keystore.jks
|
|
229
229
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.password=keystore@12345
|
|
230
230
|
## Optionally if the custom keystore is used:
|
|
231
231
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
232
232
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.type=PKCS12
|
|
233
233
|
|
|
234
234
|
###############################################################################
|
|
235
235
|
# REST clients common configuration #
|
|
236
236
|
###############################################################################
|
|
237
237
|
|
|
238
238
|
## SSL connection parameters sections.
|
|
239
239
|
## To enable accessing REST endpoints via HTTPS uncomment two following parameters:
|
|
240
240
|
#quarkus.rest-client.trust-store=/etc/ssl/certs/java/cacerts
|
|
241
241
|
#quarkus.rest-client.trust-store-password=changeit
|
|
242
242
|
## Optionally if the custom truststore is used:
|
|
243
243
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
244
244
|
#quarkus.rest-client.trust-store-type=PKCS12
|
|
245
245
|
## For disabling SSL connection verification you can use option below
|
|
246
246
|
#quarkus.rest-client.remote-access.trust-all=true
|
|
247
247
|
|
|
248
248
|
###############################################################################
|
|
249
249
|
# SaltStack integration section #
|
|
250
250
|
###############################################################################
|
|
251
251
|
|
|
252
252
|
osmax.salt-adapter.command-runner.http-scheme=http
|
|
253
253
|
osmax.salt-adapter.command-runner.master-api-port=8000
|
|
254
254
|
osmax.salt-adapter.command-runner.global-auth.eauth=pam
|
|
255
255
|
osmax.salt-adapter.command-runner.global-auth.login=salt_api
|
|
256
256
|
osmax.salt-adapter.command-runner.global-auth.password=123
|
|
257
257
|
osmax.salt-adapter.command-runner.retry.number-of-attempts=5
|
|
258
258
|
osmax.salt-adapter.command-runner.retry.initial-back-off=1s
|
|
259
259
|
osmax.salt-adapter.command-runner.retry.max-back-off=1s
|
|
260
260
|
|
|
261
261
|
## Salt masters configuration section.
|
|
262
262
|
## Optional, this section should be used when backend server can't resolve salt master by DNS name
|
|
263
263
|
#osmax.salt-adapter.command-runner.override-masters[0].id=salt-master1
|
|
264
264
|
#osmax.salt-adapter.command-runner.override-masters[0].uri=http://192.168.0.1:8000
|
|
265
265
|
|
|
266
266
|
## The second and other Salt masters can be configured in the same way
|
|
267
267
|
#osmax.salt-adapter.command-runner.override-masters[1].id=salt-master2
|
|
268
268
|
#osmax.salt-adapter.command-runner.override-masters[1].uri=http://192.168.0.2:8000
|
|
269
269
|
|
|
270
270
|
###############################################################################
|
|
271
271
|
# Remote access service integration section #
|
|
272
272
|
###############################################################################
|
|
273
273
|
|
|
274
274
|
# URL to the guacamole remote access service
|
|
275
275
|
quarkus.rest-client.remote-access.url=https://guacamole-host.net:9099/guacamole
|
|
276
276
|
# for an advanced configuration of the quarkus REST client to the guacamole service you can set up the following settings group
|
|
277
277
|
# Timeout specified in milliseconds to wait to connect to the remote endpoint.
|
|
278
278
|
#quarkus.rest-client.remote-access.connect-timeout=<millis>
|
|
279
279
|
# Timeout specified in milliseconds to wait for a response from the remote endpoint.
|
|
280
280
|
#quarkus.rest-client.remote-access.read-timeout=<millis>
|
|
281
281
|
#quarkus.rest-client.remote-access.trust-store
|
|
282
282
|
#quarkus.rest-client.remote-access.trust-store-password
|
|
283
283
|
#quarkus.rest-client.remote-access.trust-store-type
|
|
284
284
|
#quarkus.rest-client.remote-access.key-store
|
|
285
285
|
#quarkus.rest-client.remote-access.key-store-password
|
|
286
286
|
#quarkus.rest-client.remote-access.key-store-type
|
|
287
287
|
#quarkus.rest-client.remote-access.hostname-verifier
|
|
288
288
|
#quarkus.rest-client.remote-access.connection-ttl
|
|
289
289
|
#and others
|
|
290
290
|
#quarkus.rest-client.remote-access.***
|
|
291
291
|
|
|
292
292
|
# system account login for the guacamole remote access service
|
|
293
293
|
osmax.inventory.remote-access.username=admin
|
|
294
294
|
# system account login password for the guacamole remote access service
|
|
295
295
|
osmax.inventory.remote-access.password=password
|
|
296
296
|
|
|
297
297
|
###############################################################################
|
|
298
298
|
# S3 integration section #
|
|
299
299
|
###############################################################################
|
|
300
300
|
|
|
301
301
|
# contains a list of S3 server URIs
|
|
302
302
|
osmax.salt-adapter.s3.server-uri-list=http://localhost:9000,http://localhost:9900
|
|
303
303
|
## To enable SSL connection mode replace 'osmax.salt-adapter.s3.server-uri-list' parameter with following value:
|
|
304
304
|
#osmax.salt-adapter.s3.server-uri-list=https://localhost:9000,https://localhost:9900
|
|
305
305
|
osmax.salt-adapter.s3.access-key-id=s3adminSalt
|
|
306
306
|
osmax.salt-adapter.s3.secret-access-key=s3adminSaltPassword
|
|
307
307
|
osmax.salt-adapter.s3.region=ru-location-1
|
|
308
308
|
osmax.salt-adapter.s3.connection-timeout=1s
|
|
309
309
|
osmax.salt-adapter.s3.num-retries=3
|
|
310
310
|
osmax.salt-adapter.s3.initial-retry-delay-millis=100
|
|
311
311
|
osmax.salt-adapter.s3.max-retry-delay-millis=1000
|
|
312
312
|
osmax.salt-adapter.s3.state-bucket-name=salt-bucket
|
|
313
313
|
osmax.salt-adapter.s3.pillar-bucket-name=pillar-bucket
|
|
314
314
|
osmax.salt-adapter.s3.script-bucket-name=script-bucket
|
|
315
315
|
|
|
316
|
+
# Schedule for pillar top.sls update
|
|
317
|
+
# Every 30 seconds
|
|
318
|
+
osmax.inventory.job.s3-pillar-top-sls-update.cron.expr=0/30 * * ? * *
|
|
319
|
+
# Schedule for fetching tasks for update salt s3 files (pillars and highstate)
|
|
320
|
+
# Every 5 seconds
|
|
321
|
+
osmax.inventory.job.s3-other-salt-files-update.cron.expr=0/5 * * ? * *
|
|
322
|
+
|
|
316
323
|
###############################################################################
|
|
317
324
|
# Multimedia service section #
|
|
318
325
|
###############################################################################
|
|
319
326
|
|
|
320
327
|
# contains a list of S3 server URIs
|
|
321
328
|
osmax.multimedia.s3.server-uri-list=http://localhost:9000,http://localhost:9900
|
|
322
329
|
## To enable SSL connection mode replace 'osmax.multimedia.s3.server-uri-list' parameter with following value:
|
|
323
330
|
#osmax.multimedia.s3.server-uri-list=https://localhost:9000,https://localhost:9900
|
|
324
331
|
osmax.multimedia.s3.access-key-id=s3adminMultimedia
|
|
325
332
|
osmax.multimedia.s3.secret-access-key=s3adminMultimediaPassword
|
|
326
333
|
osmax.multimedia.s3.region=ru-location-1
|
|
327
334
|
osmax.multimedia.s3.connection-timeout=1s
|
|
328
335
|
osmax.multimedia.s3.num-retries=3
|
|
329
336
|
osmax.multimedia.s3.initial-retry-delay-millis=100
|
|
330
337
|
osmax.multimedia.s3.max-retry-delay-millis=1000
|
|
331
338
|
osmax.multimedia.s3.icons-bucket-name=multimedia-bucket
|
|
332
339
|
osmax.multimedia.s3.images-bucket-name=multimedia-bucket
|
|
333
340
|
osmax.multimedia.s3.others-bucket-name=multimedia-bucket
|
|
334
341
|
osmax.multimedia.s3.script-bucket-name=script-bucket
|
|
335
342
|
osmax.multimedia.common.max-file-size-kb=1024
|
|
336
343
|
osmax.multimedia.common.download-token-ttl-seconds=3600
|
|
337
344
|
osmax.multimedia.common.expired-tokens-deletion-cron=0 0 * ? * *
|
|
338
345
|
# Contains current nginx frontend uri, used to form bootstrap script installation link
|
|
339
346
|
osmax.multimedia.common.frontend-uri=http://localhost:8081
|
|
340
347
|
|
|
341
348
|
###############################################################################
|
|
342
349
|
# Configurations manager section #
|
|
343
350
|
###############################################################################
|
|
344
351
|
|
|
345
352
|
# Determines maximum amount of categories per one configuration
|
|
346
353
|
osmax.catalog.category.configuration-limit=5
|
|
347
354
|
# Determines total amount of categories
|
|
348
355
|
osmax.catalog.category.total-limit=15
|
|
349
356
|
# Determines maximum salt-agent installation script file size in megabytes
|
|
350
357
|
osmax.catalog.script.max-script-size-mbytes=10
|
|
351
358
|
# Determines allowed interval in milliseconds between comparing dates
|
|
352
359
|
# Under this interval the two dates will be considered equal
|
|
353
360
|
# Deprecated since 1.11.0
|
|
354
361
|
# osmax.catalog.common.dates-comparing-accuracy-millis=100
|
|
355
362
|
# use osmax.optimistic-locks.dates-comparing-accuracy-millis
|
|
356
363
|
|
|
357
364
|
###############################################################################
|
|
358
365
|
# Software inventory section #
|
|
359
366
|
###############################################################################
|
|
360
|
-
|
|
367
|
+
osmax.inventory.software.sync-cache-data-cron=0 0 0/1 ? * *
|
|
368
|
+
osmax.inventory.software.stale-cache-data-age-minutes=120
|
|
361
369
|
osmax.inventory.software.executable-files.base-path-scan=/home/
|
|
362
370
|
# Comma separated sections list which packages will be ignored
|
|
363
371
|
osmax.inventory.software.packages.sections-blacklist=libs,non-free/libs,devel
|
|
364
372
|
|
|
365
373
|
###############################################################################
|
|
366
374
|
# Logging section #
|
|
367
375
|
###############################################################################
|
|
368
376
|
|
|
369
377
|
# Common logging config
|
|
370
378
|
quarkus.log.file.enable=true
|
|
371
379
|
quarkus.log.json.file.enable=true
|
|
372
380
|
quarkus.log.json.console.enable=false
|
|
373
381
|
|
|
374
382
|
# File logging config
|
|
375
383
|
quarkus.log.file.path=/var/log/osmax/core/osmax-core.log
|
|
376
384
|
quarkus.log.file.rotation.max-file-size=10M
|
|
377
385
|
quarkus.log.file.rotation.max-backup-index=5
|
|
378
386
|
quarkus.log.file.rotation.file-suffix=.yyyy-MM-dd.gz
|
|
379
387
|
|
|
380
388
|
# Json format config
|
|
381
389
|
quarkus.log.json.fields.mdc.flat-fields=true
|
|
382
390
|
quarkus.log.json.fields.timestamp.date-format=yyyy-MM-dd'T'HH:mm:ss.SSS'Z'
|
|
383
391
|
quarkus.log.json.fields.timestamp.zone-id=UTC
|
|
384
392
|
|
|
385
393
|
# Audit logging config
|
|
386
394
|
quarkus.log.handler.file.audit-handler.enable=true
|
|
387
395
|
quarkus.log.handler.file.audit-handler.path=/var/log/osmax/core/audit-osmax-core.log
|
|
388
396
|
quarkus.log.handler.file.audit-handler.rotation.max-file-size=10M
|
|
389
397
|
quarkus.log.handler.file.audit-handler.rotation.max-backup-index=50
|
|
390
398
|
quarkus.log.handler.file.audit-handler.rotation.file-suffix=.yyyy-MM-dd
|
|
391
399
|
|
|
392
400
|
quarkus.log.category."AUDIT".level=INFO
|
|
393
401
|
quarkus.log.category."AUDIT".handlers=audit-handler
|
|
394
402
|
quarkus.log.category."AUDIT".use-parent-handlers=false
|
|
395
403
|
|
|
396
404
|
###############################################################################
|
|
397
405
|
# Debug section #
|
|
398
406
|
# Enable all logging events via environment variable `QUARKUS_PROFILE=debug` #
|
|
399
407
|
# or delete `%debug.` prefix #
|
|
400
408
|
###############################################################################
|
|
401
409
|
|
|
402
410
|
# HTTP server access logs (uri + status)
|
|
403
411
|
%debug.quarkus.http.access-log.enabled=true
|
|
404
412
|
|
|
405
413
|
# Internal rest-client
|
|
406
414
|
%debug.quarkus.rest-client.logging.scope=request-response
|
|
407
415
|
%debug.quarkus.rest-client.logging.body-limit=500
|
|
408
416
|
%debug.quarkus.log.category."org.jboss.resteasy.reactive.client.logging".level=DEBUG
|
|
409
417
|
%debug.quarkus.log.category."org.jboss.resteasy.reactive.common.core.AbstractResteasyReactiveContext".level=DEBUG
|
|
410
418
|
|
|
411
419
|
# SaltStack events
|
|
412
420
|
%debug.quarkus.log.category."tech.inno.lcm.salt.events".level=DEBUG
|
|
413
421
|
|
|
414
422
|
# All backend services
|
|
415
423
|
%debug.quarkus.log.category."tech.inno.lcm".level=DEBUG
|
|
416
424
|
|
|
417
425
|
# Kerberos
|
|
418
426
|
%debug.quarkus.kerberos.debug=true
|
|
419
427
|
%debug.quarkus.log.category."io.quarkiverse.kerberos.runtime.KerberosIdentityProvider".level=TRACE
|
|
420
428
|
%debug.quarkus.log.category."io.quarkiverse.kerberos.runtime.KerberosIdentityProvider".min-level=TRACE
|
|
421
429
|
|
|
422
430
|
# AWS client
|
|
423
431
|
%debug.quarkus.log.category."software.amazon.awssdk.request".level=DEBUG
|
|
424
432
|
|
|
425
433
|
###############################################################################
|
|
426
434
|
# Quarkus framework section #
|
|
427
435
|
###############################################################################
|
|
428
436
|
|
|
429
437
|
# application is run under specific user, those settings allow not clashing with other quarkus apps on the same server
|
|
430
438
|
quarkus.http.body.uploads-directory=${java.io.tmpdir}/osmax_core_uploads
|
|
431
439
|
quarkus.management.body.uploads-directory=${java.io.tmpdir}/osmax_core_uploads
|
|
432
440
|
|
|
433
441
|
###############################################################################
|
|
434
442
|
# Locks section #
|
|
435
443
|
###############################################################################
|
|
436
444
|
osmax.pessimistic-locks.enabled=true
|
|
437
445
|
osmax.pessimistic-locks.auto-unlock.threshold.seconds=3600
|
|
438
446
|
osmax.pessimistic-locks.auto-unlock.job.interval.seconds=600
|
|
439
447
|
|
|
440
448
|
osmax.optimistic-locks.enabled=true
|
|
441
449
|
# Determines allowed interval in milliseconds between comparing dates
|
|
442
450
|
# Under this interval the two dates will be considered equal hen checking optimistic lock by date
|
|
443
451
|
#osmax.optimistic-locks.dates-comparing-accuracy-millis=100
|