Сравнение конфигурационных файлов
В разделе приведено сравнение параметров конфигурационных файлов модулей osmax-core и osmax-provisioner для текущей
и предыдущей версий продукта, где:
-
строки с символом «-», выделенные желтым цветом — устаревшие названия параметров/комментариев, которые были частично изменены, полностью заменены или удалены в текущей версии продукта;
-
строки с символом «+», выделенные бледно-зеленым цветом — обновленные названия параметров/комментариев, актуальные для текущей версии продукта;
-
строки с символом «+», выделенные зеленым цветом — новые строки в файле, появившиеся в текущей версии продукта.
-
дополнительно:
-
розовым цветом подсвечены измененные/удаленные элементы;
-
ярко-зеленым цветом подсвечены новые элементы.
-
| Описание параметров см. в разделах «Конфигурация модуля osmax-core» и «Конфигурация модуля osmax-provisioner» соответственно. |
Конфигурационный файл модуля osmax-core
core-application-properties-1-13-0.properties → core-application-properties-1-14-0.properties
|
@@ -1,462 +1,459 @@
|
|
|
1
1
|
## This is an example of `application.properties` file as main configuration file for osmax-core backend
|
|
2
2
|
|
|
3
3
|
###############################################################################
|
|
4
4
|
# HTTP server properties section #
|
|
5
5
|
###############################################################################
|
|
6
6
|
|
|
7
7
|
## Main application port
|
|
8
8
|
quarkus.http.port=8081
|
|
9
9
|
|
|
10
10
|
## HTTP body limit, can be changed to big files uploading
|
|
11
11
|
quarkus.http.limits.max-body-size=100M
|
|
12
12
|
|
|
13
13
|
## SSL configuration section.
|
|
14
14
|
## To enable serving requests via HTTPS uncomment the following parameters:
|
|
15
15
|
#quarkus.http.insecure-requests=disabled
|
|
16
16
|
#quarkus.http.ssl-port=8081
|
|
17
17
|
#quarkus.http.ssl.certificate.key-store-file=/opt/osmax-core/keystore.jks
|
|
18
18
|
#quarkus.http.ssl.certificate.key-store-password=keystore@12345
|
|
19
19
|
|
|
20
20
|
###############################################################################
|
|
21
21
|
# Authentication & Authorization section #
|
|
22
22
|
###############################################################################
|
|
23
23
|
|
|
24
24
|
## Enable/disable authentication
|
|
25
25
|
osmax.application.auth.disabled=false
|
|
26
26
|
## Enables kerberos authentication debug mode
|
|
27
27
|
#quarkus.kerberos.debug=true
|
|
28
28
|
## There are 2 alternative options for the kerberos credentials [principal realm, name and password] defining:
|
|
29
29
|
## 1) via direct defining;
|
|
30
30
|
## 2) via keytab file path defining
|
|
31
31
|
##
|
|
32
32
|
## Direct kerberos credentials defining:
|
|
33
33
|
quarkus.kerberos.service-principal-name=lcm_backend_svc
|
|
34
34
|
quarkus.kerberos.service-principal-realm=my.domain.com
|
|
35
35
|
quarkus.kerberos.service-principal-password=Password123
|
|
36
36
|
## Path to keytab:
|
|
37
37
|
#quarkus.kerberos.keytab-path=/opt/osmax-core/my_file.keytab
|
|
38
38
|
|
|
39
39
|
## Old deprecated authorization based on LDAP-groups only
|
|
40
40
|
## List of LDAP groups whose users are authorized in Admin Console
|
|
41
41
|
#osmax.authorization.user-groups-white-list[0]=CN=testGroup,CN=Users,DC=inno,DC=test
|
|
42
42
|
|
|
43
43
|
# New RBAC
|
|
44
44
|
osmax.authorization.rbac.enabled=false
|
|
45
45
|
# The following users will be mapped to the superuser role when the application starts
|
|
46
46
|
#osmax.authorization.rbac.super-users[0]=alice@INNO.TEST
|
|
47
47
|
#osmax.authorization.rbac.super-users[1]=bob@INNO.TEST
|
|
48
48
|
|
|
49
49
|
###############################################################################
|
|
50
50
|
# Database properties section #
|
|
51
51
|
###############################################################################
|
|
52
52
|
|
|
53
53
|
## Main datasource
|
|
54
54
|
quarkus.datasource."lcm-db".username=lcm
|
|
55
55
|
quarkus.datasource."lcm-db".password=password
|
|
56
56
|
quarkus.datasource."lcm-db".reactive.url=postgresql://localhost:5432/lcm
|
|
57
57
|
## If you need to specify default DB schema use the syntax below
|
|
58
58
|
#quarkus.datasource."lcm-db".reactive.url=postgresql://localhost:5432/lcm?search_path=lcm_schema_name
|
|
59
59
|
|
|
60
60
|
## If you need to specify few datasource connections for load-balancing or work with clustered db use the syntax below
|
|
61
61
|
#quarkus.datasource."lcm-db".reactive.url=postgresql://host1:5432/lcm,postgresql://host2:5432/lcm,postgresql://host3:5432/lcm
|
|
62
62
|
## Or this can also be written with indexed property syntax
|
|
63
63
|
#quarkus.datasource."lcm-db".reactive.url[0]=postgresql://host1:5432/lcm
|
|
64
64
|
#quarkus.datasource."lcm-db".reactive.url[1]=postgresql://host2:5432/lcm
|
|
65
65
|
#quarkus.datasource."lcm-db".reactive.url[2]=postgresql://host3:5432/lcm
|
|
66
66
|
|
|
67
67
|
## Main datasource Liquibase config
|
|
68
68
|
quarkus.datasource."lcm-db".jdbc.url=jdbc:postgresql://localhost:5432/lcm
|
|
69
69
|
quarkus.liquibase."lcm-db".default-schema-name=lcm
|
|
70
70
|
quarkus.liquibase."lcm-db".migrate-at-start=True
|
|
71
71
|
|
|
72
72
|
## Readonly datasource
|
|
73
73
|
quarkus.datasource."lcm-db-readonly".username=readonly
|
|
74
74
|
quarkus.datasource."lcm-db-readonly".password=password
|
|
75
75
|
quarkus.datasource."lcm-db-readonly".reactive.url=postgresql://localhost:5432/lcm
|
|
76
76
|
quarkus.datasource."lcm-db-readonly".jdbc.url=jdbc:postgresql://localhost:5432/lcm
|
|
77
77
|
|
|
78
78
|
###############################################################################
|
|
79
79
|
# Hardware inventory properties section #
|
|
80
80
|
###############################################################################
|
|
81
81
|
|
|
82
82
|
# Remote operation orders
|
|
83
83
|
# Every 10 minutes
|
|
84
84
|
osmax.inventory.job.remote-operation-expired-orders.cron.expression=0 */10 * ? * *
|
|
85
85
|
|
|
86
86
|
# Schedule for checking dynamic machine collections refresh executing time (quartz cron format), every 2 min
|
|
87
87
|
osmax.inventory.job.dynamic-collections-refresh-executing-time.cron.expr=0 */2 * ? * *
|
|
88
88
|
# Splay value in seconds for one-time task of dynamic machine collections refresh
|
|
89
89
|
osmax.inventory.job.dynamic-collections-refresh.splay=10
|
|
90
90
|
|
|
91
91
|
# Schedule for starting entity cleanup tasks (quartz cron format)
|
|
92
92
|
# Every 2 minutes
|
|
93
93
|
osmax.inventory.job.cleanup-tasks-starter-scheduler.cron.expr=0 */2 * ? * *
|
|
94
94
|
|
|
95
95
|
# Determines the maximum amount of machine custom attributes in one section
|
|
96
96
|
osmax.inventory.machine-attribute.section.size=20
|
|
97
97
|
|
|
98
98
|
# Determines the maximum amount of user custom attributes in one section
|
|
99
99
|
osmax.inventory.user-attribute.section.size=20
|
|
100
100
|
|
|
101
101
|
# The number of minutes since the last agent activity before the device goes into "Offline" status
|
|
102
102
|
osmax.inventory.settings.agent.minutes-to-become-offline=5
|
|
103
103
|
# Absolute file path to `wtmp` file which stores historical data of user logins and logouts
|
|
104
104
|
osmax.machines.user-sessions.linux.wtmp-absolute-path=/var/log/wtmp
|
|
105
105
|
# Absolute file path to `utmp` file which stores user sessions in real time
|
|
106
106
|
osmax.machines.user-sessions.linux.utmp-absolute-path=/var/run/utmp
|
|
107
107
|
# Option, which determines the considered Salt mode (single- or multimaster), can be true or false
|
|
108
108
|
osmax.agent-installation.settings.multi-master-mode=true
|
|
109
109
|
# Absolute path, containing all files which are to be included into bootstrap script configuration archive (.tar.gz)
|
|
110
110
|
osmax.salt.scripts.bootstrap-script-config-path=/config/script-configs/bootstrap/
|
|
111
111
|
# Optional parameters, matching salt-ssh connection settings,
|
|
112
112
|
# see https://docs.saltproject.io/en/latest/ref/runners/all/salt.runners.manage.html#salt.runners.manage.bootstrap
|
|
113
113
|
#osmax.agent-installation.settings.bootstrap-ssh-user=
|
|
114
114
|
#osmax.agent-installation.settings.bootstrap-ssh-password=
|
|
115
115
|
#osmax.agent-installation.settings.bootstrap-ssh-private-key-path=
|
|
116
116
|
|
|
117
117
|
###############################################################################
|
|
118
118
|
# LDAP integration properties section #
|
|
119
119
|
###############################################################################
|
|
120
120
|
|
|
121
121
|
#enable JNDI for the LDAP server discovery inside the MS AD domain when you define option 'osmax.inventory.ldap.datasource[i].dns-srv-record'
|
|
122
122
|
quarkus.naming.enable-jndi=true
|
|
123
123
|
## Determines the page size for any ldap query
|
|
124
124
|
osmax.inventory.ldap.search-page-size=200
|
|
125
125
|
## The first LDAP datasource configuration
|
|
126
126
|
osmax.inventory.ldap.datasource[0].name=my.domain.com
|
|
127
127
|
osmax.inventory.ldap.datasource[0].base-dn=DC=my,DC=domain,DC=com
|
|
128
128
|
## There are 2 options to set LDAP hostname pools
|
|
129
129
|
## 1) direct addresses defining
|
|
130
130
|
## 2) using DNS SRV records to discover LDAP servers from MS AS domain
|
|
131
131
|
##
|
|
132
132
|
## For the direct addresses defining of LDAP datasource please use the following options:
|
|
133
133
|
## osmax.inventory.ldap.datasource[i].host=
|
|
134
134
|
## osmax.inventory.ldap.datasource[i].port=
|
|
135
135
|
##
|
|
136
136
|
## extra hosts section is optional
|
|
137
137
|
## osmax.inventory.ldap.datasource[i].extra-hosts[j].host=
|
|
138
138
|
## osmax.inventory.ldap.datasource[i].extra-hosts[j].port=
|
|
139
139
|
|
|
140
140
|
## For the using DNS SRV records to discover LDAP servers from MS AS domain use the following options:
|
|
141
141
|
### osmax.inventory.ldap.datasource[i].dns-srv-record=
|
|
142
142
|
##
|
|
143
143
|
## example below:
|
|
144
144
|
osmax.inventory.ldap.datasource[0].host=localhost
|
|
145
145
|
osmax.inventory.ldap.datasource[0].port=636
|
|
146
146
|
osmax.inventory.ldap.datasource[0].username=administrator@my.domain.com
|
|
147
147
|
osmax.inventory.ldap.datasource[0].password=Welkom123
|
|
148
148
|
## Optional section for the LDAP datasource
|
|
149
149
|
# osmax.inventory.ldap.datasource[0].connect-timeout-millis=10000
|
|
150
150
|
# osmax.inventory.ldap.datasource[0].response-timeout=10000
|
|
151
151
|
# osmax.inventory.ldap.datasource[0].abandon-on-timeout=true
|
|
152
152
|
# osmax.inventory.ldap.datasource[0].allow-concurrent-socket-factory-use=true
|
|
153
153
|
|
|
154
154
|
## The second and subsequent LDAP datasource configurations are optional
|
|
155
155
|
#osmax.inventory.ldap.datasource[1].name=my2.domain.com
|
|
156
156
|
#osmax.inventory.ldap.datasource[1].base-dn=DC=my2,DC=domain,DC=com
|
|
157
157
|
#osmax.inventory.ldap.datasource[1].dns-srv-record=_ldap._tcp.dc._msdcs.mydomain.com
|
|
158
158
|
#osmax.inventory.ldap.datasource[1]...
|
|
159
159
|
|
|
160
160
|
## LDAPS (LDAP over SSL) parameters section.
|
|
161
161
|
|
|
162
162
|
# To configure LDAPS please use the following option
|
|
163
163
|
#osmax.inventory.ldap.datasource[i].ssl=...
|
|
164
164
|
# There are 3 options available for this option:
|
|
165
165
|
# value `false` - use this mode when you want to use LDAP without SSL (usually 389 port)
|
|
166
166
|
# value `true` - use this mode when you want to use LDAPS (usually 636 port), requires path to the certificate file or truststore file
|
|
167
167
|
# value `start-tls` - use this mode when you want to establish an insecure connection (usually 389 port),
|
|
168
168
|
# but then to immediately use the StartTLS extended operation to convert that insecure connection to a secure one
|
|
169
169
|
|
|
170
170
|
# If you want to trust all SSL certificates without direct certificate/truststore definition you can use the option
|
|
171
171
|
# osmax.inventory.ldap.datasource[i].trust-all-ssl-certificates=true
|
|
172
172
|
|
|
173
173
|
## The following example shows how to configure LDAPS with certificate file definition for the datasource
|
|
174
174
|
#osmax.inventory.ldap.datasource[0].ssl=true
|
|
175
175
|
#osmax.inventory.ldap.datasource[0].ssl-certificate=/opt/osmax-core/samba_cert.pem
|
|
176
176
|
|
|
177
177
|
## The following example shows how to configure LDAPS with truststore file definition for the datasource
|
|
178
178
|
#osmax.inventory.ldap.datasource[0].ssl=true
|
|
179
179
|
#osmax.inventory.ldap.datasource[0].ssl-trust-store=/opt/osmax-core/keystore.jks
|
|
180
180
|
#osmax.inventory.ldap.datasource[0].ssl-trust-store-type=PKCS12
|
|
181
181
|
#osmax.inventory.ldap.datasource[0].ssl-trust-store-password=keystore@12345
|
|
182
182
|
|
|
183
183
|
## The following example shows how to configure LDAPS with truststore file definition for all datasource
|
|
184
184
|
#osmax.inventory.ldap.ssl-trust-store=/opt/osmax-core/keystore.jks
|
|
185
185
|
#osmax.inventory.ldap.ssl-trust-store-type=JKS
|
|
186
186
|
#osmax.inventory.ldap.ssl-trust-store-password=keystore@12345
|
|
187
187
|
|
|
188
188
|
|
|
189
189
|
###############################################################################
|
|
190
190
|
# Application Store properties section #
|
|
191
191
|
###############################################################################
|
|
192
192
|
|
|
193
193
|
# Determines the amount of hours after which order is considered failed
|
|
194
194
|
osmax.order-management.completion.time.hours=12
|
|
195
195
|
# Schedule for tracking long-running orders as failed (quartz cron format)
|
|
196
196
|
# [At second :00 of minute :00 of every hour]
|
|
197
197
|
osmax.order-management.autocomplete.cron.expr=0 0 * ? * * *
|
|
198
198
|
|
|
199
199
|
###############################################################################
|
|
200
200
|
# Kafka messages section #
|
|
201
201
|
###############################################################################
|
|
202
202
|
|
|
203
203
|
## Kafka bootstrap servers (comma separated)
|
|
204
204
|
mp.messaging.connector.smallrye-kafka.bootstrap.servers=localhost:9092
|
|
205
205
|
# Kafka topic name
|
|
206
206
|
mp.messaging.incoming.salt-events-kafka.topic=salt-topic
|
|
207
207
|
mp.messaging.outgoing.core-os-reinstallation-machines.topic=osmax-core.os.reinstallation.machines
|
|
208
208
|
mp.messaging.incoming.provisioner-os-reinstallation-machine-registration-statuses.topic=osmax-provisioner.os.reinstallation.machines.registration.statuses
|
|
209
209
|
mp.messaging.incoming.provisioner-os-installed-events-kafka.topic=provisioner-topic
|
|
210
210
|
mp.messaging.incoming.provisioner-os-installed-events-kafka.dead-letter-queue.topic=provisioner-dlq-topic
|
|
211
211
|
|
|
212
212
|
## The provisioner-os-installed-events-kafka listener support retry strategy,
|
|
213
213
|
## default values are maxRetries=3, delay=100ms and jitter=0, to change retry settings use
|
|
214
214
|
#tech.inno.lcm.provisioner.events.ProvisionerEventsListener/consume/Retry/maxRetries=0
|
|
215
215
|
## See more info https://quarkus.io/guides/smallrye-fault-tolerance#runtime-configuration
|
|
216
216
|
## and available options https://github.com/eclipse/microprofile-fault-tolerance/blob/main/api/src/main/java/org/eclipse/microprofile/faulttolerance/Retry.java
|
|
217
217
|
|
|
218
218
|
## Kafka SSL connection parameters section.
|
|
219
219
|
## To enable SSL connection mode uncomment three following parameters:
|
|
220
220
|
#mp.messaging.connector.smallrye-kafka.security.protocol=SSL
|
|
221
221
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.location=/etc/ssl/certs/java/cacerts
|
|
222
222
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.password=changeit
|
|
223
223
|
## Optionally if the custom truststore is used:
|
|
224
224
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
225
225
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.type=PKCS12
|
|
226
226
|
|
|
227
227
|
## To enable mutual TLS connection mode uncomment three following parameters, along with configuration above:
|
|
228
228
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.location=/opt/osmax-core/keystore.jks
|
|
229
229
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.password=keystore@12345
|
|
230
230
|
## Optionally if the custom keystore is used:
|
|
231
231
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
232
232
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.type=PKCS12
|
|
233
233
|
|
|
234
234
|
###############################################################################
|
|
235
235
|
# REST clients common configuration #
|
|
236
236
|
###############################################################################
|
|
237
237
|
|
|
238
238
|
## SSL connection parameters sections.
|
|
239
239
|
## To enable accessing REST endpoints via HTTPS uncomment two following parameters:
|
|
240
240
|
#quarkus.rest-client.trust-store=/etc/ssl/certs/java/cacerts
|
|
241
241
|
#quarkus.rest-client.trust-store-password=changeit
|
|
242
242
|
## Optionally if the custom truststore is used:
|
|
243
243
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
244
244
|
#quarkus.rest-client.trust-store-type=PKCS12
|
|
245
245
|
## For disabling SSL connection verification you can use option below
|
|
246
246
|
#quarkus.rest-client.remote-access.trust-all=true
|
|
247
247
|
|
|
248
248
|
###############################################################################
|
|
249
249
|
# SaltStack integration section #
|
|
250
250
|
###############################################################################
|
|
251
251
|
|
|
252
252
|
osmax.salt-adapter.command-runner.http-scheme=http
|
|
253
253
|
osmax.salt-adapter.command-runner.master-api-port=8000
|
|
254
254
|
osmax.salt-adapter.command-runner.global-auth.eauth=pam
|
|
255
255
|
osmax.salt-adapter.command-runner.global-auth.login=salt_api
|
|
256
256
|
osmax.salt-adapter.command-runner.global-auth.password=123
|
|
257
257
|
osmax.salt-adapter.command-runner.retry.number-of-attempts=5
|
|
258
258
|
osmax.salt-adapter.command-runner.retry.initial-back-off=1s
|
|
259
259
|
osmax.salt-adapter.command-runner.retry.max-back-off=1s
|
|
260
260
|
|
|
261
261
|
## Salt masters configuration section.
|
|
262
262
|
## Optional, this section should be used when backend server can't resolve salt master by DNS name
|
|
263
263
|
#osmax.salt-adapter.command-runner.override-masters[0].id=salt-master1
|
|
264
264
|
#osmax.salt-adapter.command-runner.override-masters[0].uri=http://192.168.0.1:8000
|
|
265
265
|
|
|
266
266
|
## The second and other Salt masters can be configured in the same way
|
|
267
267
|
#osmax.salt-adapter.command-runner.override-masters[1].id=salt-master2
|
|
268
268
|
#osmax.salt-adapter.command-runner.override-masters[1].uri=http://192.168.0.2:8000
|
|
269
269
|
|
|
270
270
|
###############################################################################
|
|
271
271
|
# Remote access service integration section #
|
|
272
272
|
###############################################################################
|
|
273
273
|
|
|
274
274
|
# URL to the guacamole remote access service
|
|
275
275
|
quarkus.rest-client.remote-access.url=https://guacamole-host.net:9099/guacamole
|
|
276
276
|
# for an advanced configuration of the quarkus REST client to the guacamole service you can set up the following settings group
|
|
277
277
|
# Timeout specified in milliseconds to wait to connect to the remote endpoint.
|
|
278
278
|
#quarkus.rest-client.remote-access.connect-timeout=<millis>
|
|
279
279
|
# Timeout specified in milliseconds to wait for a response from the remote endpoint.
|
|
280
280
|
#quarkus.rest-client.remote-access.read-timeout=<millis>
|
|
281
281
|
#quarkus.rest-client.remote-access.trust-store
|
|
282
282
|
#quarkus.rest-client.remote-access.trust-store-password
|
|
283
283
|
#quarkus.rest-client.remote-access.trust-store-type
|
|
284
284
|
#quarkus.rest-client.remote-access.key-store
|
|
285
285
|
#quarkus.rest-client.remote-access.key-store-password
|
|
286
286
|
#quarkus.rest-client.remote-access.key-store-type
|
|
287
287
|
#quarkus.rest-client.remote-access.hostname-verifier
|
|
288
288
|
#quarkus.rest-client.remote-access.connection-ttl
|
|
289
289
|
#and others
|
|
290
290
|
#quarkus.rest-client.remote-access.***
|
|
291
291
|
|
|
292
292
|
# system account login for the guacamole remote access service
|
|
293
293
|
osmax.inventory.remote-access.username=admin
|
|
294
294
|
# system account login password for the guacamole remote access service
|
|
295
295
|
osmax.inventory.remote-access.password=password
|
|
296
296
|
|
|
297
297
|
###############################################################################
|
|
298
298
|
# S3 integration section #
|
|
299
299
|
###############################################################################
|
|
300
300
|
|
|
301
301
|
# contains a list of S3 server URIs
|
|
302
302
|
osmax.salt-adapter.s3.server-uri-list=http://localhost:9000,http://localhost:9900
|
|
303
303
|
## To enable SSL connection mode replace 'osmax.salt-adapter.s3.server-uri-list' parameter with following value:
|
|
304
304
|
#osmax.salt-adapter.s3.server-uri-list=https://localhost:9000,https://localhost:9900
|
|
305
305
|
osmax.salt-adapter.s3.access-key-id=s3adminSalt
|
|
306
306
|
osmax.salt-adapter.s3.secret-access-key=s3adminSaltPassword
|
|
307
307
|
osmax.salt-adapter.s3.region=ru-location-1
|
|
308
308
|
osmax.salt-adapter.s3.connection-timeout=1s
|
|
309
309
|
osmax.salt-adapter.s3.num-retries=3
|
|
310
310
|
osmax.salt-adapter.s3.initial-retry-delay-millis=100
|
|
311
311
|
osmax.salt-adapter.s3.max-retry-delay-millis=1000
|
|
312
312
|
osmax.salt-adapter.s3.state-bucket-name=salt-bucket
|
|
313
313
|
osmax.salt-adapter.s3.script-bucket-name=script-bucket
|
|
314
314
|
|
|
315
315
|
# Schedule for pillar top.sls update
|
|
316
316
|
# Every 30 seconds
|
|
317
317
|
osmax.inventory.job.salt-assignment-mapping-update.cron.expr=0/30 * * ? * *
|
|
318
318
|
# Schedule for fetching tasks for update salt s3 files (pillars and highstate)
|
|
319
319
|
# Every 5 seconds
|
|
320
320
|
osmax.inventory.job.salt-assignment-update.cron.expr=0/5 * * ? * *
|
|
321
321
|
|
|
322
322
|
###############################################################################
|
|
323
323
|
# Multimedia service section #
|
|
324
324
|
###############################################################################
|
|
325
325
|
|
|
326
326
|
# contains a list of S3 server URIs
|
|
327
327
|
osmax.multimedia.s3.server-uri-list=http://localhost:9000,http://localhost:9900
|
|
328
328
|
## To enable SSL connection mode replace 'osmax.multimedia.s3.server-uri-list' parameter with following value:
|
|
329
329
|
#osmax.multimedia.s3.server-uri-list=https://localhost:9000,https://localhost:9900
|
|
330
330
|
osmax.multimedia.s3.access-key-id=s3adminMultimedia
|
|
331
331
|
osmax.multimedia.s3.secret-access-key=s3adminMultimediaPassword
|
|
332
332
|
osmax.multimedia.s3.region=ru-location-1
|
|
333
333
|
osmax.multimedia.s3.connection-timeout=1s
|
|
334
334
|
osmax.multimedia.s3.num-retries=3
|
|
335
335
|
osmax.multimedia.s3.initial-retry-delay-millis=100
|
|
336
336
|
osmax.multimedia.s3.max-retry-delay-millis=1000
|
|
337
337
|
osmax.multimedia.s3.icons-bucket-name=multimedia-bucket
|
|
338
338
|
osmax.multimedia.s3.images-bucket-name=multimedia-bucket
|
|
339
339
|
osmax.multimedia.s3.others-bucket-name=multimedia-bucket
|
|
340
340
|
osmax.multimedia.s3.script-bucket-name=script-bucket
|
|
341
341
|
osmax.multimedia.common.max-file-size-kb=1024
|
|
342
342
|
osmax.multimedia.common.download-token-ttl-seconds=3600
|
|
343
343
|
osmax.multimedia.common.expired-tokens-deletion-cron=0 0 * ? * *
|
|
344
344
|
# Contains current nginx frontend uri, used to form bootstrap script installation link
|
|
345
345
|
osmax.multimedia.common.frontend-uri=http://localhost:8081
|
|
346
346
|
|
|
347
347
|
###############################################################################
|
|
348
348
|
# Configurations manager section #
|
|
349
349
|
###############################################################################
|
|
350
350
|
|
|
351
351
|
# Determines maximum amount of categories per one configuration
|
|
352
352
|
osmax.catalog.category.configuration-limit=5
|
|
353
353
|
# Determines total amount of categories
|
|
354
354
|
osmax.catalog.category.total-limit=15
|
|
355
355
|
# Determines maximum salt-agent installation script file size in megabytes
|
|
356
356
|
osmax.catalog.script.max-script-size-mbytes=10
|
|
357
357
|
# Determines allowed interval in milliseconds between comparing dates
|
|
358
358
|
# Under this interval the two dates will be considered equal
|
|
359
359
|
# Deprecated since 1.11.0
|
|
360
360
|
# osmax.catalog.common.dates-comparing-accuracy-millis=100
|
|
361
361
|
# use osmax.optimistic-locks.dates-comparing-accuracy-millis
|
|
362
362
|
|
|
363
363
|
###############################################################################
|
|
364
364
|
# Software inventory section #
|
|
365
365
|
###############################################################################
|
|
366
366
|
osmax.inventory.software.sync-cache-data-cron=0 0 0/1 ? * *
|
|
367
367
|
osmax.inventory.software.stale-cache-data-age-minutes=120
|
|
368
|
-
osmax.inventory.software.executable-files.base-path-scan=/home/
|
|
369
|
-
# Comma separated sections list which packages will be ignored
|
|
370
|
-
osmax.inventory.software.packages.sections-blacklist=libs,non-free/libs,devel
|
|
371
368
|
|
|
372
369
|
###############################################################################
|
|
373
370
|
# Logging section #
|
|
374
371
|
###############################################################################
|
|
375
372
|
|
|
376
373
|
# Common logging config
|
|
377
374
|
quarkus.log.file.enable=true
|
|
378
375
|
quarkus.log.json.file.enable=true
|
|
379
376
|
quarkus.log.json.console.enable=false
|
|
380
377
|
|
|
381
378
|
# File logging config
|
|
382
379
|
quarkus.log.file.path=/var/log/osmax/core/osmax-core.log
|
|
383
380
|
quarkus.log.file.rotation.max-file-size=10M
|
|
384
381
|
quarkus.log.file.rotation.max-backup-index=5
|
|
385
382
|
quarkus.log.file.rotation.file-suffix=.yyyy-MM-dd.gz
|
|
386
383
|
|
|
387
384
|
# Json format config
|
|
388
385
|
quarkus.log.json.fields.mdc.flat-fields=true
|
|
389
386
|
quarkus.log.json.fields.timestamp.date-format=yyyy-MM-dd'T'HH:mm:ss.SSS'Z'
|
|
390
387
|
quarkus.log.json.fields.timestamp.zone-id=UTC
|
|
391
388
|
|
|
392
389
|
# Audit logging config
|
|
393
390
|
quarkus.log.handler.file.audit-handler.enable=true
|
|
394
391
|
quarkus.log.handler.file.audit-handler.path=/var/log/osmax/core/audit-osmax-core.log
|
|
395
392
|
quarkus.log.handler.file.audit-handler.rotation.max-file-size=10M
|
|
396
393
|
quarkus.log.handler.file.audit-handler.rotation.max-backup-index=50
|
|
397
394
|
quarkus.log.handler.file.audit-handler.rotation.file-suffix=.yyyy-MM-dd
|
|
398
395
|
|
|
399
396
|
quarkus.log.category."AUDIT".level=INFO
|
|
400
397
|
quarkus.log.category."AUDIT".handlers=audit-handler
|
|
401
398
|
quarkus.log.category."AUDIT".use-parent-handlers=false
|
|
402
399
|
|
|
403
400
|
###############################################################################
|
|
404
401
|
# Debug section #
|
|
405
402
|
# Enable all logging events via environment variable `QUARKUS_PROFILE=debug` #
|
|
406
403
|
# or delete `%debug.` prefix #
|
|
407
404
|
###############################################################################
|
|
408
405
|
|
|
409
406
|
# HTTP server access logs (uri + status)
|
|
410
407
|
%debug.quarkus.http.access-log.enabled=true
|
|
411
408
|
|
|
412
409
|
# Internal rest-client
|
|
413
410
|
%debug.quarkus.rest-client.logging.scope=request-response
|
|
414
411
|
%debug.quarkus.rest-client.logging.body-limit=500
|
|
415
412
|
%debug.quarkus.log.category."org.jboss.resteasy.reactive.client.logging".level=DEBUG
|
|
416
413
|
%debug.quarkus.log.category."org.jboss.resteasy.reactive.common.core.AbstractResteasyReactiveContext".level=DEBUG
|
|
417
414
|
|
|
418
415
|
# SaltStack events
|
|
419
416
|
%debug.quarkus.log.category."tech.inno.lcm.salt.events".level=DEBUG
|
|
420
417
|
|
|
421
418
|
# All backend services
|
|
422
419
|
%debug.quarkus.log.category."tech.inno.lcm".level=DEBUG
|
|
423
420
|
|
|
424
421
|
# Kerberos
|
|
425
422
|
%debug.quarkus.kerberos.debug=true
|
|
426
423
|
%debug.quarkus.log.category."io.quarkiverse.kerberos.runtime.KerberosIdentityProvider".level=TRACE
|
|
427
424
|
%debug.quarkus.log.category."io.quarkiverse.kerberos.runtime.KerberosIdentityProvider".min-level=TRACE
|
|
428
425
|
|
|
429
426
|
# AWS client
|
|
430
427
|
%debug.quarkus.log.category."software.amazon.awssdk.request".level=DEBUG
|
|
431
428
|
|
|
432
429
|
###############################################################################
|
|
433
430
|
# Quarkus framework section #
|
|
434
431
|
###############################################################################
|
|
435
432
|
|
|
436
433
|
# application is run under specific user, those settings allow not clashing with other quarkus apps on the same server
|
|
437
434
|
quarkus.http.body.uploads-directory=${java.io.tmpdir}/osmax_core_uploads
|
|
438
435
|
quarkus.management.body.uploads-directory=${java.io.tmpdir}/osmax_core_uploads
|
|
439
436
|
|
|
440
437
|
###############################################################################
|
|
441
438
|
# Locks section #
|
|
442
439
|
###############################################################################
|
|
443
440
|
osmax.pessimistic-locks.enabled=true
|
|
444
441
|
osmax.pessimistic-locks.auto-unlock.threshold.seconds=3600
|
|
445
442
|
osmax.pessimistic-locks.auto-unlock.job.interval.seconds=600
|
|
446
443
|
|
|
447
444
|
osmax.optimistic-locks.enabled=true
|
|
448
445
|
# Determines allowed interval in milliseconds between comparing dates
|
|
449
446
|
# Under this interval the two dates will be considered equal hen checking optimistic lock by date
|
|
450
447
|
#osmax.optimistic-locks.dates-comparing-accuracy-millis=100
|
|
451
448
|
|
|
452
449
|
###############################################################################
|
|
453
450
|
# Predefined objects properties section #
|
|
454
451
|
###############################################################################
|
|
455
452
|
osmax.predefined-objects-import.enabled=true
|
|
456
453
|
osmax.predefined-objects-import.custom-grains.src=custom-grains
|
|
457
454
|
osmax.predefined-objects-import.execution-modules.src=execution-modules
|
|
458
455
|
osmax.predefined-objects-import.salt-scripts.src=salt-scripts
|
|
459
456
|
osmax.predefined-objects-import.formulas.src=formulas
|
|
460
457
|
osmax.predefined-objects-import.formulas.meta.src=formulas-meta
|
|
461
458
|
osmax.predefined-objects-import.configurations.meta.src=specifications/meta
|
|
462
|
-
osmax.predefined-objects-import.scripts.src=scripts
|
|
459
|
+
osmax.predefined-objects-import.scripts.src=scripts
|
Конфигурационный файл модуля osmax-provisioner
provisioner-application-properties-1-13-0.properties → provisioner-application-properties-1-14-0.properties
|
@@ -1,214 +1,224 @@
|
|
|
1
1
|
## This is an example of `application.properties` file as main configuration file for osmax-provisioner backend
|
|
2
2
|
|
|
3
3
|
###############################################################################
|
|
4
4
|
# HTTP server properties section #
|
|
5
5
|
###############################################################################
|
|
6
6
|
|
|
7
7
|
## Main application port
|
|
8
8
|
quarkus.http.port=8082
|
|
9
9
|
|
|
10
10
|
###############################################################################
|
|
11
11
|
# SSL configuration section. #
|
|
12
12
|
###############################################################################
|
|
13
13
|
|
|
14
14
|
## To enable serving requests via HTTPS uncomment the following parameters:
|
|
15
15
|
#quarkus.http.insecure-requests=disabled
|
|
16
16
|
#quarkus.http.ssl-port=8082
|
|
17
17
|
#quarkus.http.ssl.certificate.key-store-file=/opt/osmax-provisioner/keystore.jks
|
|
18
18
|
#quarkus.http.ssl.certificate.key-store-password=keystore@12345
|
|
19
19
|
|
|
20
20
|
###############################################################################
|
|
21
21
|
# REST clients common configuration #
|
|
22
22
|
###############################################################################
|
|
23
23
|
|
|
24
24
|
## SSL connection parameters sections.
|
|
25
25
|
## To enable accessing REST endpoints via HTTPS uncomment two following parameters:
|
|
26
26
|
#quarkus.rest-client.trust-store=/etc/ssl/certs/java/cacerts
|
|
27
27
|
#quarkus.rest-client.trust-store-password=changeit
|
|
28
28
|
## Optionally if the custom truststore is used:
|
|
29
29
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
30
30
|
#quarkus.rest-client.trust-store-type=PKCS12
|
|
31
31
|
## For disabling SSL connection verification you can use option below
|
|
32
32
|
#quarkus.rest-client.remote-access.trust-all=true
|
|
33
33
|
|
|
34
34
|
###############################################################################
|
|
35
35
|
# Security section #
|
|
36
36
|
###############################################################################
|
|
37
37
|
|
|
38
38
|
## Enable/disable authentication
|
|
39
39
|
osmax.provisioner.security.authentication.enabled=true
|
|
40
40
|
|
|
41
41
|
## Enable/disable role-based authorization
|
|
42
42
|
osmax.provisioner.security.rbac.enabled=false
|
|
43
43
|
|
|
44
44
|
## osmax-core base url (source of user permissions info)
|
|
45
45
|
# Should be set even if osmax.provisioner.security.rbac.enabled is false
|
|
46
46
|
# To enable access via HTTPS use corresponding prefix in base url
|
|
47
47
|
# and configure REST client using REST clients common configuration section above
|
|
48
48
|
quarkus.rest-client."tech.inno.lcm.provisioner.common.security.OsmaxPermissionsService".url=<osmax-core base url>
|
|
49
49
|
|
|
50
50
|
## Kerberos authentication configuration section
|
|
51
51
|
## There are 2 alternative options for defining Kerberos credentials [principal realm, name and password]:
|
|
52
52
|
## 1) via setting values in properties directly
|
|
53
53
|
## 2) via setting path to keytab file
|
|
54
54
|
##
|
|
55
55
|
## Direct Kerberos credentials definition:
|
|
56
56
|
quarkus.kerberos.service-principal-name=<service_principal_name>
|
|
57
57
|
quarkus.kerberos.service-principal-realm=<service.domain>
|
|
58
58
|
quarkus.kerberos.service-principal-password=<service_principal_password>
|
|
59
59
|
## Direct Kerberos credentials definition for REST client, reuse service settings:
|
|
60
60
|
kerberos-client.user-principal-name=${quarkus.kerberos.service-principal-name}
|
|
61
61
|
kerberos-client.user-principal-password=${quarkus.kerberos.service-principal-password}
|
|
62
62
|
kerberos-client.user-principal-realm=${quarkus.kerberos.service-principal-realm}
|
|
63
63
|
kerberos-client.service-principal-name=${quarkus.kerberos.service-principal-name}
|
|
64
64
|
## Kerberos keytab file definition:
|
|
65
65
|
#quarkus.kerberos.keytab-path=</path/to/keytab/file>
|
|
66
66
|
#kerberos-client.keytab-path=</path/to/keytab/file>
|
|
67
|
+
|
|
67
68
|
## Enables Kerberos authentication debug mode
|
|
68
69
|
#quarkus.kerberos.debug=true
|
|
69
70
|
#kerberos-client.debug=true
|
|
70
71
|
## REST client debug
|
|
71
72
|
#quarkus.rest-client.logging.scope=request-response
|
|
72
73
|
#quarkus.rest-client.logging.body-limit=50
|
|
73
74
|
#quarkus.log.category."org.jboss.resteasy.reactive.client.logging".level=DEBUG
|
|
74
75
|
|
|
75
76
|
###############################################################################
|
|
76
77
|
# Database properties section #
|
|
77
78
|
###############################################################################
|
|
78
79
|
|
|
79
80
|
## Common configuration for datasources
|
|
80
81
|
quarkus.datasource.username=<db-username>
|
|
81
82
|
quarkus.datasource.password=<db-password>
|
|
82
83
|
## Reactive datasource configuration for app
|
|
83
84
|
quarkus.datasource.reactive.url=postgresql://<db-host>:<db-port>/<db-name>
|
|
84
85
|
## Datasource configuration for Liquibase
|
|
85
86
|
quarkus.datasource.jdbc.url=jdbc:postgresql://<db-host>:<db-port>/<db-name>
|
|
86
87
|
|
|
87
88
|
## If you need to specify multiple datasource connections for load-balancing or working with clustered db use the syntax below
|
|
88
89
|
#quarkus.datasource."osmax_provisioner_db".reactive.url=postgresql://host1:5432/lcm_provisioner,postgresql://host2:5432/lcm_provisioner,postgresql://host3:5432/lcm_provisioner
|
|
89
90
|
## Or this can also be written with indexed property syntax
|
|
90
91
|
#quarkus.datasource."osmax_provisioner_db".reactive.url[0]=postgresql://host1:5432/lcm_provisioner
|
|
91
92
|
#quarkus.datasource."osmax_provisioner_db".reactive.url[1]=postgresql://host2:5432/lcm_provisioner
|
|
92
93
|
#quarkus.datasource."osmax_provisioner_db".reactive.url[2]=postgresql://host3:5432/lcm_provisioner
|
|
93
94
|
|
|
94
95
|
## Liquibase parameters which are used in changelog files
|
|
95
96
|
quarkus.liquibase.change-log-parameters.index_tablespace=pg_default
|
|
96
97
|
quarkus.liquibase.change-log-parameters.data_tablespace=pg_default
|
|
97
98
|
quarkus.liquibase.change-log-parameters.installation_distro_repository_url=http://<astra-linux-repository-location>
|
|
98
99
|
quarkus.liquibase.change-log-parameters.installation_distro_kernel=</path/to/kernel>
|
|
99
100
|
quarkus.liquibase.change-log-parameters.installation_distro_initrd=</path/to/initrd>
|
|
100
101
|
quarkus.liquibase.change-log-parameters.distro_repository_hostname=<astra-linux-repository-location>
|
|
101
102
|
quarkus.liquibase.change-log-parameters.distro_repository_directory=</path/to/repository>
|
|
102
103
|
|
|
103
104
|
###############################################################################
|
|
104
105
|
# Template engine properties section #
|
|
105
106
|
###############################################################################
|
|
106
107
|
|
|
107
108
|
## To specify custom template placeholders which can be used in Jinja templates use a key-value format like
|
|
108
109
|
## 'osmax.provisioner.template-engine.template-placeholders.my_custom_placeholder=my-value-for-custom-placeholder'
|
|
109
110
|
## Be aware that specified custom template placeholders
|
|
110
111
|
## should be used in exact format as they are specified in this configuration
|
|
111
112
|
## To enable SSL connection mode replace
|
|
112
113
|
## 'osmax.provisioner.template-engine.template-placeholders.osmax_provisioner_base_url' parameter with following value:
|
|
113
114
|
#osmax.provisioner.template-engine.template-placeholders.osmax_provisioner_base_url=https://<osmax-provisioner-host>:<port>
|
|
114
115
|
osmax.provisioner.template-engine.template-placeholders.osmax_provisioner_base_url=http://<osmax-provisioner-host>:<port>
|
|
115
116
|
osmax.provisioner.template-engine.template-placeholders.unattended_install_file_url=/v1/unattended_install_files
|
|
116
117
|
osmax.provisioner.template-engine.template-placeholders.repository_cert_url=</path/to/certificate>
|
|
117
118
|
|
|
118
119
|
###############################################################################
|
|
119
120
|
# Installation process properties section #
|
|
120
121
|
###############################################################################
|
|
121
122
|
|
|
122
123
|
osmax.provisioner.installation-process.steps.READY_TO_INSTALL=\u0413\u043E\u0442\u043E\u0432\u043E \u043A \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043A\u0435
|
|
123
124
|
osmax.provisioner.installation-process.steps.IN_PROCESS_EARLY=\u0417\u0430\u043F\u0443\u0449\u0435\u043D \u043F\u0440\u043E\u0446\u0435\u0441\u0441 \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043A\u0438 Astra Linux SE
|
|
124
125
|
osmax.provisioner.installation-process.steps.INSTALL_ERROR_KERNEL=\u041E\u0448\u0438\u0431\u043A\u0430 \u043F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u044F \u0444\u0430\u0439\u043B\u0430 kernel
|
|
125
126
|
osmax.provisioner.installation-process.steps.INSTALL_ERROR_INITRD=\u041E\u0448\u0438\u0431\u043A\u0430 \u043F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u044F \u0444\u0430\u0439\u043B\u0430 initrd
|
|
126
127
|
osmax.provisioner.installation-process.steps.INSTALL_ERROR_BOOT=\u041E\u0448\u0438\u0431\u043A\u0430 \u0437\u0430\u0433\u0440\u0443\u0437\u043A\u0438 \u044F\u0434\u0440\u0430
|
|
127
128
|
osmax.provisioner.installation-process.steps.FINISHED=\u041E\u0421 \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043B\u0435\u043D\u0430
|
|
128
129
|
|
|
130
|
+
## Unprovisioned machines export configuration
|
|
129
131
|
osmax.provisioner.installation-process.machine-export.scheduler-cron-expression=0 */10 * ? * *
|
|
130
132
|
osmax.provisioner.installation-process.machine-export.batch-size=100
|
|
131
133
|
|
|
134
|
+
## Unprovisioned machines import configuration
|
|
135
|
+
osmax.provisioner.installation-process.machine-import.default-network-interface-names=eth0,enp0s3
|
|
136
|
+
|
|
132
137
|
###############################################################################
|
|
133
|
-
# Scheduler properties section
|
|
138
|
+
# Scheduler properties section #
|
|
134
139
|
###############################################################################
|
|
135
140
|
|
|
141
|
+
# Defines how often the scheduler checks for tasks due to execution
|
|
136
142
|
osmax.provisioner.scheduler.polling-interval=10s
|
|
137
143
|
|
|
138
144
|
###############################################################################
|
|
145
|
+
# Bootable images properties section #
|
|
146
|
+
###############################################################################
|
|
147
|
+
|
|
148
|
+
## Universal boot image paths
|
|
149
|
+
osmax.provisioner.universal-boot-image.ipxe_lkrn_url=insert-your-path
|
|
150
|
+
osmax.provisioner.universal-boot-image.isohdpxf_bin_url=insert-your-path
|
|
151
|
+
osmax.provisioner.universal-boot-image.isolinux_bin_url=insert-your-path
|
|
152
|
+
osmax.provisioner.universal-boot-image.ldlinux_c32_url=insert-your-path
|
|
153
|
+
osmax.provisioner.universal-boot-image.menu_c32_url=insert-your-path
|
|
154
|
+
osmax.provisioner.universal-boot-image.ipxe_x86_64_efi_url=insert-your-path
|
|
155
|
+
|
|
156
|
+
###############################################################################
|
|
139
157
|
# S3 integration section #
|
|
140
158
|
###############################################################################
|
|
141
159
|
|
|
142
160
|
## S3 server configuration
|
|
143
161
|
## To enable SSL connection mode replace 'osmax.provisioner.s3.server-uri' parameter with following value:
|
|
144
162
|
#osmax.provisioner.s3.server-uri=https://<s3-host>:<s3-port>
|
|
145
163
|
osmax.provisioner.s3.server-uri=http://<s3-host>:<s3-port>
|
|
146
164
|
osmax.provisioner.s3.access-key-id=<s3-access-key-id>
|
|
147
165
|
osmax.provisioner.s3.secret-access-key=<s3-secret-access-key>
|
|
148
166
|
osmax.provisioner.s3.region=ru-location-1
|
|
149
167
|
|
|
150
168
|
## Path to ISO images bucket where generated ISO images will be located
|
|
151
169
|
osmax.provisioner.s3.bootable-images-bucket-name=os-installation-iso-images-bucket
|
|
152
170
|
|
|
153
171
|
###############################################################################
|
|
154
172
|
# Kafka integration section #
|
|
155
173
|
###############################################################################
|
|
156
174
|
|
|
157
175
|
mp.messaging.connector.smallrye-kafka.bootstrap.servers=localhost:19092
|
|
158
176
|
mp.messaging.outgoing.machine-installation-status.topic=provisioner-topic
|
|
159
177
|
mp.messaging.incoming.reinstallation-machines-import.topic=osmax-core.os.reinstallation.machines
|
|
160
178
|
mp.messaging.outgoing.reinstallation-machines-import-result.topic=osmax-provisioner.os.reinstallation.machines.registration.statuses
|
|
161
179
|
|
|
162
180
|
## Kafka SSL connection parameters section.
|
|
163
181
|
## To enable SSL connection mode uncomment three following parameters:
|
|
164
182
|
#mp.messaging.connector.smallrye-kafka.security.protocol=SSL
|
|
165
183
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.location=/etc/ssl/certs/java/cacerts
|
|
166
184
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.password=changeit
|
|
167
185
|
## Optionally if the custom truststore is used:
|
|
168
186
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
169
187
|
#mp.messaging.connector.smallrye-kafka.ssl.truststore.type=PKCS12
|
|
170
188
|
|
|
171
189
|
## To enable mutual TLS connection mode uncomment three following parameters, along with configuration above:
|
|
172
190
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.location=/opt/osmax-provisioner/keystore.jks
|
|
173
191
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.password=keystore@12345
|
|
174
192
|
## Optionally if the custom keystore is used:
|
|
175
193
|
## To change the format use one of JKS, JCEKS, P12, PKCS12, PFX. Default format is JKS
|
|
176
194
|
#mp.messaging.connector.smallrye-kafka.ssl.keystore.type=PKCS12
|
|
177
195
|
|
|
178
196
|
###############################################################################
|
|
179
197
|
# Logging section #
|
|
180
198
|
###############################################################################
|
|
181
199
|
|
|
182
200
|
# Common logging config
|
|
183
201
|
quarkus.log.file.enable=true
|
|
184
202
|
quarkus.log.json.file.enable=true
|
|
185
203
|
quarkus.log.json.console.enable=false
|
|
186
204
|
|
|
187
205
|
# Json log format config
|
|
188
206
|
quarkus.log.json.fields.mdc.flat-fields=true
|
|
189
207
|
quarkus.log.json.fields.timestamp.date-format=yyyy-MM-dd'T'HH:mm:ss.SSS'Z'
|
|
190
208
|
quarkus.log.json.fields.timestamp.zone-id=UTC
|
|
191
209
|
|
|
192
210
|
# File logging config
|
|
193
211
|
quarkus.log.file.path=/var/log/osmax/provisioner/osmax-provisioner.log
|
|
194
212
|
quarkus.log.file.rotation.max-file-size=10M
|
|
195
213
|
quarkus.log.file.rotation.max-backup-index=5
|
|
196
214
|
quarkus.log.file.rotation.file-suffix=.yyyy-MM-dd.gz
|
|
197
215
|
|
|
198
216
|
# Audit logging config
|
|
199
217
|
quarkus.log.handler.file.audit-handler.enable=true
|
|
200
218
|
quarkus.log.handler.file.audit-handler.path=/var/log/osmax/provisioner/audit-osmax-provisioner.log
|
|
201
219
|
quarkus.log.handler.file.audit-handler.rotation.max-file-size=10M
|
|
202
220
|
quarkus.log.handler.file.audit-handler.rotation.max-backup-index=50
|
|
203
221
|
quarkus.log.handler.file.audit-handler.rotation.file-suffix=.yyyy-MM-dd
|
|
204
222
|
quarkus.log.category."AUDIT".level=INFO
|
|
205
223
|
quarkus.log.category."AUDIT".handlers=audit-handler
|
|
206
|
-
quarkus.log.category."AUDIT".use-parent-handlers=false
|
|
207
|
-
|
|
208
|
-
# Universal boot image paths
|
|
209
|
-
osmax.provisioner.universal-boot-image.ipxe_lkrn_url=insert-your-path
|
|
210
|
-
osmax.provisioner.universal-boot-image.isohdpxf_bin_url=insert-your-path
|
|
211
|
-
osmax.provisioner.universal-boot-image.isolinux_bin_url=insert-your-path
|
|
212
|
-
osmax.provisioner.universal-boot-image.ldlinux_c32_url=insert-your-path
|
|
213
|
-
osmax.provisioner.universal-boot-image.menu_c32_url=insert-your-path
|
|
214
|
-
osmax.provisioner.universal-boot-image.ipxe_x86_64_efi_url=insert-your-path
|
|
224
|
+
quarkus.log.category."AUDIT".use-parent-handlers=false
|