7 IWF Configurable Parameters
This section includes information about configurable parameters required during IWF installation.
The following tables describes the configuration parameters
for each micro service that is configured during IWF deployment using
ociwf-custom.values.yaml
file:
pcf-gateway Microservice
Table 7-1 pcf-gateway Microservice
Parameter | Description | Default Value |
---|---|---|
global.dockerRegistry | Image repo | cgbudocker.us.oracle.com :5655 |
global.imageTag | Image tag | latest |
pcf.deploymentOcpmPcfDiamGateway.envGatewayMode | Mode of gateway | bsf |
pcf.deploymentOcpmPcfDiamGateway.image | Name of the image | diam-gateway |
pcf.deploymentOcpmPcfDiamGateway.imageTag | Tag of the Image | 1.5.0 |
pcf.hostIp | Host IP | slave1=10.196.46.13 |
iwf-mediation
Table 7-2 IWF Mediation Microservice
Parameter | Description | Default Value |
---|---|---|
image.name | Image name | ocmed-iwf-mediation |
image.repository | Image repository name | reg-1:5000 |
image.tag | Tag of Image | 1.5.0 |
service.active.ForwardToTest | Whether Trial rule test needs to be enabled or not | Disable |
service.active.nodePortHttp | Http port to receive traffic | 30079 |
service.active.nodePortHttps | Https port to receive traffic | 30080 |
iwf-mediation-test Microservice
Table 7-3 iwf-mediation-test Microservice
Parameter | Description | Default Value |
---|---|---|
image.repository | Image repository name | reg-1:5000 |
Image name | Image name | ocmed-iwfmediation |
image.tag | Tag of Image | 1.5.0 |
nf-mediation
Table 7-4 NF Mediation Microservice
Parameter | Description | Default Value |
---|---|---|
image.name | Image name | ocmed-nf-mediation |
image.repository | Image repository name | reg-1:5000 |
image.tag | Tag of Image | 1.5.0 |
service.active.ForwardToTest | Whether Trial rule test needs to be enabled or not | Disable |
service.active.nodePortHttp | Http port to receive traffic | 30081 |
service.active.nodePortHttps | Https port to receive traffic | 30082 |
nf-mediation-test Microservice
Table 7-5 nf-mediation-test Microservice
Parameter | Description | Default Value |
---|---|---|
image.repository | Image repository name | reg-1:5000 |
Image name | Image name | ocmed-nfmediation |
image.tag | Tag of Image | 1.5.0 |
iwf-d2h
Table 7-6 IWF D2H Microservice
Parameter | Description | Default Value |
---|---|---|
image.repository | Image repository name | reg-1:5000 |
image.name | Image name | ociwf-iwfd2h |
image.tag | Tag of Image | 1.5.0 |
opentracingHost | Kubernetes master node IP addres | 127.0.0.1 (Customer must provide the correct IP address) |
opentracingPort | UDP node port of Jaeger-Agent | 0 (Customer must provide the correct port) |
iwf-h2d
Table 7-7 IWF H2D Microservice
Parameter | Description | Default Value |
---|---|---|
image.repository | Image repository name | reg-1:5000 |
image.name | Image name | ociwf-iwfh2d |
image.tag | Tag of Image | 1.5.0 |
opentracingHost | Kubernetes master node IP address | 127.0.0.1 (Customer must provide the correct IP address) |
opentracingPort | UDP node port of Jaeger-Agent | 0 (Customer must provide the correct port) |
iwf-diameterproxy
Table 7-8 IWF Diameter Proxy Microservice
Parameter | Description | Default Value |
---|---|---|
image.repository | Image repository name | reg-1:5000 |
image.name | Image name | ociwf-iwfdiamproxy |
image.tag | Tag of Image | 1.5.0 |
DIAMETER_Realm | Diameter Realm of PT diameter node | Customer must provide the realm to be used |
DIAMETER_Identity | FQDN of PT diameter node | Customer must provide the FQDN to be used |
dpDBService1 | MySQL cluster's node-1 IP address or MySQL K8s service name | iwf-pt-mysql-svc (customer must provide correct value) |
dpDBService2 | MySQL cluster's node-2IP addressor MySQL K8s service name | iwf-pt-mysql-svc (customer must provide correct value) |
opentracingHost | Kubernetes master node IP address | 127.0.0.1 (Customer must provide the correct IP address) |
opentracingPort | UDP node port of Jaeger-Agent | 0 (Customer must provide the correct port) |
pcfDiscoveryMode | Flag which enables to switch modes(PDRA and D2H) | true |
connectorMode | Mode of Diameter Connector | bsf |
iwf-mysql
Table 7-9 IWF MYSQL Microservice
Parameter | Description | Default Value | Notes |
---|---|---|---|
enabled | Option to provision local K8s MySQL pod | false | Customer needs to fill it. When set to true the local mysql pod is brought up (Note: This is only for testing purpose, not for production. Production environment is expected to use MySQL cluster) |
mysqlUser | MySQL User name | iwfusr | Customer needs to fill the user name to be used Note: This is only applicable when the above mentioned "enabled" option is set to true, else customer need not configure. |
mysqlPassword | MySQL User password | Customer needs to fill the user password to be used (Note: This is only applicable when the above mentioned "enabled" option is set to true, else customer need not configure) | |
initializationFiles.iwf-db.sql | Mysql ddl commands to be run while deploying the Mysql pod | CREATE DATABASE IF NOT EXISTS iwfdb DEFAULT CHARACTER SET utf8 DEFAULT COLLATE utf8_general_ci; | Should Not be changed (Note: This is only applicable when the above mentioned "enabled" option is set to true, else customer need not configure) |
initializationFiles.permission.sql | Mysql permission to the user | GRANT ALL PRIVILEGES ON *.* TO 'iwfusr'@'%'; | Customer needs to edit the "user name" in the command command, based on the value set to " mysqlUser" option. (Note: This is only applicable when the above mentioned "enabled" option is set to true, else customer need not configure) |
iwf-nrfclient
Table 7-10 IWF NRF Client Microservice
Parameter | Description | Default Value |
---|---|---|
ociwf-appinfo | For checking the status of the NF's registered services | app_info:1.5.1 |
ociwf-performance | For monitoring and analysis of the services to probe performance data, and provide analysis output including load, capacity | perf_info:1.5.0 |
ociwf-nrf-client-nfdiscovery | For performing NfRegistration, NfSubscription and NfDiscovery | nrf-client:1.2.2 |
ociwf-ocpm-config | config_server:1.5.0 | |
readiness-detector | nrf-client/readiness-detector:latest |
Table 7-11 iwf-pcfdiscovery Microservice
Parameter | Description | Default Value |
---|---|---|
image.repository | Image repository Name | reg-1:5000 |
image.name | Image Name | ociwf |
image.tag | Tag or Image | 1.5.0 |
opentracingHost | Kubernetes master node IP address | 127.0.0.1 (Customer must provide the correct IP address) |
opentracingPort | UDP node port of Jaeger-Agent | 0 (Customer must provide the correct port) |
bsfSvc | Service or IP of the BSF | |
bsfPort | Port of the BSF | 8080 |
Diameter Peer configuration
Peer nodes are configured in gateway in
configmap-pcf-diam-gateway-service-diameter.yaml
file in location of chart pcf/templates
The sample is provided below:
apiVersion: v1
kind: ConfigMap
metadata:
name: pcf-diam-gateway-config-peers
data:
diameter-config-peers: |
version: '0.3'
kind: 'diameter-config'
metadata:
label: 'diameter-config-peers'
setting:
reconnectDelay: 3
responseTimeout: 5
connectionTimeOut: 3
watchdogInterval: 6
transport: 'TCP'
# type: [af, dra]
nodes:
- name: 'P-CSCF'
type: 'pcrf'
responseOnly: true
host: '10.75.215.205'
port: 3880
realm: 'ociwf.oracle.com'
identity: 'pcrfsim.ociwf.oracle.com'
Parameters | Definitions | |
---|---|---|
reconnectDelay | Time delay in seconds between successive peer connection establishment attempts | |
responseTimeout | Response timer value in seconds | |
connectionTimeOut | Connection timer value in seconds | |
watchdogInterval | Inactivity time in seconds after which DWR will be triggered | |
transport | Transport protocol type "TCP" | |
Nodes (list) | name | Name of the peer node |
responseOnly | Indicates the Diameter GW proxy client or server | |
host | IP address of the peer node | |
port | Port on which peer node listens for connections | |
realm | Realm of the peer node | |
identity | FQDN of the peer node |
ingress-gw Microservice
Parameter | Description | Mandatory Parameter | Default value |
---|---|---|---|
image.repository | Image repository name | Yes | reg-1:5000 |
image.name | Image name | Yes | ocingress_gateway |
image.tag | Tag of Name | Yes | 1.7.4 |
Table 7-12 Ingress Gateway
Name | Description | Default Value | Mandatory | Notes |
---|---|---|---|---|
global.dockerRegistry | Name of the Docker registry which hosts Ingress docker images. | ocnrf-registry.us.oracle.com:5000 | Yes | This is the registry which has docker images. Change this value if there is a need. |
global.type | type of service | LoadBalancer | Yes | Possible values are :- ClusterIP, NodePort, LoadBalancer and ExternalName |
global.serviceAccountName | Service Account name | '' | No | |
global.metalLbIpAllocationEnabled | Enable or disable IP Address allocation from Metallb Pool | true | No | |
global.metalLbIpAllocationAnnotation | Address Pool Annotation for Metallb | metallb.universe.tf/address-pool: signaling | No | |
global.staticIpAddressEnabled | If Static load balancer IP needs to be set, then set staticIpAddressEnabled flag to true and provide value for staticIpAddress Else random IP will be assigned by the metalLB from its IP Pool | false | No | |
global.staticIpAddress | StaticIp | 10.75.212.60 | ||
global.publicHttpSignalingPort | Http Signaling port | 80 | Yes | |
global.publicHttpsSignallingPort | Https Signaling port | 443 | Yes | |
global.staticNodePortEnabled | Node Port Enabled | true | No | |
global.staticHttpNodePort | Http Node Port | 30075 | Yes | |
global.staticHttpsNodePort | Https Node Port | 30043 | Yes | |
global.configServerFullNameOverride | This parameter is for the usage of policy teams. Other teams can ignore this parameter. | No | ||
enableOutgoingHttps | Enabling it for outgoing https request | false | Yes | Change it to true for enabling https for outgoing requests. |
enableIncomingHttp | Enabling it for incoming http request | false | Yes | |
enableIncomingHttps | Enabling it for incoming https request | true | Yes | |
enablehttp1 | Enable it for http1.1 | false | No | Change it to true to enable |
dnsRefreshDelay | Dns Refresh Delay in milli-seconds | 120000 | No | |
oauthValidatorEnabled | Oauth Validator Enabled | false | Yes | Change it to true to enable oauth |
jaegerTracingEnabled | Enable jaeger tracing | false | No | Change it to true if needed. |
openTracing.jaeger.udpSender.host | Jaeger Host | jaeger-agent.cne-infra | Yes (If jaegerTracingEnabled is true) | |
openTracing.jaeger.udpSender.port | Jaeger Port | 6831 | Yes (If jaegerTracingEnabled is true) | |
openTracing.jaeger.probabilisticSampler | 0.5 | Yes (If jaegerTracingEnabled is true) | ||
nfType | NFType of service producer. | Value to be updated accordingly | Yes (When oauthValidatorEnabled) | |
nfInstanceId: | NF InstanceId of service producer. | Value to be updated accordingly | Yes (When oauthValidatorEnabled) | |
producerScope: | Comma-separate list of services hosted by service producer. | Value to be updated accordingly | Yes (When oauthValidatorEnabled) | |
allowedClockSkewSeconds | set this value if clock on the parsing NF(producer) is not perfectly in sync with the clock on the NF(consumer) that created the JWT. | 0 | Yes (When oauthValidatorEnabled) | |
nrfPublicKeyKubeSecret | Name of the secret which stores the public key(s) of NRF. | Value to be updated accordingly | Yes (When oauthValidatorEnabled) | |
nrfPublicKeyKubeNamespace | Namespace of the NRF publicKey Secret | Value to be updated accordingly | Yes (When oauthValidatorEnabled) | |
validationType | Values can be "strict" or "relaxed". "strict" means that incoming request without "Authorization" (Access Token) header will be rejected."relaxed" means that if incoming request contains "Authorization" header, it will be validated. If incoming request does not contain "Authorization" header, validation will be ignored. | Value to be updated accordingly | Yes (When oauthValidatorEnabled) | |
producerPlmnMNC | MNC of service producer. | Value to be updated accordingly | No | |
producerPlmnMCC | MCC of service producer. | Value to be updated accordingly | No | |
cncc.enabled |
CNCC Identity-Access-Management(IAM). |
False | No | Change it to true if required. |
cncc.core.sessionTimeoutSeconds | Session Timeout Value in Seconds.
Default: 1800, Minimum: 300, Maximum: 7200 |
1800 | No | |
cnccIamEnabled | CNCC Identity-Access-Management (IAM) | false | No | Change it to true if required |
ingressGwCertReloadEnabled | true | No | ||
rateLimiting.enabled | Ratelimiting feature enabled | false | No | |
routeRateLimiting.enabled | Route based ratelimiting feature enabled | true | No | |
globalIngressRateLimiting.enabled | Global rate limiting is enabled | true | No | |
globalIngressRateLimiting.duration | Iterations of time duration (In seconds) for which bucketCapacity and refillRate are reset. | 1 (in seconds) | yes (if globalIngressRateLimiting.enabled) | |
globalIngressRateLimiting.burstCapacity | Holds maximum number of tokens in the bucket for the given duration. | 1 | yes (if globalIngressRateLimiting.enabled) | |
globalIngressRateLimiting.refillRate | Number of tokens to be added to the bucket for the given duration | 1 | yes (if globalIngressRateLimiting.enabled) | |
identityAccessMgt.uri | Identity access management uri | yes (if cnccIamEnabled) | ||
identityAccessMgt.path | Identity access management path | yes (if cnccIamEnabled) | ||
identityAccessMgt.realm | Identity access management realm | yes (if cnccIamEnabled) | ||
identityAccessMgt.clientId | Identity access management client id | yes (if cnccIamEnabled) | ||
iam.uri The section name is changed to iam |
Identity access management uri | yes (if cnccIamEnabled) | ||
iam.path | Identity access management path | yes (if cnccIamEnabled) | ||
iam.realm | Identity access management realm | yes (if cnccIamEnabled) | ||
iam.clientId | Identity access management client id | yes (if cnccIamEnabled) | ||
pingDelay | Delay between pings in seconds. When set to <=0,ping is disabled | 60 | Yes | PING frame can be scheduled at Ingress-gateway to maintain connection between Ingress-gateway and backend micro-services even if the connection is idle. |
cfgServer.enabled | Config server switch. For the usage of Policy teams. For other NF's this has to be left false | false | No | |
publicHttpSignalingPort | Http Signalling port | 80 | Yes | |
publicHttpsSignallingPort | Https Signalling port | 443 | Yes | |
ssl.privateKey.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.privateKey.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.privateKey.rsa.fileName | rsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.privateKey.ecdsa.fileName | ecdsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.rsa.fileName | rsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.ecdsa.fileName | ecdsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.caBundle.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.caBundle.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.caBundle.rsa.fileName | rsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.keyStorePassword.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.keyStorePassword.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.keyStorePassword.fileName | File name that has password for keyStore | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.trustStorePassword.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.trustStorePassword.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.trustStorePassword.fileName | File name that has password for trustStore | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
publicHttpSignalingPort | Http Signalling port | 80 | Yes | |
publicHttpsSignallingPort | Https Signalling port | 443 | Yes | |
ssl.privateKey.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.privateKey.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.privateKey.rsa.fileName | rsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.privateKey.ecdsa.fileName | ecdsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.rsa.fileName | rsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.certificate.ecdsa.fileName | ecdsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.caBundle.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.caBundle.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.caBundle.rsa.fileName | rsa private key file name | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.keyStorePassword.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.keyStorePassword.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.keyStorePassword.fileName | File name that has password for keyStore | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.trustStorePassword.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.trustStorePassword.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
ssl.trustStorePassword.fil eName | File name that has password for trustStore | n/a | Yes (If enableIncomingHttp is true otherwise No) | |
uri | Service name of the internal microservice of this NF | Yes | ||
id | id of the route | Yes | ||
path | Provide the path to be matched. | Yes | ||
order | Provide the order of the execution of this route. | Yes | ||
methodRateLimiting.burstCapacity[0] | burstCapacity | Yes (if routeRateLimiting.enabled) | ||
methodRateLimiting.refillRate[0] | Refill rate | Yes (if routeRateLimiting.enabled) | ||
methodRateLimiting.duration[0] | Duration | Yes (if routeRateLimiting.enabled) | ||
methodRateLimiting.method[0] | Method on which ratelimiting is applicable | Yes (if routeRateLimiting.enabled) | ||
image.name | Image name of ingress gateway | ocingress_gateway | No | |
image.tag | Image Tag name of ingress gateway | 1.6.2 | No | |
image.pullPolicy | Image Pull Policy | Always | No | |
initContainersImage.name | Image name of initContainer | configurationinit | No | |
initContainersImage.tag | Image tag name of initContainer | 1.1.1 | No | |
initContainersImage.pullPolicy | Image Pull Policy | Always | No | |
updateContainersImage.name | Image name of updateContainer | configurationupdate | No | |
updateContainersImage.tag | Image tag name of updateContainer | 1.1.1 | No | |
updateContainersImage.pullPolicy | Image Pull Policy | Always | No | |
fullnameOverride | Label to override name of api-gateway micro-service name | ingress | Yes | |
serviceMeshCheck | Load balancing will be handled by Ingress gateway, if true it would be handled by serviceMesh | false | Yes | |
cipherSuites | Supported Cipher Suites in Ingress |
|
No | |
maxRequestsQueuedPerDestination | Jetty Client Settings | 1024 | No | |
maxConnectionsPerDestination | Jetty Client Settings | 4 (This will be used when
serviceMeshCheck is enabled)
|
No | |
maxConnectionsPerIp | Jetty Client Settings | 4 | No | |
connectionTimeout | Jetty Client Settings | 10000 | No | |
ingressGwCertReloadPath | /ingress-gw/certificate/reload |
No | ||
ssl.tlsVersion | TLS Version | TLSv1.2 | Yes | |
ssl.initialAlgorithm | RSA256 | Yes | ES256 can also be used, but corresponding certificates need to be used. | |
resources.limits.cpu | CPU Limit | 2 | ||
resources.limits.memory | Memory Limit | 4Gi | ||
resources.limits.initServiceCpu | Init Container CPU Limit | 1 | ||
resources.limits.updateServiceCpu | Update Container CPU Limit | 1 | ||
resources.limits.initServiceMemory | Init Container Memory Limit | 1Gi | ||
resources.limits.updateServiceMemory | Update Container Memory Limit | 1Gi | ||
resources.requests.cpu | CPU for requests | 1 | ||
resources.requests.memory | Memory for requests | 2Gi | ||
resources.requests.initServiceCpu | Init Container CPU for requests | 1 | ||
resources.requests.updateServiceCpu | Update Container CPU for requests | 1 | ||
resources.requests.initServiceMemory | Init Container Memory for requests | 1Gi | ||
resources.requests.updateServiceMemory | Update Container Memory for requests | 1Gi | ||
resources.target.averageCpuUtil | 80 | |||
minReplicas | Min replicas to scale to maintain an average CPU utilization | 2 | Yes | |
maxReplicas | Max replicas to scale to maintain an average CPU utilization | 5 | Yes | |
log.level.root | Log level for root logs | WARN | No | |
log.level.ingress | Log level for ingress logs | INFO | No | |
log.level.oauth | Log level for oauth logs | INFO | No | |
ports.containerPort | ContainerPort represents a network port in a single container | 8081 | No | |
ports.containersslPort | 8443 | No | ||
actuatorPort | ActuatorPort | 9090 | No |
egress-gw Microservice
Parameter | Description | Mandatory Parameter | Default value |
---|---|---|---|
image.repository | Image repository name | Yes | reg-1:5000 |
image.name | Image name | Yes | ocengress_gateway |
image.tag | Tag of Name | Yes | 1.7.4 |
Table 7-13 Egress Gateway
Name | Description | Default Value | Mandatory | Notes |
---|---|---|---|---|
global.appinfoServiceEnable | Enabled to get RBAC permission for k8s apiserver communication | true | Yes | |
global.dockerRegistry | Name of the Docker registry which hosts Egress docker images. | ocnrf-registry.us.oracle.com:5000 | Yes | Ideally this is the registry which has docker images. Change this value if there is a need. |
global.serviceAccountName | Service Account Name | '' | No | |
serviceEgressGateway.port | 8080 | No | ||
serviceEgressGateway.sslPort | SSL Port | 8442 | No | |
serviceEgressGateway.actuatorPort | Actuator Port | 9090 | No | |
enableOutgoingHttps | Enabling it for outgoing https request | false | No | Change it to true for enabling https for outgoing requests. |
K8ServiceCheck | Enable this if loadbalancing is to be done by egress instead of K8s | false | No | |
scp.scpDefaultScheme | Default scheme applicable when 3gpp-sbi-target-apiroot header is missing | https | No | |
scp.scpIntegrationEnabled | Change this to false when scp integration is not required | true | No | |
scp.scpRerouteEnabled | Set this flag to true if re-routing to multiple SCP instances is to be enabled. | true | No | |
scp.instances.http[0].host | First Scp instance HTTP IP/FQDN | NA | Yes(If "scp.scpIntegrationEnabled" is set to true.) | More SCP instances can be configured in a similar way if required. |
scp.instances.http[0].port | First Scp instance Port | NA | Yes(If "scp.scpIntegrationEnabled" is set to true.) | |
scp.instances.http[0].apiPrefix | First Scp instance apiPrefix. Change this value to corresponding prefix if "/" is not expected to be provided along. Applicable only for SCP with TLS enabled. | / | No | Examples : XXX, Point to be noted here is that / is not required to be included when providing some data. |
scp.instances.https[0].host | First Scp instance HTTPS IP/FQDN | NA | Yes(if "scp.scpIntegrationEnabled" is set to true.) | More SCP instances can be configured in a similar way if required. |
scp.instances.https[0].port | First Scp instance HTTPS Port | NA | Yes(if "scp.scpIntegrationEnabled" is set to true.) | |
scp.instances.https[0].apiPrefix | First Scp instance apiPrefix. Change this value to corresponding prefix if "/" is not expected to be provided along. Applicable only for SCP with TLS enabled. | / | No | Examples : XXX, Point to be noted here is that / is not required to be included when providing some data. |
headlessServiceEnabled | Enabling this will make the service type default to ClusterIP | false | No | |
cipherSuites | Supported Cipher Suites in Egress | TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
No | Connection with other ciphers would be rejected. |
log.level | Log level | DEBUG | No | |
jaegerTracingEnabled | Enable jaeger tracing | false | No | Change it to true if needed. |
openTracing.jaeger.udpSender.host | Jaeger Host | jaeger-agent.cne-infra | Yes (If jaegerTracingEnabled is true) | |
openTracing.jaeger.udpSender.port | Jaeger Port | 6831 | Yes (If jaegerTracingEnabled is true) | |
openTracing.jaeger.probabilisticSampler | 0.5 | Yes (If jaegerTracingEnabled is true) | ||
nrfAuthority | NRF's ${HOSTNAME}:{PORT} | Modify the field with actual value, required if oAuth is enabled. | Yes | |
nfType | NFType of service consumer. | Modify the field with actual value , required if oAuth is enabled. | Yes | |
nfInstanceId: | NF InstanceId of Service Consumer. | Modify the field with actual value, required if oAuth is enabled. | Yes | |
oauthClientEnabled: | Flag to enable or disable oauth client. If not modified, Default value 'false' will be defaulted. | false | No | Change it to true to enable oAuth |
consumerPlmnMNC | MNC of service Consumer. | Modify the field with actual value , required if oAuth is enabled. | No | |
consumerPlmnMCC | MCC of service Consumer. | Modify the field with actual value , required if oAuth is enabled. | No | |
maxRequestsQueuedPerDestination | jetty client configuration | 1024 | No | |
maxConnectionsPerIp | Max Connections allowed per Ip | 4 | No | |
connectionTimeout | Connection timeout in milliseconds | 1000 | No | |
egressGwCertReloadEnabled | true | No | ||
notificationRateLimit.enabled | Flag to enable rate limiting for "notification" type of messages. | false | No | |
notificationRateLimit.duration | Iterations of time duration(In seconds) for which bucketCapacity and refillRate are reset. | Yes(If notificationRateLimit.enabled is set to true) | ||
notificationRateLimit.bucketCapacity | Holds maximum number of tokens in the bucket for the given duration. | Yes(If notificationRateLimit.enabled is set to true) | ||
notificationRateLimit.refillRate | Number of tokens to be added to the bucket for the given duration | Yes(If notificationRateLimit.enabled is set to true) | ||
type | type of service | ClusterIP
Possible values are ClusterIP, NodePort, LoadBalancer and ExternalName |
Yes | |
ssl.privateKey.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.privateKey.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.privateKey.rsa.fileName | rsa private key file name | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.privateKey.ecdsa.fileName | ecdsa private key file name | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.certificate.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.certificate.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.certificate.rsa.fileName | rsa private key file name | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.certificate.ecdsa.fileName | ecdsa private key file name | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.caBundle.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.caBundle.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.caBundle.rsa.fileName | rsa private key file name | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.keyStorePassword.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.keyStorePassword.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.keyStorePassword.fileName | File name that has password for keyStore | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.trustStorePassword.k8SecretName | Name of the privatekey secret | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.trustStorePassword.k8NameSpace | Namespace of privatekey | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
ssl.trustStorePassword.fileName | File name that has password for trustStore | n/a | Yes (If enableOutgoingHttps is true otherwise No) | |
resources.limits.cpu | CPU Limit | 2 | ||
resources.limits.memory | Memory Limit | 4Gi | ||
resources.limits.initServiceCpu | Init Container CPU Limit | 1 | ||
resources.limits.updateServiceCpu | Update Container CPU Limit | 1 | ||
resources.limits.initServiceMemory | Init Container Memory Limit | 1Gi | ||
resources.limits.updateServiceMemory | Update Container Memory Limit | 1Gi | ||
resources.requests.cpu | CPU for requests | 1 | ||
resources.requests.memory | Memory for requests | 2Gi | ||
resources.requests.initServiceCpu | Init Container CPU for requests | 1 | ||
resources.requests.updateServiceCpu | Update Container CPU for requests | 1 | ||
resources.requests.initServiceMemory | Init Container Memory for requests | 1Gi | ||
resources.requests.updateServiceMemory | Update Container Memory for requests | 1Gi | ||
resources.target.averageCpuUtil | 80 | |||
minReplicas | Minimum replicas to scale to maintain an average CPU utilization | 2 | ||
maxReplicas | Maximum replicas to scale to maintain an average CPU utilization | 5 | ||
globalretry.enabled | Can be set to true if Scp re-route feature
(scpRerouteEnabled ) is enabled.
|
false | No | |
globalretry.retries | Number of re-routes to be attempted to alternate SCP instances and this property will be considered in the absence of "routesConfig[0].filterName2.retries" attribute at route level. | Yes (If
"routesConfig[0].filterName2.retries" is not
defined)
|
||
routesConfig[0].id | id of the route | Yes |
Can be any name of your choice. Note: Multiple routes can be configured in a similar way. |
|
routesConfig[0].uri | Provide any dummy url, existing url can also left with existing value | Yes | Please note provided sample url does not make any impact (http or https) as url's will be constructed in the code. | |
routesConfig[0].path | Provide the path to be matched. | Yes | ||
routesConfig[0].order | Provide the order of the execution of this route. | Yes | ||
routesConfig[0].filterName1 | Provide filtername as "ScpFilter" | Yes (If scpintegrationenabled is true) | If FilterName1 is not provided then it would be considered as direct Egress Gateway path and configured accordingly during deployment. | |
routesConfig[0].filterName2.name | Provide filtername as "ScpRetry" | Yes (If scpRerouteEnabled is true) | With out FilterName1 , it is not possible to configure FilterName2.name | |
routesConfig[0].filterName2.retries | Number of re-routes to be attempted to alternate SCP instances if request matches this route's path. | Yes (If scpRerouteEnabled is true) | If this is not defined then globalretry.retries parameter is applicable when globalretry.enabled is true. | |
routesConfig[0].filterName2.methods | The type of methods for which the re-route need to be attempted. | Yes (If scpRerouteEnabled is true) | ||
routesConfig[0].filterName2.statuses | The type response error codes on which the re-route need to be attempted. | Yes (If scpRerouteEnabled is true) | ||
serviceEgressGateway.port | Internal port on which egress gateway is running for HTTP2 | No | 8080 | Change this value if there is any specific need. |
serviceEgressGateway.sslPort | Internal port on which egress gateway is running for HTTPS | No | 8442 | Change this value if there is any specific need. |
deploymentEgressGateway.image | Image name of egress gateway | No | ocegress_gateway | N/A |
deploymentEgressGateway.imageTag | Image Tag name of egress gateway | No | 1.6.1 | N/A |
deploymentEgressGateway.pullPolicy | Pull Policy of Image | No | Always | N/A |
initContainersImage.name | Image name of initContainer | No | configurationinit | N/A |
initContainersImage.tag | Image tag name of initContainer | No | 1.1.1 | N/A |
initContainersImage.pullPolicy | Pull Policy of Image | No | Always | N/A |
updateContainersImage.name | Image name of updateContainer | No | configurationupdate | N/A |
updateContainersImage.tag | Image tag name of updateContainer | No | 1.1.1 | N/A |
updateContainersImage.pullPolicy | Pull Policy of Image | No | Always | N/A |
httpClientBean | To be used when oAuth is enabled. when https is enabled then it should be jettysClient , when https is disabled then it can left as '' | Yes | jettysClient |
#Jetty bean name #when http enabled -> '' #when https enabled -> jettysClient |
egressGwCertReloadEnabled | Egress GW Certificates Reload Enabled | No | true | N/A |
jaegerTracingEnabled | JaegerTracing Enabled | No | false | N/A |
ssl.tlsVersion | TLS Version | TLSv1.2 | Yes | |
initialAlgorithm | RSA256 | Yes | ES256 can also be used, but corresponding certificates need to be used. |