Name: policy-dep-drools-settings-configmap Namespace: onap-policy Labels: Annotations: Data ==== settings.xml: ---- policy-profile true policy-nexus-snapshots http://nexus:8081/nexus/content/repositories/snapshots/ false always true always policy-nexus-releases http://nexus:8081/nexus/content/repositories/releases/ true always false always policy-profile policy-nexus-snapshots admin admin123 policy-nexus-releases admin admin123 Events: Name: policy-dep-pe-configmap Namespace: onap-policy Labels: Annotations: Data ==== pdplp.conf: ---- # JVM specific parameters LOGPARSER_JMX_PORT=9997 LOGPARSER_X_MS_MB=1024 LOGPARSER_X_MX_MB=1024 SERVER=http://pdp.onap-policy:8081/pdp/ LOGPATH=${{POLICY_HOME}}/servers/pdp/logs/pdp-rest.log PARSERLOGPATH=IntegrityMonitor.log node_type=logparser # the java property is RESOURCE_NAME (uppercase), but the conf parameter is lowercase resource_name=pdplp_1 push-policies.sh: ---- #! /bin/bash # forked from https://gerrit.onap.org/r/gitweb?p=policy/docker.git;a=blob;f=config/pe/push-policies.sh;h=555ab357e6b4f54237bf07ef5e6777d782564bc0;hb=refs/heads/amsterdam and adapted for OOM #########################################Upload BRMS Param Template########################################## echo "Upload BRMS Param Template" sleep 2 wget -O cl-amsterdam-template.drl https://git.onap.org/policy/drools-applications/plain/controlloop/templates/archetype-cl-amsterdam/src/main/resources/archetype-resources/src/main/resources/__closedLoopControlName__.drl sleep 2 curl -v --silent -X POST --header 'Content-Type: multipart/form-data' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -F "file=@cl-amsterdam-template.drl" -F "importParametersJson={\"serviceName\":\"ClosedLoopControlName\",\"serviceType\":\"BRMSPARAM\"}" 'http://pdp.onap-policy:8081/pdp/api/policyEngineImport' echo "PRELOAD_POLICIES is $PRELOAD_POLICIES" if [ "$PRELOAD_POLICIES" == "false" ]; then exit 0 fi #########################################Create BRMS Param policies########################################## echo "Create BRMSParam Operational Policies" sleep 2 echo "Create BRMSParamvFirewall Policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/html' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "policyConfigType": "BRMS_PARAM", "policyName": "com.BRMSParamvFirewall", "policyDescription": "BRMS Param vFirewall policy", "policyScope": "com", "attributes": { "MATCHING": { "controller" : "amsterdam" }, "RULE": { "templateName": "ClosedLoopControlName", "closedLoopControlName": "ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a", "controlLoopYaml": "controlLoop%3A%0D%0A++version%3A+2.0.0%0D%0A++controlLoopName%3A+ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a%0D%0A++trigger_policy%3A+unique-policy-id-1-modifyConfig%0D%0A++timeout%3A+1200%0D%0A++abatement%3A+false%0D%0A+%0D%0Apolicies%3A%0D%0A++-+id%3A+unique-policy-id-1-modifyConfig%0D%0A++++name%3A+modify+packet+gen+config%0D%0A++++description%3A%0D%0A++++actor%3A+APPC%0D%0A++++recipe%3A+ModifyConfig%0D%0A++++target%3A%0D%0A++++++%23+TBD+-+Cannot+be+known+until+instantiation+is+done%0D%0A++++++resourceID%3A+Eace933104d443b496b8.nodes.heat.vpg%0D%0A++++++type%3A+VNF%0D%0A++++retry%3A+0%0D%0A++++timeout%3A+300%0D%0A++++success%3A+final_success%0D%0A++++failure%3A+final_failure%0D%0A++++failure_timeout%3A+final_failure_timeout%0D%0A++++failure_retries%3A+final_failure_retries%0D%0A++++failure_exception%3A+final_failure_exception%0D%0A++++failure_guard%3A+final_failure_guard" } } }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' sleep 2 echo "Create BRMSParamvDNS Policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/html' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "policyConfigType": "BRMS_PARAM", "policyName": "com.BRMSParamvDNS", "policyDescription": "BRMS Param vDNS policy", "policyScope": "com", "attributes": { "MATCHING": { "controller" : "amsterdam" }, "RULE": { "templateName": "ClosedLoopControlName", "closedLoopControlName": "ControlLoop-vDNS-6f37f56d-a87d-4b85-b6a9-cc953cf779b3", "controlLoopYaml": "controlLoop%3A%0D%0A++version%3A+2.0.0%0D%0A++controlLoopName%3A+ControlLoop-vDNS-6f37f56d-a87d-4b85-b6a9-cc953cf779b3%0D%0A++trigger_policy%3A+unique-policy-id-1-scale-up%0D%0A++timeout%3A+1200%0D%0A++abatement%3A+false%0D%0Apolicies%3A%0D%0A++-+id%3A+unique-policy-id-1-scale-up%0D%0A++++name%3A+Create+a+new+VF+Module%0D%0A++++description%3A%0D%0A++++actor%3A+SO%0D%0A++++recipe%3A+VF+Module+Create%0D%0A++++target%3A%0D%0A++++++type%3A+VNF%0D%0A++++retry%3A+0%0D%0A++++timeout%3A+1200%0D%0A++++success%3A+final_success%0D%0A++++failure%3A+final_failure%0D%0A++++failure_timeout%3A+final_failure_timeout%0D%0A++++failure_retries%3A+final_failure_retries%0D%0A++++failure_exception%3A+final_failure_exception%0D%0A++++failure_guard%3A+final_failure_guard" } } }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' sleep 2 echo "Create BRMSParamVOLTE Policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/html' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "policyConfigType": "BRMS_PARAM", "policyName": "com.BRMSParamVOLTE", "policyDescription": "BRMS Param VOLTE policy", "policyScope": "com", "attributes": { "MATCHING": { "controller" : "amsterdam" }, "RULE": { "templateName": "ClosedLoopControlName", "closedLoopControlName": "ControlLoop-VOLTE-2179b738-fd36-4843-a71a-a8c24c70c55b", "controlLoopYaml": "controlLoop%3A%0D%0A++version%3A+2.0.0%0D%0A++controlLoopName%3A+ControlLoop-VOLTE-2179b738-fd36-4843-a71a-a8c24c70c55b%0D%0A++trigger_policy%3A+unique-policy-id-1-restart%0D%0A++timeout%3A+3600%0D%0A++abatement%3A+false%0D%0A+%0D%0Apolicies%3A%0D%0A++-+id%3A+unique-policy-id-1-restart%0D%0A++++name%3A+Restart+the+VM%0D%0A++++description%3A%0D%0A++++actor%3A+VFC%0D%0A++++recipe%3A+Restart%0D%0A++++target%3A%0D%0A++++++type%3A+VM%0D%0A++++retry%3A+3%0D%0A++++timeout%3A+1200%0D%0A++++success%3A+final_success%0D%0A++++failure%3A+final_failure%0D%0A++++failure_timeout%3A+final_failure_timeout%0D%0A++++failure_retries%3A+final_failure_retries%0D%0A++++failure_exception%3A+final_failure_exception%0D%0A++++failure_guard%3A+final_failure_guard" } } }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' sleep 2 echo "Create BRMSParamvCPE Policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/html' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "policyConfigType": "BRMS_PARAM", "policyName": "com.BRMSParamvCPE", "policyDescription": "BRMS Param vCPE policy", "policyScope": "com", "attributes": { "MATCHING": { "controller" : "amsterdam" }, "RULE": { "templateName": "ClosedLoopControlName", "closedLoopControlName": "ControlLoop-vCPE-48f0c2c3-a172-4192-9ae3-052274181b6e", "controlLoopYaml": "controlLoop%3A%0D%0A++version%3A+2.0.0%0D%0A++controlLoopName%3A+ControlLoop-vCPE-48f0c2c3-a172-4192-9ae3-052274181b6e%0D%0A++trigger_policy%3A+unique-policy-id-1-restart%0D%0A++timeout%3A+3600%0D%0A++abatement%3A+true%0D%0A+%0D%0Apolicies%3A%0D%0A++-+id%3A+unique-policy-id-1-restart%0D%0A++++name%3A+Restart+the+VM%0D%0A++++description%3A%0D%0A++++actor%3A+APPC%0D%0A++++recipe%3A+Restart%0D%0A++++target%3A%0D%0A++++++type%3A+VM%0D%0A++++retry%3A+3%0D%0A++++timeout%3A+1200%0D%0A++++success%3A+final_success%0D%0A++++failure%3A+final_failure%0D%0A++++failure_timeout%3A+final_failure_timeout%0D%0A++++failure_retries%3A+final_failure_retries%0D%0A++++failure_exception%3A+final_failure_exception%0D%0A++++failure_guard%3A+final_failure_guard" } } }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' #########################################Create Micro Service Config policies########################################## echo "Create MicroService Config Policies" sleep 2 echo "Create MicroServicevFirewall Policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "configBody": "{ \"service\": \"tca_policy\", \"location\": \"SampleServiceLocation\", \"uuid\": \"test\", \"policyName\": \"MicroServicevFirewall\", \"description\": \"MicroService vFirewall Policy\", \"configName\": \"SampleConfigName\", \"templateVersion\": \"OpenSource.version.1\", \"version\": \"1.1.0\", \"priority\": \"1\", \"policyScope\": \"resource=SampleResource,service=SampleService,type=SampleType,closedLoopControlName=ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a\", \"riskType\": \"SampleRiskType\", \"riskLevel\": \"1\", \"guard\": \"False\", \"content\": { \"tca_policy\": { \"domain\": \"measurementsForVfScaling\", \"metricsPerEventName\": [{ \"eventName\": \"vFirewallBroadcastPackets\", \"controlLoopSchemaType\": \"VNF\", \"policyScope\": \"DCAE\", \"policyName\": \"DCAE.Config_tca-hi-lo\", \"policyVersion\": \"v0.0.1\", \"thresholds\": [{ \"closedLoopControlName\": \"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a\", \"version\": \"1.0.2\", \"fieldPath\": \"$.event.measurementsForVfScalingFields.vNicUsageArray[*].receivedTotalPacketsDelta\", \"thresholdValue\": 300, \"direction\": \"LESS_OR_EQUAL\", \"severity\": \"MAJOR\", \"closedLoopEventStatus\": \"ONSET\" }, { \"closedLoopControlName\": \"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a\", \"version\": \"1.0.2\", \"fieldPath\": \"$.event.measurementsForVfScalingFields.vNicUsageArray[*].receivedTotalPacketsDelta\", \"thresholdValue\": 700, \"direction\": \"GREATER_OR_EQUAL\", \"severity\": \"CRITICAL\", \"closedLoopEventStatus\": \"ONSET\" } ] }] } } }", "policyConfigType": "MicroService", "policyName": "com.MicroServicevFirewall", "onapName": "DCAE" }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' sleep 2 echo "Create MicroServicevDNS Policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "configBody": "{ \"service\": \"tca_policy\", \"location\": \"SampleServiceLocation\", \"uuid\": \"test\", \"policyName\": \"MicroServicevDNS\", \"description\": \"MicroService vDNS Policy\", \"configName\": \"SampleConfigName\", \"templateVersion\": \"OpenSource.version.1\", \"version\": \"1.1.0\", \"priority\": \"1\", \"policyScope\": \"resource=SampleResource,service=SampleService,type=SampleType,closedLoopControlName=ControlLoop-vDNS-6f37f56d-a87d-4b85-b6a9-cc953cf779b3\", \"riskType\": \"SampleRiskType\", \"riskLevel\": \"1\", \"guard\": \"False\", \"content\": { \"tca_policy\": { \"domain\": \"measurementsForVfScaling\", \"metricsPerEventName\": [{ \"eventName\": \"vLoadBalancer\", \"controlLoopSchemaType\": \"VM\", \"policyScope\": \"DCAE\", \"policyName\": \"DCAE.Config_tca-hi-lo\", \"policyVersion\": \"v0.0.1\", \"thresholds\": [{ \"closedLoopControlName\": \"ControlLoop-vDNS-6f37f56d-a87d-4b85-b6a9-cc953cf779b3\", \"version\": \"1.0.2\", \"fieldPath\": \"$.event.measurementsForVfScalingFields.vNicUsageArray[*].receivedTotalPacketsDelta\", \"thresholdValue\": 300, \"direction\": \"GREATER_OR_EQUAL\", \"severity\": \"CRITICAL\", \"closedLoopEventStatus\": \"ONSET\" }] }] } } }", "policyConfigType": "MicroService", "policyName": "com.MicroServicevDNS", "onapName": "DCAE" }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' sleep 2 echo "Create MicroServicevCPE Policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "configBody": "{ \"service\": \"tca_policy\", \"location\": \"SampleServiceLocation\", \"uuid\": \"test\", \"policyName\": \"MicroServicevCPE\", \"description\": \"MicroService vCPE Policy\", \"configName\": \"SampleConfigName\", \"templateVersion\": \"OpenSource.version.1\", \"version\": \"1.1.0\", \"priority\": \"1\", \"policyScope\": \"resource=SampleResource,service=SampleService,type=SampleType,closedLoopControlName=ControlLoop-vCPE-48f0c2c3-a172-4192-9ae3-052274181b6e\", \"riskType\": \"SampleRiskType\", \"riskLevel\": \"1\", \"guard\": \"False\", \"content\": { \"tca_policy\": { \"domain\": \"measurementsForVfScaling\", \"metricsPerEventName\": [{ \"eventName\": \"Measurement_vGMUX\", \"controlLoopSchemaType\": \"VNF\", \"policyScope\": \"DCAE\", \"policyName\": \"DCAE.Config_tca-hi-lo\", \"policyVersion\": \"v0.0.1\", \"thresholds\": [{ \"closedLoopControlName\": \"ControlLoop-vCPE-48f0c2c3-a172-4192-9ae3-052274181b6e\", \"version\": \"1.0.2\", \"fieldPath\": \"$.event.measurementsForVfScalingFields.additionalMeasurements[*].arrayOfFields[0].value\", \"thresholdValue\": 0, \"direction\": \"EQUAL\", \"severity\": \"MAJOR\", \"closedLoopEventStatus\": \"ABATED\" }, { \"closedLoopControlName\": \"ControlLoop-vCPE-48f0c2c3-a172-4192-9ae3-052274181b6e\", \"version\": \"1.0.2\", \"fieldPath\": \"$.event.measurementsForVfScalingFields.additionalMeasurements[*].arrayOfFields[0].value\", \"thresholdValue\": 0, \"direction\": \"GREATER\", \"severity\": \"CRITICAL\", \"closedLoopEventStatus\": \"ONSET\" }] }] } } }", "policyConfigType": "MicroService", "policyName": "com.MicroServicevCPE", "onapName": "DCAE" }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' #########################################Creating Decision Guard policy######################################### sleep 2 echo "Creating Decision Guard policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "policyClass": "Decision", "policyName": "com.AllPermitGuard", "policyDescription": "Testing all Permit YAML Guard Policy", "ecompName": "PDPD", "ruleProvider": "GUARD_YAML", "attributes": { "MATCHING": { "actor": ".*", "recipe": ".*", "targets": ".*", "clname": ".*", "limit": "10", "timeWindow": "1", "timeUnits": "minute", "guardActiveStart": "00:00:01-05:00", "guardActiveEnd": "00:00:00-05:00" } } }' 'http://pdp.onap-policy:8081/pdp/api/createPolicy' #########################################Push Decision policy######################################### sleep 2 echo "Push Decision policy" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.AllPermitGuard", "policyType": "DECISION" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' #########################################Pushing BRMS Param policies########################################## echo "Pushing BRMSParam Operational policies" sleep 2 echo "pushPolicy : PUT : com.BRMSParamvFirewall" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.BRMSParamvFirewall", "policyType": "BRMS_Param" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' sleep 2 echo "pushPolicy : PUT : com.BRMSParamvDNS" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.BRMSParamvDNS", "policyType": "BRMS_Param" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' sleep 2 echo "pushPolicy : PUT : com.BRMSParamVOLTE" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.BRMSParamVOLTE", "policyType": "BRMS_Param" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' sleep 2 echo "pushPolicy : PUT : com.BRMSParamvCPE" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.BRMSParamvCPE", "policyType": "BRMS_Param" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' #########################################Pushing MicroService Config policies########################################## echo "Pushing MicroService Config policies" sleep 2 echo "pushPolicy : PUT : com.MicroServicevFirewall" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.MicroServicevFirewall", "policyType": "MicroService" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' sleep 10 echo "pushPolicy : PUT : com.MicroServicevDNS" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.MicroServicevDNS", "policyType": "MicroService" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' sleep 10 echo "pushPolicy : PUT : com.MicroServicevCPE" curl -v --silent -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHBkcDphbHBoYTEyMw==' --header 'Environment: TEST' -d '{ "pdpGroup": "default", "policyName": "com.MicroServicevCPE", "policyType": "MicroService" }' 'http://pdp.onap-policy:8081/pdp/api/pushPolicy' mysql.conf: ---- # mysql scripts component installation configuration parameters # Path to mysql bin MYSQL_BIN=/usr/local/mysql/bin pap-tweaks.sh: ---- #! /bin/bash pdp.conf: ---- # pdp component installation configuration parameters # tomcat specific parameters TOMCAT_JMX_PORT=9991 TOMCAT_SHUTDOWN_PORT=8087 SSL_HTTP_CONNECTOR_PORT=8081 SSL_AJP_CONNECTOR_PORT=8381 SSL_AJP_CONNECTOR_REDIRECT_PORT=8443 TOMCAT_X_MS_MB=1024 TOMCAT_X_MX_MB=1024 # pdp properties UEB_CLUSTER=dmaap.onap-message-router REST_PAP_URL=http://pap.onap-policy:9091/pap/ REST_PDP_ID=http://pdp.onap-policy:8081/pdp/ REST_PDP_CONFIG=${{POLICY_HOME}}/servers/pdp/bin/config REST_PDP_WEBAPPS=${{POLICY_HOME}}/servers/pdp/webapps REST_PDP_REGISTER=true REST_PDP_REGISTER_SLEEP=15 REST_PDP_REGISTER_RETRIES=-1 REST_PDP_MAXCONTENT=999999999 # PDP related properties PDP_HTTP_USER_ID=testpdp PDP_HTTP_PASSWORD=alpha123 PDP_PAP_PDP_HTTP_USER_ID=testpap PDP_PAP_PDP_HTTP_PASSWORD=alpha123 node_type=pdp_xacml resource_name=pdp_1 dependency_groups=pdplp_1;brmsgw_1 test_via_jmx=true # # Notification Properties # Notification type: websocket, ueb or dmaap... if left blank websocket is the default PDP_NOTIFICATION_TYPE=websocket PDP_UEB_CLUSTER= PDP_UEB_TOPIC= PDP_UEB_DELAY= PDP_UEB_API_KEY= PDP_UEB_API_SECRET= PDP_DMAAP_AAF_LOGIN= PDP_DMAAP_AAF_PASSWORD= #AAF Policy Name space #Required only, when we use AAF POLICY_AAF_NAMESPACE= POLICY_AAF_RESOURCE= # Indeterminate resolution DECISION_INDETERMINATE_RESPONSE=PERMIT console.conf: ---- # configs component installation configuration parameters # tomcat specific parameters TOMCAT_JMX_PORT=9993 TOMCAT_SHUTDOWN_PORT=8090 SSL_HTTP_CONNECTOR_PORT=8443 SSL_HTTP_CONNECTOR_REDIRECT_PORT=8443 SSL_AJP_CONNECTOR_PORT=8383 SSL_AJP_CONNECTOR_REDIRECT_PORT=8443 TOMCAT_X_MS_MB=2048 TOMCAT_X_MX_MB=2048 # ------------------ console properties --------------------------- # # Authorization Policy ROOT_POLICIES=admin ADMIN_FILE=Policy-Admin.xml # Set your domain here: REST_ADMIN_DOMAIN=com # # Location where the GIT repository is located # REST_ADMIN_REPOSITORY=repository # # Location where all the user workspaces are located. # REST_ADMIN_WORKSPACE=${{POLICY_HOME}}/servers/console/bin/workspace # # These can be set so the Admin Console knows who is logged on. Ideally, you can run the console in a J2EE # container and setup authentication as you please. Setting HttpSession attribute values will override these # values set in the properties files. # # ((HttpServletRequest) request).getSession().setAttribute("xacml.rest.admin.user.name", "Homer"); # # The default policy: Policy-Admin.xml is extremely simple. # # You can test authorization within the Admin Console by changing the user id. # There are 3 supported user ids: # guest - Read only access # editor - Read/Write access # admin - Read/Write/Admin access # # An empty or null value for xacml.rest.admin.user.id results in no access to the application at all. # # This is for development/demonstration purposes only. A production environment should provide authentication which is # outside the scope of this application. This application can be used to develop a XACML policy for user authorization # within this application. # REST_ADMIN_USER_NAME=Administrator REST_ADMIN_USER_ID=super-admin # # # Property to declare the max time frame for logs. # LOG_TIMEFRAME=30 # Property to declare the number of visible rows for users in MicroService Policy COLUMN_COUNT=3 # Dashboard refresh rate in miliseconds REFRESH_RATE=40000 # # URL location for the PAP servlet. # REST_PAP_URL=http://pap.onap-policy:9091/pap/ # # Config/Action Properties location. # REST_CONFIG_HOME=${{POLICY_HOME}}/servers/pap/webapps/Config/ REST_ACTION_HOME=${{POLICY_HOME}}/servers/pap/webapps/Action/ REST_CONFIG_URL=http://pap.onap-policy:9091/ REST_CONFIG_WEBAPPS=${{POLICY_HOME}}/servers/pap/webapps/ # PAP account information CONSOLE_PAP_HTTP_USER_ID=testpap CONSOLE_PAP_HTTP_PASSWORD=alpha123 node_type=pap_admin resource_name=console_1 # The (optional) period of time in seconds between executions of the integrity audit. # Value < 0 : Audit does not run (default value if property is not present = -1) # Value = 0 : Audit runs continuously # Value > 0 : The period of time in seconds between execution of the audit on a particular node integrity_audit_period_seconds=-1 #Automatic Policy Distribution automatic_push=false #Diff of policies for Firewall feature FW_GETURL= FW_AUTHOURL= FW_PROXY= FW_PORT= #SMTP Server Details for Java Mail onap_smtp_host= onap_smtp_port=25 onap_smtp_userName= onap_smtp_password= onap_smtp_emailExtension= onap_application_name= #-----------------------ONAP-PORTAL-Properties---------------------- ONAP_REDIRECT_URL=http://portalapps.onap-portal:8989/ONAPPORTAL/login.htm ONAP_REST_URL=http://portalapps.onap-portal:8989/ONAPPORTAL/auxapi ONAP_UEB_URL_LIST= ONAP_PORTAL_INBOX_NAME= ONAP_UEB_APP_KEY= ONAP_UEB_APP_SECRET= ONAP_UEB_APP_MAILBOX_NAME= APP_DISPLAY_NAME=ONAP Policy ONAP_SHARED_CONTEXT_REST_URL=http://portalapps.onap-portal:8989/ONAPPORTAL/context elk.conf: ---- # elasticsearch ELK_JMX_PORT=9995 pap.conf: ---- # pap component installation configuration parameters # tomcat specific parameters TOMCAT_JMX_PORT=9990 TOMCAT_SHUTDOWN_PORT=9405 SSL_HTTP_CONNECTOR_PORT=9091 SSL_AJP_CONNECTOR_PORT=8380 SSL_AJP_CONNECTOR_REDIRECT_PORT=8443 TOMCAT_X_MS_MB=1024 TOMCAT_X_MX_MB=1024 # pap properties PAP_PDPS=${{POLICY_HOME}}/servers/pap/bin/pdps PAP_URL=http://pap.onap-policy:9091/pap/ PAP_INITIATE_PDP=true PAP_HEARTBEAT_INTERVAL=10000 PAP_HEARTBEAT_TIMEOUT=10000 REST_ADMIN_DOMAIN=com REST_ADMIN_REPOSITORY=repository REST_ADMIN_WORKSPACE=workspace # PDP related properties PAP_PDP_URL=http://pdp.onap-policy:8081/pdp/ PAP_PDP_HTTP_USER_ID=testpdp PAP_PDP_HTTP_PASSWORD=alpha123 PAP_HTTP_USER_ID=testpap PAP_HTTP_PASSWORD=alpha123 #new values added 10-21-2015 PROP_PAP_TRANS_WAIT=500000 PROP_PAP_TRANS_TIMEOUT=5000 PROP_PAP_AUDIT_TIMEOUT=300000 PROP_PAP_RUN_AUDIT_FLAG=true PROP_PAP_AUDIT_FLAG=true PROP_PAP_INCOMINGNOTIFICATION_TRIES=4 node_type=pap resource_name=pap_1 dependency_groups=paplp_1 test_via_jmx=true # The (optional) period of time in seconds between executions of the integrity audit. # Value < 0 : Audit does not run (default value if property is not present = -1) # Value = 0 : Audit runs continuously # Value > 0 : The period of time in seconds between execution of the audit on a particular node integrity_audit_period_seconds=-1 paplp.conf: ---- # JVM specific parameters LOGPARSER_JMX_PORT=9996 LOGPARSER_X_MS_MB=1024 LOGPARSER_X_MX_MB=1024 SERVER=http://pap.onap-policy:9091/pap/ LOGPATH=${{POLICY_HOME}}/servers/pap/logs/pap-rest.log PARSERLOGPATH=IntegrityMonitor.log node_type=logparser # the java property is RESOURCE_NAME (uppercase), but the conf parameter is lowercase resource_name=paplp_1 pdp-tweaks.sh: ---- #! /bin/bash base.conf: ---- JAVA_HOME=/usr/lib/jvm/java-8-openjdk-amd64 POLICY_HOME=/opt/app/policy KEYSTORE_PASSWD=PolicyR0ck$ JDBC_DRIVER=org.mariadb.jdbc.Driver JDBC_URL=jdbc:mariadb://mariadb.onap-policy:3306/onap_sdk?failOverReadOnly=false&autoReconnect=true JDBC_LOG_URL=jdbc:mariadb://mariadb.onap-policy:3306/log?failOverReadOnly=false&autoReconnect=true JDBC_USER=policy_user JDBC_PASSWORD=policy_user site_name=site_1 fp_monitor_interval=30 failed_counter_threshold=3 test_trans_interval=20 write_fpc_interval=5 max_fpc_update_interval=60 test_via_jmx=false jmx_fqdn= ENVIRONMENT=TEST #Micro Service Model Properties policy_msOnapName= policy_msPolicyName= brmsgw-tweaks.sh: ---- #! /bin/bash PROPS_BUILD="${POLICY_HOME}/etc/build.info" PROPS_RUNTIME="${POLICY_HOME}/servers/brmsgw/config.properties" PROPS_INSTALL="${POLICY_HOME}/install/servers/brmsgw/config.properties" if [ ! -f "${PROPS_BUILD}" ]; then echo "error: version information does not exist: ${PROPS_BUILD}" exit 1 fi source "${POLICY_HOME}/etc/build.info" if [ -z "${version}" ]; then echo "error: no version information present" exit 1 fi for CONFIG in ${PROPS_RUNTIME} ${PROPS_INSTALL}; do if [ ! -f "${CONFIG}" ]; then echo "warning: configuration does not exist: ${CONFIG}" else sed -i -e "s/brms.dependency.version=.*/brms.dependency.version=${version}/g" "${CONFIG}" fi done DEPS_JSON_RUNTIME="${POLICY_HOME}/servers/brmsgw/dependency.json" DEPS_JSON_INSTALL="${POLICY_HOME}/install/servers/brmsgw/dependency.json" for DEP in ${DEPS_JSON_RUNTIME} ${DEPS_JSON_INSTALL}; do if [ ! -f "${DEP}" ]; then echo "warning: configuration does not exist: ${DEP}" else sed -i -e "s/\"version\":.*-SNAPSHOT\"/\"version\": \"${version}\"/g" "${DEP}" fi done brmsgw.conf: ---- # BRMSpep component installation configuration parameters BRMSGW_JMX_PORT=9989 COMPONENT_X_MX_MB=1024 COMPONENT_X_MS_MB=1024 REST_PAP_URL=http://pap.onap-policy:9091/pap/ REST_PDP_ID=http://pdp.onap-policy:8081/pdp/ PDP_HTTP_USER_ID=testpdp PDP_HTTP_PASSWORD=alpha123 PDP_PAP_PDP_HTTP_USER_ID=testpap PDP_PAP_PDP_HTTP_PASSWORD=alpha123 M2_HOME=/usr/share/maven snapshotRepositoryID=policy-nexus-snapshots snapshotRepositoryName=Snapshots snapshotRepositoryURL=http://nexus.onap-policy:8081/nexus/content/repositories/snapshots releaseRepositoryID=policy-nexus-releases releaseRepositoryName=Releases releaseRepositoryURL=http://nexus.onap-policy:8081/nexus/content/repositories/releases repositoryUsername=admin repositoryPassword=admin123 UEB_URL=dmaap.onap-message-router UEB_TOPIC=PDPD-CONFIGURATION UEB_API_KEY= UEB_API_SECRET= groupID=org.onap.policy-engine artifactID=drlPDPGroup AMSTERDAM_GROUP_ID=org.onap.policy-engine.drools.amsterdam AMSTERDAM_ARTIFACT_ID=policy-amsterdam-rules # the java property is RESOURCE_NAME (uppercase), but the conf parameter is lowercase resource_name=brmsgw_1 node_type=brms_gateway #Environment should be Set either DEV, TEST or PROD ENVIRONMENT=TEST #Notification Properties... type can be either websocket, ueb, or dmaap BRMS_NOTIFICATION_TYPE=websocket BRMS_UEB_URL=dmaap.onap-message-router BRMS_UEB_TOPIC=PDPD-CONFIGURATION BRMS_UEB_DELAY= BRMS_CLIENT_ID=python BRMS_CLIENT_KEY=dGVzdA== BRMS_UEB_API_KEY= BRMS_UEB_API_SECRET= #Dependency.json file version BRMS_DEPENDENCY_VERSION=1.2.0 Events: Name: policy-drools-log-configmap Namespace: onap-policy Labels: Annotations: Data ==== logback.xml: ---- ${logDir}/${errorLog}.log ${logDir}/${errorLog}.%i.log.zip 1 5 WARN 15MB ${errorPattern} ${logDir}/${debugLog}.log ${logDir}/${debugLog}.%i.log.zip 1 9 20MB ${debugPattern} ${logDir}/${networkLog}.log ${logDir}/${networkLog}.%i.log.zip 1 9 15MB ${networkPattern} Events: Name: policy-filebeat-configmap Namespace: onap-policy Labels: Annotations: Data ==== filebeat.yml: ---- filebeat.prospectors: #it is mandatory, in our case it's log - input_type: log #This is the canolical path as mentioned in logback.xml, *.* means it will monitor all files in the directory. paths: - /var/log/onap/*/*/*/*.log - /var/log/onap/*/*/*.log - /var/log/onap/*/*.log #Files older than this should be ignored.In our case it will be 48 hours i.e. 2 days. It is a helping flag for clean_inactive ignore_older: 48h # Remove the registry entry for a file that is more than the specified time. In our case it will be 96 hours, i.e. 4 days. It will help to keep registry records with in limit clean_inactive: 96h # Name of the registry file. If a relative path is used, it is considered relative to the # data path. Else full qualified file name. #filebeat.registry_file: ${path.data}/registry output.logstash: #List of logstash server ip addresses with port number. #But, in our case, this will be the loadbalancer IP address. #For the below property to work the loadbalancer or logstash should expose 5044 port to listen the filebeat events or port in the property should be changed appropriately. hosts: ["logstash.onap-log:5044"] #If enable will do load balancing among availabe Logstash, automatically. loadbalance: true #The list of root certificates for server verifications. #If certificate_authorities is empty or not set, the trusted #certificate authorities of the host system are used. #ssl.certificate_authorities: $ssl.certificate_authorities #The path to the certificate for SSL client authentication. If the certificate is not specified, #client authentication is not available. #ssl.certificate: $ssl.certificate #The client certificate key used for client authentication. #ssl.key: $ssl.key #The passphrase used to decrypt an encrypted key stored in the configured key file #ssl.key_passphrase: $ssl.key_passphrase Events: Name: policy-pap-log-configmap Namespace: onap-policy Labels: Annotations: Data ==== logback.xml: ---- ${pattern} ${logDirectory}/${auditLogName}.log ${logDirectory}/${auditLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} ${logDirectory}/${metricsLogName}.log ${logDirectory}/${metricsLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} ${logDirectory}/${errorLogName}.log ${logDirectory}/${errorLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} INFO ${queueSize} ${logDirectory}/${debugLogName}.log ${logDirectory}/${debugLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} true Events: Name: policy-pdp-log-configmap Namespace: onap-policy Labels: Annotations: Data ==== logback.xml: ---- ${pattern} ${logDirectory}/${auditLogName}.log ${logDirectory}/${auditLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} ${logDirectory}/${metricsLogName}.log ${logDirectory}/${metricsLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} ${logDirectory}/${errorLogName}.log ${logDirectory}/${errorLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} INFO ${queueSize} ${logDirectory}/${debugLogName}.log ${logDirectory}/${debugLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} true Events: Name: policy-sdk-log-configmap Namespace: onap-policy Labels: Annotations: Data ==== logback.xml: ---- ${pattern} ${logDirectory}/${generalLogName}.log ${logDirectory}/${generalLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} true ${logDirectory}/${auditLogName}.log ${logDirectory}/${auditLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} ${logDirectory}/${metricsLogName}.log ${logDirectory}/${metricsLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} ${logDirectory}/${errorLogName}.log ${logDirectory}/${errorLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} INFO ${queueSize} ${logDirectory}/${debugLogName}.log ${logDirectory}/${debugLogName}.%d{yyyy-MM-dd}.%i.log ${maxFileSize} ${maxHistory} ${totalSizeCap} ${pattern} ${queueSize} true Events: