memset(eventId, 0, BUFSIZE);
memset(hostname, 0, BUFSIZE);
- strcpy(eventName, "measurement_vFirewall-Att-Linkdownerr");
+ strcpy(eventName, "vFirewallBroadcastPackets");
strcpy(eventId, "mvfs00000001");
char* fqdn = argv[1];
int port = atoi(argv[2]);
+ char* caFile = "/opt/config/onap-ca.crt";
+ char* userName = "sample1";
+ char* passWord = "sample1";
+
if(argc == 6)
{
fqdn2 = argv[3];
NULL, /* optional path */
NULL, /* optional topic */
100, /* Ring Buffer size */
- 0, /* HTTPS? */
+ 1, /* HTTPS? */
NULL, /* cert file */
NULL, /* key file */
- NULL, /* ca info */
- NULL, /* ca file */
+ caFile, /* ca file */
+ NULL, /* ca directory */
0, /* verify peer */
0, /* verify host */
- "sample1", /* Username */
- "sample1", /* Password */
+ userName, /* Username */
+ passWord, /* Password */
"sample1", /* Username2 */
"sample1", /* Password2 */
NULL, /* Source ip */
vpp_m_header->start_epoch_microsec = start_epoch;
vpp_m_header->last_epoch_microsec = last_epoch;
evel_reporting_entity_id_set(vpp_m_header, "No UUID available");
-printf("1111\n");
+ printf("1111\n");
evel_reporting_entity_name_set(vpp_m_header, hostname);
-printf("1111\n");
- // evel_rc = evel_post_event(vpp_m_header);
+ printf("1111\n");
+ // evel_rc = evel_post_event(vpp_m_header);
batch_header = evel_new_batch("batch_event_name", "bevent_id");
evel_batch_add_event(batch_header, vpp_m_header);
evel_rc = evel_post_event(batch_header);