HV_VES_VERSION=1.1-SNAPSHOT
HV_VES_HEALTHCHECK_CMD=curl --request GET --fail --silent --show-error localhost:6060/health/ready && nc -vz localhost 6061
-HV_VES_MAIN_CLASS=org.onap.dcae.collectors.veshv.main.MainKt
+
+JAVA_OPTS=-Dio.netty.leakDetection.level=paranoid
+CONSUL_HOST=consul-server
+CONFIG_BINDING_SERVICE=cbs
+HV_VES_HOSTNAME=dcae-hv-ves-collector
\ No newline at end of file
--- /dev/null
+{
+ "server": {
+ "listenPort": 6061,
+ "idleTimeoutSec": 60,
+ "maxPayloadSizeBytes": 1048576
+ },
+ "cbs": {
+ "firstRequestDelaySec": 5,
+ "requestIntervalSec": 10
+ },
+ "security": {
+ "sslDisable": true
+ },
+ "collector": {
+ "maxRequestSizeBytes": 1048576,
+ "kafkaServers": [
+ "kafka:9092"
+ ],
+ "routing": [
+ {
+ "fromDomain": "perf3gpp",
+ "toTopic": "TEST_HV_VES_PERF3GPP"
+ }
+ ],
+ "dummyMode": false
+ },
+ "logLevel": "DEBUG"
+}
\ No newline at end of file
--- /dev/null
+{
+ "server": {
+ "listenPort": 6061,
+ "idleTimeoutSec": 60,
+ "maxPayloadSizeBytes": 1048576
+ },
+ "cbs": {
+ "firstRequestDelaySec": 5,
+ "requestIntervalSec": 10
+ },
+ "security": {
+ "sslDisable": false,
+ "keys": {
+ "keyStoreFile": "/etc/hv-ves/ssl/server.p12",
+ "keyStorePassword": "onaponap",
+ "trustStoreFile": "/etc/hv-ves/ssl/trust.p12",
+ "trustStorePassword": "onaponap"
+ }
+ },
+ "collector": {
+ "maxRequestSizeBytes": 1048576,
+ "kafkaServers": [
+ "kafka:9092"
+ ],
+ "routing": [
+ {
+ "fromDomain": "perf3gpp",
+ "toTopic": "TEST_HV_VES_PERF3GPP"
+ }
+ ],
+ "dummyMode": false
+ },
+ "logLevel": "DEBUG"
+}
\ No newline at end of file
ports:
- "10000:10000"
environment:
- CONSUL_HOST: "consul-server"
+ - CONSUL_HOST
depends_on:
- consul-server
networks:
ves-hv-default:
aliases:
- cbs
+
#
# DCAE HV VES Collector
#
ports:
- "6060:6060"
- "6061:6061/tcp"
- command: ["--listen-port", "6061",
- "--kafka-bootstrap-servers", "kafka:9092",
- "--key-store-password", "onaponap",
- "--trust-store-password", "onaponap"]
+ command: ["--configuration-file", "/etc/hv-ves/configuration/secure.json"]
environment:
- JAVA_OPTS: "-Dio.netty.leakDetection.level=paranoid"
- CONSUL_HOST: "consul-server"
- CONFIG_BINDING_SERVICE: "cbs"
- HOSTNAME: "dcae-hv-ves-collector"
+ - JAVA_OPTS
+ - HOSTNAME=${HV_VES_HOSTNAME}
+ - CONSUL_HOST
+ - CONFIG_BINDING_SERVICE
healthcheck:
interval: 10s
timeout: 5s
retries: 2
test: ${HV_VES_HEALTHCHECK_CMD}
volumes:
- - ./ssl/:/etc/ves-hv/
+ - ./collector/:/etc/hv-ves/
depends_on:
- config-binding-service
- kafka
ports:
- "7060:6060"
- "7061:6061/tcp"
- command: ["--listen-port", "6061",
- "--kafka-bootstrap-servers", "kafka:9092",
- "--ssl-disable"]
+ command: ["--configuration-file", "/etc/hv-ves/configuration/insecure.json"]
environment:
- JAVA_OPTS: "-Dio.netty.leakDetection.level=paranoid"
- CONSUL_HOST: "consul-server"
- CONFIG_BINDING_SERVICE: "cbs"
- HOSTNAME: "dcae-hv-ves-collector"
+ - JAVA_OPTS
+ - HOSTNAME=${HV_VES_HOSTNAME}
+ - CONSUL_HOST
+ - CONFIG_BINDING_SERVICE
healthcheck:
interval: 10s
timeout: 5s
retries: 2
test: ${HV_VES_HEALTHCHECK_CMD}
volumes:
- - ./ssl/:/etc/ves-hv/
+ - ./collector/:/etc/hv-ves/
depends_on:
- config-binding-service
- kafka
depends_on:
- kafka
networks:
- ves-hv-default:
- aliases:
- - dcae-app-simulator
+ - ves-hv-default
echo "Creating network for containers: ${CONTAINERS_NETWORK}"
docker network create ${CONTAINERS_NETWORK}
-cd ssl
+cd collector/ssl
./gen-certs.sh
-cd ..
+cd ../..
docker-compose up -d
#!/usr/bin/env bash
-cd ssl
+cd collector/ssl
./gen-certs.sh clean
-cd ..
+cd ../..
COMPOSE_LOGS_FILE=${WORKSPACE}/archives/containers_logs/docker-compose.log
docker-compose logs > ${COMPOSE_LOGS_FILE}
HV_VES_VERSION="1.1-SNAPSHOT"
SIMULATOR_IMAGE_FULL_NAME = os.getenv("DOCKER_REGISTRY_PREFIX") + SIMULATOR_IMAGE_NAME + ":" + HV_VES_VERSION
WORKSPACE_ENV = os.getenv("WORKSPACE")
-certificates_dir_path = WORKSPACE_ENV + "/plans/dcaegen2-collectors-hv-ves/testsuites/ssl/"
+certificates_dir_path = WORKSPACE_ENV + "/plans/dcaegen2-collectors-hv-ves/testsuites/collector/ssl/"
collector_certs_lookup_dir = "/etc/ves-hv/"
ONE_SECOND_IN_NANOS = 10 ** 9