Setting up the coordinator service
Learn how to set up the coordinator service.
Coordinator service secret
Key Name | Value Description |
---|---|
api_password |
Password for coordinator API basic authorization. For a backup deployment, keep it the same as the primary deployment value. |
api_username |
Username for coordinator API basic authorization. For a backup deployment, keep it the same as the primary deployment value. |
trust_store_password |
Truststore password for the SSL verification. The certificate for the truststore is the
certificate authority (CA) certificate that created the route. For more information about how to
create a Red Hat®
OpenShift route
with a secured route, see Secured routes in the
Red Hat
OpenShift Container Platform documentation.
Necessary for the backup deployment. This value is not used for a primary deployment, but it must be
defined. Set this value to empty for your primary deployment. Note: This value is mandatory for
backup deployments.
If the truststore password is not set for your backup deployment, the
following error is displayed.
If
a dummy value is used for your backup deployment, the following error is
displayed.
|
Run the following command to create the coordinator service secret:
oc create secret generic <ReleaseName>-coordinator-api-secret --from-literal=api_username=<your_username> --from-literal=api_password=<your_password> --from-literal=trust_store_password=<your_truststore_password>
primary
and
backup
deployments.Create a dr_coordinator
secret on both the primary and backup clusters. Run the
following commands:
oc create secret generic ${PRIMARY_NAME}-coordinator-api-secret \
--from-literal=api_username=api_username \
--from-literal=api_password=api_password \
--from-literal=primary_api_username=NOT-USED-BUT-MUST-BE-DEFINED \
--from-literal=primary_api_password=NOT-USED-BUT-MUST-BE-DEFINED \
--from-literal=trust_store_password=NOT-USED-BUT-MUST-BE-DEFINED \
--namespace ${PRIMARY_NAMESPACE}
oc create secret generic ${BACKUP_NAME}-coordinator-api-secret \
--from-literal=api_username=api_username \
--from-literal=api_password=api_password \
--from-literal=primary_api_username=api_username \
--from-literal=primary_api_password=api_password \
--from-literal=trust_store_password=NOT-USED-BUT-MUST-BE-DEFINED \
--namespace ${BACKUP_NAMESPACE}
client-id
and client-secret
values in the
was-oauth-cnea-secret
secret must be different on the primary cluster and backup
cluster. Distinct values avoid confusion between the two hybrid kit deployments. After the hybrid
integration kit is deployed on each DASH instance, add
both client IDs to the
$JAZZSM_HOME/profile/config/cells/JazzSMNode01Cell/oauth20/NetcoolOAuthProvider.xml
file.noihybrid
deployment properties on the primary
cluster:spec:
serviceContinuity:
continuousAnalyticsCorrelation: true
isBackupDeployment: false
noihybrid
deployment properties on the backup
cluster:spec:
serviceContinuity:
continuousAnalyticsCorrelation: true
isBackupDeployment: true
helmValuesNOI:
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs: https://<proxy_host1>,https://<proxy_host2>
ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName: rook-cephfs
helmValuesNOI:
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap: users-certificates
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck: true
helmValuesNOI:
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap: users-certificates
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck: true
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs: https://proxy1.xyz.com,https://proxy2.xyz.com
ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName: rook-cephfs
Coordinator Service Settings
The table describes what configuration parameters are exposed for the coordinator service in the IBM Netcool Operations Insight on Red Hat OpenShift Custom Resource (CR) definition.
Cluster | SectionName | PropertyName | Description | Default |
---|---|---|---|---|
Primary, Backup | serviceContinuity |
continuousAnalyticsCorrelation |
Necessary to activate the disaster recovery (DR) service on a failover hybrid cluster. If you have a stand-alone hybrid cluster, then the DR service is not needed. If set to Before |
false
|
Primary, Backup | serviceContinuity |
isBackupDeployment |
Necessary on the backup cluster, but not on the primary cluster. Determines the deployment state of the coordinator service. When set to |
false |
Primary, Backup | helmValuesNOI |
ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName |
Required: Storage class for the coordinator service. |
|
Backup | helmValuesNOI |
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs |
Required: Proxy URLs by comma separation. This URL connects backup and the primary cluster . This is a valid setting for backup deployment. Note: Valid for backup deployment only.
|
|
Backup | helmValuesNOI |
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck |
Optional: To enable and disable SSL, check for the connection with primary deployment. Note: Valid for backup deployment only.
|
false |
Backup | helmValuesNOI |
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap |
Necessary when
A configmap name with root certificates for proxies. Note: Valid for backup deployment only.
|
false |
Backup | helmValuesNOI |
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.numberOfProxyConnectionCheck |
Optional: Numbers of check for primary availability need to be done before backup to take charge as acting primary. Note: Valid for backup deployment only.
|
10 |
Backup | helmValuesNOI |
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.intervalBetweenRetry |
Optional: Interval between each check to primary availability. The value is in milliseconds. Note: Valid for backup deployment only.
|
1000 |
Primary, Backup | helmValuesNOI |
ibm-ea-dr-coordinator-service.coordinatorSettings.logLevel |
Optional: Log level for coordinator service. | DEBUG |
Disaster recovery coordinator properties
helmValuesNOI:
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap: users-certificates
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck: true
ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs: 'https://proxy-abc.xyz.com,
https://proxy-abc.xyz.com'
ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName: rook-cephfs
Configmap for root certificates of the proxies
The configmap contains the root signing certificate for the front end of the proxies that are mentioned in ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs. It is required when ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck is set to true.
apiVersion: v1
data:
proxyRootCert.crt: |
-----BEGIN CERTIFICATE-----
<Signing Root Certificate for Proxy Frontend>
-----END CERTIFICATE-----
kind: ConfigMap
metadata:
name: <Configmap Name>
namespace: <name space>