hv_user_0
|
Hypervisor
username. This is the username of a user with root access to the VMware
host/blade. If installing CPS to multiple blade servers, it is assumed that the
same username and password can be used for all blades.
This parameter is optional1.
|
hv_passwd_0
|
Hypervisor
Password for Hypervisor User. User can also use special (non-alpha numeric)
characters in the password.
This parameter is optional.
Note
|
To pass
special characters in the hv_passwd_0, they need to be replaced with its “% Hex
ASCII”. For example, “$” would be “%24” or “hello$world” would be
“hello%24world”.
|
|
sys_user_0
|
The CPS System
user (qns) is the main user set up on the VMs. By default, this is
qns.
|
sys_passwd_0
|
Encrypted System Password for System User 0. Refer to System Password Encryption to generate an encrypted password.
For High
Availability (HA) environments or Geographic Redundancy (GR) environments, the
password entered here in the spreadsheet is not used even if you specify one.
You must set the password for the user prior to first access by connecting to
the Cluster Manager after deployment and running the
change_passwd.sh command.
|
sys_group
|
Group for the
previous System User.
Note
|
User group
can be qns-svn, qns-ro, qns-su, qns-admin and pwauth.
pwauth group
is valid only for
qns username and no other username.
|
|
sys_user_1
|
The qns-svn
system user is the default user that has access to the Policy Builder
subversion repository.
Default:
qns-svn
|
sys_passwd_1
|
By default,
the encrypted password for qns-svn is already added in
Configuration.csv spreadsheet.
If you want to change the password for qns-svn user after CPS is deployed, you can use change_passwd.sh script. You also need to generate an encrypted password. Refer to System Password Encryption to generate an encrypted password.
The encrypted
password must be added in the
Configuration.csv spreadsheet. If the encrypted
password is not added in the spreadsheet, then after running
reinit.sh script, the qns-svn user takes the existing
default password from
Configuration.csv spreadsheet.
|
qps_user
|
-
|
selinux_state
selinux_type
|
By default, Security Enhanced Linux (SELinux) support is disabled.
Note
|
Cisco
recommends not to change this value.
|
|
firewall_state
|
Enables or
disables the linux firewall on all VMs (IPtables).
Valid Options:
enabled/disabled
Default:
enabled (This field is case sensitive)
In AIO
deployments, IPtables is disabled by default.
Note
|
An
alternate parameter ‘firewall_disabled’ can be used with true/false options to
control the IPtables functionality.
|
Note
|
In case the firewall is disabled, mongo authentication
functionality for Policy Server (QNS) read-only users is also disabled. When
firewall is enabled, mongo authentication functionality for read-only users is
enabled by default.
|
|
broadhop_var
|
Default:
broadhop
|
tacacs_enabled
|
Enter
true to enable TACACS+ authentication.
For more
information related to TACACS+, refer to
TACACS+.
|
tacacs_server
|
Enter the IP
address of the TACACS+ server.
|
tacacs_secret
|
Enter the
password/secret of the TACACS+ server.
|
tacacs_on_ui
|
This parameter is used to enable the TACACS+ authentication for Policy Builder and Control Center.
Default value is false.
Possible values are true or false.
|
allow_user_for_cluman
|
This parameter is used to update the /etc/sudoers with CPS entries on cluman.
Default value is false.
Possible values are true or false.
|
nms_managers_list
|
Define the
SNMP Network Management Station (NMS) address or hostname by replacing
corporate_nms_ip with the hostname or IP address of
your NMS.
To add
Multiple SNMP NMS destinations, replace
corporate_nms_ip with a space separated list of
hostnames or IP addresses of your NMS managers. For example:
10.105.10.10
10.202.10.10
or
10.105.10.10 10.202.10.10 2003:3041::22:22
or
nms_main nms_bck
To change
the NMS trap receiver port, update
nms_managers_list
<nms_manager_list:port_num>
For example,
nms_managers_list
corporate_nms_ip:6100
Note
|
Any
hostnames defined should also be defined in the
Additional Hosts tab of the deployment spreadsheet.
|
|
free_mem_per_alert
|
By default,
a low memory alert is generated when the available memory of any CPS VM drops
below 10% of the total memory.
To change
the default threshold, enter a new value (0.0-1.0) for the alert threshold. The
system generates an alert trap whenever the available memory falls below this
percentage of total memory for any given VM. Default: 0.10 (10% free).
|
free_mem_per_clear
|
Enter a
value (0.0-1.0) for the clear threshold. The system generates a low memory
clear trap whenever available memory for any given VM is more than 30% of total
memory. Default: 0.3 (30% of the total memory).
|
syslog_managers _list
|
Entries are
space separated tuples consisting of
protocol:hostname:port . Currently, only UDP is
supported.
Default: 514
For example:
udp:corporate_syslog_ip:514
udp:corporate_syslog_ip2:514
|
syslog_managers _ports
|
A comma
separated list of port values. This must match values in the
syslog_managers_list.
|
logback_syslog_ daemon_port
|
Port value
for the rsyslog proxy server to listen for incoming connections, used in the
rsyslog configuration on the Policy Director (LB) and in the
logback.xml
on the OAM (PCRFCLIENT).
Default:
6515
|
logback_syslog_ daemon_addr
|
IP address
value used in the
/etc/broadhop/controlcenter/logback.xml on the OAM
(PCRFCLIENT).
Default:
lbvip02
|
cpu_usage_alert_ threshold
|
The
following
cpu_usage settings are related to the High CPU Usage
Alert and High CPU Usage Clear traps that can be generated for CPS VMs. Refer
to
CPS SNMP and Alarms Guide, Release 9.1.0 and
prior releases or
CPS SNMP, Alarms and Clearing Procedures Guide, Release 10.0.0
and later releases for more details about these SNMP traps.
Set the
higher threshold value for CPU usage. System generates an Alert trap whenever
the CPU usage is higher than this value.
|
cpu_usage_clear_ threshold
|
Set the
lower threshold value for CPU usage. System generates a Clear trap whenever the
CPU usage is lower than this value and alert trap already generated.
|
cpu_usage_trap_ interval_cycle
|
This value
is used as an interval period to execute the CPU usage trap script. The
interval value is calculated by multiplying 5 with the given value. For
example, if set to 1 then the script is executed every 5 sec.
The default
value is 12, which means the script is executed every 60 seconds.
|
snmp_trap_community
|
This value
is the SNMP trap community string.
Default:
broadhop
|
snmp_ro_community
|
This value
is the SNMP read-only community string.
Default:
broadhop
|
monitor_replica_timeout
|
This value
is used to configure timeout value.
The default
value is 540 sec considering four replica sets. The customer can set timeout
value according to the number of replica sets in their network.
To recover
single session replica-set, it takes approx 120 sec and adding 20% buffer to
it; we are using 540 sec for default (for four replica sets).
Without any
latency between sessionmgr VMs, one replica-set recovers in ~135 sec. If
latency (40 -100 ms) is present between sessionmgr VMs we can add 10% buffer to
135 sec and set the timeout value for the required number of replica sets in
customer’s network.
|
snmpv3_enable
|
This value
is used to enable/disable the SNMPv3 support on CPS. To disable the SNMPv3
support, set this value to FALSE.
Default:
TRUE
|
v3User
|
User name to
be used for SNMPv3 request/response and trap.
Default:
cisco_snmpv3
|
engineID
|
This value
is used for SNMPv3 request/response and on which NMS manager can receive the
trap. It should be a hex value.
Default:
0x0102030405060708
|
authProto
|
This value
specifies the authentication protocol to be used for SNMPv3. User can use
MD5/SHA as the authentication protocol.
Default: SHA
|
authPass
|
This value
specifies the authentication password to be used for SNMPv3 requests. It should
have minimum length as 8 characters.
Default:
cisco_12345
|
privProto
|
This value
specifies Privacy/Encryption protocol to be used in SNMPv3 request/response and
SNMP trap. User can use AES/DES protocol.
Default: AES
|
privPass
|
This value
specifies Privacy/Encryption password to be used in SNMPv3. It is an optional
field. If it is blank then value specified in authPass is used as privPass.
Default:
<blank>
|
sctp_enabled
|
By default,
SCTP support is enabled. For more information about enabling/disabling this
functionality, refer to
SCTP Configuration.
Default:
TRUE
|
corosync_ping_hosts
|
Moving
corosync resources (like VIPs) when the connectivity is lost between lb01 or
lb02 (or pcrfclient01/02) to hosts configured in this field. So if lb01 cannot
connect to sessionmgr01 and sessionmgr02 then corosync resources (like VIPs)
are moved from lb01 to lb02.
Example: key
= corosync_ping_hosts and Value = sessionmgr01 sessionmgr02
|
avoid_corosync_split_brain
|
If this
field is not defined or value is 0, and when both nodes fail to connect to the
configured corosync_ping_hosts, then the resources stay on the last active
node. If value is 1, and both nodes fail to connect to configured
corosync_ping_hosts, then the resources are not available on any nodes.
Remember
|
A split brain scenario
(that is, VIPs are up on both nodes) can still occur when there is connectivity
loss between lb01 and lb02 and not with other hosts.
|
|
rsyslog_tls
|
This field
is used to enable or disable encryption for rsyslog.
Default:
TRUE
|
rsyslog_cert
|
This field
is used to define the path for trusted Certificate of server.
|
rsyslog_ca
|
This field
is used to define the Path of certifying authority (CA).
Default:
/etc/ssl/cert/quantum.pem
|
rsyslog_key
|
This field
is used to define the path of private key.
|
haproxy_stats_tls
|
This field
is used to enable or disable the encryption for HAproxy statistics (including
diameter statistics).
Default:
TRUE
|
redis_authentication
_enabled
|
This field is used to enable or disable Redis authentication.
Default: TRUE (For fresh installations)
To enable or disable redis authentication for upgrade and migration, refer to Redis Authentication for Upgrading/Migrating Systems.
|
redis_authentication
_passwd
|
This field is used to add an encrypted password for Redis. For more information on about generating encrypted password, refer
to Redis Authentication.
|
redis_server_count
|
This value specifies the number of redis server instances running on each policy director (lb) VM. For more information on
redis functionality, refer to Configure Multiple Redis Instances.
Redis can
be enabled with the number of instances as defined in
redis_server_count. If the value for redis server
count is not provided, default value of 3 for redis_server_count is considered.
To disable
redis explicitly, redis server count should have value 0.
Default: 3
Value range:
0 to 64
|
remote_redis_server_count
|
This value
can be added for Geographic Redundancy (GR) deployments only.
This value
specifies the number of redis server instances running on each remote policy
director (lb) VM.
If this
value is not configured, remote redis server instances are not added for GR
deployments.
|
snmpRouteLan
|
This field
contains the value of a VLAN name which can be used to access the KPIs value
provided by SNMP.
Default: Oam
|
redis_for_ldap_required
|
This
parameter is used only when dedicated LDAP instance is required.
Default:
false
Possible Values: true, false
If you
configure LDAP instance explicitly, first redis instance on policy director
(lb) VMs running on port 6379 is used for LDAP and the remaining are used for
diameter.
Note
|
If you
configure
redis_for_ldap_required parameter, then the following
changes are automatically added in configuration files.
In
/etc/broadhop/qns.conf file, an additional parameter
-DldapRedisQPrefix=ldap is added.
/etc/broadhop/redisTopology.ini file has the
following content if
redis_for_ldap_required=true and
redis_server_count=3 :
ldap.redis.qserver.1=lb01:6379
policy.redis.qserver.2=lb01:6380
policy.redis.qserver.3=lb01:6381
ldap.redis.qserver.4=lb02:6379
policy.redis.qserver.5=lb02:6380
policy.redis.qserver.6=lb02:6381
If a
dedicated LDAP instance is required, you many also want to consider increasing
the total redis servers to accomodate the diameter traffic.
For
example, if
redis_for_ldap_required property was not configured,
and
redis_server_count=3 then after configuring
redis_for_ldap_required as true, you want to increase
total redis server count to 4 by setting
redis_server_count=4 .
|
|
andsf_ip
|
Specifies
the IP address of the ANDSF interface. This is an optional parameter and only
used to configure the ANDSF API and URL.
2
|
andsf_port
|
Specifies
the port number of the ANDSF interface. This is an optional parameter and only
used to configure the ANDSF API and URL.3
Default: 443
|
andsf_nic
|
Specifies
the interface name. This value is required when the firewall is enabled.
This is an
optional parameter.
Possible Values: eth2, eth3
|
enable_tlsv1.0_andsf
|
Enables
TLSv1.0 for the Policy Builder interface.
This is an
optional parameter.
Default:
Disabled
Possible Values: Enabled, Disabled
|
min_tls_andsf
|
Defines the
minimum TLS version supported by the ANDSF interface.
This is an
optional parameter.
Default: 1.1
Possible Values: 1.1, 1.2
|
max_tls_andsf
|
Defines the
maximum TLS version supported by the ANDSF interface.
This is an
optional parameter.
Default: 1.2
Possible Values: 1.1, 1.2
|
default_tls_andsf
|
Defines the
default TLS version used by the ANDSF interface.
This is an
optional parameter.
Default: 1.2
Possible Values: 1.1, 1.2
|
database_nics
|
This
parameter allows user to provide interface names on which firewall must be
opened for replica-set on a VM.
If
database_nics is not configured, firewall is opened
only for internal interface for a replica-set.
If
database_nics is configured, then firewall is opened
for configured interfaces and internal interface as well (even if it is not
mentioned in
database_nics ). This field has semicolon (;) separated
interface names for firewall ports to be opened for a replica-set on a VM.
Note
|
This
field is effective only when the firewall is enabled.
|
|
db_authentication_
enabled
|
This field
is used to enable or disable MongoDB authentication.
Possible Values: TRUE, FALSE
Note
|
You must
configure
db_authentication_ enabled parameter. This parameter
cannot be left empty. To disable the authentication, the parameter value must
be set as FALSE. To enable, the value should be TRUE, and admin and readonly
passwords must be set. This is applicable only for new installs and not for
upgrades.
|
For more
information, refer to
MongoDB Authentication.
|
db_authentication_
admin_passwd
|
This
parameter is the encrypted password for admin user and is applicable only when
db_authentication_enabled is set to
TRUE. The following command is used to generate
encrypted password from Cluster Manager:
/var/qps/bin/support/mongo/encrypt_passwd.sh
<Password>
For more
information, refer to
MongoDB Authentication.
|
db_authentication_
readonly_passwd
|
This
parameter is the encrypted password for readonly user. The following command is
used to generate encrypted password from Cluster Manager:
/var/qps/bin/support/mongo/encrypt_passwd.sh
<Password>
For more
information, refer to
MongoDB Authentication.
|
enable_ssh_login_security
|
This
parameter allows user to enable or disable SSH login security.
Default:
disabled
Possible Values: enabled, disabled
|
cps_admin_user_cluman
|
This
parameter is used to configure Cluster Manager administrator user.
|
cps_admin_password_
cluman
|
This
parameter is the encrypted password for administrator user.
|
whitelisted_hosts_for_ssh
|
Valid values
are colon separated host names/IP addresses of the machine for which SSH access
needs to be allowed.
This
configuration is effective only when the SSH login security is enabled.
If the
hostname is mentioned then it should be resolvable by CPS VM's. No validation
on hostname/IP addresses is provided. You can specify both IPv4/IPv6 address.
Note
|
New
whitelisted host list overwrites the old list. If the new whitelist host
configuration is empty then all old additional whitelisted hosts (apart from
standard local CPS VM's host ) are deleted.
|
|
LDAP SSSD
Configuration
|
For more information, refer to LDAP SSSD Configuration.
|
enable_prometheus
|
This
parameter is used to enable/disable Prometheus in CPS.
Default:
disabled
Possible
Values: enabled, disabled
For more
information, refer to
Prometheus and Grafana chapter in
CPS
Operations Guide.
|
stats_granularity
|
This parameter is used to configure statistics granularity in seconds.
Default: 10
seconds
Possible
Values: Positive Number
For more
information, refer to
Prometheus and Grafana chapter in
CPS
Operations Guide.
|
restrict_access_http_port
|
When set to true, the http port on pcrfclient and Cluster Manager VMs listens only on internal guest NIC and loopback interface.
By default, this parameter is not present in Configuration.csv file.
Possible Values: true, false
|
service_log_tmpfs_enabled
|
This parameter is used to enable or disable service log on tmpfs.
Currently, this is supported only on Policy Director (LB), Policy Server (QNS) and UDC VMs.
Default: false
Possible Values: true, false
If this parameter is not configured, then by default, the value is false.
|
pcrf_proc_mon_list
|
This parameter is used to configure additional processes on OAM (pcrfclient) VMs. Multiple processes need to be semicolon
separated. By default, the following processes are monitored:
|
lb_proc_mon_list
|
This parameter is used to configure additional processes on Policy Director (LB) VMs. Multiple processes need to be semicolon
separated. By default, the following processes are monitored:
|
qns_proc_mon_list
|
This parameter is used to configure additional processes on Policy Server (QNS) VMs. Multiple processes need to be semicolon
separated. By default, the following processes are monitored:
|
sm_proc_mon_list
|
This parameter is used to configure additional processes on sessionmgr VMs. Multiple processes need to be semicolon separated.
By default, the following processes are monitored:
|
udc_proc_mon_list
|
This parameter is used to configure additional processes on UDC VMs. Multiple processes need to be semicolon separated. By
default, the following processes are monitored:
|
lwr_proc_mon_list
|
This parameter is used to configure additional processes on LWR VMs. Multiple processes need to be semicolon separated. By
default, the following processes are monitored:
|
perf_mod
|
1 or undefined: CPS java processes are run by Zulu on Policy Server (QNS), Policy Director (LB), and UDC VMs.
2: CPS java processes are run by Zing on Policy Server (QNS), Policy Director (LB), and UDC VMs.
By default (1), CPS java process is run by Zulu on Policy Server (QNS), Policy Director (LB), and UDC VMs.
Note
|
Minimum memory requirement for Zing:
If minimum memory requirement is not met, java processes are run by Zulu irrespective of performance mode defined.
|
Note
|
Zing is only supported on Policy Server (QNS), Policy Director (LB), UDC, and LWR VMs. It is not supported on pcrfclient and
session manager VMs.
|
|
gc_alarm_state
|
This parameter is used to enable or disable the GC alarm.
Default: false
Possible Values: true, false
|
gc_alarm_
trigger_count
|
This parameter is used to configure the value of continous GCs after which the GC alarm is generated from the system.
Default: 3
|
gc_alarm_
trigger_interval
|
This parameter is used to indicate the interval under which the gc_alarm_trigger_count occurs to generate the GC alarm.
Default: 600 (10 mins)
|
gc_clear_
trigger_interval
|
This parameter is used to indicate the interval under which the there is no GC event and GC clear notofication is generated.
Default: 900 (15 mins)
|
oldgen_
alarm_state
|
This parameter is used to enable or disable the Old generation alarm.
Default: false
Possible Values: true, false
|
oldgen_alarm_
trigger_thr_per
|
This parameter is used to indicate the threshold in percentage for Old Generation post GC event to generate the Old Generation
alarms.
Default: 50
|
oldgen_clear_
trigger_thr_per
|
This parameter is used to indicate the threshold in percentage for Old Generation post GC event to generate the Old Generation
clear notification.
Default: 40
|
no_of_cont_
fullgc_for_oldgen
|
This parameter is used to indicate the number of continuous GC events under which the Old generation value is more than oldgen_alarm_trigger_thr_per
to generate the Old generation alarm.
Default: 2
|
alarm_resync_enabled
|
This parameter is used to store and forward the alarms based on NMS availability.
Default: false
Possible Values: true, false, TRUE, FALSE, True, False
alarm_resync_enabled should start at the first characer in the line and there must be no additional characters after true/false.
Restriction
|
When NMS comes up, it takes almost 5 mins for system to start sending the stored alarms to NMS. In between if any alarm gets
generated by the system, it is sent to NMS. So there is possibility that NMS may receive latest alarms first and all the older
alarms later. This happens only when NMS is unreachable and comes back to rechable state.
-
Multiple NMSs are configured: If few NMS servers are down, then the alarm resync feature will not store the alarms to be sent
to NMS.
-
Multiple NMSs are configured: If all NMS servers are down, then the alarm resync feature stores the alarms in Admin database
and sends them to NMS when it is reachable.
-
Single NMS is configured: If NMS server is down, then the alarm resync feature stores the alarms in Admin database and sends
them to NMS when it is reachable.
-
Single NMS is configured: If NMS server is up, then the alarm resync feature does not not store the alarms but just forwards
the alarms to NMS.
|
|
autoheal_qns_enabled
|
autoheal_qns_enabled parameter helps app_monitor.sh script (application monitor script) to take the decision to restart the QNS process or not.
-
FALSE: To disable the restart QNS process in case of the MongoDB health monitor failed to reset the MongoDB client connection.
-
TRUE: To enable the restart QNS process in case of the MongoDB health monitor failed to reset the MongoDB client connection.
For installing platform script, see Installing Platform Scripts for MongoDB Health Monitoring - VMware.
|