Component | Significance |
---|
"endpointData": { "elasticSearchEndpoint": "http://localhost:9200" } | | "graph":{ "endpoint":"http://localhost:7474", "authToken":"", "boltEndPoint":"bolt://localhost:7687", "maxIdleConnections":25 } | | "grafana": { "grafanaEndpoint": "http://localhost:3000", "grafanaDBEndpoint": "jdbc:postgresql://localhost:5432/grafana", "adminUserName": "admin", "adminUserPassword": "admin", "dbUserName": "user", "dbPassword": "password" } | | "postgre": { "userName" : "user", "password" : "password", "insightsDBUrl": "jdbc:postgresql://127.0.0.1:5432/insight", "grafanaDBUrl": "jdbc:postgresql://127.0.0.1:5432/grafana" } | | "messageQueue": { "host": "localhost", "port": 5672, "user": "", "password": "", "prefetchCount": 5, "enableDeadLetterExchange":false } |
| "agentDetails": { "isOnlineRegistration":true, "onlineRegistrationMode":"nexus", "browseRepoUrl":" | https://infra.cogdevops.com/service/rest/repository/browse/docroot/insights_install/releasehttps://infra.cogdevops.com/repository/docroot/insights_install/release”, "nexusUserName":"", "nexusPassword":"", "docrootUrl":"https://platform.cogdevops.com//insights_install/release", "offlineAgentPath":"D:\Project\Insights\InSights_Windows\Agents\offlineAgent", "unzipPath":"D:\Project\Insights\InSights_Windows\Agents\PlatformAgents\unzip", "agentExchange":"iAgent", "agentPkgQueue":"INSIGHTS.AGENTS.PACKAGE" } | | "queryCache": { "esCacheIndex": "neo4j-cached-results-custom" } | queryCache - This configuration helps us to set custom Neo4j data source's query caching index in Elasticsearch. esCacheIndex - It is the custom index of Elaticsearch where cache results will be stored. For more detail check Query Caching
| "insightsServiceURL": "https://localhost:8080" | | "insightsTimeZone": "US/Central" | | "enableOnlineDatatagging": true | | "enableOnlineBackup": true | | "autheticationProtocol":"NativeGrafana" | | "emailConfiguration": { "sendEmailEnabled": false, "smtpHostServer": "", "smtpPort": "", "smtpUserName": "", "smtpPassword": "", "isAuthRequired": true, "smtpStarttlsEnable": true, "mailFrom": "onedevops@cogdevops.com", "mailTo": "", "subject": "Health Status - {TimeOfReportGeneration}", "emailBody": "Hi Team, Attaching the report File", "systemNotificationSubscriber": "" } | This section use to configure Email sendEmailEnabled : if true then Email functionality enabled smtpHostServer : SMTP server Host smtpPort : SMTP server port smtpUserName : SMTP username Detail smtpPassword : SMTP username isAuthRequired : if true then SMTP authentication enable smtpStarttlsEnable : SMTP ttl enable mailFrom : Mail from email id mailTo : No need to configure, configure it from UI like Report Management emailBody : This is aonly use for Health check Naotification page systemNotificationSubscriber : Only use for Health check Notification messages
| "singleSignOnConfig": { "entityId": "", "appId": "", "metadataUrl": "", "metdataFilePath": "", "keyStoreFilePath": "C:\InSights_Windows\Server2\INSIGHTS_HOME\.InSights\saml-keystore.jks", "keyAlias": "", "keyPass": "", "keyStorePass": "", "appBaseUrl": "baseURL", "relayStateUrl": "relayStateUrl", "defaultTargetUrl": "defaultTargetUrl", "postLogoutURL": "logoutURL", "tokenSigningKey": "insights_IDP_CogDevops_SSO_Token_string", "servicePrincipalKerberos": "", "keyTabLocationKerberos": "C:\InSights_Windows\Server2\INSIGHTS_HOME\.InSights\kerberos_keytab_file.keytab" } | entityId: Identifier (Entity ID) for your SMAL configuration appId:copy app id from App Federation Metadata Url metadataUrl:App Federation Metadata Url metdataFilePath :Download SAML Signing Certificate from sso provider site and store it in INSIGHTS_HOME keyStoreFilePath:path of certificae like saml-keystore.jks, Download this certificate from your sso provider URL keyAlias :saml-keystore.jks username keyPass :saml-keystore.jks password keyStorePass :saml-keystore.jks password appBaseUrl :Application service Host URL, Example <https://<HostOrDomainName>/PlatformService> relayStateUrl :SSO login UI page URL, Example <https://<HostOrDomainName>/app/#/ssologin> defaultTargetUrl :Application user authenticate url, Example <https://<HostOrDomainName>/user/authenticate> postLogoutURL :SAML or SSO provider logout URL, Example value https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0 tokenSigningKey :This is use as secrete key to sign JWT token,It should be 128 character ,Example value:"insights_IDP_CogDevops_SSO_Token_string" servicePrincipalKerberos: Use during Kerberos Authentication protocol for service Principal Kerberos keyTabLocationKerberos: Use during Kerberos Authentication protocol for Keytab location
| "assessmentReport": { "outputDatasource": "NEO4J", "maxWorkflowRetries": 3, "fusionExportAPIUrl": "http://localhost:1337/api/v2.0/export" } | This functionality user for Reporting feature outputDatasource : Datasouce for KPI query execution maxWorkflowRetries : No of retires for Report execution if not executed correctly fusionExportAPIUrl : User for Fusion Report
| "proxyConfiguration":{ "isEnableProxy":false, "proxyHost":"", "proxyPort":0, "proxyUsername":"", "proxyPassword":"" } | This block help user to add proxy information, proxy information is mainly use in online agent registration/update isEnableProxy : if true then it denote that Insights Application use proxy proxyHost : Proxy host information proxyPort : Proxy port information proxyUsername : Proxy user information if needed, If no user information required then keep this filed blank proxyPassword : Proxy user password if needed, If no password required then keep this filed blank |
|