| {%- from "opencontrail/map.jinja" import collector with context %} |
| # |
| # Copyright (c) 2014 Juniper Networks, Inc. All rights reserved. |
| # |
| # Control-node configuration options |
| # |
| |
| [DEFAULT] |
| # Everything in this section is optional |
| |
| # Time-to-live in hours of the various data stored by collector into |
| # cassandra |
| # analytics_config_audit_ttl, if not set (or set to -1), defaults to analytics_data_ttl |
| # analytics_statistics_ttl, if not set (or set to -1), defaults to analytics_data_ttl |
| # analytics_flow_ttl, if not set (or set to -1), defaults to analytics_statsdata_ttl |
| analytics_data_ttl={{ collector.data_ttl }} |
| analytics_config_audit_ttl={{ collector.data_ttl }} |
| analytics_statistics_ttl={{ collector.data_ttl }} |
| analytics_flow_ttl={{ collector.data_ttl }} |
| |
| cassandra_server_list={% for member in collector.database.members %}{{ member.host }}:9042 {% endfor %} |
| |
| # IP address and port to be used to connect to kafka. |
| # Multiple IP:port strings separated by space can be provided |
| kafka_broker_list={% for member in collector.database.members %}{{ member.host }}:9092 {% endfor %} |
| partitions=30 |
| |
| # IP address and port to be used to connect to zookeeper. |
| # Multiple IP:port are specified as single string separated by comma |
| zookeeper_server_list={% for member in collector.database.members %}{{ member.host }}:2182{% if not loop.last %},{% endif %}{% endfor %} |
| |
| # Disable flow collection |
| disable_flow_collection={{ collector.get('disable_flow_collection', 'false')|lower }} |
| |
| # dup=0 |
| hostip={{ collector.bind.address }} # Resolved IP of `hostname` |
| # hostname= # Retrieved as `hostname` |
| http_server_port=8089 |
| # log_category= |
| # log_disable=0 |
| log_file=/var/log/contrail/contrail-collector.log |
| # log_files_count=10 |
| # log_file_size=1048576 # 1MB |
| log_level=SYS_NOTICE |
| log_local=1 |
| |
| # TCP and UDP ports to listen on for receiving syslog messages. -1 to disable. |
| syslog_port=-1 |
| |
| # UDP port to listen on for receiving sFlow messages. -1 to disable. |
| # sflow_port=6343 |
| |
| # UDP port to listen on for receiving ipfix messages. -1 to disable. |
| # ipfix_port=4739 |
| |
| # test_mode=0 |
| |
| # Sandesh send rate limit can be used to throttle system logs transmitted per |
| # second. System logs are dropped if the sending rate is exceeded |
| # sandesh_send_rate_limit= |
| {%- if collector.get('sandesh_send_rate_limits', {}).get('collector') %} |
| sandesh_send_rate_limit={{ collector.sandesh_send_rate_limits.collector }} |
| {%- elif collector.get('sandesh_send_rate_limits', {}).get('global') %} |
| sandesh_send_rate_limit={{ collector.sandesh_send_rate_limits.global }} |
| {%- endif %} |
| |
| [COLLECTOR] |
| port=8086 |
| # server= 0.0.0.0 |
| |
| # UDP port to listen on for receiving Google Protocol Buffer messages |
| # protobuf_port=3333 |
| |
| [STRUCTURED_SYSLOG_COLLECTOR] |
| # TCP & UDP port to listen on for receiving structured syslog messages |
| # port=3514 |
| |
| # List of external syslog receivers to forward structured syslog messages in ip:port format separated by space |
| # tcp_forward_destination=10.213.17.53:514 |
| |
| # kafka broker list to forward structured syslogs |
| kafka_broker_list={% for member in collector.database.members %}{{ member.host }}:9092 {% endfor %} |
| |
| # kafka topic to forward structured syslogs |
| # kafka_topic=structured_syslog_topic |
| |
| # number of kafka partitions |
| # kafka_partitions=30 |
| |
| {%- if collector.version >= 4.1 %} |
| [CONFIGDB] |
| #rabbitmq_server_list = xx.xx.xx.xx |
| {%- if collector.get('message_queue', {}).members is defined %} |
| rabbitmq_server_list={% for member in collector.message_queue.members -%}{{ member.host }}:{{ member.get('port', 5672) }} {% endfor %} |
| {%- elif collector.get('message_queue', {}).host is defined %} |
| rabbitmq_server_list={{ collector.message_queue.host }}:{{ collector.message_queue.get('port', 5672) }} |
| {%- endif %} |
| rabbitmq_user={{ collector.get('message_queue', {}).get('user', 'guest') }} |
| rabbitmq_password={{ collector.get('message_queue', {}).get('password', 'guest') }} |
| rabbitmq_vhost={{ collector.get('message_queue', {}).get('vhost', '') }} |
| config_db_server_list={% for member in collector.get('config', {}).get('members', {}) %}{{ member.host }}:9041 {% endfor %} |
| #config_db_username= |
| #config_db_password= |
| {% else %} |
| [API_SERVER] |
| # List of api-servers in ip:port format separated by space |
| api_server_list={% for member in collector.config.members %}{{ member.host }}:9100 {% endfor %} |
| # api_server_use_ssl=False |
| {%- endif %} |
| |
| [DATABASE] |
| # disk usage percentage |
| #disk_usage_percentage.high_watermark0=90 |
| #disk_usage_percentage.low_watermark0=85 |
| #disk_usage_percentage.high_watermark1=80 |
| #disk_usage_percentage.low_watermark1=75 |
| #disk_usage_percentage.high_watermark2=70 |
| #disk_usage_percentage.low_watermark2=60 |
| |
| # Cassandra pending compaction tasks |
| #pending_compaction_tasks.high_watermark0=400 |
| #pending_compaction_tasks.low_watermark0=300 |
| #pending_compaction_tasks.high_watermark1=200 |
| #pending_compaction_tasks.low_watermark1=150 |
| #pending_compaction_tasks.high_watermark2=100 |
| #pending_compaction_tasks.low_watermark2=80 |
| |
| # Message severity levels to be written to database |
| #high_watermark0.message_severity_level=SYS_EMERG |
| #low_watermark0.message_severity_level=SYS_ALERT |
| #high_watermark1.message_severity_level=SYS_ERR |
| #low_watermark1.message_severity_level=SYS_WARN |
| #high_watermark2.message_severity_level=SYS_DEBUG |
| #low_watermark2.message_severity_level=INVALID |
| |
| [REDIS] |
| port=6379 |
| server=127.0.0.1 |
| {%- if collector.get('contrail_cache', {}).get('password') %} |
| password={{ collector.contrail_cache.password }} |
| {%- endif %} |