Configure IWD Data Mart

From Genesys Documentation
Jump to: navigation, search
This topic is part of the manual IWD Data Mart Private Edition Guide for version Current of Intelligent Workload Distribution.

Override Helm chart values

The following table provides information on the IWD Data Mart deployment settings:

Key Type Default Description
image.imagePullSecrets list `[]` imagePullSecrets must have the following format:
- name: pullSecret1
- name: pullSecret2
image.pullPolicy string `"IfNotPresent"` Image pull policy
image.registry string `""` Image registry
image.repository string `""` Image repository
image.tag string `""` Image tag
iwddm.cronjob.schedule string `"*/15 * * * *"` IWDDM cronjob start schedule in cron format
iwddm.cronjob.suspend bool `false` IWDDM suspend: if true, it won't start
iwddm.db.createConfigmap bool `false` Create a config map for db access parameters
iwddm.db.dbname string `nil` IWDDM database name string `nil` IWDDM database hostname
iwddm.db.port int `5432` IWDDM database port
iwddm.db.secret.enabled bool `false` Create IWDDM database secret
iwddm.db.secret.password string `nil` IWDDM database password to put in the secret
iwddm.db.secret.secretName string `nil` IWDDM database secret name
iwddm.db.user string `nil` IWDDM database user
iwddm.env.batchSize int `10000` Events load batch size
iwddm.env.executionChain string `"full"`
iwddm.env.httpProxyUrl string `""` IWDDM will try to connect to IWD using http proxy
iwddm.env.httpsProxyUrl string `""` IWDDM will try to connect to IWD using https proxy
iwddm.env.monitoring.enabled bool `false` Enable push metrics to Pushgateway
iwddm.env.monitoring.pushgateway_url string `""` Since IWDDM is a short living cronjob, it uses Pushgateway for providing metrics
iwddm.env.restUrl string `""` IWD REST endpoint url
iwddm.env.wfm object `{"enabled":false}` Push data to WFM if enabled
iwddm.helmTest.args list `["export PGPASSWORD=${IWDDM_PASSWORD}; psql -c \"select now()\""]` Arguments passed to the helm test command
iwddm.helmTest.command list `["/bin/bash","-c"]` Command for helm test
iwddm.helmTest.image string `"postgres:latest"` Image for helm test
iwddm.labels object `{}` Extra labels
iwddm.nodeSelector object `{}` Node labels for assignment.
iwddm.priorityClassName string `""` Priority Class
iwddm.resources.limits.cpu string `"100m"` IWDDM Kubernetes CPU limit
iwddm.resources.limits.memory string `"160Mi"` IWDDM Kubernetes memory limit
iwddm.resources.requests.cpu string `"50m"` IWDDM Kubernetes CPU request
iwddm.resources.requests.memory string `"128Mi"` IWDDM Kubernetes memory request
iwddm.securityContext object `{}` Security Context
Containers should run as genesys user and cannot use elevated permissions
Note: These options must not be changed unless instructed by Genesys.
iwddm.serviceAccount.create bool `true` Create service account for IWDDM string `nil` The name of the ServiceAccount to use.
If not set and create is true, a name is generated using the fullname template
iwddm.tenantId int `1` Tenant short 4-digit ID
iwddm.volumeMounts object `{}` Volumes mounted into an IWDDM container
iwddm.volumes string `nil` Must be declared with starting |- since they are parsed as a template
podAnnotations object `{}` Add annotations to all pods
podLabels object `{}` Add labels to all pods

Configure Kubernetes


Not applicable as all required ConfigMaps are created via Helm Chart basing on the provided values.


IWD Data Mart requires several secrets to be created.

Create the pull secret

Use the following code snippet as an example of how to create pull secret:

kubectl create secret docker-registry mycred --docker-username=<jfrog_username> --docker-password=<API key from jfrog>

You can add mycred to Helm override values by setting image.imagePullSecrets to [ mycred ].

For OpenShift, you may add the mycred secret in current namespace as the default pull secret:
oc secrets link default mycred --for=pull

IWDDM PostgreSQL password

It can be configured in Helm values as shown in the sample:
      enabled: true
      secretName: iwddm-db-secret-0001
      password: somePassword1
  volumes: |-
    - name: iwddm-db-secrets
        secretName: iwddm-db-secret-0001
  volumeMounts: |-
    - name: iwddm-db-secrets
      readOnly: true
      mountPath: "/mnt/env-file-secrets/db-file-secrets"

IWDDM iWD x-api-key

It must exist before your IWDDM deployment. It must be created with the following format:


Sample password creation:

kubectl create secret generic 0001-iwd-secrets \

IWD x-api-key can be configured as shown below:

  volumes: |-
    - name: iwd-secrets
        secretName: 0001-iwd-secrets
volumeMounts: |-
    - name: iwd-secrets
      readOnly: true
      mountPath: "/mnt/env-file-secrets/iwd-file-secrets"

GIM database password

Create a multi-line secret in the following way:

Create a file, gim-secret.txt with the following text:

Create a secret from the file:

kubectl create secret generic gim-secrets \
Then, mount it using Helm values:
  volumes: |-
    - name: gim-secrets
        secretName: gim-secrets
volumeMounts: |-
    - name: gim-secrets
      readOnly: true
      mountPath: "/mnt/gim-secrets/gim-secret"

Configure security

IWDDM needs the username and password provided for PostgreSQL access.

Arbitrary UIDs in OpenShift

To use arbitrary UIDs in your OpenShift deployment, ensure the following settings:
  runAsNonRoot: true
  runAsUser: null
  runAsGroup: 0

Configure IWD REST endpoint

IWD REST URL provided for IWDDM in the iwddm.env.restUrl parameter must be:


The above endpoint may change depending on the configuration and where IWD is installed. Refer to IWD documentation for information on this endpoint.

Configure connection to WFM

IWD DM can connect and push metrics to Workforce Management (WFM).

The following Helm values must be configured:

Helm key Sample value
iwddm.env.wfm.enabled true
iwddm.env.wfm.health_url http://wfm-t<short_tenant_id>-backend.wfm.svc.cluster.local.:7010/wfm/api/v3
iwddm.env.wfm.rest_url http://wfm-t<short_tenant_id>-backend.wfm.svc.cluster.local.:7010/?Handler=DISCO
iwddm.env.wfm.gauth.enabled true
iwddm.env.wfm.gauth.rest_url http://gauth-auth-active.gauth.svc.cluster.local.:80
iwddm.env.wfm.gauth.client_id <iwddm_client_id>
iwddm.env.wfm.gauth.client_secret valueFrom:
key: <k8s_secret_field>
name: <k8s_secret_name>
Comments or questions about this documentation? Contact us for support!