Difference between revisions of "PEC-REP/Current/GIMPEGuide/ConfigureGSP"
m (Text replacement - "Genesys Engage [cC]loud" to "Genesys Multicloud CX") |
|||
Line 5: | Line 5: | ||
|ComingSoon=No | |ComingSoon=No | ||
|Section={{Section | |Section={{Section | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|sectionHeading=Override Helm chart values | |sectionHeading=Override Helm chart values | ||
+ | |anchor=OverrideValues | ||
|alignment=Vertical | |alignment=Vertical | ||
|structuredtext=Download the GSP Helm charts from JFrog using your credentials. You must override certain parameters in the GSP '''values.yaml''' file to provide deployment-specific values for certain parameters. | |structuredtext=Download the GSP Helm charts from JFrog using your credentials. You must override certain parameters in the GSP '''values.yaml''' file to provide deployment-specific values for certain parameters. | ||
Line 63: | Line 13: | ||
If you want to use arbitrary UIDs in your OpenShift deployment, you must override the '''securityContext''' settings in the GSP '''values.yaml''' file, so that no user or group IDs are specified. For details, see [[{{FULLPAGENAME}}#Security|Configure security]], below. | If you want to use arbitrary UIDs in your OpenShift deployment, you must override the '''securityContext''' settings in the GSP '''values.yaml''' file, so that no user or group IDs are specified. For details, see [[{{FULLPAGENAME}}#Security|Configure security]], below. | ||
+ | |||
+ | To enable S3-compatible storage to store data that GSP requires during processing, see [[{{FULLPAGENAME}}#Storage|Configure S3-compatible storage]], below. | ||
+ | <!-- | ||
+ | {{Editgrn_open}}You can also specify values in the '''values.yaml''' to override the default values of configuration options that control GSP behavior and to customize user data and certain mappings. For more information, see [[{{FULLPAGENAME}}#Options|Configure GSP behavior]].{{Editgrn_close}}--> | ||
At a minimum, you must override the following key entries in the GSP '''values.yaml''' file: | At a minimum, you must override the following key entries in the GSP '''values.yaml''' file: | ||
*<tt>image:</tt> | *<tt>image:</tt> | ||
− | *:<tt>registry</tt> | + | *:<tt>registry</tt> — ''the registry from which Kubernetes will pull images (''<tt>pureengage-docker-staging.jfrog.io</tt> ''by default)'' |
− | *:<tt>tag</tt> | + | *:<tt>tag</tt> — ''the container image version'' |
*<tt>imagePullSecrets:</tt> | *<tt>imagePullSecrets:</tt> | ||
− | *:<tt> | + | *:<tt>pureengage-docker-dev</tt> or <tt>pureengage-docker-staging</tt> — ''the secret from which Kubernetes will get credentials to pull the image from the registry'' <!--{{Editgrn_open}}<font color=red>'''Writer's note:''' The PAT team instructions show jfrog-stage-credentials but that parameter is not in the values.yaml?</font>{{Editgrn_close}}--> |
*<tt>kafka:</tt> | *<tt>kafka:</tt> | ||
− | *:<tt>bootstrap</tt> | + | *:<tt>bootstrap</tt> — ''the Kafka address to align with the infrastructure Kafka'' |
− | + | <!--{{Editgrn_open}}<font color=red>'''Writer's note:''' Should we add a note that the storage:pvc parameter is not used?</font>{{Editgrn_close}}--> | |
− | |||
− | |||
− | |||
− | = | ||
− | |||
− | < | + | If topic names in your Kafka configuration have been customized, you must also modify the <tt>kafka:topic</tt> parameter values to match. For more details about the required Kafka topics, see {{Link-SomewhereInThisVersion|manual=GIMPEGuide|topic=PlanningGSP|anchor=Kafka|display text=Kafka configuration}}. |
− | + | ||
− | + | {{NoteFormat|Treat your modified '''values.yaml''' file as source code, which you are responsible to maintain so that your overrides are preserved and available for reuse when you upgrade.}} | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|Status=No | |Status=No | ||
}}{{Section | }}{{Section | ||
|sectionHeading=Configure Kubernetes | |sectionHeading=Configure Kubernetes | ||
|alignment=Vertical | |alignment=Vertical | ||
− | |structuredtext={{ | + | |structuredtext= |
+ | {{AnchorDiv|Secrets}} | ||
+ | ===Secrets=== | ||
+ | GSP requires the following secrets: | ||
+ | * <tt>docker-registry</tt> — Credentials to pull the image from the JFrog repository | ||
+ | * <tt>kafka-secrets</tt> — Credentials to access Kafka | ||
+ | * <tt>gsp-s3</tt> — Credentials to access S3-compatible storage | ||
+ | |||
+ | Except for <tt>docker-registry</tt> and <tt>kafka-secrets</tt>, which you must create manually (see the environment setup instructions on {{Link-SomewhereInThisVersion|manual=GIMPEGuide|topic=DeployGSP}}), Helm creates the secrets based on values you specify in the '''values.yaml''' file. | ||
+ | |||
+ | {{AnchorDiv|ConfigMaps}} | ||
+ | ===Config Maps=== | ||
+ | Helm creates a number of Config Maps based on option values you specify in the '''values.yaml''' file<!-- (see [[{{FULLPAGENAME}}#Options|Configure GSP behavior]])-->. There are no Config Maps you can configure directly. | ||
|Status=No | |Status=No | ||
}}{{Section | }}{{Section | ||
Line 282: | Line 79: | ||
</source> | </source> | ||
|Status=No | |Status=No | ||
− | }} | + | }}{{Section |
+ | |sectionHeading=Configure S3-compatible storage | ||
+ | |anchor=Storage | ||
+ | |alignment=Vertical | ||
+ | |structuredtext=<!--{{Editgrn_open}}If you are not using the default Azure Blob Storage{{Editgrn_close}}-->To enable S3-compatible storage, modify the following entries in the '''values.yaml''' file: | ||
+ | * <tt>azure:</tt> | ||
+ | *: <tt>enabled:</tt> false | ||
+ | * <tt>storage:</tt> | ||
+ | *: <tt>gspPrefix</tt> — ''the bucket name'' | ||
+ | *: <tt>gcaSnapshots</tt> — ''the bucket name where the GCA snapshot is stored'' | ||
+ | *: <tt>s3</tt> — ''the applicable details defined with the OBC or GCP bucket'' | ||
+ | *:'''Note:''' The <tt>host</tt> parameter is ignored. | ||
+ | |||
+ | ====OpenShift example==== | ||
+ | <source lang="bash">azure: | ||
+ | enabled: false | ||
+ | .. | ||
+ | storage: | ||
+ | host: gspstate{{.Values.short_location}}{{.Values.environment}}.blob.core.windows.net | ||
+ | #gspPrefix: wasbs://gsp-state@{{ tpl .Values.job.storage.host . }}/{{ .Release.Name }}/ | ||
+ | gspPrefix: "s3p://gim-3f7ac1ab-03b9-445b-ba12-137d4bbc3c38/{{ .Release.Name }}/" | ||
+ | #gcaSnapshots: wasbs://gca@{{ tpl .Values.job.storage.host . }}/ | ||
+ | gcaSnapshots: "s3p://gim-3f7ac1ab-03b9-445b-ba12-137d4bbc3c38/gca/" | ||
+ | checkpoints: '{{ tpl .Values.job.storage.gspPrefix . }}checkpoints' | ||
+ | savepoints: '{{ tpl .Values.job.storage.gspPrefix . }}savepoints' | ||
+ | highAvailability: '{{ tpl .Values.job.storage.gspPrefix . }}ha' | ||
+ | s3: | ||
+ | endpoint: "https://s3.openshift-storage.svc:443" | ||
+ | accessKey: "<access key>" | ||
+ | secretKey: "<secret key>" | ||
+ | pathStyleAccess: "true"</source> | ||
+ | |||
+ | ====GKE example==== | ||
+ | <source lang="bash">azure: | ||
+ | enabled: false | ||
+ | ... | ||
+ | storage: | ||
+ | host: gspstate{{.Values.short_location}}{{.Values.environment}}.blob.core.windows.net | ||
+ | #gspPrefix: wasbs://gsp-state@{{ tpl .Values.job.storage.host . }}/{{ .Release.Name }}/ | ||
+ | gspPrefix: "s3p://test-example-bucket-one/{{ .Release.Name }}/" | ||
+ | #gcaSnapshots: wasbs://gca@{{ tpl .Values.job.storage.host . }}/ | ||
+ | gcaSnapshots: "s3p://test-example-bucket-one/gca/" | ||
+ | checkpoints: '{{ tpl .Values.job.storage.gspPrefix . }}checkpoints' | ||
+ | savepoints: '{{ tpl .Values.job.storage.gspPrefix . }}savepoints' | ||
+ | highAvailability: '{{ tpl .Values.job.storage.gspPrefix . }}ha' | ||
+ | s3: | ||
+ | endpoint: "https://storage.googleapis.com:443" | ||
+ | accessKey: "<access Key>" | ||
+ | secretKey: "<secret key>" | ||
+ | pathStyleAccess: "true"</source> | ||
+ | |Status=No | ||
+ | }}<!--{{Section | ||
+ | |sectionHeading=Configure GSP behavior | ||
+ | |anchor=Options | ||
+ | |alignment=Vertical | ||
+ | |structuredtext= | ||
+ | |Status=No | ||
+ | }}--> | ||
|PEPageType=9c3ae89b-4f75-495b-85f8-d8c4afcb3f97 | |PEPageType=9c3ae89b-4f75-495b-85f8-d8c4afcb3f97 | ||
}} | }} |
Revision as of 19:53, March 30, 2022
Contents
Learn how to configure GIM Stream Processor (GSP).
Override Helm chart values
Download the GSP Helm charts from JFrog using your credentials. You must override certain parameters in the GSP values.yaml file to provide deployment-specific values for certain parameters.
For general information about overriding Helm chart values, see Overriding Helm chart values in the Genesys Multicloud CX Private Edition Guide.
If you want to use arbitrary UIDs in your OpenShift deployment, you must override the securityContext settings in the GSP values.yaml file, so that no user or group IDs are specified. For details, see Configure security, below.
To enable S3-compatible storage to store data that GSP requires during processing, see Configure S3-compatible storage, below.
At a minimum, you must override the following key entries in the GSP values.yaml file:
- image:
- registry — the registry from which Kubernetes will pull images (pureengage-docker-staging.jfrog.io by default)
- tag — the container image version
- imagePullSecrets:
- pureengage-docker-dev or pureengage-docker-staging — the secret from which Kubernetes will get credentials to pull the image from the registry
- kafka:
- bootstrap — the Kafka address to align with the infrastructure Kafka
If topic names in your Kafka configuration have been customized, you must also modify the kafka:topic parameter values to match. For more details about the required Kafka topics, see Kafka configuration.
Configure Kubernetes
Secrets
GSP requires the following secrets:
- docker-registry — Credentials to pull the image from the JFrog repository
- kafka-secrets — Credentials to access Kafka
- gsp-s3 — Credentials to access S3-compatible storage
Except for docker-registry and kafka-secrets, which you must create manually (see the environment setup instructions on Deploy GIM Stream Processor), Helm creates the secrets based on values you specify in the values.yaml file.
Config Maps
Helm creates a number of Config Maps based on option values you specify in the values.yaml file. There are no Config Maps you can configure directly.
Configure security
The security context settings define the privilege and access control settings for pods and containers.
By default, the user and group IDs are set in the GSP values.yaml file as 500:500:500, meaning the genesys user.
securityContext:
runAsNonRoot: true
runAsUser: 500
runAsGroup: 500
fsGroup: 500
containerSecurityContext: {}
Arbitrary UIDs in OpenShift
If you want to use arbitrary UIDs in your OpenShift deployment, you must override the securityContext settings in the GSP values.yaml file, so that you do not define any specific IDs.
securityContext:
runAsNonRoot: true
runAsUser: null
runAsGroup: 0
fsGroup: null
containerSecurityContext: {}
Configure S3-compatible storage
To enable S3-compatible storage, modify the following entries in the values.yaml file:
- azure:
- enabled: false
- storage:
- gspPrefix — the bucket name
- gcaSnapshots — the bucket name where the GCA snapshot is stored
- s3 — the applicable details defined with the OBC or GCP bucket
- Note: The host parameter is ignored.
OpenShift example
azure:
enabled: false
..
storage:
host: gspstate{{.Values.short_location}}{{.Values.environment}}.blob.core.windows.net
#gspPrefix: wasbs://gsp-state@{{ tpl .Values.job.storage.host . }}/{{ .Release.Name }}/
gspPrefix: "s3p://gim-3f7ac1ab-03b9-445b-ba12-137d4bbc3c38/{{ .Release.Name }}/"
#gcaSnapshots: wasbs://gca@{{ tpl .Values.job.storage.host . }}/
gcaSnapshots: "s3p://gim-3f7ac1ab-03b9-445b-ba12-137d4bbc3c38/gca/"
checkpoints: '{{ tpl .Values.job.storage.gspPrefix . }}checkpoints'
savepoints: '{{ tpl .Values.job.storage.gspPrefix . }}savepoints'
highAvailability: '{{ tpl .Values.job.storage.gspPrefix . }}ha'
s3:
endpoint: "https://s3.openshift-storage.svc:443"
accessKey: "<access key>"
secretKey: "<secret key>"
pathStyleAccess: "true"
GKE example
azure:
enabled: false
...
storage:
host: gspstate{{.Values.short_location}}{{.Values.environment}}.blob.core.windows.net
#gspPrefix: wasbs://gsp-state@{{ tpl .Values.job.storage.host . }}/{{ .Release.Name }}/
gspPrefix: "s3p://test-example-bucket-one/{{ .Release.Name }}/"
#gcaSnapshots: wasbs://gca@{{ tpl .Values.job.storage.host . }}/
gcaSnapshots: "s3p://test-example-bucket-one/gca/"
checkpoints: '{{ tpl .Values.job.storage.gspPrefix . }}checkpoints'
savepoints: '{{ tpl .Values.job.storage.gspPrefix . }}savepoints'
highAvailability: '{{ tpl .Values.job.storage.gspPrefix . }}ha'
s3:
endpoint: "https://storage.googleapis.com:443"
accessKey: "<access Key>"
secretKey: "<secret key>"
pathStyleAccess: "true"