Setting up the coordinator service

Learn how to set up the coordinator service.

Coordinator service secret

Note: You can create the coordinator service secret either before or after IBM® Netcool® Operations Insight® on OpenShift® is deployed as part of a full cloud or hybrid deployment. If you create the coordinator service secret after IBM Netcool Operations Insight on OpenShift is deployed, then you must restart the coordinator service.
This secret is useful for coordinator API basic authorization and communication with primary coordinator service. It also contains following key and value pairs. All values are in base64 encoding format.
Key Name Value Description
api_password Password for coordinator API basic authorization. For a backup deployment, keep it the same as the primary deployment value.
api_username Username for coordinator API basic authorization. For a backup deployment, keep it the same as the primary deployment value.
trust_store_password Truststore password for the SSL verification. The certificate for the truststore is the Certificate Authority (CA) certificate that created the route. For more information about how to create an Red Hat® OpenShift route with a secured route, see Secured routes external link icon in the Red Hat OpenShift Container Platform documentation. Required for the backup deployment. This value is not used for a primary deployment, but it must be defined. Set this value to empty for your primary deployment.
Note: This value is mandatory for backup deployments.
If the truststore password is not set for your backup deployment, the following error is displayed:
Error: couldn't find key trust_store_password in Secret netcool/backup-coordinator-api-secret
If a dummy value is used for your backup deployment, the following error is displayed:
Readiness probe failed: HTTP probe failed with statuscode: 503

Run the following command to create the coordinator service secret:

oc create secret generic <ReleaseName>-coordinator-api-secret --from-literal=api_username=<your_username> --from-literal=api_password=<your_password> --from-literal=trust_store_password=<your_truststore_password>
The trust_store_password can be any value as this password is created when the command runs. Create a dr_coordinator secret on both the primary and backup clusters.
Note: The username and password must be the same for both primary and backup deployments.
Primary secret example
oc create secret generic primary-was-oauth-cnea-secrets \
    --from-literal=client-id=cnea-id \
    --from-literal=client-secret=cnea-secret \
    --from-literal=proxy-sorat1.xyz.com.id=proxyeast \
    --from-literal=proxy-sorat1.xyz.com.secret=secreteast \
    --from-literal=proxy-des1.xyz.com.id=proxywest \
    --from-literal=proxy-des1.xyz.com.secret=secretwest
Backup secret example
oc create secret generic backup-was-oauth-cnea-secrets \
    --from-literal=client-id=cnea-id \
    --from-literal=client-secret=cnea-secret \
    --from-literal=proxy-sorat1.xyz.com.id=proxyeast \
    --from-literal=proxy-sorat1.xyz.com.secret=secreteast \
    --from-literal=proxy-des1.xyz.com.id=proxywest \
    --from-literal=proxy-des1.xyz.com.secret=secretwest
Update the noihybrid deployment properties on the primary cluster:
spec:
  serviceContinuity:
    continuousAnalyticsCorrelation: true
    isBackupDeployment: false
Update the noihybrid deployment properties on the backup cluster:
spec:
  serviceContinuity:
    continuousAnalyticsCorrelation: true
    isBackupDeployment: true
  helmValuesNOI:
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs: https://<proxy_host1>,https://<proxy_host2>
    ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName: rook-cephfs
Optional: If you want to use SSL certificates for the connection, you can additionally provide the following properties:
  helmValuesNOI:
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap: users-certificates
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck: true
Example coordinator service values:
  helmValuesNOI:
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap: users-certificates
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck: true
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs: https://proxy1.xyz.com,https://proxy2.xyz.com
    ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName: rook-cephfs

Coordinator Service Settings

The table describes what configuration parameters are exposed for the coordinator service in the IBM Netcool Operations Insight on Red Hat OpenShift Custom Resource (CR) definition.

Cluster SectionName PropertyName Description Default
Primary, Backup serviceContinuity continuousAnalyticsCorrelation

Required to activate the Disaster Recovery (DR) service on a failover hybrid cluster. If you have a stand-alone hybrid cluster, then the DR service is not needed.

If set to true, the DR coordinator service is activated.

Before serviceContinuity.continuousAnalyticsCorrelation is set to true, the ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName storage definition needs to be in place.

false
Primary, Backup serviceContinuity isBackupDeployment

Required on the backup cluster, but not on the primary cluster.

Determines the deployment state of the coordinator service. When set to true, it enables the coordinator service as backup deployment. When set to false, it enables the primary deployment of the coordinator service.

false
Primary, Backup helmValuesNOI ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName

Required: Storage class for the coordinator service.

 
Backup helmValuesNOI ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs

Required: Proxy URLs by comma separation.

Note: Valid for backup deployment only.
 
Backup helmValuesNOI ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck

Optional: To enable and disable SSL, check for the connection with primary deployment.

Note: Valid for backup deployment only.
false
Backup helmValuesNOI ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap

Required when ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck is set to true. For more information, see ConfigMap for root certificates of the proxies.

A ConfigMap name with root certificates for proxies.

Note: Valid for backup deployment only.
false
Backup helmValuesNOI ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.numberOfProxyConnectionCheck

Optional: Numbers of check for primary availability need to be done before backup to take charge as acting primary.

Note: Valid for backup deployment only.
10
Backup helmValuesNOI ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.intervalBetweenRetry

Optional: Interval between each check to primary availability. The value is in milliseconds.

Note: Valid for backup deployment only.
1000
Primary, Backup helmValuesNOI ibm-ea-dr-coordinator-service.coordinatorSettings.logLevel Optional: Log level for coordinator service. DEBUG

Disaster recovery coordinator properties

Example properties to add for DR:
 helmValuesNOI:
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap: users-certificates
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck: true
    ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyURLs: 'https://proxy-abc.xyz.com,
      https://proxy-abc.xyz.com'
    ibm-ea-dr-coordinator-service.coordinatorSettings.storageClassName: rook-cephfs

ConfigMap for root certificates of the proxies

The ConfigMap contains the root signing certificate for the front end of the proxies that are mentioned in service.coordinatorSettings.backupDeploymentSettings.proxyURLs. It is required when ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxySSLCheck is set to true.

The name of the ConfigMap is the same as ibm-ea-dr-coordinator-service.coordinatorSettings.backupDeploymentSettings.proxyCertificateConfigMap. An example ConfigMap is:
 
apiVersion: v1
data:
  proxyRootCert.crt: |
    -----BEGIN CERTIFICATE-----
    <Signing Root Certificate for Proxy Frontend>
    -----END CERTIFICATE-----
kind: ConfigMap
metadata:
  name: <Configmap Name>
  namespace: <name space>