Diameter Notifier Configuration
Diameter Notifier configuration includes general properties and TLS properties.
Diameter Notifier Properties describes the properties for configuring Diameter Notifier.
Property | Type | Default | Description |
---|---|---|---|
notifier.image.name | String | matrixx-diameter/diameter-notifier-reference | The Diameter Notifier container image. |
notifier.image.version | Integer | 1.0.0 | The tag for Diameter Notifier container image. |
notifier.configuration | String | List of environment variables to inject into Diameter Notifier configuration. | |
notifier.replicaCount | Integer | 1 | The number of Diameter Notifier scale instances. |
notifier.logging.level.info | String | info | The Diameter Notifier logging level. |
notifier.service.http.port | Integer | 8080 | HTTP server port for the Diameter Notifier (health service, Prometheus, and so forth). In most environments, this should not be changed.. |
notifier.service.grpc.port | Integer | 50051 | The gRPC port of the Diameter Notifier. Diameter Gateway sends a gRPC request to the Diameter Notifier through this port. |
notifier.service.grpc.engine | Integer | 14061 | Engine callback port. The engine sends requests through this port. |
notifier.ports | Integer | 8080, 14061 | List of ports to expose from the container. |
notifier.resources.limits.cpu | Integer | 1 | Specifies the container CPU limit in Kubernetes Units. |
gateway.resources.requests.cpu | Integer | 250m | Specifies the request CPU limit in Kubernetes Units. |
Diameter Notifier TLS Configuration
Diameter Notifier TLS Configuration Properties describes the Diameter Notifier TLS configuration
properties.
Property | Type | Default | Description |
---|---|---|---|
notifier.configuration.MDD_CLIENT_TLS_ENABLE | Boolean | False | If true , the MDD client connection towards Diameter Gateway is established
with TLS. |
notifier.configuration.MDD_CLIENT_TLS_INSECURESKIPVERIFY | Boolean | False | If false , the TLS connection is validated with the certificate file from the notifier.configuration.MDD_CLIENT_TLS_CAFILE parameter. |
notifier.configuration.MDD_CLIENT_TLS_CAFILE | String | opt/mtx/conf/keystore/notifier/ca.crt | If the following property is false , this is the path to the certificate file: notifier.configuration.MDD_CLIENT_TLS_INSECURESKIPVERIFY |
notifier.configuration.MDD_SERVER_TLS_ENABLE | Boolean | False | If true , the MDD server connection from MATRIXX Engine is established
with TLS. |
notifier.configuration.MDD_SERVER_TLS_SELFSIGNEDCERT | Boolean | False | If false , the TLS connection is established with the key and certificate files from the notifier.configuration.MDD_SERVER_TLS_CERTFILE and
notifier.configuration.MDD_SERVER_TLS_KEYFILE parameter. |
notifier.configuration.MDD_SERVER_TLS_CERTFILE | String | /opt/mtx/conf/keystore/notifier/tls.crt | If the following property is false , this is the path to the certificate file: notifier.configuration.MDD_SERVER_TLS_SELFSIGNEDCERT |
notifier.configuration.MDD_SERVER_TLS_KEYFILE | String | /opt/mtx/conf/keystore/notifier/tls.key | If the following property is false , this is the path to the key file: notifier.configuration.MDD_SERVER_TLS_SELFSIGNEDCERT |
global.tls.secretName.notifier | String | diameter-gateway-notifier-tls | The Kubernetes Secret name for Diameter Notifier. |
You must create a Kubernetes Secret to load certificate and key files into the pod. Diameter Notifier looks up the
secret name and, by default, mounts on
/opt/mtx/conf/keystore/notifier
. For
example:apiVersion: v1
kind: Secret
metadata:
name: diameter-gateway-notifier-tls
type: kubernetes.io/tls
data:
ca.crt: {{ .Files.Get "certs/notifier/ca.crt" | b64enc }}
tls.crt: {{ .Files.Get "certs/notifier/tls.crt" | b64enc }}
tls.key: {{ .Files.Get "certs/notifier/tls.key" | b64enc }}
Diameter Notifier Helm Values File
The following example shows a Diameter Notifier Helm values file
configuration:
notifier:
enable: false
image:
name: "diameter-notifier"
version: "v3.0.2"
configuration:
HTTP_PORT: 8080
MDD_PORT: 14061
WATCHER_DEPLOYMENTNAME: diameter-gateway
WATCHER_PORTNAME: grpc
WATCHER_CALLBACKPORTNAME: engine
WATCHER_NAMESPACE: default
EXTENSION_SCHEMA: false
MDD_CLIENT_TLS_ENABLE: false
MDD_CLIENT_TLS_INSECURESKIPVERIFY: false
MDD_CLIENT_TLS_CAFILE: "/opt/mtx/conf/keystore/notifier/ca.crt"
MDD_SERVER_TLS_ENABLE: false
MDD_SERVER_TLS_SELFSIGNEDCERT: false
MDD_SERVER_TLS_CERTFILE: "/opt/mtx/conf/keystore/notifier/tls.crt"
MDD_SERVER_TLS_KEYFILE: "/opt/mtx/conf/keystore/notifier/tls.key"
replicaCount: 1
logging:
level: info
service:
type: ClusterIP
http:
port: 8080
targetPort: 8080
grpc:
port: 50051
targetPort: 50051
engine:
port: 14061
targetPort: 14061
ports:
- containerPort: 8080
name: http
- containerPort: 14061
name: engine
resources:
limits:
cpu: 1
requests:
cpu: 250m