Configure the values.yaml file available in $TCSA_WORK_SPACE/tcx-deployer/product-helm-charts/tcsa.
root [ ~ ]# cd $TCSA_WORK_SPACE/tcx-deployer/product-helm-charts/tcsa root [ ~/base/tcx-deployer/product-helm-charts/tcsa ]# vi values.yaml
Update the required parameters in the
values.yaml file.
Note: Ensure that you obtain the ACR registry details such as URL, username, and password from the ACR registry section in Azure website.
- Set ACR registry URL.
# Default values for tcsa. # This is a YAML-formatted file. # Customize your TCSA deployment here by configuring the parameters that are exposed. # Uncomment the relevant lines and configure them according to your environment. # (string) registryRootUrl is the FQDN of the registry that has the artifacts. registryRootUrl: <your-acr-instance>.azurecr.io/tcx
- Set the desired footprint value.
# (string) footprint is the number of devices monitored by TCSA. # allowed values for footprint "demo", "25k", "50k", "75k", "100k", "125k", "150k", "175k", "200k" footprint:
- Set dashboardStaticAccessIp with the IP address of your cluster and edgeServicesAccessIp parameter with the IP address used to access Edge Kafka.
# (string) Set dashboardStaticAccessIp to the IP address used to access the TCSA dashboard. Leave empty or commented out for EKS private network deployments. dashboardStaticAccessIp: <IPAddress1> # (string) Set edgeServicesAccessIp to the IP address to be used to access kafka-edge. Leave empty for EKS public networks. edgeServicesAccessIp: <IPAddress2> # (string) Set dashboardDynamicAccessIp to the external IP assigned dynamically by the cloud provider to istio-ingressgateway service in istio-ingressgateway namespace. dashboardDynamicAccessIp: null
Note: Configure dashboardStaticAccessIp with hostname/FQDN if you want to access the VMware Telco Cloud Service Assurance using hostname/FQDN instead of the IP address. - Set resourceGroup to the name of the Azure resource group.
# (map) aks holds AKS specific configuration aks: # (string) resourceGroup is the name of the Azure resource group. resourceGroup:
- Set privateNetwork to true.
# ----IaaS configuration---- # (bool) privateNetwork indicates if TCSA is being deployed on a private EKS or AKS network privateNetwork: true
- Set cloud provider as azure for deploying VMware Telco Cloud Service Assurance on Azure.
# (string) cloud indicates the cloud/K8s provider. Valid values are "tkg", "aws", "azure" and "on-prem" cloud: azure
- For Kubenet network plugin,
IPAddress1
andIPAddress2
must be specified in the values.yaml file.IPAddress1
is a public IP and must be created in the same region and resource group where AKS cluster is created.IPAddress1
is the IP address VMware Telco Cloud Service Assurance andIPAddress2
is the IP address of Edge Kafka.- If using Azure CNI plugin,
IPAddress1
andIPAddress2
must be set to empty. - If using Kubenet plugin,
IPAddress1
andIPAddress2
must be set to valid IP address as follows:- For the public networks get Azure public IPs using the
az
CLI. For more information, see Azure Network Public IP. - For the private network, get IP addresses from the subnet used for the AKS cluster private network. You can use the
az
CLI to list free IP addresses in a subnet. For more information, see Azure Network VNet.- Set
privateNetwork:
to true.
- Set
- For the public networks get Azure public IPs using the
- If using Azure CNI plugin,
- For Kubenet network plugin,
- If you want to update the metrics retention interval period during deployment, see Configure Metrics Retention Interval Period topic.
Note: If you want to configure backup and restore with AWS S3 or vSAN storage, then update the parameters accordingly in
values.yaml file during deployment. For more information, see
Customizing Backup and Restore Configurations topic.