Configure the values.yaml file available in $TCSA_WORK_SPACE/tcx-deployer/product-helm-charts/tcsa.

root [ ~ ]# cd $TCSA_WORK_SPACE/tcx-deployer/product-helm-charts/tcsa
root [ ~/base/tcx-deployer/product-helm-charts/tcsa ]# vi values.yaml
Update the required parameters in the values.yaml file.
  • Set Harbor registry URL.
    # Default values for tcsa.
    # This is a YAML-formatted file.
    # Customize your TCSA deployment here by configuring the parameters that are exposed.
    # Uncomment the relevant lines and configure them according to your environment.
    .
    .
    # (string) registryRootUrl is the FQDN of the registry that has the artifacts.
    registryRootUrl: <harbor-registry-fqdn>/<project-name>
  • Set the desired footprint value.
    # (string) footprint is the number of devices monitored by TCSA.
    # allowed values for footprint "demo", "25k", "50k", "75k", "100k", "125k", "150k", "175k", "200k"
    footprint:
  • Set the dashboardStaticAccessIp and edgeServicesAccessIp parameters to the IP address of your cluster.
    # (string) Set dashboardStaticAccessIp to the IP address used to access the TCSA dashboard. Leave empty or commented out for EKS private network deployments.
    dashboardStaticAccessIp: <ClusterIP>
    
    # (string) Set edgeServicesAccessIp to the IP address to be used to access kafka-edge. Leave empty for EKS public networks.
    edgeServicesAccessIp: <ClusterIP>
    Note: Configure dashboardStaticAccessIp with hostname/FQDN if you want to access the VMware Telco Cloud Service Assurance using hostname/FQDN instead of the IP address.
  • Set privateNetwork to false.
    # ----IaaS configuration----
    # (bool) privateNetwork indicates if TCSA is being deployed on a private EKS or AKS network
    privateNetwork: false
  • Set cloud provider as tkg for deploying VMware Telco Cloud Service Assurance on TKG.
    # (string) cloud indicates the cloud/K8s provider. Valid values are "tkg", "aws", "azure" and "on-prem"
    cloud: tkg
  • Backup and Restore parameters are optional and must be configured only in-case if you are using external AWS or vSAN file services for Backup and Restore operations.
    If AWS is used for backup, then update the following parameters:
    minioDatastoreType=s3
    bucketName : Userdefined name, where the backup will be stored in AWS environment.
    accesskey : accesskey and secretkey are specific to the individual AWS account. 
    secretkey : accesskey and secretkey are specific to the individual AWS account. 
    If VMware vSAN file service is used for backup, then update the following parameters:
    minioDatastoreType=nas 
    nfsProvisionerEnabled: true 
    nfsPath : nfspath where the backup will be stored. 
    nfsServer : nfs-server on which backup will be stored. 
    bucketName :Userdefined name, where the backup will be stored in VSAN file services. 

    For more information on configuring VMware vSAN file services, see Enabling VMware vSAN File Services topic.

  • If you want to update the metrics retention interval period during deployment, see Configure Metrics Retention Interval Period topic.