config.properties 1.45 KB
system.envi=product

#当前所归属的云
system.envi.cloud.name=aws

#java api 执行核心线程数
JavaApiExecutorPoolCoreSize=30
#java api 执行最大线程数
JavaApiExecutorPoolMaxSize=50

nginxsync.agent=172.31.16.167:6060

zookeeper.address=172.31.50.139:2181

aws.redis.proxy.address=172.31.31.170
aws.redis.proxy.port=6379
aws.redis.proxy.auth=

code.release.url=http://172.31.16.167:8883/web/
zkAddress=172.31.50.139:2181

search.aws.url=http://internal-search-1492740248.cn-north-1.elb.amazonaws.com.cn/
search.qq.url=http://10.66.4.30/

malicious.ip.redis.read.host=172.31.31.170
malicious.ip.redis.read.port=6379

malicious.ip.redis.write.qq.host1=10.66.0.3
malicious.ip.redis.write.qq.host2=10.66.0.2
malicious.ip.redis.write.aws.host1=172.31.70.163
malicious.ip.redis.write.aws.host2=172.31.70.53
malicious.ip.redis.write.port=6379

#restTemplate
connectTimeout=5000
readTimeout=10000

#uic url
add.MaliciousIp=http://uic.yohoops.org/uic/addMaliciousIp
remove.MaliciousIp=http://uic.yohoops.org/uic/removeMaliciousIp

#spark read url
spark.read.data.url=http://172.31.50.139:8082/malicious/

check_bigdata=true

#自动化测试
auto.task.test.url=http://qmc.yohops.com:9999/autoTask/executeFromGongDan

#获取伸缩组数据--访问aws、qcloud服务接口
auto.fetchScaling.open=true
#钉钉访问地址
ddRobotUrl=https://oapi.dingtalk.com/robot/send?access_token=31cf1a526c98862b7945e561c5a0d857a069350dbee0e807074b83b39fa1e1af
#ldap统一认证
ldap.flag=1