config.properties
1.45 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
system.envi=product
#当前所归属的云
system.envi.cloud.name=aws
#java api 执行核心线程数
JavaApiExecutorPoolCoreSize=30
#java api 执行最大线程数
JavaApiExecutorPoolMaxSize=50
nginxsync.agent=172.31.16.167:6060
zookeeper.address=172.31.50.139:2181
aws.redis.proxy.address=172.31.31.170
aws.redis.proxy.port=6379
aws.redis.proxy.auth=
code.release.url=http://172.31.16.167:8883/web/
zkAddress=172.31.50.139:2181
search.aws.url=http://internal-search-1492740248.cn-north-1.elb.amazonaws.com.cn/
search.qq.url=http://10.66.4.30/
malicious.ip.redis.read.host=172.31.31.170
malicious.ip.redis.read.port=6379
malicious.ip.redis.write.qq.host1=10.66.0.3
malicious.ip.redis.write.qq.host2=10.66.0.2
malicious.ip.redis.write.aws.host1=172.31.70.163
malicious.ip.redis.write.aws.host2=172.31.70.53
malicious.ip.redis.write.port=6379
#restTemplate
connectTimeout=5000
readTimeout=10000
#uic url
add.MaliciousIp=http://uic.yohoops.org/uic/addMaliciousIp
remove.MaliciousIp=http://uic.yohoops.org/uic/removeMaliciousIp
#spark read url
spark.read.data.url=http://172.31.50.139:8082/malicious/
check_bigdata=true
#自动化测试
auto.task.test.url=http://qmc.yohops.com:9999/autoTask/executeFromGongDan
#获取伸缩组数据--访问aws、qcloud服务接口
auto.fetchScaling.open=true
#钉钉访问地址
ddRobotUrl=https://oapi.dingtalk.com/robot/send?access_token=31cf1a526c98862b7945e561c5a0d857a069350dbee0e807074b83b39fa1e1af
#ldap统一认证
ldap.flag=1