config.properties
1.43 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
system.envi=test1
#当前所归属的云
system.envi.cloud.name=test
#java api 执行核心线程数
JavaApiExecutorPoolCoreSize=30
#java api 执行最大线程数
JavaApiExecutorPoolMaxSize=50
nginxsync.agent=192.168.102.76:6060
zookeeper.address=192.168.102.45:2181
aws.redis.proxy.address=192.168.102.22
aws.redis.proxy.port=6379
aws.redis.proxy.auth=
code.release.url=http://192.168.102.22:8883/web/
zkAddress=192.168.102.45:2181
search.aws.url=http://192.168.102.216:8080/
search.qq.url=http://192.168.102.224:8080/
malicious.ip.redis.read.host=192.168.102.22
malicious.ip.redis.read.port=6379
malicious.ip.redis.write.qq.host1=192.168.102.22
malicious.ip.redis.write.qq.host2=192.168.102.22
malicious.ip.redis.write.aws.host1=192.168.102.22
malicious.ip.redis.write.aws.host2=192.168.102.22
malicious.ip.redis.write.port=6379
malicious.ip.redis.write.all.host=192.168.102.22,192.168.102.22,192.168.102.22,192.168.102.22
malicious.ip.redis.write.all.port=6379,6379,6379,6379
#restTemplate
connectTimeout=5000
readTimeout=10000
#uic url
add.MaliciousIp=http://172.16.6.237:8096/uic/addMaliciousIp
remove.MaliciousIp=http://172.16.6.237:8096/uic/removeMaliciousIp
#spark read url
spark.read.data.url=http://172.16.6.140:8088/malicious/
check_bigdata=false
auto.task.test.url=http://192.168.103.71:8075/autoTask/executeFromGongDan
#获取伸缩组数据--访问aws、qcloud服务接口
auto.fetchScaling.open=false
#钉钉访问地址
ddRobotUrl=test