OI Hawk Console Configurations

You can install the OI Hawk Console in an on-premises environment by selecting the Custom Installation profile and then selecting the Console feature while installing TIBCO OI Hawk RedTail. The OI Hawk Console does not support any of the TIBCO OI Hawk RedTail Advanced features and must be configured by using either of TIBCO EMS, TIBCO Rendezvous or TCP transport for TIBCO Hawk. You must also configure the Hawk agent (hawkagent.cfg) to communicate over TIBCO EMS, TIBCO Rendezvous or TCP transport for TIBCO Hawk so that the Hawk agent is able to communicate with the OI Hawk Console.

All the required configuration parameters for OI Hawk Console are stored in the hawkconsole.cfg configuration file located at CONFIG_FOLDER/bin.

Note: Ensure that the RV_HOME or EMS_HOME parameters are configured correctly in the tibhawkagent.tra file when configuring the Hawk agent to communicate with the OI Hawk Console TIBCO Rendezvous transport or TIBCO EMS transport.

For more information about the configurations that you can perform in OI Hawk Console, see the following topics:

Domain and Transport Configuration for OI Hawk Console
User Authentication in OI Hawk Console
Secure Communication over OI Hawk Console
Configuring an External Database
Configuring OI Hawk Console Database Schema
OI Hawk Console Configuration Options

Domain and Transport Configuration for OI Hawk Console

You can register a Hawk domain to the OI Hawk Console and specify the transport type for the communication. You can either use the web interface of OI Hawk Console or configure the domain and transport configuration file (DomainTransportConfig.yml).

Domain Registration by Using Configuration File

The domain and transport configuration file (DomainTransportConfig.yml) for the OI Hawk Console contains the parameters to connect to regular and proxy domains.

You can specify the location of the DomainTransportConfig.yml file by using the domain_config_file option in the OI Hawk Console configuration file (hawkconsole.cfg). For details on options present in the hawkconsole.cfg file, see OI Hawk Console Configuration Options.

In the DomainTransportConfig.yml file you can specify the following elements for the connection:
domainConfiguration - The parent tag for the domain and transport configurations for OI Hawk Console.
Domain type - Specify whether the Hawk domain to be registered is a regular domain or a proxy domain. Based on the domain type, specify additional configuration parameters. The tags used for the domain type are:
regular - For details about fields for the regular domain type, see Configuration Options for DomainTransportConfig.yml for the Regular Domain Type.
proxy - For details about fields for the proxy domain type, see Configuration Options for DomainTransportConfig.yml for the Proxy Domain Type.
domainName - Name of the domain that is to be registered.

Configuration Options for DomainTransportConfig.yml for the Regular Domain Type

Property

Description

transport

The type of transport over which the communication between the OI Hawk Console and the Hawk agent takes place. You can specify this parameter as one of the following:

tibtcp: TCP Transport for TIBCO Hawk
tibrv: TIBCO Rendezvous
tibems: TIBCO Enterprise Message Service Transport

You must specify the transport configuration based on the selected transport type.

 

Mandatory: Yes

Suggested Value: tibtcp

securityPolicy

The security policy currently in effect.

 

Mandatory: No

Suggested Value: -

TCP Transport for TIBCO Hawk Parameters

(Mandatory if you have specified the transport parameter as tibtcp)

tcpSelfUrl

Unique socket address of the OI Hawk Console for connecting to the TCP Transport for TIBCO Hawk cluster. The syntax is <self IP>:<self port>.

 

Mandatory: No

Suggested Value: localhost:2561

tcpDaemonUrl

The socket address of the Cluster Manager acting as the seed node for the TCP Transport for TIBCO Hawk cluster.

 

Mandatory: No

Suggested Value: localhost:2561

TCP Transport for TIBCO Hawk SSL Parameters

(Mandatory if you want to configure TCP Transport for TIBCO Hawk over SSL)

tcpSslKeyStore

Path of the keystore file

 

Mandatory: No

Suggested Value: Path of the keystore file

tcpSslTrustStore

Path of the trust store file

 

Mandatory: No

Suggested Value: Path of the trust store file

tcpSslKeyStorePassword

Password to access the keystore

 

Mandatory: No

Suggested Value: Password to access the keystore

tcpSslKeyPassword

Password to access the private key

 

Mandatory: No

Suggested Value: Password to access the private key

tcpSslTrustStorePassword

Password to access the trust store

 

Mandatory: No

Suggested Value: Password to access the trust store

tcpSslProtocol

Protocol for a secure connection

 

Mandatory: No

Suggested Value: TLSv1.2

tcpSslEnabledAlgorithms

Algorithm to be used for the security protocol. You can specify multiple algorithms as a comma-separated list without space.

 

Mandatory: No

Suggested Value: TLS_RSA_WITH_AES_128_CBC_SHA

TIBCO Rendezvous Transport Parameters

(Mandatory if you have specified the transport parameter as tibrv)

rvService

Specify the service that the Rendezvous daemon uses to convey messages on this transport. You can specify the port number as the service to be used, for example, "7474".

 

Mandatory: No

Suggested Value: <RV service name>

rvNetwork

Specify the network that the Rendezvous daemon uses for all communications involving this transport. The network parameter consists of up to three parts, separated by semicolons: network, multicast groups, and send address.

 

Mandatory: No

Suggested Value: <RV network name>

rvDaemon

Specify the socket address of the Rendezvous daemon.

 

Mandatory: No

Suggested Value: <RV daemon name>

TIBCO Enterprise Message Service Transport Parameters

(Mandatory if you have specified the transport parameter as tibems)

emsServerUrl

Specify the location of the EMS server

 

Mandatory: No

Suggested Value: <server url>

emsUserName

Specify the user name to login to the EMS server

 

Mandatory: No

Suggested Value: <user name>

emsPassword

Specify the password for the emsUserName

 

Mandatory: No

Suggested Value: <password_string>

TIBCO Enterprise Message Service SSL Parameters

(Mandatory if you want to configure TIBCO EMS over SSL)

emsSslVendor

The name of the vendor of the SSL implementation. The valid choices are:

j2se (default) - Use this option when you want to use the default Java Cryptography Extension (JCE) bundled with the Java JRE.
entrust61 - Use this option when you want to use the Entrust libraries.
ibm - On non-IBM platforms, this option can be used only if the IBM version of JCE is installed.

 

Mandatory: No

Suggested Value: <SSL vendor>

emsSslTrace

The option enables the SSL tracing

 

Mandatory: No

Suggested Value: <SSL trace>

emsSslTrusted

The option specifies the file name of the server certificates. This option can be repeated if more than one certificate file is used.

 

Mandatory: No

Suggested Value: <SSL trusted>

emsSslPrivateKey

This option indicates the private key of the TIBCO OI Hawk component

 

Mandatory: No

Suggested Value: <SSL private key>

emsSslExpectedHostname

The name that is expected in the name of the CN field of the server certificates is specified by this option

 

Mandatory: No

Suggested Value: <SSL expected>

emsSslPassword

The password to decrypt the identity file of the TIBCO OI Hawk component

 

Mandatory: No

Suggested Value: <password_string>

emsSslIdentity

Digital certificate

 

Mandatory: No

Suggested Value: <identity store>

emsSslNoVerifyHost

Specifies whether the EMS server should be verified or not

 

Mandatory: No

Suggested Value: true

emsSslNoVerifyHostname

Specifies whether the host name must not be verified

 

Mandatory: No

Suggested Value: true

emsSslCiphers

Supported cipher suites

 

Mandatory: No

Suggested Value: <cipher suite-names>

Configuration Options for DomainTransportConfig.yml for the Proxy Domain Type

Property

Description

host

URL of the domain that needs to be registered. The syntax is <domain IP>:<domain port>

 

Mandatory: Yes

Suggested Value: <domain IP>:<domain port>

credentials

User name and password required to log in to the domain. The syntax is

<user name>:<encrypted password>

 

Mandatory: Yes

Suggested Value: <user name>:<encrypted password>

securedChannel

Specifies whether the domain should be connected over a secured channel

 

Mandatory: Yes

Suggested Value: true

User Authentication in OI Hawk Console

The OI Hawk Console supports user authentication based on a file, a database, and LDAP-based authentications. You can set the authentication mode by using the OI Hawk Console configuration file (hawkconsole.cfg).

File-Based Authentication

For the file-based authentication, the user details are stored in the hawkconsole-user.cfg file. By default, the configuration file is located at CONFIG_FOLDER/bin. If required, you can configure its location by using the user_file_store option in the hawkconsole.cfg file.

The syntax for a user entry in the hawkconsole-user.cfg file is:

<user_name>:<encrypted_password>

For example,

admin:#####***###

You can use the tibhawkpassword utility at OIHR_HOME/bin to encrypt the password. For more details on user authentication properties, see OI Hawk Console Configuration Options.

Database-Based Authentication

In the database based authentication, the user names and passwords are stored in the database. The OI Hawk Console supports both in memory database and external database to store authentication details. For more information about configuring an external database in the OI Hawk Console, see Configuring an External Database.

You can add a new user in the external database using the following steps:

1. Add the new user in the users table.

For example:

insert into users (name, password, email, role_id) values('new_user', '#!SXcfN3U19IiH/Eai55LWvV4XNKV/eQIDfri6+J+rho4=', 'newUser@xyz.com',1);

2. Create a mapping in the table user_privilege_mapping.

For example:

insert into user_privilege_mapping (user_id, privilege_id) values((select id from users where name = 'new_user'), 1);

LDAP-Based Authentication

For the LDAP-based authentication, the user details are stored in the hawkconsole.cfg file. By default, the configuration file is located at CONFIG_FOLDER/bin.

For selecting LDAP as the user store, modify the hawkconsole.cfg file as follows:

  1. Under -M UserAuth, specify LDAP as the user store type:

    -user_store_type ldap

  2. Under -user_store_type ldap, specify the LDAP-based user authentication properties.

For more details about user authentication properties that can be specified, see OI Hawk Console Configuration Options.

Secure Communication over OI Hawk Console

You can access the OI Hawk Console over a secure channel by using SSL or TLS security protocols. To enable the secure communication, uncomment and configure the following fields in the OI Hawk Console configuration file (hawkconsole.cfg):

-key_alias
-key_password
-key_store
-key_store_password
-protocol
-ciphers

For more details on these properties, see OI Hawk Console Configuration Options.

Configuring an External Database

Hawk alerts can be persisted by configuring an external database to store the alerts. If the OI Hawk Console is restarted, then also you can view the previous alerts since when the Hawk agent is active. Following databases are supported in this release:

MySQL
Apache Ignite
H2 database in server and disc mode
Before you begin 
You must set up the database and perform database-specific configuration depending on the database vendor.
Add the appropriate .jar file of the JDBC Driver classes, from the database vendor, to the folder OIHR_HOME/<version>/lib/ext/console-ext.

Procedure

To configure the external database, uncomment and configure the following fields in the OI Hawk Console configuration file (hawkconsole.cfg). By default the configuration file is located at CONFIG_FOLDER/bin.

-datasource_url
-datasource_drivername
-datasource_username
-datasource_password
-datasource_connection_pool_initial_size
-datasource_connection_pool_max_idle
-datasource_connection_pool_max_active

For more details on these properties, see OI Hawk Console Configuration Options.

Configuring OI Hawk Console Database Schema

You can configure the attributes of the table for the database which stores the OI Hawk Console data. To do so, you must first uncomment the sql_schema_path configuration option in the hawkconsole.cfg file and then provide the folder path as a parameter. The path must contain the scripts that enable you to configure the database schema. By default, this parameter is configured with the CONFIG_FOLDER/hawk/sql or OIHR_HOME/7.1/sql.

The path specified for the sql_schema_path configuration option contains the following files:

Note: The OI Hawk Console uses the in memory H2 database as the default database for storing the OI Hawk Console data.
Schema files: These files contain the Data Definition Language (DDL) which is used to define data structures for the database. You can configure the following files depending on the database management software currently is use:
    • schema.sql: Modify this file if you are using MySQL or H2 database software.
    • schema-ignite.sql: Modify this file if you are using the Apache Ignite database software.
  • Data files: These files contain the Data Manipulation Language (DML) which is used to manipulate data for the database.You can configure the following files depending on the database management software currently is use:
    • data.sql: Modify this file if you are using MySQL or H2 database software.
    • data-ignite.sql: Modify this file if you are using the Apache Ignite database software.
  • For example, if you have configured the alerts to provide detailed information about the events, then you can configure the sql_schema_path option so that you can increase the size of the alert_text column in the alert table. This enables the OI Hawk Console to store more data for the alert_text than it was previously allowed to.

    OI Hawk Console Configuration Options

    You can configure the Hawk agent for the on-premises platforms such as Linux or Microsoft Windows. All the required configuration parameters are stored in CONFIG_FOLDER/bin/hawkconsole.cfg.

    Each of the parameters are explained in more detail in the following table:

    Hawk Console Component Configuration Options

    Property

    Description

    domain_config_file

    Path of file that contains the domain and transport configurations for OI Hawk Console.

    For details on the domain and transport configuration file, see Domain and Transport Configuration for OI Hawk Console.

     

    Mandatory: No

    Suggested Value: CONFIG_FOLDER/bin/DomainTransportConfig.yml

    server_port

    The server port to access OI Hawk Console

     

    Mandatory: No

    Suggested Value: 8083

    Secure Communication (SSL Authentication) Options

    key_alias

    Key alias

     

    Mandatory: No

    Suggested Value: -

    key_password

    Encrypted key password

     

    Mandatory: No

    Suggested Value: -

    key_store

    The path of the key store file

     

    Mandatory: No

    Suggested Value: -

    key_store_password

    The password for the key store file

     

    Mandatory: No

    Suggested Value: -

    protocol

    The security protocol for a secure communication

     

    Mandatory: No

    Suggested Value: TLSv1.2

    ciphers

    The ciphers to be used for the specified security protocol. You can specify multiple ciphers as a comma-separated list.

     

    Mandatory: No

    Suggested Value: TLS_RSA_WITH_AES_128_CBC_SHA

    repository_path

    The path to the rulebase repository

     

    Mandatory: No

    Suggested Value: CONFIG_FOLDER/hawk/repository

    subscription_queue_size

    A bounded circular queue is maintained for each subscription for storing its results. This parameter defines the maximum size of the queue. If the maximum size of the queue is reached then old results are overridden by the new ones.

     

    Mandatory: No

    Suggested Value: 128

    subscription_expiry_time

    Time (in milliseconds) after which a subscription expires if the results of subscription are accessed

     

    Mandatory: No

    Suggested Value: 90000

    Proxy Domain Options

    proxy_alert_count_pull_interval

    Time interval (in milliseconds) in which the alert count is fetched from proxy domains

     

    Mandatory: No

    Suggested Value: 15000

    proxy_domain_reachability_check_interval

    Time interval (in milliseconds) in which proxy domains are checked for reachability

     

    Mandatory: No

    Suggested Value: 15000

    Alert Configurations
    retention_count_for_notification

    Alert limit for notifications

     

    Mandatory: Yes

    Suggested Value: 100000

    retention_count_for_high_alerts

    Alert limit for high level alerts

     

    Mandatory: Yes

    Suggested Value: 100000

    retention_count_for_medium_alerts

    Alert limit for medium level alerts

     

    Mandatory: Yes

    Suggested Value: 100000

    retention_count_for_low_alerts

    Alert limit for low level alerts

     

    Mandatory: Yes

    Suggested Value: 100000

    alert_manager_activity_interval

    Time interval (in milliseconds), after which the alert manager starts to store alerts in the database and purge extra alerts in the database

     

    Mandatory: Yes

    Suggested Value: 20000

    max_reconnect_attempts_after_restart

    Specifies the number of reconnect attempts to be made when the agent gets disconnected from the Daemon

     

    Mandatory: No

    Suggested Value: 1000

    max_reconnect_attempts_during_connect

    Specifies the number of reconnect attempts made when the connection is disconnected from the Daemon after it has been established

     

    Mandatory: No

    Suggested Value: 20

    External Database Configuration

    datasource_url

    URL which identifies the database connection

     

    Mandatory: No

    Suggested Value: "jdbc:h2:mem:test;DB_CLOSE_DELAY=-1"

    datasource_drivername

    Name of the JDBC driver

     

    Mandatory: No

    Suggested Value: "org.h2.Driver"

    datasource_username

    User name to connect to the database

     

    Mandatory: No

    Suggested Value: "sa"

    datasource_password

    User’s password to connect to the database

     

    Mandatory: No

    Suggested Value: ""

    datasource_connection_pool_initial_size

    Initial number of database connections to be allocated

     

    Mandatory: No

    Suggested Value: "10"

    datasource_connection_pool_max_idle

    Maximum number of idle connections allowed in the database connection pool

     

    Mandatory: No

    Suggested Value: "20"

    datasource_connection_pool_max_active

    Maximum number of active connections allowed in the database connection pool

     

    Mandatory: No

    Suggested Value: "100"

    Logging

    log_dir

    The directory in which to store log files generated by the Hawk agent

     

    Mandatory: No

    Suggested Value: CONFIG_FOLDER/logs

    log_max_size

    The maximum size of a rotating log files in KB. You can apply a suffix ’m’ or ’M’ for indicating MB values

     

    Mandatory: No

    Suggested Value: 10M

    log_max_num

    The maximum number of rotating log files

     

    Mandatory: No

    Suggested Value: 10

    log_level

    Specifies the level of diagnostic information stored in the logs. The following are the logging levels:

    4 - Indicates error level trace messages should be enabled.
    6- Indicates warning level trace messages should be enabled.
    7 - Indicates information level trace messages should be enabled.
    8 - Indicates debug level trace messages should be enabled.
    16 - Indicates AMI level trace messages should be enabled.
    A value of zero turns all tracing off.
    A value of -1 turns all tracing on.

     

    Mandatory: No

    Suggested Value: 7

    log_format

    The format for trace log messages

     

    Mandatory: No

    Suggested Value: ae4

    User Authentication

    user_store_type

    Specify whether OI Hawk Console uses an inbuilt database or a file for user authentication. The values are:

    database - In the database based configuration, the user names and passwords are stored in the database.
    file - In the file based configuration, the user names and passwords are stored in a file in the disk. Specify the location of the user authentication file in the -user_file_store property.
    ldap - In the ldap based configuration, the user names and passwords are validated with a LDAP directory server.

     

    Mandatory: No

    Suggested Value: file

    user_file_store

    If -user_store_type is file, specify the path of the file which stores user details for authentication

     

    Mandatory: No

    Suggested Value: CONFIG_FOLDER/bin/hawkconsole-users.cfg

    User Authentication: LDAP-Based

    ldap_host

    Host name for the LDAP server

     

    Mandatory: Yes

    Suggested Value: -

    ldap_port

    Port of the LDAP server

     

    Mandatory: No

    Suggested Value: 389

    ldap_adminDN

    LDAP manager user DN for accessing the server, to avoid anonymous access to the server

     

    Mandatory: Yes

    Suggested Value: -

    ldap_admin_password

    LDAP admin password for accessing the server. The password is obfuscated.

     

    Mandatory: Yes

    Suggested Value: -

    ldap_baseDN

    Base DN for the users to search

     

    Mandatory: Yes

    Suggested Value: -

    ldap_uid_attr

    UID attribute to perform the user search

     

    Mandatory: No

    Suggested Value: UID

    ldap_groupDN

    Group DN for the users to log in who belong to a particular group. Multiple groups can be specified by separating the string with the pipe(|) operator.

     

    Mandatory: No

    Suggested Value: -

    ldap_group_search_filter

    Query attribute to search in group

     

    Mandatory: No

    Suggested Value: 'memberOf'

    ldap_ssl_enabled

    Specifies whether to connect to LDAP over SSL or not

     

    Mandatory: No

    Suggested Value: false

    ldap_disable_hostname_verification

    Specifies whether the host name verification is enabled or disabled

     

    Mandatory: No

    Suggested Value: false

    hawkconsole_user_access_list

    Specifies the file path for user based agent/node filtering

     

    Mandatory: No

    Suggested Value: CONFIG_FOLDER/bin/hawkconsole_user_access_list.cfg