- 27 Nov 2024
- 3 Minutes to read
- Print
- DarkLight
- PDF
Nectar DXP - RIG Agent Configuration Guide
- Updated on 27 Nov 2024
- 3 Minutes to read
- Print
- DarkLight
- PDF
Overview
About this Guide
This guide provides the instructions to configure the Nectar DXP RIG agent for Nectar Foundation, including:
Audience
This guide is intended for system administrators or engineers who have system administration access and technical knowledge of Nectar DXP along with a familiarity with deploying Nectar Foundation.
Supported Software Versions
- Nectar UCMP v8.7
- Nectar DXP
Enable Nectar DXP RIG Agent
To start or enable the RIG agent as part of Nectar Foundation APM, you must manually configure the application.properties file and restart the RIG service
- Navigate to Apps > <RIG install folder>.
- Locate and open the application.properties file using Notepad.
- Locate the following line of text:
spring.profiles.active = derby - Add the following text to that line to enable the agent as part of the RIG:
spring.profiles.active = derby, rigagent - Save the file.
Configure Nectar DXP RIG Agent
To configure the RIG agent, you must manually configure the application-rigagent.yml file.
- Locate and open the application-rigagent.yml file.NoteYou already navigated to RIG installation folder.
Use YAML editor, such as https://codebeautify.org/yami-validator, to make changes to application-rigagent.yml file. - Enter the following information to configure the RIG agent connection (see also Example).
Property | Description |
agentDirectory | Specify the path/name of the folder that will be used to store the RIG agent data. Create a folder named RigAgent and a subfolder named data, for example: agentDirectory: C:\Apps\\RigAgent\data |
Datagate: | Configure the Nectar DXP datagate service properties for the RIG agent connection. |
url | Specify the Nectar DXP datagate URL, such as: https://cap- datagatedevelop.app.ambrosia.lab.nectarvoip.com |
agent | Specify the provisioned RIG agent, such as develop_agent. |
password | Specify the provisioned RIG agent’s password, such as 1234. |
proxy | Optional; default is false. Note: If you have Socks proxy enabled, enter true in the proxy > socks > active field; then enter the proxy host, port, username, and password. |
sslcertificate | |
url | Specify the main Nectar DXP UI client URL for the Rig agent to import SSL certificates to make HTTPS connection to the datagate service. For example: https://develop.ambrosia.lab.nectarvoip.com |
alias | Optional. Specify an alias for the certificate, such as NectarCorpCloud. |
active-directory | Specify for Active Directory (AD) polling. Note: This optionally uses the PowerShell module. For more information, see Install PowerShell Module. |
username/password | To use same credentials as Windows service account to access AD, specify username/password of the Windows service AD account. |
ssl | Use SSL for AD connection (LDAPS). Specify tenant-provided key-store and trust-store file paths in key-store and trust-store properties, respectively. Specify key-store and trust-store file passwords in key-store-password and trust-store password properties, respectively. Both are optional. |
Example - application-rigagent.yml
# Folder to keep rig agent specific data such as Cisco CMS CDR files
agentDirectory: C:\Apps\nectar\RigAgent\data
# Datagate config for rig agent connection
datagate:
url: https://cap-datagate-develop.app.ambrosia.lab.nectarvoip.com
agent: develop_agent
password: 1234
proxy:
socks:
active: false
host:
port:
username:
password:
# To import certificates from the Nectar DXP main client URL for the rig agent to make HTTPS
# connection to data gate service in Nectar DXP
sslcertificate:
url: https://develop.ambrosia.lab.nectarvoip.com
alias: NectarCorpCloud
# For active directory polling
active-directory:
# To connect to AD using Windows service account
username:
password:
# Set up key store and trust store for AD LDAPS. Foundation Rig trust store (and key store) file can be specified
# here if required SSL certificate can be imported into it.
ssl:
key-store:
key-store-password:
trust-store:
trust-store-password:
3. Save the file.
4. After configuration is completed, restart the RIG service to enable the Nectar DXP RIG agent.
Install PowerShell Module
For tenants who have AD polling configured, the PowerShell module can be imported into the RIG. However, this is not mandatory, as it is not applicable for Linux RIGs.
- From the RIG, right-click Start and select Windows PowerShell > Run as administrator.
- If the following message appears, click Yes.
Do you want to allow the following program to make changes to this computer, - Execute the following command:
Import-Module ServerManager
4. Execute the following command:
Add-WindowsFeature -Name RSAT-AD-PowerShell
The message, Collecting Data ..., appears.
5. When the process completes, close the PowerShell window.