Administrate the System Configuration¶
In an on-premise installation, the configuration of PLOSSYS Output Engine is kept in the Consul key value store and can be administrated by PLOSSYS CLI. In a cloud environment, the container-orchestration system is used for this.
Requirements¶
For the requirements for using PLOSSYS CLI, refer to PLOSSYS CLI.
Commands and Options¶
Usage: plossys config [options] [command]
Options:
  -V, --version                  output the version number
  --consul <value>               consul url (https://localhost:8500) (default: "https://localhost:8500")
  --insecure                     accept invalid https certificate from Consul server
  --htpasswd                     activate htpasswd syntax check for command set
  --json                         activate json syntax check for command set
  --file <value>                 input/output file for commands set/get
  --service <value>              name of the service without `seal-` for which to get or set parameters
  --token <value>                ACL token used to access Consul's key-/value store
  -h, --help                     display help for command
Commands:
  import [options] <configfile>  import new configuration
    required arguments:
      configfile: the path and name of the configuration file in YAML format
  update <configfile>            update configuration
    required arguments:
      configfile: the path and name of the configuration file in YAML format
  export <configfile>            export new configuration
    required arguments:
      configfile: the path and name of the target configuration file
  validate [options]             validate and correct configuration
  set <key> [<value>]            set configuration parameter
    required arguments:
      key: the name of the configuration parameter
      value: the value for the configuration parameter (not required if option --file is specified)
  get <key>                      get configuration parameter
    required arguments:
      key: the name of the configuration parameter
  template <key>                 get template for configuration parameter
    required arguments:
      key: the name of the configuration parameter
  help [command]                 display help for command
help¶
help displays the help for the command.
Usage: plossys config help [command]
export¶
export exports the current configuration as stored in Consul as YAML file.
Usage: plossys config export [options] <configfile>
Arguments:
configfile: path and name of the target configuration file, mandatory
Examples:
- 
plossys config export export.ymlExports the configuration and save it to the file
export.ymlin the current directory. - 
plossys config export export.yml --insecureExports the configuration and save it to the file
export.ymlin the current directory. The certificate will not be checked by the client. - 
plossys config export <filename>.yml --token <consul_token>Export the configuration from a secured Consul key value store.
 
get¶
get returns the value of a configuration parameter. If the parameter is not set, the command returns Key not found.
Usage:  plossys config get [options] <key>
Arguments:
key: name of the configuration parameter, mandatory. For the list of available keys, refer to Keys.
Options:
--file <value>: path and name of the file to write the value into--service <value>: name of the service withoutseal-for which to get the configuration value (default:any)
Examples:
- 
plossys config get LOG_LEVELReturns the value set for the
LOG_LEVELkey if set for any service. - 
plossys config get LOG_LEVEL --insecureReturns the value set for the
LOG_LEVELkey if set for any service. The certificate will not be checked by the client. - 
plossys config get LOG_LEVEL --service plossysadmin --insecureReturns the value set for the
LOG_LEVELkey if set forseal-plossysadminservice. The certificate will not be checked by the client. - 
plossys config get LOG_LEVEL --insecure --file C:\temp\loglevel.txtReturns the value set for the
LOG_LEVELkey if set for any service. The output is saved asloglevel.txtin the current directory. The certificate will not be checked by the client. - 
plossys config get ALLOWED_OIDC_CLIENTS --file template.jsonGetting the
ALLOWED_OIDC_CLIENTSkey is a special case of thegetcommand. Here, the key is written for theseal-restservice automatically.ALLOWED_OIDC_CLIENTSis a complex JSON object, thus reading it from a file is advised. Additionally, the value ofALLOWED_OIDC_CLIENTSis checked for JSON conformity. - 
plossys config get HTPASSWD --file <filename>Getting the
HTPASSWDkey is a special case of thegetcommand. Here, the key is written for theseal-restservice automatically.HTPASSWDhas to accord to the format of the Apachehtpasswdfile, thus reading it from a file is advised. Additionally, the value ofHTPASSWDis checked for htpasswd conformity. 
import¶
import imports the configuration from a YAML file into Consul.
Usage: plossys config import [options] <configfile>
Arguments:
configfile: path and name of the target configuration file, mandatory
Options:
--purge: deletes the current configuration before import--update: update configuration, does not overwrite entries
Examples:
- 
plossys config import config.ymlReads the configuration from
config.ymlin the current directory and updates the configuration in Consul. Existent values will be overwritten. - 
plossys config import config.yml --insecureReads the configuration from
config.ymlin the current directory and updates the configuration in Consul. Existent values will be overwritten. The certificate will not be checked by the client. - 
plossys config import config.yml --token <consul_token> 
Reads the configuration from config.yml in the current directory and updates the configuration in a secured Consul. Existent values will be overwritten.
plossys config import config.yml --purge --insecure
Deletes the current configuration. Reads the configuration from config.yml in the current directory and imports it into Consul.
plossys config import config.yml --update --insecure
Reads the configuration from config.yml in the current directory. Only new key/value pairs will be added to the configuration in Consul. The certificate will not be checked by the client.
set¶
set sets the value of a configuration parameter.
Usage:  plossys config set [options] <key> [<value>]
Arguments:
key: name of the configuration parameter, mandatory. For the list of available keys, refer to Keys.value: the value for the configuration parameter (not required if option--fileis specified)
Options:
--json: activate json syntax check--file <value>: file to read the value from--service <value>: name of the service withoutseal-for which to set the configuration value (default:any)
Examples:
- 
plossys config set LOG_LEVEL warnSets the value
warnfor theLOG_LEVELkey for any service. - 
plossys config set LOG_LEVEL warn --insecureSets the value
warnfor theLOG_LEVELkey for any service. The certificate will not be checked by the client. - 
plossys config set LOG_LEVEL --service plossysadmin --insecureSets the value
warnfor theLOG_LEVELkey forseal-plossysadminservice. The certificate will not be checked by the client. - 
plossys config set ALLOWED_OIDC_CLIENTS --file template.jsonSetting the
ALLOWED_OIDC_CLIENTSkey is a special case of thesetcommand. Here, the key is written for theseal-restservice automatically.ALLOWED_OIDC_CLIENTSis a complex JSON object, thus reading it from a file is advised. Additionally, the value ofALLOWED_OIDC_CLIENTSis checked for JSON conformity. - 
plossys config set HTPASSWD --file <filename>Setting the
HTPASSWDkey is a special case of thesetcommand. Here, the key is written for theseal-restservice automatically.HTPASSWDhas to accord to the format of the Apache htpasswd file, thus reading it from a file is advised. Additionally, the value ofHTPASSWDis checked for htpasswd conformity. 
template¶
template creates a template for a configuration parameter. The main use cases for this command are the environment keys ALLOWED_OIDC_CLIENTS and HTPASSWD.
Arguments:
key: name of the configuration parameter, mandatory.
Options:
--file <value>: file to read the value from--service <value>: name of the service withoutseal-for which to set the configuration value (default:any)
Examples:
- 
plossys config template HTPASSWD --file <filename>Creates a template for
HTPASSWD. The value of HTPASSWD has to accord to the format of the Apache htpasswd file. For this, a template can be generated which then only has to be filled out.Example - template for
HTPASSWDuser1:password1 user2:password2 - 
plossys config template ALLOWED_OIDC_CLIENTS --file template.jsonCreates a template for
ALLOWED_OIDC_CLIENTS. The value ofALLOWED_OIDC_CLIENTShas to accord to a specific JSON object. For this, a template can be generated which then only has to be filled out.Example - template for
ALLOWED_OIDC_CLIENTSwith thesuperadminandadminexample roles{ "seal-plossysadmin": { "roles": { "superadmin": { "areas": { "dashboard": {}, "jobs": { "set-a": { "views": [ { "struct": "current.printerName", "operator": "eq", "value": "printer" } ], "permissions": [ "tempfiles", "move", "pause", "cancel", "repeat", "resume", "delete" ] }, "set-b": { "views": [ { "struct": "current.printerName", "operator": "eq", "value": "printer2" } ], "permissions": [ "ALL" ] }, "set-c": { "views": [ "ALL" ], "permissions": [] } }, "printers": { "set-a": { "views": [ { "struct": "config.server", "operator": "eq", "value": "spooler1" } ], "permissions": [ "add", "pause", "redirect", "resume", "createTestJob", "delete" ] }, "set-b": { "views": [ { "struct": "connection", "operator": "eq", "value": "socket://valid:1234" } ], "permissions": [ "add" ] }, "set-c": { "views": [ { "struct": "config.printer", "operator": "eq", "value": "printer2" }, { "struct": "config.printer", "operator": "eq", "value": "printer3" } ], "permissions": [ "ALL" ] } } } }, "admin": { "areas": { "printers": { "set-a": { "views": [ "ALL" ], "permissions": [ "resume", "pause" ] } } } } } } } 
update¶
update updates the current configuration in a running system without overwriting the existent settings.
Usage: plossys config update [options] <configfile>
Arguments:
configfile: the path and name of the configuration file in YAML format, mandatory
Options:
--dc <value>: name of the target datacenter to update configuration. (default: home)
Examples:
- 
plossys config update config.ymlReads the configuration from
config.ymlin the current directory and updates the configuration in Consul. Existent values will be not be overwritten. - 
plossys config update config.yml --insecureReads the configuration from
config.ymlin the current directory and updates the configuration in Consul. Existent values will be not be overwritten. The certificate will not be checked by the client. - 
plossys config update config.yml --token <consul_token>Reads the configuration from
config.ymlin the current directory and updates the configuration in a secured Consul. Existent values will be not be overwritten. 
validate¶
validate validates and - if necessary - corrects the configuration.
Usage: plossys config validate [options]
Arguments:
- none
 
Options:
--purge: purge configuration before re-import