| # ================================ LICENSE_START ============================= |
| # ============================================================================ |
| # Copyright (C) 2021 Nordix Foundation. |
| # Copyright (c) 2022-2023 J. F. Lucas. All rights reserved. |
| # ============================================================================ |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # ================================= LICENSE_END ============================== |
| |
| ################################################################# |
| # Global Configuration Defaults. |
| ################################################################# |
| global: |
| nodePortPrefix: 302 |
| nodePortPrefixExt: 304 |
| centralizedLoggingEnabled: true |
| |
| ################################################################# |
| # Filebeat Configuration Defaults. |
| ################################################################# |
| filebeatConfig: |
| logstashServiceName: log-ls |
| logstashPort: 5044 |
| |
| ################################################################# |
| # Secrets Configuration. |
| ################################################################# |
| secrets: |
| - uid: &pgUserCredsSecretUid pg-user-creds |
| name: &pgUserCredsSecretName '{{ include "common.release" . }}-pmsh-pg-user-creds' |
| type: basicAuth |
| externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "pmsh-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}' |
| login: '{{ .Values.postgres.config.pgUserName }}' |
| password: '{{ .Values.postgres.config.pgUserPassword }}' |
| passwordPolicy: generate |
| |
| ################################################################# |
| # Application Configuration Defaults. |
| ################################################################# |
| # Application Image |
| image: onap/org.onap.dcaegen2.services.pmsh:2.2.2 |
| pullPolicy: Always |
| |
| # Log directory where logging sidecar should look for log files |
| # if path is set to null sidecar won't be deployed in spite of |
| # global.centralizedLoggingEnabled setting. |
| log: |
| path: /var/log/ONAP/dcaegen2/services/pmsh |
| logConfigMapNamePrefix: '{{ include "common.fullname" . }}' |
| |
| # Dependencies |
| readinessCheck: |
| wait_for: |
| - &postgresName dcae-pmsh-postgres |
| - message-router |
| |
| # Probe Configuration |
| readiness: |
| initialDelaySeconds: 10 |
| periodSeconds: 15 |
| timeoutSeconds: 1 |
| path: /healthcheck |
| scheme: HTTP |
| port: 8080 |
| |
| # Service Configuration |
| service: |
| type: ClusterIP |
| name: dcae-pmsh |
| ports: |
| - name: http |
| port: 8080 |
| plain_port: 8080 |
| port_protocol: http |
| |
| serviceMesh: |
| authorizationPolicy: |
| authorizedPrincipals: |
| - serviceAccount: message-router-read |
| authorizedPrincipalsPostgres: |
| - serviceAccount: dcae-pmsh-read |
| |
| # Initial Application Configuration |
| applicationConfig: |
| enable_tls: false |
| aaf_identity: dummy_value |
| aaf_password: dummy_value |
| key_path: /opt/app/pmsh/etc/certs/key.pem |
| cert_path: /opt/app/pmsh/etc/certs/cert.pem |
| ca_cert_path: /opt/app/pmsh/etc/certs/cacert.pem |
| control_loop_name: pmsh-control-loop |
| operational_policy_name: pmsh-operational-policy |
| pmsh_policy: |
| subscription: |
| subscriptionName: ExtraPM-All-gNB-R2B |
| administrativeState: LOCKED |
| fileBasedGP: 15 |
| fileLocation: "/pm/pm.xml" |
| nfFilter: { "nfNames": [ "^pnf.*","^vnf.*" ],"modelInvariantIDs": [ ],"modelVersionIDs": [ ],"modelNames": [ ] } |
| measurementGroups: [ { "measurementGroup": { "measurementTypes": [ { "measurementType": "countera" },{ "measurementType": "counterb" } ],"managedObjectDNsBasic": [ { "DN": "dna" },{ "DN": "dnb" } ] } },{ "measurementGroup": { "measurementTypes": [ { "measurementType": "counterc" },{ "measurementType": "counterd" } ],"managedObjectDNsBasic": [ { "DN": "dnc" },{ "DN": "dnd" } ] } } ] |
| streams_publishes: |
| policy_pm_publisher: |
| type: message_router |
| dmaap_info: |
| topic_url: "http://message-router:3904/events/unauthenticated.DCAE_CL_OUTPUT" |
| streams_subscribes: |
| policy_pm_subscriber: |
| type: message_router |
| dmaap_info: |
| topic_url: "http://message-router:3904/events/unauthenticated.PMSH_CL_INPUT" |
| aai_subscriber: |
| type: message_router |
| dmaap_info: |
| topic_url: "http://message-router:3904/events/AAI-EVENT" |
| |
| applicationEnv: |
| PMSH_PG_URL: &dcaePmshPgPrimary dcae-pmsh-pg-primary |
| PMSH_PG_USERNAME: |
| secretUid: *pgUserCredsSecretUid |
| key: login |
| PMSH_PG_PASSWORD: |
| secretUid: *pgUserCredsSecretUid |
| key: password |
| PMSH_API_PORT: '8080' |
| |
| # Resource Limit Flavor -By Default Using Small |
| flavor: small |
| |
| # Segregation for Different Environment (Small and Large) |
| resources: |
| small: |
| limits: |
| cpu: 1 |
| memory: 1Gi |
| requests: |
| cpu: 1 |
| memory: 1Gi |
| large: |
| limits: |
| cpu: 2 |
| memory: 2Gi |
| requests: |
| cpu: 2 |
| memory: 2Gi |
| unlimited: {} |
| |
| ################################################################# |
| # Application configuration Overriding Defaults in the Postgres. |
| ################################################################# |
| postgres: |
| nameOverride: *postgresName |
| service: |
| name: *postgresName |
| name2: *dcaePmshPgPrimary |
| name3: dcae-pmsh-pg-replica |
| container: |
| name: |
| primary: dcae-pmsh-pg-primary |
| replica: dcae-pmsh-pg-replica |
| persistence: |
| mountSubPath: pmsh/data |
| mountInitPath: pmsh |
| config: |
| pgUserName: pmsh |
| pgDatabase: pmsh |
| pgUserExternalSecret: *pgUserCredsSecretName |
| |
| #Pods Service Account |
| serviceAccount: |
| nameOverride: dcae-pmsh |
| roles: |
| - read |