blob: dccf57ca96ed947ae0a34f352c021e89336803b3 [file] [log] [blame]
Kiran Kamineni39648722018-03-21 14:58:11 -07001# Copyright 2018 Intel Corporation, Inc
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +02002# Modifications © 2020 AT&T, Orange
Kiran Kamineni39648722018-03-21 14:58:11 -07003#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
16#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
Kiran Kamineni39648722018-03-21 14:58:11 -070021 loggingRepository: docker.elastic.co
22 loggingImage: beats/filebeat:5.5.0
Kiran Kaminenie4e81e72018-04-09 10:14:32 -070023 persistence: {}
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +020024 envsubstImage: dibi/envsubst
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020025 aafEnabled: true
ChrisCec86a532020-03-19 15:53:31 -050026
dsingh.27864a34bf2018-09-21 05:11:00 -040027flavor: small
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020028
29#################################################################
30# AAF part
31#################################################################
32certInitializer:
33 nameOverride: aaf-sms-cert-init
34 aafDeployFqi: deployer@people.osaaf.org
35 aafDeployPass: demo123456!
36 # aafDeployCredsExternalSecret: some secret
37 fqdn: aaf-sms
38 fqi: aaf-sms@aaf-sms.onap.org
39 public_fqdn: aaf-sms.onap.org
40 cadi_longitude: "0.0"
41 cadi_latitude: "0.0"
42 app_ns: org.osaaf.aaf
43 mountPath: /opt/app/osaaf
44 keystore: truststoreONAPall.jks
45 keystore_pass: changeit
46 root_ca_alias: onaptestca
47 root_ca_name: aaf_root_ca.cer
48 permission_user: 1000
49 permission_group: 1000
50 aaf_add_config: >
51 cd {{ .Values.mountPath }}/local;
52 keytool -exportcert -rfc -file {{ .Values.root_ca_name }} -keystore {{ .Values.keystore }}
53 -alias {{ .Values.root_ca_alias }} -storepass {{ .Values.keystore_pass }};
54 chown -R {{.Values.permission_user}}:{{.Values.permission_group}}
55 {{ .Values.mountPath }};
56
Kiran Kamineni39648722018-03-21 14:58:11 -070057#################################################################
58# Application configuration defaults.
59#################################################################
60# application image
61repository: nexus3.onap.org:10001
ChrisCec86a532020-03-19 15:53:31 -050062image: onap/aaf/sms:4.0.2
Kiran Kamineni39648722018-03-21 14:58:11 -070063pullPolicy: Always
64
65# flag to enable debugging - application support required
66debugEnabled: false
67
68# application configuration
69# Example:
70config:
Kiran Kamineni992e1ad2018-04-06 15:42:40 -070071 smsdbaddress: "http://aaf-sms-db:8200"
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020072 cafile: "/opt/app/osaaf/local/aaf_root_ca.cer"
73 servercert: "/opt/app/osaaf/local/org.onap.aaf-sms.crt"
74 serverkey: "/opt/app/osaaf/local/org.onap.aaf-sms.key"
Kiran Kaminenic808c9a2018-05-14 16:59:55 -070075 password: "c2VjcmV0bWFuYWdlbWVudHNlcnZpY2VzZWNyZXRwYXNzd29yZA=="
Kiran Kamineni39648722018-03-21 14:58:11 -070076
77# subchart configuration
78vault:
79 nameOverride: smsdb
80
81# default number of instances
82replicaCount: 1
83
84nodeSelector: {}
85
86affinity: {}
87
88# probe configuration parameters
89liveness:
90 initialDelaySeconds: 10
Kiran Kaminenic808c9a2018-05-14 16:59:55 -070091 periodSeconds: 30
Kiran Kamineni39648722018-03-21 14:58:11 -070092 # necessary to disable liveness probe when setting breakpoints
93 # in debugger so K8s doesn't restart unresponsive container
94 enabled: true
95
96readiness:
97 initialDelaySeconds: 10
Kiran Kaminenic808c9a2018-05-14 16:59:55 -070098 periodSeconds: 30
Kiran Kamineni39648722018-03-21 14:58:11 -070099
100service:
Kiran Kamineni10238362019-03-19 13:15:02 -0700101 type: ClusterIP
Kiran Kamineni992e1ad2018-04-06 15:42:40 -0700102 name: aaf-sms
BorislavG1ffbd992018-04-24 07:56:27 +0000103 portName: aaf-sms
Kiran Kamineni39648722018-03-21 14:58:11 -0700104 internalPort: 10443
Kiran Kamineni10238362019-03-19 13:15:02 -0700105 externalPort: 10443
Kiran Kamineni39648722018-03-21 14:58:11 -0700106
Kiran Kaminenie4e81e72018-04-09 10:14:32 -0700107persistence:
108 enabled: true
109 volumeReclaimPolicy: Retain
110 accessMode: ReadWriteOnce
111 size: 1Gi
112 mountPath: /dockerdata-nfs
113 mountSubPath: sms/auth
114
Kiran Kamineni39648722018-03-21 14:58:11 -0700115ingress:
116 enabled: false
117
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200118secrets:
119 - uid: aai-creds
120 type: basicAuth
121 login: '{{ .Values.oofCreds.aaiUsername }}'
122 password: '{{ .Values.oofCreds.aaiPassword }}'
123 passwordPolicy: required
124 - uid: conductor-creds
125 type: basicAuth
126 login: '{{ .Values.oofCreds.conductorUsername }}'
127 password: '{{ .Values.oofCreds.conductorPassword }}'
128 passwordPolicy: required
129 - uid: sdnc-creds
130 type: basicAuth
131 login: '{{ .Values.oofCreds.sdncUsername }}'
132 password: '{{ .Values.oofCreds.sdncPassword }}'
133 passwordPolicy: required
134 - uid: music-creds
135 type: basicAuth
136 login: '{{ .Values.oofCreds.musicUsername }}'
137 password: '{{ .Values.oofCreds.musicPassword }}'
138 passwordPolicy: required
139 - uid: aaf-creds
140 type: basicAuth
141 login: '{{ .Values.oofCreds.aafUsername }}'
142 password: '{{ .Values.oofCreds.aafPassword }}'
143 passwordPolicy: required
144 - uid: policy-plat-creds
145 type: basicAuth
146 login: '{{ .Values.oofCreds.policyPlatUsername }}'
147 password: '{{ .Values.oofCreds.policyPlatPassword }}'
148 passwordPolicy: required
149 - uid: policy-cli-creds
150 type: basicAuth
151 login: '{{ .Values.oofCreds.policyCliUsername }}'
152 password: '{{ .Values.oofCreds.policyCliPassword }}'
153 passwordPolicy: required
154 - uid: osdf-placement-creds
155 type: basicAuth
156 login: '{{ .Values.oofCreds.osdfPlacementUsername }}'
157 password: '{{ .Values.oofCreds.osdfPlacementPassword }}'
158 passwordPolicy: required
159 - uid: osdf-placement-so-creds
160 type: basicAuth
161 login: '{{ .Values.oofCreds.osdfPlacementSOUsername }}'
162 password: '{{ .Values.oofCreds.osdfPlacementSOPassword }}'
163 passwordPolicy: required
164 - uid: osdf-placement-vfc-creds
165 type: basicAuth
166 login: '{{ .Values.oofCreds.osdfPlacementVFCUsername }}'
167 password: '{{ .Values.oofCreds.osdfPlacementVFCPassword }}'
168 passwordPolicy: required
169 - uid: osdf-cm-scheduler-creds
170 type: basicAuth
171 login: '{{ .Values.oofCreds.osdfCMSchedulerUsername }}'
172 password: '{{ .Values.oofCreds.osdfCMSchedulerPassword }}'
173 passwordPolicy: required
174 - uid: config-db-creds
175 type: basicAuth
176 login: '{{ .Values.oofCreds.configDbUsername }}'
177 password: '{{ .Values.oofCreds.configDbPassword }}'
178 passwordPolicy: required
179 - uid: osdf-pci-opt-creds
180 type: basicAuth
181 login: '{{ .Values.oofCreds.osdfPCIOptUsername }}'
182 password: '{{ .Values.oofCreds.osdfPCIOptPassword }}'
183 passwordPolicy: required
184 - uid: osdf-opt-engine-creds
185 type: basicAuth
186 login: '{{ .Values.oofCreds.osdfOptEngineUsername }}'
187 password: '{{ .Values.oofCreds.osdfOptEnginePassword }}'
188 passwordPolicy: required
vrvarma26dbd2b2020-05-18 19:37:19 -0400189 - uid: so-creds
190 type: basicAuth
191 login: '{{ .Values.oofCreds.soUsername }}'
192 password: '{{ .Values.oofCreds.soPassword }}'
193 passwordPolicy: required
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200194
195oofCreds:
196 aaiUsername: oof@oof.onap.org
197 aaiPassword: demo123456!
198
199 conductorUsername: admin1
200 conductorPassword: plan.15
201
202 sdncUsername: admin
203 sdncPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
204
205 musicUsername: conductor
206 musicPassword: c0nduct0r
207
208 aafUsername: aaf_admin@people.osaaf.org
209 aafPassword: demo123456!
210
vrvarma7344c282020-05-06 14:58:35 -0400211 policyPlatUsername: healthcheck
212 policyPlatPassword: zb!XztG34
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200213
vrvarma7344c282020-05-06 14:58:35 -0400214 policyCliUsername: healthcheck
215 policyCliPassword: zb!XztG34
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200216
217 osdfPlacementUsername: test
218 osdfPlacementPassword: testpwd
219
220 osdfPlacementSOUsername: so_test
221 osdfPlacementSOPassword: so_testpwd
222
223 osdfPlacementVFCUsername: vfc_test
224 osdfPlacementVFCPassword: vfc_testpwd
225
226 osdfCMSchedulerUsername: test1
227 osdfCMSchedulerPassword: testpwd1
228
229 configDbUsername: osdf
230 configDbPassword: passwd
231
232 osdfPCIOptUsername: pci_test
233 osdfPCIOptPassword: pci_testpwd
234
235 osdfOptEngineUsername: opt_test
236 osdfOptEnginePassword: opt_testpwd
237
vrvarma26dbd2b2020-05-18 19:37:19 -0400238 soUsername: apihBpmn
239 soPassword: password1$
240
dsingh.27864a34bf2018-09-21 05:11:00 -0400241# Configure resource requests and limits
242resources:
243 small:
244 limits:
Sylvain Desbureauxc10829f2019-11-29 14:43:58 +0100245 cpu: 100m
Sylvain Desbureaux993bd352020-03-04 11:25:15 +0100246 memory: 400Mi
dsingh.27864a34bf2018-09-21 05:11:00 -0400247 requests:
Sylvain Desbureauxdaee54b2020-02-12 17:41:18 +0100248 cpu: 25m
dsingh.27864a34bf2018-09-21 05:11:00 -0400249 memory: 10Mi
250 large:
251 limits:
252 cpu: 400m
253 memory: 1Gi
254 requests:
Sylvain Desbureaux993bd352020-03-04 11:25:15 +0100255 cpu: 25m
dsingh.27864a34bf2018-09-21 05:11:00 -0400256 memory: 100Mi
Kiran Kamineni7a8dff32018-10-30 15:25:47 -0700257 unlimited: {}