blob: 36cde48cc168fa069493909485f416f9707893b0 [file] [log] [blame]
Alexander Dehn9b797d62020-04-21 09:53:50 +00001# Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01003# Copyright © 2021 Nokia
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
jmac065e2ce2018-03-29 01:18:02 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
21 nodePortPrefix: 302
jmac0e4f7172018-09-07 18:06:43 +000022 nodePortPrefixExt: 304
jmac065e2ce2018-03-29 01:18:02 +000023 persistence:
24 mountPath: /dockerdata-nfs
Maciej Wereski537d71e2021-11-03 13:31:44 +000025 centralizedLoggingEnabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010026 mariadbGalera:
27 #This flag allows SO to instantiate its own mariadb-galera cluster
28 #If shared instance is used, this chart assumes that DB already exists
29 localCluster: false
30 service: mariadb-galera
31 internalPort: 3306
32 nameOverride: mariadb-galera
33
34#################################################################
35# Secrets metaconfig
36#################################################################
37secrets:
38 - uid: db-root-password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010039 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010040 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010041 # If we're using shared mariadb, we need to use the secret name (second
42 # part).
43 # If not, we do the same trick than for user db secret hat allows you
44 # override this secret using external one with the same field that is used
45 # to pass this to subchart.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010046 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010047 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
48 ternary
49 ""
50 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
51 (include "common.mariadb.secret.rootPassSecretName"
52 (dict "dot" .
53 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
54 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010055 - uid: db-secret
56 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
57 type: basicAuth
58 # This is a nasty trick that allows you override this secret using external one
59 # with the same field that is used to pass this to subchart
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010060 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
61 ternary
62 ""
63 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
64 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
65 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010066 - uid: odl-creds
67 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
68 type: basicAuth
69 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
70 login: '{{ .Values.config.odlUser }}'
71 password: '{{ .Values.config.odlPassword }}'
72 # For now this is left hardcoded but should be revisited in a future
73 passwordPolicy: required
demskeq89d26b332021-01-14 16:45:28 +010074 - uid: dmaap-proxy-creds
75 name: &dmaapProxyCredsSecretName '{{ include "common.release" . }}-sdnc-dmaap-proxy-creds'
76 type: basicAuth
77 externalSecret: '{{ .Values.config.dmaapProxyCredsExternalSecret }}'
78 login: '{{ .Values.config.sdnr.dmaapProxy.user }}'
79 password: '{{ .Values.config.sdnr.dmaapProxy.password }}'
80 # For now this is left hardcoded but should be revisited in a future
81 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010082 - uid: netbox-apikey
83 type: password
84 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
85 password: '{{ .Values.config.netboxApikey }}'
86 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -050087 - uid: aai-truststore-password
88 type: password
89 externalSecret: '{{ .Values.config.aaiTruststoreExternalSecret }}'
90 password: '{{ .Values.config.aaiTruststorePassword }}'
91 passwordPolicy: required
92 - uid: ansible-truststore-password
93 type: password
94 externalSecret: '{{ .Values.config.ansibleTruststoreExternalSecret }}'
95 password: '{{ .Values.config.ansibleTruststorePassword }}'
96 passwordPolicy: required
97 - uid: truststore-password
98 type: password
99 externalSecret: '{{ .Values.config.truststoreExternalSecret }}'
100 password: '{{ .Values.config.truststorePassword }}'
101 passwordPolicy: required
102 - uid: keystore-password
103 type: password
104 externalSecret: '{{ .Values.config.keystoreExternalSecret }}'
105 password: '{{ .Values.config.keystorePassword }}'
106 passwordPolicy: required
107 - uid: dmaap-authkey
108 type: password
109 externalSecret: '{{ .Values.config.dmaapAuthKeyExternalSecret }}'
110 password: '{{ .Values.config.dmaapAuthKey }}'
111 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100112 - uid: aai-user-creds
113 type: basicAuth
114 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
115 login: '{{ .Values.config.aaiUser }}'
116 password: '{{ .Values.config.aaiPassword }}'
117 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -0500118 - uid: so-user-creds
119 type: basicAuth
120 externalSecret: '{{ .Values.config.soCredsExternalSecret}}'
121 login: '{{ .Values.config.soUser }}'
122 password: '{{ .Values.config.soPassword }}'
123 passwordPolicy: required
124 - uid: neng-user-creds
125 type: basicAuth
126 externalSecret: '{{ .Values.config.nengCredsExternalSecret}}'
127 login: '{{ .Values.config.nengUser }}'
128 password: '{{ .Values.config.nengPassword }}'
129 passwordPolicy: required
130 - uid: cds-user-creds
131 type: basicAuth
132 externalSecret: '{{ .Values.config.cdsCredsExternalSecret}}'
133 login: '{{ .Values.config.cdsUser }}'
134 password: '{{ .Values.config.cdsPassword }}'
135 passwordPolicy: required
136 - uid: honeycomb-user-creds
137 type: basicAuth
138 externalSecret: '{{ .Values.config.honeycombCredsExternalSecret}}'
139 login: '{{ .Values.config.honeycombUser }}'
140 password: '{{ .Values.config.honeycombPassword }}'
141 passwordPolicy: required
142 - uid: dmaap-user-creds
143 type: basicAuth
144 externalSecret: '{{ .Values.config.dmaapCredsExternalSecret}}'
145 login: '{{ .Values.config.dmaapUser }}'
146 password: '{{ .Values.config.dmaapPassword }}'
147 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100148 - uid: modeling-user-creds
149 type: basicAuth
150 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
151 login: '{{ .Values.config.modelingUser }}'
152 password: '{{ .Values.config.modelingPassword }}'
153 passwordPolicy: required
154 - uid: restconf-creds
155 type: basicAuth
156 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
157 login: '{{ .Values.config.restconfUser }}'
158 password: '{{ .Values.config.restconfPassword }}'
159 passwordPolicy: required
160 - uid: ansible-creds
161 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
162 type: basicAuth
163 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
164 login: '{{ .Values.config.ansibleUser }}'
165 password: '{{ .Values.config.ansiblePassword }}'
166 passwordPolicy: required
167 - uid: scaleout-creds
168 type: basicAuth
169 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
170 login: '{{ .Values.config.scaleoutUser }}'
171 password: '{{ .Values.config.scaleoutPassword }}'
172 passwordPolicy: required
demskeq8b43e92c2021-02-12 15:43:48 +0100173 - uid: oauth-token-secret
174 type: password
175 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.tokenExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
176 password: '{{ .Values.config.sdnr.oauth.tokenSecret }}'
177 passwordPolicy: required
178 - uid: keycloak-secret
179 type: password
180 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.providersSecrets.keycloakExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
181 password: '{{ .Values.config.sdnr.oauth.providersSecrets.keycloak }}'
182 passwordPolicy: required
sebdetb205f402021-10-20 12:16:02 +0200183 - uid: ves-collector-secret
184 type: basicAuth
185 login: '{{ .Values.config.sdnr.vesCollector.username }}'
186 password: '{{ .Values.config.sdnr.vesCollector.password }}'
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100187#################################################################
188# Certificates
189#################################################################
190certificates:
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100191 - mountPath: /var/custom-certs
192 commonName: sdnc.simpledemo.onap.org
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100193 dnsNames:
194 - sdnc.simpledemo.onap.org
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100195 keystore:
196 outputType:
197 - jks
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100198 passwordSecretRef:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100199 create: true
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100200 name: sdnc-cmpv2-keystore-password
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100201 key: password
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100202 issuer:
203 group: certmanager.onap.org
204 kind: CMPv2Issuer
205 name: cmpv2-issuer-onap
jmac065e2ce2018-03-29 01:18:02 +0000206#################################################################
207# Application configuration defaults.
208#################################################################
209# application images
Alexander Dehn238450f2020-10-27 13:03:53 +0000210
jmac065e2ce2018-03-29 01:18:02 +0000211pullPolicy: Always
Dan Timoney9f2a5772022-12-19 11:48:50 -0500212image: onap/sdnc-image:2.4.2
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400213
jmac065e2ce2018-03-29 01:18:02 +0000214# flag to enable debugging - application support required
215debugEnabled: false
216
217# application configuration
BorislavG5f3b6192018-03-25 18:12:38 +0300218config:
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400219 odlUid: 100
220 odlGid: 101
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100221 odlUser: admin
jmaca68f4cb2018-05-10 22:44:19 +0000222 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100223 # odlCredsExternalSecret: some secret
224 netboxApikey: onceuponatimeiplayedwithnetbox20180814
225 # netboxApikeyExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500226 aaiTruststorePassword: changeit
227 # aaiTruststoreExternalSecret: some secret
228 ansibleTruststorePassword: changeit
229 # ansibleTruststoreExternalSecret: some secret
230 truststorePassword: adminadmin
231 # truststoreExternalSecret: some secret
232 keystorePassword: adminadmin
233 # keystoreExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100234 aaiUser: sdnc@sdnc.onap.org
235 aaiPassword: demo123456!
236 # aaiCredsExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500237 soUser: sdncaBpmn
238 soPassword: password1$
239 # soCredsExternalSecret: some secret
240 nengUser: ccsdkapps
241 nengPassword: ccsdkapps
242 # nengCredsExternalSecret: some secret
243 cdsUser: ccsdkapps
244 cdsPassword: ccsdkapps
245 # cdsCredsExternalSecret: some secret
246 honeycombUser: admin
247 honeycombPassword: admin
248 # honeycombCredsExternalSecret: some secret
249 dmaapUser: admin
250 dmaapPassword: admin
251 dmaapAuthKey: "fs20cKwalJ6ry4kX:7Hqm6BDZK47IKxGRkOPFk33qMYs="
252 # dmaapCredsExternalSecret: some secret
253 # dmaapAuthKeyExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100254 modelingUser: ccsdkapps
255 modelingPassword: ccsdkapps
256 # modelingCredsExternalSecret: some secret
257 restconfUser: admin
258 restconfPassword: admin
259 # restconfCredsExternalSecret: some secret
260 scaleoutUser: admin
261 scaleoutPassword: admin
262 # scaleoutExternalSecret: some secret
263 ansibleUser: sdnc
264 ansiblePassword: sdnc
265 # ansibleCredsExternalSecret: some secret
sebdetb205f402021-10-20 12:16:02 +0200266
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100267 dbSdnctlDatabase: &sdncDbName sdnctl
jmac065e2ce2018-03-29 01:18:02 +0000268 enableClustering: true
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400269 sdncHome: /opt/onap/sdnc
jmaca68f4cb2018-05-10 22:44:19 +0000270 binDir: /opt/onap/sdnc/bin
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400271 etcDir: /opt/onap/sdnc/data
Trevor Tait567ff1e2018-05-01 16:20:54 -0400272 geoEnabled: false
Neha Jain7b0d6c62018-05-17 14:34:49 -0400273# if geoEnabled is set to true here, mysql.geoEnabled must be set to true
Trevor Tait567ff1e2018-05-01 16:20:54 -0400274# if geoEnabled is set to true the following 3 values must be set to their proper values
275 myODLCluster: 127.0.0.1
276 peerODLCluster: 127.0.0.1
Mohammadreza Pasandidehb642ee52018-06-19 15:19:53 -0400277 isPrimaryCluster: true
jmac065e2ce2018-03-29 01:18:02 +0000278 configDir: /opt/onap/sdnc/data/properties
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200279 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
jmac065e2ce2018-03-29 01:18:02 +0000280 dmaapTopic: SUCCESS
jmaca68f4cb2018-05-10 22:44:19 +0000281 dmaapPort: 3904
BorislavG5f3b6192018-03-25 18:12:38 +0300282 logstashServiceName: log-ls
283 logstashPort: 5044
jmac7c434672018-05-11 20:14:17 +0000284 ansibleServiceName: sdnc-ansible-server
285 ansiblePort: 8000
Dan Timoneya98765b2020-09-14 11:57:55 -0400286 javaHome: /opt/java/openjdk
jmac7c434672018-05-11 20:14:17 +0000287
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400288 odl:
289 etcDir: /opt/opendaylight/etc
290 binDir: /opt/opendaylight/bin
Dan Timoneya98765b2020-09-14 11:57:55 -0400291 gcLogDir: /opt/opendaylight/data/log
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400292 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
Dan Timoney9520e7c2021-01-12 11:10:58 -0500293 salConfigVersion: 1.10.4
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400294 akka:
295 seedNodeTimeout: 15s
296 circuitBreaker:
297 maxFailures: 10
298 callTimeout: 90s
299 resetTimeout: 30s
300 recoveryEventTimeout: 90s
301 datastore:
302 persistentActorRestartMinBackoffInSeconds: 10
303 persistentActorRestartMaxBackoffInSeconds: 40
304 persistentActorRestartResetBackoffInSeconds: 20
305 shardTransactionCommitTimeoutInSeconds: 120
306 shardIsolatedLeaderCheckIntervalInMillis: 30000
307 operationTimeoutInSeconds: 120
308 javaOptions:
309 maxGCPauseMillis: 100
310 parallelGCThreads : 3
Dan Timoneya98765b2020-09-14 11:57:55 -0400311 numberGCLogFiles: 10
312 minMemory: 512m
313 maxMemory: 2048m
314 gcLogOptions: ""
315 # Next line enables gc logging
316 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000317 # enables sdnr functionality
318 sdnr:
Alexander Dehn5c1105e2020-09-14 20:55:56 +0000319 enabled: true
Alexander Dehn9b797d62020-04-21 09:53:50 +0000320 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
321 # mode: dm - SDNC contains sdnr device manager + ODLUX components
322 mode: dm
323 # sdnronly: true starts sdnc container with odl and sdnrwt features only
324 sdnronly: false
325 sdnrdbTrustAllCerts: true
326 mountpointRegistrarEnabled: false
327 mountpointStateProviderEnabled: false
demskeq827854662021-04-08 14:49:47 +0200328 netconfCallHome:
329 enabled: true
demskeq8b43e92c2021-02-12 15:43:48 +0100330 #
demskeq89d26b332021-01-14 16:45:28 +0100331 # enable and set dmaap-proxy for mountpointRegistrar
332 dmaapProxy:
333 enabled: false
334 usepwd: true
335 user: addUserHere
336 password: addPasswordHere
337 url: addProxyUrlHere
demskeq8b43e92c2021-02-12 15:43:48 +0100338 oauth:
339 enabled: false
340 tokenIssuer: ONAP SDNC
341 tokenSecret: secret
342 supportOdlusers: true
343 redirectUri: null
344 publicUrl: none
345 odluxRbac:
346 enabled: true
347 # example definition for a oauth provider
348 providersSecrets:
349 keycloak: d8d7ed52-0691-4353-9ac6-5383e72e9c46
350 providers:
351 - id: keycloak
352 type: KEYCLOAK
353 host: http://keycloak:8080
354 clientId: odlux.app
355 secret: ${KEYCLOAK_SECRET}
356 scope: openid
357 title: ONAP Keycloak Provider
358 roleMapping:
359 mykeycloak: admin
sebdetb205f402021-10-20 12:16:02 +0200360 vesCollector:
361 enabled: false
362 tls:
363 enabled: true
364 trustAllCertificates: false
365 username: sample1
366 password: sample1
367 address: dcae-ves-collector.onap
Andreas Geissler2af50792023-03-27 17:11:27 +0200368 port: 8080
sebdetb205f402021-10-20 12:16:02 +0200369 version: v7
370 reportingEntityName: ONAP SDN-R
371 eventLogMsgDetail: SHORT
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400372
jmac065e2ce2018-03-29 01:18:02 +0000373# dependency / sub-chart configuration
Alexander Dehn9b797d62020-04-21 09:53:50 +0000374network-name-gen:
375 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100376mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100377 nameOverride: &sdnc-db sdnc-db
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100378 config: &mariadbGaleraConfig
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100379 rootPasswordExternalSecret: *rootDbSecret
380 userName: &dbUser sdnctl
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100381 userCredentialsExternalSecret: *dbSecretName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100382 rootUser:
383 externalSecret: *rootDbSecret
384 db:
385 user: *dbUser
386 externalSecret: *dbSecretName
jmac065e2ce2018-03-29 01:18:02 +0000387 service:
388 name: sdnc-dbhost
jmac065e2ce2018-03-29 01:18:02 +0000389 sdnctlPrefix: sdnc
390 persistence:
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000391 mountSubPath: sdnc/mariadb-galera
jmac065e2ce2018-03-29 01:18:02 +0000392 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000393 replicaCount: 1
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100394 serviceAccount:
395 nameOverride: *sdnc-db
jmac065e2ce2018-03-29 01:18:02 +0000396
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100397cds:
398 enabled: false
399
400dmaap-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000401 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100402 nameOverride: sdnc-dmaap-listener
403 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100404 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100405 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100406 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100407 mysqlDatabase: *sdncDbName
408 config:
409 sdncChartName: sdnc
410 dmaapPort: 3904
411 sdncPort: 8282
412 configDir: /opt/onap/sdnc/data/properties
413 odlCredsExternalSecret: *odlCredsSecretName
414
415ueb-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000416 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100417 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100418 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100419 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100420 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100421 mysqlDatabase: *sdncDbName
422 nameOverride: sdnc-ueb-listener
423 config:
424 sdncPort: 8282
425 sdncChartName: sdnc
426 configDir: /opt/onap/sdnc/data/properties
427 odlCredsExternalSecret: *odlCredsSecretName
428
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100429sdnc-ansible-server:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000430 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100431 config:
432 restCredsExternalSecret: *ansibleSecretName
433 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100434 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100435 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100436 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100437 mysqlDatabase: ansible
438 service:
439 name: sdnc-ansible-server
440 internalPort: 8000
441
jmac065e2ce2018-03-29 01:18:02 +0000442dgbuilder:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000443 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000444 nameOverride: sdnc-dgbuilder
445 config:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100446 db:
447 dbName: *sdncDbName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100448 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
449 ternary
450 (printf "%s-sdnc-db-root-password" (include "common.release" .))
451 (include "common.mariadb.secret.rootPassSecretName"
452 (dict "dot" . "chartName" "mariadb-galera")) }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100453 userCredentialsExternalSecret: *dbSecretName
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000454 dbPodName: mariadb-galera
455 dbServiceName: mariadb-galera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100456 # This should be revisited and changed to plain text
jmac70863e12018-05-16 14:53:03 +0000457 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
farida azmydc9aef02021-04-07 17:07:09 +0200458 serviceAccount:
459 nameOverride: sdnc-dgbuilder
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100460 mariadb-galera:
jmac065e2ce2018-03-29 01:18:02 +0000461 service:
BorislavG1ffbd992018-04-24 07:56:27 +0000462 name: sdnc-dgbuilder
Andreas Geissler2af50792023-03-27 17:11:27 +0200463 ports:
464 - name: http
465 port: 3100
466 nodePort: 03
jmac065e2ce2018-03-29 01:18:02 +0000467
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200468 ingress:
469 enabled: false
470 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200471 - baseaddr: "sdnc-dgbuilder-ui"
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200472 name: "sdnc-dgbuilder"
473 port: 3000
Andreas Geissler51900a92022-08-03 13:10:35 +0200474 - baseaddr: "sdnc-web-service-api"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000475 name: "sdnc-web-service"
Andreas Geissler2af50792023-03-27 17:11:27 +0200476 port: 8080
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200477 config:
478 ssl: "redirect"
479
Alexander Dehn9b797d62020-04-21 09:53:50 +0000480
481
Alexander Dehnab86ec12020-02-05 14:38:54 +0000482# local elasticsearch cluster
483localElasticCluster: true
484elasticsearch:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100485 nameOverride: &elasticSearchName sdnrdb
Alexander Dehnab86ec12020-02-05 14:38:54 +0000486 name: sdnrdb-cluster
Alexander Dehnab86ec12020-02-05 14:38:54 +0000487 service:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100488 name: *elasticSearchName
Alexander Dehnab86ec12020-02-05 14:38:54 +0000489 master:
490 replicaCount: 3
491 # dedicatednode: "yes"
492 # working as master node only, in this case increase replicaCount for elasticsearch-data
493 # dedicatednode: "no"
494 # handles master and data node functionality
495 dedicatednode: "no"
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100496 nameOverride: *elasticSearchName
demskeq8eb56da72021-02-19 12:11:48 +0100497 cluster_name: sdnrdb-cluster
sebdetb205f402021-10-20 12:16:02 +0200498
Alexander Dehn9b797d62020-04-21 09:53:50 +0000499# enable
500sdnc-web:
Alexander Dehn8789a722020-10-16 14:29:05 +0000501 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000502# default number of instances
503replicaCount: 1
504
505nodeSelector: {}
506
507affinity: {}
508
509# probe configuration parameters
510liveness:
511 initialDelaySeconds: 10
512 periodSeconds: 10
513 # necessary to disable liveness probe when setting breakpoints
514 # in debugger so K8s doesn't restart unresponsive container
515 enabled: true
516
517readiness:
518 initialDelaySeconds: 10
519 periodSeconds: 10
520
521service:
522 type: NodePort
523 name: sdnc
Radoslaw Chmiel58662a32022-06-02 19:37:35 +0200524 portName: http
jmac065e2ce2018-03-29 01:18:02 +0000525 internalPort: 8181
526 internalPort2: 8101
527 internalPort3: 8080
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400528
jmac065e2ce2018-03-29 01:18:02 +0000529 #port
530 externalPort: 8282
jmac065e2ce2018-03-29 01:18:02 +0000531
532 externalPort2: 8202
jmac065e2ce2018-03-29 01:18:02 +0000533
534 externalPort3: 8280
jmac065e2ce2018-03-29 01:18:02 +0000535
jmaca68f4cb2018-05-10 22:44:19 +0000536 nodePort4: 67
537
jmac065e2ce2018-03-29 01:18:02 +0000538 clusterPort: 2550
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400539 clusterPort2: 2650
540 clusterPort3: 2681
541
542 geoNodePort1: 61
543 geoNodePort2: 62
544 geoNodePort3: 63
545 geoNodePort4: 64
546 geoNodePort5: 65
547 geoNodePort6: 66
jmac065e2ce2018-03-29 01:18:02 +0000548
Andreas Geissler2af50792023-03-27 17:11:27 +0200549 callHomePort: &chport 4334
demskeq827854662021-04-08 14:49:47 +0200550 callHomeNodePort: 66
551
jmac8d6dc962018-04-26 14:26:55 +0000552## Persist data to a persitent volume
553persistence:
554 enabled: true
555
556 ## A manually managed Persistent Volume and Claim
557 ## Requires persistence.enabled: true
558 ## If defined, PVC must be created manually before volume will be bound
559 # existingClaim:
560 volumeReclaimPolicy: Retain
561
562 ## database data Persistent Volume Storage Class
563 ## If defined, storageClassName: <storageClass>
564 ## If set to "-", storageClassName: "", which disables dynamic provisioning
565 ## If undefined (the default) or set to null, no storageClassName spec is
566 ## set, choosing the default provisioner. (gp2 on AWS, standard on
567 ## GKE, AWS & OpenStack)
568 accessMode: ReadWriteOnce
569 size: 1Gi
570 mountPath: /dockerdata-nfs
571 mountSubPath: sdnc/mdsal
Dan Timoney2ee28a52021-01-15 16:39:50 -0500572 mdsalPath: /opt/opendaylight/mdsal
demskeq8a86300a2021-02-10 09:53:33 +0100573 daeximPath: /opt/opendaylight/mdsal/daexim
Satoshi Fujii31b8b432021-08-28 12:12:36 +0000574 journalPath: /opt/opendaylight/segmented-journal
Dan Timoney2ee28a52021-01-15 16:39:50 -0500575 snapshotsPath: /opt/opendaylight/snapshots
jmac8d6dc962018-04-26 14:26:55 +0000576
jmac065e2ce2018-03-29 01:18:02 +0000577ingress:
578 enabled: false
Lucjan Bryndza08448402019-11-27 14:26:54 +0100579 service:
Andreas Geissler2af50792023-03-27 17:11:27 +0200580 - baseaddr: "sdnc-api"
581 name: "sdnc"
582 port: 8282
583 - baseaddr: "sdnc-callhome"
584 name: "onap-sdnc-callhome"
585 port: *chport
586 protocol: tcp
587 exposedPort: *chport
588 exposedProtocol: TCP
Lucjan Bryndza08448402019-11-27 14:26:54 +0100589 config:
590 ssl: "redirect"
jmac065e2ce2018-03-29 01:18:02 +0000591
toshrajbhardwaj72b5f0f2018-09-13 02:45:22 +0000592#Resource Limit flavor -By Default using small
593flavor: small
594#segregation for different envionment (Small and Large)
595
596resources:
Mandeep Khindade045712018-09-19 18:11:57 +0000597 small:
598 limits:
599 cpu: 2
600 memory: 4Gi
601 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000602 cpu: 1
603 memory: 2Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000604 large:
605 limits:
606 cpu: 4
607 memory: 8Gi
608 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000609 cpu: 2
610 memory: 4Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000611 unlimited: {}
farida azmy32c5ed82021-08-04 14:46:09 +0200612
613#Pods Service Account
614serviceAccount:
615 nameOverride: sdnc
616 roles:
617 - read
Maciej Wereski537d71e2021-11-03 13:31:44 +0000618
619#Log configuration
620log:
621 path: /var/log/onap