blob: 0d53ea3aa8894e2a37137c82011115a138b86934 [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
seshukm0df1f8e2020-08-17 21:45:49 +05302# Copyright © 2020 Huawei
Sylvain Desbureauxd3114052021-02-23 16:45:52 +01003# Copyright © 2021 Orange
sanket12345148634b2024-02-23 13:26:42 +01004# Copyright © 2024 Deutsche Telekom Intellectual Property. All rights reserved.
egernugd3c55ab2023-01-19 15:50:37 +00005# Modifications Copyright © 2023 Nordix Foundation
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00006# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
21 nodePortPrefix: 302
22 nodePortPrefixExt: 304
Maciej Wereskidf9ba222021-11-05 14:38:18 +000023 centralizedLoggingEnabled: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000024 mariadbGalera:
Andreas Geissler2c1ba292024-01-10 22:20:05 +010025 # flag to enable the DB creation via mariadb-operator
26 useOperator: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000027 nameOverride: mariadb-galera
rope2524d3f3682020-09-02 20:49:21 +010028 servicePort: '3306'
Andreas Geissler576de2d2023-10-24 15:38:01 +020029 service: mariadb-galera
krishnaa9692b606b2020-10-30 11:29:21 +053030 internalPort: '3306'
Andreas Geissler22318b12024-01-19 15:47:29 +010031 # This flag allows SO to instantiate its own mariadb-galera cluster,
32 # serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000033 localCluster: false
Andreas Geissler22318b12024-01-19 15:47:29 +010034 # (optional) if localCluster=false and an external secret is used set this variable
35 #userRootSecret: <secretName>
jmacc4f04d32018-10-12 18:24:24 +000036 persistence:
37 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020038 #This configuration specifies Service and port for SDNC OAM interface
39 sdncOamService: sdnc-oam
40 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000041 #This configuration will run the migration. The configurations are for backing up the data
42 #from DB and then restoring it to the present versions preferred DB.
43 migration:
44 enabled: false
45 dbHost: mariadb-galera
46 dbPort: 3306
47 dbUser: root
48 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010049 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000050 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000051 app:
52 siteName: onapheat
53 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
54 defaultCloudOwner: onap
sekharhuawei2e799e92020-11-14 17:06:56 +053055
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010056readinessCheck:
57 wait_for:
Prabhjot Singh Sethi46e17562021-08-20 22:40:23 +053058 jobs:
59 - '{{ include "common.release" . }}-so-mariadb-config-job'
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010060
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010061#################################################################
62# Secrets metaconfig
63#################################################################
64secrets:
65 - uid: db-root-pass
66 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
67 type: password
Andreas Geissler2c1ba292024-01-10 22:20:05 +010068 # If we're using shared mariadb, we need to use the secret name (second
69 # part).
70 # If not, we do the same trick than for user db secret hat allows you
71 # override this secret using external one with the same field that is used
72 # to pass this to subchart.
73 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
Andreas Geissler22318b12024-01-19 15:47:29 +010074 ternary (( hasSuffix "so-db-root-pass" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
75 ternary
76 ""
77 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .)
78 )
79 ( (not (empty (default "" .Values.global.mariadbGalera.userRootSecret))) |
80 ternary
81 .Values.global.mariadbGalera.userRootSecret
82 (include "common.mariadb.secret.rootPassSecretName"
83 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)
84 )
85 ) }}'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010086 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
87 - uid: db-backup-creds
88 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
89 type: basicAuth
90 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
91 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
92 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
93 passwordPolicy: required
94 annotations:
95 helm.sh/hook: pre-upgrade,pre-install
rope2524d3f3682020-09-02 20:49:21 +010096 helm.sh/hook-weight: '0'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010097 helm.sh/hook-delete-policy: before-hook-creation
98 - uid: db-user-creds
99 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
100 type: basicAuth
101 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
102 login: '{{ .Values.dbCreds.userName }}'
103 password: '{{ .Values.dbCreds.userPassword }}'
104 passwordPolicy: generate
105 - uid: db-admin-creds
106 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
107 type: basicAuth
108 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
109 login: '{{ .Values.dbCreds.adminName }}'
110 password: '{{ .Values.dbCreds.adminPassword }}'
111 passwordPolicy: generate
sekharhuawei2e799e92020-11-14 17:06:56 +0530112 - uid: 'mso-key'
Priyadharshini7dc03852020-08-27 04:36:03 -0700113 name: &mso-key '{{ include "common.release" . }}-mso-key'
114 type: password
sekharhuawei2e799e92020-11-14 17:06:56 +0530115 password: '{{ .Values.mso.msoKey }}'
Priyadharshini7dc03852020-08-27 04:36:03 -0700116 - uid: mso-oof-auth
117 name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
118 type: basicAuth
119 login: '{{ .Values.mso.oof.login }}'
120 password: '{{ .Values.mso.oof.password }}'
121 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530122 - uid: server-actuator-creds
123 name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
124 type: basicAuth
125 externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
126 login: '{{ .Values.server.actuator.username }}'
127 password: '{{ .Values.server.actuator.password }}'
128 passwordPolicy: required
129 - uid: server-bpel-creds
130 name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
131 type: basicAuth
132 externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
133 login: '{{ .Values.server.bpel.username }}'
134 password: '{{ .Values.server.bpel.password }}'
135 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530136 - uid: so-aai-creds
137 name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
138 type: basicAuth
139 externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
140 login: '{{ .Values.server.aai.username }}'
141 password: '{{ .Values.server.aai.password }}'
142 passwordPolicy: required
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100143
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100144##################################################################
jmacc4f04d32018-10-12 18:24:24 +0000145# Application configuration defaults.
146#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100147
148dbSecrets: &dbSecrets
149 userCredsExternalSecret: *dbUserCredsSecretName
150 adminCredsExternalSecret: *dbAdminCredsSecretName
151
152# unused in this, just to pass to subcharts
153dbCreds:
154 userName: so_user
155 adminName: so_admin
156
Lukasz Rajewski743dca92023-06-12 07:28:58 +0000157image: onap/so/api-handler-infra:1.12.2
sekharhuawei2e799e92020-11-14 17:06:56 +0530158
159server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530160 aai:
161 username: aai@aai.onap.org
162 password: demo123456!
163 # aaiCredsExternalSecret: some secret
164 actuator:
165 username: mso_admin
166 password: password1$
167 # actuatorCredsExternalSecret: some secret
168 bpel:
169 username: bpel
170 password: password1$
171 # bpelCredsExternalSecret: some secret
172
jmacc4f04d32018-10-12 18:24:24 +0000173pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000174replicaCount: 1
175minReadySeconds: 10
seshukm0df1f8e2020-08-17 21:45:49 +0530176containerPort: &containerPort 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000177logPath: ./logs/apih/
178app: api-handler-infra
179service:
seshukm0df1f8e2020-08-17 21:45:49 +0530180 type: NodePort
seshukm0df1f8e2020-08-17 21:45:49 +0530181 internalPort: *containerPort
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100182 ports:
183 - name: http
184 port: *containerPort
185 nodePort: '77'
186 annotations:
187 msb.onap.org/service-info: |
188 {{ if .Values.global.msbEnabled -}}[
189 {
190 "serviceName": "so",
191 "version": "v1",
192 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
193 "protocol": "REST",
194 "port": "{{ .Values.service.internalPort }}",
195 "visualRange":"0",
196 "lb_policy":"ip_hash"
197 },
198 {
199 "serviceName": "so",
200 "version": "v1",
201 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
202 "protocol": "REST",
203 "port": "{{ .Values.service.internalPort }}",
204 "visualRange":"0",
205 "lb_policy":"ip_hash"
206 },
207 {
208 "serviceName": "so",
209 "version": "v1",
210 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
211 "protocol": "REST",
212 "port": "{{ .Values.service.internalPort }}",
213 "visualRange":"0",
214 "lb_policy":"ip_hash"
215 },
216 {
217 "serviceName": "so",
218 "version": "v1",
219 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
220 "protocol": "REST",
221 "port": "{{ .Values.service.internalPort }}",
222 "visualRange":"0",
223 "lb_policy":"ip_hash"
224 },
225 {
226 "serviceName": "so",
227 "version": "v1",
228 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
229 "protocol": "REST",
230 "port": "{{ .Values.service.internalPort }}",
231 "visualRange":"0",
232 "lb_policy":"ip_hash"
233 },
234 {
235 "serviceName": "so",
236 "version": "v1",
237 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
238 "protocol": "REST",
239 "port": "{{ .Values.service.internalPort }}",
240 "visualRange":"0",
241 "lb_policy":"ip_hash"
242 },
243 {
244 "serviceName": "so",
245 "version": "v1",
246 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
247 "protocol": "REST",
248 "port": "{{ .Values.service.internalPort }}",
249 "visualRange":"0",
250 "lb_policy":"ip_hash"
251 },
252 {
253 "serviceName": "so",
254 "version": "v1",
255 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
256 "protocol": "REST",
257 "port": "{{ .Values.service.internalPort }}",
258 "visualRange":"0",
259 "lb_policy":"ip_hash"
260 },
261 {
262 "serviceName": "so",
263 "version": "v1",
264 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
265 "protocol": "REST",
266 "port": "{{ .Values.service.internalPort }}",
267 "visualRange":"0",
268 "lb_policy":"ip_hash"
269 },
270 {
271 "serviceName": "so",
272 "version": "v1",
273 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
274 "protocol": "REST",
275 "port": "{{ .Values.service.internalPort }}",
276 "visualRange":"0",
277 "lb_policy":"ip_hash"
278 },
279 {
280 "serviceName": "so",
281 "version": "v1",
282 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
283 "protocol": "REST",
284 "port": "{{ .Values.service.internalPort }}",
285 "visualRange":"0",
286 "lb_policy":"ip_hash"
287 },
288 {
289 "serviceName": "so",
290 "version": "v1",
291 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
292 "protocol": "REST",
293 "port": "{{ .Values.service.internalPort }}",
294 "visualRange":"0",
295 "lb_policy":"ip_hash"
296 },
297 {
298 "serviceName": "so",
299 "version": "v1",
300 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
301 "protocol": "REST",
302 "port": "{{ .Values.service.internalPort }}",
303 "visualRange":"0",
304 "lb_policy":"ip_hash"
305 },
306 {
307 "serviceName": "so",
308 "version": "v1",
309 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
310 "protocol": "REST",
311 "port": "{{ .Values.service.internalPort }}",
312 "visualRange":"0",
313 "lb_policy":"ip_hash"
314 },
315 {
316 "serviceName": "so",
317 "version": "v1",
318 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
319 "protocol": "REST",
320 "port": "{{ .Values.service.internalPort }}",
321 "visualRange":"0",
322 "lb_policy":"ip_hash"
323 },
324 {
325 "serviceName": "so",
326 "version": "v1",
327 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
328 "protocol": "REST",
329 "port": "{{ .Values.service.internalPort }}",
330 "visualRange":"0",
331 "lb_policy":"ip_hash"
332 },
333 {
334 "serviceName": "so",
335 "version": "v1",
336 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
337 "protocol": "REST",
338 "port": "{{ .Values.service.internalPort }}",
339 "visualRange":"0",
340 "lb_policy":"ip_hash"
341 },
342 {
343 "serviceName": "so",
344 "version": "v1",
345 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
346 "protocol": "REST",
347 "port": "{{ .Values.service.internalPort }}",
348 "visualRange":"0",
349 "lb_policy":"ip_hash"
350 },
351 {
352 "serviceName": "so",
353 "version": "v1",
354 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
355 "protocol": "REST",
356 "port": "{{ .Values.service.internalPort }}",
357 "visualRange":"0",
358 "lb_policy":"ip_hash"
359 },
360 {
361 "serviceName": "so",
362 "version": "v1",
363 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
364 "protocol": "REST",
365 "port": "{{ .Values.service.internalPort }}",
366 "visualRange":"0",
367 "lb_policy":"ip_hash"
368 },
369 {
370 "serviceName": "so",
371 "version": "v1",
372 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
373 "protocol": "REST",
374 "port": "{{ .Values.service.internalPort }}",
375 "visualRange":"0",
376 "lb_policy":"ip_hash"
377 },
378 {
379 "serviceName": "so",
380 "version": "v1",
381 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
382 "protocol": "REST",
383 "port": "{{ .Values.service.internalPort }}",
384 "visualRange":"0",
385 "lb_policy":"ip_hash"
386 },
387 {
388 "serviceName": "so",
389 "version": "v1",
390 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
391 "protocol": "REST",
392 "port": "{{ .Values.service.internalPort }}",
393 "visualRange":"0",
394 "lb_policy":"ip_hash"
395 },
396 {
397 "serviceName": "so",
398 "version": "v1",
399 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
400 "protocol": "REST",
401 "port": "{{ .Values.service.internalPort }}",
402 "visualRange":"0",
403 "lb_policy":"ip_hash"
404 },
405 {
406 "serviceName": "so",
407 "version": "v1",
408 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
409 "protocol": "REST",
410 "port": "{{ .Values.service.internalPort }}",
411 "visualRange":"0",
412 "lb_policy":"ip_hash"
413 },
414 {
415 "serviceName": "so",
416 "version": "v1",
417 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
418 "protocol": "REST",
419 "port": "{{ .Values.service.internalPort }}",
420 "visualRange":"0",
421 "lb_policy":"ip_hash"
422 },
423 {
424 "serviceName": "so",
425 "version": "v1",
426 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
427 "protocol": "REST",
428 "port": "{{ .Values.service.internalPort }}",
429 "visualRange":"0",
430 "lb_policy":"ip_hash"
431 },
432 {
433 "serviceName": "so",
434 "version": "v1",
435 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
436 "protocol": "REST",
437 "port": "{{ .Values.service.internalPort }}",
438 "visualRange":"0",
439 "lb_policy":"ip_hash"
440 },
441 {
442 "serviceName": "so",
443 "version": "v1",
444 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
445 "protocol": "REST",
446 "port": "{{ .Values.service.internalPort }}",
447 "visualRange":"0",
448 "lb_policy":"ip_hash"
449 },
450 {
451 "serviceName": "so",
452 "version": "v1",
453 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
454 "protocol": "REST",
455 "port": "{{ .Values.service.internalPort }}",
456 "visualRange":"0",
457 "lb_policy":"ip_hash"
458 },
459 {
460 "serviceName": "so",
461 "version": "v1",
462 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
463 "protocol": "REST",
464 "port": "{{ .Values.service.internalPort }}",
465 "visualRange":"0",
466 "lb_policy":"ip_hash"
467 },
468 {
469 "serviceName": "so",
470 "version": "v1",
471 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
472 "protocol": "REST",
473 "port": "{{ .Values.service.internalPort }}",
474 "visualRange":"0",
475 "lb_policy":"ip_hash"
476 },
477 {
478 "serviceName": "so",
479 "version": "v1",
480 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
481 "protocol": "REST",
482 "port": "{{ .Values.service.internalPort }}",
483 "visualRange":"0",
484 "lb_policy":"ip_hash"
485 },
486 {
487 "serviceName": "so",
488 "version": "v1",
489 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
490 "protocol": "REST",
491 "port": "{{ .Values.service.internalPort }}",
492 "visualRange":"0",
493 "lb_policy":"ip_hash"
494 },
495 {
496 "serviceName": "so",
497 "version": "v1",
498 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
499 "protocol": "REST",
500 "port": "{{ .Values.service.internalPort }}",
501 "visualRange":"0",
502 "lb_policy":"ip_hash"
503 },
504 {
505 "serviceName": "so",
506 "version": "v1",
507 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
508 "protocol": "REST",
509 "port": "{{ .Values.service.internalPort }}",
510 "visualRange":"0",
511 "lb_policy":"ip_hash"
512 },
513 {
514 "serviceName": "so",
515 "version": "v1",
516 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
517 "protocol": "REST",
518 "port": "{{ .Values.service.internalPort }}",
519 "visualRange":"0",
520 "lb_policy":"ip_hash"
521 },
522 {
523 "serviceName": "so",
524 "version": "v1",
525 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
526 "protocol": "REST",
527 "port": "{{ .Values.service.internalPort }}",
528 "visualRange":"0",
529 "lb_policy":"ip_hash"
530 },
531 {
532 "serviceName": "so",
533 "version": "v1",
534 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
535 "protocol": "REST",
536 "port": "{{ .Values.service.internalPort }}",
537 "visualRange":"0",
538 "lb_policy":"ip_hash"
539 },
540 {
541 "serviceName": "so",
542 "version": "v1",
543 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
544 "protocol": "REST",
545 "port": "{{ .Values.service.internalPort }}",
546 "visualRange":"0",
547 "lb_policy":"ip_hash"
548 }
549 ]{{ end }}
550
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000551updateStrategy:
seshukm0df1f8e2020-08-17 21:45:49 +0530552 type: RollingUpdate
553 maxUnavailable: 1
554 maxSurge: 1
555
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100556################################################################
seshukm0df1f8e2020-08-17 21:45:49 +0530557# soHelpers part
558#################################################################
559soHelpers:
seshukm0df1f8e2020-08-17 21:45:49 +0530560 containerPort: *containerPort
561
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400562# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000563flavor: small
564# Segregation for Different environment (Small and Large)
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000565resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000566 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000567 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100568 cpu: "1"
569 memory: "4Gi"
vaibhav16dec0da88292018-08-13 06:10:27 +0000570 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100571 cpu: "0.5"
572 memory: "1Gi"
vaibhav16dec0da88292018-08-13 06:10:27 +0000573 large:
574 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100575 cpu: "2"
576 memory: "8Gi"
vaibhav16dec0da88292018-08-13 06:10:27 +0000577 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100578 cpu: "1"
579 memory: "2Gi"
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000580 unlimited: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000581
Mike Elliottd32d36e2018-02-12 15:54:03 -0500582nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500583affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000584
sunilb0a97ab22020-02-25 10:18:48 +0530585# application configuration
586config:
587 logstashServiceName: log-ls
588 logstashPort: 5044
Marcin Wilkad9b3762021-10-13 18:20:43 +0200589 # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
590 openStackKeystoneVersion: "KEYSTONE"
sunilb0a97ab22020-02-25 10:18:48 +0530591
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000592#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
593#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
594# --set so.global.mariadbGalera.localCluster=true \
595# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
596# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100597mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100598 rootUser:
599 externalSecret: *dbRootPassSecretName
600 nameOverride: &so-mariadb so-mariadb-galera
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000601 replicaCount: 1
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100602 service:
603 name: *so-mariadb
604 portName: *so-mariadb
605 internalPort: 3306
Andreas Geisslercfd84342023-08-16 17:18:49 +0200606 mariadbOperator:
607 galera:
608 enabled: false
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000609 persistence:
610 mountSubPath: so/mariadb-galera/data
611 enabled: true
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100612 serviceAccount:
613 nameOverride: *so-mariadb
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200614
615ingress:
616 enabled: false
617 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200618 - baseaddr: 'so-api'
rope2524d3f3682020-09-02 20:49:21 +0100619 name: 'so'
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200620 port: 8080
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000621
AndrewLambc58d4c22023-03-09 11:03:31 +0000622serviceMesh:
623 authorizationPolicy:
624 authorizedPrincipals:
625 - serviceAccount: consul-read
626 - serviceAccount: consul-server-read
627 - serviceAccount: nbi-read
AndrewLambab2704a2023-04-05 14:45:11 +0100628 - serviceAccount: policy-drools-pdp-read
629 - serviceAccount: so-bpmn-infra-read
630 - serviceAccount: robot-read
AndrewLambc58d4c22023-03-09 11:03:31 +0000631 - serviceAccount: istio-ingress
632 namespace: istio-ingress
633
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000634mso:
635 adapters:
636 requestDb:
637 auth: Basic YnBlbDpwYXNzd29yZDEk
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000638 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
sekharhuawei2e799e92020-11-14 17:06:56 +0530639 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000640 sdc:
641 client:
642 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
643 aai:
644 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
Priyadharshini7dc03852020-08-27 04:36:03 -0700645 oof:
646 login: test
647 password: testpwd
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000648 so:
649 operationalEnv:
650 dmaap:
651 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
652 health:
653 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100654
seshukm0df1f8e2020-08-17 21:45:49 +0530655so-bpmn-infra:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100656 mariadb-galera:
657 <<: *mariadbGalera
seshukm0df1f8e2020-08-17 21:45:49 +0530658 db:
659 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000660 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100661
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000662so-catalog-db-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530663 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100664 mariadb-galera:
665 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100666 db:
667 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100668
sekharhuawei2e799e92020-11-14 17:06:56 +0530669so-cnf-adapter:
670 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100671 mariadb-galera:
672 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530673 db:
674 <<: *dbSecrets
675 server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530676 aaiCredsExternalSecret: *aai-secrets
677 actuatorCredsExternalSecret: *actuator-secrets
678 mso:
679 msoKeySecret: *mso-key
680
egernugd3c55ab2023-01-19 15:50:37 +0000681so-cnfm-lcm:
682 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100683 mariadb-galera:
684 <<: *mariadbGalera
egernugd3c55ab2023-01-19 15:50:37 +0000685 db:
686 <<: *dbSecrets
687
AndrewLamb8e090442020-10-15 09:28:09 +0100688so-etsi-nfvo-ns-lcm:
689 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100690 mariadb-galera:
691 <<: *mariadbGalera
rope2524d3f3682020-09-02 20:49:21 +0100692 db:
693 <<: *dbSecrets
AndrewLamb8e090442020-10-15 09:28:09 +0100694
sekharhuawei2e799e92020-11-14 17:06:56 +0530695so-mariadb:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100696 mariadb-galera:
697 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530698 db:
699 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100700 #rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
Andreas Geissler22318b12024-01-19 15:47:29 +0100701 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
702 ternary (tpl .Values.db.rootPasswordExternalSecretLocalDb .)
703 ( (not (empty (default "" .Values.global.mariadbGalera.userRootSecret))) |
704 ternary
705 .Values.global.mariadbGalera.userRootSecret
706 (include "common.mariadb.secret.rootPassSecretName"
707 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)
708 )
709 ) }}'
sekharhuawei2e799e92020-11-14 17:06:56 +0530710 backupCredsExternalSecret: *dbBackupCredsSecretName
711 userCredsExternalSecret: *dbUserCredsSecretName
712 adminCredsExternalSecret: *dbAdminCredsSecretName
713
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100714so-admin-cockpit:
seshukm0df1f8e2020-08-17 21:45:49 +0530715 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100716 mariadb-galera:
717 <<: *mariadbGalera
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100718 db:
719 <<: *dbSecrets
720
sekharhuawei2e799e92020-11-14 17:06:56 +0530721so-nssmf-adapter:
722 enabled: true
723 server:
724 actuatorCredsExternalSecret: *actuator-secrets
725 bpelCredsExternalSecret: *bpel-secrets
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100726 mariadb-galera:
727 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530728 db:
729 <<: *dbSecrets
730
731so-oof-adapter:
732 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100733 mariadb-galera:
734 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530735 db:
736 <<: *dbSecrets
737 mso:
738 msoKeySecret: *mso-key
739 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
740 oof:
741 authSecret: *mso-oof-auth
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000742 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
sekharhuawei2e799e92020-11-14 17:06:56 +0530743
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000744so-openstack-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530745 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100746 mariadb-galera:
747 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100748 db:
749 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000750 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100751
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000752so-request-db-adapter:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100753 mariadb-galera:
754 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100755 db:
756 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100757
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000758so-sdc-controller:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100759 mariadb-galera:
760 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100761 db:
762 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000763 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100764
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000765so-sdnc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530766 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100767 mariadb-galera:
768 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100769 db:
770 <<: *dbSecrets
seshukm610d97d2021-03-19 02:57:36 +0530771 mso:
772 msoKeySecret: *mso-key
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000773 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100774
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100775so-ve-vnfm-adapter:
Sylvain Desbureaux28d56562020-11-02 17:54:05 +0100776 enabled: false
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100777
seshukm87ccd872021-03-30 21:45:16 +0530778so-etsi-sol005-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530779 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100780 mariadb-galera:
781 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100782 db:
783 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100784
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100785so-etsi-sol003-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530786 enabled: true
farida azmy87f46222021-04-06 15:25:15 +0200787
788#Pods Service Account
789serviceAccount:
790 nameOverride: so
791 roles:
792 - read
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000793
794#Log configuration
795log:
796 path: /var/log/onap