blob: 2b01a0ba1f2441fecf1a2cf6466eee0adf4c56c5 [file] [log] [blame]
Alexander Dehn9b797d62020-04-21 09:53:50 +00001# Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01003# Copyright © 2021 Nokia
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
jmac065e2ce2018-03-29 01:18:02 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
21 nodePortPrefix: 302
jmac0e4f7172018-09-07 18:06:43 +000022 nodePortPrefixExt: 304
jmac065e2ce2018-03-29 01:18:02 +000023 persistence:
24 mountPath: /dockerdata-nfs
Maciej Wereski537d71e2021-11-03 13:31:44 +000025 centralizedLoggingEnabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010026 mariadbGalera:
27 #This flag allows SO to instantiate its own mariadb-galera cluster
28 #If shared instance is used, this chart assumes that DB already exists
29 localCluster: false
Andreas Geissler576de2d2023-10-24 15:38:01 +020030 service: &mariadbService mariadb-galera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010031 internalPort: 3306
Andreas Geisslercfd84342023-08-16 17:18:49 +020032 nameOverride: &mariadbName mariadb-galera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010033
demskeq83166b222023-04-26 10:27:00 +020034
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010035#################################################################
36# Secrets metaconfig
37#################################################################
38secrets:
39 - uid: db-root-password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010040 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010041 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010042 # If we're using shared mariadb, we need to use the secret name (second
43 # part).
44 # If not, we do the same trick than for user db secret hat allows you
45 # override this secret using external one with the same field that is used
46 # to pass this to subchart.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010047 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010048 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
49 ternary
50 ""
51 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
52 (include "common.mariadb.secret.rootPassSecretName"
53 (dict "dot" .
54 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
55 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010056 - uid: db-secret
57 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
58 type: basicAuth
59 # This is a nasty trick that allows you override this secret using external one
60 # with the same field that is used to pass this to subchart
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010061 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
62 ternary
63 ""
64 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
65 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
66 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010067 - uid: odl-creds
68 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
69 type: basicAuth
70 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
71 login: '{{ .Values.config.odlUser }}'
72 password: '{{ .Values.config.odlPassword }}'
73 # For now this is left hardcoded but should be revisited in a future
74 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010075 - uid: netbox-apikey
76 type: password
77 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
78 password: '{{ .Values.config.netboxApikey }}'
79 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -050080 - uid: aai-truststore-password
81 type: password
82 externalSecret: '{{ .Values.config.aaiTruststoreExternalSecret }}'
83 password: '{{ .Values.config.aaiTruststorePassword }}'
84 passwordPolicy: required
85 - uid: ansible-truststore-password
86 type: password
87 externalSecret: '{{ .Values.config.ansibleTruststoreExternalSecret }}'
88 password: '{{ .Values.config.ansibleTruststorePassword }}'
89 passwordPolicy: required
90 - uid: truststore-password
91 type: password
92 externalSecret: '{{ .Values.config.truststoreExternalSecret }}'
93 password: '{{ .Values.config.truststorePassword }}'
94 passwordPolicy: required
95 - uid: keystore-password
96 type: password
97 externalSecret: '{{ .Values.config.keystoreExternalSecret }}'
98 password: '{{ .Values.config.keystorePassword }}'
99 passwordPolicy: required
100 - uid: dmaap-authkey
101 type: password
102 externalSecret: '{{ .Values.config.dmaapAuthKeyExternalSecret }}'
103 password: '{{ .Values.config.dmaapAuthKey }}'
104 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100105 - uid: aai-user-creds
106 type: basicAuth
107 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
108 login: '{{ .Values.config.aaiUser }}'
109 password: '{{ .Values.config.aaiPassword }}'
110 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -0500111 - uid: so-user-creds
112 type: basicAuth
113 externalSecret: '{{ .Values.config.soCredsExternalSecret}}'
114 login: '{{ .Values.config.soUser }}'
115 password: '{{ .Values.config.soPassword }}'
116 passwordPolicy: required
117 - uid: neng-user-creds
118 type: basicAuth
119 externalSecret: '{{ .Values.config.nengCredsExternalSecret}}'
120 login: '{{ .Values.config.nengUser }}'
121 password: '{{ .Values.config.nengPassword }}'
122 passwordPolicy: required
123 - uid: cds-user-creds
124 type: basicAuth
125 externalSecret: '{{ .Values.config.cdsCredsExternalSecret}}'
126 login: '{{ .Values.config.cdsUser }}'
127 password: '{{ .Values.config.cdsPassword }}'
128 passwordPolicy: required
129 - uid: honeycomb-user-creds
130 type: basicAuth
131 externalSecret: '{{ .Values.config.honeycombCredsExternalSecret}}'
132 login: '{{ .Values.config.honeycombUser }}'
133 password: '{{ .Values.config.honeycombPassword }}'
134 passwordPolicy: required
135 - uid: dmaap-user-creds
136 type: basicAuth
137 externalSecret: '{{ .Values.config.dmaapCredsExternalSecret}}'
138 login: '{{ .Values.config.dmaapUser }}'
139 password: '{{ .Values.config.dmaapPassword }}'
140 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100141 - uid: modeling-user-creds
142 type: basicAuth
143 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
144 login: '{{ .Values.config.modelingUser }}'
145 password: '{{ .Values.config.modelingPassword }}'
146 passwordPolicy: required
147 - uid: restconf-creds
148 type: basicAuth
149 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
150 login: '{{ .Values.config.restconfUser }}'
151 password: '{{ .Values.config.restconfPassword }}'
152 passwordPolicy: required
153 - uid: ansible-creds
154 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
155 type: basicAuth
156 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
157 login: '{{ .Values.config.ansibleUser }}'
158 password: '{{ .Values.config.ansiblePassword }}'
159 passwordPolicy: required
160 - uid: scaleout-creds
161 type: basicAuth
162 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
163 login: '{{ .Values.config.scaleoutUser }}'
164 password: '{{ .Values.config.scaleoutPassword }}'
165 passwordPolicy: required
demskeq8b43e92c2021-02-12 15:43:48 +0100166 - uid: oauth-token-secret
167 type: password
168 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.tokenExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
169 password: '{{ .Values.config.sdnr.oauth.tokenSecret }}'
170 passwordPolicy: required
171 - uid: keycloak-secret
172 type: password
173 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.providersSecrets.keycloakExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
174 password: '{{ .Values.config.sdnr.oauth.providersSecrets.keycloak }}'
175 passwordPolicy: required
sebdetb205f402021-10-20 12:16:02 +0200176 - uid: ves-collector-secret
177 type: basicAuth
178 login: '{{ .Values.config.sdnr.vesCollector.username }}'
179 password: '{{ .Values.config.sdnr.vesCollector.password }}'
demskeq84e1f84c2023-07-04 08:39:43 +0000180 - uid: sdnrdb-secret
181 name: &sdnrdbSecretName '{{ include "common.release" . }}-sdnc-sdnrdb-secret'
182 type: basicAuth
183 login: '{{ index .Values "config" "sdnr" "mariadb" "user" }}'
184 password: '{{ index .Values "config" "sdnr" "mariadb" "password" }}'
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100185#################################################################
186# Certificates
187#################################################################
188certificates:
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100189 - mountPath: /var/custom-certs
190 commonName: sdnc.simpledemo.onap.org
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100191 dnsNames:
192 - sdnc.simpledemo.onap.org
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100193 keystore:
194 outputType:
195 - jks
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100196 passwordSecretRef:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100197 create: true
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100198 name: sdnc-cmpv2-keystore-password
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100199 key: password
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100200 issuer:
201 group: certmanager.onap.org
202 kind: CMPv2Issuer
203 name: cmpv2-issuer-onap
jmac065e2ce2018-03-29 01:18:02 +0000204#################################################################
205# Application configuration defaults.
206#################################################################
207# application images
Alexander Dehn238450f2020-10-27 13:03:53 +0000208
jmac065e2ce2018-03-29 01:18:02 +0000209pullPolicy: Always
Dan Timoneyc6144822023-04-27 10:17:20 -0400210image: onap/sdnc-image:2.5.5
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400211
jmac065e2ce2018-03-29 01:18:02 +0000212# flag to enable debugging - application support required
213debugEnabled: false
214
215# application configuration
BorislavG5f3b6192018-03-25 18:12:38 +0300216config:
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400217 odlUid: 100
218 odlGid: 101
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100219 odlUser: admin
jmaca68f4cb2018-05-10 22:44:19 +0000220 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100221 # odlCredsExternalSecret: some secret
222 netboxApikey: onceuponatimeiplayedwithnetbox20180814
223 # netboxApikeyExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500224 aaiTruststorePassword: changeit
225 # aaiTruststoreExternalSecret: some secret
226 ansibleTruststorePassword: changeit
227 # ansibleTruststoreExternalSecret: some secret
228 truststorePassword: adminadmin
229 # truststoreExternalSecret: some secret
230 keystorePassword: adminadmin
231 # keystoreExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100232 aaiUser: sdnc@sdnc.onap.org
233 aaiPassword: demo123456!
234 # aaiCredsExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500235 soUser: sdncaBpmn
236 soPassword: password1$
237 # soCredsExternalSecret: some secret
238 nengUser: ccsdkapps
239 nengPassword: ccsdkapps
240 # nengCredsExternalSecret: some secret
241 cdsUser: ccsdkapps
242 cdsPassword: ccsdkapps
243 # cdsCredsExternalSecret: some secret
244 honeycombUser: admin
245 honeycombPassword: admin
246 # honeycombCredsExternalSecret: some secret
247 dmaapUser: admin
248 dmaapPassword: admin
249 dmaapAuthKey: "fs20cKwalJ6ry4kX:7Hqm6BDZK47IKxGRkOPFk33qMYs="
250 # dmaapCredsExternalSecret: some secret
251 # dmaapAuthKeyExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100252 modelingUser: ccsdkapps
253 modelingPassword: ccsdkapps
254 # modelingCredsExternalSecret: some secret
255 restconfUser: admin
256 restconfPassword: admin
257 # restconfCredsExternalSecret: some secret
258 scaleoutUser: admin
259 scaleoutPassword: admin
260 # scaleoutExternalSecret: some secret
261 ansibleUser: sdnc
262 ansiblePassword: sdnc
263 # ansibleCredsExternalSecret: some secret
sebdetb205f402021-10-20 12:16:02 +0200264
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100265 dbSdnctlDatabase: &sdncDbName sdnctl
jmac065e2ce2018-03-29 01:18:02 +0000266 enableClustering: true
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400267 sdncHome: /opt/onap/sdnc
jmaca68f4cb2018-05-10 22:44:19 +0000268 binDir: /opt/onap/sdnc/bin
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400269 etcDir: /opt/onap/sdnc/data
Trevor Tait567ff1e2018-05-01 16:20:54 -0400270 geoEnabled: false
Neha Jain7b0d6c62018-05-17 14:34:49 -0400271# if geoEnabled is set to true here, mysql.geoEnabled must be set to true
Trevor Tait567ff1e2018-05-01 16:20:54 -0400272# if geoEnabled is set to true the following 3 values must be set to their proper values
273 myODLCluster: 127.0.0.1
274 peerODLCluster: 127.0.0.1
Mohammadreza Pasandidehb642ee52018-06-19 15:19:53 -0400275 isPrimaryCluster: true
jmac065e2ce2018-03-29 01:18:02 +0000276 configDir: /opt/onap/sdnc/data/properties
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200277 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
jmac065e2ce2018-03-29 01:18:02 +0000278 dmaapTopic: SUCCESS
jmaca68f4cb2018-05-10 22:44:19 +0000279 dmaapPort: 3904
BorislavG5f3b6192018-03-25 18:12:38 +0300280 logstashServiceName: log-ls
281 logstashPort: 5044
jmac7c434672018-05-11 20:14:17 +0000282 ansibleServiceName: sdnc-ansible-server
283 ansiblePort: 8000
Dan Timoneya98765b2020-09-14 11:57:55 -0400284 javaHome: /opt/java/openjdk
jmac7c434672018-05-11 20:14:17 +0000285
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400286 odl:
287 etcDir: /opt/opendaylight/etc
288 binDir: /opt/opendaylight/bin
Dan Timoneya98765b2020-09-14 11:57:55 -0400289 gcLogDir: /opt/opendaylight/data/log
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400290 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
Dan Timoney9520e7c2021-01-12 11:10:58 -0500291 salConfigVersion: 1.10.4
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400292 akka:
293 seedNodeTimeout: 15s
294 circuitBreaker:
295 maxFailures: 10
296 callTimeout: 90s
297 resetTimeout: 30s
298 recoveryEventTimeout: 90s
299 datastore:
300 persistentActorRestartMinBackoffInSeconds: 10
301 persistentActorRestartMaxBackoffInSeconds: 40
302 persistentActorRestartResetBackoffInSeconds: 20
303 shardTransactionCommitTimeoutInSeconds: 120
304 shardIsolatedLeaderCheckIntervalInMillis: 30000
305 operationTimeoutInSeconds: 120
306 javaOptions:
307 maxGCPauseMillis: 100
308 parallelGCThreads : 3
Dan Timoneya98765b2020-09-14 11:57:55 -0400309 numberGCLogFiles: 10
310 minMemory: 512m
311 maxMemory: 2048m
312 gcLogOptions: ""
313 # Next line enables gc logging
314 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000315 # enables sdnr functionality
316 sdnr:
Alexander Dehn5c1105e2020-09-14 20:55:56 +0000317 enabled: true
Alexander Dehn9b797d62020-04-21 09:53:50 +0000318 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
319 # mode: dm - SDNC contains sdnr device manager + ODLUX components
320 mode: dm
321 # sdnronly: true starts sdnc container with odl and sdnrwt features only
322 sdnronly: false
323 sdnrdbTrustAllCerts: true
demskeq84e1f84c2023-07-04 08:39:43 +0000324 elasticsearch:
325 ## for legacy eleasticsearch database
Andreas Geisslercfd84342023-08-16 17:18:49 +0200326 enabled: &esdbenabled true
327 # enabled: &esdbenabled false
demskeq84e1f84c2023-07-04 08:39:43 +0000328 mariadb:
329 ## for legacy eleasticsearch database
Andreas Geisslercfd84342023-08-16 17:18:49 +0200330 enabled: false
331 # enabled: true
demskeq84e1f84c2023-07-04 08:39:43 +0000332 databaseName: sdnrdb
333 user: sdnrdb
334 externalSecret: *sdnrdbSecretName
335 asyncHandling: true
336 asyncPoolSize: 200
demskeq83166b222023-04-26 10:27:00 +0200337 kafka:
338 enabled: false
339 consumerGroupPrefix: &consumerGroupPrefix sdnr
340 # Strimzi KafkaUser config see configuration below
341 kafkaUser: &kafkaUser
342 acls:
343 - name: unauthenticated.SEC_
344 type: topic
345 patternType: prefix
346 operations: [Read]
347 - name: unauthenticated.VES_PNFREG_OUTPUT
348 type: topic
349 patternType: literal
350 operations: [Read]
351 - name: *consumerGroupPrefix
352 type: group
353 patternType: prefix
354 operations: [Read]
355 ## set if bootstrap server is not OOM standard
356 # bootstrapServers: []
357 ## set connection parameters if not default
358 # securityProtocol: PLAINTEXT
359 # saslMechanism: SCRAM-SHA-512
360 ## saslJassConfig: provided by secret
361
362
Alexander Dehn9b797d62020-04-21 09:53:50 +0000363 mountpointStateProviderEnabled: false
demskeq827854662021-04-08 14:49:47 +0200364 netconfCallHome:
365 enabled: true
demskeq83166b222023-04-26 10:27:00 +0200366
367
demskeq8b43e92c2021-02-12 15:43:48 +0100368 oauth:
369 enabled: false
370 tokenIssuer: ONAP SDNC
371 tokenSecret: secret
372 supportOdlusers: true
373 redirectUri: null
374 publicUrl: none
375 odluxRbac:
376 enabled: true
377 # example definition for a oauth provider
378 providersSecrets:
379 keycloak: d8d7ed52-0691-4353-9ac6-5383e72e9c46
380 providers:
381 - id: keycloak
382 type: KEYCLOAK
383 host: http://keycloak:8080
384 clientId: odlux.app
385 secret: ${KEYCLOAK_SECRET}
386 scope: openid
387 title: ONAP Keycloak Provider
388 roleMapping:
389 mykeycloak: admin
sebdetb205f402021-10-20 12:16:02 +0200390 vesCollector:
391 enabled: false
392 tls:
393 enabled: true
394 trustAllCertificates: false
395 username: sample1
396 password: sample1
397 address: dcae-ves-collector.onap
Andreas Geissler2af50792023-03-27 17:11:27 +0200398 port: 8080
sebdetb205f402021-10-20 12:16:02 +0200399 version: v7
400 reportingEntityName: ONAP SDN-R
401 eventLogMsgDetail: SHORT
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400402
demskeq83166b222023-04-26 10:27:00 +0200403# Strimzi KafkaUser/Topic config on top level
404kafkaUser: *kafkaUser
405
406
jmac065e2ce2018-03-29 01:18:02 +0000407# dependency / sub-chart configuration
Alexander Dehn9b797d62020-04-21 09:53:50 +0000408network-name-gen:
409 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100410mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100411 nameOverride: &sdnc-db sdnc-db
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100412 config: &mariadbGaleraConfig
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100413 rootPasswordExternalSecret: *rootDbSecret
414 userName: &dbUser sdnctl
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100415 userCredentialsExternalSecret: *dbSecretName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100416 rootUser:
417 externalSecret: *rootDbSecret
418 db:
419 user: *dbUser
420 externalSecret: *dbSecretName
jmac065e2ce2018-03-29 01:18:02 +0000421 service:
demskeq84e1f84c2023-07-04 08:39:43 +0000422 name: sdnc-db
jmac065e2ce2018-03-29 01:18:02 +0000423 sdnctlPrefix: sdnc
424 persistence:
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000425 mountSubPath: sdnc/mariadb-galera
jmac065e2ce2018-03-29 01:18:02 +0000426 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000427 replicaCount: 1
Andreas Geisslercfd84342023-08-16 17:18:49 +0200428 mariadbOperator:
429 galera:
430 enabled: false
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100431 serviceAccount:
432 nameOverride: *sdnc-db
jmac065e2ce2018-03-29 01:18:02 +0000433
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100434cds:
435 enabled: false
436
437dmaap-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000438 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100439 nameOverride: sdnc-dmaap-listener
440 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100441 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100442 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100443 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100444 mysqlDatabase: *sdncDbName
445 config:
446 sdncChartName: sdnc
447 dmaapPort: 3904
448 sdncPort: 8282
449 configDir: /opt/onap/sdnc/data/properties
450 odlCredsExternalSecret: *odlCredsSecretName
451
452ueb-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000453 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100454 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100455 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100456 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100457 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100458 mysqlDatabase: *sdncDbName
459 nameOverride: sdnc-ueb-listener
460 config:
461 sdncPort: 8282
462 sdncChartName: sdnc
463 configDir: /opt/onap/sdnc/data/properties
464 odlCredsExternalSecret: *odlCredsSecretName
465
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100466sdnc-ansible-server:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000467 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100468 config:
469 restCredsExternalSecret: *ansibleSecretName
470 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100471 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100472 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100473 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100474 mysqlDatabase: ansible
475 service:
476 name: sdnc-ansible-server
477 internalPort: 8000
478
jmac065e2ce2018-03-29 01:18:02 +0000479dgbuilder:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000480 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000481 nameOverride: sdnc-dgbuilder
482 config:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100483 db:
484 dbName: *sdncDbName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100485 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
486 ternary
487 (printf "%s-sdnc-db-root-password" (include "common.release" .))
488 (include "common.mariadb.secret.rootPassSecretName"
489 (dict "dot" . "chartName" "mariadb-galera")) }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100490 userCredentialsExternalSecret: *dbSecretName
Andreas Geisslercfd84342023-08-16 17:18:49 +0200491 dbPodName: *mariadbName
492 dbServiceName: *mariadbService
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100493 # This should be revisited and changed to plain text
jmac70863e12018-05-16 14:53:03 +0000494 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
farida azmydc9aef02021-04-07 17:07:09 +0200495 serviceAccount:
496 nameOverride: sdnc-dgbuilder
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100497 mariadb-galera:
jmac065e2ce2018-03-29 01:18:02 +0000498 service:
BorislavG1ffbd992018-04-24 07:56:27 +0000499 name: sdnc-dgbuilder
Andreas Geissler2af50792023-03-27 17:11:27 +0200500 ports:
501 - name: http
502 port: 3100
demskeq895bf73a2023-05-09 12:31:07 +0000503 nodePort: "03"
jmac065e2ce2018-03-29 01:18:02 +0000504
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200505 ingress:
506 enabled: false
507 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200508 - baseaddr: "sdnc-dgbuilder-ui"
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200509 name: "sdnc-dgbuilder"
Andreas Geissler1b174e52023-04-13 16:50:23 +0200510 port: 3100
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200511 config:
512 ssl: "redirect"
513
Alexander Dehn9b797d62020-04-21 09:53:50 +0000514
515
Alexander Dehnab86ec12020-02-05 14:38:54 +0000516# local elasticsearch cluster
517localElasticCluster: true
518elasticsearch:
demskeq84e1f84c2023-07-04 08:39:43 +0000519 enabled: *esdbenabled
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100520 nameOverride: &elasticSearchName sdnrdb
Alexander Dehnab86ec12020-02-05 14:38:54 +0000521 name: sdnrdb-cluster
Alexander Dehnab86ec12020-02-05 14:38:54 +0000522 service:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100523 name: *elasticSearchName
Alexander Dehnab86ec12020-02-05 14:38:54 +0000524 master:
525 replicaCount: 3
526 # dedicatednode: "yes"
527 # working as master node only, in this case increase replicaCount for elasticsearch-data
528 # dedicatednode: "no"
529 # handles master and data node functionality
530 dedicatednode: "no"
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100531 nameOverride: *elasticSearchName
demskeq8eb56da72021-02-19 12:11:48 +0100532 cluster_name: sdnrdb-cluster
sebdetb205f402021-10-20 12:16:02 +0200533
Alexander Dehn9b797d62020-04-21 09:53:50 +0000534# enable
535sdnc-web:
Alexander Dehn8789a722020-10-16 14:29:05 +0000536 enabled: true
demskeq895bf73a2023-05-09 12:31:07 +0000537 ## set if web socket port should not be default
538 # sdnrWebsocketPort: *sdnrWebsocketPort
jmac065e2ce2018-03-29 01:18:02 +0000539# default number of instances
540replicaCount: 1
541
542nodeSelector: {}
543
544affinity: {}
545
546# probe configuration parameters
547liveness:
548 initialDelaySeconds: 10
549 periodSeconds: 10
550 # necessary to disable liveness probe when setting breakpoints
551 # in debugger so K8s doesn't restart unresponsive container
552 enabled: true
553
554readiness:
555 initialDelaySeconds: 10
556 periodSeconds: 10
557
558service:
559 type: NodePort
560 name: sdnc
Radoslaw Chmiel58662a32022-06-02 19:37:35 +0200561 portName: http
jmac065e2ce2018-03-29 01:18:02 +0000562 internalPort: 8181
563 internalPort2: 8101
564 internalPort3: 8080
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400565
jmac065e2ce2018-03-29 01:18:02 +0000566 #port
567 externalPort: 8282
jmac065e2ce2018-03-29 01:18:02 +0000568
569 externalPort2: 8202
jmac065e2ce2018-03-29 01:18:02 +0000570
571 externalPort3: 8280
jmac065e2ce2018-03-29 01:18:02 +0000572
jmaca68f4cb2018-05-10 22:44:19 +0000573 nodePort4: 67
574
jmac065e2ce2018-03-29 01:18:02 +0000575 clusterPort: 2550
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400576 clusterPort2: 2650
577 clusterPort3: 2681
578
579 geoNodePort1: 61
580 geoNodePort2: 62
581 geoNodePort3: 63
582 geoNodePort4: 64
583 geoNodePort5: 65
584 geoNodePort6: 66
jmac065e2ce2018-03-29 01:18:02 +0000585
Andreas Geissler2af50792023-03-27 17:11:27 +0200586 callHomePort: &chport 4334
demskeq827854662021-04-08 14:49:47 +0200587 callHomeNodePort: 66
demskeq895bf73a2023-05-09 12:31:07 +0000588 ## set if web socket port should not be default
589 ## change in sdnc-web section as well
590 # sdnrWebsocketPort: &sdnrWebsocketPort 8182
591
demskeq827854662021-04-08 14:49:47 +0200592
jmac8d6dc962018-04-26 14:26:55 +0000593## Persist data to a persitent volume
594persistence:
595 enabled: true
596
597 ## A manually managed Persistent Volume and Claim
598 ## Requires persistence.enabled: true
599 ## If defined, PVC must be created manually before volume will be bound
600 # existingClaim:
601 volumeReclaimPolicy: Retain
602
603 ## database data Persistent Volume Storage Class
604 ## If defined, storageClassName: <storageClass>
605 ## If set to "-", storageClassName: "", which disables dynamic provisioning
606 ## If undefined (the default) or set to null, no storageClassName spec is
607 ## set, choosing the default provisioner. (gp2 on AWS, standard on
608 ## GKE, AWS & OpenStack)
609 accessMode: ReadWriteOnce
610 size: 1Gi
611 mountPath: /dockerdata-nfs
612 mountSubPath: sdnc/mdsal
Dan Timoney2ee28a52021-01-15 16:39:50 -0500613 mdsalPath: /opt/opendaylight/mdsal
demskeq8a86300a2021-02-10 09:53:33 +0100614 daeximPath: /opt/opendaylight/mdsal/daexim
Satoshi Fujii31b8b432021-08-28 12:12:36 +0000615 journalPath: /opt/opendaylight/segmented-journal
Dan Timoney2ee28a52021-01-15 16:39:50 -0500616 snapshotsPath: /opt/opendaylight/snapshots
jmac8d6dc962018-04-26 14:26:55 +0000617
jmac065e2ce2018-03-29 01:18:02 +0000618ingress:
619 enabled: false
Lucjan Bryndza08448402019-11-27 14:26:54 +0100620 service:
Andreas Geissler2af50792023-03-27 17:11:27 +0200621 - baseaddr: "sdnc-api"
622 name: "sdnc"
623 port: 8282
624 - baseaddr: "sdnc-callhome"
Andreas Geissler1b174e52023-04-13 16:50:23 +0200625 name: "sdnc-callhome"
Andreas Geissler2af50792023-03-27 17:11:27 +0200626 port: *chport
627 protocol: tcp
628 exposedPort: *chport
629 exposedProtocol: TCP
Lucjan Bryndza08448402019-11-27 14:26:54 +0100630 config:
631 ssl: "redirect"
jmac065e2ce2018-03-29 01:18:02 +0000632
AndrewLamb7709c172023-05-12 15:37:14 +0100633serviceMesh:
634 authorizationPolicy:
635 authorizedPrincipals:
636 - serviceAccount: a1policymanagement-read
637 - serviceAccount: cds-blueprints-processor-read
638 - serviceAccount: consul-read
639 - serviceAccount: ncmp-dmi-plugin-read
640 - serviceAccount: policy-drools-pdp-read
641 - serviceAccount: robot-read
642 - serviceAccount: sdnc-ansible-server-read
643 - serviceAccount: sdnc-dmaap-listener-read
644 - serviceAccount: sdnc-prom-read
645 - serviceAccount: sdnc-ueb-listener-read
646 - serviceAccount: sdnc-web-read
647 - serviceAccount: so-sdnc-adapter-read
648 - serviceAccount: istio-ingress
649 namespace: istio-ingress
650 authorizedPrincipalsSdnHosts:
651 - serviceAccount: sdnc-read
652
toshrajbhardwaj72b5f0f2018-09-13 02:45:22 +0000653#Resource Limit flavor -By Default using small
654flavor: small
655#segregation for different envionment (Small and Large)
656
657resources:
Mandeep Khindade045712018-09-19 18:11:57 +0000658 small:
659 limits:
vladimir turokdb8167b2023-09-20 11:09:21 +0200660 cpu: 2
Andreas Geissler555db9c2023-06-20 11:38:39 +0200661 memory: 4.7Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000662 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000663 cpu: 1
Andreas Geissler555db9c2023-06-20 11:38:39 +0200664 memory: 4.7Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000665 large:
666 limits:
vladimir turokdb8167b2023-09-20 11:09:21 +0200667 cpu: 4
Andreas Geissler555db9c2023-06-20 11:38:39 +0200668 memory: 9.4Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000669 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000670 cpu: 2
Andreas Geissler555db9c2023-06-20 11:38:39 +0200671 memory: 9.4Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000672 unlimited: {}
farida azmy32c5ed82021-08-04 14:46:09 +0200673
674#Pods Service Account
675serviceAccount:
676 nameOverride: sdnc
677 roles:
678 - read
Maciej Wereski537d71e2021-11-03 13:31:44 +0000679
680#Log configuration
681log:
682 path: /var/log/onap