blob: 229decdf383a563645a55c4c913eb8cc921308c7 [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
seshukm0df1f8e2020-08-17 21:45:49 +05302# Copyright © 2020 Huawei
Sylvain Desbureauxd3114052021-02-23 16:45:52 +01003# Copyright © 2021 Orange
egernugd3c55ab2023-01-19 15:50:37 +00004# Modifications Copyright © 2023 Nordix Foundation
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00005# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000016#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
21 nodePortPrefixExt: 304
Maciej Wereskidf9ba222021-11-05 14:38:18 +000022 centralizedLoggingEnabled: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000023 mariadbGalera:
Andreas Geissler2c1ba292024-01-10 22:20:05 +010024 # flag to enable the DB creation via mariadb-operator
25 useOperator: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000026 nameOverride: mariadb-galera
rope2524d3f3682020-09-02 20:49:21 +010027 servicePort: '3306'
Andreas Geissler576de2d2023-10-24 15:38:01 +020028 service: mariadb-galera
krishnaa9692b606b2020-10-30 11:29:21 +053029 internalPort: '3306'
sarada prasad sahooae2c7342019-07-10 14:40:12 +053030 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000031 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
32 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000033 persistence:
34 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020035 #This configuration specifies Service and port for SDNC OAM interface
36 sdncOamService: sdnc-oam
37 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000038 #This configuration will run the migration. The configurations are for backing up the data
39 #from DB and then restoring it to the present versions preferred DB.
40 migration:
41 enabled: false
42 dbHost: mariadb-galera
43 dbPort: 3306
44 dbUser: root
45 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010046 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000047 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000048 app:
49 siteName: onapheat
50 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
51 defaultCloudOwner: onap
sekharhuawei2e799e92020-11-14 17:06:56 +053052
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010053readinessCheck:
54 wait_for:
Prabhjot Singh Sethi46e17562021-08-20 22:40:23 +053055 jobs:
56 - '{{ include "common.release" . }}-so-mariadb-config-job'
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010057
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010058#################################################################
59# Secrets metaconfig
60#################################################################
61secrets:
62 - uid: db-root-pass
63 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
64 type: password
Andreas Geissler2c1ba292024-01-10 22:20:05 +010065 # If we're using shared mariadb, we need to use the secret name (second
66 # part).
67 # If not, we do the same trick than for user db secret hat allows you
68 # override this secret using external one with the same field that is used
69 # to pass this to subchart.
70 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
71 ternary ((hasSuffix "so-db-root-pass" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
72 ternary
73 ""
74 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
75 (include "common.mariadb.secret.rootPassSecretName"
76 (dict "dot" .
77 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010078 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
79 - uid: db-backup-creds
80 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
81 type: basicAuth
82 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
83 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
84 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
85 passwordPolicy: required
86 annotations:
87 helm.sh/hook: pre-upgrade,pre-install
rope2524d3f3682020-09-02 20:49:21 +010088 helm.sh/hook-weight: '0'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010089 helm.sh/hook-delete-policy: before-hook-creation
90 - uid: db-user-creds
91 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
92 type: basicAuth
93 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
94 login: '{{ .Values.dbCreds.userName }}'
95 password: '{{ .Values.dbCreds.userPassword }}'
96 passwordPolicy: generate
97 - uid: db-admin-creds
98 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
99 type: basicAuth
100 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
101 login: '{{ .Values.dbCreds.adminName }}'
102 password: '{{ .Values.dbCreds.adminPassword }}'
103 passwordPolicy: generate
sekharhuawei2e799e92020-11-14 17:06:56 +0530104 - uid: 'mso-key'
Priyadharshini7dc03852020-08-27 04:36:03 -0700105 name: &mso-key '{{ include "common.release" . }}-mso-key'
106 type: password
sekharhuawei2e799e92020-11-14 17:06:56 +0530107 password: '{{ .Values.mso.msoKey }}'
Priyadharshini7dc03852020-08-27 04:36:03 -0700108 - uid: mso-oof-auth
109 name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
110 type: basicAuth
111 login: '{{ .Values.mso.oof.login }}'
112 password: '{{ .Values.mso.oof.password }}'
113 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530114 - uid: server-actuator-creds
115 name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
116 type: basicAuth
117 externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
118 login: '{{ .Values.server.actuator.username }}'
119 password: '{{ .Values.server.actuator.password }}'
120 passwordPolicy: required
121 - uid: server-bpel-creds
122 name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
123 type: basicAuth
124 externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
125 login: '{{ .Values.server.bpel.username }}'
126 password: '{{ .Values.server.bpel.password }}'
127 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530128 - uid: so-aai-creds
129 name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
130 type: basicAuth
131 externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
132 login: '{{ .Values.server.aai.username }}'
133 password: '{{ .Values.server.aai.password }}'
134 passwordPolicy: required
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100135
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100136##################################################################
jmacc4f04d32018-10-12 18:24:24 +0000137# Application configuration defaults.
138#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100139
140dbSecrets: &dbSecrets
141 userCredsExternalSecret: *dbUserCredsSecretName
142 adminCredsExternalSecret: *dbAdminCredsSecretName
143
144# unused in this, just to pass to subcharts
145dbCreds:
146 userName: so_user
147 adminName: so_admin
148
Lukasz Rajewski743dca92023-06-12 07:28:58 +0000149image: onap/so/api-handler-infra:1.12.2
sekharhuawei2e799e92020-11-14 17:06:56 +0530150
151server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530152 aai:
153 username: aai@aai.onap.org
154 password: demo123456!
155 # aaiCredsExternalSecret: some secret
156 actuator:
157 username: mso_admin
158 password: password1$
159 # actuatorCredsExternalSecret: some secret
160 bpel:
161 username: bpel
162 password: password1$
163 # bpelCredsExternalSecret: some secret
164
jmacc4f04d32018-10-12 18:24:24 +0000165pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000166replicaCount: 1
167minReadySeconds: 10
seshukm0df1f8e2020-08-17 21:45:49 +0530168containerPort: &containerPort 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000169logPath: ./logs/apih/
170app: api-handler-infra
171service:
seshukm0df1f8e2020-08-17 21:45:49 +0530172 type: NodePort
seshukm0df1f8e2020-08-17 21:45:49 +0530173 internalPort: *containerPort
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100174 ports:
175 - name: http
176 port: *containerPort
177 nodePort: '77'
178 annotations:
179 msb.onap.org/service-info: |
180 {{ if .Values.global.msbEnabled -}}[
181 {
182 "serviceName": "so",
183 "version": "v1",
184 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
185 "protocol": "REST",
186 "port": "{{ .Values.service.internalPort }}",
187 "visualRange":"0",
188 "lb_policy":"ip_hash"
189 },
190 {
191 "serviceName": "so",
192 "version": "v1",
193 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
194 "protocol": "REST",
195 "port": "{{ .Values.service.internalPort }}",
196 "visualRange":"0",
197 "lb_policy":"ip_hash"
198 },
199 {
200 "serviceName": "so",
201 "version": "v1",
202 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
203 "protocol": "REST",
204 "port": "{{ .Values.service.internalPort }}",
205 "visualRange":"0",
206 "lb_policy":"ip_hash"
207 },
208 {
209 "serviceName": "so",
210 "version": "v1",
211 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
212 "protocol": "REST",
213 "port": "{{ .Values.service.internalPort }}",
214 "visualRange":"0",
215 "lb_policy":"ip_hash"
216 },
217 {
218 "serviceName": "so",
219 "version": "v1",
220 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
221 "protocol": "REST",
222 "port": "{{ .Values.service.internalPort }}",
223 "visualRange":"0",
224 "lb_policy":"ip_hash"
225 },
226 {
227 "serviceName": "so",
228 "version": "v1",
229 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
230 "protocol": "REST",
231 "port": "{{ .Values.service.internalPort }}",
232 "visualRange":"0",
233 "lb_policy":"ip_hash"
234 },
235 {
236 "serviceName": "so",
237 "version": "v1",
238 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
239 "protocol": "REST",
240 "port": "{{ .Values.service.internalPort }}",
241 "visualRange":"0",
242 "lb_policy":"ip_hash"
243 },
244 {
245 "serviceName": "so",
246 "version": "v1",
247 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
248 "protocol": "REST",
249 "port": "{{ .Values.service.internalPort }}",
250 "visualRange":"0",
251 "lb_policy":"ip_hash"
252 },
253 {
254 "serviceName": "so",
255 "version": "v1",
256 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
257 "protocol": "REST",
258 "port": "{{ .Values.service.internalPort }}",
259 "visualRange":"0",
260 "lb_policy":"ip_hash"
261 },
262 {
263 "serviceName": "so",
264 "version": "v1",
265 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
266 "protocol": "REST",
267 "port": "{{ .Values.service.internalPort }}",
268 "visualRange":"0",
269 "lb_policy":"ip_hash"
270 },
271 {
272 "serviceName": "so",
273 "version": "v1",
274 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
275 "protocol": "REST",
276 "port": "{{ .Values.service.internalPort }}",
277 "visualRange":"0",
278 "lb_policy":"ip_hash"
279 },
280 {
281 "serviceName": "so",
282 "version": "v1",
283 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
284 "protocol": "REST",
285 "port": "{{ .Values.service.internalPort }}",
286 "visualRange":"0",
287 "lb_policy":"ip_hash"
288 },
289 {
290 "serviceName": "so",
291 "version": "v1",
292 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
293 "protocol": "REST",
294 "port": "{{ .Values.service.internalPort }}",
295 "visualRange":"0",
296 "lb_policy":"ip_hash"
297 },
298 {
299 "serviceName": "so",
300 "version": "v1",
301 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
302 "protocol": "REST",
303 "port": "{{ .Values.service.internalPort }}",
304 "visualRange":"0",
305 "lb_policy":"ip_hash"
306 },
307 {
308 "serviceName": "so",
309 "version": "v1",
310 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
311 "protocol": "REST",
312 "port": "{{ .Values.service.internalPort }}",
313 "visualRange":"0",
314 "lb_policy":"ip_hash"
315 },
316 {
317 "serviceName": "so",
318 "version": "v1",
319 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
320 "protocol": "REST",
321 "port": "{{ .Values.service.internalPort }}",
322 "visualRange":"0",
323 "lb_policy":"ip_hash"
324 },
325 {
326 "serviceName": "so",
327 "version": "v1",
328 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
329 "protocol": "REST",
330 "port": "{{ .Values.service.internalPort }}",
331 "visualRange":"0",
332 "lb_policy":"ip_hash"
333 },
334 {
335 "serviceName": "so",
336 "version": "v1",
337 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
338 "protocol": "REST",
339 "port": "{{ .Values.service.internalPort }}",
340 "visualRange":"0",
341 "lb_policy":"ip_hash"
342 },
343 {
344 "serviceName": "so",
345 "version": "v1",
346 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
347 "protocol": "REST",
348 "port": "{{ .Values.service.internalPort }}",
349 "visualRange":"0",
350 "lb_policy":"ip_hash"
351 },
352 {
353 "serviceName": "so",
354 "version": "v1",
355 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
356 "protocol": "REST",
357 "port": "{{ .Values.service.internalPort }}",
358 "visualRange":"0",
359 "lb_policy":"ip_hash"
360 },
361 {
362 "serviceName": "so",
363 "version": "v1",
364 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
365 "protocol": "REST",
366 "port": "{{ .Values.service.internalPort }}",
367 "visualRange":"0",
368 "lb_policy":"ip_hash"
369 },
370 {
371 "serviceName": "so",
372 "version": "v1",
373 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
374 "protocol": "REST",
375 "port": "{{ .Values.service.internalPort }}",
376 "visualRange":"0",
377 "lb_policy":"ip_hash"
378 },
379 {
380 "serviceName": "so",
381 "version": "v1",
382 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
383 "protocol": "REST",
384 "port": "{{ .Values.service.internalPort }}",
385 "visualRange":"0",
386 "lb_policy":"ip_hash"
387 },
388 {
389 "serviceName": "so",
390 "version": "v1",
391 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
392 "protocol": "REST",
393 "port": "{{ .Values.service.internalPort }}",
394 "visualRange":"0",
395 "lb_policy":"ip_hash"
396 },
397 {
398 "serviceName": "so",
399 "version": "v1",
400 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
401 "protocol": "REST",
402 "port": "{{ .Values.service.internalPort }}",
403 "visualRange":"0",
404 "lb_policy":"ip_hash"
405 },
406 {
407 "serviceName": "so",
408 "version": "v1",
409 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
410 "protocol": "REST",
411 "port": "{{ .Values.service.internalPort }}",
412 "visualRange":"0",
413 "lb_policy":"ip_hash"
414 },
415 {
416 "serviceName": "so",
417 "version": "v1",
418 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
419 "protocol": "REST",
420 "port": "{{ .Values.service.internalPort }}",
421 "visualRange":"0",
422 "lb_policy":"ip_hash"
423 },
424 {
425 "serviceName": "so",
426 "version": "v1",
427 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
428 "protocol": "REST",
429 "port": "{{ .Values.service.internalPort }}",
430 "visualRange":"0",
431 "lb_policy":"ip_hash"
432 },
433 {
434 "serviceName": "so",
435 "version": "v1",
436 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
437 "protocol": "REST",
438 "port": "{{ .Values.service.internalPort }}",
439 "visualRange":"0",
440 "lb_policy":"ip_hash"
441 },
442 {
443 "serviceName": "so",
444 "version": "v1",
445 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
446 "protocol": "REST",
447 "port": "{{ .Values.service.internalPort }}",
448 "visualRange":"0",
449 "lb_policy":"ip_hash"
450 },
451 {
452 "serviceName": "so",
453 "version": "v1",
454 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
455 "protocol": "REST",
456 "port": "{{ .Values.service.internalPort }}",
457 "visualRange":"0",
458 "lb_policy":"ip_hash"
459 },
460 {
461 "serviceName": "so",
462 "version": "v1",
463 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
464 "protocol": "REST",
465 "port": "{{ .Values.service.internalPort }}",
466 "visualRange":"0",
467 "lb_policy":"ip_hash"
468 },
469 {
470 "serviceName": "so",
471 "version": "v1",
472 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
473 "protocol": "REST",
474 "port": "{{ .Values.service.internalPort }}",
475 "visualRange":"0",
476 "lb_policy":"ip_hash"
477 },
478 {
479 "serviceName": "so",
480 "version": "v1",
481 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
482 "protocol": "REST",
483 "port": "{{ .Values.service.internalPort }}",
484 "visualRange":"0",
485 "lb_policy":"ip_hash"
486 },
487 {
488 "serviceName": "so",
489 "version": "v1",
490 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
491 "protocol": "REST",
492 "port": "{{ .Values.service.internalPort }}",
493 "visualRange":"0",
494 "lb_policy":"ip_hash"
495 },
496 {
497 "serviceName": "so",
498 "version": "v1",
499 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
500 "protocol": "REST",
501 "port": "{{ .Values.service.internalPort }}",
502 "visualRange":"0",
503 "lb_policy":"ip_hash"
504 },
505 {
506 "serviceName": "so",
507 "version": "v1",
508 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
509 "protocol": "REST",
510 "port": "{{ .Values.service.internalPort }}",
511 "visualRange":"0",
512 "lb_policy":"ip_hash"
513 },
514 {
515 "serviceName": "so",
516 "version": "v1",
517 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
518 "protocol": "REST",
519 "port": "{{ .Values.service.internalPort }}",
520 "visualRange":"0",
521 "lb_policy":"ip_hash"
522 },
523 {
524 "serviceName": "so",
525 "version": "v1",
526 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
527 "protocol": "REST",
528 "port": "{{ .Values.service.internalPort }}",
529 "visualRange":"0",
530 "lb_policy":"ip_hash"
531 },
532 {
533 "serviceName": "so",
534 "version": "v1",
535 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
536 "protocol": "REST",
537 "port": "{{ .Values.service.internalPort }}",
538 "visualRange":"0",
539 "lb_policy":"ip_hash"
540 }
541 ]{{ end }}
542
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000543updateStrategy:
seshukm0df1f8e2020-08-17 21:45:49 +0530544 type: RollingUpdate
545 maxUnavailable: 1
546 maxSurge: 1
547
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100548################################################################
seshukm0df1f8e2020-08-17 21:45:49 +0530549# soHelpers part
550#################################################################
551soHelpers:
seshukm0df1f8e2020-08-17 21:45:49 +0530552 containerPort: *containerPort
553
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400554# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000555flavor: small
556# Segregation for Different environment (Small and Large)
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000557resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000558 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000559 limits:
vladimir turokdb8167b2023-09-20 11:09:21 +0200560 cpu: 1
vaibhav16dec0da88292018-08-13 06:10:27 +0000561 memory: 4Gi
562 requests:
Andreas Geissler555db9c2023-06-20 11:38:39 +0200563 cpu: 0.5
vaibhav16dec0da88292018-08-13 06:10:27 +0000564 memory: 1Gi
565 large:
566 limits:
vladimir turokdb8167b2023-09-20 11:09:21 +0200567 cpu: 2
vaibhav16dec0da88292018-08-13 06:10:27 +0000568 memory: 8Gi
569 requests:
Andreas Geissler555db9c2023-06-20 11:38:39 +0200570 cpu: 1
vaibhav16dec0da88292018-08-13 06:10:27 +0000571 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000572 unlimited: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000573
Mike Elliottd32d36e2018-02-12 15:54:03 -0500574nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500575affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000576
sunilb0a97ab22020-02-25 10:18:48 +0530577# application configuration
578config:
579 logstashServiceName: log-ls
580 logstashPort: 5044
Marcin Wilkad9b3762021-10-13 18:20:43 +0200581 # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
582 openStackKeystoneVersion: "KEYSTONE"
sunilb0a97ab22020-02-25 10:18:48 +0530583
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000584#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
585#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
586# --set so.global.mariadbGalera.localCluster=true \
587# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
588# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100589mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100590 rootUser:
591 externalSecret: *dbRootPassSecretName
592 nameOverride: &so-mariadb so-mariadb-galera
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000593 replicaCount: 1
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100594 service:
595 name: *so-mariadb
596 portName: *so-mariadb
597 internalPort: 3306
Andreas Geisslercfd84342023-08-16 17:18:49 +0200598 mariadbOperator:
599 galera:
600 enabled: false
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000601 persistence:
602 mountSubPath: so/mariadb-galera/data
603 enabled: true
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100604 serviceAccount:
605 nameOverride: *so-mariadb
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200606
607ingress:
608 enabled: false
609 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200610 - baseaddr: 'so-api'
rope2524d3f3682020-09-02 20:49:21 +0100611 name: 'so'
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200612 port: 8080
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000613
AndrewLambc58d4c22023-03-09 11:03:31 +0000614serviceMesh:
615 authorizationPolicy:
616 authorizedPrincipals:
617 - serviceAccount: consul-read
618 - serviceAccount: consul-server-read
619 - serviceAccount: nbi-read
AndrewLambab2704a2023-04-05 14:45:11 +0100620 - serviceAccount: policy-drools-pdp-read
621 - serviceAccount: so-bpmn-infra-read
622 - serviceAccount: robot-read
AndrewLambc58d4c22023-03-09 11:03:31 +0000623 - serviceAccount: istio-ingress
624 namespace: istio-ingress
625
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000626mso:
627 adapters:
628 requestDb:
629 auth: Basic YnBlbDpwYXNzd29yZDEk
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000630 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
sekharhuawei2e799e92020-11-14 17:06:56 +0530631 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000632 sdc:
633 client:
634 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
635 aai:
636 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
Priyadharshini7dc03852020-08-27 04:36:03 -0700637 oof:
638 login: test
639 password: testpwd
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000640 so:
641 operationalEnv:
642 dmaap:
643 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
644 health:
645 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100646
seshukm0df1f8e2020-08-17 21:45:49 +0530647so-bpmn-infra:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100648 mariadb-galera:
649 <<: *mariadbGalera
seshukm0df1f8e2020-08-17 21:45:49 +0530650 db:
651 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000652 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100653
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000654so-catalog-db-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530655 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100656 mariadb-galera:
657 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100658 db:
659 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100660
sekharhuawei2e799e92020-11-14 17:06:56 +0530661so-cnf-adapter:
662 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100663 mariadb-galera:
664 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530665 db:
666 <<: *dbSecrets
667 server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530668 aaiCredsExternalSecret: *aai-secrets
669 actuatorCredsExternalSecret: *actuator-secrets
670 mso:
671 msoKeySecret: *mso-key
672
egernugd3c55ab2023-01-19 15:50:37 +0000673so-cnfm-lcm:
674 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100675 mariadb-galera:
676 <<: *mariadbGalera
egernugd3c55ab2023-01-19 15:50:37 +0000677 db:
678 <<: *dbSecrets
679
AndrewLamb8e090442020-10-15 09:28:09 +0100680so-etsi-nfvo-ns-lcm:
681 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100682 mariadb-galera:
683 <<: *mariadbGalera
rope2524d3f3682020-09-02 20:49:21 +0100684 db:
685 <<: *dbSecrets
AndrewLamb8e090442020-10-15 09:28:09 +0100686
sekharhuawei2e799e92020-11-14 17:06:56 +0530687so-mariadb:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100688 mariadb-galera:
689 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530690 db:
691 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100692 #rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
693 rootPasswordExternalSecret: '{{ ternary (tpl .Values.db.rootPasswordExternalSecretLocalDb .) (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
sekharhuawei2e799e92020-11-14 17:06:56 +0530694 backupCredsExternalSecret: *dbBackupCredsSecretName
695 userCredsExternalSecret: *dbUserCredsSecretName
696 adminCredsExternalSecret: *dbAdminCredsSecretName
697
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100698so-admin-cockpit:
seshukm0df1f8e2020-08-17 21:45:49 +0530699 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100700 mariadb-galera:
701 <<: *mariadbGalera
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100702 db:
703 <<: *dbSecrets
704
sekharhuawei2e799e92020-11-14 17:06:56 +0530705so-nssmf-adapter:
706 enabled: true
707 server:
708 actuatorCredsExternalSecret: *actuator-secrets
709 bpelCredsExternalSecret: *bpel-secrets
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100710 mariadb-galera:
711 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530712 db:
713 <<: *dbSecrets
714
715so-oof-adapter:
716 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100717 mariadb-galera:
718 <<: *mariadbGalera
sekharhuawei2e799e92020-11-14 17:06:56 +0530719 db:
720 <<: *dbSecrets
721 mso:
722 msoKeySecret: *mso-key
723 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
724 oof:
725 authSecret: *mso-oof-auth
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000726 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
sekharhuawei2e799e92020-11-14 17:06:56 +0530727
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000728so-openstack-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530729 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100730 mariadb-galera:
731 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100732 db:
733 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000734 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100735
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000736so-request-db-adapter:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100737 mariadb-galera:
738 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100739 db:
740 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100741
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000742so-sdc-controller:
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100743 mariadb-galera:
744 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100745 db:
746 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000747 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100748
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000749so-sdnc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530750 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100751 mariadb-galera:
752 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100753 db:
754 <<: *dbSecrets
seshukm610d97d2021-03-19 02:57:36 +0530755 mso:
756 msoKeySecret: *mso-key
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000757 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100758
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100759so-ve-vnfm-adapter:
Sylvain Desbureaux28d56562020-11-02 17:54:05 +0100760 enabled: false
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100761
seshukm87ccd872021-03-30 21:45:16 +0530762so-etsi-sol005-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530763 enabled: true
Andreas Geissler2c1ba292024-01-10 22:20:05 +0100764 mariadb-galera:
765 <<: *mariadbGalera
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100766 db:
767 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100768
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100769so-etsi-sol003-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530770 enabled: true
farida azmy87f46222021-04-06 15:25:15 +0200771
772#Pods Service Account
773serviceAccount:
774 nameOverride: so
775 roles:
776 - read
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000777
778#Log configuration
779log:
780 path: /var/log/onap