blob: 014cbadbab71d6708e657eff0a0f830095bf1edc [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
seshukm0df1f8e2020-08-17 21:45:49 +05302# Copyright © 2020 Huawei
Sylvain Desbureauxd3114052021-02-23 16:45:52 +01003# Copyright © 2021 Orange
egernugd3c55ab2023-01-19 15:50:37 +00004# Modifications Copyright © 2023 Nordix Foundation
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00005# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000016#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
21 nodePortPrefixExt: 304
Maciej Wereskidf9ba222021-11-05 14:38:18 +000022 centralizedLoggingEnabled: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000023 mariadbGalera:
24 nameOverride: mariadb-galera
25 serviceName: mariadb-galera
rope2524d3f3682020-09-02 20:49:21 +010026 servicePort: '3306'
krishnaa9692b606b2020-10-30 11:29:21 +053027 service: mariadb-galera
28 internalPort: '3306'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010029 # mariadbRootPassword: secretpassword
30 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053031 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000032 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
33 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000034 persistence:
35 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020036 #This configuration specifies Service and port for SDNC OAM interface
37 sdncOamService: sdnc-oam
38 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000039 #This configuration will run the migration. The configurations are for backing up the data
40 #from DB and then restoring it to the present versions preferred DB.
41 migration:
42 enabled: false
43 dbHost: mariadb-galera
44 dbPort: 3306
45 dbUser: root
46 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010047 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000048 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000049 app:
50 siteName: onapheat
51 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
52 defaultCloudOwner: onap
sekharhuawei2e799e92020-11-14 17:06:56 +053053
efiacor8d3ff802022-11-23 12:13:26 +000054 soSdcListenerKafkaUser: so-sdc-list-user
55
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010056readinessCheck:
57 wait_for:
Prabhjot Singh Sethi46e17562021-08-20 22:40:23 +053058 jobs:
59 - '{{ include "common.release" . }}-so-mariadb-config-job'
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010060
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010061#################################################################
62# Secrets metaconfig
63#################################################################
64secrets:
65 - uid: db-root-pass
66 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
67 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010068 externalSecret: '{{ .Values.global.mariadbGalera.localCluster | ternary
69 .Values.global.mariadbGalera.rootPasswordExternalSecret
70 (default (include "common.mariadb.secret.rootPassSecretName"
71 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride))
72 .Values.global.mariadbGalera.rootPasswordExternalSecret) }}'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010073 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
74 - uid: db-backup-creds
75 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
76 type: basicAuth
77 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
78 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
79 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
80 passwordPolicy: required
81 annotations:
82 helm.sh/hook: pre-upgrade,pre-install
rope2524d3f3682020-09-02 20:49:21 +010083 helm.sh/hook-weight: '0'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010084 helm.sh/hook-delete-policy: before-hook-creation
85 - uid: db-user-creds
86 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
87 type: basicAuth
88 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
89 login: '{{ .Values.dbCreds.userName }}'
90 password: '{{ .Values.dbCreds.userPassword }}'
91 passwordPolicy: generate
92 - uid: db-admin-creds
93 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
94 type: basicAuth
95 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
96 login: '{{ .Values.dbCreds.adminName }}'
97 password: '{{ .Values.dbCreds.adminPassword }}'
98 passwordPolicy: generate
sekharhuawei2e799e92020-11-14 17:06:56 +053099 - uid: 'mso-key'
Priyadharshini7dc03852020-08-27 04:36:03 -0700100 name: &mso-key '{{ include "common.release" . }}-mso-key'
101 type: password
sekharhuawei2e799e92020-11-14 17:06:56 +0530102 password: '{{ .Values.mso.msoKey }}'
Priyadharshini7dc03852020-08-27 04:36:03 -0700103 - uid: mso-oof-auth
104 name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
105 type: basicAuth
106 login: '{{ .Values.mso.oof.login }}'
107 password: '{{ .Values.mso.oof.password }}'
108 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530109 - uid: server-actuator-creds
110 name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
111 type: basicAuth
112 externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
113 login: '{{ .Values.server.actuator.username }}'
114 password: '{{ .Values.server.actuator.password }}'
115 passwordPolicy: required
116 - uid: server-bpel-creds
117 name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
118 type: basicAuth
119 externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
120 login: '{{ .Values.server.bpel.username }}'
121 password: '{{ .Values.server.bpel.password }}'
122 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530123 - uid: so-aai-creds
124 name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
125 type: basicAuth
126 externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
127 login: '{{ .Values.server.aai.username }}'
128 password: '{{ .Values.server.aai.password }}'
129 passwordPolicy: required
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100130
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100131##################################################################
jmacc4f04d32018-10-12 18:24:24 +0000132# Application configuration defaults.
133#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100134
135dbSecrets: &dbSecrets
136 userCredsExternalSecret: *dbUserCredsSecretName
137 adminCredsExternalSecret: *dbAdminCredsSecretName
138
139# unused in this, just to pass to subcharts
140dbCreds:
141 userName: so_user
142 adminName: so_admin
143
Lukasz Rajewskib6861242022-09-06 13:32:58 +0200144image: onap/so/api-handler-infra:1.11.0
sekharhuawei2e799e92020-11-14 17:06:56 +0530145
146server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530147 aai:
148 username: aai@aai.onap.org
149 password: demo123456!
150 # aaiCredsExternalSecret: some secret
151 actuator:
152 username: mso_admin
153 password: password1$
154 # actuatorCredsExternalSecret: some secret
155 bpel:
156 username: bpel
157 password: password1$
158 # bpelCredsExternalSecret: some secret
159
jmacc4f04d32018-10-12 18:24:24 +0000160pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000161replicaCount: 1
162minReadySeconds: 10
seshukm0df1f8e2020-08-17 21:45:49 +0530163containerPort: &containerPort 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000164logPath: ./logs/apih/
165app: api-handler-infra
166service:
seshukm0df1f8e2020-08-17 21:45:49 +0530167 type: NodePort
seshukm0df1f8e2020-08-17 21:45:49 +0530168 internalPort: *containerPort
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100169 ports:
170 - name: http
171 port: *containerPort
172 nodePort: '77'
173 annotations:
174 msb.onap.org/service-info: |
175 {{ if .Values.global.msbEnabled -}}[
176 {
177 "serviceName": "so",
178 "version": "v1",
179 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
180 "protocol": "REST",
181 "port": "{{ .Values.service.internalPort }}",
182 "visualRange":"0",
183 "lb_policy":"ip_hash"
184 },
185 {
186 "serviceName": "so",
187 "version": "v1",
188 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
189 "protocol": "REST",
190 "port": "{{ .Values.service.internalPort }}",
191 "visualRange":"0",
192 "lb_policy":"ip_hash"
193 },
194 {
195 "serviceName": "so",
196 "version": "v1",
197 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
198 "protocol": "REST",
199 "port": "{{ .Values.service.internalPort }}",
200 "visualRange":"0",
201 "lb_policy":"ip_hash"
202 },
203 {
204 "serviceName": "so",
205 "version": "v1",
206 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
207 "protocol": "REST",
208 "port": "{{ .Values.service.internalPort }}",
209 "visualRange":"0",
210 "lb_policy":"ip_hash"
211 },
212 {
213 "serviceName": "so",
214 "version": "v1",
215 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
216 "protocol": "REST",
217 "port": "{{ .Values.service.internalPort }}",
218 "visualRange":"0",
219 "lb_policy":"ip_hash"
220 },
221 {
222 "serviceName": "so",
223 "version": "v1",
224 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
225 "protocol": "REST",
226 "port": "{{ .Values.service.internalPort }}",
227 "visualRange":"0",
228 "lb_policy":"ip_hash"
229 },
230 {
231 "serviceName": "so",
232 "version": "v1",
233 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
234 "protocol": "REST",
235 "port": "{{ .Values.service.internalPort }}",
236 "visualRange":"0",
237 "lb_policy":"ip_hash"
238 },
239 {
240 "serviceName": "so",
241 "version": "v1",
242 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
243 "protocol": "REST",
244 "port": "{{ .Values.service.internalPort }}",
245 "visualRange":"0",
246 "lb_policy":"ip_hash"
247 },
248 {
249 "serviceName": "so",
250 "version": "v1",
251 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
252 "protocol": "REST",
253 "port": "{{ .Values.service.internalPort }}",
254 "visualRange":"0",
255 "lb_policy":"ip_hash"
256 },
257 {
258 "serviceName": "so",
259 "version": "v1",
260 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
261 "protocol": "REST",
262 "port": "{{ .Values.service.internalPort }}",
263 "visualRange":"0",
264 "lb_policy":"ip_hash"
265 },
266 {
267 "serviceName": "so",
268 "version": "v1",
269 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
270 "protocol": "REST",
271 "port": "{{ .Values.service.internalPort }}",
272 "visualRange":"0",
273 "lb_policy":"ip_hash"
274 },
275 {
276 "serviceName": "so",
277 "version": "v1",
278 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
279 "protocol": "REST",
280 "port": "{{ .Values.service.internalPort }}",
281 "visualRange":"0",
282 "lb_policy":"ip_hash"
283 },
284 {
285 "serviceName": "so",
286 "version": "v1",
287 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
288 "protocol": "REST",
289 "port": "{{ .Values.service.internalPort }}",
290 "visualRange":"0",
291 "lb_policy":"ip_hash"
292 },
293 {
294 "serviceName": "so",
295 "version": "v1",
296 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
297 "protocol": "REST",
298 "port": "{{ .Values.service.internalPort }}",
299 "visualRange":"0",
300 "lb_policy":"ip_hash"
301 },
302 {
303 "serviceName": "so",
304 "version": "v1",
305 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
306 "protocol": "REST",
307 "port": "{{ .Values.service.internalPort }}",
308 "visualRange":"0",
309 "lb_policy":"ip_hash"
310 },
311 {
312 "serviceName": "so",
313 "version": "v1",
314 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
315 "protocol": "REST",
316 "port": "{{ .Values.service.internalPort }}",
317 "visualRange":"0",
318 "lb_policy":"ip_hash"
319 },
320 {
321 "serviceName": "so",
322 "version": "v1",
323 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
324 "protocol": "REST",
325 "port": "{{ .Values.service.internalPort }}",
326 "visualRange":"0",
327 "lb_policy":"ip_hash"
328 },
329 {
330 "serviceName": "so",
331 "version": "v1",
332 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
333 "protocol": "REST",
334 "port": "{{ .Values.service.internalPort }}",
335 "visualRange":"0",
336 "lb_policy":"ip_hash"
337 },
338 {
339 "serviceName": "so",
340 "version": "v1",
341 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
342 "protocol": "REST",
343 "port": "{{ .Values.service.internalPort }}",
344 "visualRange":"0",
345 "lb_policy":"ip_hash"
346 },
347 {
348 "serviceName": "so",
349 "version": "v1",
350 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
351 "protocol": "REST",
352 "port": "{{ .Values.service.internalPort }}",
353 "visualRange":"0",
354 "lb_policy":"ip_hash"
355 },
356 {
357 "serviceName": "so",
358 "version": "v1",
359 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
360 "protocol": "REST",
361 "port": "{{ .Values.service.internalPort }}",
362 "visualRange":"0",
363 "lb_policy":"ip_hash"
364 },
365 {
366 "serviceName": "so",
367 "version": "v1",
368 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
369 "protocol": "REST",
370 "port": "{{ .Values.service.internalPort }}",
371 "visualRange":"0",
372 "lb_policy":"ip_hash"
373 },
374 {
375 "serviceName": "so",
376 "version": "v1",
377 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
378 "protocol": "REST",
379 "port": "{{ .Values.service.internalPort }}",
380 "visualRange":"0",
381 "lb_policy":"ip_hash"
382 },
383 {
384 "serviceName": "so",
385 "version": "v1",
386 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
387 "protocol": "REST",
388 "port": "{{ .Values.service.internalPort }}",
389 "visualRange":"0",
390 "lb_policy":"ip_hash"
391 },
392 {
393 "serviceName": "so",
394 "version": "v1",
395 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
396 "protocol": "REST",
397 "port": "{{ .Values.service.internalPort }}",
398 "visualRange":"0",
399 "lb_policy":"ip_hash"
400 },
401 {
402 "serviceName": "so",
403 "version": "v1",
404 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
405 "protocol": "REST",
406 "port": "{{ .Values.service.internalPort }}",
407 "visualRange":"0",
408 "lb_policy":"ip_hash"
409 },
410 {
411 "serviceName": "so",
412 "version": "v1",
413 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
414 "protocol": "REST",
415 "port": "{{ .Values.service.internalPort }}",
416 "visualRange":"0",
417 "lb_policy":"ip_hash"
418 },
419 {
420 "serviceName": "so",
421 "version": "v1",
422 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
423 "protocol": "REST",
424 "port": "{{ .Values.service.internalPort }}",
425 "visualRange":"0",
426 "lb_policy":"ip_hash"
427 },
428 {
429 "serviceName": "so",
430 "version": "v1",
431 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
432 "protocol": "REST",
433 "port": "{{ .Values.service.internalPort }}",
434 "visualRange":"0",
435 "lb_policy":"ip_hash"
436 },
437 {
438 "serviceName": "so",
439 "version": "v1",
440 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
441 "protocol": "REST",
442 "port": "{{ .Values.service.internalPort }}",
443 "visualRange":"0",
444 "lb_policy":"ip_hash"
445 },
446 {
447 "serviceName": "so",
448 "version": "v1",
449 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
450 "protocol": "REST",
451 "port": "{{ .Values.service.internalPort }}",
452 "visualRange":"0",
453 "lb_policy":"ip_hash"
454 },
455 {
456 "serviceName": "so",
457 "version": "v1",
458 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
459 "protocol": "REST",
460 "port": "{{ .Values.service.internalPort }}",
461 "visualRange":"0",
462 "lb_policy":"ip_hash"
463 },
464 {
465 "serviceName": "so",
466 "version": "v1",
467 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
468 "protocol": "REST",
469 "port": "{{ .Values.service.internalPort }}",
470 "visualRange":"0",
471 "lb_policy":"ip_hash"
472 },
473 {
474 "serviceName": "so",
475 "version": "v1",
476 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
477 "protocol": "REST",
478 "port": "{{ .Values.service.internalPort }}",
479 "visualRange":"0",
480 "lb_policy":"ip_hash"
481 },
482 {
483 "serviceName": "so",
484 "version": "v1",
485 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
486 "protocol": "REST",
487 "port": "{{ .Values.service.internalPort }}",
488 "visualRange":"0",
489 "lb_policy":"ip_hash"
490 },
491 {
492 "serviceName": "so",
493 "version": "v1",
494 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
495 "protocol": "REST",
496 "port": "{{ .Values.service.internalPort }}",
497 "visualRange":"0",
498 "lb_policy":"ip_hash"
499 },
500 {
501 "serviceName": "so",
502 "version": "v1",
503 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
504 "protocol": "REST",
505 "port": "{{ .Values.service.internalPort }}",
506 "visualRange":"0",
507 "lb_policy":"ip_hash"
508 },
509 {
510 "serviceName": "so",
511 "version": "v1",
512 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
513 "protocol": "REST",
514 "port": "{{ .Values.service.internalPort }}",
515 "visualRange":"0",
516 "lb_policy":"ip_hash"
517 },
518 {
519 "serviceName": "so",
520 "version": "v1",
521 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
522 "protocol": "REST",
523 "port": "{{ .Values.service.internalPort }}",
524 "visualRange":"0",
525 "lb_policy":"ip_hash"
526 },
527 {
528 "serviceName": "so",
529 "version": "v1",
530 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
531 "protocol": "REST",
532 "port": "{{ .Values.service.internalPort }}",
533 "visualRange":"0",
534 "lb_policy":"ip_hash"
535 }
536 ]{{ end }}
537
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000538updateStrategy:
seshukm0df1f8e2020-08-17 21:45:49 +0530539 type: RollingUpdate
540 maxUnavailable: 1
541 maxSurge: 1
542
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100543################################################################
seshukm0df1f8e2020-08-17 21:45:49 +0530544# soHelpers part
545#################################################################
546soHelpers:
seshukm0df1f8e2020-08-17 21:45:49 +0530547 containerPort: *containerPort
548
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400549# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000550flavor: small
551# Segregation for Different environment (Small and Large)
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000552resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000553 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000554 limits:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000555 cpu: 2000m
vaibhav16dec0da88292018-08-13 06:10:27 +0000556 memory: 4Gi
557 requests:
558 cpu: 500m
559 memory: 1Gi
560 large:
561 limits:
562 cpu: 4000m
563 memory: 8Gi
564 requests:
565 cpu: 1000m
566 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000567 unlimited: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000568
Mike Elliottd32d36e2018-02-12 15:54:03 -0500569nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500570affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000571
sunilb0a97ab22020-02-25 10:18:48 +0530572# application configuration
573config:
574 logstashServiceName: log-ls
575 logstashPort: 5044
Marcin Wilkad9b3762021-10-13 18:20:43 +0200576 # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
577 openStackKeystoneVersion: "KEYSTONE"
sunilb0a97ab22020-02-25 10:18:48 +0530578
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000579#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
580#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
581# --set so.global.mariadbGalera.localCluster=true \
582# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
583# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
584mariadb-galera:
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100585 rootUser:
586 externalSecret: *dbRootPassSecretName
587 nameOverride: &so-mariadb so-mariadb-galera
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000588 replicaCount: 1
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000589 persistence:
590 mountSubPath: so/mariadb-galera/data
591 enabled: true
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100592 serviceAccount:
593 nameOverride: *so-mariadb
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200594
595ingress:
596 enabled: false
597 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200598 - baseaddr: 'so-api'
rope2524d3f3682020-09-02 20:49:21 +0100599 name: 'so'
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200600 port: 8080
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000601
602mso:
603 adapters:
604 requestDb:
605 auth: Basic YnBlbDpwYXNzd29yZDEk
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000606 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
sekharhuawei2e799e92020-11-14 17:06:56 +0530607 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000608 sdc:
609 client:
610 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
611 aai:
612 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
Priyadharshini7dc03852020-08-27 04:36:03 -0700613 oof:
614 login: test
615 password: testpwd
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000616 so:
617 operationalEnv:
618 dmaap:
619 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
620 health:
621 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100622
seshukm0df1f8e2020-08-17 21:45:49 +0530623so-bpmn-infra:
624 db:
625 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000626 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100627
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000628so-catalog-db-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530629 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100630 db:
631 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100632
sekharhuawei2e799e92020-11-14 17:06:56 +0530633so-cnf-adapter:
634 enabled: true
635 db:
636 <<: *dbSecrets
637 server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530638 aaiCredsExternalSecret: *aai-secrets
639 actuatorCredsExternalSecret: *actuator-secrets
640 mso:
641 msoKeySecret: *mso-key
642
egernugd3c55ab2023-01-19 15:50:37 +0000643so-cnfm-lcm:
644 enabled: true
645 db:
646 <<: *dbSecrets
647
AndrewLamb8e090442020-10-15 09:28:09 +0100648so-etsi-nfvo-ns-lcm:
649 enabled: true
rope2524d3f3682020-09-02 20:49:21 +0100650 db:
651 <<: *dbSecrets
AndrewLamb8e090442020-10-15 09:28:09 +0100652
sekharhuawei2e799e92020-11-14 17:06:56 +0530653so-mariadb:
654 db:
655 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
656 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
657 backupCredsExternalSecret: *dbBackupCredsSecretName
658 userCredsExternalSecret: *dbUserCredsSecretName
659 adminCredsExternalSecret: *dbAdminCredsSecretName
660
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100661so-admin-cockpit:
seshukm0df1f8e2020-08-17 21:45:49 +0530662 enabled: true
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100663 db:
664 <<: *dbSecrets
665
sekharhuawei2e799e92020-11-14 17:06:56 +0530666so-nssmf-adapter:
667 enabled: true
668 server:
669 actuatorCredsExternalSecret: *actuator-secrets
670 bpelCredsExternalSecret: *bpel-secrets
671 db:
672 <<: *dbSecrets
673
674so-oof-adapter:
675 enabled: true
676 db:
677 <<: *dbSecrets
678 mso:
679 msoKeySecret: *mso-key
680 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
681 oof:
682 authSecret: *mso-oof-auth
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000683 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
sekharhuawei2e799e92020-11-14 17:06:56 +0530684
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000685so-openstack-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530686 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100687 db:
688 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000689 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100690
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000691so-request-db-adapter:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100692 db:
693 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100694
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000695so-sdc-controller:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100696 db:
697 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000698 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
efiacor8d3ff802022-11-23 12:13:26 +0000699 config:
700 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.soSdcListenerKafkaUser }}'
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100701
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000702so-sdnc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530703 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100704 db:
705 <<: *dbSecrets
seshukm610d97d2021-03-19 02:57:36 +0530706 mso:
707 msoKeySecret: *mso-key
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000708 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100709
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100710so-ve-vnfm-adapter:
Sylvain Desbureaux28d56562020-11-02 17:54:05 +0100711 enabled: false
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100712
seshukm87ccd872021-03-30 21:45:16 +0530713so-etsi-sol005-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530714 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100715 db:
716 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100717
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100718so-etsi-sol003-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530719 enabled: true
farida azmy87f46222021-04-06 15:25:15 +0200720
721#Pods Service Account
722serviceAccount:
723 nameOverride: so
724 roles:
725 - read
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000726
727#Log configuration
728log:
729 path: /var/log/onap