blob: 482d88e8832b9e5c9341ed5b6a6ce4cfb5c44195 [file] [log] [blame]
Jack Lucasd41dbdb2021-02-16 11:07:28 -05001#============LICENSE_START========================================================
2# ================================================================================
Jack Lucasc9797322022-03-18 12:32:59 -04003# Copyright (c) 2021-2022 J. F. Lucas. All rights reserved.
Kasperki5e1d9782022-02-24 17:49:04 +01004# Copyright (c) 2021-2022 Nokia. All rights reserved.
efiacor5c0678f2023-03-06 09:21:57 +00005# Modifications Copyright (C) 2022-2023 Nordix Foundation.
Jack Lucasd41dbdb2021-02-16 11:07:28 -05006# ================================================================================
7# Licensed under the Apache License, Version 2.0 (the "License");
8# you may not use this file except in compliance with the License.
9# You may obtain a copy of the License at
10#
11# http://www.apache.org/licenses/LICENSE-2.0
12#
13# Unless required by applicable law or agreed to in writing, software
14# distributed under the License is distributed on an "AS IS" BASIS,
15# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16# See the License for the specific language governing permissions and
17# limitations under the License.
18# ============LICENSE_END=========================================================
19
20#################################################################
21# Global configuration defaults.
22#################################################################
23global:
24 nodePortPrefix: 302
25 nodePortPrefixExt: 304
Maciej Wereski7000a7c2021-12-16 12:24:06 +010026 centralizedLoggingEnabled: true
Jack Lucasd41dbdb2021-02-16 11:07:28 -050027
28#################################################################
29# Filebeat configuration defaults.
30#################################################################
31filebeatConfig:
32 logstashServiceName: log-ls
33 logstashPort: 5044
34
35#################################################################
36# initContainer images.
37#################################################################
38tlsImage: onap/org.onap.dcaegen2.deployments.tls-init-container:2.1.0
Tomasz Wrobel1c39a902022-01-12 10:49:51 +010039certPostProcessorImage: onap/org.onap.oom.platform.cert-service.oom-certservice-post-processor:2.5.0
Jack Lucasd41dbdb2021-02-16 11:07:28 -050040
41#################################################################
42# Application configuration defaults.
43#################################################################
44# application image
Tomasz Wrobelf39c6402022-09-12 15:48:10 +020045image: onap/org.onap.dcaegen2.collectors.hv-ves.hv-collector-main:1.11.0
Jack Lucasd41dbdb2021-02-16 11:07:28 -050046pullPolicy: Always
47
efiacor5c0678f2023-03-06 09:21:57 +000048commonName: &commonName dcae-hv-ves-collector
49containerPort: &containerPort 6061
50
Jack Lucasd41dbdb2021-02-16 11:07:28 -050051# log directory where logging sidecar should look for log files
Maciej Wereski7000a7c2021-12-16 12:24:06 +010052# if path is set to null sidecar won't be deployed in spite of
53# global.centralizedLoggingEnabled setting.
54log:
55 path: /var/log/ONAP/dcae-hv-ves-collector
56logConfigMapNamePrefix: '{{ include "common.fullname" . }}'
Jack Lucasd41dbdb2021-02-16 11:07:28 -050057
58# directory where TLS certs should be stored
59# if absent, no certs will be retrieved and stored
60certDirectory: /etc/ves-hv/ssl
61
62# TLS role -- set to true if microservice acts as server
63# If true, an init container will retrieve a server cert
64# and key from AAF and mount them in certDirectory.
Andreas Geisslerb0841b82022-12-16 10:40:21 +010065tlsServer: false
Jack Lucasd41dbdb2021-02-16 11:07:28 -050066
Remigiusz Janeczek9b00b562021-04-26 14:37:57 +020067# CMPv2 certificate
Remigiusz Janeczek7b095032021-05-20 19:39:44 +020068# It is used only when:
69# - certDirectory is set
70# - global cmpv2Enabled flag is set to true
Remigiusz Janeczek7b095032021-05-20 19:39:44 +020071# - flag useCmpv2Certificates is set to true
Piotr Marcinkiewicz70625182021-04-29 17:02:37 +020072# Disabled by default
Remigiusz Janeczek7b095032021-05-20 19:39:44 +020073useCmpv2Certificates: false
Remigiusz Janeczek9b00b562021-04-26 14:37:57 +020074certificates:
75 - mountPath: /etc/ves-hv/ssl/external
efiacor5c0678f2023-03-06 09:21:57 +000076 commonName: *commonName
Remigiusz Janeczek9b00b562021-04-26 14:37:57 +020077 dnsNames:
efiacor5c0678f2023-03-06 09:21:57 +000078 - *commonName
Remigiusz Janeczek9b00b562021-04-26 14:37:57 +020079 - hv-ves-collector
80 - hv-ves
81 keystore:
82 outputType:
83 - jks
84 passwordSecretRef:
85 name: hv-ves-cmpv2-keystore-password
86 key: password
87 create: true
88
Jack Lucasd41dbdb2021-02-16 11:07:28 -050089# probe configuration
90readiness:
91 type: exec
92 initialDelaySeconds: 5
93 periodSeconds: 15
94 timeoutSeconds: 2
95 command:
96 - /opt/ves-hv-collector/healthcheck.sh
97
Andreas Geissler2d787422023-02-14 17:27:42 +010098# since there are problems receiving binary data via the sidecar
99# the service port is excluded in the sidecar processing
100podAnnotations:
efiacor5c0678f2023-03-06 09:21:57 +0000101 traffic.sidecar.istio.io/excludeInboundPorts: '6061'
Andreas Geissler2d787422023-02-14 17:27:42 +0100102 traffic.sidecar.istio.io/includeInboundPorts: '*'
103
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500104# service configuration
105service:
106 type: NodePort
efiacor5c0678f2023-03-06 09:21:57 +0000107 name: *commonName
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500108 ports:
Andreas Geissler2d787422023-02-14 17:27:42 +0100109 - name: tcp
efiacor5c0678f2023-03-06 09:21:57 +0000110 port: *containerPort
Andreas Geissler2d787422023-02-14 17:27:42 +0100111 port_protocol: tcp
112 app_protocol: tcp
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500113 nodePort: 22
114
Andreas Geissler261763a2022-10-17 18:39:54 +0200115ingress:
116 enabled: false
117 service:
118 - baseaddr: "dcae-hv-ves-collector-api"
efiacor5c0678f2023-03-06 09:21:57 +0000119 name: *commonName
120 port: *containerPort
Andreas Geissler261763a2022-10-17 18:39:54 +0200121 config:
122 ssl: "redirect"
123
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500124# initial application configuration
125applicationConfig:
126 logLevel: INFO
127 server.idleTimeoutSec: 300
efiacor5c0678f2023-03-06 09:21:57 +0000128 server.listenPort: *containerPort
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500129 cbs.requestIntervalSec: 5
Andreas Geisslerb0841b82022-12-16 10:40:21 +0100130 security.sslDisable: true
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500131 security.keys.keyStoreFile: /etc/ves-hv/ssl/cert.jks
132 security.keys.keyStorePasswordFile: /etc/ves-hv/ssl/jks.pass
133 security.keys.trustStoreFile: /etc/ves-hv/ssl/trust.jks
134 security.keys.trustStorePasswordFile: /etc/ves-hv/ssl/trust.pass
135 streams_publishes:
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200136 ves-3gpp-fault-supervision:
efiacor5c0678f2023-03-06 09:21:57 +0000137 type: ${MESSAGING_TYPE}
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200138 kafka_info:
efiacor26c1f7a2022-04-25 13:27:18 +0100139 bootstrap_servers: ${KAFKA_BOOTSTRAP_SERVERS}
efiacor5c0678f2023-03-06 09:21:57 +0000140 topic_name: &ves3gppFaultSupervision SEC_3GPP_FAULTSUPERVISION_OUTPUT
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200141 ves-3gpp-provisioning:
efiacor5c0678f2023-03-06 09:21:57 +0000142 type: ${MESSAGING_TYPE}
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200143 kafka_info:
efiacor26c1f7a2022-04-25 13:27:18 +0100144 bootstrap_servers: ${KAFKA_BOOTSTRAP_SERVERS}
efiacor5c0678f2023-03-06 09:21:57 +0000145 topic_name: &ves3gppProvisioning SEC_3GPP_PROVISIONING_OUTPUT
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200146 ves-3gpp-heartbeat:
efiacor5c0678f2023-03-06 09:21:57 +0000147 type: ${MESSAGING_TYPE}
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200148 kafka_info:
efiacor26c1f7a2022-04-25 13:27:18 +0100149 bootstrap_servers: ${KAFKA_BOOTSTRAP_SERVERS}
efiacor5c0678f2023-03-06 09:21:57 +0000150 topic_name: &ves3gppHeartbeat SEC_3GPP_HEARTBEAT_OUTPUT
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200151 ves-3gpp-performance-assurance:
efiacor5c0678f2023-03-06 09:21:57 +0000152 type: ${MESSAGING_TYPE}
Tomasz Pietruszkiewicz773c5cb2021-03-31 07:35:03 +0200153 kafka_info:
efiacor26c1f7a2022-04-25 13:27:18 +0100154 bootstrap_servers: ${KAFKA_BOOTSTRAP_SERVERS}
efiacor5c0678f2023-03-06 09:21:57 +0000155 topic_name: &ves3gppPerformanceAssurance SEC_3GPP_PERFORMANCEASSURANCE_OUTPUT
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500156 perf3gpp:
efiacor5c0678f2023-03-06 09:21:57 +0000157 type: ${MESSAGING_TYPE}
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500158 kafka_info:
efiacor26c1f7a2022-04-25 13:27:18 +0100159 bootstrap_servers: ${KAFKA_BOOTSTRAP_SERVERS}
efiacor5c0678f2023-03-06 09:21:57 +0000160 topic_name: &perf3gpp HV_VES_PERF3GPP
161
162# Strimzi Kafka config
163kafkaUser:
164 acls:
165 - name: SEC_3GPP
166 type: topic
167 patternType: prefix
168 operations: [Write, DescribeConfigs]
169 - name: *perf3gpp
170 type: topic
171 operations: [Write, DescribeConfigs]
172
173kafkaTopic:
174 - name: *ves3gppFaultSupervision
175 strimziTopicName: dcae-ves-3gpp-fault-supervision
176 # the default retention values below can be updated
177 # to meet use case requirements for each topic.
178 retentionMs: 7200000
179 segmentBytes: 1073741824
180 - name: *ves3gppProvisioning
181 strimziTopicName: dcae-ves-3gpp-provisioning
182 - name: *ves3gppHeartbeat
183 strimziTopicName: dcae-ves-3gpp-heartbeat
184 - name: *ves3gppPerformanceAssurance
185 strimziTopicName: dcae-ves-3gpp-performance-assurance
186 - name: *perf3gpp
187 strimziTopicName: dcae-ves-3gpp-perf
188
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500189
190applicationEnv:
191 JAVA_OPTS: '-Dlogback.configurationFile=/etc/ONAP/dcae-hv-ves-collector/logback.xml'
Joanna Jeremicz616ea932021-09-06 14:25:04 +0200192 CBS_CLIENT_CONFIG_PATH: '/app-config-input/application_config.yaml'
rope2525a7fbee2022-07-25 20:00:36 +0100193 #Temporary Dummy CBS Port Value until internal SDK library is updated
194 CONFIG_BINDING_SERVICE_SERVICE_PORT: '0000'
efiacor5c0678f2023-03-06 09:21:57 +0000195 MESSAGING_TYPE: 'kafka'
efiacor26c1f7a2022-04-25 13:27:18 +0100196 KAFKA_BOOTSTRAP_SERVERS: '{{ include "common.release" . }}-strimzi-kafka-bootstrap:9092'
197 USE_SCRAM: 'true'
198 JAAS_CONFIG:
efiacor5c0678f2023-03-06 09:21:57 +0000199 externalSecret: true
200 externalSecretUid: '{{ include "common.name" . }}-ku'
efiacor26c1f7a2022-04-25 13:27:18 +0100201 key: sasl.jaas.config
Jack Lucasd41dbdb2021-02-16 11:07:28 -0500202
203# Resource Limit flavor -By Default using small
204flavor: small
205# Segregation for Different environment (Small and Large)
206resources:
207 small:
208 limits:
209 cpu: 2
210 memory: 2Gi
211 requests:
212 cpu: 1
213 memory: 1Gi
214 large:
215 limits:
216 cpu: 4
217 memory: 4Gi
218 requests:
219 cpu: 2
220 memory: 2Gi
221 unlimited: {}
farida azmycb03ac72021-09-12 16:14:12 +0200222
223#Pods Service Account
224serviceAccount:
efiacor5c0678f2023-03-06 09:21:57 +0000225 nameOverride: *commonName
farida azmycb03ac72021-09-12 16:14:12 +0200226 roles:
227 - read