Konrad Bańka | 5ea1db3 | 2020-04-06 14:32:46 +0200 | [diff] [blame] | 1 | # Copyright © 2020 Samsung Electronics |
vaibhav_16dec | e04b2fe | 2018-03-22 09:07:12 +0000 | [diff] [blame] | 2 | # Copyright © 2017 Amdocs, Bell Canada |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | # you may not use this file except in compliance with the License. |
| 6 | # You may obtain a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | # See the License for the specific language governing permissions and |
| 14 | # limitations under the License. |
| 15 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 16 | ################################################################# |
| 17 | # Global configuration defaults. |
| 18 | ################################################################# |
| 19 | global: |
| 20 | nodePortPrefix: 302 |
jmac | 0e4f717 | 2018-09-07 18:06:43 +0000 | [diff] [blame] | 21 | nodePortPrefixExt: 304 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 22 | repository: nexus3.onap.org:10001 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 23 | readinessRepository: oomk8s |
Mahendra Raghuwanshi | b76cb28 | 2019-04-09 10:13:07 +0000 | [diff] [blame] | 24 | readinessImage: readiness-check:2.0.2 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 25 | loggingRepository: docker.elastic.co |
| 26 | loggingImage: beats/filebeat:5.5.0 |
| 27 | persistence: |
| 28 | mountPath: /dockerdata-nfs |
Agarwal, Ruchira (ra1926) | ec7c75e | 2019-10-01 17:36:24 +0000 | [diff] [blame] | 29 | aafEnabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 30 | # envsusbt |
| 31 | envsubstImage: dibi/envsubst |
| 32 | mariadbGalera: |
| 33 | #This flag allows SO to instantiate its own mariadb-galera cluster |
| 34 | #If shared instance is used, this chart assumes that DB already exists |
| 35 | localCluster: false |
| 36 | service: mariadb-galera |
| 37 | internalPort: 3306 |
| 38 | nameOverride: mariadb-galera |
| 39 | |
| 40 | ################################################################# |
| 41 | # Secrets metaconfig |
| 42 | ################################################################# |
| 43 | secrets: |
| 44 | - uid: db-root-password |
| 45 | name: '{{ include "common.release" . }}-sdnc-db-root-password' |
| 46 | type: password |
Krzysztof Opasiak | ab7a6bb | 2020-03-24 03:30:51 +0100 | [diff] [blame] | 47 | externalSecret: '{{ .Values.global.mariadbGalera.localCluster | |
| 48 | ternary (default (include "common.mariadb.secret.rootPassSecretName" |
| 49 | (dict "dot" . "chartName" |
| 50 | (index .Values "mariadb-galera" "nameOverride"))) |
| 51 | (index .Values "mariadb-galera" "config" |
| 52 | "mariadbRootPasswordExternalSecret")) |
| 53 | (include "common.mariadb.secret.rootPassSecretName" |
| 54 | (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) }}' |
| 55 | password: '{{ (index .Values "mariadb-galera" "config" "mariadbRootPassword") }}' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 56 | - uid: db-secret |
| 57 | name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret' |
| 58 | type: basicAuth |
| 59 | # This is a nasty trick that allows you override this secret using external one |
| 60 | # with the same field that is used to pass this to subchart |
| 61 | externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "config" "userCredentialsExternalSecret")) .) (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "config" "userCredentialsExternalSecret"))}}' |
| 62 | login: '{{ index .Values "mariadb-galera" "config" "userName" }}' |
| 63 | password: '{{ index .Values "mariadb-galera" "config" "userPassword" }}' |
| 64 | - uid: odl-creds |
| 65 | name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds' |
| 66 | type: basicAuth |
| 67 | externalSecret: '{{ .Values.config.odlCredsExternalSecret }}' |
| 68 | login: '{{ .Values.config.odlUser }}' |
| 69 | password: '{{ .Values.config.odlPassword }}' |
| 70 | # For now this is left hardcoded but should be revisited in a future |
| 71 | passwordPolicy: required |
| 72 | - uid: aaf-creds |
| 73 | type: basicAuth |
| 74 | externalSecret: '{{ ternary (tpl (default "" .Values.aaf_init.aafDeployCredsExternalSecret) .) "aafIsDiabled" .Values.global.aafEnabled }}' |
| 75 | login: '{{ .Values.aaf_init.deploy_fqi }}' |
| 76 | password: '{{ .Values.aaf_init.deploy_pass }}' |
| 77 | passwordPolicy: required |
| 78 | - uid: netbox-apikey |
| 79 | type: password |
| 80 | externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}' |
| 81 | password: '{{ .Values.config.netboxApikey }}' |
| 82 | passwordPolicy: required |
| 83 | - uid: aai-user-creds |
| 84 | type: basicAuth |
| 85 | externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}' |
| 86 | login: '{{ .Values.config.aaiUser }}' |
| 87 | password: '{{ .Values.config.aaiPassword }}' |
| 88 | passwordPolicy: required |
| 89 | - uid: modeling-user-creds |
| 90 | type: basicAuth |
| 91 | externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}' |
| 92 | login: '{{ .Values.config.modelingUser }}' |
| 93 | password: '{{ .Values.config.modelingPassword }}' |
| 94 | passwordPolicy: required |
| 95 | - uid: restconf-creds |
| 96 | type: basicAuth |
| 97 | externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}' |
| 98 | login: '{{ .Values.config.restconfUser }}' |
| 99 | password: '{{ .Values.config.restconfPassword }}' |
| 100 | passwordPolicy: required |
| 101 | - uid: ansible-creds |
| 102 | name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds' |
| 103 | type: basicAuth |
| 104 | externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}' |
| 105 | login: '{{ .Values.config.ansibleUser }}' |
| 106 | password: '{{ .Values.config.ansiblePassword }}' |
| 107 | passwordPolicy: required |
| 108 | - uid: scaleout-creds |
| 109 | type: basicAuth |
| 110 | externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}' |
| 111 | login: '{{ .Values.config.scaleoutUser }}' |
| 112 | password: '{{ .Values.config.scaleoutPassword }}' |
| 113 | passwordPolicy: required |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 114 | |
| 115 | ################################################################# |
| 116 | # Application configuration defaults. |
| 117 | ################################################################# |
| 118 | # application images |
| 119 | repository: nexus3.onap.org:10001 |
| 120 | pullPolicy: Always |
Dan Timoney | d0f6ad7 | 2020-03-06 11:58:23 -0500 | [diff] [blame] | 121 | image: onap/sdnc-image:1.8.0 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 122 | |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 123 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 124 | # flag to enable debugging - application support required |
| 125 | debugEnabled: false |
| 126 | |
| 127 | # application configuration |
BorislavG | 5f3b619 | 2018-03-25 18:12:38 +0300 | [diff] [blame] | 128 | config: |
Timoney, Dan (dt5972) | ba4d2eb | 2019-05-07 13:32:42 -0400 | [diff] [blame] | 129 | odlUid: 100 |
| 130 | odlGid: 101 |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 131 | odlUser: admin |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 132 | odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 133 | # odlCredsExternalSecret: some secret |
| 134 | netboxApikey: onceuponatimeiplayedwithnetbox20180814 |
| 135 | # netboxApikeyExternalSecret: some secret |
| 136 | aaiUser: sdnc@sdnc.onap.org |
| 137 | aaiPassword: demo123456! |
| 138 | # aaiCredsExternalSecret: some secret |
| 139 | modelingUser: ccsdkapps |
| 140 | modelingPassword: ccsdkapps |
| 141 | # modelingCredsExternalSecret: some secret |
| 142 | restconfUser: admin |
| 143 | restconfPassword: admin |
| 144 | # restconfCredsExternalSecret: some secret |
| 145 | scaleoutUser: admin |
| 146 | scaleoutPassword: admin |
| 147 | # scaleoutExternalSecret: some secret |
| 148 | ansibleUser: sdnc |
| 149 | ansiblePassword: sdnc |
| 150 | # ansibleCredsExternalSecret: some secret |
| 151 | dbSdnctlDatabase: &sdncDbName sdnctl |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 152 | enableClustering: true |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 153 | sdncHome: /opt/onap/sdnc |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 154 | binDir: /opt/onap/sdnc/bin |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 155 | etcDir: /opt/onap/sdnc/data |
Trevor Tait | 567ff1e | 2018-05-01 16:20:54 -0400 | [diff] [blame] | 156 | geoEnabled: false |
Neha Jain | 7b0d6c6 | 2018-05-17 14:34:49 -0400 | [diff] [blame] | 157 | # if geoEnabled is set to true here, mysql.geoEnabled must be set to true |
Trevor Tait | 567ff1e | 2018-05-01 16:20:54 -0400 | [diff] [blame] | 158 | # if geoEnabled is set to true the following 3 values must be set to their proper values |
| 159 | myODLCluster: 127.0.0.1 |
| 160 | peerODLCluster: 127.0.0.1 |
Mohammadreza Pasandideh | b642ee5 | 2018-06-19 15:19:53 -0400 | [diff] [blame] | 161 | isPrimaryCluster: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 162 | configDir: /opt/onap/sdnc/data/properties |
Konrad Bańka | 5ea1db3 | 2020-04-06 14:32:46 +0200 | [diff] [blame] | 163 | ccsdkConfigDir: /opt/onap/ccsdk/data/properties |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 164 | dmaapTopic: SUCCESS |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 165 | dmaapPort: 3904 |
BorislavG | 5f3b619 | 2018-03-25 18:12:38 +0300 | [diff] [blame] | 166 | logstashServiceName: log-ls |
| 167 | logstashPort: 5044 |
jmac | 7c43467 | 2018-05-11 20:14:17 +0000 | [diff] [blame] | 168 | ansibleServiceName: sdnc-ansible-server |
| 169 | ansiblePort: 8000 |
Timoney, Dan (dt5972) | 6819bc9 | 2019-02-12 13:30:49 -0500 | [diff] [blame] | 170 | javaHome: /usr/lib/jvm/java-1.8-openjdk |
jmac | 7c43467 | 2018-05-11 20:14:17 +0000 | [diff] [blame] | 171 | |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 172 | odl: |
| 173 | etcDir: /opt/opendaylight/etc |
| 174 | binDir: /opt/opendaylight/bin |
| 175 | salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config |
| 176 | salConfigVersion: 1.8.2 |
| 177 | akka: |
| 178 | seedNodeTimeout: 15s |
| 179 | circuitBreaker: |
| 180 | maxFailures: 10 |
| 181 | callTimeout: 90s |
| 182 | resetTimeout: 30s |
| 183 | recoveryEventTimeout: 90s |
| 184 | datastore: |
| 185 | persistentActorRestartMinBackoffInSeconds: 10 |
| 186 | persistentActorRestartMaxBackoffInSeconds: 40 |
| 187 | persistentActorRestartResetBackoffInSeconds: 20 |
| 188 | shardTransactionCommitTimeoutInSeconds: 120 |
| 189 | shardIsolatedLeaderCheckIntervalInMillis: 30000 |
| 190 | operationTimeoutInSeconds: 120 |
| 191 | javaOptions: |
| 192 | maxGCPauseMillis: 100 |
| 193 | parallelGCThreads : 3 |
| 194 | numberGGLogFiles: 10 |
| 195 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 196 | # dependency / sub-chart configuration |
Agarwal, Ruchira (ra1926) | ec7c75e | 2019-10-01 17:36:24 +0000 | [diff] [blame] | 197 | aaf_init: |
| 198 | agentImage: onap/aaf/aaf_agent:2.1.15 |
| 199 | app_ns: "org.osaaf.aaf" |
| 200 | fqi: "sdnc@sdnc.onap.org" |
| 201 | fqdn: "sdnc" |
| 202 | public_fqdn: "sdnc.onap.org" |
| 203 | deploy_fqi: "deployer@people.osaaf.org" |
| 204 | deploy_pass: "demo123456!" |
| 205 | cadi_latitude: "38.0" |
| 206 | cadi_longitude: "-72.0" |
| 207 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 208 | mariadb-galera: &mariadbGalera |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 209 | nameOverride: sdnc-db |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 210 | config: &mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 211 | rootPasswordExternalSecret: '{{ ternary (include "common.release" .)-sdnc-db-root-password "" .Values.global.mariadbGalera.localCluster }}' |
| 212 | userName: sdnctl |
| 213 | userCredentialsExternalSecret: *dbSecretName |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 214 | service: |
| 215 | name: sdnc-dbhost |
jmac | bc92d13 | 2018-04-07 03:46:12 +0000 | [diff] [blame] | 216 | internalPort: 3306 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 217 | sdnctlPrefix: sdnc |
| 218 | persistence: |
Mahendra Raghuwanshi | b76cb28 | 2019-04-09 10:13:07 +0000 | [diff] [blame] | 219 | mountSubPath: sdnc/mariadb-galera |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 220 | enabled: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 221 | replicaCount: 1 |
| 222 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 223 | cds: |
| 224 | enabled: false |
| 225 | |
| 226 | dmaap-listener: |
| 227 | nameOverride: sdnc-dmaap-listener |
| 228 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 229 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 230 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 231 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 232 | mysqlDatabase: *sdncDbName |
| 233 | config: |
| 234 | sdncChartName: sdnc |
| 235 | dmaapPort: 3904 |
| 236 | sdncPort: 8282 |
| 237 | configDir: /opt/onap/sdnc/data/properties |
| 238 | odlCredsExternalSecret: *odlCredsSecretName |
| 239 | |
| 240 | ueb-listener: |
| 241 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 242 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 243 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 244 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 245 | mysqlDatabase: *sdncDbName |
| 246 | nameOverride: sdnc-ueb-listener |
| 247 | config: |
| 248 | sdncPort: 8282 |
| 249 | sdncChartName: sdnc |
| 250 | configDir: /opt/onap/sdnc/data/properties |
| 251 | odlCredsExternalSecret: *odlCredsSecretName |
| 252 | |
| 253 | sdnc-portal: |
| 254 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 255 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 256 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 257 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 258 | mysqlDatabase: *sdncDbName |
| 259 | config: |
| 260 | sdncChartName: sdnc |
| 261 | configDir: /opt/onap/sdnc/data/properties |
| 262 | odlCredsExternalSecret: *odlCredsSecretName |
| 263 | |
| 264 | sdnc-ansible-server: |
| 265 | config: |
| 266 | restCredsExternalSecret: *ansibleSecretName |
| 267 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 268 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 269 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 270 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 271 | mysqlDatabase: ansible |
| 272 | service: |
| 273 | name: sdnc-ansible-server |
| 274 | internalPort: 8000 |
| 275 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 276 | dgbuilder: |
| 277 | nameOverride: sdnc-dgbuilder |
| 278 | config: |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 279 | db: |
| 280 | dbName: *sdncDbName |
| 281 | rootPasswordExternalSecret: '{{ ternary (printf "%s-sdnc-db-root-password" (include "common.release" .)) (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" "mariadb-galera")) .Values.global.mariadbGalera.localCluster }}' |
| 282 | userCredentialsExternalSecret: *dbSecretName |
Mahendra Raghuwanshi | b76cb28 | 2019-04-09 10:13:07 +0000 | [diff] [blame] | 283 | dbPodName: mariadb-galera |
| 284 | dbServiceName: mariadb-galera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 285 | # This should be revisited and changed to plain text |
jmac | 70863e1 | 2018-05-16 14:53:03 +0000 | [diff] [blame] | 286 | dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5 |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 287 | mariadb-galera: |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 288 | service: |
BorislavG | 1ffbd99 | 2018-04-24 07:56:27 +0000 | [diff] [blame] | 289 | name: sdnc-dgbuilder |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 290 | nodePort: "03" |
| 291 | |
| 292 | # default number of instances |
| 293 | replicaCount: 1 |
| 294 | |
| 295 | nodeSelector: {} |
| 296 | |
| 297 | affinity: {} |
| 298 | |
| 299 | # probe configuration parameters |
| 300 | liveness: |
| 301 | initialDelaySeconds: 10 |
| 302 | periodSeconds: 10 |
| 303 | # necessary to disable liveness probe when setting breakpoints |
| 304 | # in debugger so K8s doesn't restart unresponsive container |
| 305 | enabled: true |
| 306 | |
| 307 | readiness: |
| 308 | initialDelaySeconds: 10 |
| 309 | periodSeconds: 10 |
| 310 | |
| 311 | service: |
| 312 | type: NodePort |
| 313 | name: sdnc |
BorislavG | 1ffbd99 | 2018-04-24 07:56:27 +0000 | [diff] [blame] | 314 | portName: sdnc |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 315 | internalPort: 8181 |
| 316 | internalPort2: 8101 |
| 317 | internalPort3: 8080 |
Timoney, Dan (dt5972) | c6de269 | 2019-08-14 14:22:37 -0400 | [diff] [blame] | 318 | internalPort4: 8443 |
Mohammadreza Pasandideh | b756fb7 | 2018-04-03 10:06:45 -0400 | [diff] [blame] | 319 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 320 | #port |
| 321 | externalPort: 8282 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 322 | |
| 323 | externalPort2: 8202 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 324 | |
| 325 | externalPort3: 8280 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 326 | |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 327 | externalPort4: 8443 |
| 328 | nodePort4: 67 |
| 329 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 330 | clusterPort: 2550 |
Mohammadreza Pasandideh | b756fb7 | 2018-04-03 10:06:45 -0400 | [diff] [blame] | 331 | clusterPort2: 2650 |
| 332 | clusterPort3: 2681 |
| 333 | |
| 334 | geoNodePort1: 61 |
| 335 | geoNodePort2: 62 |
| 336 | geoNodePort3: 63 |
| 337 | geoNodePort4: 64 |
| 338 | geoNodePort5: 65 |
| 339 | geoNodePort6: 66 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 340 | |
jmac | 8d6dc96 | 2018-04-26 14:26:55 +0000 | [diff] [blame] | 341 | ## Persist data to a persitent volume |
| 342 | persistence: |
| 343 | enabled: true |
| 344 | |
| 345 | ## A manually managed Persistent Volume and Claim |
| 346 | ## Requires persistence.enabled: true |
| 347 | ## If defined, PVC must be created manually before volume will be bound |
| 348 | # existingClaim: |
| 349 | volumeReclaimPolicy: Retain |
| 350 | |
| 351 | ## database data Persistent Volume Storage Class |
| 352 | ## If defined, storageClassName: <storageClass> |
| 353 | ## If set to "-", storageClassName: "", which disables dynamic provisioning |
| 354 | ## If undefined (the default) or set to null, no storageClassName spec is |
| 355 | ## set, choosing the default provisioner. (gp2 on AWS, standard on |
| 356 | ## GKE, AWS & OpenStack) |
| 357 | accessMode: ReadWriteOnce |
| 358 | size: 1Gi |
| 359 | mountPath: /dockerdata-nfs |
| 360 | mountSubPath: sdnc/mdsal |
| 361 | mdsalPath: /opt/opendaylight/current/daexim |
| 362 | |
Rahul Tyagi | 44cc1ac | 2019-03-02 06:15:35 +0000 | [diff] [blame] | 363 | certpersistence: |
| 364 | enabled: true |
| 365 | |
| 366 | ## A manually managed Persistent Volume and Claim |
| 367 | ## Requires persistence.enabled: true |
| 368 | ## If defined, PVC must be created manually before volume will be bound |
| 369 | # existingClaim: |
| 370 | |
| 371 | volumeReclaimPolicy: Retain |
| 372 | accessMode: ReadWriteOnce |
| 373 | size: 50Mi |
| 374 | mountPath: /dockerdata-nfs |
| 375 | mountSubPath: sdnc/certs |
Agarwal, Ruchira (ra1926) | ec7c75e | 2019-10-01 17:36:24 +0000 | [diff] [blame] | 376 | certPath: /opt/app/osaaf |
Rahul Tyagi | 44cc1ac | 2019-03-02 06:15:35 +0000 | [diff] [blame] | 377 | ##storageClass: "manual" |
| 378 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 379 | ingress: |
| 380 | enabled: false |
Lucjan Bryndza | 0844840 | 2019-11-27 14:26:54 +0100 | [diff] [blame] | 381 | service: |
| 382 | - baseaddr: "sdnc" |
| 383 | name: "sdnc" |
| 384 | port: 8443 |
| 385 | config: |
| 386 | ssl: "redirect" |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 387 | |
toshrajbhardwaj | 72b5f0f | 2018-09-13 02:45:22 +0000 | [diff] [blame] | 388 | #Resource Limit flavor -By Default using small |
| 389 | flavor: small |
| 390 | #segregation for different envionment (Small and Large) |
| 391 | |
| 392 | resources: |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 393 | small: |
| 394 | limits: |
| 395 | cpu: 2 |
| 396 | memory: 4Gi |
| 397 | requests: |
Mandeep Khinda | 3c13425 | 2018-09-19 23:56:37 +0000 | [diff] [blame] | 398 | cpu: 1 |
| 399 | memory: 2Gi |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 400 | large: |
| 401 | limits: |
| 402 | cpu: 4 |
| 403 | memory: 8Gi |
| 404 | requests: |
Mandeep Khinda | 3c13425 | 2018-09-19 23:56:37 +0000 | [diff] [blame] | 405 | cpu: 2 |
| 406 | memory: 4Gi |
Mandeep Khinda | 60d36d4 | 2018-09-24 15:15:48 +0000 | [diff] [blame] | 407 | unlimited: {} |