blob: c25293894321bf010ed5a980c3fb3b9f80dcfe8e [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
seshukm0df1f8e2020-08-17 21:45:49 +05302# Copyright © 2020 Huawei
Sylvain Desbureauxd3114052021-02-23 16:45:52 +01003# Copyright © 2021 Orange
egernugd3c55ab2023-01-19 15:50:37 +00004# Modifications Copyright © 2023 Nordix Foundation
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00005# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000016#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
21 nodePortPrefixExt: 304
Maciej Wereskidf9ba222021-11-05 14:38:18 +000022 centralizedLoggingEnabled: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000023 mariadbGalera:
24 nameOverride: mariadb-galera
rope2524d3f3682020-09-02 20:49:21 +010025 servicePort: '3306'
Andreas Geissler576de2d2023-10-24 15:38:01 +020026 service: mariadb-galera
krishnaa9692b606b2020-10-30 11:29:21 +053027 internalPort: '3306'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010028 # mariadbRootPassword: secretpassword
29 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053030 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000031 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
32 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000033 persistence:
34 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020035 #This configuration specifies Service and port for SDNC OAM interface
36 sdncOamService: sdnc-oam
37 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000038 #This configuration will run the migration. The configurations are for backing up the data
39 #from DB and then restoring it to the present versions preferred DB.
40 migration:
41 enabled: false
42 dbHost: mariadb-galera
43 dbPort: 3306
44 dbUser: root
45 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010046 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000047 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000048 app:
49 siteName: onapheat
50 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
51 defaultCloudOwner: onap
sekharhuawei2e799e92020-11-14 17:06:56 +053052
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010053readinessCheck:
54 wait_for:
Prabhjot Singh Sethi46e17562021-08-20 22:40:23 +053055 jobs:
56 - '{{ include "common.release" . }}-so-mariadb-config-job'
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010057
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010058#################################################################
59# Secrets metaconfig
60#################################################################
61secrets:
62 - uid: db-root-pass
63 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
64 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010065 externalSecret: '{{ .Values.global.mariadbGalera.localCluster | ternary
66 .Values.global.mariadbGalera.rootPasswordExternalSecret
67 (default (include "common.mariadb.secret.rootPassSecretName"
68 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride))
69 .Values.global.mariadbGalera.rootPasswordExternalSecret) }}'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010070 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
71 - uid: db-backup-creds
72 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
73 type: basicAuth
74 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
75 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
76 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
77 passwordPolicy: required
78 annotations:
79 helm.sh/hook: pre-upgrade,pre-install
rope2524d3f3682020-09-02 20:49:21 +010080 helm.sh/hook-weight: '0'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010081 helm.sh/hook-delete-policy: before-hook-creation
82 - uid: db-user-creds
83 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
84 type: basicAuth
85 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
86 login: '{{ .Values.dbCreds.userName }}'
87 password: '{{ .Values.dbCreds.userPassword }}'
88 passwordPolicy: generate
89 - uid: db-admin-creds
90 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
91 type: basicAuth
92 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
93 login: '{{ .Values.dbCreds.adminName }}'
94 password: '{{ .Values.dbCreds.adminPassword }}'
95 passwordPolicy: generate
sekharhuawei2e799e92020-11-14 17:06:56 +053096 - uid: 'mso-key'
Priyadharshini7dc03852020-08-27 04:36:03 -070097 name: &mso-key '{{ include "common.release" . }}-mso-key'
98 type: password
sekharhuawei2e799e92020-11-14 17:06:56 +053099 password: '{{ .Values.mso.msoKey }}'
Priyadharshini7dc03852020-08-27 04:36:03 -0700100 - uid: mso-oof-auth
101 name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
102 type: basicAuth
103 login: '{{ .Values.mso.oof.login }}'
104 password: '{{ .Values.mso.oof.password }}'
105 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530106 - uid: server-actuator-creds
107 name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
108 type: basicAuth
109 externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
110 login: '{{ .Values.server.actuator.username }}'
111 password: '{{ .Values.server.actuator.password }}'
112 passwordPolicy: required
113 - uid: server-bpel-creds
114 name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
115 type: basicAuth
116 externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
117 login: '{{ .Values.server.bpel.username }}'
118 password: '{{ .Values.server.bpel.password }}'
119 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530120 - uid: so-aai-creds
121 name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
122 type: basicAuth
123 externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
124 login: '{{ .Values.server.aai.username }}'
125 password: '{{ .Values.server.aai.password }}'
126 passwordPolicy: required
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100127
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100128##################################################################
jmacc4f04d32018-10-12 18:24:24 +0000129# Application configuration defaults.
130#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100131
132dbSecrets: &dbSecrets
133 userCredsExternalSecret: *dbUserCredsSecretName
134 adminCredsExternalSecret: *dbAdminCredsSecretName
135
136# unused in this, just to pass to subcharts
137dbCreds:
138 userName: so_user
139 adminName: so_admin
140
Lukasz Rajewski743dca92023-06-12 07:28:58 +0000141image: onap/so/api-handler-infra:1.12.2
sekharhuawei2e799e92020-11-14 17:06:56 +0530142
143server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530144 aai:
145 username: aai@aai.onap.org
146 password: demo123456!
147 # aaiCredsExternalSecret: some secret
148 actuator:
149 username: mso_admin
150 password: password1$
151 # actuatorCredsExternalSecret: some secret
152 bpel:
153 username: bpel
154 password: password1$
155 # bpelCredsExternalSecret: some secret
156
jmacc4f04d32018-10-12 18:24:24 +0000157pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000158replicaCount: 1
159minReadySeconds: 10
seshukm0df1f8e2020-08-17 21:45:49 +0530160containerPort: &containerPort 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000161logPath: ./logs/apih/
162app: api-handler-infra
163service:
seshukm0df1f8e2020-08-17 21:45:49 +0530164 type: NodePort
seshukm0df1f8e2020-08-17 21:45:49 +0530165 internalPort: *containerPort
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100166 ports:
167 - name: http
168 port: *containerPort
169 nodePort: '77'
170 annotations:
171 msb.onap.org/service-info: |
172 {{ if .Values.global.msbEnabled -}}[
173 {
174 "serviceName": "so",
175 "version": "v1",
176 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
177 "protocol": "REST",
178 "port": "{{ .Values.service.internalPort }}",
179 "visualRange":"0",
180 "lb_policy":"ip_hash"
181 },
182 {
183 "serviceName": "so",
184 "version": "v1",
185 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
186 "protocol": "REST",
187 "port": "{{ .Values.service.internalPort }}",
188 "visualRange":"0",
189 "lb_policy":"ip_hash"
190 },
191 {
192 "serviceName": "so",
193 "version": "v1",
194 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
195 "protocol": "REST",
196 "port": "{{ .Values.service.internalPort }}",
197 "visualRange":"0",
198 "lb_policy":"ip_hash"
199 },
200 {
201 "serviceName": "so",
202 "version": "v1",
203 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
204 "protocol": "REST",
205 "port": "{{ .Values.service.internalPort }}",
206 "visualRange":"0",
207 "lb_policy":"ip_hash"
208 },
209 {
210 "serviceName": "so",
211 "version": "v1",
212 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
213 "protocol": "REST",
214 "port": "{{ .Values.service.internalPort }}",
215 "visualRange":"0",
216 "lb_policy":"ip_hash"
217 },
218 {
219 "serviceName": "so",
220 "version": "v1",
221 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
222 "protocol": "REST",
223 "port": "{{ .Values.service.internalPort }}",
224 "visualRange":"0",
225 "lb_policy":"ip_hash"
226 },
227 {
228 "serviceName": "so",
229 "version": "v1",
230 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
231 "protocol": "REST",
232 "port": "{{ .Values.service.internalPort }}",
233 "visualRange":"0",
234 "lb_policy":"ip_hash"
235 },
236 {
237 "serviceName": "so",
238 "version": "v1",
239 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
240 "protocol": "REST",
241 "port": "{{ .Values.service.internalPort }}",
242 "visualRange":"0",
243 "lb_policy":"ip_hash"
244 },
245 {
246 "serviceName": "so",
247 "version": "v1",
248 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
249 "protocol": "REST",
250 "port": "{{ .Values.service.internalPort }}",
251 "visualRange":"0",
252 "lb_policy":"ip_hash"
253 },
254 {
255 "serviceName": "so",
256 "version": "v1",
257 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
258 "protocol": "REST",
259 "port": "{{ .Values.service.internalPort }}",
260 "visualRange":"0",
261 "lb_policy":"ip_hash"
262 },
263 {
264 "serviceName": "so",
265 "version": "v1",
266 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
267 "protocol": "REST",
268 "port": "{{ .Values.service.internalPort }}",
269 "visualRange":"0",
270 "lb_policy":"ip_hash"
271 },
272 {
273 "serviceName": "so",
274 "version": "v1",
275 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
276 "protocol": "REST",
277 "port": "{{ .Values.service.internalPort }}",
278 "visualRange":"0",
279 "lb_policy":"ip_hash"
280 },
281 {
282 "serviceName": "so",
283 "version": "v1",
284 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
285 "protocol": "REST",
286 "port": "{{ .Values.service.internalPort }}",
287 "visualRange":"0",
288 "lb_policy":"ip_hash"
289 },
290 {
291 "serviceName": "so",
292 "version": "v1",
293 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
294 "protocol": "REST",
295 "port": "{{ .Values.service.internalPort }}",
296 "visualRange":"0",
297 "lb_policy":"ip_hash"
298 },
299 {
300 "serviceName": "so",
301 "version": "v1",
302 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
303 "protocol": "REST",
304 "port": "{{ .Values.service.internalPort }}",
305 "visualRange":"0",
306 "lb_policy":"ip_hash"
307 },
308 {
309 "serviceName": "so",
310 "version": "v1",
311 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
312 "protocol": "REST",
313 "port": "{{ .Values.service.internalPort }}",
314 "visualRange":"0",
315 "lb_policy":"ip_hash"
316 },
317 {
318 "serviceName": "so",
319 "version": "v1",
320 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
321 "protocol": "REST",
322 "port": "{{ .Values.service.internalPort }}",
323 "visualRange":"0",
324 "lb_policy":"ip_hash"
325 },
326 {
327 "serviceName": "so",
328 "version": "v1",
329 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
330 "protocol": "REST",
331 "port": "{{ .Values.service.internalPort }}",
332 "visualRange":"0",
333 "lb_policy":"ip_hash"
334 },
335 {
336 "serviceName": "so",
337 "version": "v1",
338 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
339 "protocol": "REST",
340 "port": "{{ .Values.service.internalPort }}",
341 "visualRange":"0",
342 "lb_policy":"ip_hash"
343 },
344 {
345 "serviceName": "so",
346 "version": "v1",
347 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
348 "protocol": "REST",
349 "port": "{{ .Values.service.internalPort }}",
350 "visualRange":"0",
351 "lb_policy":"ip_hash"
352 },
353 {
354 "serviceName": "so",
355 "version": "v1",
356 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
357 "protocol": "REST",
358 "port": "{{ .Values.service.internalPort }}",
359 "visualRange":"0",
360 "lb_policy":"ip_hash"
361 },
362 {
363 "serviceName": "so",
364 "version": "v1",
365 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
366 "protocol": "REST",
367 "port": "{{ .Values.service.internalPort }}",
368 "visualRange":"0",
369 "lb_policy":"ip_hash"
370 },
371 {
372 "serviceName": "so",
373 "version": "v1",
374 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
375 "protocol": "REST",
376 "port": "{{ .Values.service.internalPort }}",
377 "visualRange":"0",
378 "lb_policy":"ip_hash"
379 },
380 {
381 "serviceName": "so",
382 "version": "v1",
383 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
384 "protocol": "REST",
385 "port": "{{ .Values.service.internalPort }}",
386 "visualRange":"0",
387 "lb_policy":"ip_hash"
388 },
389 {
390 "serviceName": "so",
391 "version": "v1",
392 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
393 "protocol": "REST",
394 "port": "{{ .Values.service.internalPort }}",
395 "visualRange":"0",
396 "lb_policy":"ip_hash"
397 },
398 {
399 "serviceName": "so",
400 "version": "v1",
401 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
402 "protocol": "REST",
403 "port": "{{ .Values.service.internalPort }}",
404 "visualRange":"0",
405 "lb_policy":"ip_hash"
406 },
407 {
408 "serviceName": "so",
409 "version": "v1",
410 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
411 "protocol": "REST",
412 "port": "{{ .Values.service.internalPort }}",
413 "visualRange":"0",
414 "lb_policy":"ip_hash"
415 },
416 {
417 "serviceName": "so",
418 "version": "v1",
419 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
420 "protocol": "REST",
421 "port": "{{ .Values.service.internalPort }}",
422 "visualRange":"0",
423 "lb_policy":"ip_hash"
424 },
425 {
426 "serviceName": "so",
427 "version": "v1",
428 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
429 "protocol": "REST",
430 "port": "{{ .Values.service.internalPort }}",
431 "visualRange":"0",
432 "lb_policy":"ip_hash"
433 },
434 {
435 "serviceName": "so",
436 "version": "v1",
437 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
438 "protocol": "REST",
439 "port": "{{ .Values.service.internalPort }}",
440 "visualRange":"0",
441 "lb_policy":"ip_hash"
442 },
443 {
444 "serviceName": "so",
445 "version": "v1",
446 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
447 "protocol": "REST",
448 "port": "{{ .Values.service.internalPort }}",
449 "visualRange":"0",
450 "lb_policy":"ip_hash"
451 },
452 {
453 "serviceName": "so",
454 "version": "v1",
455 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
456 "protocol": "REST",
457 "port": "{{ .Values.service.internalPort }}",
458 "visualRange":"0",
459 "lb_policy":"ip_hash"
460 },
461 {
462 "serviceName": "so",
463 "version": "v1",
464 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
465 "protocol": "REST",
466 "port": "{{ .Values.service.internalPort }}",
467 "visualRange":"0",
468 "lb_policy":"ip_hash"
469 },
470 {
471 "serviceName": "so",
472 "version": "v1",
473 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
474 "protocol": "REST",
475 "port": "{{ .Values.service.internalPort }}",
476 "visualRange":"0",
477 "lb_policy":"ip_hash"
478 },
479 {
480 "serviceName": "so",
481 "version": "v1",
482 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
483 "protocol": "REST",
484 "port": "{{ .Values.service.internalPort }}",
485 "visualRange":"0",
486 "lb_policy":"ip_hash"
487 },
488 {
489 "serviceName": "so",
490 "version": "v1",
491 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
492 "protocol": "REST",
493 "port": "{{ .Values.service.internalPort }}",
494 "visualRange":"0",
495 "lb_policy":"ip_hash"
496 },
497 {
498 "serviceName": "so",
499 "version": "v1",
500 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
501 "protocol": "REST",
502 "port": "{{ .Values.service.internalPort }}",
503 "visualRange":"0",
504 "lb_policy":"ip_hash"
505 },
506 {
507 "serviceName": "so",
508 "version": "v1",
509 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
510 "protocol": "REST",
511 "port": "{{ .Values.service.internalPort }}",
512 "visualRange":"0",
513 "lb_policy":"ip_hash"
514 },
515 {
516 "serviceName": "so",
517 "version": "v1",
518 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
519 "protocol": "REST",
520 "port": "{{ .Values.service.internalPort }}",
521 "visualRange":"0",
522 "lb_policy":"ip_hash"
523 },
524 {
525 "serviceName": "so",
526 "version": "v1",
527 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
528 "protocol": "REST",
529 "port": "{{ .Values.service.internalPort }}",
530 "visualRange":"0",
531 "lb_policy":"ip_hash"
532 }
533 ]{{ end }}
534
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000535updateStrategy:
seshukm0df1f8e2020-08-17 21:45:49 +0530536 type: RollingUpdate
537 maxUnavailable: 1
538 maxSurge: 1
539
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100540################################################################
seshukm0df1f8e2020-08-17 21:45:49 +0530541# soHelpers part
542#################################################################
543soHelpers:
seshukm0df1f8e2020-08-17 21:45:49 +0530544 containerPort: *containerPort
545
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400546# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000547flavor: small
548# Segregation for Different environment (Small and Large)
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000549resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000550 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000551 limits:
vladimir turokdb8167b2023-09-20 11:09:21 +0200552 cpu: 1
vaibhav16dec0da88292018-08-13 06:10:27 +0000553 memory: 4Gi
554 requests:
Andreas Geissler555db9c2023-06-20 11:38:39 +0200555 cpu: 0.5
vaibhav16dec0da88292018-08-13 06:10:27 +0000556 memory: 1Gi
557 large:
558 limits:
vladimir turokdb8167b2023-09-20 11:09:21 +0200559 cpu: 2
vaibhav16dec0da88292018-08-13 06:10:27 +0000560 memory: 8Gi
561 requests:
Andreas Geissler555db9c2023-06-20 11:38:39 +0200562 cpu: 1
vaibhav16dec0da88292018-08-13 06:10:27 +0000563 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000564 unlimited: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000565
Mike Elliottd32d36e2018-02-12 15:54:03 -0500566nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500567affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000568
sunilb0a97ab22020-02-25 10:18:48 +0530569# application configuration
570config:
571 logstashServiceName: log-ls
572 logstashPort: 5044
Marcin Wilkad9b3762021-10-13 18:20:43 +0200573 # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
574 openStackKeystoneVersion: "KEYSTONE"
sunilb0a97ab22020-02-25 10:18:48 +0530575
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000576#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
577#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
578# --set so.global.mariadbGalera.localCluster=true \
579# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
580# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
581mariadb-galera:
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100582 rootUser:
583 externalSecret: *dbRootPassSecretName
584 nameOverride: &so-mariadb so-mariadb-galera
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000585 replicaCount: 1
Andreas Geisslercfd84342023-08-16 17:18:49 +0200586 mariadbOperator:
587 galera:
588 enabled: false
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000589 persistence:
590 mountSubPath: so/mariadb-galera/data
591 enabled: true
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100592 serviceAccount:
593 nameOverride: *so-mariadb
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200594
595ingress:
596 enabled: false
597 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200598 - baseaddr: 'so-api'
rope2524d3f3682020-09-02 20:49:21 +0100599 name: 'so'
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200600 port: 8080
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000601
AndrewLambc58d4c22023-03-09 11:03:31 +0000602serviceMesh:
603 authorizationPolicy:
604 authorizedPrincipals:
605 - serviceAccount: consul-read
606 - serviceAccount: consul-server-read
607 - serviceAccount: nbi-read
AndrewLambab2704a2023-04-05 14:45:11 +0100608 - serviceAccount: policy-drools-pdp-read
609 - serviceAccount: so-bpmn-infra-read
610 - serviceAccount: robot-read
AndrewLambc58d4c22023-03-09 11:03:31 +0000611 - serviceAccount: istio-ingress
612 namespace: istio-ingress
613
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000614mso:
615 adapters:
616 requestDb:
617 auth: Basic YnBlbDpwYXNzd29yZDEk
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000618 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
sekharhuawei2e799e92020-11-14 17:06:56 +0530619 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000620 sdc:
621 client:
622 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
623 aai:
624 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
Priyadharshini7dc03852020-08-27 04:36:03 -0700625 oof:
626 login: test
627 password: testpwd
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000628 so:
629 operationalEnv:
630 dmaap:
631 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
632 health:
633 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100634
seshukm0df1f8e2020-08-17 21:45:49 +0530635so-bpmn-infra:
636 db:
637 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000638 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100639
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000640so-catalog-db-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530641 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100642 db:
643 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100644
sekharhuawei2e799e92020-11-14 17:06:56 +0530645so-cnf-adapter:
646 enabled: true
647 db:
648 <<: *dbSecrets
649 server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530650 aaiCredsExternalSecret: *aai-secrets
651 actuatorCredsExternalSecret: *actuator-secrets
652 mso:
653 msoKeySecret: *mso-key
654
egernugd3c55ab2023-01-19 15:50:37 +0000655so-cnfm-lcm:
656 enabled: true
657 db:
658 <<: *dbSecrets
659
AndrewLamb8e090442020-10-15 09:28:09 +0100660so-etsi-nfvo-ns-lcm:
661 enabled: true
rope2524d3f3682020-09-02 20:49:21 +0100662 db:
663 <<: *dbSecrets
AndrewLamb8e090442020-10-15 09:28:09 +0100664
sekharhuawei2e799e92020-11-14 17:06:56 +0530665so-mariadb:
666 db:
667 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
668 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
669 backupCredsExternalSecret: *dbBackupCredsSecretName
670 userCredsExternalSecret: *dbUserCredsSecretName
671 adminCredsExternalSecret: *dbAdminCredsSecretName
672
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100673so-admin-cockpit:
seshukm0df1f8e2020-08-17 21:45:49 +0530674 enabled: true
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100675 db:
676 <<: *dbSecrets
677
sekharhuawei2e799e92020-11-14 17:06:56 +0530678so-nssmf-adapter:
679 enabled: true
680 server:
681 actuatorCredsExternalSecret: *actuator-secrets
682 bpelCredsExternalSecret: *bpel-secrets
683 db:
684 <<: *dbSecrets
685
686so-oof-adapter:
687 enabled: true
688 db:
689 <<: *dbSecrets
690 mso:
691 msoKeySecret: *mso-key
692 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
693 oof:
694 authSecret: *mso-oof-auth
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000695 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
sekharhuawei2e799e92020-11-14 17:06:56 +0530696
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000697so-openstack-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530698 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100699 db:
700 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000701 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100702
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000703so-request-db-adapter:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100704 db:
705 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100706
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000707so-sdc-controller:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100708 db:
709 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000710 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100711
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000712so-sdnc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530713 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100714 db:
715 <<: *dbSecrets
seshukm610d97d2021-03-19 02:57:36 +0530716 mso:
717 msoKeySecret: *mso-key
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000718 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100719
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100720so-ve-vnfm-adapter:
Sylvain Desbureaux28d56562020-11-02 17:54:05 +0100721 enabled: false
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100722
seshukm87ccd872021-03-30 21:45:16 +0530723so-etsi-sol005-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530724 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100725 db:
726 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100727
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100728so-etsi-sol003-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530729 enabled: true
farida azmy87f46222021-04-06 15:25:15 +0200730
731#Pods Service Account
732serviceAccount:
733 nameOverride: so
734 roles:
735 - read
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000736
737#Log configuration
738log:
739 path: /var/log/onap