blob: 5d3957aac1f3b8fde6805f916fa71daa3229a16f [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
seshukm0df1f8e2020-08-17 21:45:49 +05302# Copyright © 2020 Huawei
Sylvain Desbureauxd3114052021-02-23 16:45:52 +01003# Copyright © 2021 Orange
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000015#################################################################
16# Global configuration defaults.
17#################################################################
18global:
19 nodePortPrefix: 302
20 nodePortPrefixExt: 304
seshukm0df1f8e2020-08-17 21:45:49 +053021 aafAgentImage: onap/aaf/aaf_agent:2.1.20
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000022 mariadbGalera:
23 nameOverride: mariadb-galera
24 serviceName: mariadb-galera
rope2524d3f3682020-09-02 20:49:21 +010025 servicePort: '3306'
krishnaa9692b606b2020-10-30 11:29:21 +053026 service: mariadb-galera
27 internalPort: '3306'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010028 # mariadbRootPassword: secretpassword
29 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053030 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000031 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
32 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000033 persistence:
34 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020035 #This configuration specifies Service and port for SDNC OAM interface
36 sdncOamService: sdnc-oam
37 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000038 #This configuration will run the migration. The configurations are for backing up the data
39 #from DB and then restoring it to the present versions preferred DB.
40 migration:
41 enabled: false
42 dbHost: mariadb-galera
43 dbPort: 3306
44 dbUser: root
45 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010046 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000047 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000048 security:
49 aaf:
50 enabled: false
51 aaf:
52 auth:
53 header: Basic c29Ac28ub25hcC5vcmc6ZGVtbzEyMzQ1Ngo=
54 encrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
55 app:
56 siteName: onapheat
57 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
58 defaultCloudOwner: onap
sekharhuawei2e799e92020-11-14 17:06:56 +053059
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +010060 certificates:
61 path: /etc/ssl/certs
62 share_path: /usr/local/share/ca-certificates/
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010063
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010064readinessCheck:
65 wait_for:
66 - so-mariadb-config
67
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010068#################################################################
69# Secrets metaconfig
70#################################################################
71secrets:
72 - uid: db-root-pass
73 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
74 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010075 externalSecret: '{{ .Values.global.mariadbGalera.localCluster | ternary
76 .Values.global.mariadbGalera.rootPasswordExternalSecret
77 (default (include "common.mariadb.secret.rootPassSecretName"
78 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride))
79 .Values.global.mariadbGalera.rootPasswordExternalSecret) }}'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010080 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
81 - uid: db-backup-creds
82 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
83 type: basicAuth
84 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
85 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
86 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
87 passwordPolicy: required
88 annotations:
89 helm.sh/hook: pre-upgrade,pre-install
rope2524d3f3682020-09-02 20:49:21 +010090 helm.sh/hook-weight: '0'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010091 helm.sh/hook-delete-policy: before-hook-creation
92 - uid: db-user-creds
93 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
94 type: basicAuth
95 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
96 login: '{{ .Values.dbCreds.userName }}'
97 password: '{{ .Values.dbCreds.userPassword }}'
98 passwordPolicy: generate
99 - uid: db-admin-creds
100 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
101 type: basicAuth
102 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
103 login: '{{ .Values.dbCreds.adminName }}'
104 password: '{{ .Values.dbCreds.adminPassword }}'
105 passwordPolicy: generate
sekharhuawei2e799e92020-11-14 17:06:56 +0530106 - uid: 'mso-key'
Priyadharshini7dc03852020-08-27 04:36:03 -0700107 name: &mso-key '{{ include "common.release" . }}-mso-key'
108 type: password
sekharhuawei2e799e92020-11-14 17:06:56 +0530109 password: '{{ .Values.mso.msoKey }}'
Priyadharshini7dc03852020-08-27 04:36:03 -0700110 - uid: mso-oof-auth
111 name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
112 type: basicAuth
113 login: '{{ .Values.mso.oof.login }}'
114 password: '{{ .Values.mso.oof.password }}'
115 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530116 - uid: server-actuator-creds
117 name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
118 type: basicAuth
119 externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
120 login: '{{ .Values.server.actuator.username }}'
121 password: '{{ .Values.server.actuator.password }}'
122 passwordPolicy: required
123 - uid: server-bpel-creds
124 name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
125 type: basicAuth
126 externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
127 login: '{{ .Values.server.bpel.username }}'
128 password: '{{ .Values.server.bpel.password }}'
129 passwordPolicy: required
130 - uid: so-aaf-creds
131 name: &aaf-secrets '{{ include "common.release" . }}-so-server-aaf-creds'
132 type: basicAuth
133 externalSecret: '{{ tpl (default "" .Values.server.aafCredsExternalSecret) . }}'
134 login: '{{ .Values.server.aaf.username }}'
135 password: '{{ .Values.server.aaf.password }}'
136 passwordPolicy: required
137 - uid: so-aai-creds
138 name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
139 type: basicAuth
140 externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
141 login: '{{ .Values.server.aai.username }}'
142 password: '{{ .Values.server.aai.password }}'
143 passwordPolicy: required
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100144
seshukm0df1f8e2020-08-17 21:45:49 +0530145aafConfig:
146 permission_user: 1000
147 permission_group: 999
148
149aaf:
150 trustore: org.onap.so.trust.jks
151
jmacc4f04d32018-10-12 18:24:24 +0000152#################################################################
153# Application configuration defaults.
154#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100155
156dbSecrets: &dbSecrets
157 userCredsExternalSecret: *dbUserCredsSecretName
158 adminCredsExternalSecret: *dbAdminCredsSecretName
159
160# unused in this, just to pass to subcharts
161dbCreds:
162 userName: so_user
163 adminName: so_admin
164
deen1985b958d7d2020-12-28 11:56:52 +0100165image: onap/so/api-handler-infra:1.7.11
sekharhuawei2e799e92020-11-14 17:06:56 +0530166
167server:
168 aaf:
169 username: so@so.onap.org
170 password: demo123456
171 # aafCredsExternalSecret: some secret
172 aai:
173 username: aai@aai.onap.org
174 password: demo123456!
175 # aaiCredsExternalSecret: some secret
176 actuator:
177 username: mso_admin
178 password: password1$
179 # actuatorCredsExternalSecret: some secret
180 bpel:
181 username: bpel
182 password: password1$
183 # bpelCredsExternalSecret: some secret
184
jmacc4f04d32018-10-12 18:24:24 +0000185pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000186replicaCount: 1
187minReadySeconds: 10
seshukm0df1f8e2020-08-17 21:45:49 +0530188containerPort: &containerPort 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000189logPath: ./logs/apih/
190app: api-handler-infra
191service:
seshukm0df1f8e2020-08-17 21:45:49 +0530192 type: NodePort
193 nodePort: 77
194 internalPort: *containerPort
195 externalPort: *containerPort
196 portName: so-apih-port
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000197updateStrategy:
seshukm0df1f8e2020-08-17 21:45:49 +0530198 type: RollingUpdate
199 maxUnavailable: 1
200 maxSurge: 1
201
202#################################################################
203# soHelpers part
204#################################################################
205soHelpers:
206 nameOverride: so-apih-cert-init
207 certInitializer:
208 nameOverride: so-apih-cert-init
209 credsPath: /opt/app/osaaf/local
seshukm0df1f8e2020-08-17 21:45:49 +0530210 containerPort: *containerPort
211
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400212# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000213flavor: small
214# Segregation for Different environment (Small and Large)
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100215persistence:
216 certificatesPath: /certificates
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000217resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000218 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000219 limits:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000220 cpu: 2000m
vaibhav16dec0da88292018-08-13 06:10:27 +0000221 memory: 4Gi
222 requests:
223 cpu: 500m
224 memory: 1Gi
225 large:
226 limits:
227 cpu: 4000m
228 memory: 8Gi
229 requests:
230 cpu: 1000m
231 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000232 unlimited: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000233
Mike Elliottd32d36e2018-02-12 15:54:03 -0500234nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500235affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000236
sunilb0a97ab22020-02-25 10:18:48 +0530237# application configuration
238config:
239 logstashServiceName: log-ls
240 logstashPort: 5044
241
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000242#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
243#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
244# --set so.global.mariadbGalera.localCluster=true \
245# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
246# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
247mariadb-galera:
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100248 rootUser:
249 externalSecret: *dbRootPassSecretName
250 nameOverride: &so-mariadb so-mariadb-galera
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000251 replicaCount: 1
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000252 persistence:
253 mountSubPath: so/mariadb-galera/data
254 enabled: true
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100255 serviceAccount:
256 nameOverride: *so-mariadb
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200257
258ingress:
259 enabled: false
260 service:
rope2524d3f3682020-09-02 20:49:21 +0100261 - baseaddr: 'so.api'
262 name: 'so'
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200263 port: 8080
264 config:
rope2524d3f3682020-09-02 20:49:21 +0100265 ssl: 'none'
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000266
267mso:
268 adapters:
269 requestDb:
270 auth: Basic YnBlbDpwYXNzd29yZDEk
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000271 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
sekharhuawei2e799e92020-11-14 17:06:56 +0530272 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000273 sdc:
274 client:
275 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
276 aai:
277 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
Priyadharshini7dc03852020-08-27 04:36:03 -0700278 oof:
279 login: test
280 password: testpwd
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000281 so:
282 operationalEnv:
283 dmaap:
284 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
285 health:
286 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100287
seshukm0df1f8e2020-08-17 21:45:49 +0530288so-appc-orchestrator:
Sylvain Desbureaux276c8e62020-11-02 17:51:15 +0100289 enabled: false
sekharhuawei2e799e92020-11-14 17:06:56 +0530290 server:
291 actuatorCredsExternalSecret: *actuator-secrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100292 db:
293 <<: *dbSecrets
seshukm0df1f8e2020-08-17 21:45:49 +0530294
295so-bpmn-infra:
296 db:
297 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100298
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000299so-catalog-db-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530300 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100301 db:
302 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100303
sekharhuawei2e799e92020-11-14 17:06:56 +0530304so-cnf-adapter:
305 enabled: true
306 db:
307 <<: *dbSecrets
308 server:
309 aafCredsExternalSecret: *aaf-secrets
310 aaiCredsExternalSecret: *aai-secrets
311 actuatorCredsExternalSecret: *actuator-secrets
312 mso:
313 msoKeySecret: *mso-key
314
AndrewLamb8e090442020-10-15 09:28:09 +0100315so-etsi-nfvo-ns-lcm:
316 enabled: true
rope2524d3f3682020-09-02 20:49:21 +0100317 db:
318 <<: *dbSecrets
AndrewLamb8e090442020-10-15 09:28:09 +0100319
sekharhuawei2e799e92020-11-14 17:06:56 +0530320so-mariadb:
321 db:
322 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
323 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
324 backupCredsExternalSecret: *dbBackupCredsSecretName
325 userCredsExternalSecret: *dbUserCredsSecretName
326 adminCredsExternalSecret: *dbAdminCredsSecretName
327
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100328so-monitoring:
seshukm0df1f8e2020-08-17 21:45:49 +0530329 enabled: true
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100330 db:
331 <<: *dbSecrets
332
sekharhuawei2e799e92020-11-14 17:06:56 +0530333so-nssmf-adapter:
334 enabled: true
335 server:
336 actuatorCredsExternalSecret: *actuator-secrets
337 bpelCredsExternalSecret: *bpel-secrets
338 db:
339 <<: *dbSecrets
340
341so-oof-adapter:
342 enabled: true
343 db:
344 <<: *dbSecrets
345 mso:
346 msoKeySecret: *mso-key
347 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
348 oof:
349 authSecret: *mso-oof-auth
350
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000351so-openstack-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530352 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100353 db:
354 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100355
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000356so-request-db-adapter:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100357 db:
358 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100359
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000360so-sdc-controller:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100361 db:
362 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100363
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000364so-sdnc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530365 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100366 db:
367 <<: *dbSecrets
seshukm610d97d2021-03-19 02:57:36 +0530368 mso:
369 msoKeySecret: *mso-key
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100370
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100371so-ve-vnfm-adapter:
Sylvain Desbureaux28d56562020-11-02 17:54:05 +0100372 enabled: false
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100373
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000374so-vfc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530375 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100376 db:
377 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100378
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000379so-vnfm-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530380 enabled: true