Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 1 | # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH |
vaibhav_16dec | e04b2fe | 2018-03-22 09:07:12 +0000 | [diff] [blame] | 2 | # Copyright © 2017 Amdocs, Bell Canada |
Remigiusz Janeczek | 42177a1 | 2020-12-10 13:10:15 +0100 | [diff] [blame] | 3 | # Copyright © 2021 Nokia |
vaibhav_16dec | e04b2fe | 2018-03-22 09:07:12 +0000 | [diff] [blame] | 4 | # |
| 5 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 6 | # you may not use this file except in compliance with the License. |
| 7 | # You may obtain a copy of the License at |
| 8 | # |
| 9 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 10 | # |
| 11 | # Unless required by applicable law or agreed to in writing, software |
| 12 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 14 | # See the License for the specific language governing permissions and |
| 15 | # limitations under the License. |
| 16 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 17 | ################################################################# |
| 18 | # Global configuration defaults. |
| 19 | ################################################################# |
| 20 | global: |
| 21 | nodePortPrefix: 302 |
jmac | 0e4f717 | 2018-09-07 18:06:43 +0000 | [diff] [blame] | 22 | nodePortPrefixExt: 304 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 23 | persistence: |
| 24 | mountPath: /dockerdata-nfs |
Maciej Wereski | 537d71e | 2021-11-03 13:31:44 +0000 | [diff] [blame] | 25 | centralizedLoggingEnabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 26 | mariadbGalera: |
Andreas Geissler | 2c1ba29 | 2024-01-10 22:20:05 +0100 | [diff] [blame] | 27 | # flag to enable the DB creation via mariadb-operator |
| 28 | useOperator: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 29 | #This flag allows SO to instantiate its own mariadb-galera cluster |
| 30 | #If shared instance is used, this chart assumes that DB already exists |
| 31 | localCluster: false |
Andreas Geissler | 576de2d | 2023-10-24 15:38:01 +0200 | [diff] [blame] | 32 | service: &mariadbService mariadb-galera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 33 | internalPort: 3306 |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 34 | nameOverride: &mariadbName mariadb-galera |
Andreas Geissler | 8b94826 | 2024-01-19 15:52:06 +0100 | [diff] [blame] | 35 | # (optional) if localCluster=false and an external secret is used set this variable |
| 36 | #userRootSecret: <secretName> |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 37 | |
demskeq8 | 3166b22 | 2023-04-26 10:27:00 +0200 | [diff] [blame] | 38 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 39 | ################################################################# |
| 40 | # Secrets metaconfig |
| 41 | ################################################################# |
| 42 | secrets: |
| 43 | - uid: db-root-password |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 44 | name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 45 | type: password |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 46 | # If we're using shared mariadb, we need to use the secret name (second |
| 47 | # part). |
| 48 | # If not, we do the same trick than for user db secret hat allows you |
| 49 | # override this secret using external one with the same field that is used |
| 50 | # to pass this to subchart. |
Krzysztof Opasiak | ab7a6bb | 2020-03-24 03:30:51 +0100 | [diff] [blame] | 51 | externalSecret: '{{ .Values.global.mariadbGalera.localCluster | |
Andreas Geissler | 8b94826 | 2024-01-19 15:52:06 +0100 | [diff] [blame] | 52 | ternary (( hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) | |
| 53 | ternary |
| 54 | "" |
| 55 | (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .) |
| 56 | ) |
| 57 | ( (not (empty (default "" .Values.global.mariadbGalera.userRootSecret))) | |
| 58 | ternary |
| 59 | .Values.global.mariadbGalera.userRootSecret |
| 60 | (include "common.mariadb.secret.rootPassSecretName" |
| 61 | (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride) |
| 62 | ) |
| 63 | ) }}' |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 64 | password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 65 | - uid: db-secret |
| 66 | name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret' |
| 67 | type: basicAuth |
| 68 | # This is a nasty trick that allows you override this secret using external one |
| 69 | # with the same field that is used to pass this to subchart |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 70 | externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) | |
| 71 | ternary |
| 72 | "" |
| 73 | (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}' |
| 74 | login: '{{ index .Values "mariadb-galera" "db" "user" }}' |
| 75 | password: '{{ index .Values "mariadb-galera" "db" "password" }}' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 76 | - uid: odl-creds |
| 77 | name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds' |
| 78 | type: basicAuth |
| 79 | externalSecret: '{{ .Values.config.odlCredsExternalSecret }}' |
| 80 | login: '{{ .Values.config.odlUser }}' |
| 81 | password: '{{ .Values.config.odlPassword }}' |
| 82 | # For now this is left hardcoded but should be revisited in a future |
| 83 | passwordPolicy: required |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 84 | - uid: netbox-apikey |
| 85 | type: password |
| 86 | externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}' |
| 87 | password: '{{ .Values.config.netboxApikey }}' |
| 88 | passwordPolicy: required |
Dan Timoney | 9e310e7 | 2021-02-23 11:25:39 -0500 | [diff] [blame] | 89 | - uid: aai-truststore-password |
| 90 | type: password |
| 91 | externalSecret: '{{ .Values.config.aaiTruststoreExternalSecret }}' |
| 92 | password: '{{ .Values.config.aaiTruststorePassword }}' |
| 93 | passwordPolicy: required |
| 94 | - uid: ansible-truststore-password |
| 95 | type: password |
| 96 | externalSecret: '{{ .Values.config.ansibleTruststoreExternalSecret }}' |
| 97 | password: '{{ .Values.config.ansibleTruststorePassword }}' |
| 98 | passwordPolicy: required |
| 99 | - uid: truststore-password |
| 100 | type: password |
| 101 | externalSecret: '{{ .Values.config.truststoreExternalSecret }}' |
| 102 | password: '{{ .Values.config.truststorePassword }}' |
| 103 | passwordPolicy: required |
| 104 | - uid: keystore-password |
| 105 | type: password |
| 106 | externalSecret: '{{ .Values.config.keystoreExternalSecret }}' |
| 107 | password: '{{ .Values.config.keystorePassword }}' |
| 108 | passwordPolicy: required |
| 109 | - uid: dmaap-authkey |
| 110 | type: password |
| 111 | externalSecret: '{{ .Values.config.dmaapAuthKeyExternalSecret }}' |
| 112 | password: '{{ .Values.config.dmaapAuthKey }}' |
| 113 | passwordPolicy: required |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 114 | - uid: aai-user-creds |
| 115 | type: basicAuth |
| 116 | externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}' |
| 117 | login: '{{ .Values.config.aaiUser }}' |
| 118 | password: '{{ .Values.config.aaiPassword }}' |
| 119 | passwordPolicy: required |
Dan Timoney | 9e310e7 | 2021-02-23 11:25:39 -0500 | [diff] [blame] | 120 | - uid: so-user-creds |
| 121 | type: basicAuth |
| 122 | externalSecret: '{{ .Values.config.soCredsExternalSecret}}' |
| 123 | login: '{{ .Values.config.soUser }}' |
| 124 | password: '{{ .Values.config.soPassword }}' |
| 125 | passwordPolicy: required |
| 126 | - uid: neng-user-creds |
| 127 | type: basicAuth |
| 128 | externalSecret: '{{ .Values.config.nengCredsExternalSecret}}' |
| 129 | login: '{{ .Values.config.nengUser }}' |
| 130 | password: '{{ .Values.config.nengPassword }}' |
| 131 | passwordPolicy: required |
| 132 | - uid: cds-user-creds |
| 133 | type: basicAuth |
| 134 | externalSecret: '{{ .Values.config.cdsCredsExternalSecret}}' |
| 135 | login: '{{ .Values.config.cdsUser }}' |
| 136 | password: '{{ .Values.config.cdsPassword }}' |
| 137 | passwordPolicy: required |
| 138 | - uid: honeycomb-user-creds |
| 139 | type: basicAuth |
| 140 | externalSecret: '{{ .Values.config.honeycombCredsExternalSecret}}' |
| 141 | login: '{{ .Values.config.honeycombUser }}' |
| 142 | password: '{{ .Values.config.honeycombPassword }}' |
| 143 | passwordPolicy: required |
| 144 | - uid: dmaap-user-creds |
| 145 | type: basicAuth |
| 146 | externalSecret: '{{ .Values.config.dmaapCredsExternalSecret}}' |
| 147 | login: '{{ .Values.config.dmaapUser }}' |
| 148 | password: '{{ .Values.config.dmaapPassword }}' |
| 149 | passwordPolicy: required |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 150 | - uid: modeling-user-creds |
| 151 | type: basicAuth |
| 152 | externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}' |
| 153 | login: '{{ .Values.config.modelingUser }}' |
| 154 | password: '{{ .Values.config.modelingPassword }}' |
| 155 | passwordPolicy: required |
| 156 | - uid: restconf-creds |
| 157 | type: basicAuth |
| 158 | externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}' |
| 159 | login: '{{ .Values.config.restconfUser }}' |
| 160 | password: '{{ .Values.config.restconfPassword }}' |
| 161 | passwordPolicy: required |
| 162 | - uid: ansible-creds |
| 163 | name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds' |
| 164 | type: basicAuth |
| 165 | externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}' |
| 166 | login: '{{ .Values.config.ansibleUser }}' |
| 167 | password: '{{ .Values.config.ansiblePassword }}' |
| 168 | passwordPolicy: required |
| 169 | - uid: scaleout-creds |
| 170 | type: basicAuth |
| 171 | externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}' |
| 172 | login: '{{ .Values.config.scaleoutUser }}' |
| 173 | password: '{{ .Values.config.scaleoutPassword }}' |
| 174 | passwordPolicy: required |
demskeq8 | b43e92c | 2021-02-12 15:43:48 +0100 | [diff] [blame] | 175 | - uid: oauth-token-secret |
| 176 | type: password |
| 177 | externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.tokenExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}' |
| 178 | password: '{{ .Values.config.sdnr.oauth.tokenSecret }}' |
| 179 | passwordPolicy: required |
| 180 | - uid: keycloak-secret |
| 181 | type: password |
| 182 | externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.providersSecrets.keycloakExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}' |
| 183 | password: '{{ .Values.config.sdnr.oauth.providersSecrets.keycloak }}' |
| 184 | passwordPolicy: required |
sebdet | b205f40 | 2021-10-20 12:16:02 +0200 | [diff] [blame] | 185 | - uid: ves-collector-secret |
| 186 | type: basicAuth |
| 187 | login: '{{ .Values.config.sdnr.vesCollector.username }}' |
| 188 | password: '{{ .Values.config.sdnr.vesCollector.password }}' |
demskeq8 | 4e1f84c | 2023-07-04 08:39:43 +0000 | [diff] [blame] | 189 | - uid: sdnrdb-secret |
| 190 | name: &sdnrdbSecretName '{{ include "common.release" . }}-sdnc-sdnrdb-secret' |
| 191 | type: basicAuth |
| 192 | login: '{{ index .Values "config" "sdnr" "mariadb" "user" }}' |
| 193 | password: '{{ index .Values "config" "sdnr" "mariadb" "password" }}' |
Jan Malkiewicz | 0e53c9f | 2020-12-08 15:08:01 +0100 | [diff] [blame] | 194 | ################################################################# |
| 195 | # Certificates |
| 196 | ################################################################# |
| 197 | certificates: |
Remigiusz Janeczek | 42177a1 | 2020-12-10 13:10:15 +0100 | [diff] [blame] | 198 | - mountPath: /var/custom-certs |
| 199 | commonName: sdnc.simpledemo.onap.org |
Jan Malkiewicz | 0e53c9f | 2020-12-08 15:08:01 +0100 | [diff] [blame] | 200 | dnsNames: |
| 201 | - sdnc.simpledemo.onap.org |
Piotr Marcinkiewicz | 5957101 | 2021-01-12 17:37:08 +0100 | [diff] [blame] | 202 | keystore: |
| 203 | outputType: |
| 204 | - jks |
Jan Malkiewicz | 0e53c9f | 2020-12-08 15:08:01 +0100 | [diff] [blame] | 205 | passwordSecretRef: |
Piotr Marcinkiewicz | 3267293 | 2021-03-26 13:06:35 +0100 | [diff] [blame] | 206 | create: true |
Piotr Marcinkiewicz | 5957101 | 2021-01-12 17:37:08 +0100 | [diff] [blame] | 207 | name: sdnc-cmpv2-keystore-password |
Jan Malkiewicz | 0e53c9f | 2020-12-08 15:08:01 +0100 | [diff] [blame] | 208 | key: password |
Piotr Marcinkiewicz | 5957101 | 2021-01-12 17:37:08 +0100 | [diff] [blame] | 209 | issuer: |
| 210 | group: certmanager.onap.org |
| 211 | kind: CMPv2Issuer |
| 212 | name: cmpv2-issuer-onap |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 213 | ################################################################# |
| 214 | # Application configuration defaults. |
| 215 | ################################################################# |
| 216 | # application images |
Alexander Dehn | 238450f | 2020-10-27 13:03:53 +0000 | [diff] [blame] | 217 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 218 | pullPolicy: Always |
Dan Timoney | c614482 | 2023-04-27 10:17:20 -0400 | [diff] [blame] | 219 | image: onap/sdnc-image:2.5.5 |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 220 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 221 | # flag to enable debugging - application support required |
| 222 | debugEnabled: false |
| 223 | |
| 224 | # application configuration |
BorislavG | 5f3b619 | 2018-03-25 18:12:38 +0300 | [diff] [blame] | 225 | config: |
Timoney, Dan (dt5972) | ba4d2eb | 2019-05-07 13:32:42 -0400 | [diff] [blame] | 226 | odlUid: 100 |
| 227 | odlGid: 101 |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 228 | odlUser: admin |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 229 | odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 230 | # odlCredsExternalSecret: some secret |
| 231 | netboxApikey: onceuponatimeiplayedwithnetbox20180814 |
| 232 | # netboxApikeyExternalSecret: some secret |
Dan Timoney | 9e310e7 | 2021-02-23 11:25:39 -0500 | [diff] [blame] | 233 | aaiTruststorePassword: changeit |
| 234 | # aaiTruststoreExternalSecret: some secret |
| 235 | ansibleTruststorePassword: changeit |
| 236 | # ansibleTruststoreExternalSecret: some secret |
| 237 | truststorePassword: adminadmin |
| 238 | # truststoreExternalSecret: some secret |
| 239 | keystorePassword: adminadmin |
| 240 | # keystoreExternalSecret: some secret |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 241 | aaiUser: sdnc@sdnc.onap.org |
| 242 | aaiPassword: demo123456! |
| 243 | # aaiCredsExternalSecret: some secret |
Dan Timoney | 9e310e7 | 2021-02-23 11:25:39 -0500 | [diff] [blame] | 244 | soUser: sdncaBpmn |
| 245 | soPassword: password1$ |
| 246 | # soCredsExternalSecret: some secret |
| 247 | nengUser: ccsdkapps |
| 248 | nengPassword: ccsdkapps |
| 249 | # nengCredsExternalSecret: some secret |
| 250 | cdsUser: ccsdkapps |
| 251 | cdsPassword: ccsdkapps |
| 252 | # cdsCredsExternalSecret: some secret |
| 253 | honeycombUser: admin |
| 254 | honeycombPassword: admin |
| 255 | # honeycombCredsExternalSecret: some secret |
| 256 | dmaapUser: admin |
| 257 | dmaapPassword: admin |
| 258 | dmaapAuthKey: "fs20cKwalJ6ry4kX:7Hqm6BDZK47IKxGRkOPFk33qMYs=" |
| 259 | # dmaapCredsExternalSecret: some secret |
| 260 | # dmaapAuthKeyExternalSecret: some secret |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 261 | modelingUser: ccsdkapps |
| 262 | modelingPassword: ccsdkapps |
| 263 | # modelingCredsExternalSecret: some secret |
| 264 | restconfUser: admin |
| 265 | restconfPassword: admin |
| 266 | # restconfCredsExternalSecret: some secret |
| 267 | scaleoutUser: admin |
| 268 | scaleoutPassword: admin |
| 269 | # scaleoutExternalSecret: some secret |
| 270 | ansibleUser: sdnc |
| 271 | ansiblePassword: sdnc |
| 272 | # ansibleCredsExternalSecret: some secret |
sebdet | b205f40 | 2021-10-20 12:16:02 +0200 | [diff] [blame] | 273 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 274 | dbSdnctlDatabase: &sdncDbName sdnctl |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 275 | enableClustering: true |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 276 | sdncHome: /opt/onap/sdnc |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 277 | binDir: /opt/onap/sdnc/bin |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 278 | etcDir: /opt/onap/sdnc/data |
Trevor Tait | 567ff1e | 2018-05-01 16:20:54 -0400 | [diff] [blame] | 279 | geoEnabled: false |
Neha Jain | 7b0d6c6 | 2018-05-17 14:34:49 -0400 | [diff] [blame] | 280 | # if geoEnabled is set to true here, mysql.geoEnabled must be set to true |
Trevor Tait | 567ff1e | 2018-05-01 16:20:54 -0400 | [diff] [blame] | 281 | # if geoEnabled is set to true the following 3 values must be set to their proper values |
| 282 | myODLCluster: 127.0.0.1 |
| 283 | peerODLCluster: 127.0.0.1 |
Mohammadreza Pasandideh | b642ee5 | 2018-06-19 15:19:53 -0400 | [diff] [blame] | 284 | isPrimaryCluster: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 285 | configDir: /opt/onap/sdnc/data/properties |
Konrad Bańka | 5ea1db3 | 2020-04-06 14:32:46 +0200 | [diff] [blame] | 286 | ccsdkConfigDir: /opt/onap/ccsdk/data/properties |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 287 | dmaapTopic: SUCCESS |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 288 | dmaapPort: 3904 |
BorislavG | 5f3b619 | 2018-03-25 18:12:38 +0300 | [diff] [blame] | 289 | logstashServiceName: log-ls |
| 290 | logstashPort: 5044 |
jmac | 7c43467 | 2018-05-11 20:14:17 +0000 | [diff] [blame] | 291 | ansibleServiceName: sdnc-ansible-server |
| 292 | ansiblePort: 8000 |
Dan Timoney | a98765b | 2020-09-14 11:57:55 -0400 | [diff] [blame] | 293 | javaHome: /opt/java/openjdk |
jmac | 7c43467 | 2018-05-11 20:14:17 +0000 | [diff] [blame] | 294 | |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 295 | odl: |
| 296 | etcDir: /opt/opendaylight/etc |
| 297 | binDir: /opt/opendaylight/bin |
Dan Timoney | a98765b | 2020-09-14 11:57:55 -0400 | [diff] [blame] | 298 | gcLogDir: /opt/opendaylight/data/log |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 299 | salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config |
Dan Timoney | 9520e7c | 2021-01-12 11:10:58 -0500 | [diff] [blame] | 300 | salConfigVersion: 1.10.4 |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 301 | akka: |
| 302 | seedNodeTimeout: 15s |
| 303 | circuitBreaker: |
| 304 | maxFailures: 10 |
| 305 | callTimeout: 90s |
| 306 | resetTimeout: 30s |
| 307 | recoveryEventTimeout: 90s |
| 308 | datastore: |
| 309 | persistentActorRestartMinBackoffInSeconds: 10 |
| 310 | persistentActorRestartMaxBackoffInSeconds: 40 |
| 311 | persistentActorRestartResetBackoffInSeconds: 20 |
| 312 | shardTransactionCommitTimeoutInSeconds: 120 |
| 313 | shardIsolatedLeaderCheckIntervalInMillis: 30000 |
| 314 | operationTimeoutInSeconds: 120 |
| 315 | javaOptions: |
| 316 | maxGCPauseMillis: 100 |
| 317 | parallelGCThreads : 3 |
Dan Timoney | a98765b | 2020-09-14 11:57:55 -0400 | [diff] [blame] | 318 | numberGCLogFiles: 10 |
| 319 | minMemory: 512m |
| 320 | maxMemory: 2048m |
| 321 | gcLogOptions: "" |
| 322 | # Next line enables gc logging |
| 323 | # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}" |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 324 | # enables sdnr functionality |
| 325 | sdnr: |
Alexander Dehn | 5c1105e | 2020-09-14 20:55:56 +0000 | [diff] [blame] | 326 | enabled: true |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 327 | # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default), |
| 328 | # mode: dm - SDNC contains sdnr device manager + ODLUX components |
| 329 | mode: dm |
| 330 | # sdnronly: true starts sdnc container with odl and sdnrwt features only |
| 331 | sdnronly: false |
| 332 | sdnrdbTrustAllCerts: true |
demskeq8 | 4e1f84c | 2023-07-04 08:39:43 +0000 | [diff] [blame] | 333 | elasticsearch: |
| 334 | ## for legacy eleasticsearch database |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 335 | enabled: &esdbenabled true |
| 336 | # enabled: &esdbenabled false |
demskeq8 | 4e1f84c | 2023-07-04 08:39:43 +0000 | [diff] [blame] | 337 | mariadb: |
| 338 | ## for legacy eleasticsearch database |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 339 | enabled: false |
| 340 | # enabled: true |
demskeq8 | 4e1f84c | 2023-07-04 08:39:43 +0000 | [diff] [blame] | 341 | databaseName: sdnrdb |
| 342 | user: sdnrdb |
| 343 | externalSecret: *sdnrdbSecretName |
| 344 | asyncHandling: true |
| 345 | asyncPoolSize: 200 |
demskeq8 | 3166b22 | 2023-04-26 10:27:00 +0200 | [diff] [blame] | 346 | kafka: |
| 347 | enabled: false |
| 348 | consumerGroupPrefix: &consumerGroupPrefix sdnr |
| 349 | # Strimzi KafkaUser config see configuration below |
| 350 | kafkaUser: &kafkaUser |
| 351 | acls: |
| 352 | - name: unauthenticated.SEC_ |
| 353 | type: topic |
| 354 | patternType: prefix |
| 355 | operations: [Read] |
| 356 | - name: unauthenticated.VES_PNFREG_OUTPUT |
| 357 | type: topic |
| 358 | patternType: literal |
| 359 | operations: [Read] |
| 360 | - name: *consumerGroupPrefix |
| 361 | type: group |
| 362 | patternType: prefix |
| 363 | operations: [Read] |
| 364 | ## set if bootstrap server is not OOM standard |
| 365 | # bootstrapServers: [] |
| 366 | ## set connection parameters if not default |
| 367 | # securityProtocol: PLAINTEXT |
| 368 | # saslMechanism: SCRAM-SHA-512 |
| 369 | ## saslJassConfig: provided by secret |
| 370 | |
| 371 | |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 372 | mountpointStateProviderEnabled: false |
demskeq8 | 2785466 | 2021-04-08 14:49:47 +0200 | [diff] [blame] | 373 | netconfCallHome: |
| 374 | enabled: true |
demskeq8 | 3166b22 | 2023-04-26 10:27:00 +0200 | [diff] [blame] | 375 | |
| 376 | |
demskeq8 | b43e92c | 2021-02-12 15:43:48 +0100 | [diff] [blame] | 377 | oauth: |
| 378 | enabled: false |
| 379 | tokenIssuer: ONAP SDNC |
| 380 | tokenSecret: secret |
| 381 | supportOdlusers: true |
| 382 | redirectUri: null |
| 383 | publicUrl: none |
| 384 | odluxRbac: |
| 385 | enabled: true |
| 386 | # example definition for a oauth provider |
| 387 | providersSecrets: |
| 388 | keycloak: d8d7ed52-0691-4353-9ac6-5383e72e9c46 |
| 389 | providers: |
| 390 | - id: keycloak |
| 391 | type: KEYCLOAK |
| 392 | host: http://keycloak:8080 |
| 393 | clientId: odlux.app |
| 394 | secret: ${KEYCLOAK_SECRET} |
| 395 | scope: openid |
| 396 | title: ONAP Keycloak Provider |
| 397 | roleMapping: |
| 398 | mykeycloak: admin |
sebdet | b205f40 | 2021-10-20 12:16:02 +0200 | [diff] [blame] | 399 | vesCollector: |
| 400 | enabled: false |
| 401 | tls: |
| 402 | enabled: true |
| 403 | trustAllCertificates: false |
| 404 | username: sample1 |
| 405 | password: sample1 |
| 406 | address: dcae-ves-collector.onap |
Andreas Geissler | 2af5079 | 2023-03-27 17:11:27 +0200 | [diff] [blame] | 407 | port: 8080 |
sebdet | b205f40 | 2021-10-20 12:16:02 +0200 | [diff] [blame] | 408 | version: v7 |
| 409 | reportingEntityName: ONAP SDN-R |
| 410 | eventLogMsgDetail: SHORT |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 411 | |
demskeq8 | 3166b22 | 2023-04-26 10:27:00 +0200 | [diff] [blame] | 412 | # Strimzi KafkaUser/Topic config on top level |
| 413 | kafkaUser: *kafkaUser |
| 414 | |
| 415 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 416 | # dependency / sub-chart configuration |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 417 | network-name-gen: |
| 418 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 419 | mariadb-galera: &mariadbGalera |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 420 | nameOverride: &sdnc-db sdnc-db |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 421 | config: &mariadbGaleraConfig |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 422 | rootPasswordExternalSecret: *rootDbSecret |
| 423 | userName: &dbUser sdnctl |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 424 | userCredentialsExternalSecret: *dbSecretName |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 425 | rootUser: |
| 426 | externalSecret: *rootDbSecret |
| 427 | db: |
Andreas Geissler | 72caf09 | 2023-12-14 13:37:39 +0100 | [diff] [blame] | 428 | name: *sdncDbName |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 429 | user: *dbUser |
| 430 | externalSecret: *dbSecretName |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 431 | service: |
demskeq8 | 4e1f84c | 2023-07-04 08:39:43 +0000 | [diff] [blame] | 432 | name: sdnc-db |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 433 | sdnctlPrefix: sdnc |
| 434 | persistence: |
Mahendra Raghuwanshi | b76cb28 | 2019-04-09 10:13:07 +0000 | [diff] [blame] | 435 | mountSubPath: sdnc/mariadb-galera |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 436 | enabled: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 437 | replicaCount: 1 |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 438 | mariadbOperator: |
| 439 | galera: |
| 440 | enabled: false |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 441 | serviceAccount: |
| 442 | nameOverride: *sdnc-db |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 443 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 444 | cds: |
| 445 | enabled: false |
| 446 | |
| 447 | dmaap-listener: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 448 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 449 | nameOverride: sdnc-dmaap-listener |
| 450 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 451 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 452 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 453 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 454 | mysqlDatabase: *sdncDbName |
| 455 | config: |
| 456 | sdncChartName: sdnc |
| 457 | dmaapPort: 3904 |
| 458 | sdncPort: 8282 |
| 459 | configDir: /opt/onap/sdnc/data/properties |
| 460 | odlCredsExternalSecret: *odlCredsSecretName |
| 461 | |
| 462 | ueb-listener: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 463 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 464 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 465 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 466 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 467 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 468 | mysqlDatabase: *sdncDbName |
| 469 | nameOverride: sdnc-ueb-listener |
| 470 | config: |
| 471 | sdncPort: 8282 |
| 472 | sdncChartName: sdnc |
| 473 | configDir: /opt/onap/sdnc/data/properties |
| 474 | odlCredsExternalSecret: *odlCredsSecretName |
| 475 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 476 | sdnc-ansible-server: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 477 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 478 | config: |
| 479 | restCredsExternalSecret: *ansibleSecretName |
| 480 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 481 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 482 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 483 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 484 | mysqlDatabase: ansible |
| 485 | service: |
| 486 | name: sdnc-ansible-server |
| 487 | internalPort: 8000 |
| 488 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 489 | dgbuilder: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 490 | enabled: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 491 | nameOverride: sdnc-dgbuilder |
| 492 | config: |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 493 | db: |
| 494 | dbName: *sdncDbName |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 495 | rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster | |
| 496 | ternary |
| 497 | (printf "%s-sdnc-db-root-password" (include "common.release" .)) |
| 498 | (include "common.mariadb.secret.rootPassSecretName" |
| 499 | (dict "dot" . "chartName" "mariadb-galera")) }}' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 500 | userCredentialsExternalSecret: *dbSecretName |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 501 | dbPodName: *mariadbName |
| 502 | dbServiceName: *mariadbService |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 503 | # This should be revisited and changed to plain text |
jmac | 70863e1 | 2018-05-16 14:53:03 +0000 | [diff] [blame] | 504 | dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5 |
farida azmy | dc9aef0 | 2021-04-07 17:07:09 +0200 | [diff] [blame] | 505 | serviceAccount: |
| 506 | nameOverride: sdnc-dgbuilder |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 507 | mariadb-galera: |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 508 | service: |
BorislavG | 1ffbd99 | 2018-04-24 07:56:27 +0000 | [diff] [blame] | 509 | name: sdnc-dgbuilder |
Andreas Geissler | 2af5079 | 2023-03-27 17:11:27 +0200 | [diff] [blame] | 510 | ports: |
| 511 | - name: http |
| 512 | port: 3100 |
demskeq8 | 95bf73a | 2023-05-09 12:31:07 +0000 | [diff] [blame] | 513 | nodePort: "03" |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 514 | |
Sylvain Desbureaux | e54644e | 2020-05-04 11:45:16 +0200 | [diff] [blame] | 515 | ingress: |
| 516 | enabled: false |
| 517 | service: |
Andreas Geissler | 51900a9 | 2022-08-03 13:10:35 +0200 | [diff] [blame] | 518 | - baseaddr: "sdnc-dgbuilder-ui" |
Sylvain Desbureaux | e54644e | 2020-05-04 11:45:16 +0200 | [diff] [blame] | 519 | name: "sdnc-dgbuilder" |
Andreas Geissler | 1b174e5 | 2023-04-13 16:50:23 +0200 | [diff] [blame] | 520 | port: 3100 |
Sylvain Desbureaux | e54644e | 2020-05-04 11:45:16 +0200 | [diff] [blame] | 521 | config: |
| 522 | ssl: "redirect" |
| 523 | |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 524 | |
| 525 | |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 526 | # local elasticsearch cluster |
| 527 | localElasticCluster: true |
| 528 | elasticsearch: |
demskeq8 | 4e1f84c | 2023-07-04 08:39:43 +0000 | [diff] [blame] | 529 | enabled: *esdbenabled |
Sylvain Desbureaux | 829344b | 2020-11-19 17:07:26 +0100 | [diff] [blame] | 530 | nameOverride: &elasticSearchName sdnrdb |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 531 | name: sdnrdb-cluster |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 532 | service: |
Sylvain Desbureaux | 829344b | 2020-11-19 17:07:26 +0100 | [diff] [blame] | 533 | name: *elasticSearchName |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 534 | master: |
| 535 | replicaCount: 3 |
| 536 | # dedicatednode: "yes" |
| 537 | # working as master node only, in this case increase replicaCount for elasticsearch-data |
| 538 | # dedicatednode: "no" |
| 539 | # handles master and data node functionality |
| 540 | dedicatednode: "no" |
Sylvain Desbureaux | 829344b | 2020-11-19 17:07:26 +0100 | [diff] [blame] | 541 | nameOverride: *elasticSearchName |
demskeq8 | eb56da7 | 2021-02-19 12:11:48 +0100 | [diff] [blame] | 542 | cluster_name: sdnrdb-cluster |
sebdet | b205f40 | 2021-10-20 12:16:02 +0200 | [diff] [blame] | 543 | |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 544 | # enable |
| 545 | sdnc-web: |
Alexander Dehn | 8789a72 | 2020-10-16 14:29:05 +0000 | [diff] [blame] | 546 | enabled: true |
demskeq8 | 95bf73a | 2023-05-09 12:31:07 +0000 | [diff] [blame] | 547 | ## set if web socket port should not be default |
| 548 | # sdnrWebsocketPort: *sdnrWebsocketPort |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 549 | # default number of instances |
| 550 | replicaCount: 1 |
| 551 | |
| 552 | nodeSelector: {} |
| 553 | |
| 554 | affinity: {} |
| 555 | |
| 556 | # probe configuration parameters |
| 557 | liveness: |
| 558 | initialDelaySeconds: 10 |
| 559 | periodSeconds: 10 |
| 560 | # necessary to disable liveness probe when setting breakpoints |
| 561 | # in debugger so K8s doesn't restart unresponsive container |
| 562 | enabled: true |
| 563 | |
| 564 | readiness: |
| 565 | initialDelaySeconds: 10 |
| 566 | periodSeconds: 10 |
| 567 | |
| 568 | service: |
| 569 | type: NodePort |
| 570 | name: sdnc |
Radoslaw Chmiel | 58662a3 | 2022-06-02 19:37:35 +0200 | [diff] [blame] | 571 | portName: http |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 572 | internalPort: 8181 |
| 573 | internalPort2: 8101 |
| 574 | internalPort3: 8080 |
Mohammadreza Pasandideh | b756fb7 | 2018-04-03 10:06:45 -0400 | [diff] [blame] | 575 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 576 | #port |
| 577 | externalPort: 8282 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 578 | |
| 579 | externalPort2: 8202 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 580 | |
| 581 | externalPort3: 8280 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 582 | |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 583 | nodePort4: 67 |
| 584 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 585 | clusterPort: 2550 |
Mohammadreza Pasandideh | b756fb7 | 2018-04-03 10:06:45 -0400 | [diff] [blame] | 586 | clusterPort2: 2650 |
| 587 | clusterPort3: 2681 |
| 588 | |
| 589 | geoNodePort1: 61 |
| 590 | geoNodePort2: 62 |
| 591 | geoNodePort3: 63 |
| 592 | geoNodePort4: 64 |
| 593 | geoNodePort5: 65 |
| 594 | geoNodePort6: 66 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 595 | |
Andreas Geissler | 2af5079 | 2023-03-27 17:11:27 +0200 | [diff] [blame] | 596 | callHomePort: &chport 4334 |
demskeq8 | 2785466 | 2021-04-08 14:49:47 +0200 | [diff] [blame] | 597 | callHomeNodePort: 66 |
demskeq8 | 95bf73a | 2023-05-09 12:31:07 +0000 | [diff] [blame] | 598 | ## set if web socket port should not be default |
| 599 | ## change in sdnc-web section as well |
| 600 | # sdnrWebsocketPort: &sdnrWebsocketPort 8182 |
| 601 | |
demskeq8 | 2785466 | 2021-04-08 14:49:47 +0200 | [diff] [blame] | 602 | |
jmac | 8d6dc96 | 2018-04-26 14:26:55 +0000 | [diff] [blame] | 603 | ## Persist data to a persitent volume |
| 604 | persistence: |
| 605 | enabled: true |
| 606 | |
| 607 | ## A manually managed Persistent Volume and Claim |
| 608 | ## Requires persistence.enabled: true |
| 609 | ## If defined, PVC must be created manually before volume will be bound |
| 610 | # existingClaim: |
| 611 | volumeReclaimPolicy: Retain |
| 612 | |
| 613 | ## database data Persistent Volume Storage Class |
| 614 | ## If defined, storageClassName: <storageClass> |
| 615 | ## If set to "-", storageClassName: "", which disables dynamic provisioning |
| 616 | ## If undefined (the default) or set to null, no storageClassName spec is |
| 617 | ## set, choosing the default provisioner. (gp2 on AWS, standard on |
| 618 | ## GKE, AWS & OpenStack) |
| 619 | accessMode: ReadWriteOnce |
| 620 | size: 1Gi |
| 621 | mountPath: /dockerdata-nfs |
| 622 | mountSubPath: sdnc/mdsal |
Dan Timoney | 2ee28a5 | 2021-01-15 16:39:50 -0500 | [diff] [blame] | 623 | mdsalPath: /opt/opendaylight/mdsal |
demskeq8 | a86300a | 2021-02-10 09:53:33 +0100 | [diff] [blame] | 624 | daeximPath: /opt/opendaylight/mdsal/daexim |
Satoshi Fujii | 31b8b43 | 2021-08-28 12:12:36 +0000 | [diff] [blame] | 625 | journalPath: /opt/opendaylight/segmented-journal |
Dan Timoney | 2ee28a5 | 2021-01-15 16:39:50 -0500 | [diff] [blame] | 626 | snapshotsPath: /opt/opendaylight/snapshots |
jmac | 8d6dc96 | 2018-04-26 14:26:55 +0000 | [diff] [blame] | 627 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 628 | ingress: |
| 629 | enabled: false |
Lucjan Bryndza | 0844840 | 2019-11-27 14:26:54 +0100 | [diff] [blame] | 630 | service: |
Andreas Geissler | 2af5079 | 2023-03-27 17:11:27 +0200 | [diff] [blame] | 631 | - baseaddr: "sdnc-api" |
| 632 | name: "sdnc" |
| 633 | port: 8282 |
| 634 | - baseaddr: "sdnc-callhome" |
Andreas Geissler | 1b174e5 | 2023-04-13 16:50:23 +0200 | [diff] [blame] | 635 | name: "sdnc-callhome" |
Andreas Geissler | 2af5079 | 2023-03-27 17:11:27 +0200 | [diff] [blame] | 636 | port: *chport |
| 637 | protocol: tcp |
| 638 | exposedPort: *chport |
| 639 | exposedProtocol: TCP |
Lucjan Bryndza | 0844840 | 2019-11-27 14:26:54 +0100 | [diff] [blame] | 640 | config: |
| 641 | ssl: "redirect" |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 642 | |
AndrewLamb | 7709c17 | 2023-05-12 15:37:14 +0100 | [diff] [blame] | 643 | serviceMesh: |
| 644 | authorizationPolicy: |
| 645 | authorizedPrincipals: |
| 646 | - serviceAccount: a1policymanagement-read |
| 647 | - serviceAccount: cds-blueprints-processor-read |
| 648 | - serviceAccount: consul-read |
| 649 | - serviceAccount: ncmp-dmi-plugin-read |
| 650 | - serviceAccount: policy-drools-pdp-read |
| 651 | - serviceAccount: robot-read |
| 652 | - serviceAccount: sdnc-ansible-server-read |
| 653 | - serviceAccount: sdnc-dmaap-listener-read |
| 654 | - serviceAccount: sdnc-prom-read |
| 655 | - serviceAccount: sdnc-ueb-listener-read |
| 656 | - serviceAccount: sdnc-web-read |
| 657 | - serviceAccount: so-sdnc-adapter-read |
| 658 | - serviceAccount: istio-ingress |
| 659 | namespace: istio-ingress |
| 660 | authorizedPrincipalsSdnHosts: |
| 661 | - serviceAccount: sdnc-read |
| 662 | |
toshrajbhardwaj | 72b5f0f | 2018-09-13 02:45:22 +0000 | [diff] [blame] | 663 | #Resource Limit flavor -By Default using small |
| 664 | flavor: small |
| 665 | #segregation for different envionment (Small and Large) |
| 666 | |
| 667 | resources: |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 668 | small: |
| 669 | limits: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 670 | cpu: "2" |
| 671 | memory: "4.7Gi" |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 672 | requests: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 673 | cpu: "1" |
| 674 | memory: "4.7Gi" |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 675 | large: |
| 676 | limits: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 677 | cpu: "4" |
| 678 | memory: "9.4Gi" |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 679 | requests: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 680 | cpu: "2" |
| 681 | memory: "9.4Gi" |
Mandeep Khinda | 60d36d4 | 2018-09-24 15:15:48 +0000 | [diff] [blame] | 682 | unlimited: {} |
farida azmy | 32c5ed8 | 2021-08-04 14:46:09 +0200 | [diff] [blame] | 683 | |
| 684 | #Pods Service Account |
| 685 | serviceAccount: |
| 686 | nameOverride: sdnc |
| 687 | roles: |
| 688 | - read |
Maciej Wereski | 537d71e | 2021-11-03 13:31:44 +0000 | [diff] [blame] | 689 | |
| 690 | #Log configuration |
| 691 | log: |
| 692 | path: /var/log/onap |
Andreas Geissler | 060bc37 | 2024-03-11 17:26:53 +0100 | [diff] [blame] | 693 | |
| 694 | readinessCheck: |
| 695 | wait_for_global_operator: |
| 696 | pods: |
| 697 | - '{{ .Values.global.mariadbGalera.nameOverride }}-0' |
| 698 | wait_for_local_operator: |
| 699 | pods: |
| 700 | - '{{ index .Values "mariadb-galera" "nameOverride" }}-0' |
| 701 | wait_for_global: |
| 702 | apps: |
| 703 | - '{{ include "common.mariadbAppName" . }}' |
| 704 | wait_for_local: |
| 705 | apps: |
| 706 | - '{{ include "common.mariadbAppName" . }}' |