blob: cac8f4b89fde7c70725040f84f0361a04065d7c0 [file] [log] [blame]
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00001# Copyright © 2017 Amdocs, Bell Canada
toshrajbhardwajf4fc1c62018-08-06 07:35:14 +00002# Modifications Copyright © 2018 AT&T
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00003#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
Mandeep Khinda4b881972017-08-30 14:24:02 +000016apiVersion: extensions/v1beta1
17kind: Deployment
18metadata:
kj9bf27312018-03-19 15:07:44 +020019 name: {{ include "common.fullname" . }}
20 namespace: {{ include "common.namespace" . }}
21 labels:
22 app: {{ include "common.name" . }}
23 chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
24 release: {{ .Release.Name }}
25 heritage: {{ .Release.Service }}
Mandeep Khinda4b881972017-08-30 14:24:02 +000026spec:
kj9bf27312018-03-19 15:07:44 +020027 replicas: {{ .Values.replicaCount }}
Mandeep Khinda4b881972017-08-30 14:24:02 +000028 selector:
29 matchLabels:
kj9bf27312018-03-19 15:07:44 +020030 app: {{ include "common.name" . }}
Mandeep Khinda4b881972017-08-30 14:24:02 +000031 template:
32 metadata:
33 labels:
kj9bf27312018-03-19 15:07:44 +020034 app: {{ include "common.name" . }}
35 release: {{ .Release.Name }}
36 name: {{ include "common.name" . }}
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +010037 annotations:
Harish V Kajur8e7cbd22018-05-07 14:02:46 +000038 checksum/config: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }}
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +010039 msb.onap.org/service-info: '[
40 {
41 "serviceName": "_aai-cloudInfrastructure",
42 "version": "v11",
43 "url": "/aai/v11/cloud-infrastructure",
44 "protocol": "REST",
45 "port": "8447",
46 "enable_ssl": true,
47 "lb_policy":"ip_hash",
48 "visualRange": "1",
49 "path": "/aai/v11/cloud-infrastructure"
50 },
51 {
52 "serviceName": "_aai-cloudInfrastructure",
53 "version": "v12",
54 "url": "/aai/v12/cloud-infrastructure",
55 "protocol": "REST",
56 "port": "8447",
57 "enable_ssl": true,
58 "lb_policy":"ip_hash",
59 "visualRange": "1",
60 "path": "/aai/v12/cloud-infrastructure"
61 },
62 {
63 "serviceName": "_aai-cloudInfrastructure",
64 "version": "v13",
65 "url": "/aai/v13/cloud-infrastructure",
66 "protocol": "REST",
67 "port": "8447",
68 "enable_ssl": true,
69 "lb_policy":"ip_hash",
70 "visualRange": "1",
71 "path": "/aai/v13/cloud-infrastructure"
72 },
73 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +010074 "serviceName": "_aai-cloudInfrastructure",
75 "version": "v14",
76 "url": "/aai/v14/cloud-infrastructure",
77 "protocol": "REST",
78 "port": "8447",
79 "enable_ssl": true,
80 "lb_policy":"ip_hash",
81 "visualRange": "1",
82 "path": "/aai/v14/cloud-infrastructure"
83 },
84 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +010085 "serviceName": "_aai-business",
86 "version": "v11",
87 "url": "/aai/v11/business",
88 "protocol": "REST",
89 "port": "8447",
90 "enable_ssl": true,
91 "lb_policy":"ip_hash",
92 "visualRange": "1",
93 "path": "/aai/v11/business"
94 },
95 {
96 "serviceName": "_aai-business",
97 "version": "v12",
98 "url": "/aai/v12/business",
99 "protocol": "REST",
100 "port": "8447",
101 "enable_ssl": true,
102 "lb_policy":"ip_hash",
103 "visualRange": "1",
104 "path": "/aai/v12/business"
105 },
106 {
107 "serviceName": "_aai-business",
108 "version": "v13",
109 "url": "/aai/v13/business",
110 "protocol": "REST",
111 "port": "8447",
112 "enable_ssl": true,
113 "lb_policy":"ip_hash",
114 "visualRange": "1",
115 "path": "/aai/v13/business"
116 },
117 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100118 "serviceName": "_aai-business",
119 "version": "v14",
120 "url": "/aai/v14/business",
121 "protocol": "REST",
122 "port": "8447",
123 "enable_ssl": true,
124 "lb_policy":"ip_hash",
125 "visualRange": "1",
126 "path": "/aai/v14/business"
127 },
128 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100129 "serviceName": "_aai-actions",
130 "version": "v11",
131 "url": "/aai/v11/actions",
132 "protocol": "REST",
133 "port": "8447",
134 "enable_ssl": true,
135 "lb_policy":"ip_hash",
136 "visualRange": "1",
137 "path": "/aai/v11/actions"
138 },
139 {
140 "serviceName": "_aai-actions",
141 "version": "v12",
142 "url": "/aai/v12/actions",
143 "protocol": "REST",
144 "port": "8447",
145 "enable_ssl": true,
146 "lb_policy":"ip_hash",
147 "visualRange": "1",
148 "path": "/aai/v12/actions"
149 },
150 {
151 "serviceName": "_aai-actions",
152 "version": "v13",
153 "url": "/aai/v13/actions",
154 "protocol": "REST",
155 "port": "8447",
156 "enable_ssl": true,
157 "lb_policy":"ip_hash",
158 "visualRange": "1",
159 "path": "/aai/v13/actions"
160 },
161 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100162 "serviceName": "_aai-actions",
163 "version": "v14",
164 "url": "/aai/v14/actions",
165 "protocol": "REST",
166 "port": "8447",
167 "enable_ssl": true,
168 "lb_policy":"ip_hash",
169 "visualRange": "1",
170 "path": "/aai/v14/actions"
171 },
172 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100173 "serviceName": "_aai-service-design-and-creation",
174 "version": "v11",
175 "url": "/aai/v11/service-design-and-creation",
176 "protocol": "REST",
177 "port": "8447",
178 "enable_ssl": true,
179 "lb_policy":"ip_hash",
180 "visualRange": "1",
181 "path": "/aai/v11/service-design-and-creation"
182 },
183 {
184 "serviceName": "_aai-service-design-and-creation",
185 "version": "v12",
186 "url": "/aai/v12/service-design-and-creation",
187 "protocol": "REST",
188 "port": "8447",
189 "enable_ssl": true,
190 "lb_policy":"ip_hash",
191 "visualRange": "1",
192 "path": "/aai/v12/service-design-and-creation"
193 },
194 {
195 "serviceName": "_aai-service-design-and-creation",
196 "version": "v13",
197 "url": "/aai/v13/service-design-and-creation",
198 "protocol": "REST",
199 "port": "8447",
200 "enable_ssl": true,
201 "lb_policy":"ip_hash",
202 "visualRange": "1",
203 "path": "/aai/v13/service-design-and-creation"
204 },
205 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100206 "serviceName": "_aai-service-design-and-creation",
207 "version": "v14",
208 "url": "/aai/v14/service-design-and-creation",
209 "protocol": "REST",
210 "port": "8447",
211 "enable_ssl": true,
212 "lb_policy":"ip_hash",
213 "visualRange": "1",
214 "path": "/aai/v14/service-design-and-creation"
215 },
216 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100217 "serviceName": "_aai-network",
218 "version": "v11",
219 "url": "/aai/v11/network",
220 "protocol": "REST",
221 "port": "8447",
222 "enable_ssl": true,
223 "lb_policy":"ip_hash",
224 "visualRange": "1",
225 "path": "/aai/v11/network"
226 },
227 {
228 "serviceName": "_aai-network",
229 "version": "v12",
230 "url": "/aai/v12/network",
231 "protocol": "REST",
232 "port": "8447",
233 "enable_ssl": true,
234 "lb_policy":"ip_hash",
235 "visualRange": "1",
236 "path": "/aai/v12/network"
237 },
238 {
239 "serviceName": "_aai-network",
240 "version": "v13",
241 "url": "/aai/v13/network",
242 "protocol": "REST",
243 "port": "8447",
244 "enable_ssl": true,
245 "lb_policy":"ip_hash",
246 "visualRange": "1",
247 "path": "/aai/v13/network"
248 },
249 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100250 "serviceName": "_aai-network",
251 "version": "v14",
252 "url": "/aai/v14/network",
253 "protocol": "REST",
254 "port": "8447",
255 "enable_ssl": true,
256 "lb_policy":"ip_hash",
257 "visualRange": "1",
258 "path": "/aai/v14/network"
259 },
260 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100261 "serviceName": "_aai-externalSystem",
262 "version": "v11",
263 "url": "/aai/v11/external-system",
264 "protocol": "REST",
265 "port": "8447",
266 "enable_ssl": true,
267 "lb_policy":"ip_hash",
268 "visualRange": "1",
269 "path": "/aai/v11/external-system"
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100270 },
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100271 {
272 "serviceName": "_aai-externalSystem",
273 "version": "v12",
274 "url": "/aai/v12/external-system",
275 "protocol": "REST",
276 "port": "8447",
277 "enable_ssl": true,
278 "lb_policy":"ip_hash",
279 "visualRange": "1",
280 "path": "/aai/v12/external-system"
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100281 },
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100282 {
283 "serviceName": "_aai-externalSystem",
284 "version": "v13",
285 "url": "/aai/v13/external-system",
286 "protocol": "REST",
287 "port": "8447",
288 "enable_ssl": true,
289 "lb_policy":"ip_hash",
290 "visualRange": "1",
291 "path": "/aai/v13/external-system"
292 },
293 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100294 "serviceName": "_aai-externalSystem",
295 "version": "v14",
296 "url": "/aai/v14/external-system",
297 "protocol": "REST",
298 "port": "8447",
299 "enable_ssl": true,
300 "lb_policy":"ip_hash",
301 "visualRange": "1",
302 "path": "/aai/v14/external-system"
303 },
304 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100305 "serviceName": "aai-cloudInfrastructure",
306 "version": "v11",
307 "url": "/aai/v11/cloud-infrastructure",
308 "protocol": "REST",
309 "port": "8447",
310 "enable_ssl": true,
311 "lb_policy":"ip_hash",
312 "visualRange": "1"
313 },
314 {
315 "serviceName": "aai-cloudInfrastructure",
316 "version": "v12",
317 "url": "/aai/v12/cloud-infrastructure",
318 "protocol": "REST",
319 "port": "8447",
320 "enable_ssl": true,
321 "lb_policy":"ip_hash",
322 "visualRange": "1"
323 },
324 {
325 "serviceName": "aai-cloudInfrastructure",
326 "version": "v13",
327 "url": "/aai/v13/cloud-infrastructure",
328 "protocol": "REST",
329 "port": "8447",
330 "enable_ssl": true,
331 "lb_policy":"ip_hash",
332 "visualRange": "1"
333 },
334 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100335 "serviceName": "aai-cloudInfrastructure",
336 "version": "v14",
337 "url": "/aai/v14/cloud-infrastructure",
338 "protocol": "REST",
339 "port": "8447",
340 "enable_ssl": true,
341 "lb_policy":"ip_hash",
342 "visualRange": "1"
343 },
344 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100345 "serviceName": "aai-business",
346 "version": "v11",
347 "url": "/aai/v11/business",
348 "protocol": "REST",
349 "port": "8447",
350 "enable_ssl": true,
351 "lb_policy":"ip_hash",
352 "visualRange": "1"
353 },
354 {
355 "serviceName": "aai-business",
356 "version": "v12",
357 "url": "/aai/v12/business",
358 "protocol": "REST",
359 "port": "8447",
360 "enable_ssl": true,
361 "lb_policy":"ip_hash",
362 "visualRange": "1"
363 },
364 {
365 "serviceName": "aai-business",
366 "version": "v13",
367 "url": "/aai/v13/business",
368 "protocol": "REST",
369 "port": "8447",
370 "enable_ssl": true,
371 "lb_policy":"ip_hash",
372 "visualRange": "1"
373 },
374 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100375 "serviceName": "aai-business",
376 "version": "v14",
377 "url": "/aai/v14/business",
378 "protocol": "REST",
379 "port": "8447",
380 "enable_ssl": true,
381 "lb_policy":"ip_hash",
382 "visualRange": "1"
383 },
384 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100385 "serviceName": "aai-actions",
386 "version": "v11",
387 "url": "/aai/v11/actions",
388 "protocol": "REST",
389 "port": "8447",
390 "enable_ssl": true,
391 "lb_policy":"ip_hash",
392 "visualRange": "1"
393 },
394 {
395 "serviceName": "aai-actions",
396 "version": "v12",
397 "url": "/aai/v12/actions",
398 "protocol": "REST",
399 "port": "8447",
400 "enable_ssl": true,
401 "lb_policy":"ip_hash",
402 "visualRange": "1"
403 },
404 {
405 "serviceName": "aai-actions",
406 "version": "v13",
407 "url": "/aai/v13/actions",
408 "protocol": "REST",
409 "port": "8447",
410 "enable_ssl": true,
411 "lb_policy":"ip_hash",
412 "visualRange": "1"
413 },
414 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100415 "serviceName": "aai-actions",
416 "version": "v14",
417 "url": "/aai/v14/actions",
418 "protocol": "REST",
419 "port": "8447",
420 "enable_ssl": true,
421 "lb_policy":"ip_hash",
422 "visualRange": "1"
423 },
424 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100425 "serviceName": "aai-service-design-and-creation",
426 "version": "v11",
427 "url": "/aai/v11/service-design-and-creation",
428 "protocol": "REST",
429 "port": "8447",
430 "enable_ssl": true,
431 "lb_policy":"ip_hash",
432 "visualRange": "1"
433 },
434 {
435 "serviceName": "aai-service-design-and-creation",
436 "version": "v12",
437 "url": "/aai/v12/service-design-and-creation",
438 "protocol": "REST",
439 "port": "8447",
440 "enable_ssl": true,
441 "lb_policy":"ip_hash",
442 "visualRange": "1"
443 },
444 {
445 "serviceName": "aai-service-design-and-creation",
446 "version": "v13",
447 "url": "/aai/v13/service-design-and-creation",
448 "protocol": "REST",
449 "port": "8447",
450 "enable_ssl": true,
451 "lb_policy":"ip_hash",
452 "visualRange": "1"
453 },
454 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100455 "serviceName": "aai-service-design-and-creation",
456 "version": "v14",
457 "url": "/aai/v14/service-design-and-creation",
458 "protocol": "REST",
459 "port": "8447",
460 "enable_ssl": true,
461 "lb_policy":"ip_hash",
462 "visualRange": "1"
463 },
464 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100465 "serviceName": "aai-network",
466 "version": "v11",
467 "url": "/aai/v11/network",
468 "protocol": "REST",
469 "port": "8447",
470 "enable_ssl": true,
471 "lb_policy":"ip_hash",
472 "visualRange": "1"
473 },
474 {
475 "serviceName": "aai-network",
476 "version": "v12",
477 "url": "/aai/v12/network",
478 "protocol": "REST",
479 "port": "8447",
480 "enable_ssl": true,
481 "lb_policy":"ip_hash",
482 "visualRange": "1"
483 },
484 {
485 "serviceName": "aai-network",
486 "version": "v13",
487 "url": "/aai/v13/network",
488 "protocol": "REST",
489 "port": "8447",
490 "enable_ssl": true,
491 "lb_policy":"ip_hash",
492 "visualRange": "1"
493 },
494 {
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100495 "serviceName": "aai-network",
496 "version": "v14",
497 "url": "/aai/v14/network",
498 "protocol": "REST",
499 "port": "8447",
500 "enable_ssl": true,
501 "lb_policy":"ip_hash",
502 "visualRange": "1"
503 },
504 {
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100505 "serviceName": "aai-externalSystem",
506 "version": "v11",
507 "url": "/aai/v11/external-system",
508 "protocol": "REST",
509 "port": "8447",
510 "enable_ssl": true,
511 "lb_policy":"ip_hash",
512 "visualRange": "1"
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100513 },
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100514 {
515 "serviceName": "aai-externalSystem",
516 "version": "v12",
517 "url": "/aai/v12/external-system",
518 "protocol": "REST",
519 "port": "8447",
520 "enable_ssl": true,
521 "lb_policy":"ip_hash",
522 "visualRange": "1"
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100523 },
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100524 {
525 "serviceName": "aai-externalSystem",
526 "version": "v13",
527 "url": "/aai/v13/external-system",
528 "protocol": "REST",
529 "port": "8447",
530 "enable_ssl": true,
531 "lb_policy":"ip_hash",
532 "visualRange": "1"
Ondrej Frindrichd1400ca2018-12-03 12:46:16 +0100533 },
534 {
535 "serviceName": "aai-externalSystem",
536 "version": "v14",
537 "url": "/aai/v14/external-system",
538 "protocol": "REST",
539 "port": "8447",
540 "enable_ssl": true,
541 "lb_policy":"ip_hash",
542 "visualRange": "1"
kj9bf27312018-03-19 15:07:44 +0200543 }
AdrianSlavkovsky03cc5892018-03-08 09:55:53 +0100544 ]'
Mandeep Khinda4b881972017-08-30 14:24:02 +0000545 spec:
vagrant1a3a3552018-03-10 23:56:32 +0000546 hostname: aai-resources
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400547 {{ if .Values.global.initContainers.enabled }}
Ravi Geda2578aa12018-11-07 22:37:16 +0000548 {{ if .Values.global.installSidecarSecurity }}
549 hostAliases:
550 - ip: {{ .Values.global.aaf.serverIp }}
551 hostnames:
552 - {{ .Values.global.aaf.serverHostname }}
553 {{ end }}
kiranya52a57832017-11-22 12:21:55 +0000554 initContainers:
555 - command:
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400556 {{ if .Values.global.jobs.createSchema.enabled }}
557 - /root/job_complete.py
558 args:
559 - --job-name
560 - {{ .Release.Name }}-aai-graphadmin-create-db-schema
561 {{ else }}
kiranya52a57832017-11-22 12:21:55 +0000562 - /root/ready.py
563 args:
564 - --container-name
vagrant1a3a3552018-03-10 23:56:32 +0000565 - aai-cassandra
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400566 {{ end }}
kiranya52a57832017-11-22 12:21:55 +0000567 env:
568 - name: NAMESPACE
569 valueFrom:
570 fieldRef:
571 apiVersion: v1
572 fieldPath: metadata.namespace
kj9bf27312018-03-19 15:07:44 +0200573 image: "{{ .Values.global.readinessRepository }}/{{ .Values.global.readinessImage }}"
574 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
575 name: {{ include "common.name" . }}-readiness
Ravi Geda2578aa12018-11-07 22:37:16 +0000576 {{ if .Values.global.installSidecarSecurity }}
577 - name: {{ .Values.global.tproxyConfig.name }}
578 image: "{{ include "common.repository" . }}/{{ .Values.global.tproxyConfig.image }}"
579 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
580 securityContext:
581 privileged: true
582 {{ end }}
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400583 {{ end }}
Mandeep Khinda4b881972017-08-30 14:24:02 +0000584 containers:
kj9bf27312018-03-19 15:07:44 +0200585 - name: {{ include "common.name" . }}
BorislavGdf11cd52018-05-06 12:55:20 +0000586 image: "{{ include "common.repository" . }}/{{ .Values.image }}"
kj9bf27312018-03-19 15:07:44 +0200587 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Mandeep Khinda4b881972017-08-30 14:24:02 +0000588 env:
vagrant1a3a3552018-03-10 23:56:32 +0000589 - name: LOCAL_USER_ID
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400590 value: {{ .Values.global.config.userId | quote }}
vagrant1a3a3552018-03-10 23:56:32 +0000591 - name: LOCAL_GROUP_ID
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400592 value: {{ .Values.global.config.groupId | quote }}
Mandeep Khinda4b881972017-08-30 14:24:02 +0000593 volumeMounts:
yuryn8b3bc5a2017-09-13 19:21:03 +0300594 - mountPath: /etc/localtime
595 name: localtime
596 readOnly: true
vagrant1a3a3552018-03-10 23:56:32 +0000597 - mountPath: /opt/app/aai-resources/resources/etc/appprops/janusgraph-realtime.properties
598 name: {{ include "common.fullname" . }}-db-real-conf
599 subPath: janusgraph-realtime.properties
600 - mountPath: /opt/app/aai-resources/resources/etc/appprops/janusgraph-cached.properties
601 name: {{ include "common.fullname" . }}-db-cached-conf
602 subPath: janusgraph-cached.properties
603 - mountPath: /opt/app/aai-resources/resources/etc/appprops/aaiconfig.properties
604 name: {{ include "common.fullname" . }}-aaiconfig-conf
605 subPath: aaiconfig.properties
Harish V Kajur8e7cbd22018-05-07 14:02:46 +0000606 - mountPath: /opt/aai/logroot/AAI-RES
vagrant1a3a3552018-03-10 23:56:32 +0000607 name: {{ include "common.fullname" . }}-logs
608 - mountPath: /opt/app/aai-resources/resources/logback.xml
609 name: {{ include "common.fullname" . }}-log-conf
BorislavGb2b99182017-10-03 15:40:55 +0300610 subPath: logback.xml
vagrant1a3a3552018-03-10 23:56:32 +0000611 - mountPath: /opt/app/aai-resources/resources/localhost-access-logback.xml
612 name: {{ include "common.fullname" . }}-localhost-access-log-conf
613 subPath: localhost-access-logback.xml
Kajur, Harish (vk250x)5386b5a2018-10-03 11:41:42 -0400614 - mountPath: /opt/app/aai-resources/resources/etc/auth/realm.properties
615 name: {{ include "common.fullname" . }}-realm-conf
616 subPath: realm.properties
Ravi Geda2578aa12018-11-07 22:37:16 +0000617 {{ if .Values.global.installSidecarSecurity }}
618 - mountPath: /opt/app/aai-resources/resources/etc/auth/aai_policy.json
619 name: {{ include "common.fullname" . }}-aai-policy
620 subPath: aai_policy.json
621 {{ end }}
Pavel Paroulek58ab38e2018-09-12 21:34:41 +0200622 - mountPath: /opt/app/aai-resources/resources/aaf/org.onap.aai.keyfile
623 name: {{ include "common.fullname" . }}-aaf-certs
624 subPath: org.onap.aai.keyfile
Pavel Paroulek8aaf2cf2018-10-16 15:21:06 +0200625 - mountPath: /opt/app/aai-resources/resources/aaf/bath_config.csv
626 name: {{ include "common.fullname" . }}-aaf-certs
627 subPath: bath_config.csv
Pavel Paroulek58ab38e2018-09-12 21:34:41 +0200628 - mountPath: /opt/app/aai-resources/resources/aaf/org.onap.aai.props
629 name: {{ include "common.fullname" . }}-aaf-properties
630 subPath: org.onap.aai.props
631 - mountPath: /opt/app/aai-resources/resources/aaf/org.osaaf.location.props
632 name: {{ include "common.fullname" . }}-aaf-properties
633 subPath: org.osaaf.location.props
634 - mountPath: /opt/app/aai-resources/resources/aaf/permissions.properties
635 name: {{ include "common.fullname" . }}-aaf-properties
636 subPath: permissions.properties
637 - mountPath: /opt/app/aai-resources/resources/cadi.properties
638 name: {{ include "common.fullname" . }}-aaf-properties
639 subPath: cadi.properties
640 - mountPath: /opt/app/aai-resources/resources/aaf/org.onap.aai.p12
641 name: {{ include "common.fullname" . }}-aaf-certs
642 subPath: org.onap.aai.p12
643 - mountPath: /opt/app/aai-resources/resources/aaf/truststoreONAPall.jks
Arul.Nambic5f034a2019-01-08 01:55:24 -0500644 name: aai-common-aai-auth-mount
Pavel Paroulek58ab38e2018-09-12 21:34:41 +0200645 subPath: truststoreONAPall.jks
vagrant1a3a3552018-03-10 23:56:32 +0000646 - mountPath: /opt/app/aai-resources/resources/application.properties
647 name: {{ include "common.fullname" . }}-springapp-conf
648 subPath: application.properties
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400649 {{ $global := . }}
650 {{ range $job := .Values.global.config.auth.files }}
651 - mountPath: /opt/app/aai-resources/resources/etc/auth/{{ . }}
652 name: {{ include "common.fullname" $global }}-auth-truststore-sec
653 subPath: {{ . }}
654 {{ end }}
Mandeep Khinda4b881972017-08-30 14:24:02 +0000655 ports:
kj9bf27312018-03-19 15:07:44 +0200656 - containerPort: {{ .Values.service.internalPort }}
657 - containerPort: {{ .Values.service.internalPort2 }}
658 # disable liveness probe when breakpoints set in debugger
659 # so K8s doesn't restart unresponsive container
660 {{ if .Values.liveness.enabled }}
661 livenessProbe:
662 tcpSocket:
663 port: {{ .Values.service.internalPort }}
664 initialDelaySeconds: {{ .Values.liveness.initialDelaySeconds }}
665 periodSeconds: {{ .Values.liveness.periodSeconds }}
666 {{ end }}
Mandeep Khinda4b881972017-08-30 14:24:02 +0000667 readinessProbe:
668 tcpSocket:
kj9bf27312018-03-19 15:07:44 +0200669 port: {{ .Values.service.internalPort }}
670 initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }}
671 periodSeconds: {{ .Values.readiness.periodSeconds }}
672 resources:
Mandeep Khinda5e3f36a2018-09-24 15:25:42 +0000673{{ include "common.resources" . | indent 12 }}
kj9bf27312018-03-19 15:07:44 +0200674 {{- if .Values.nodeSelector }}
675 nodeSelector:
676{{ toYaml .Values.nodeSelector | indent 8 }}
677 {{- end -}}
678 {{- if .Values.affinity }}
679 affinity:
680{{ toYaml .Values.affinity | indent 8 }}
681 {{- end }}
682
683 # side car containers
684 - name: filebeat-onap
685 image: "{{ .Values.global.loggingRepository }}/{{ .Values.global.loggingImage }}"
686 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
BorislavGb2b99182017-10-03 15:40:55 +0300687 volumeMounts:
688 - mountPath: /usr/share/filebeat/filebeat.yml
mayankg2703f313ba92018-02-05 09:01:02 +0000689 subPath: filebeat.yml
BorislavGb2b99182017-10-03 15:40:55 +0300690 name: filebeat-conf
691 - mountPath: /var/log/onap
vagrant1a3a3552018-03-10 23:56:32 +0000692 name: {{ include "common.fullname" . }}-logs
BorislavGb2b99182017-10-03 15:40:55 +0300693 - mountPath: /usr/share/filebeat/data
vagrant1a3a3552018-03-10 23:56:32 +0000694 name: {{ include "common.fullname" . }}-filebeat
Ravi Geda2578aa12018-11-07 22:37:16 +0000695 {{ if .Values.global.installSidecarSecurity }}
696 - name: {{ .Values.global.rproxy.name }}
697 image: "{{ include "common.repository" . }}/{{ .Values.global.rproxy.image }}"
698 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
699 env:
700 - name: CONFIG_HOME
701 value: "/opt/app/rproxy/config"
702 - name: KEY_STORE_PASSWORD
703 value: {{ .Values.sidecar.keyStorePassword }}
704 - name: spring_profiles_active
705 value: {{ .Values.global.rproxy.activeSpringProfiles }}
706 volumeMounts:
707 - name: {{ include "common.fullname" . }}-rproxy-config
708 mountPath: /opt/app/rproxy/config/forward-proxy.properties
709 subPath: forward-proxy.properties
710 - name: {{ include "common.fullname" . }}-rproxy-config
711 mountPath: /opt/app/rproxy/config/primary-service.properties
712 subPath: primary-service.properties
713 - name: {{ include "common.fullname" . }}-rproxy-config
714 mountPath: /opt/app/rproxy/config/reverse-proxy.properties
715 subPath: reverse-proxy.properties
716 - name: {{ include "common.fullname" . }}-rproxy-config
717 mountPath: /opt/app/rproxy/config/cadi.properties
718 subPath: cadi.properties
719 - name: {{ include "common.fullname" . }}-rproxy-log-config
720 mountPath: /opt/app/rproxy/config/logback-spring.xml
721 subPath: logback-spring.xml
722 - name: {{ include "common.fullname" . }}-rproxy-auth-config
723 mountPath: /opt/app/rproxy/config/auth/tomcat_keystore
724 subPath: tomcat_keystore
725 - name: {{ include "common.fullname" . }}-rproxy-auth-config
726 mountPath: /opt/app/rproxy/config/auth/client-cert.p12
727 subPath: client-cert.p12
728 - name: {{ include "common.fullname" . }}-rproxy-auth-config
729 mountPath: /opt/app/rproxy/config/auth/uri-authorization.json
730 subPath: uri-authorization.json
731 - name: {{ include "common.fullname" . }}-rproxy-auth-config
732 mountPath: /opt/app/rproxy/config/auth/aaf_truststore.jks
733 subPath: aaf_truststore.jks
734 - name: {{ include "common.fullname" . }}-rproxy-security-config
735 mountPath: /opt/app/rproxy/config/security/keyfile
736 subPath: keyfile
737 - name: {{ include "common.fullname" . }}-rproxy-auth-config
738 mountPath: /opt/app/rproxy/config/auth/org.onap.aai.p12
739 subPath: org.onap.aai.p12
740 ports:
741 - containerPort: {{ .Values.global.rproxy.port }}
742
743 - name: {{ .Values.global.fproxy.name }}
744 image: "{{ include "common.repository" . }}/{{ .Values.global.fproxy.image }}"
745 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
746 env:
747 - name: CONFIG_HOME
748 value: "/opt/app/fproxy/config"
749 - name: KEY_STORE_PASSWORD
750 value: {{ .Values.sidecar.keyStorePassword }}
751 - name: TRUST_STORE_PASSWORD
752 value: {{ .Values.sidecar.trustStorePassword }}
753 - name: spring_profiles_active
754 value: {{ .Values.global.fproxy.activeSpringProfiles }}
755 volumeMounts:
756 - name: {{ include "common.fullname" . }}-fproxy-config
757 mountPath: /opt/app/fproxy/config/fproxy.properties
758 subPath: fproxy.properties
759 - name: {{ include "common.fullname" . }}-fproxy-log-config
760 mountPath: /opt/app/fproxy/config/logback-spring.xml
761 subPath: logback-spring.xml
762 - name: {{ include "common.fullname" . }}-fproxy-auth-config
763 mountPath: /opt/app/fproxy/config/auth/fproxy_truststore
764 subPath: fproxy_truststore
765 - name: {{ include "common.fullname" . }}-fproxy-auth-config
766 mountPath: /opt/app/fproxy/config/auth/tomcat_keystore
767 subPath: tomcat_keystore
768 - name: {{ include "common.fullname" . }}-fproxy-auth-config
769 mountPath: /opt/app/fproxy/config/auth/client-cert.p12
770 subPath: client-cert.p12
771 ports:
772 - containerPort: {{ .Values.global.fproxy.port }}
773 {{ end }}
kj9bf27312018-03-19 15:07:44 +0200774
Mandeep Khinda4b881972017-08-30 14:24:02 +0000775 volumes:
Arul.Nambic5f034a2019-01-08 01:55:24 -0500776 - name: aai-common-aai-auth-mount
777 secret:
778 secretName: aai-common-aai-auth
yuryn8b3bc5a2017-09-13 19:21:03 +0300779 - name: localtime
780 hostPath:
781 path: /etc/localtime
BorislavGb2b99182017-10-03 15:40:55 +0300782 - name: filebeat-conf
mayankg2703f313ba92018-02-05 09:01:02 +0000783 configMap:
kj9bf27312018-03-19 15:07:44 +0200784 name: aai-filebeat
vagrant1a3a3552018-03-10 23:56:32 +0000785 - name: {{ include "common.fullname" . }}-logs
BorislavGb2b99182017-10-03 15:40:55 +0300786 emptyDir: {}
vagrant1a3a3552018-03-10 23:56:32 +0000787 - name: {{ include "common.fullname" . }}-filebeat
BorislavGb2b99182017-10-03 15:40:55 +0300788 emptyDir: {}
vagrant1a3a3552018-03-10 23:56:32 +0000789 - name: {{ include "common.fullname" . }}-log-conf
BorislavGb2b99182017-10-03 15:40:55 +0300790 configMap:
vagrant1a3a3552018-03-10 23:56:32 +0000791 name: {{ include "common.fullname" . }}-log
792 - name: {{ include "common.fullname" . }}-localhost-access-log-conf
793 configMap:
794 name: {{ include "common.fullname" . }}-localhost-access-log-configmap
795 - name: {{ include "common.fullname" . }}-db-real-conf
796 configMap:
797 name: {{ include "common.fullname" . }}-db-real-configmap
798 - name: {{ include "common.fullname" . }}-db-cached-conf
799 configMap:
800 name: {{ include "common.fullname" . }}-db-cached-configmap
801 - name: {{ include "common.fullname" . }}-aaiconfig-conf
802 configMap:
803 name: {{ include "common.fullname" . }}-aaiconfig-configmap
Pavel Paroulek58ab38e2018-09-12 21:34:41 +0200804 - name: {{ include "common.fullname" . }}-aaf-properties
805 configMap:
806 name: {{ include "common.fullname" . }}-aaf-props
807 - name: {{ include "common.fullname" . }}-aaf-certs
808 secret:
809 secretName: {{ include "common.fullname" . }}-aaf-keys
vagrant1a3a3552018-03-10 23:56:32 +0000810 - name: {{ include "common.fullname" . }}-springapp-conf
811 configMap:
812 name: {{ include "common.fullname" . }}-springapp-configmap
813 - name: {{ include "common.fullname" . }}-realm-conf
814 configMap:
815 name: {{ include "common.fullname" . }}-realm-configmap
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400816 - name: {{ include "common.fullname" . }}-auth-truststore-sec
vagrant1a3a3552018-03-10 23:56:32 +0000817 secret:
Kajur, Harish (vk250x)00107b52018-09-06 14:44:40 -0400818 secretName: aai-auth-truststore-secret
819 items:
820 {{ range $job := .Values.global.config.auth.files }}
821 - key: {{ . }}
822 path: {{ . }}
823 {{ end }}
Ravi Geda2578aa12018-11-07 22:37:16 +0000824 {{ if .Values.global.installSidecarSecurity }}
825 - name: {{ include "common.fullname" . }}-aai-policy
826 configMap:
827 name: {{ include "common.fullname" . }}-aai-policy-configmap
828 - name: {{ include "common.fullname" . }}-rproxy-config
829 configMap:
830 name: {{ include "common.fullname" . }}-rproxy-config
831 - name: {{ include "common.fullname" . }}-rproxy-log-config
832 configMap:
833 name: {{ include "common.fullname" . }}-rproxy-log-config
834 - name: {{ include "common.fullname" . }}-rproxy-auth-config
835 secret:
836 secretName: {{ include "common.fullname" . }}-rproxy-auth-config
837 - name: {{ include "common.fullname" . }}-rproxy-security-config
838 secret:
839 secretName: {{ include "common.fullname" . }}-rproxy-security-config
840 - name: {{ include "common.fullname" . }}-fproxy-config
841 configMap:
842 name: {{ include "common.fullname" . }}-fproxy-config
843 - name: {{ include "common.fullname" . }}-fproxy-log-config
844 configMap:
845 name: {{ include "common.fullname" . }}-fproxy-log-config
846 - name: {{ include "common.fullname" . }}-fproxy-auth-config
847 secret:
848 secretName: {{ include "common.fullname" . }}-fproxy-auth-config
849 {{ end }}
vagrant1a3a3552018-03-10 23:56:32 +0000850 restartPolicy: {{ .Values.restartPolicy }}
Mandeep Khinda4b881972017-08-30 14:24:02 +0000851 imagePullSecrets:
kj9bf27312018-03-19 15:07:44 +0200852 - name: "{{ include "common.namespace" . }}-docker-registry-key"