jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 1 | # Copyright © 2020 Huawei Technologies Co., Ltd. |
| 2 | # |
| 3 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | # you may not use this file except in compliance with the License. |
| 5 | # You may obtain a copy of the License at |
| 6 | # |
| 7 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | # |
| 9 | # Unless required by applicable law or agreed to in writing, software |
| 10 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | # See the License for the specific language governing permissions and |
| 13 | # limitations under the License. |
| 14 | ################################################################# |
| 15 | # Global configuration defaults. |
| 16 | ################################################################# |
| 17 | global: |
| 18 | nodePortPrefix: 302 |
| 19 | nodePortPrefixExt: 304 |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 20 | persistence: |
| 21 | mountPath: /dockerdata-nfs |
seshukm | 0df1f8e | 2020-08-17 21:45:49 +0530 | [diff] [blame] | 22 | security: |
| 23 | aaf: |
| 24 | enabled: false |
| 25 | aaf: |
| 26 | auth: |
| 27 | header: Basic c29Ac28ub25hcC5vcmc6ZGVtbzEyMzQ1Ngo= |
krishnaa96 | 92b606b | 2020-10-30 11:29:21 +0530 | [diff] [blame] | 28 | mariadbGalera: |
| 29 | serviceName: mariadb-galera |
| 30 | servicePort: '3306' |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 31 | |
Sylvain Desbureaux | d055a17 | 2020-10-30 14:32:03 +0100 | [diff] [blame] | 32 | readinessCheck: |
| 33 | wait_for: |
| 34 | - so-mariadb-config |
| 35 | |
| 36 | |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 37 | ################################################################# |
| 38 | # Secrets metaconfig |
| 39 | ################################################################# |
| 40 | secrets: |
| 41 | - uid: db-user-creds |
| 42 | name: '{{ include "common.release" . }}-so-bpmn-infra-db-user-creds' |
| 43 | type: basicAuth |
| 44 | externalSecret: '{{ tpl (default "" .Values.db.userCredsExternalSecret) . }}' |
| 45 | login: '{{ .Values.db.userName }}' |
| 46 | password: '{{ .Values.db.userPassword }}' |
| 47 | passwordPolicy: required |
| 48 | - uid: db-admin-creds |
| 49 | name: '{{ include "common.release" . }}-so-bpmn-infra-db-admin-creds' |
| 50 | type: basicAuth |
| 51 | externalSecret: '{{ tpl (default "" .Values.db.adminCredsExternalSecret) . }}' |
| 52 | login: '{{ .Values.db.adminName }}' |
| 53 | password: '{{ .Values.db.adminPassword }}' |
| 54 | passwordPolicy: required |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 55 | - uid: server-bpel-creds |
| 56 | name: '{{ include "common.release" . }}-so-server-bpel-creds' |
| 57 | type: basicAuth |
| 58 | externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}' |
| 59 | login: '{{ .Values.server.bpel.username }}' |
| 60 | password: '{{ .Values.server.bpel.password }}' |
| 61 | passwordPolicy: required |
| 62 | - uid: server-actuator-creds |
| 63 | name: '{{ include "common.release" . }}-so-server-actuator-creds' |
| 64 | type: basicAuth |
| 65 | externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}' |
| 66 | login: '{{ .Values.server.actuator.username }}' |
| 67 | password: '{{ .Values.server.actuator.password }}' |
| 68 | passwordPolicy: required |
| 69 | |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 70 | #secretsFilePaths: | |
| 71 | # - 'my file 1' |
| 72 | # - '{{ include "templateThatGeneratesFileName" . }}' |
| 73 | |
| 74 | ################################################################# |
| 75 | # Application configuration defaults. |
| 76 | ################################################################# |
seshukm | 65ba214 | 2021-04-01 21:59:10 +0530 | [diff] [blame^] | 77 | image: onap/so/so-nssmf-adapter:1.8.3 |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 78 | pullPolicy: Always |
| 79 | |
| 80 | db: |
| 81 | userName: so_user |
| 82 | userPassword: so_User123 |
| 83 | # userCredsExternalSecret: some secret |
| 84 | adminName: so_admin |
| 85 | adminPassword: so_Admin123 |
| 86 | # adminCredsExternalSecret: some secret |
| 87 | server: |
| 88 | actuator: |
| 89 | username: mso_admin |
| 90 | password: password1$ |
| 91 | bpel: |
| 92 | username: bpel |
| 93 | password: password1$ |
seshukm | 0df1f8e | 2020-08-17 21:45:49 +0530 | [diff] [blame] | 94 | aai: |
| 95 | auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586 |
| 96 | mso: |
| 97 | adapters: |
| 98 | requestDb: |
| 99 | auth: Basic YnBlbDpwYXNzd29yZDEk |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 100 | |
| 101 | replicaCount: 1 |
| 102 | minReadySeconds: 10 |
seshukm | 0df1f8e | 2020-08-17 21:45:49 +0530 | [diff] [blame] | 103 | containerPort: &containerPort 8088 |
seshukm | 65ba214 | 2021-04-01 21:59:10 +0530 | [diff] [blame^] | 104 | logPath: ./logs/nssmf-adapter/ |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 105 | app: nssmf-adapter |
| 106 | service: |
| 107 | type: ClusterIP |
| 108 | ports: |
| 109 | - name: api |
seshukm | 0df1f8e | 2020-08-17 21:45:49 +0530 | [diff] [blame] | 110 | port: *containerPort |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 111 | updateStrategy: |
| 112 | type: RollingUpdate |
| 113 | maxUnavailable: 1 |
| 114 | maxSurge: 1 |
seshukm | 0df1f8e | 2020-08-17 21:45:49 +0530 | [diff] [blame] | 115 | |
| 116 | soHelpers: |
| 117 | nameOverride: so-nssmf-cert-init |
| 118 | certInitializer: |
| 119 | nameOverride: so-nssmf-cert-init |
| 120 | credsPath: /opt/app/osaaf/local |
| 121 | cadi: |
| 122 | apiEnforcement: org.onap.so.nssmfAdapterPerm |
| 123 | containerPort: *containerPort |
| 124 | |
jananib | 28734e0 | 2020-04-08 21:35:45 +0530 | [diff] [blame] | 125 | # Resource Limit flavor -By Default using small |
| 126 | flavor: small |
| 127 | # Segregation for Different environment (Small and Large) |
| 128 | resources: |
| 129 | small: |
| 130 | limits: |
| 131 | memory: 4Gi |
| 132 | cpu: 2000m |
| 133 | requests: |
| 134 | memory: 1Gi |
| 135 | cpu: 500m |
| 136 | large: |
| 137 | limits: |
| 138 | memory: 8Gi |
| 139 | cpu: 4000m |
| 140 | requests: |
| 141 | memory: 2Gi |
| 142 | cpu: 1000m |
| 143 | unlimited: {} |
| 144 | livenessProbe: |
| 145 | path: /manage/health |
| 146 | port: 8088 |
| 147 | scheme: HTTP |
| 148 | initialDelaySeconds: 600 |
| 149 | periodSeconds: 60 |
| 150 | timeoutSeconds: 10 |
| 151 | successThreshold: 1 |
| 152 | failureThreshold: 3 |
| 153 | ingress: |
| 154 | enabled: false |
| 155 | nodeSelector: {} |
| 156 | tolerations: [] |
| 157 | affinity: {} |