blob: 148d10da13a036a05b32034e946002ac2031daaa [file] [log] [blame]
Kiran Kamineni39648722018-03-21 14:58:11 -07001# Copyright 2018 Intel Corporation, Inc
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +02002# Modifications © 2020 AT&T, Orange
Kiran Kamineni39648722018-03-21 14:58:11 -07003#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
16#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
Kiran Kamineni39648722018-03-21 14:58:11 -070021 loggingRepository: docker.elastic.co
22 loggingImage: beats/filebeat:5.5.0
Kiran Kaminenie4e81e72018-04-09 10:14:32 -070023 persistence: {}
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +020024 envsubstImage: dibi/envsubst
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020025 aafEnabled: true
ChrisCec86a532020-03-19 15:53:31 -050026
dsingh.27864a34bf2018-09-21 05:11:00 -040027flavor: small
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020028
29#################################################################
30# AAF part
31#################################################################
32certInitializer:
33 nameOverride: aaf-sms-cert-init
34 aafDeployFqi: deployer@people.osaaf.org
35 aafDeployPass: demo123456!
36 # aafDeployCredsExternalSecret: some secret
37 fqdn: aaf-sms
38 fqi: aaf-sms@aaf-sms.onap.org
39 public_fqdn: aaf-sms.onap.org
40 cadi_longitude: "0.0"
41 cadi_latitude: "0.0"
42 app_ns: org.osaaf.aaf
43 mountPath: /opt/app/osaaf
44 keystore: truststoreONAPall.jks
45 keystore_pass: changeit
46 root_ca_alias: onaptestca
47 root_ca_name: aaf_root_ca.cer
48 permission_user: 1000
49 permission_group: 1000
50 aaf_add_config: >
51 cd {{ .Values.mountPath }}/local;
52 keytool -exportcert -rfc -file {{ .Values.root_ca_name }} -keystore {{ .Values.keystore }}
53 -alias {{ .Values.root_ca_alias }} -storepass {{ .Values.keystore_pass }};
54 chown -R {{.Values.permission_user}}:{{.Values.permission_group}}
55 {{ .Values.mountPath }};
56
Kiran Kamineni39648722018-03-21 14:58:11 -070057#################################################################
58# Application configuration defaults.
59#################################################################
60# application image
61repository: nexus3.onap.org:10001
ChrisCec86a532020-03-19 15:53:31 -050062image: onap/aaf/sms:4.0.2
Kiran Kamineni39648722018-03-21 14:58:11 -070063pullPolicy: Always
64
65# flag to enable debugging - application support required
66debugEnabled: false
67
68# application configuration
69# Example:
70config:
Kiran Kamineni992e1ad2018-04-06 15:42:40 -070071 smsdbaddress: "http://aaf-sms-db:8200"
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020072 cafile: "/opt/app/osaaf/local/aaf_root_ca.cer"
73 servercert: "/opt/app/osaaf/local/org.onap.aaf-sms.crt"
74 serverkey: "/opt/app/osaaf/local/org.onap.aaf-sms.key"
Kiran Kaminenic808c9a2018-05-14 16:59:55 -070075 password: "c2VjcmV0bWFuYWdlbWVudHNlcnZpY2VzZWNyZXRwYXNzd29yZA=="
Kiran Kamineni39648722018-03-21 14:58:11 -070076
77# subchart configuration
78vault:
79 nameOverride: smsdb
80
81# default number of instances
82replicaCount: 1
83
84nodeSelector: {}
85
86affinity: {}
87
88# probe configuration parameters
89liveness:
90 initialDelaySeconds: 10
Kiran Kaminenic808c9a2018-05-14 16:59:55 -070091 periodSeconds: 30
Kiran Kamineni39648722018-03-21 14:58:11 -070092 # necessary to disable liveness probe when setting breakpoints
93 # in debugger so K8s doesn't restart unresponsive container
94 enabled: true
95
96readiness:
97 initialDelaySeconds: 10
Kiran Kaminenic808c9a2018-05-14 16:59:55 -070098 periodSeconds: 30
Kiran Kamineni39648722018-03-21 14:58:11 -070099
100service:
Kiran Kamineni10238362019-03-19 13:15:02 -0700101 type: ClusterIP
Kiran Kamineni992e1ad2018-04-06 15:42:40 -0700102 name: aaf-sms
BorislavG1ffbd992018-04-24 07:56:27 +0000103 portName: aaf-sms
Kiran Kamineni39648722018-03-21 14:58:11 -0700104 internalPort: 10443
Kiran Kamineni10238362019-03-19 13:15:02 -0700105 externalPort: 10443
Kiran Kamineni39648722018-03-21 14:58:11 -0700106
Jakub Latusekbffbe912020-09-24 14:27:32 +0200107#define value for aaf-sms-quorumclient subchart
108aaf-sms-quorumclient:
109 service:
110 name: aaf-sms
111
Kiran Kaminenie4e81e72018-04-09 10:14:32 -0700112persistence:
113 enabled: true
114 volumeReclaimPolicy: Retain
115 accessMode: ReadWriteOnce
116 size: 1Gi
117 mountPath: /dockerdata-nfs
118 mountSubPath: sms/auth
119
Kiran Kamineni39648722018-03-21 14:58:11 -0700120ingress:
121 enabled: false
122
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200123secrets:
124 - uid: aai-creds
125 type: basicAuth
126 login: '{{ .Values.oofCreds.aaiUsername }}'
127 password: '{{ .Values.oofCreds.aaiPassword }}'
128 passwordPolicy: required
129 - uid: conductor-creds
130 type: basicAuth
131 login: '{{ .Values.oofCreds.conductorUsername }}'
132 password: '{{ .Values.oofCreds.conductorPassword }}'
133 passwordPolicy: required
134 - uid: sdnc-creds
135 type: basicAuth
136 login: '{{ .Values.oofCreds.sdncUsername }}'
137 password: '{{ .Values.oofCreds.sdncPassword }}'
138 passwordPolicy: required
139 - uid: music-creds
140 type: basicAuth
141 login: '{{ .Values.oofCreds.musicUsername }}'
142 password: '{{ .Values.oofCreds.musicPassword }}'
143 passwordPolicy: required
144 - uid: aaf-creds
145 type: basicAuth
146 login: '{{ .Values.oofCreds.aafUsername }}'
147 password: '{{ .Values.oofCreds.aafPassword }}'
148 passwordPolicy: required
149 - uid: policy-plat-creds
150 type: basicAuth
151 login: '{{ .Values.oofCreds.policyPlatUsername }}'
152 password: '{{ .Values.oofCreds.policyPlatPassword }}'
153 passwordPolicy: required
154 - uid: policy-cli-creds
155 type: basicAuth
156 login: '{{ .Values.oofCreds.policyCliUsername }}'
157 password: '{{ .Values.oofCreds.policyCliPassword }}'
158 passwordPolicy: required
159 - uid: osdf-placement-creds
160 type: basicAuth
161 login: '{{ .Values.oofCreds.osdfPlacementUsername }}'
162 password: '{{ .Values.oofCreds.osdfPlacementPassword }}'
163 passwordPolicy: required
164 - uid: osdf-placement-so-creds
165 type: basicAuth
166 login: '{{ .Values.oofCreds.osdfPlacementSOUsername }}'
167 password: '{{ .Values.oofCreds.osdfPlacementSOPassword }}'
168 passwordPolicy: required
169 - uid: osdf-placement-vfc-creds
170 type: basicAuth
171 login: '{{ .Values.oofCreds.osdfPlacementVFCUsername }}'
172 password: '{{ .Values.oofCreds.osdfPlacementVFCPassword }}'
173 passwordPolicy: required
174 - uid: osdf-cm-scheduler-creds
175 type: basicAuth
176 login: '{{ .Values.oofCreds.osdfCMSchedulerUsername }}'
177 password: '{{ .Values.oofCreds.osdfCMSchedulerPassword }}'
178 passwordPolicy: required
179 - uid: config-db-creds
180 type: basicAuth
181 login: '{{ .Values.oofCreds.configDbUsername }}'
182 password: '{{ .Values.oofCreds.configDbPassword }}'
183 passwordPolicy: required
184 - uid: osdf-pci-opt-creds
185 type: basicAuth
186 login: '{{ .Values.oofCreds.osdfPCIOptUsername }}'
187 password: '{{ .Values.oofCreds.osdfPCIOptPassword }}'
188 passwordPolicy: required
189 - uid: osdf-opt-engine-creds
190 type: basicAuth
191 login: '{{ .Values.oofCreds.osdfOptEngineUsername }}'
192 password: '{{ .Values.oofCreds.osdfOptEnginePassword }}'
193 passwordPolicy: required
vrvarma26dbd2b2020-05-18 19:37:19 -0400194 - uid: so-creds
195 type: basicAuth
196 login: '{{ .Values.oofCreds.soUsername }}'
197 password: '{{ .Values.oofCreds.soPassword }}'
198 passwordPolicy: required
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200199
200oofCreds:
201 aaiUsername: oof@oof.onap.org
202 aaiPassword: demo123456!
203
204 conductorUsername: admin1
205 conductorPassword: plan.15
206
207 sdncUsername: admin
208 sdncPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
209
210 musicUsername: conductor
211 musicPassword: c0nduct0r
212
213 aafUsername: aaf_admin@people.osaaf.org
214 aafPassword: demo123456!
215
vrvarma7344c282020-05-06 14:58:35 -0400216 policyPlatUsername: healthcheck
217 policyPlatPassword: zb!XztG34
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200218
vrvarma7344c282020-05-06 14:58:35 -0400219 policyCliUsername: healthcheck
220 policyCliPassword: zb!XztG34
Krzysztof Opasiak59d47c32020-04-16 20:01:05 +0200221
222 osdfPlacementUsername: test
223 osdfPlacementPassword: testpwd
224
225 osdfPlacementSOUsername: so_test
226 osdfPlacementSOPassword: so_testpwd
227
228 osdfPlacementVFCUsername: vfc_test
229 osdfPlacementVFCPassword: vfc_testpwd
230
231 osdfCMSchedulerUsername: test1
232 osdfCMSchedulerPassword: testpwd1
233
234 configDbUsername: osdf
235 configDbPassword: passwd
236
237 osdfPCIOptUsername: pci_test
238 osdfPCIOptPassword: pci_testpwd
239
240 osdfOptEngineUsername: opt_test
241 osdfOptEnginePassword: opt_testpwd
242
vrvarma26dbd2b2020-05-18 19:37:19 -0400243 soUsername: apihBpmn
244 soPassword: password1$
245
dsingh.27864a34bf2018-09-21 05:11:00 -0400246# Configure resource requests and limits
247resources:
248 small:
249 limits:
Sylvain Desbureauxc10829f2019-11-29 14:43:58 +0100250 cpu: 100m
Sylvain Desbureaux993bd352020-03-04 11:25:15 +0100251 memory: 400Mi
dsingh.27864a34bf2018-09-21 05:11:00 -0400252 requests:
Sylvain Desbureauxdaee54b2020-02-12 17:41:18 +0100253 cpu: 25m
dsingh.27864a34bf2018-09-21 05:11:00 -0400254 memory: 10Mi
255 large:
256 limits:
257 cpu: 400m
258 memory: 1Gi
259 requests:
Sylvain Desbureaux993bd352020-03-04 11:25:15 +0100260 cpu: 25m
dsingh.27864a34bf2018-09-21 05:11:00 -0400261 memory: 100Mi
Kiran Kamineni7a8dff32018-10-30 15:25:47 -0700262 unlimited: {}