blob: e3f3a6e1725346930cc880af87ae9fa65c84ca4d [file] [log] [blame]
Alexander Dehn9b797d62020-04-21 09:53:50 +00001# Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01003# Copyright © 2021 Nokia
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
jmac065e2ce2018-03-29 01:18:02 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
21 nodePortPrefix: 302
jmac0e4f7172018-09-07 18:06:43 +000022 nodePortPrefixExt: 304
jmac065e2ce2018-03-29 01:18:02 +000023 persistence:
24 mountPath: /dockerdata-nfs
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +000025 aafEnabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010026 mariadbGalera:
27 #This flag allows SO to instantiate its own mariadb-galera cluster
28 #If shared instance is used, this chart assumes that DB already exists
29 localCluster: false
30 service: mariadb-galera
31 internalPort: 3306
32 nameOverride: mariadb-galera
Remigiusz Janeczek42177a12020-12-10 13:10:15 +010033 # Enabling CMPv2 with CertManager
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +010034 CMPv2CertManagerIntegration: false
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010035
36#################################################################
37# Secrets metaconfig
38#################################################################
39secrets:
40 - uid: db-root-password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010041 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010042 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010043 # If we're using shared mariadb, we need to use the secret name (second
44 # part).
45 # If not, we do the same trick than for user db secret hat allows you
46 # override this secret using external one with the same field that is used
47 # to pass this to subchart.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010048 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010049 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
50 ternary
51 ""
52 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
53 (include "common.mariadb.secret.rootPassSecretName"
54 (dict "dot" .
55 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
56 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010057 - uid: db-secret
58 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
59 type: basicAuth
60 # This is a nasty trick that allows you override this secret using external one
61 # with the same field that is used to pass this to subchart
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010062 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
63 ternary
64 ""
65 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
66 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
67 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010068 - uid: odl-creds
69 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
70 type: basicAuth
71 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
72 login: '{{ .Values.config.odlUser }}'
73 password: '{{ .Values.config.odlPassword }}'
74 # For now this is left hardcoded but should be revisited in a future
75 passwordPolicy: required
demskeq89d26b332021-01-14 16:45:28 +010076 - uid: dmaap-proxy-creds
77 name: &dmaapProxyCredsSecretName '{{ include "common.release" . }}-sdnc-dmaap-proxy-creds'
78 type: basicAuth
79 externalSecret: '{{ .Values.config.dmaapProxyCredsExternalSecret }}'
80 login: '{{ .Values.config.sdnr.dmaapProxy.user }}'
81 password: '{{ .Values.config.sdnr.dmaapProxy.password }}'
82 # For now this is left hardcoded but should be revisited in a future
83 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010084 - uid: netbox-apikey
85 type: password
86 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
87 password: '{{ .Values.config.netboxApikey }}'
88 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -050089 - uid: aai-truststore-password
90 type: password
91 externalSecret: '{{ .Values.config.aaiTruststoreExternalSecret }}'
92 password: '{{ .Values.config.aaiTruststorePassword }}'
93 passwordPolicy: required
94 - uid: ansible-truststore-password
95 type: password
96 externalSecret: '{{ .Values.config.ansibleTruststoreExternalSecret }}'
97 password: '{{ .Values.config.ansibleTruststorePassword }}'
98 passwordPolicy: required
99 - uid: truststore-password
100 type: password
101 externalSecret: '{{ .Values.config.truststoreExternalSecret }}'
102 password: '{{ .Values.config.truststorePassword }}'
103 passwordPolicy: required
104 - uid: keystore-password
105 type: password
106 externalSecret: '{{ .Values.config.keystoreExternalSecret }}'
107 password: '{{ .Values.config.keystorePassword }}'
108 passwordPolicy: required
109 - uid: dmaap-authkey
110 type: password
111 externalSecret: '{{ .Values.config.dmaapAuthKeyExternalSecret }}'
112 password: '{{ .Values.config.dmaapAuthKey }}'
113 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100114 - uid: aai-user-creds
115 type: basicAuth
116 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
117 login: '{{ .Values.config.aaiUser }}'
118 password: '{{ .Values.config.aaiPassword }}'
119 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -0500120 - uid: so-user-creds
121 type: basicAuth
122 externalSecret: '{{ .Values.config.soCredsExternalSecret}}'
123 login: '{{ .Values.config.soUser }}'
124 password: '{{ .Values.config.soPassword }}'
125 passwordPolicy: required
126 - uid: neng-user-creds
127 type: basicAuth
128 externalSecret: '{{ .Values.config.nengCredsExternalSecret}}'
129 login: '{{ .Values.config.nengUser }}'
130 password: '{{ .Values.config.nengPassword }}'
131 passwordPolicy: required
132 - uid: cds-user-creds
133 type: basicAuth
134 externalSecret: '{{ .Values.config.cdsCredsExternalSecret}}'
135 login: '{{ .Values.config.cdsUser }}'
136 password: '{{ .Values.config.cdsPassword }}'
137 passwordPolicy: required
138 - uid: honeycomb-user-creds
139 type: basicAuth
140 externalSecret: '{{ .Values.config.honeycombCredsExternalSecret}}'
141 login: '{{ .Values.config.honeycombUser }}'
142 password: '{{ .Values.config.honeycombPassword }}'
143 passwordPolicy: required
144 - uid: dmaap-user-creds
145 type: basicAuth
146 externalSecret: '{{ .Values.config.dmaapCredsExternalSecret}}'
147 login: '{{ .Values.config.dmaapUser }}'
148 password: '{{ .Values.config.dmaapPassword }}'
149 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100150 - uid: modeling-user-creds
151 type: basicAuth
152 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
153 login: '{{ .Values.config.modelingUser }}'
154 password: '{{ .Values.config.modelingPassword }}'
155 passwordPolicy: required
156 - uid: restconf-creds
157 type: basicAuth
158 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
159 login: '{{ .Values.config.restconfUser }}'
160 password: '{{ .Values.config.restconfPassword }}'
161 passwordPolicy: required
162 - uid: ansible-creds
163 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
164 type: basicAuth
165 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
166 login: '{{ .Values.config.ansibleUser }}'
167 password: '{{ .Values.config.ansiblePassword }}'
168 passwordPolicy: required
169 - uid: scaleout-creds
170 type: basicAuth
171 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
172 login: '{{ .Values.config.scaleoutUser }}'
173 password: '{{ .Values.config.scaleoutPassword }}'
174 passwordPolicy: required
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100175#################################################################
176# Certificates
177#################################################################
178certificates:
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100179 - mountPath: /var/custom-certs
180 commonName: sdnc.simpledemo.onap.org
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100181 dnsNames:
182 - sdnc.simpledemo.onap.org
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100183 keystore:
184 outputType:
185 - jks
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100186 passwordSecretRef:
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100187 name: sdnc-cmpv2-keystore-password
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100188 key: password
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100189 issuer:
190 group: certmanager.onap.org
191 kind: CMPv2Issuer
192 name: cmpv2-issuer-onap
jmac065e2ce2018-03-29 01:18:02 +0000193#################################################################
194# Application configuration defaults.
195#################################################################
196# application images
Alexander Dehn238450f2020-10-27 13:03:53 +0000197
jmac065e2ce2018-03-29 01:18:02 +0000198pullPolicy: Always
Dan Timoney9e310e72021-02-23 11:25:39 -0500199image: onap/sdnc-image:2.1.3
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400200
jmac065e2ce2018-03-29 01:18:02 +0000201# flag to enable debugging - application support required
202debugEnabled: false
203
204# application configuration
BorislavG5f3b6192018-03-25 18:12:38 +0300205config:
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400206 odlUid: 100
207 odlGid: 101
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100208 odlUser: admin
jmaca68f4cb2018-05-10 22:44:19 +0000209 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100210 # odlCredsExternalSecret: some secret
211 netboxApikey: onceuponatimeiplayedwithnetbox20180814
212 # netboxApikeyExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500213 aaiTruststorePassword: changeit
214 # aaiTruststoreExternalSecret: some secret
215 ansibleTruststorePassword: changeit
216 # ansibleTruststoreExternalSecret: some secret
217 truststorePassword: adminadmin
218 # truststoreExternalSecret: some secret
219 keystorePassword: adminadmin
220 # keystoreExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100221 aaiUser: sdnc@sdnc.onap.org
222 aaiPassword: demo123456!
223 # aaiCredsExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500224 soUser: sdncaBpmn
225 soPassword: password1$
226 # soCredsExternalSecret: some secret
227 nengUser: ccsdkapps
228 nengPassword: ccsdkapps
229 # nengCredsExternalSecret: some secret
230 cdsUser: ccsdkapps
231 cdsPassword: ccsdkapps
232 # cdsCredsExternalSecret: some secret
233 honeycombUser: admin
234 honeycombPassword: admin
235 # honeycombCredsExternalSecret: some secret
236 dmaapUser: admin
237 dmaapPassword: admin
238 dmaapAuthKey: "fs20cKwalJ6ry4kX:7Hqm6BDZK47IKxGRkOPFk33qMYs="
239 # dmaapCredsExternalSecret: some secret
240 # dmaapAuthKeyExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100241 modelingUser: ccsdkapps
242 modelingPassword: ccsdkapps
243 # modelingCredsExternalSecret: some secret
244 restconfUser: admin
245 restconfPassword: admin
246 # restconfCredsExternalSecret: some secret
247 scaleoutUser: admin
248 scaleoutPassword: admin
249 # scaleoutExternalSecret: some secret
250 ansibleUser: sdnc
251 ansiblePassword: sdnc
252 # ansibleCredsExternalSecret: some secret
253 dbSdnctlDatabase: &sdncDbName sdnctl
jmac065e2ce2018-03-29 01:18:02 +0000254 enableClustering: true
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400255 sdncHome: /opt/onap/sdnc
jmaca68f4cb2018-05-10 22:44:19 +0000256 binDir: /opt/onap/sdnc/bin
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400257 etcDir: /opt/onap/sdnc/data
Trevor Tait567ff1e2018-05-01 16:20:54 -0400258 geoEnabled: false
Neha Jain7b0d6c62018-05-17 14:34:49 -0400259# if geoEnabled is set to true here, mysql.geoEnabled must be set to true
Trevor Tait567ff1e2018-05-01 16:20:54 -0400260# if geoEnabled is set to true the following 3 values must be set to their proper values
261 myODLCluster: 127.0.0.1
262 peerODLCluster: 127.0.0.1
Mohammadreza Pasandidehb642ee52018-06-19 15:19:53 -0400263 isPrimaryCluster: true
jmac065e2ce2018-03-29 01:18:02 +0000264 configDir: /opt/onap/sdnc/data/properties
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200265 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
jmac065e2ce2018-03-29 01:18:02 +0000266 dmaapTopic: SUCCESS
jmaca68f4cb2018-05-10 22:44:19 +0000267 dmaapPort: 3904
BorislavG5f3b6192018-03-25 18:12:38 +0300268 logstashServiceName: log-ls
269 logstashPort: 5044
jmac7c434672018-05-11 20:14:17 +0000270 ansibleServiceName: sdnc-ansible-server
271 ansiblePort: 8000
Dan Timoneya98765b2020-09-14 11:57:55 -0400272 javaHome: /opt/java/openjdk
jmac7c434672018-05-11 20:14:17 +0000273
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400274 odl:
275 etcDir: /opt/opendaylight/etc
276 binDir: /opt/opendaylight/bin
Dan Timoneya98765b2020-09-14 11:57:55 -0400277 gcLogDir: /opt/opendaylight/data/log
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400278 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
Dan Timoney9520e7c2021-01-12 11:10:58 -0500279 salConfigVersion: 1.10.4
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400280 akka:
281 seedNodeTimeout: 15s
282 circuitBreaker:
283 maxFailures: 10
284 callTimeout: 90s
285 resetTimeout: 30s
286 recoveryEventTimeout: 90s
287 datastore:
288 persistentActorRestartMinBackoffInSeconds: 10
289 persistentActorRestartMaxBackoffInSeconds: 40
290 persistentActorRestartResetBackoffInSeconds: 20
291 shardTransactionCommitTimeoutInSeconds: 120
292 shardIsolatedLeaderCheckIntervalInMillis: 30000
293 operationTimeoutInSeconds: 120
294 javaOptions:
295 maxGCPauseMillis: 100
296 parallelGCThreads : 3
Dan Timoneya98765b2020-09-14 11:57:55 -0400297 numberGCLogFiles: 10
298 minMemory: 512m
299 maxMemory: 2048m
300 gcLogOptions: ""
301 # Next line enables gc logging
302 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000303 # enables sdnr functionality
304 sdnr:
Alexander Dehn5c1105e2020-09-14 20:55:56 +0000305 enabled: true
Alexander Dehn9b797d62020-04-21 09:53:50 +0000306 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
307 # mode: dm - SDNC contains sdnr device manager + ODLUX components
308 mode: dm
309 # sdnronly: true starts sdnc container with odl and sdnrwt features only
310 sdnronly: false
311 sdnrdbTrustAllCerts: true
312 mountpointRegistrarEnabled: false
313 mountpointStateProviderEnabled: false
demskeq89d26b332021-01-14 16:45:28 +0100314 # enable and set dmaap-proxy for mountpointRegistrar
315 dmaapProxy:
316 enabled: false
317 usepwd: true
318 user: addUserHere
319 password: addPasswordHere
320 url: addProxyUrlHere
321
322
Alexander Dehn9b797d62020-04-21 09:53:50 +0000323
324
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400325
jmac065e2ce2018-03-29 01:18:02 +0000326# dependency / sub-chart configuration
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200327certInitializer:
328 nameOverride: sdnc-cert-initializer
Jozsef Csongvai9d4d5af2020-07-13 11:10:25 -0400329 truststoreMountpath: /opt/onap/sdnc/data/stores
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200330 fqdn: "sdnc"
331 app_ns: "org.osaaf.aaf"
332 fqi: "sdnc@sdnc.onap.org"
333 fqi_namespace: org.onap.sdnc
334 public_fqdn: "sdnc.onap.org"
335 aafDeployFqi: "deployer@people.osaaf.org"
336 aafDeployPass: demo123456!
337 cadi_latitude: "38.0"
338 cadi_longitude: "-72.0"
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200339 credsPath: /opt/app/osaaf/local
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200340 aaf_add_config: >
341 cd /opt/app/osaaf/local;
342 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +0000343
Alexander Dehn9b797d62020-04-21 09:53:50 +0000344# dependency / sub-chart configuration
345network-name-gen:
346 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100347mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100348 nameOverride: &sdnc-db sdnc-db
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100349 config: &mariadbGaleraConfig
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100350 rootPasswordExternalSecret: *rootDbSecret
351 userName: &dbUser sdnctl
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100352 userCredentialsExternalSecret: *dbSecretName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100353 rootUser:
354 externalSecret: *rootDbSecret
355 db:
356 user: *dbUser
357 externalSecret: *dbSecretName
jmac065e2ce2018-03-29 01:18:02 +0000358 service:
359 name: sdnc-dbhost
jmac065e2ce2018-03-29 01:18:02 +0000360 sdnctlPrefix: sdnc
361 persistence:
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000362 mountSubPath: sdnc/mariadb-galera
jmac065e2ce2018-03-29 01:18:02 +0000363 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000364 replicaCount: 1
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100365 serviceAccount:
366 nameOverride: *sdnc-db
jmac065e2ce2018-03-29 01:18:02 +0000367
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100368cds:
369 enabled: false
370
371dmaap-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000372 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100373 nameOverride: sdnc-dmaap-listener
374 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100375 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100376 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100377 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100378 mysqlDatabase: *sdncDbName
379 config:
380 sdncChartName: sdnc
381 dmaapPort: 3904
382 sdncPort: 8282
383 configDir: /opt/onap/sdnc/data/properties
384 odlCredsExternalSecret: *odlCredsSecretName
385
386ueb-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000387 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100388 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100389 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100390 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100391 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100392 mysqlDatabase: *sdncDbName
393 nameOverride: sdnc-ueb-listener
394 config:
395 sdncPort: 8282
396 sdncChartName: sdnc
397 configDir: /opt/onap/sdnc/data/properties
398 odlCredsExternalSecret: *odlCredsSecretName
399
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100400sdnc-ansible-server:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000401 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100402 config:
403 restCredsExternalSecret: *ansibleSecretName
404 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100405 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100406 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100407 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100408 mysqlDatabase: ansible
409 service:
410 name: sdnc-ansible-server
411 internalPort: 8000
412
jmac065e2ce2018-03-29 01:18:02 +0000413dgbuilder:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000414 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000415 nameOverride: sdnc-dgbuilder
Dan Timoneycb0a81f2020-07-15 17:31:43 -0400416 certInitializer:
417 nameOverride: sdnc-dgbuilder-cert-initializer
jmac065e2ce2018-03-29 01:18:02 +0000418 config:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100419 db:
420 dbName: *sdncDbName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100421 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
422 ternary
423 (printf "%s-sdnc-db-root-password" (include "common.release" .))
424 (include "common.mariadb.secret.rootPassSecretName"
425 (dict "dot" . "chartName" "mariadb-galera")) }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100426 userCredentialsExternalSecret: *dbSecretName
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000427 dbPodName: mariadb-galera
428 dbServiceName: mariadb-galera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100429 # This should be revisited and changed to plain text
jmac70863e12018-05-16 14:53:03 +0000430 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100431 mariadb-galera:
jmac065e2ce2018-03-29 01:18:02 +0000432 service:
BorislavG1ffbd992018-04-24 07:56:27 +0000433 name: sdnc-dgbuilder
jmac065e2ce2018-03-29 01:18:02 +0000434 nodePort: "03"
435
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200436 ingress:
437 enabled: false
438 service:
439 - baseaddr: "sdnc-dgbuilder"
440 name: "sdnc-dgbuilder"
441 port: 3000
Alexander Dehn9b797d62020-04-21 09:53:50 +0000442 - baseaddr: "sdnc-web-service"
443 name: "sdnc-web-service"
444 port: 8443
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200445 config:
446 ssl: "redirect"
447
Alexander Dehn9b797d62020-04-21 09:53:50 +0000448
449
Alexander Dehnab86ec12020-02-05 14:38:54 +0000450# local elasticsearch cluster
451localElasticCluster: true
452elasticsearch:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100453 nameOverride: &elasticSearchName sdnrdb
Alexander Dehnab86ec12020-02-05 14:38:54 +0000454 name: sdnrdb-cluster
Krzysztof Opasiakc6152ce2020-05-09 01:43:08 +0200455 certInitializer:
Alexander Dehnab86ec12020-02-05 14:38:54 +0000456 fqdn: "sdnc"
457 fqi_namespace: org.onap.sdnc
458 fqi: "sdnc@sdnc.onap.org"
459 service:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100460 name: *elasticSearchName
Alexander Dehnab86ec12020-02-05 14:38:54 +0000461 master:
462 replicaCount: 3
463 # dedicatednode: "yes"
464 # working as master node only, in this case increase replicaCount for elasticsearch-data
465 # dedicatednode: "no"
466 # handles master and data node functionality
467 dedicatednode: "no"
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100468 nameOverride: *elasticSearchName
demskeq8eb56da72021-02-19 12:11:48 +0100469 cluster_name: sdnrdb-cluster
Alexander Dehn9b797d62020-04-21 09:53:50 +0000470# enable
471sdnc-web:
Alexander Dehn8789a722020-10-16 14:29:05 +0000472 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000473# default number of instances
474replicaCount: 1
475
476nodeSelector: {}
477
478affinity: {}
479
480# probe configuration parameters
481liveness:
482 initialDelaySeconds: 10
483 periodSeconds: 10
484 # necessary to disable liveness probe when setting breakpoints
485 # in debugger so K8s doesn't restart unresponsive container
486 enabled: true
487
488readiness:
489 initialDelaySeconds: 10
490 periodSeconds: 10
491
492service:
493 type: NodePort
494 name: sdnc
BorislavG1ffbd992018-04-24 07:56:27 +0000495 portName: sdnc
jmac065e2ce2018-03-29 01:18:02 +0000496 internalPort: 8181
497 internalPort2: 8101
498 internalPort3: 8080
Timoney, Dan (dt5972)c6de2692019-08-14 14:22:37 -0400499 internalPort4: 8443
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400500
jmac065e2ce2018-03-29 01:18:02 +0000501 #port
502 externalPort: 8282
jmac065e2ce2018-03-29 01:18:02 +0000503
504 externalPort2: 8202
jmac065e2ce2018-03-29 01:18:02 +0000505
506 externalPort3: 8280
jmac065e2ce2018-03-29 01:18:02 +0000507
jmaca68f4cb2018-05-10 22:44:19 +0000508 externalPort4: 8443
509 nodePort4: 67
510
jmac065e2ce2018-03-29 01:18:02 +0000511 clusterPort: 2550
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400512 clusterPort2: 2650
513 clusterPort3: 2681
514
515 geoNodePort1: 61
516 geoNodePort2: 62
517 geoNodePort3: 63
518 geoNodePort4: 64
519 geoNodePort5: 65
520 geoNodePort6: 66
jmac065e2ce2018-03-29 01:18:02 +0000521
jmac8d6dc962018-04-26 14:26:55 +0000522## Persist data to a persitent volume
523persistence:
524 enabled: true
525
526 ## A manually managed Persistent Volume and Claim
527 ## Requires persistence.enabled: true
528 ## If defined, PVC must be created manually before volume will be bound
529 # existingClaim:
530 volumeReclaimPolicy: Retain
531
532 ## database data Persistent Volume Storage Class
533 ## If defined, storageClassName: <storageClass>
534 ## If set to "-", storageClassName: "", which disables dynamic provisioning
535 ## If undefined (the default) or set to null, no storageClassName spec is
536 ## set, choosing the default provisioner. (gp2 on AWS, standard on
537 ## GKE, AWS & OpenStack)
538 accessMode: ReadWriteOnce
539 size: 1Gi
540 mountPath: /dockerdata-nfs
541 mountSubPath: sdnc/mdsal
Dan Timoney2ee28a52021-01-15 16:39:50 -0500542 mdsalPath: /opt/opendaylight/mdsal
demskeq8a86300a2021-02-10 09:53:33 +0100543 daeximPath: /opt/opendaylight/mdsal/daexim
Dan Timoney2ee28a52021-01-15 16:39:50 -0500544 journalPath: /opt/opendaylight/journal
545 snapshotsPath: /opt/opendaylight/snapshots
jmac8d6dc962018-04-26 14:26:55 +0000546
egernug27578332020-03-26 10:27:55 +0000547certpersistence:
548 enabled: true
549
550 ## A manually managed Persistent Volume and Claim
551 ## Requires persistence.enabled: true
552 ## If defined, PVC must be created manually before volume will be bound
553 # existingClaim:
554
555 volumeReclaimPolicy: Retain
556 accessMode: ReadWriteOnce
557 size: 50Mi
558 mountPath: /dockerdata-nfs
559 mountSubPath: sdnc/certs
560 certPath: /opt/app/osaaf
561 ##storageClass: "manual"
562
jmac065e2ce2018-03-29 01:18:02 +0000563ingress:
564 enabled: false
Lucjan Bryndza08448402019-11-27 14:26:54 +0100565 service:
Lucjan Bryndza05649652020-04-29 08:52:33 +0000566 - baseaddr: "sdnc.api"
Lucjan Bryndza08448402019-11-27 14:26:54 +0100567 name: "sdnc"
568 port: 8443
569 config:
570 ssl: "redirect"
jmac065e2ce2018-03-29 01:18:02 +0000571
toshrajbhardwaj72b5f0f2018-09-13 02:45:22 +0000572#Resource Limit flavor -By Default using small
573flavor: small
574#segregation for different envionment (Small and Large)
575
576resources:
Mandeep Khindade045712018-09-19 18:11:57 +0000577 small:
578 limits:
579 cpu: 2
580 memory: 4Gi
581 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000582 cpu: 1
583 memory: 2Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000584 large:
585 limits:
586 cpu: 4
587 memory: 8Gi
588 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000589 cpu: 2
590 memory: 4Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000591 unlimited: {}