blob: 33bbc8ab33fc8fe69cd08578ad6e9711cdfd005b [file] [log] [blame]
Alexander Dehn9b797d62020-04-21 09:53:50 +00001# Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01003# Copyright © 2021 Nokia
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
jmac065e2ce2018-03-29 01:18:02 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
21 nodePortPrefix: 302
jmac0e4f7172018-09-07 18:06:43 +000022 nodePortPrefixExt: 304
jmac065e2ce2018-03-29 01:18:02 +000023 persistence:
24 mountPath: /dockerdata-nfs
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +000025 aafEnabled: true
Maciej Wereski537d71e2021-11-03 13:31:44 +000026 centralizedLoggingEnabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010027 mariadbGalera:
28 #This flag allows SO to instantiate its own mariadb-galera cluster
29 #If shared instance is used, this chart assumes that DB already exists
30 localCluster: false
31 service: mariadb-galera
32 internalPort: 3306
33 nameOverride: mariadb-galera
34
35#################################################################
36# Secrets metaconfig
37#################################################################
38secrets:
39 - uid: db-root-password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010040 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010041 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010042 # If we're using shared mariadb, we need to use the secret name (second
43 # part).
44 # If not, we do the same trick than for user db secret hat allows you
45 # override this secret using external one with the same field that is used
46 # to pass this to subchart.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010047 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010048 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
49 ternary
50 ""
51 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
52 (include "common.mariadb.secret.rootPassSecretName"
53 (dict "dot" .
54 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
55 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010056 - uid: db-secret
57 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
58 type: basicAuth
59 # This is a nasty trick that allows you override this secret using external one
60 # with the same field that is used to pass this to subchart
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010061 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
62 ternary
63 ""
64 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
65 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
66 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010067 - uid: odl-creds
68 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
69 type: basicAuth
70 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
71 login: '{{ .Values.config.odlUser }}'
72 password: '{{ .Values.config.odlPassword }}'
73 # For now this is left hardcoded but should be revisited in a future
74 passwordPolicy: required
demskeq89d26b332021-01-14 16:45:28 +010075 - uid: dmaap-proxy-creds
76 name: &dmaapProxyCredsSecretName '{{ include "common.release" . }}-sdnc-dmaap-proxy-creds'
77 type: basicAuth
78 externalSecret: '{{ .Values.config.dmaapProxyCredsExternalSecret }}'
79 login: '{{ .Values.config.sdnr.dmaapProxy.user }}'
80 password: '{{ .Values.config.sdnr.dmaapProxy.password }}'
81 # For now this is left hardcoded but should be revisited in a future
82 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010083 - uid: netbox-apikey
84 type: password
85 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
86 password: '{{ .Values.config.netboxApikey }}'
87 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -050088 - uid: aai-truststore-password
89 type: password
90 externalSecret: '{{ .Values.config.aaiTruststoreExternalSecret }}'
91 password: '{{ .Values.config.aaiTruststorePassword }}'
92 passwordPolicy: required
93 - uid: ansible-truststore-password
94 type: password
95 externalSecret: '{{ .Values.config.ansibleTruststoreExternalSecret }}'
96 password: '{{ .Values.config.ansibleTruststorePassword }}'
97 passwordPolicy: required
98 - uid: truststore-password
99 type: password
100 externalSecret: '{{ .Values.config.truststoreExternalSecret }}'
101 password: '{{ .Values.config.truststorePassword }}'
102 passwordPolicy: required
103 - uid: keystore-password
104 type: password
105 externalSecret: '{{ .Values.config.keystoreExternalSecret }}'
106 password: '{{ .Values.config.keystorePassword }}'
107 passwordPolicy: required
108 - uid: dmaap-authkey
109 type: password
110 externalSecret: '{{ .Values.config.dmaapAuthKeyExternalSecret }}'
111 password: '{{ .Values.config.dmaapAuthKey }}'
112 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100113 - uid: aai-user-creds
114 type: basicAuth
115 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
116 login: '{{ .Values.config.aaiUser }}'
117 password: '{{ .Values.config.aaiPassword }}'
118 passwordPolicy: required
Dan Timoney9e310e72021-02-23 11:25:39 -0500119 - uid: so-user-creds
120 type: basicAuth
121 externalSecret: '{{ .Values.config.soCredsExternalSecret}}'
122 login: '{{ .Values.config.soUser }}'
123 password: '{{ .Values.config.soPassword }}'
124 passwordPolicy: required
125 - uid: neng-user-creds
126 type: basicAuth
127 externalSecret: '{{ .Values.config.nengCredsExternalSecret}}'
128 login: '{{ .Values.config.nengUser }}'
129 password: '{{ .Values.config.nengPassword }}'
130 passwordPolicy: required
131 - uid: cds-user-creds
132 type: basicAuth
133 externalSecret: '{{ .Values.config.cdsCredsExternalSecret}}'
134 login: '{{ .Values.config.cdsUser }}'
135 password: '{{ .Values.config.cdsPassword }}'
136 passwordPolicy: required
137 - uid: honeycomb-user-creds
138 type: basicAuth
139 externalSecret: '{{ .Values.config.honeycombCredsExternalSecret}}'
140 login: '{{ .Values.config.honeycombUser }}'
141 password: '{{ .Values.config.honeycombPassword }}'
142 passwordPolicy: required
143 - uid: dmaap-user-creds
144 type: basicAuth
145 externalSecret: '{{ .Values.config.dmaapCredsExternalSecret}}'
146 login: '{{ .Values.config.dmaapUser }}'
147 password: '{{ .Values.config.dmaapPassword }}'
148 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100149 - uid: modeling-user-creds
150 type: basicAuth
151 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
152 login: '{{ .Values.config.modelingUser }}'
153 password: '{{ .Values.config.modelingPassword }}'
154 passwordPolicy: required
155 - uid: restconf-creds
156 type: basicAuth
157 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
158 login: '{{ .Values.config.restconfUser }}'
159 password: '{{ .Values.config.restconfPassword }}'
160 passwordPolicy: required
161 - uid: ansible-creds
162 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
163 type: basicAuth
164 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
165 login: '{{ .Values.config.ansibleUser }}'
166 password: '{{ .Values.config.ansiblePassword }}'
167 passwordPolicy: required
168 - uid: scaleout-creds
169 type: basicAuth
170 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
171 login: '{{ .Values.config.scaleoutUser }}'
172 password: '{{ .Values.config.scaleoutPassword }}'
173 passwordPolicy: required
demskeq8b43e92c2021-02-12 15:43:48 +0100174 - uid: oauth-token-secret
175 type: password
176 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.tokenExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
177 password: '{{ .Values.config.sdnr.oauth.tokenSecret }}'
178 passwordPolicy: required
179 - uid: keycloak-secret
180 type: password
181 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.providersSecrets.keycloakExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
182 password: '{{ .Values.config.sdnr.oauth.providersSecrets.keycloak }}'
183 passwordPolicy: required
sebdetb205f402021-10-20 12:16:02 +0200184 - uid: ves-collector-secret
185 type: basicAuth
186 login: '{{ .Values.config.sdnr.vesCollector.username }}'
187 password: '{{ .Values.config.sdnr.vesCollector.password }}'
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100188#################################################################
189# Certificates
190#################################################################
191certificates:
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100192 - mountPath: /var/custom-certs
193 commonName: sdnc.simpledemo.onap.org
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100194 dnsNames:
195 - sdnc.simpledemo.onap.org
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100196 keystore:
197 outputType:
198 - jks
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100199 passwordSecretRef:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100200 create: true
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100201 name: sdnc-cmpv2-keystore-password
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100202 key: password
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100203 issuer:
204 group: certmanager.onap.org
205 kind: CMPv2Issuer
206 name: cmpv2-issuer-onap
jmac065e2ce2018-03-29 01:18:02 +0000207#################################################################
208# Application configuration defaults.
209#################################################################
210# application images
Alexander Dehn238450f2020-10-27 13:03:53 +0000211
jmac065e2ce2018-03-29 01:18:02 +0000212pullPolicy: Always
Dan Timoneye77f3352022-01-03 07:03:11 -0500213image: onap/sdnc-image:2.2.4
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400214
jmac065e2ce2018-03-29 01:18:02 +0000215# flag to enable debugging - application support required
216debugEnabled: false
217
218# application configuration
BorislavG5f3b6192018-03-25 18:12:38 +0300219config:
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400220 odlUid: 100
221 odlGid: 101
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100222 odlUser: admin
jmaca68f4cb2018-05-10 22:44:19 +0000223 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100224 # odlCredsExternalSecret: some secret
225 netboxApikey: onceuponatimeiplayedwithnetbox20180814
226 # netboxApikeyExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500227 aaiTruststorePassword: changeit
228 # aaiTruststoreExternalSecret: some secret
229 ansibleTruststorePassword: changeit
230 # ansibleTruststoreExternalSecret: some secret
231 truststorePassword: adminadmin
232 # truststoreExternalSecret: some secret
233 keystorePassword: adminadmin
234 # keystoreExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100235 aaiUser: sdnc@sdnc.onap.org
236 aaiPassword: demo123456!
237 # aaiCredsExternalSecret: some secret
Dan Timoney9e310e72021-02-23 11:25:39 -0500238 soUser: sdncaBpmn
239 soPassword: password1$
240 # soCredsExternalSecret: some secret
241 nengUser: ccsdkapps
242 nengPassword: ccsdkapps
243 # nengCredsExternalSecret: some secret
244 cdsUser: ccsdkapps
245 cdsPassword: ccsdkapps
246 # cdsCredsExternalSecret: some secret
247 honeycombUser: admin
248 honeycombPassword: admin
249 # honeycombCredsExternalSecret: some secret
250 dmaapUser: admin
251 dmaapPassword: admin
252 dmaapAuthKey: "fs20cKwalJ6ry4kX:7Hqm6BDZK47IKxGRkOPFk33qMYs="
253 # dmaapCredsExternalSecret: some secret
254 # dmaapAuthKeyExternalSecret: some secret
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100255 modelingUser: ccsdkapps
256 modelingPassword: ccsdkapps
257 # modelingCredsExternalSecret: some secret
258 restconfUser: admin
259 restconfPassword: admin
260 # restconfCredsExternalSecret: some secret
261 scaleoutUser: admin
262 scaleoutPassword: admin
263 # scaleoutExternalSecret: some secret
264 ansibleUser: sdnc
265 ansiblePassword: sdnc
266 # ansibleCredsExternalSecret: some secret
sebdetb205f402021-10-20 12:16:02 +0200267
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100268 dbSdnctlDatabase: &sdncDbName sdnctl
jmac065e2ce2018-03-29 01:18:02 +0000269 enableClustering: true
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400270 sdncHome: /opt/onap/sdnc
jmaca68f4cb2018-05-10 22:44:19 +0000271 binDir: /opt/onap/sdnc/bin
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400272 etcDir: /opt/onap/sdnc/data
Trevor Tait567ff1e2018-05-01 16:20:54 -0400273 geoEnabled: false
Neha Jain7b0d6c62018-05-17 14:34:49 -0400274# if geoEnabled is set to true here, mysql.geoEnabled must be set to true
Trevor Tait567ff1e2018-05-01 16:20:54 -0400275# if geoEnabled is set to true the following 3 values must be set to their proper values
276 myODLCluster: 127.0.0.1
277 peerODLCluster: 127.0.0.1
Mohammadreza Pasandidehb642ee52018-06-19 15:19:53 -0400278 isPrimaryCluster: true
jmac065e2ce2018-03-29 01:18:02 +0000279 configDir: /opt/onap/sdnc/data/properties
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200280 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
jmac065e2ce2018-03-29 01:18:02 +0000281 dmaapTopic: SUCCESS
jmaca68f4cb2018-05-10 22:44:19 +0000282 dmaapPort: 3904
BorislavG5f3b6192018-03-25 18:12:38 +0300283 logstashServiceName: log-ls
284 logstashPort: 5044
jmac7c434672018-05-11 20:14:17 +0000285 ansibleServiceName: sdnc-ansible-server
286 ansiblePort: 8000
Dan Timoneya98765b2020-09-14 11:57:55 -0400287 javaHome: /opt/java/openjdk
jmac7c434672018-05-11 20:14:17 +0000288
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400289 odl:
290 etcDir: /opt/opendaylight/etc
291 binDir: /opt/opendaylight/bin
Dan Timoneya98765b2020-09-14 11:57:55 -0400292 gcLogDir: /opt/opendaylight/data/log
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400293 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
Dan Timoney9520e7c2021-01-12 11:10:58 -0500294 salConfigVersion: 1.10.4
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400295 akka:
296 seedNodeTimeout: 15s
297 circuitBreaker:
298 maxFailures: 10
299 callTimeout: 90s
300 resetTimeout: 30s
301 recoveryEventTimeout: 90s
302 datastore:
303 persistentActorRestartMinBackoffInSeconds: 10
304 persistentActorRestartMaxBackoffInSeconds: 40
305 persistentActorRestartResetBackoffInSeconds: 20
306 shardTransactionCommitTimeoutInSeconds: 120
307 shardIsolatedLeaderCheckIntervalInMillis: 30000
308 operationTimeoutInSeconds: 120
309 javaOptions:
310 maxGCPauseMillis: 100
311 parallelGCThreads : 3
Dan Timoneya98765b2020-09-14 11:57:55 -0400312 numberGCLogFiles: 10
313 minMemory: 512m
314 maxMemory: 2048m
315 gcLogOptions: ""
316 # Next line enables gc logging
317 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000318 # enables sdnr functionality
319 sdnr:
Alexander Dehn5c1105e2020-09-14 20:55:56 +0000320 enabled: true
Alexander Dehn9b797d62020-04-21 09:53:50 +0000321 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
322 # mode: dm - SDNC contains sdnr device manager + ODLUX components
323 mode: dm
324 # sdnronly: true starts sdnc container with odl and sdnrwt features only
325 sdnronly: false
326 sdnrdbTrustAllCerts: true
327 mountpointRegistrarEnabled: false
328 mountpointStateProviderEnabled: false
demskeq827854662021-04-08 14:49:47 +0200329 netconfCallHome:
330 enabled: true
demskeq8b43e92c2021-02-12 15:43:48 +0100331 #
demskeq89d26b332021-01-14 16:45:28 +0100332 # enable and set dmaap-proxy for mountpointRegistrar
333 dmaapProxy:
334 enabled: false
335 usepwd: true
336 user: addUserHere
337 password: addPasswordHere
338 url: addProxyUrlHere
demskeq8b43e92c2021-02-12 15:43:48 +0100339 oauth:
340 enabled: false
341 tokenIssuer: ONAP SDNC
342 tokenSecret: secret
343 supportOdlusers: true
344 redirectUri: null
345 publicUrl: none
346 odluxRbac:
347 enabled: true
348 # example definition for a oauth provider
349 providersSecrets:
350 keycloak: d8d7ed52-0691-4353-9ac6-5383e72e9c46
351 providers:
352 - id: keycloak
353 type: KEYCLOAK
354 host: http://keycloak:8080
355 clientId: odlux.app
356 secret: ${KEYCLOAK_SECRET}
357 scope: openid
358 title: ONAP Keycloak Provider
359 roleMapping:
360 mykeycloak: admin
sebdetb205f402021-10-20 12:16:02 +0200361 vesCollector:
362 enabled: false
363 tls:
364 enabled: true
365 trustAllCertificates: false
366 username: sample1
367 password: sample1
368 address: dcae-ves-collector.onap
369 port: 8443
370 version: v7
371 reportingEntityName: ONAP SDN-R
372 eventLogMsgDetail: SHORT
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400373
jmac065e2ce2018-03-29 01:18:02 +0000374# dependency / sub-chart configuration
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200375certInitializer:
376 nameOverride: sdnc-cert-initializer
Jozsef Csongvai9d4d5af2020-07-13 11:10:25 -0400377 truststoreMountpath: /opt/onap/sdnc/data/stores
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200378 fqdn: "sdnc"
379 app_ns: "org.osaaf.aaf"
380 fqi: "sdnc@sdnc.onap.org"
381 fqi_namespace: org.onap.sdnc
382 public_fqdn: "sdnc.onap.org"
383 aafDeployFqi: "deployer@people.osaaf.org"
384 aafDeployPass: demo123456!
385 cadi_latitude: "38.0"
386 cadi_longitude: "-72.0"
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200387 credsPath: /opt/app/osaaf/local
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200388 aaf_add_config: >
389 cd /opt/app/osaaf/local;
390 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +0000391
Alexander Dehn9b797d62020-04-21 09:53:50 +0000392# dependency / sub-chart configuration
393network-name-gen:
394 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100395mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100396 nameOverride: &sdnc-db sdnc-db
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100397 config: &mariadbGaleraConfig
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100398 rootPasswordExternalSecret: *rootDbSecret
399 userName: &dbUser sdnctl
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100400 userCredentialsExternalSecret: *dbSecretName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100401 rootUser:
402 externalSecret: *rootDbSecret
403 db:
404 user: *dbUser
405 externalSecret: *dbSecretName
jmac065e2ce2018-03-29 01:18:02 +0000406 service:
407 name: sdnc-dbhost
jmac065e2ce2018-03-29 01:18:02 +0000408 sdnctlPrefix: sdnc
409 persistence:
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000410 mountSubPath: sdnc/mariadb-galera
jmac065e2ce2018-03-29 01:18:02 +0000411 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000412 replicaCount: 1
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100413 serviceAccount:
414 nameOverride: *sdnc-db
jmac065e2ce2018-03-29 01:18:02 +0000415
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100416cds:
417 enabled: false
418
419dmaap-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000420 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100421 nameOverride: sdnc-dmaap-listener
422 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100423 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100424 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100425 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100426 mysqlDatabase: *sdncDbName
427 config:
428 sdncChartName: sdnc
429 dmaapPort: 3904
430 sdncPort: 8282
431 configDir: /opt/onap/sdnc/data/properties
432 odlCredsExternalSecret: *odlCredsSecretName
433
434ueb-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000435 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100436 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100437 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100438 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100439 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100440 mysqlDatabase: *sdncDbName
441 nameOverride: sdnc-ueb-listener
442 config:
443 sdncPort: 8282
444 sdncChartName: sdnc
445 configDir: /opt/onap/sdnc/data/properties
446 odlCredsExternalSecret: *odlCredsSecretName
447
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100448sdnc-ansible-server:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000449 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100450 config:
451 restCredsExternalSecret: *ansibleSecretName
452 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100453 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100454 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100455 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100456 mysqlDatabase: ansible
457 service:
458 name: sdnc-ansible-server
459 internalPort: 8000
460
jmac065e2ce2018-03-29 01:18:02 +0000461dgbuilder:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000462 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000463 nameOverride: sdnc-dgbuilder
Dan Timoneycb0a81f2020-07-15 17:31:43 -0400464 certInitializer:
465 nameOverride: sdnc-dgbuilder-cert-initializer
jmac065e2ce2018-03-29 01:18:02 +0000466 config:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100467 db:
468 dbName: *sdncDbName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100469 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
470 ternary
471 (printf "%s-sdnc-db-root-password" (include "common.release" .))
472 (include "common.mariadb.secret.rootPassSecretName"
473 (dict "dot" . "chartName" "mariadb-galera")) }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100474 userCredentialsExternalSecret: *dbSecretName
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000475 dbPodName: mariadb-galera
476 dbServiceName: mariadb-galera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100477 # This should be revisited and changed to plain text
jmac70863e12018-05-16 14:53:03 +0000478 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
farida azmydc9aef02021-04-07 17:07:09 +0200479 serviceAccount:
480 nameOverride: sdnc-dgbuilder
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100481 mariadb-galera:
jmac065e2ce2018-03-29 01:18:02 +0000482 service:
BorislavG1ffbd992018-04-24 07:56:27 +0000483 name: sdnc-dgbuilder
jmac065e2ce2018-03-29 01:18:02 +0000484 nodePort: "03"
485
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200486 ingress:
487 enabled: false
488 service:
489 - baseaddr: "sdnc-dgbuilder"
490 name: "sdnc-dgbuilder"
491 port: 3000
Alexander Dehn9b797d62020-04-21 09:53:50 +0000492 - baseaddr: "sdnc-web-service"
493 name: "sdnc-web-service"
494 port: 8443
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200495 config:
496 ssl: "redirect"
497
Alexander Dehn9b797d62020-04-21 09:53:50 +0000498
499
Alexander Dehnab86ec12020-02-05 14:38:54 +0000500# local elasticsearch cluster
501localElasticCluster: true
502elasticsearch:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100503 nameOverride: &elasticSearchName sdnrdb
Alexander Dehnab86ec12020-02-05 14:38:54 +0000504 name: sdnrdb-cluster
Krzysztof Opasiakc6152ce2020-05-09 01:43:08 +0200505 certInitializer:
Alexander Dehnab86ec12020-02-05 14:38:54 +0000506 fqdn: "sdnc"
507 fqi_namespace: org.onap.sdnc
508 fqi: "sdnc@sdnc.onap.org"
509 service:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100510 name: *elasticSearchName
Alexander Dehnab86ec12020-02-05 14:38:54 +0000511 master:
512 replicaCount: 3
513 # dedicatednode: "yes"
514 # working as master node only, in this case increase replicaCount for elasticsearch-data
515 # dedicatednode: "no"
516 # handles master and data node functionality
517 dedicatednode: "no"
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100518 nameOverride: *elasticSearchName
demskeq8eb56da72021-02-19 12:11:48 +0100519 cluster_name: sdnrdb-cluster
sebdetb205f402021-10-20 12:16:02 +0200520
Alexander Dehn9b797d62020-04-21 09:53:50 +0000521# enable
522sdnc-web:
Alexander Dehn8789a722020-10-16 14:29:05 +0000523 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000524# default number of instances
525replicaCount: 1
526
527nodeSelector: {}
528
529affinity: {}
530
531# probe configuration parameters
532liveness:
533 initialDelaySeconds: 10
534 periodSeconds: 10
535 # necessary to disable liveness probe when setting breakpoints
536 # in debugger so K8s doesn't restart unresponsive container
537 enabled: true
538
539readiness:
540 initialDelaySeconds: 10
541 periodSeconds: 10
542
543service:
544 type: NodePort
545 name: sdnc
BorislavG1ffbd992018-04-24 07:56:27 +0000546 portName: sdnc
jmac065e2ce2018-03-29 01:18:02 +0000547 internalPort: 8181
548 internalPort2: 8101
549 internalPort3: 8080
Timoney, Dan (dt5972)c6de2692019-08-14 14:22:37 -0400550 internalPort4: 8443
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400551
jmac065e2ce2018-03-29 01:18:02 +0000552 #port
553 externalPort: 8282
jmac065e2ce2018-03-29 01:18:02 +0000554
555 externalPort2: 8202
jmac065e2ce2018-03-29 01:18:02 +0000556
557 externalPort3: 8280
jmac065e2ce2018-03-29 01:18:02 +0000558
jmaca68f4cb2018-05-10 22:44:19 +0000559 externalPort4: 8443
560 nodePort4: 67
561
jmac065e2ce2018-03-29 01:18:02 +0000562 clusterPort: 2550
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400563 clusterPort2: 2650
564 clusterPort3: 2681
565
566 geoNodePort1: 61
567 geoNodePort2: 62
568 geoNodePort3: 63
569 geoNodePort4: 64
570 geoNodePort5: 65
571 geoNodePort6: 66
jmac065e2ce2018-03-29 01:18:02 +0000572
demskeq827854662021-04-08 14:49:47 +0200573 callHomePort: 6666
574 callHomeNodePort: 66
575
jmac8d6dc962018-04-26 14:26:55 +0000576## Persist data to a persitent volume
577persistence:
578 enabled: true
579
580 ## A manually managed Persistent Volume and Claim
581 ## Requires persistence.enabled: true
582 ## If defined, PVC must be created manually before volume will be bound
583 # existingClaim:
584 volumeReclaimPolicy: Retain
585
586 ## database data Persistent Volume Storage Class
587 ## If defined, storageClassName: <storageClass>
588 ## If set to "-", storageClassName: "", which disables dynamic provisioning
589 ## If undefined (the default) or set to null, no storageClassName spec is
590 ## set, choosing the default provisioner. (gp2 on AWS, standard on
591 ## GKE, AWS & OpenStack)
592 accessMode: ReadWriteOnce
593 size: 1Gi
594 mountPath: /dockerdata-nfs
595 mountSubPath: sdnc/mdsal
Dan Timoney2ee28a52021-01-15 16:39:50 -0500596 mdsalPath: /opt/opendaylight/mdsal
demskeq8a86300a2021-02-10 09:53:33 +0100597 daeximPath: /opt/opendaylight/mdsal/daexim
Satoshi Fujii31b8b432021-08-28 12:12:36 +0000598 journalPath: /opt/opendaylight/segmented-journal
Dan Timoney2ee28a52021-01-15 16:39:50 -0500599 snapshotsPath: /opt/opendaylight/snapshots
jmac8d6dc962018-04-26 14:26:55 +0000600
egernug27578332020-03-26 10:27:55 +0000601certpersistence:
602 enabled: true
603
604 ## A manually managed Persistent Volume and Claim
605 ## Requires persistence.enabled: true
606 ## If defined, PVC must be created manually before volume will be bound
607 # existingClaim:
608
609 volumeReclaimPolicy: Retain
610 accessMode: ReadWriteOnce
611 size: 50Mi
612 mountPath: /dockerdata-nfs
613 mountSubPath: sdnc/certs
614 certPath: /opt/app/osaaf
615 ##storageClass: "manual"
616
jmac065e2ce2018-03-29 01:18:02 +0000617ingress:
618 enabled: false
Lucjan Bryndza08448402019-11-27 14:26:54 +0100619 service:
Lucjan Bryndza05649652020-04-29 08:52:33 +0000620 - baseaddr: "sdnc.api"
Lucjan Bryndza08448402019-11-27 14:26:54 +0100621 name: "sdnc"
622 port: 8443
623 config:
624 ssl: "redirect"
jmac065e2ce2018-03-29 01:18:02 +0000625
toshrajbhardwaj72b5f0f2018-09-13 02:45:22 +0000626#Resource Limit flavor -By Default using small
627flavor: small
628#segregation for different envionment (Small and Large)
629
630resources:
Mandeep Khindade045712018-09-19 18:11:57 +0000631 small:
632 limits:
633 cpu: 2
634 memory: 4Gi
635 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000636 cpu: 1
637 memory: 2Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000638 large:
639 limits:
640 cpu: 4
641 memory: 8Gi
642 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000643 cpu: 2
644 memory: 4Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000645 unlimited: {}
farida azmy32c5ed82021-08-04 14:46:09 +0200646
647#Pods Service Account
648serviceAccount:
649 nameOverride: sdnc
650 roles:
651 - read
Maciej Wereski537d71e2021-11-03 13:31:44 +0000652
653#Log configuration
654log:
655 path: /var/log/onap