Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 1 | # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH |
vaibhav_16dec | e04b2fe | 2018-03-22 09:07:12 +0000 | [diff] [blame] | 2 | # Copyright © 2017 Amdocs, Bell Canada |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | # you may not use this file except in compliance with the License. |
| 6 | # You may obtain a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | # See the License for the specific language governing permissions and |
| 14 | # limitations under the License. |
| 15 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 16 | ################################################################# |
| 17 | # Global configuration defaults. |
| 18 | ################################################################# |
| 19 | global: |
| 20 | nodePortPrefix: 302 |
jmac | 0e4f717 | 2018-09-07 18:06:43 +0000 | [diff] [blame] | 21 | nodePortPrefixExt: 304 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 22 | persistence: |
| 23 | mountPath: /dockerdata-nfs |
Agarwal, Ruchira (ra1926) | ec7c75e | 2019-10-01 17:36:24 +0000 | [diff] [blame] | 24 | aafEnabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 25 | mariadbGalera: |
| 26 | #This flag allows SO to instantiate its own mariadb-galera cluster |
| 27 | #If shared instance is used, this chart assumes that DB already exists |
| 28 | localCluster: false |
| 29 | service: mariadb-galera |
| 30 | internalPort: 3306 |
| 31 | nameOverride: mariadb-galera |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 32 | service: mariadb-galera |
egernug | 2757833 | 2020-03-26 10:27:55 +0000 | [diff] [blame] | 33 | # Enabling CMPv2 |
| 34 | cmpv2Enabled: true |
Jan Malkiewicz | 0e53c9f | 2020-12-08 15:08:01 +0100 | [diff] [blame] | 35 | CMPv2CertManagerIntegration: false |
egernug | 2757833 | 2020-03-26 10:27:55 +0000 | [diff] [blame] | 36 | platform: |
| 37 | certServiceClient: |
Remigiusz Janeczek | ce152ff | 2020-12-29 08:53:17 +0100 | [diff] [blame] | 38 | image: onap/org.onap.oom.platform.cert-service.oom-certservice-client:2.3.2 |
egernug | 2757833 | 2020-03-26 10:27:55 +0000 | [diff] [blame] | 39 | secret: |
| 40 | name: oom-cert-service-client-tls-secret |
| 41 | mountPath: /etc/onap/oom/certservice/certs/ |
| 42 | envVariables: |
| 43 | # Certificate related |
| 44 | cert_path: /var/custom-certs |
| 45 | cmpv2Organization: "Linux-Foundation" |
| 46 | cmpv2OrganizationalUnit: "ONAP" |
| 47 | cmpv2Location: "San-Francisco" |
| 48 | cmpv2Country: "US" |
| 49 | # Client configuration related |
| 50 | caName: "RA" |
| 51 | common_name: "sdnc.simpledemo.onap.org" |
| 52 | requestURL: "https://oom-cert-service:8443/v1/certificate/" |
| 53 | requestTimeout: "30000" |
| 54 | keystorePath: "/etc/onap/oom/certservice/certs/certServiceClient-keystore.jks" |
| 55 | outputType: "P12" |
| 56 | keystorePassword: "secret" |
| 57 | truststorePath: "/etc/onap/oom/certservice/certs/truststore.jks" |
| 58 | truststorePassword: "secret" |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 59 | |
| 60 | ################################################################# |
| 61 | # Secrets metaconfig |
| 62 | ################################################################# |
| 63 | secrets: |
| 64 | - uid: db-root-password |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 65 | name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 66 | type: password |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 67 | # If we're using shared mariadb, we need to use the secret name (second |
| 68 | # part). |
| 69 | # If not, we do the same trick than for user db secret hat allows you |
| 70 | # override this secret using external one with the same field that is used |
| 71 | # to pass this to subchart. |
Krzysztof Opasiak | ab7a6bb | 2020-03-24 03:30:51 +0100 | [diff] [blame] | 72 | externalSecret: '{{ .Values.global.mariadbGalera.localCluster | |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 73 | ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) | |
| 74 | ternary |
| 75 | "" |
| 76 | (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .)) |
| 77 | (include "common.mariadb.secret.rootPassSecretName" |
| 78 | (dict "dot" . |
| 79 | "chartName" .Values.global.mariadbGalera.nameOverride)) }}' |
| 80 | password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 81 | - uid: db-secret |
| 82 | name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret' |
| 83 | type: basicAuth |
| 84 | # This is a nasty trick that allows you override this secret using external one |
| 85 | # with the same field that is used to pass this to subchart |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 86 | externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) | |
| 87 | ternary |
| 88 | "" |
| 89 | (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}' |
| 90 | login: '{{ index .Values "mariadb-galera" "db" "user" }}' |
| 91 | password: '{{ index .Values "mariadb-galera" "db" "password" }}' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 92 | - uid: odl-creds |
| 93 | name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds' |
| 94 | type: basicAuth |
| 95 | externalSecret: '{{ .Values.config.odlCredsExternalSecret }}' |
| 96 | login: '{{ .Values.config.odlUser }}' |
| 97 | password: '{{ .Values.config.odlPassword }}' |
| 98 | # For now this is left hardcoded but should be revisited in a future |
| 99 | passwordPolicy: required |
demskeq8 | 9d26b33 | 2021-01-14 16:45:28 +0100 | [diff] [blame^] | 100 | - uid: dmaap-proxy-creds |
| 101 | name: &dmaapProxyCredsSecretName '{{ include "common.release" . }}-sdnc-dmaap-proxy-creds' |
| 102 | type: basicAuth |
| 103 | externalSecret: '{{ .Values.config.dmaapProxyCredsExternalSecret }}' |
| 104 | login: '{{ .Values.config.sdnr.dmaapProxy.user }}' |
| 105 | password: '{{ .Values.config.sdnr.dmaapProxy.password }}' |
| 106 | # For now this is left hardcoded but should be revisited in a future |
| 107 | passwordPolicy: required |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 108 | - uid: netbox-apikey |
| 109 | type: password |
| 110 | externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}' |
| 111 | password: '{{ .Values.config.netboxApikey }}' |
| 112 | passwordPolicy: required |
| 113 | - uid: aai-user-creds |
| 114 | type: basicAuth |
| 115 | externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}' |
| 116 | login: '{{ .Values.config.aaiUser }}' |
| 117 | password: '{{ .Values.config.aaiPassword }}' |
| 118 | passwordPolicy: required |
| 119 | - uid: modeling-user-creds |
| 120 | type: basicAuth |
| 121 | externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}' |
| 122 | login: '{{ .Values.config.modelingUser }}' |
| 123 | password: '{{ .Values.config.modelingPassword }}' |
| 124 | passwordPolicy: required |
| 125 | - uid: restconf-creds |
| 126 | type: basicAuth |
| 127 | externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}' |
| 128 | login: '{{ .Values.config.restconfUser }}' |
| 129 | password: '{{ .Values.config.restconfPassword }}' |
| 130 | passwordPolicy: required |
| 131 | - uid: ansible-creds |
| 132 | name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds' |
| 133 | type: basicAuth |
| 134 | externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}' |
| 135 | login: '{{ .Values.config.ansibleUser }}' |
| 136 | password: '{{ .Values.config.ansiblePassword }}' |
| 137 | passwordPolicy: required |
| 138 | - uid: scaleout-creds |
| 139 | type: basicAuth |
| 140 | externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}' |
| 141 | login: '{{ .Values.config.scaleoutUser }}' |
| 142 | password: '{{ .Values.config.scaleoutPassword }}' |
| 143 | passwordPolicy: required |
Jan Malkiewicz | 0e53c9f | 2020-12-08 15:08:01 +0100 | [diff] [blame] | 144 | - uid: keystore-password |
| 145 | type: password |
| 146 | password: secret |
| 147 | passwordPolicy: required |
| 148 | ################################################################# |
| 149 | # Certificates |
| 150 | ################################################################# |
| 151 | certificates: |
| 152 | - name: onap-sdnc-certificate |
| 153 | secretName: onap-sdnc-certificate |
| 154 | commonName: sdnc.simpledemo.onap.org |
| 155 | dnsNames: |
| 156 | - sdnc.simpledemo.onap.org |
| 157 | p12Keystore: |
| 158 | create: true |
| 159 | passwordSecretRef: |
| 160 | name: keystore-password |
| 161 | key: password |
| 162 | jksKeystore: |
| 163 | create: true |
| 164 | passwordSecretRef: |
| 165 | name: keystore-password |
| 166 | key: password |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 167 | ################################################################# |
| 168 | # Application configuration defaults. |
| 169 | ################################################################# |
| 170 | # application images |
Alexander Dehn | 238450f | 2020-10-27 13:03:53 +0000 | [diff] [blame] | 171 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 172 | pullPolicy: Always |
Dan Timoney | aa79ff6 | 2020-11-18 16:43:33 -0500 | [diff] [blame] | 173 | image: onap/sdnc-image:2.0.4 |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 174 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 175 | # flag to enable debugging - application support required |
| 176 | debugEnabled: false |
| 177 | |
| 178 | # application configuration |
BorislavG | 5f3b619 | 2018-03-25 18:12:38 +0300 | [diff] [blame] | 179 | config: |
Timoney, Dan (dt5972) | ba4d2eb | 2019-05-07 13:32:42 -0400 | [diff] [blame] | 180 | odlUid: 100 |
| 181 | odlGid: 101 |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 182 | odlUser: admin |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 183 | odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 184 | # odlCredsExternalSecret: some secret |
| 185 | netboxApikey: onceuponatimeiplayedwithnetbox20180814 |
| 186 | # netboxApikeyExternalSecret: some secret |
| 187 | aaiUser: sdnc@sdnc.onap.org |
| 188 | aaiPassword: demo123456! |
| 189 | # aaiCredsExternalSecret: some secret |
| 190 | modelingUser: ccsdkapps |
| 191 | modelingPassword: ccsdkapps |
| 192 | # modelingCredsExternalSecret: some secret |
| 193 | restconfUser: admin |
| 194 | restconfPassword: admin |
| 195 | # restconfCredsExternalSecret: some secret |
| 196 | scaleoutUser: admin |
| 197 | scaleoutPassword: admin |
| 198 | # scaleoutExternalSecret: some secret |
| 199 | ansibleUser: sdnc |
| 200 | ansiblePassword: sdnc |
| 201 | # ansibleCredsExternalSecret: some secret |
| 202 | dbSdnctlDatabase: &sdncDbName sdnctl |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 203 | enableClustering: true |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 204 | sdncHome: /opt/onap/sdnc |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 205 | binDir: /opt/onap/sdnc/bin |
Timoney, Dan (dt5972) | a3bc1a5 | 2019-06-26 16:16:52 -0400 | [diff] [blame] | 206 | etcDir: /opt/onap/sdnc/data |
Trevor Tait | 567ff1e | 2018-05-01 16:20:54 -0400 | [diff] [blame] | 207 | geoEnabled: false |
Neha Jain | 7b0d6c6 | 2018-05-17 14:34:49 -0400 | [diff] [blame] | 208 | # if geoEnabled is set to true here, mysql.geoEnabled must be set to true |
Trevor Tait | 567ff1e | 2018-05-01 16:20:54 -0400 | [diff] [blame] | 209 | # if geoEnabled is set to true the following 3 values must be set to their proper values |
| 210 | myODLCluster: 127.0.0.1 |
| 211 | peerODLCluster: 127.0.0.1 |
Mohammadreza Pasandideh | b642ee5 | 2018-06-19 15:19:53 -0400 | [diff] [blame] | 212 | isPrimaryCluster: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 213 | configDir: /opt/onap/sdnc/data/properties |
Konrad Bańka | 5ea1db3 | 2020-04-06 14:32:46 +0200 | [diff] [blame] | 214 | ccsdkConfigDir: /opt/onap/ccsdk/data/properties |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 215 | dmaapTopic: SUCCESS |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 216 | dmaapPort: 3904 |
BorislavG | 5f3b619 | 2018-03-25 18:12:38 +0300 | [diff] [blame] | 217 | logstashServiceName: log-ls |
| 218 | logstashPort: 5044 |
jmac | 7c43467 | 2018-05-11 20:14:17 +0000 | [diff] [blame] | 219 | ansibleServiceName: sdnc-ansible-server |
| 220 | ansiblePort: 8000 |
Dan Timoney | a98765b | 2020-09-14 11:57:55 -0400 | [diff] [blame] | 221 | javaHome: /opt/java/openjdk |
jmac | 7c43467 | 2018-05-11 20:14:17 +0000 | [diff] [blame] | 222 | |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 223 | odl: |
| 224 | etcDir: /opt/opendaylight/etc |
| 225 | binDir: /opt/opendaylight/bin |
Dan Timoney | a98765b | 2020-09-14 11:57:55 -0400 | [diff] [blame] | 226 | gcLogDir: /opt/opendaylight/data/log |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 227 | salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 228 | salConfigVersion: 1.9.1 |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 229 | akka: |
| 230 | seedNodeTimeout: 15s |
| 231 | circuitBreaker: |
| 232 | maxFailures: 10 |
| 233 | callTimeout: 90s |
| 234 | resetTimeout: 30s |
| 235 | recoveryEventTimeout: 90s |
| 236 | datastore: |
| 237 | persistentActorRestartMinBackoffInSeconds: 10 |
| 238 | persistentActorRestartMaxBackoffInSeconds: 40 |
| 239 | persistentActorRestartResetBackoffInSeconds: 20 |
| 240 | shardTransactionCommitTimeoutInSeconds: 120 |
| 241 | shardIsolatedLeaderCheckIntervalInMillis: 30000 |
| 242 | operationTimeoutInSeconds: 120 |
| 243 | javaOptions: |
| 244 | maxGCPauseMillis: 100 |
| 245 | parallelGCThreads : 3 |
Dan Timoney | a98765b | 2020-09-14 11:57:55 -0400 | [diff] [blame] | 246 | numberGCLogFiles: 10 |
| 247 | minMemory: 512m |
| 248 | maxMemory: 2048m |
| 249 | gcLogOptions: "" |
| 250 | # Next line enables gc logging |
| 251 | # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}" |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 252 | # enables sdnr functionality |
| 253 | sdnr: |
Alexander Dehn | 5c1105e | 2020-09-14 20:55:56 +0000 | [diff] [blame] | 254 | enabled: true |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 255 | # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default), |
| 256 | # mode: dm - SDNC contains sdnr device manager + ODLUX components |
| 257 | mode: dm |
| 258 | # sdnronly: true starts sdnc container with odl and sdnrwt features only |
| 259 | sdnronly: false |
| 260 | sdnrdbTrustAllCerts: true |
| 261 | mountpointRegistrarEnabled: false |
| 262 | mountpointStateProviderEnabled: false |
demskeq8 | 9d26b33 | 2021-01-14 16:45:28 +0100 | [diff] [blame^] | 263 | # enable and set dmaap-proxy for mountpointRegistrar |
| 264 | dmaapProxy: |
| 265 | enabled: false |
| 266 | usepwd: true |
| 267 | user: addUserHere |
| 268 | password: addPasswordHere |
| 269 | url: addProxyUrlHere |
| 270 | |
| 271 | |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 272 | |
| 273 | |
Timoney, Dan (dt5972) | 5877477 | 2019-08-21 16:50:54 -0400 | [diff] [blame] | 274 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 275 | # dependency / sub-chart configuration |
Krzysztof Opasiak | 8ab4547 | 2020-05-12 12:53:50 +0200 | [diff] [blame] | 276 | certInitializer: |
| 277 | nameOverride: sdnc-cert-initializer |
Jozsef Csongvai | 9d4d5af | 2020-07-13 11:10:25 -0400 | [diff] [blame] | 278 | truststoreMountpath: /opt/onap/sdnc/data/stores |
Krzysztof Opasiak | 6bab0cc | 2020-04-29 00:55:47 +0200 | [diff] [blame] | 279 | fqdn: "sdnc" |
| 280 | app_ns: "org.osaaf.aaf" |
| 281 | fqi: "sdnc@sdnc.onap.org" |
| 282 | fqi_namespace: org.onap.sdnc |
| 283 | public_fqdn: "sdnc.onap.org" |
| 284 | aafDeployFqi: "deployer@people.osaaf.org" |
| 285 | aafDeployPass: demo123456! |
| 286 | cadi_latitude: "38.0" |
| 287 | cadi_longitude: "-72.0" |
Krzysztof Opasiak | 6bab0cc | 2020-04-29 00:55:47 +0200 | [diff] [blame] | 288 | credsPath: /opt/app/osaaf/local |
Krzysztof Opasiak | 8ab4547 | 2020-05-12 12:53:50 +0200 | [diff] [blame] | 289 | aaf_add_config: > |
| 290 | cd /opt/app/osaaf/local; |
| 291 | /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1 |
Agarwal, Ruchira (ra1926) | ec7c75e | 2019-10-01 17:36:24 +0000 | [diff] [blame] | 292 | |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 293 | # dependency / sub-chart configuration |
| 294 | network-name-gen: |
| 295 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 296 | mariadb-galera: &mariadbGalera |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 297 | nameOverride: &sdnc-db sdnc-db |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 298 | config: &mariadbGaleraConfig |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 299 | rootPasswordExternalSecret: *rootDbSecret |
| 300 | userName: &dbUser sdnctl |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 301 | userCredentialsExternalSecret: *dbSecretName |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 302 | rootUser: |
| 303 | externalSecret: *rootDbSecret |
| 304 | db: |
| 305 | user: *dbUser |
| 306 | externalSecret: *dbSecretName |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 307 | service: |
| 308 | name: sdnc-dbhost |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 309 | sdnctlPrefix: sdnc |
| 310 | persistence: |
Mahendra Raghuwanshi | b76cb28 | 2019-04-09 10:13:07 +0000 | [diff] [blame] | 311 | mountSubPath: sdnc/mariadb-galera |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 312 | enabled: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 313 | replicaCount: 1 |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 314 | serviceAccount: |
| 315 | nameOverride: *sdnc-db |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 316 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 317 | cds: |
| 318 | enabled: false |
| 319 | |
| 320 | dmaap-listener: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 321 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 322 | nameOverride: sdnc-dmaap-listener |
| 323 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 324 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 325 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 326 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 327 | mysqlDatabase: *sdncDbName |
| 328 | config: |
| 329 | sdncChartName: sdnc |
| 330 | dmaapPort: 3904 |
| 331 | sdncPort: 8282 |
| 332 | configDir: /opt/onap/sdnc/data/properties |
| 333 | odlCredsExternalSecret: *odlCredsSecretName |
| 334 | |
| 335 | ueb-listener: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 336 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 337 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 338 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 339 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 340 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 341 | mysqlDatabase: *sdncDbName |
| 342 | nameOverride: sdnc-ueb-listener |
| 343 | config: |
| 344 | sdncPort: 8282 |
| 345 | sdncChartName: sdnc |
| 346 | configDir: /opt/onap/sdnc/data/properties |
| 347 | odlCredsExternalSecret: *odlCredsSecretName |
| 348 | |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 349 | sdnc-ansible-server: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 350 | enabled: true |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 351 | config: |
| 352 | restCredsExternalSecret: *ansibleSecretName |
| 353 | mariadb-galera: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 354 | <<: *mariadbGalera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 355 | config: |
Konrad Bańka | a9d4403 | 2020-03-19 18:31:34 +0100 | [diff] [blame] | 356 | <<: *mariadbGaleraConfig |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 357 | mysqlDatabase: ansible |
| 358 | service: |
| 359 | name: sdnc-ansible-server |
| 360 | internalPort: 8000 |
| 361 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 362 | dgbuilder: |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 363 | enabled: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 364 | nameOverride: sdnc-dgbuilder |
Dan Timoney | cb0a81f | 2020-07-15 17:31:43 -0400 | [diff] [blame] | 365 | certInitializer: |
| 366 | nameOverride: sdnc-dgbuilder-cert-initializer |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 367 | config: |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 368 | db: |
| 369 | dbName: *sdncDbName |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 370 | rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster | |
| 371 | ternary |
| 372 | (printf "%s-sdnc-db-root-password" (include "common.release" .)) |
| 373 | (include "common.mariadb.secret.rootPassSecretName" |
| 374 | (dict "dot" . "chartName" "mariadb-galera")) }}' |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 375 | userCredentialsExternalSecret: *dbSecretName |
Mahendra Raghuwanshi | b76cb28 | 2019-04-09 10:13:07 +0000 | [diff] [blame] | 376 | dbPodName: mariadb-galera |
| 377 | dbServiceName: mariadb-galera |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 378 | # This should be revisited and changed to plain text |
jmac | 70863e1 | 2018-05-16 14:53:03 +0000 | [diff] [blame] | 379 | dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5 |
Krzysztof Opasiak | cc97c73 | 2020-02-25 23:31:20 +0100 | [diff] [blame] | 380 | mariadb-galera: |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 381 | service: |
BorislavG | 1ffbd99 | 2018-04-24 07:56:27 +0000 | [diff] [blame] | 382 | name: sdnc-dgbuilder |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 383 | nodePort: "03" |
| 384 | |
Sylvain Desbureaux | e54644e | 2020-05-04 11:45:16 +0200 | [diff] [blame] | 385 | ingress: |
| 386 | enabled: false |
| 387 | service: |
| 388 | - baseaddr: "sdnc-dgbuilder" |
| 389 | name: "sdnc-dgbuilder" |
| 390 | port: 3000 |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 391 | - baseaddr: "sdnc-web-service" |
| 392 | name: "sdnc-web-service" |
| 393 | port: 8443 |
Sylvain Desbureaux | e54644e | 2020-05-04 11:45:16 +0200 | [diff] [blame] | 394 | config: |
| 395 | ssl: "redirect" |
| 396 | |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 397 | |
| 398 | |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 399 | # local elasticsearch cluster |
| 400 | localElasticCluster: true |
| 401 | elasticsearch: |
Sylvain Desbureaux | 829344b | 2020-11-19 17:07:26 +0100 | [diff] [blame] | 402 | nameOverride: &elasticSearchName sdnrdb |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 403 | name: sdnrdb-cluster |
Krzysztof Opasiak | c6152ce | 2020-05-09 01:43:08 +0200 | [diff] [blame] | 404 | certInitializer: |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 405 | fqdn: "sdnc" |
| 406 | fqi_namespace: org.onap.sdnc |
| 407 | fqi: "sdnc@sdnc.onap.org" |
| 408 | service: |
Sylvain Desbureaux | 829344b | 2020-11-19 17:07:26 +0100 | [diff] [blame] | 409 | name: *elasticSearchName |
Alexander Dehn | ab86ec1 | 2020-02-05 14:38:54 +0000 | [diff] [blame] | 410 | master: |
| 411 | replicaCount: 3 |
| 412 | # dedicatednode: "yes" |
| 413 | # working as master node only, in this case increase replicaCount for elasticsearch-data |
| 414 | # dedicatednode: "no" |
| 415 | # handles master and data node functionality |
| 416 | dedicatednode: "no" |
Sylvain Desbureaux | 829344b | 2020-11-19 17:07:26 +0100 | [diff] [blame] | 417 | nameOverride: *elasticSearchName |
| 418 | cluster_name: *elasticSearchName |
Alexander Dehn | 9b797d6 | 2020-04-21 09:53:50 +0000 | [diff] [blame] | 419 | # enable |
| 420 | sdnc-web: |
Alexander Dehn | 8789a72 | 2020-10-16 14:29:05 +0000 | [diff] [blame] | 421 | enabled: true |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 422 | # default number of instances |
| 423 | replicaCount: 1 |
| 424 | |
| 425 | nodeSelector: {} |
| 426 | |
| 427 | affinity: {} |
| 428 | |
| 429 | # probe configuration parameters |
| 430 | liveness: |
| 431 | initialDelaySeconds: 10 |
| 432 | periodSeconds: 10 |
| 433 | # necessary to disable liveness probe when setting breakpoints |
| 434 | # in debugger so K8s doesn't restart unresponsive container |
| 435 | enabled: true |
| 436 | |
| 437 | readiness: |
| 438 | initialDelaySeconds: 10 |
| 439 | periodSeconds: 10 |
| 440 | |
| 441 | service: |
| 442 | type: NodePort |
| 443 | name: sdnc |
BorislavG | 1ffbd99 | 2018-04-24 07:56:27 +0000 | [diff] [blame] | 444 | portName: sdnc |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 445 | internalPort: 8181 |
| 446 | internalPort2: 8101 |
| 447 | internalPort3: 8080 |
Timoney, Dan (dt5972) | c6de269 | 2019-08-14 14:22:37 -0400 | [diff] [blame] | 448 | internalPort4: 8443 |
Mohammadreza Pasandideh | b756fb7 | 2018-04-03 10:06:45 -0400 | [diff] [blame] | 449 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 450 | #port |
| 451 | externalPort: 8282 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 452 | |
| 453 | externalPort2: 8202 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 454 | |
| 455 | externalPort3: 8280 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 456 | |
jmac | a68f4cb | 2018-05-10 22:44:19 +0000 | [diff] [blame] | 457 | externalPort4: 8443 |
| 458 | nodePort4: 67 |
| 459 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 460 | clusterPort: 2550 |
Mohammadreza Pasandideh | b756fb7 | 2018-04-03 10:06:45 -0400 | [diff] [blame] | 461 | clusterPort2: 2650 |
| 462 | clusterPort3: 2681 |
| 463 | |
| 464 | geoNodePort1: 61 |
| 465 | geoNodePort2: 62 |
| 466 | geoNodePort3: 63 |
| 467 | geoNodePort4: 64 |
| 468 | geoNodePort5: 65 |
| 469 | geoNodePort6: 66 |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 470 | |
jmac | 8d6dc96 | 2018-04-26 14:26:55 +0000 | [diff] [blame] | 471 | ## Persist data to a persitent volume |
| 472 | persistence: |
| 473 | enabled: true |
| 474 | |
| 475 | ## A manually managed Persistent Volume and Claim |
| 476 | ## Requires persistence.enabled: true |
| 477 | ## If defined, PVC must be created manually before volume will be bound |
| 478 | # existingClaim: |
| 479 | volumeReclaimPolicy: Retain |
| 480 | |
| 481 | ## database data Persistent Volume Storage Class |
| 482 | ## If defined, storageClassName: <storageClass> |
| 483 | ## If set to "-", storageClassName: "", which disables dynamic provisioning |
| 484 | ## If undefined (the default) or set to null, no storageClassName spec is |
| 485 | ## set, choosing the default provisioner. (gp2 on AWS, standard on |
| 486 | ## GKE, AWS & OpenStack) |
| 487 | accessMode: ReadWriteOnce |
| 488 | size: 1Gi |
| 489 | mountPath: /dockerdata-nfs |
| 490 | mountSubPath: sdnc/mdsal |
| 491 | mdsalPath: /opt/opendaylight/current/daexim |
| 492 | |
egernug | 2757833 | 2020-03-26 10:27:55 +0000 | [diff] [blame] | 493 | certpersistence: |
| 494 | enabled: true |
| 495 | |
| 496 | ## A manually managed Persistent Volume and Claim |
| 497 | ## Requires persistence.enabled: true |
| 498 | ## If defined, PVC must be created manually before volume will be bound |
| 499 | # existingClaim: |
| 500 | |
| 501 | volumeReclaimPolicy: Retain |
| 502 | accessMode: ReadWriteOnce |
| 503 | size: 50Mi |
| 504 | mountPath: /dockerdata-nfs |
| 505 | mountSubPath: sdnc/certs |
| 506 | certPath: /opt/app/osaaf |
| 507 | ##storageClass: "manual" |
| 508 | |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 509 | ingress: |
| 510 | enabled: false |
Lucjan Bryndza | 0844840 | 2019-11-27 14:26:54 +0100 | [diff] [blame] | 511 | service: |
Lucjan Bryndza | 0564965 | 2020-04-29 08:52:33 +0000 | [diff] [blame] | 512 | - baseaddr: "sdnc.api" |
Lucjan Bryndza | 0844840 | 2019-11-27 14:26:54 +0100 | [diff] [blame] | 513 | name: "sdnc" |
| 514 | port: 8443 |
| 515 | config: |
| 516 | ssl: "redirect" |
jmac | 065e2ce | 2018-03-29 01:18:02 +0000 | [diff] [blame] | 517 | |
toshrajbhardwaj | 72b5f0f | 2018-09-13 02:45:22 +0000 | [diff] [blame] | 518 | #Resource Limit flavor -By Default using small |
| 519 | flavor: small |
| 520 | #segregation for different envionment (Small and Large) |
| 521 | |
| 522 | resources: |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 523 | small: |
| 524 | limits: |
| 525 | cpu: 2 |
| 526 | memory: 4Gi |
| 527 | requests: |
Mandeep Khinda | 3c13425 | 2018-09-19 23:56:37 +0000 | [diff] [blame] | 528 | cpu: 1 |
| 529 | memory: 2Gi |
Mandeep Khinda | de04571 | 2018-09-19 18:11:57 +0000 | [diff] [blame] | 530 | large: |
| 531 | limits: |
| 532 | cpu: 4 |
| 533 | memory: 8Gi |
| 534 | requests: |
Mandeep Khinda | 3c13425 | 2018-09-19 23:56:37 +0000 | [diff] [blame] | 535 | cpu: 2 |
| 536 | memory: 4Gi |
Mandeep Khinda | 60d36d4 | 2018-09-24 15:15:48 +0000 | [diff] [blame] | 537 | unlimited: {} |