blob: ce7ee71032d78e9b03f061ca6599069f8cf9e579 [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
seshukm0df1f8e2020-08-17 21:45:49 +05302# Copyright © 2020 Huawei
Sylvain Desbureauxd3114052021-02-23 16:45:52 +01003# Copyright © 2021 Orange
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000015#################################################################
16# Global configuration defaults.
17#################################################################
18global:
19 nodePortPrefix: 302
20 nodePortPrefixExt: 304
Maciej Wereskidf9ba222021-11-05 14:38:18 +000021 centralizedLoggingEnabled: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000022 mariadbGalera:
23 nameOverride: mariadb-galera
24 serviceName: mariadb-galera
rope2524d3f3682020-09-02 20:49:21 +010025 servicePort: '3306'
krishnaa9692b606b2020-10-30 11:29:21 +053026 service: mariadb-galera
27 internalPort: '3306'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010028 # mariadbRootPassword: secretpassword
29 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053030 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000031 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
32 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000033 persistence:
34 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020035 #This configuration specifies Service and port for SDNC OAM interface
36 sdncOamService: sdnc-oam
37 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000038 #This configuration will run the migration. The configurations are for backing up the data
39 #from DB and then restoring it to the present versions preferred DB.
40 migration:
41 enabled: false
42 dbHost: mariadb-galera
43 dbPort: 3306
44 dbUser: root
45 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010046 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000047 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000048 app:
49 siteName: onapheat
50 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
51 defaultCloudOwner: onap
sekharhuawei2e799e92020-11-14 17:06:56 +053052
efiacor8d3ff802022-11-23 12:13:26 +000053 soSdcListenerKafkaUser: so-sdc-list-user
54
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010055readinessCheck:
56 wait_for:
Prabhjot Singh Sethi46e17562021-08-20 22:40:23 +053057 jobs:
58 - '{{ include "common.release" . }}-so-mariadb-config-job'
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010059
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010060#################################################################
61# Secrets metaconfig
62#################################################################
63secrets:
64 - uid: db-root-pass
65 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
66 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010067 externalSecret: '{{ .Values.global.mariadbGalera.localCluster | ternary
68 .Values.global.mariadbGalera.rootPasswordExternalSecret
69 (default (include "common.mariadb.secret.rootPassSecretName"
70 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride))
71 .Values.global.mariadbGalera.rootPasswordExternalSecret) }}'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010072 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
73 - uid: db-backup-creds
74 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
75 type: basicAuth
76 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
77 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
78 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
79 passwordPolicy: required
80 annotations:
81 helm.sh/hook: pre-upgrade,pre-install
rope2524d3f3682020-09-02 20:49:21 +010082 helm.sh/hook-weight: '0'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010083 helm.sh/hook-delete-policy: before-hook-creation
84 - uid: db-user-creds
85 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
86 type: basicAuth
87 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
88 login: '{{ .Values.dbCreds.userName }}'
89 password: '{{ .Values.dbCreds.userPassword }}'
90 passwordPolicy: generate
91 - uid: db-admin-creds
92 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
93 type: basicAuth
94 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
95 login: '{{ .Values.dbCreds.adminName }}'
96 password: '{{ .Values.dbCreds.adminPassword }}'
97 passwordPolicy: generate
sekharhuawei2e799e92020-11-14 17:06:56 +053098 - uid: 'mso-key'
Priyadharshini7dc03852020-08-27 04:36:03 -070099 name: &mso-key '{{ include "common.release" . }}-mso-key'
100 type: password
sekharhuawei2e799e92020-11-14 17:06:56 +0530101 password: '{{ .Values.mso.msoKey }}'
Priyadharshini7dc03852020-08-27 04:36:03 -0700102 - uid: mso-oof-auth
103 name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
104 type: basicAuth
105 login: '{{ .Values.mso.oof.login }}'
106 password: '{{ .Values.mso.oof.password }}'
107 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530108 - uid: server-actuator-creds
109 name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
110 type: basicAuth
111 externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
112 login: '{{ .Values.server.actuator.username }}'
113 password: '{{ .Values.server.actuator.password }}'
114 passwordPolicy: required
115 - uid: server-bpel-creds
116 name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
117 type: basicAuth
118 externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
119 login: '{{ .Values.server.bpel.username }}'
120 password: '{{ .Values.server.bpel.password }}'
121 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530122 - uid: so-aai-creds
123 name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
124 type: basicAuth
125 externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
126 login: '{{ .Values.server.aai.username }}'
127 password: '{{ .Values.server.aai.password }}'
128 passwordPolicy: required
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100129
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100130##################################################################
jmacc4f04d32018-10-12 18:24:24 +0000131# Application configuration defaults.
132#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100133
134dbSecrets: &dbSecrets
135 userCredsExternalSecret: *dbUserCredsSecretName
136 adminCredsExternalSecret: *dbAdminCredsSecretName
137
138# unused in this, just to pass to subcharts
139dbCreds:
140 userName: so_user
141 adminName: so_admin
142
Lukasz Rajewskib6861242022-09-06 13:32:58 +0200143image: onap/so/api-handler-infra:1.11.0
sekharhuawei2e799e92020-11-14 17:06:56 +0530144
145server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530146 aai:
147 username: aai@aai.onap.org
148 password: demo123456!
149 # aaiCredsExternalSecret: some secret
150 actuator:
151 username: mso_admin
152 password: password1$
153 # actuatorCredsExternalSecret: some secret
154 bpel:
155 username: bpel
156 password: password1$
157 # bpelCredsExternalSecret: some secret
158
jmacc4f04d32018-10-12 18:24:24 +0000159pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000160replicaCount: 1
161minReadySeconds: 10
seshukm0df1f8e2020-08-17 21:45:49 +0530162containerPort: &containerPort 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000163logPath: ./logs/apih/
164app: api-handler-infra
165service:
seshukm0df1f8e2020-08-17 21:45:49 +0530166 type: NodePort
seshukm0df1f8e2020-08-17 21:45:49 +0530167 internalPort: *containerPort
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100168 ports:
169 - name: http
170 port: *containerPort
171 nodePort: '77'
172 annotations:
173 msb.onap.org/service-info: |
174 {{ if .Values.global.msbEnabled -}}[
175 {
176 "serviceName": "so",
177 "version": "v1",
178 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
179 "protocol": "REST",
180 "port": "{{ .Values.service.internalPort }}",
181 "visualRange":"0",
182 "lb_policy":"ip_hash"
183 },
184 {
185 "serviceName": "so",
186 "version": "v1",
187 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
188 "protocol": "REST",
189 "port": "{{ .Values.service.internalPort }}",
190 "visualRange":"0",
191 "lb_policy":"ip_hash"
192 },
193 {
194 "serviceName": "so",
195 "version": "v1",
196 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
197 "protocol": "REST",
198 "port": "{{ .Values.service.internalPort }}",
199 "visualRange":"0",
200 "lb_policy":"ip_hash"
201 },
202 {
203 "serviceName": "so",
204 "version": "v1",
205 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
206 "protocol": "REST",
207 "port": "{{ .Values.service.internalPort }}",
208 "visualRange":"0",
209 "lb_policy":"ip_hash"
210 },
211 {
212 "serviceName": "so",
213 "version": "v1",
214 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
215 "protocol": "REST",
216 "port": "{{ .Values.service.internalPort }}",
217 "visualRange":"0",
218 "lb_policy":"ip_hash"
219 },
220 {
221 "serviceName": "so",
222 "version": "v1",
223 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
224 "protocol": "REST",
225 "port": "{{ .Values.service.internalPort }}",
226 "visualRange":"0",
227 "lb_policy":"ip_hash"
228 },
229 {
230 "serviceName": "so",
231 "version": "v1",
232 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
233 "protocol": "REST",
234 "port": "{{ .Values.service.internalPort }}",
235 "visualRange":"0",
236 "lb_policy":"ip_hash"
237 },
238 {
239 "serviceName": "so",
240 "version": "v1",
241 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
242 "protocol": "REST",
243 "port": "{{ .Values.service.internalPort }}",
244 "visualRange":"0",
245 "lb_policy":"ip_hash"
246 },
247 {
248 "serviceName": "so",
249 "version": "v1",
250 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
251 "protocol": "REST",
252 "port": "{{ .Values.service.internalPort }}",
253 "visualRange":"0",
254 "lb_policy":"ip_hash"
255 },
256 {
257 "serviceName": "so",
258 "version": "v1",
259 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
260 "protocol": "REST",
261 "port": "{{ .Values.service.internalPort }}",
262 "visualRange":"0",
263 "lb_policy":"ip_hash"
264 },
265 {
266 "serviceName": "so",
267 "version": "v1",
268 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
269 "protocol": "REST",
270 "port": "{{ .Values.service.internalPort }}",
271 "visualRange":"0",
272 "lb_policy":"ip_hash"
273 },
274 {
275 "serviceName": "so",
276 "version": "v1",
277 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
278 "protocol": "REST",
279 "port": "{{ .Values.service.internalPort }}",
280 "visualRange":"0",
281 "lb_policy":"ip_hash"
282 },
283 {
284 "serviceName": "so",
285 "version": "v1",
286 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
287 "protocol": "REST",
288 "port": "{{ .Values.service.internalPort }}",
289 "visualRange":"0",
290 "lb_policy":"ip_hash"
291 },
292 {
293 "serviceName": "so",
294 "version": "v1",
295 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
296 "protocol": "REST",
297 "port": "{{ .Values.service.internalPort }}",
298 "visualRange":"0",
299 "lb_policy":"ip_hash"
300 },
301 {
302 "serviceName": "so",
303 "version": "v1",
304 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
305 "protocol": "REST",
306 "port": "{{ .Values.service.internalPort }}",
307 "visualRange":"0",
308 "lb_policy":"ip_hash"
309 },
310 {
311 "serviceName": "so",
312 "version": "v1",
313 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
314 "protocol": "REST",
315 "port": "{{ .Values.service.internalPort }}",
316 "visualRange":"0",
317 "lb_policy":"ip_hash"
318 },
319 {
320 "serviceName": "so",
321 "version": "v1",
322 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
323 "protocol": "REST",
324 "port": "{{ .Values.service.internalPort }}",
325 "visualRange":"0",
326 "lb_policy":"ip_hash"
327 },
328 {
329 "serviceName": "so",
330 "version": "v1",
331 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
332 "protocol": "REST",
333 "port": "{{ .Values.service.internalPort }}",
334 "visualRange":"0",
335 "lb_policy":"ip_hash"
336 },
337 {
338 "serviceName": "so",
339 "version": "v1",
340 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
341 "protocol": "REST",
342 "port": "{{ .Values.service.internalPort }}",
343 "visualRange":"0",
344 "lb_policy":"ip_hash"
345 },
346 {
347 "serviceName": "so",
348 "version": "v1",
349 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
350 "protocol": "REST",
351 "port": "{{ .Values.service.internalPort }}",
352 "visualRange":"0",
353 "lb_policy":"ip_hash"
354 },
355 {
356 "serviceName": "so",
357 "version": "v1",
358 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
359 "protocol": "REST",
360 "port": "{{ .Values.service.internalPort }}",
361 "visualRange":"0",
362 "lb_policy":"ip_hash"
363 },
364 {
365 "serviceName": "so",
366 "version": "v1",
367 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
368 "protocol": "REST",
369 "port": "{{ .Values.service.internalPort }}",
370 "visualRange":"0",
371 "lb_policy":"ip_hash"
372 },
373 {
374 "serviceName": "so",
375 "version": "v1",
376 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
377 "protocol": "REST",
378 "port": "{{ .Values.service.internalPort }}",
379 "visualRange":"0",
380 "lb_policy":"ip_hash"
381 },
382 {
383 "serviceName": "so",
384 "version": "v1",
385 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
386 "protocol": "REST",
387 "port": "{{ .Values.service.internalPort }}",
388 "visualRange":"0",
389 "lb_policy":"ip_hash"
390 },
391 {
392 "serviceName": "so",
393 "version": "v1",
394 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
395 "protocol": "REST",
396 "port": "{{ .Values.service.internalPort }}",
397 "visualRange":"0",
398 "lb_policy":"ip_hash"
399 },
400 {
401 "serviceName": "so",
402 "version": "v1",
403 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
404 "protocol": "REST",
405 "port": "{{ .Values.service.internalPort }}",
406 "visualRange":"0",
407 "lb_policy":"ip_hash"
408 },
409 {
410 "serviceName": "so",
411 "version": "v1",
412 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
413 "protocol": "REST",
414 "port": "{{ .Values.service.internalPort }}",
415 "visualRange":"0",
416 "lb_policy":"ip_hash"
417 },
418 {
419 "serviceName": "so",
420 "version": "v1",
421 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
422 "protocol": "REST",
423 "port": "{{ .Values.service.internalPort }}",
424 "visualRange":"0",
425 "lb_policy":"ip_hash"
426 },
427 {
428 "serviceName": "so",
429 "version": "v1",
430 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
431 "protocol": "REST",
432 "port": "{{ .Values.service.internalPort }}",
433 "visualRange":"0",
434 "lb_policy":"ip_hash"
435 },
436 {
437 "serviceName": "so",
438 "version": "v1",
439 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
440 "protocol": "REST",
441 "port": "{{ .Values.service.internalPort }}",
442 "visualRange":"0",
443 "lb_policy":"ip_hash"
444 },
445 {
446 "serviceName": "so",
447 "version": "v1",
448 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
449 "protocol": "REST",
450 "port": "{{ .Values.service.internalPort }}",
451 "visualRange":"0",
452 "lb_policy":"ip_hash"
453 },
454 {
455 "serviceName": "so",
456 "version": "v1",
457 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
458 "protocol": "REST",
459 "port": "{{ .Values.service.internalPort }}",
460 "visualRange":"0",
461 "lb_policy":"ip_hash"
462 },
463 {
464 "serviceName": "so",
465 "version": "v1",
466 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
467 "protocol": "REST",
468 "port": "{{ .Values.service.internalPort }}",
469 "visualRange":"0",
470 "lb_policy":"ip_hash"
471 },
472 {
473 "serviceName": "so",
474 "version": "v1",
475 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
476 "protocol": "REST",
477 "port": "{{ .Values.service.internalPort }}",
478 "visualRange":"0",
479 "lb_policy":"ip_hash"
480 },
481 {
482 "serviceName": "so",
483 "version": "v1",
484 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
485 "protocol": "REST",
486 "port": "{{ .Values.service.internalPort }}",
487 "visualRange":"0",
488 "lb_policy":"ip_hash"
489 },
490 {
491 "serviceName": "so",
492 "version": "v1",
493 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
494 "protocol": "REST",
495 "port": "{{ .Values.service.internalPort }}",
496 "visualRange":"0",
497 "lb_policy":"ip_hash"
498 },
499 {
500 "serviceName": "so",
501 "version": "v1",
502 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
503 "protocol": "REST",
504 "port": "{{ .Values.service.internalPort }}",
505 "visualRange":"0",
506 "lb_policy":"ip_hash"
507 },
508 {
509 "serviceName": "so",
510 "version": "v1",
511 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
512 "protocol": "REST",
513 "port": "{{ .Values.service.internalPort }}",
514 "visualRange":"0",
515 "lb_policy":"ip_hash"
516 },
517 {
518 "serviceName": "so",
519 "version": "v1",
520 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
521 "protocol": "REST",
522 "port": "{{ .Values.service.internalPort }}",
523 "visualRange":"0",
524 "lb_policy":"ip_hash"
525 },
526 {
527 "serviceName": "so",
528 "version": "v1",
529 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
530 "protocol": "REST",
531 "port": "{{ .Values.service.internalPort }}",
532 "visualRange":"0",
533 "lb_policy":"ip_hash"
534 }
535 ]{{ end }}
536
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000537updateStrategy:
seshukm0df1f8e2020-08-17 21:45:49 +0530538 type: RollingUpdate
539 maxUnavailable: 1
540 maxSurge: 1
541
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100542################################################################
seshukm0df1f8e2020-08-17 21:45:49 +0530543# soHelpers part
544#################################################################
545soHelpers:
seshukm0df1f8e2020-08-17 21:45:49 +0530546 containerPort: *containerPort
547
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400548# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000549flavor: small
550# Segregation for Different environment (Small and Large)
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000551resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000552 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000553 limits:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000554 cpu: 2000m
vaibhav16dec0da88292018-08-13 06:10:27 +0000555 memory: 4Gi
556 requests:
557 cpu: 500m
558 memory: 1Gi
559 large:
560 limits:
561 cpu: 4000m
562 memory: 8Gi
563 requests:
564 cpu: 1000m
565 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000566 unlimited: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000567
Mike Elliottd32d36e2018-02-12 15:54:03 -0500568nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500569affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000570
sunilb0a97ab22020-02-25 10:18:48 +0530571# application configuration
572config:
573 logstashServiceName: log-ls
574 logstashPort: 5044
Marcin Wilkad9b3762021-10-13 18:20:43 +0200575 # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
576 openStackKeystoneVersion: "KEYSTONE"
sunilb0a97ab22020-02-25 10:18:48 +0530577
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000578#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
579#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
580# --set so.global.mariadbGalera.localCluster=true \
581# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
582# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
583mariadb-galera:
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100584 rootUser:
585 externalSecret: *dbRootPassSecretName
586 nameOverride: &so-mariadb so-mariadb-galera
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000587 replicaCount: 1
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000588 persistence:
589 mountSubPath: so/mariadb-galera/data
590 enabled: true
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100591 serviceAccount:
592 nameOverride: *so-mariadb
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200593
594ingress:
595 enabled: false
596 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200597 - baseaddr: 'so-api'
rope2524d3f3682020-09-02 20:49:21 +0100598 name: 'so'
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200599 port: 8080
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000600
601mso:
602 adapters:
603 requestDb:
604 auth: Basic YnBlbDpwYXNzd29yZDEk
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000605 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
sekharhuawei2e799e92020-11-14 17:06:56 +0530606 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000607 sdc:
608 client:
609 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
610 aai:
611 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
Priyadharshini7dc03852020-08-27 04:36:03 -0700612 oof:
613 login: test
614 password: testpwd
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000615 so:
616 operationalEnv:
617 dmaap:
618 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
619 health:
620 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100621
seshukm0df1f8e2020-08-17 21:45:49 +0530622so-bpmn-infra:
623 db:
624 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000625 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100626
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000627so-catalog-db-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530628 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100629 db:
630 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100631
sekharhuawei2e799e92020-11-14 17:06:56 +0530632so-cnf-adapter:
633 enabled: true
634 db:
635 <<: *dbSecrets
636 server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530637 aaiCredsExternalSecret: *aai-secrets
638 actuatorCredsExternalSecret: *actuator-secrets
639 mso:
640 msoKeySecret: *mso-key
641
AndrewLamb8e090442020-10-15 09:28:09 +0100642so-etsi-nfvo-ns-lcm:
643 enabled: true
rope2524d3f3682020-09-02 20:49:21 +0100644 db:
645 <<: *dbSecrets
AndrewLamb8e090442020-10-15 09:28:09 +0100646
sekharhuawei2e799e92020-11-14 17:06:56 +0530647so-mariadb:
648 db:
649 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
650 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
651 backupCredsExternalSecret: *dbBackupCredsSecretName
652 userCredsExternalSecret: *dbUserCredsSecretName
653 adminCredsExternalSecret: *dbAdminCredsSecretName
654
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100655so-admin-cockpit:
seshukm0df1f8e2020-08-17 21:45:49 +0530656 enabled: true
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100657 db:
658 <<: *dbSecrets
659
sekharhuawei2e799e92020-11-14 17:06:56 +0530660so-nssmf-adapter:
661 enabled: true
662 server:
663 actuatorCredsExternalSecret: *actuator-secrets
664 bpelCredsExternalSecret: *bpel-secrets
665 db:
666 <<: *dbSecrets
667
668so-oof-adapter:
669 enabled: true
670 db:
671 <<: *dbSecrets
672 mso:
673 msoKeySecret: *mso-key
674 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
675 oof:
676 authSecret: *mso-oof-auth
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000677 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
sekharhuawei2e799e92020-11-14 17:06:56 +0530678
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000679so-openstack-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530680 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100681 db:
682 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000683 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100684
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000685so-request-db-adapter:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100686 db:
687 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100688
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000689so-sdc-controller:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100690 db:
691 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000692 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
efiacor8d3ff802022-11-23 12:13:26 +0000693 config:
694 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.soSdcListenerKafkaUser }}'
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100695
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000696so-sdnc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530697 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100698 db:
699 <<: *dbSecrets
seshukm610d97d2021-03-19 02:57:36 +0530700 mso:
701 msoKeySecret: *mso-key
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000702 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100703
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100704so-ve-vnfm-adapter:
Sylvain Desbureaux28d56562020-11-02 17:54:05 +0100705 enabled: false
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100706
seshukm87ccd872021-03-30 21:45:16 +0530707so-etsi-sol005-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530708 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100709 db:
710 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100711
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100712so-etsi-sol003-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530713 enabled: true
farida azmy87f46222021-04-06 15:25:15 +0200714
715#Pods Service Account
716serviceAccount:
717 nameOverride: so
718 roles:
719 - read
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000720
721#Log configuration
722log:
723 path: /var/log/onap