blob: b714775157bb50ef6f41000ba0e20c6a684b5913 [file] [log] [blame]
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +01001{{/*
egernug27578332020-03-26 10:27:55 +00002# Copyright © 2020 Samsung Electronics
jmac065e2ce2018-03-29 01:18:02 +00003# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01004# Copyright © 2021 Nokia
jmac065e2ce2018-03-29 01:18:02 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010017*/}}
jmac065e2ce2018-03-29 01:18:02 +000018
Grzegorz-Lis1318a772020-07-23 15:08:43 +020019apiVersion: apps/v1
jmac065e2ce2018-03-29 01:18:02 +000020kind: StatefulSet
Alexander Dehn9b797d62020-04-21 09:53:50 +000021metadata: {{- include "common.resourceMetadata" . | nindent 2 }}
jmac065e2ce2018-03-29 01:18:02 +000022spec:
Alexander Dehn9b797d62020-04-21 09:53:50 +000023 selector: {{- include "common.selectors" . | nindent 4 }}
Andreas Geissler2af50792023-03-27 17:11:27 +020024 serviceName: {{ include "common.servicename" . }}-cluster
jmac065e2ce2018-03-29 01:18:02 +000025 podManagementPolicy: Parallel
Andreas Geissler2af50792023-03-27 17:11:27 +020026 replicas: {{ .Values.replicaCount }}
jmac065e2ce2018-03-29 01:18:02 +000027 template:
Alexander Dehn9b797d62020-04-21 09:53:50 +000028 metadata: {{- include "common.templateMetadata" . | nindent 6 }}
jmac065e2ce2018-03-29 01:18:02 +000029 spec:
30 initContainers:
31 - command:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010032 - sh
33 args:
34 - -c
35 - "cd /config-input && for PFILE in `ls -1 .`; do envsubst <${PFILE} >/config/${PFILE}; done"
36 env:
37 - name: AAI_CLIENT_NAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010038 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010039 - name: AAI_CLIENT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010040 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050041 - name: AAI_TRUSTSTORE_PASSWORD
42 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 10 }}
43 - name: ANSIBLE_TRUSTSTORE_PASSWORD
44 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 10 }}
45 - name: SO_USER
46 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 10 }}
47 - name: SO_PASSWORD
48 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 10 }}
49 - name: NENG_USER
50 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 10 }}
51 - name: NENG_PASSWORD
52 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 10 }}
53 - name: CDS_USER
54 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 10 }}
55 - name: CDS_PASSWORD
56 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 10 }}
57 - name: HONEYCOMB_USER
58 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 10 }}
59 - name: HONEYCOMB_PASSWORD
60 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 10 }}
61 - name: TRUSTSTORE_PASSWORD
62 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 10 }}
63 - name: KEYSTORE_PASSWORD
64 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 10 }}
65 - name: DMAAP_USER
66 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 10 }}
67 - name: DMAAP_PASSWORD
68 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 10 }}
69 - name: DMAAP_AUTHKEY
70 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010071 - name: MODELSERVICE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010072 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010073 - name: MODELSERVICE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010074 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010075 - name: RESTCONF_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010076 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010077 - name: RESTCONF_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010078 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010079 - name: ANSIBLE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010080 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010081 - name: ANSIBLE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010082 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010083 - name: SCALEOUT_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010084 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010085 - name: SCALEOUT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010086 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010087 - name: NETBOX_APIKEY
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010088 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "netbox-apikey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010089 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010090 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010091 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010092 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050093 - name: MYSQL_USER
94 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
95 - name: MYSQL_PASSWORD
96 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +000097 - name: ODL_ADMIN_USERNAME
98 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050099 - name: ODL_USER
100 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +0000101 - name: ODL_ADMIN_PASSWORD
102 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500103 - name: ODL_PASSWORD
104 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
demskeq8b43e92c2021-02-12 15:43:48 +0100105 {{ if .Values.config.sdnr.oauth.enabled }}
106 - name: OAUTH_TOKEN_SECRET
107 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "oauth-token-secret" "key" "password") | indent 10 }}
108 - name: KEYCLOAK_SECRET
109 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keycloak-secret" "key" "password") | indent 10 }}
demskeq8b43e92c2021-02-12 15:43:48 +0100110 - name: ENABLE_ODLUX_RBAC
111 value: "{{ .Values.config.sdnr.oauth.odluxRbac.enabled | default "true" }}"
112 {{ end }}
demskeq83166b222023-04-26 10:27:00 +0200113 - name: SDNR_KAFKA_ENABLED
114 value: "{{ .Values.config.sdnr.kafka.enabled | default "false" }}"
115 {{ if .Values.config.sdnr.kafka.enabled }}
116 - name: SDNR_KAFKA_BOOTSTRAP_SERVERS
117 value: "{{ .Values.config.sdnr.kafka.bootstrapServers | default (include "common.release" .) }}-strimzi-kafka-bootstrap.{{.Release.Namespace}}:9092"
118 - name: SDNR_KAFKA_SECURITY_PROTOCOL
119 value: "{{ .Values.config.sdnr.kafka.securityProtocol | default "SASL_PLAINTEXT" }}"
120 - name: SDNR_KAFKA_SASL_MECHANISM
121 value: "{{ .Values.config.sdnr.kafka.saslMechanism | default "SCRAM-SHA-512" }}"
122 - name: SDNR_KAFKA_SASL_JASS_CONFIG
123 valueFrom:
124 secretKeyRef:
125 name: {{ include "common.name" . }}-ku
126 key: sasl.jaas.config
127 {{ end }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100128 volumeMounts:
129 - mountPath: /config-input
130 name: config-input
131 - mountPath: /config
132 name: properties
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100133 image: {{ include "repositoryGenerator.image.envsubst" . }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100134 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
135 name: {{ include "common.name" . }}-update-config
demskeq8aa803d02021-11-03 11:56:45 +0100136 {{ if or .Values.dgbuilder.enabled .Values.config.sdnr.enabled -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100137 - command:
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +0200138 - /app/ready.py
jmac065e2ce2018-03-29 01:18:02 +0000139 args:
demskeq8aa803d02021-11-03 11:56:45 +0100140 {{ if .Values.dgbuilder.enabled -}}
jmac065e2ce2018-03-29 01:18:02 +0000141 - --container-name
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100142 - {{ include "common.mariadbService" . }}
Dan Timoney17554772021-04-01 15:49:23 -0400143 - --job-name
144 - {{ include "common.fullname" . }}-dbinit-job
Alexander Dehn9b797d62020-04-21 09:53:50 +0000145 {{ end -}}
146 {{ if .Values.config.sdnr.enabled -}}
demskeq8ad745682021-11-03 10:50:38 +0100147 - --job-name
148 - {{ include "common.fullname" . }}-sdnrdb-init-job
Alexander Dehn9b797d62020-04-21 09:53:50 +0000149 {{ end -}}
jmac065e2ce2018-03-29 01:18:02 +0000150 env:
151 - name: NAMESPACE
152 valueFrom:
153 fieldRef:
154 apiVersion: v1
155 fieldPath: metadata.namespace
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100156 image: {{ include "repositoryGenerator.image.readiness" . }}
jmac065e2ce2018-03-29 01:18:02 +0000157 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100158 name: {{ include "common.name" . }}-readiness
Andreas Geissler2af50792023-03-27 17:11:27 +0200159 {{ end }}
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100160 - name: {{ include "common.name" . }}-chown
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100161 image: {{ include "repositoryGenerator.image.busybox" . }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000162 command:
163 - sh
164 args:
165 - -c
Dan Timoney2ee28a52021-01-15 16:39:50 -0500166 - |
Dan Timoney2ee28a52021-01-15 16:39:50 -0500167 mkdir {{ .Values.persistence.mdsalPath }}/journal
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100168 mkdir {{ .Values.persistence.mdsalPath }}/snapshots
demskeq83b3b7fd2021-02-18 09:41:59 +0100169 mkdir {{ .Values.persistence.mdsalPath }}/daexim
Dan Timoney2ee28a52021-01-15 16:39:50 -0500170 chown -R {{ .Values.config.odlUid }}:{{ .Values.config.odlGid}} {{ .Values.persistence.mdsalPath }}
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400171 volumeMounts:
172 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100173 name: {{ include "common.fullname" . }}-data
jmac065e2ce2018-03-29 01:18:02 +0000174 containers:
175 - name: {{ include "common.name" . }}
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100176 image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }}
jmac065e2ce2018-03-29 01:18:02 +0000177 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200178 {{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100179 {{- $linkCommand := include "common.certManager.linkVolumeMounts" . }}
180 lifecycle:
181 postStart:
182 exec:
183 command: ["sh", "-c", {{$linkCommand | quote}} ]
184 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000185 command: ["/bin/bash"]
Dan Timoney2ee28a52021-01-15 16:39:50 -0500186 args: ["-c", "/opt/onap/sdnc/bin/createLinks.sh ; /opt/onap/sdnc/bin/startODL.sh"]
jmac065e2ce2018-03-29 01:18:02 +0000187 ports:
188 - containerPort: {{ .Values.service.internalPort }}
189 - containerPort: {{ .Values.service.internalPort2 }}
190 - containerPort: {{ .Values.service.internalPort3 }}
191 - containerPort: {{ .Values.service.clusterPort }}
demskeq827854662021-04-08 14:49:47 +0200192 {{- if .Values.config.sdnr.netconfCallHome.enabled }}
193 - containerPort: {{ .Values.service.callHomePort }}
194 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000195 readinessProbe:
196 tcpSocket:
197 port: {{ .Values.service.internalPort }}
198 initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }}
199 periodSeconds: {{ .Values.readiness.periodSeconds }}
200 env:
demskeq8aa803d02021-11-03 11:56:45 +0100201 {{ if and .Values.config.sdnr.enabled .Values.config.sdnr.sdnronly -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100202 - name: MYSQL_ROOT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100203 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-root-password" "key" "password") | indent 12 }}
demskeq8aa803d02021-11-03 11:56:45 +0100204 {{ end -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100205 - name: ODL_ADMIN_USERNAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100206 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500207 - name: ODL_USER
208 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100209 - name: ODL_ADMIN_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100210 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500211 - name: ODL_PASSWORD
212 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100213 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100214 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100215 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100216 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500217 - name: MYSQL_USER
218 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
219 - name: MYSQL_PASSWORD
220 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
221 - name: MYSQL_DATABASE
222 value: "{{ .Values.config.dbSdnctlDatabase }}"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100223 - name: SDNC_CONFIG_DIR
224 value: "{{ .Values.config.configDir }}"
Dan Timoney9e310e72021-02-23 11:25:39 -0500225 - name: AAI_CLIENT_NAME
226 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 12 }}
227 - name: AAI_CLIENT_PASSWORD
228 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 12 }}
229 - name: AAI_TRUSTSTORE_PASSWORD
230 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 12 }}
231 - name: ANSIBLE_TRUSTSTORE_PASSWORD
232 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 12 }}
233 - name: SO_USER
234 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 12 }}
235 - name: SO_PASSWORD
236 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 12 }}
237 - name: NENG_USER
238 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 12 }}
239 - name: NENG_PASSWORD
240 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 12 }}
241 - name: CDS_USER
242 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 12 }}
243 - name: CDS_PASSWORD
244 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 12 }}
245 - name: HONEYCOMB_USER
246 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 12 }}
247 - name: HONEYCOMB_PASSWORD
248 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 12 }}
249 - name: TRUSTSTORE_PASSWORD
250 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 12 }}
251 - name: KEYSTORE_PASSWORD
252 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 12 }}
253 - name: DMAAP_USER
254 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 12 }}
255 - name: DMAAP_PASSWORD
256 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 12 }}
257 - name: DMAAP_AUTHKEY
258 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100259 - name: ENABLE_ODL_CLUSTER
260 value: "{{ .Values.config.enableClustering }}"
261 - name: MY_ODL_CLUSTER
262 value: "{{ .Values.config.myODLCluster }}"
263 - name: PEER_ODL_CLUSTER
264 value: "{{ .Values.config.peerODLCluster }}"
265 - name: IS_PRIMARY_CLUSTER
266 value: "{{ .Values.config.isPrimaryCluster }}"
267 - name: GEO_ENABLED
268 value: "{{ .Values.config.geoEnabled}}"
269 - name: SDNC_AAF_ENABLED
Andreas Geissler2af50792023-03-27 17:11:27 +0200270 value: "false"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100271 - name: SDNC_REPLICAS
272 value: "{{ .Values.replicaCount }}"
273 - name: MYSQL_HOST
274 value: {{ include "common.mariadbService" . }}
Dan Timoney2ee28a52021-01-15 16:39:50 -0500275 - name: MDSAL_PATH
276 value: {{ .Values.persistence.mdsalPath }}
277 - name: DAEXIM_PATH
278 value: {{ .Values.persistence.daeximPath }}
279 - name: JOURNAL_PATH
280 value: {{ .Values.persistence.journalPath }}
281 - name: SNAPSHOTS_PATH
282 value: {{ .Values.persistence.snapshotsPath }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100283 - name: JAVA_HOME
284 value: "{{ .Values.config.javaHome}}"
Dan Timoneya98765b2020-09-14 11:57:55 -0400285 - name: JAVA_OPTS
286 value: "-Xms{{.Values.config.odl.javaOptions.minMemory}} -Xmx{{.Values.config.odl.javaOptions.maxMemory}}"
Dan Timoney1426fed2021-12-14 08:30:10 -0500287 - name: LOG4J_FORMAT_MSG_NO_LOOKUPS
288 value: "true"
Sylvain Desbureauxbcf72512020-07-22 10:45:18 +0200289 - name: KARAF_CONSOLE_LOG_LEVEL
290 value: "{{ include "common.log.level" . }}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000291 - name: SDNRWT
292 value: "{{ .Values.config.sdnr.enabled | default "false"}}"
293 {{- if eq .Values.config.sdnr.mode "web" }}
294 - name: SDNRDM
295 value: "true"
296 {{- end }}
297 - name: SDNRONLY
298 value: "{{ .Values.config.sdnr.sdnronly | default "false" }}"
299 - name: SDNRDBURL
Andreas Geissler2af50792023-03-27 17:11:27 +0200300 value: "http://{{ .Values.elasticsearch.service.name | default "sdnrdb"}}.{{.Release.Namespace}}:{{.Values.elasticsearch.service.port | default "9200"}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000301 {{- if .Values.config.sdnr.sdnrdbTrustAllCerts }}
302 - name: SDNRDBTRUSTALLCERTS
303 value: "true"
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100304 {{- end }}
305 {{- if .Values.global.cmpv2Enabled }}
306 - name: ODL_CERT_DIR
307 value: {{ (mustFirst (.Values.certificates)).mountPath }}
308 {{- end }}
demskeq8b43e92c2021-02-12 15:43:48 +0100309 - name: ENABLE_OAUTH
310 value: "{{ .Values.config.sdnr.oauth.enabled | default "false" }}"
demskeq827854662021-04-08 14:49:47 +0200311 - name: SDNR_NETCONF_CALLHOME_ENABLED
312 value: "{{ .Values.config.sdnr.netconfCallHome.enabled | default "false" }}"
sebdetb205f402021-10-20 12:16:02 +0200313 - name: SDNR_VES_COLLECTOR_ENABLED
314 value: "{{ .Values.config.sdnr.vesCollector.enabled }}"
315 - name: SDNR_VES_COLLECTOR_TLS_ENABLED
316 value: "{{ .Values.config.sdnr.vesCollector.tls.enabled }}"
317 - name: SDNR_VES_COLLECTOR_TRUST_ALL_CERTS
318 value: "{{ .Values.config.sdnr.vesCollector.trustAllCertificates }}"
319 - name: SDNR_VES_COLLECTOR_IP
320 value: "{{ .Values.config.sdnr.vesCollector.address }}"
321 - name: SDNR_VES_COLLECTOR_PORT
322 value: "{{ .Values.config.sdnr.vesCollector.port }}"
323 - name: SDNR_VES_COLLECTOR_VERSION
324 value: "{{ .Values.config.sdnr.vesCollector.version | default "v7" }}"
325 - name: SDNR_VES_COLLECTOR_REPORTING_ENTITY_NAME
326 value: "{{ .Values.config.sdnr.vesCollector.reportingEntityName | default "ONAP SDN-R" }}"
327 - name: SDNR_VES_COLLECTOR_EVENTLOG_MSG_DETAIL
328 value: "{{ .Values.config.sdnr.vesCollector.eventLogMsgDetail | default "SHORT" }}"
329 - name: SDNR_VES_COLLECTOR_USERNAME
330 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "login") | indent 12 }}
331 - name: SDNR_VES_COLLECTOR_PASSWORD
332 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "password") | indent 12 }}
demskeq895bf73a2023-05-09 12:31:07 +0000333 - name: SDNR_WEBSOCKET_PORT
334 value: "{{ .Values.sdnrWebsocketPort | default "8182"}}"
demskeq83166b222023-04-26 10:27:00 +0200335 - name: SDNR_KAFKA_ENABLED
336 value: "{{ .Values.config.sdnr.kafka.enabled | default "false" }}"
337 {{ if .Values.config.sdnr.kafka.enabled }}
338 - name: SDNR_KAFKA_BOOTSTRAP_SERVERS
339 value: "{{ .Values.config.sdnr.kafka.bootstrapServers | default (include "common.release" .) }}-strimzi-kafka-bootstrap.{{.Release.Namespace}}:9092"
340 - name: SDNR_KAFKA_SECURITY_PROTOCOL
341 value: "{{ .Values.config.sdnr.kafka.securityProtocol | default "PLAINTEXT" }}"
342 - name: SDNR_KAFKA_SASL_MECHANISM
343 value: "{{ .Values.config.sdnr.kafka.saslMechanism | default "PLAIN" }}"
344 - name: SDNR_KAFKA_SASL_JASS_CONFIG
345 value: "{{ .Values.config.sdnr.kafka.saslJassConfig | default "PLAIN" }}"
346 {{ end }}
347
sebdetb205f402021-10-20 12:16:02 +0200348
jmac065e2ce2018-03-29 01:18:02 +0000349 volumeMounts:
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200350{{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100351{{ include "common.certManager.volumeMounts" . | indent 10 }}
352{{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000353 - mountPath: /etc/localtime
354 name: localtime
355 readOnly: true
356 - mountPath: /opt/opendaylight/current/etc/org.ops4j.pax.logging.cfg
357 name: sdnc-logging-cfg-config
358 subPath: org.ops4j.pax.logging.cfg
jmaca68f4cb2018-05-10 22:44:19 +0000359 - mountPath: {{ .Values.config.binDir }}/installSdncDb.sh
360 name: bin
jmac065e2ce2018-03-29 01:18:02 +0000361 subPath: installSdncDb.sh
Dan Timoney2ee28a52021-01-15 16:39:50 -0500362 - mountPath: {{ .Values.config.binDir }}/createLinks.sh
363 name: bin
364 subPath: createLinks.sh
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200365 - mountPath: {{ .Values.config.ccsdkConfigDir }}/aaiclient.properties
366 name: properties
367 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000368 - mountPath: {{ .Values.config.configDir }}/aaiclient.properties
369 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000370 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000371 - mountPath: {{ .Values.config.configDir }}/dblib.properties
372 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000373 subPath: dblib.properties
jmac7c434672018-05-11 20:14:17 +0000374 - mountPath: {{ .Values.config.configDir }}/lcm-dg.properties
375 name: properties
376 subPath: lcm-dg.properties
jmaca68f4cb2018-05-10 22:44:19 +0000377 - mountPath: {{ .Values.config.configDir }}/svclogic.properties
378 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000379 subPath: svclogic.properties
380 - mountPath: /opt/onap/sdnc/svclogic/config/svclogic.properties
jmaca68f4cb2018-05-10 22:44:19 +0000381 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000382 subPath: svclogic.properties
Alexis de Talhouët43c67e02018-09-20 16:49:16 -0400383 - mountPath: {{ .Values.config.configDir }}/netbox.properties
384 name: properties
385 subPath: netbox.properties
386 - mountPath: {{ .Values.config.configDir }}/blueprints-processor-adaptor.properties
387 name: properties
388 subPath: blueprints-processor-adaptor.properties
jmac8d6dc962018-04-26 14:26:55 +0000389 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100390 name: {{ include "common.fullname" . }}-data
Maciej Wereski537d71e2021-11-03 13:31:44 +0000391 - mountPath: {{ .Values.log.path }}
jmac065e2ce2018-03-29 01:18:02 +0000392 name: logs
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400393 - mountPath: {{ .Values.config.odl.salConfigDir }}/{{ .Values.config.odl.salConfigVersion}}/sal-clustering-config-{{ .Values.config.odl.salConfigVersion}}-akkaconf.xml
394 name: properties
395 subPath: akka.conf
396 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.controller.cluster.datastore.cfg
397 name: properties
398 subPath: org.opendaylight.controller.cluster.datastore.cfg
Dan Timoney9520e7c2021-01-12 11:10:58 -0500399 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.aaa.filterchain.cfg
400 name: properties
401 subPath: org.opendaylight.aaa.filterchain.cfg
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400402 - mountPath: {{ .Values.config.odl.binDir }}/setenv
403 name: properties
404 subPath: setenv
Alexander Dehn9b797d62020-04-21 09:53:50 +0000405 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-registrar.properties
406 name: properties
407 subPath: mountpoint-registrar.properties
408 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-state-provider.properties
409 name: properties
410 subPath: mountpoint-state-provider.properties
demskeq8a86300a2021-02-10 09:53:33 +0100411 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.daexim.cfg
412 name: properties
413 subPath: org.opendaylight.daexim.cfg
demskeq8b43e92c2021-02-12 15:43:48 +0100414 {{- if .Values.config.sdnr.oauth.enabled }}
415 - mountPath: {{ .Values.config.odl.etcDir }}/oauth-provider.config.json
416 name: properties
417 subPath: oauth-provider.config.json
418 {{ end }}
Satoshi Fujii54bfd172021-07-04 16:39:41 +0000419 resources: {{ include "common.resources" . | nindent 12 }}
jmac065e2ce2018-03-29 01:18:02 +0000420 # side car containers
Maciej Wereski537d71e2021-11-03 13:31:44 +0000421 {{ include "common.log.sidecar" . | nindent 8 }}
Satoshi Fujii54bfd172021-07-04 16:39:41 +0000422 {{- if .Values.nodeSelector }}
423 nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
424 {{- end }}
425 {{- if .Values.affinity }}
426 affinity: {{ toYaml .Values.affinity | nindent 8 }}
427 {{- end }}
jmac8d6dc962018-04-26 14:26:55 +0000428 imagePullSecrets:
429 - name: "{{ include "common.namespace" . }}-docker-registry-key"
farida azmy32c5ed82021-08-04 14:46:09 +0200430 serviceAccountName: {{ include "common.fullname" (dict "suffix" "read" "dot" . )}}
jmac065e2ce2018-03-29 01:18:02 +0000431 volumes:
432 - name: localtime
433 hostPath:
434 path: /etc/localtime
435 - name: logs
436 emptyDir: {}
Maciej Wereski537d71e2021-11-03 13:31:44 +0000437 {{ include "common.log.volumes" . | nindent 8 }}
jmac065e2ce2018-03-29 01:18:02 +0000438 - name: sdnc-logging-cfg-config
439 configMap:
440 name: {{ include "common.fullname" . }}-log-configmap
jmaca68f4cb2018-05-10 22:44:19 +0000441 - name: bin
jmac065e2ce2018-03-29 01:18:02 +0000442 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000443 name: {{ include "common.fullname" . }}-bin
444 defaultMode: 0755
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100445 - name: config-input
jmac065e2ce2018-03-29 01:18:02 +0000446 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000447 name: {{ include "common.fullname" . }}-properties
448 defaultMode: 0644
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100449 - name: properties
450 emptyDir:
451 medium: Memory
jmac8d6dc962018-04-26 14:26:55 +0000452 {{ if not .Values.persistence.enabled }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100453 - name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000454 emptyDir: {}
455 {{ else }}
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200456{{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100457{{ include "common.certManager.volumes" . | nindent 8 }}
458{{- end }}
jmac8d6dc962018-04-26 14:26:55 +0000459 volumeClaimTemplates:
460 - metadata:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100461 name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000462 labels:
463 name: {{ include "common.fullname" . }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100464 chart: "{{ .Chart.Name }}-{{ .Chart.Version }}"
Krzysztof Opasiak137d7cc2020-01-24 23:49:11 +0100465 release: "{{ include "common.release" . }}"
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100466 heritage: "{{ .Release.Service }}"
jmac8d6dc962018-04-26 14:26:55 +0000467 spec:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100468 accessModes:
469 - {{ .Values.persistence.accessMode }}
470 storageClassName: {{ include "common.storageClass" . }}
jmac8d6dc962018-04-26 14:26:55 +0000471 resources:
472 requests:
473 storage: {{ .Values.persistence.size }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100474 {{- end }}