blob: 86a011b59f2c07726dd97a9e17e32278c134af80 [file] [log] [blame]
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +01001{{/*
egernug27578332020-03-26 10:27:55 +00002# Copyright © 2020 Samsung Electronics
jmac065e2ce2018-03-29 01:18:02 +00003# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01004# Copyright © 2021 Nokia
jmac065e2ce2018-03-29 01:18:02 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010017*/}}
jmac065e2ce2018-03-29 01:18:02 +000018
Grzegorz-Lis1318a772020-07-23 15:08:43 +020019apiVersion: apps/v1
jmac065e2ce2018-03-29 01:18:02 +000020kind: StatefulSet
Alexander Dehn9b797d62020-04-21 09:53:50 +000021metadata: {{- include "common.resourceMetadata" . | nindent 2 }}
jmac065e2ce2018-03-29 01:18:02 +000022spec:
Alexander Dehn9b797d62020-04-21 09:53:50 +000023 selector: {{- include "common.selectors" . | nindent 4 }}
Andreas Geissler2af50792023-03-27 17:11:27 +020024 serviceName: {{ include "common.servicename" . }}-cluster
jmac065e2ce2018-03-29 01:18:02 +000025 podManagementPolicy: Parallel
Andreas Geissler2af50792023-03-27 17:11:27 +020026 replicas: {{ .Values.replicaCount }}
jmac065e2ce2018-03-29 01:18:02 +000027 template:
Alexander Dehn9b797d62020-04-21 09:53:50 +000028 metadata: {{- include "common.templateMetadata" . | nindent 6 }}
jmac065e2ce2018-03-29 01:18:02 +000029 spec:
30 initContainers:
31 - command:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010032 - sh
33 args:
34 - -c
35 - "cd /config-input && for PFILE in `ls -1 .`; do envsubst <${PFILE} >/config/${PFILE}; done"
36 env:
37 - name: AAI_CLIENT_NAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010038 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010039 - name: AAI_CLIENT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010040 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050041 - name: AAI_TRUSTSTORE_PASSWORD
42 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 10 }}
43 - name: ANSIBLE_TRUSTSTORE_PASSWORD
44 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 10 }}
45 - name: SO_USER
46 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 10 }}
47 - name: SO_PASSWORD
48 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 10 }}
49 - name: NENG_USER
50 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 10 }}
51 - name: NENG_PASSWORD
52 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 10 }}
53 - name: CDS_USER
54 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 10 }}
55 - name: CDS_PASSWORD
56 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 10 }}
57 - name: HONEYCOMB_USER
58 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 10 }}
59 - name: HONEYCOMB_PASSWORD
60 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 10 }}
61 - name: TRUSTSTORE_PASSWORD
62 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 10 }}
63 - name: KEYSTORE_PASSWORD
64 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 10 }}
65 - name: DMAAP_USER
66 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 10 }}
67 - name: DMAAP_PASSWORD
68 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 10 }}
69 - name: DMAAP_AUTHKEY
70 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010071 - name: MODELSERVICE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010072 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010073 - name: MODELSERVICE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010074 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010075 - name: RESTCONF_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010076 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010077 - name: RESTCONF_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010078 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010079 - name: ANSIBLE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010080 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010081 - name: ANSIBLE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010082 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010083 - name: SCALEOUT_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010084 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010085 - name: SCALEOUT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010086 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010087 - name: NETBOX_APIKEY
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010088 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "netbox-apikey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010089 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010090 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010091 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010092 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050093 - name: MYSQL_USER
94 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
95 - name: MYSQL_PASSWORD
96 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +000097 - name: ODL_ADMIN_USERNAME
98 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050099 - name: ODL_USER
100 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +0000101 - name: ODL_ADMIN_PASSWORD
102 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500103 - name: ODL_PASSWORD
104 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
demskeq8b43e92c2021-02-12 15:43:48 +0100105 {{ if .Values.config.sdnr.oauth.enabled }}
106 - name: OAUTH_TOKEN_SECRET
107 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "oauth-token-secret" "key" "password") | indent 10 }}
108 - name: KEYCLOAK_SECRET
109 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keycloak-secret" "key" "password") | indent 10 }}
demskeq8b43e92c2021-02-12 15:43:48 +0100110 - name: ENABLE_ODLUX_RBAC
111 value: "{{ .Values.config.sdnr.oauth.odluxRbac.enabled | default "true" }}"
112 {{ end }}
demskeq83166b222023-04-26 10:27:00 +0200113 - name: SDNR_KAFKA_ENABLED
114 value: "{{ .Values.config.sdnr.kafka.enabled | default "false" }}"
115 {{ if .Values.config.sdnr.kafka.enabled }}
116 - name: SDNR_KAFKA_BOOTSTRAP_SERVERS
117 value: "{{ .Values.config.sdnr.kafka.bootstrapServers | default (include "common.release" .) }}-strimzi-kafka-bootstrap.{{.Release.Namespace}}:9092"
118 - name: SDNR_KAFKA_SECURITY_PROTOCOL
119 value: "{{ .Values.config.sdnr.kafka.securityProtocol | default "SASL_PLAINTEXT" }}"
120 - name: SDNR_KAFKA_SASL_MECHANISM
121 value: "{{ .Values.config.sdnr.kafka.saslMechanism | default "SCRAM-SHA-512" }}"
122 - name: SDNR_KAFKA_SASL_JASS_CONFIG
123 valueFrom:
124 secretKeyRef:
125 name: {{ include "common.name" . }}-ku
126 key: sasl.jaas.config
127 {{ end }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100128 volumeMounts:
129 - mountPath: /config-input
130 name: config-input
131 - mountPath: /config
132 name: properties
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100133 image: {{ include "repositoryGenerator.image.envsubst" . }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100134 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
135 name: {{ include "common.name" . }}-update-config
demskeq8aa803d02021-11-03 11:56:45 +0100136 {{ if or .Values.dgbuilder.enabled .Values.config.sdnr.enabled -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100137 - command:
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +0200138 - /app/ready.py
jmac065e2ce2018-03-29 01:18:02 +0000139 args:
demskeq8aa803d02021-11-03 11:56:45 +0100140 {{ if .Values.dgbuilder.enabled -}}
Andreas Geisslercfd84342023-08-16 17:18:49 +0200141 - --app-name
142 - {{ include "common.mariadbAppName" . }}
Dan Timoney17554772021-04-01 15:49:23 -0400143 - --job-name
144 - {{ include "common.fullname" . }}-dbinit-job
Alexander Dehn9b797d62020-04-21 09:53:50 +0000145 {{ end -}}
146 {{ if .Values.config.sdnr.enabled -}}
demskeq8ad745682021-11-03 10:50:38 +0100147 - --job-name
148 - {{ include "common.fullname" . }}-sdnrdb-init-job
Alexander Dehn9b797d62020-04-21 09:53:50 +0000149 {{ end -}}
jmac065e2ce2018-03-29 01:18:02 +0000150 env:
151 - name: NAMESPACE
152 valueFrom:
153 fieldRef:
154 apiVersion: v1
155 fieldPath: metadata.namespace
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100156 image: {{ include "repositoryGenerator.image.readiness" . }}
jmac065e2ce2018-03-29 01:18:02 +0000157 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100158 name: {{ include "common.name" . }}-readiness
Andreas Geissler47537432024-02-27 08:55:23 +0100159 resources:
160 limits:
161 cpu: "100m"
Andreas Geissler8cbb3d92024-03-12 16:44:56 +0100162 memory: "500Mi"
Andreas Geissler47537432024-02-27 08:55:23 +0100163 requests:
164 cpu: "3m"
Andreas Geissler8cbb3d92024-03-12 16:44:56 +0100165 memory: "20Mi"
Andreas Geissler2af50792023-03-27 17:11:27 +0200166 {{ end }}
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100167 - name: {{ include "common.name" . }}-chown
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100168 image: {{ include "repositoryGenerator.image.busybox" . }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000169 command:
170 - sh
171 args:
172 - -c
Dan Timoney2ee28a52021-01-15 16:39:50 -0500173 - |
Dan Timoney2ee28a52021-01-15 16:39:50 -0500174 mkdir {{ .Values.persistence.mdsalPath }}/journal
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100175 mkdir {{ .Values.persistence.mdsalPath }}/snapshots
demskeq83b3b7fd2021-02-18 09:41:59 +0100176 mkdir {{ .Values.persistence.mdsalPath }}/daexim
Dan Timoney2ee28a52021-01-15 16:39:50 -0500177 chown -R {{ .Values.config.odlUid }}:{{ .Values.config.odlGid}} {{ .Values.persistence.mdsalPath }}
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400178 volumeMounts:
179 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100180 name: {{ include "common.fullname" . }}-data
jmac065e2ce2018-03-29 01:18:02 +0000181 containers:
182 - name: {{ include "common.name" . }}
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100183 image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }}
jmac065e2ce2018-03-29 01:18:02 +0000184 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200185 {{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100186 {{- $linkCommand := include "common.certManager.linkVolumeMounts" . }}
187 lifecycle:
188 postStart:
189 exec:
190 command: ["sh", "-c", {{$linkCommand | quote}} ]
191 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000192 command: ["/bin/bash"]
Dan Timoney2ee28a52021-01-15 16:39:50 -0500193 args: ["-c", "/opt/onap/sdnc/bin/createLinks.sh ; /opt/onap/sdnc/bin/startODL.sh"]
jmac065e2ce2018-03-29 01:18:02 +0000194 ports:
195 - containerPort: {{ .Values.service.internalPort }}
196 - containerPort: {{ .Values.service.internalPort2 }}
197 - containerPort: {{ .Values.service.internalPort3 }}
198 - containerPort: {{ .Values.service.clusterPort }}
demskeq827854662021-04-08 14:49:47 +0200199 {{- if .Values.config.sdnr.netconfCallHome.enabled }}
200 - containerPort: {{ .Values.service.callHomePort }}
201 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000202 readinessProbe:
203 tcpSocket:
204 port: {{ .Values.service.internalPort }}
205 initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }}
206 periodSeconds: {{ .Values.readiness.periodSeconds }}
207 env:
demskeq8aa803d02021-11-03 11:56:45 +0100208 {{ if and .Values.config.sdnr.enabled .Values.config.sdnr.sdnronly -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100209 - name: MYSQL_ROOT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100210 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-root-password" "key" "password") | indent 12 }}
demskeq8aa803d02021-11-03 11:56:45 +0100211 {{ end -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100212 - name: ODL_ADMIN_USERNAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100213 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500214 - name: ODL_USER
215 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100216 - name: ODL_ADMIN_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100217 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500218 - name: ODL_PASSWORD
219 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100220 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100221 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100222 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100223 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500224 - name: MYSQL_USER
225 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
226 - name: MYSQL_PASSWORD
227 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
228 - name: MYSQL_DATABASE
229 value: "{{ .Values.config.dbSdnctlDatabase }}"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100230 - name: SDNC_CONFIG_DIR
231 value: "{{ .Values.config.configDir }}"
Dan Timoney9e310e72021-02-23 11:25:39 -0500232 - name: AAI_CLIENT_NAME
233 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 12 }}
234 - name: AAI_CLIENT_PASSWORD
235 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 12 }}
236 - name: AAI_TRUSTSTORE_PASSWORD
237 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 12 }}
238 - name: ANSIBLE_TRUSTSTORE_PASSWORD
239 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 12 }}
240 - name: SO_USER
241 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 12 }}
242 - name: SO_PASSWORD
243 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 12 }}
244 - name: NENG_USER
245 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 12 }}
246 - name: NENG_PASSWORD
247 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 12 }}
248 - name: CDS_USER
249 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 12 }}
250 - name: CDS_PASSWORD
251 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 12 }}
252 - name: HONEYCOMB_USER
253 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 12 }}
254 - name: HONEYCOMB_PASSWORD
255 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 12 }}
256 - name: TRUSTSTORE_PASSWORD
257 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 12 }}
258 - name: KEYSTORE_PASSWORD
259 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 12 }}
260 - name: DMAAP_USER
261 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 12 }}
262 - name: DMAAP_PASSWORD
263 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 12 }}
264 - name: DMAAP_AUTHKEY
265 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100266 - name: ENABLE_ODL_CLUSTER
267 value: "{{ .Values.config.enableClustering }}"
268 - name: MY_ODL_CLUSTER
269 value: "{{ .Values.config.myODLCluster }}"
270 - name: PEER_ODL_CLUSTER
271 value: "{{ .Values.config.peerODLCluster }}"
272 - name: IS_PRIMARY_CLUSTER
273 value: "{{ .Values.config.isPrimaryCluster }}"
274 - name: GEO_ENABLED
275 value: "{{ .Values.config.geoEnabled}}"
276 - name: SDNC_AAF_ENABLED
Andreas Geissler2af50792023-03-27 17:11:27 +0200277 value: "false"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100278 - name: SDNC_REPLICAS
279 value: "{{ .Values.replicaCount }}"
280 - name: MYSQL_HOST
281 value: {{ include "common.mariadbService" . }}
Dan Timoney2ee28a52021-01-15 16:39:50 -0500282 - name: MDSAL_PATH
283 value: {{ .Values.persistence.mdsalPath }}
284 - name: DAEXIM_PATH
285 value: {{ .Values.persistence.daeximPath }}
286 - name: JOURNAL_PATH
287 value: {{ .Values.persistence.journalPath }}
288 - name: SNAPSHOTS_PATH
289 value: {{ .Values.persistence.snapshotsPath }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100290 - name: JAVA_HOME
291 value: "{{ .Values.config.javaHome}}"
Dan Timoneya98765b2020-09-14 11:57:55 -0400292 - name: JAVA_OPTS
293 value: "-Xms{{.Values.config.odl.javaOptions.minMemory}} -Xmx{{.Values.config.odl.javaOptions.maxMemory}}"
Dan Timoney1426fed2021-12-14 08:30:10 -0500294 - name: LOG4J_FORMAT_MSG_NO_LOOKUPS
295 value: "true"
Sylvain Desbureauxbcf72512020-07-22 10:45:18 +0200296 - name: KARAF_CONSOLE_LOG_LEVEL
297 value: "{{ include "common.log.level" . }}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000298 - name: SDNRWT
299 value: "{{ .Values.config.sdnr.enabled | default "false"}}"
300 {{- if eq .Values.config.sdnr.mode "web" }}
301 - name: SDNRDM
302 value: "true"
303 {{- end }}
304 - name: SDNRONLY
305 value: "{{ .Values.config.sdnr.sdnronly | default "false" }}"
demskeq84e1f84c2023-07-04 08:39:43 +0000306 {{- if .Values.config.sdnr.mariadb.enabled }}
307 - name: SDNRCONTROLLERID
308 value: {{ uuidv4 }}
309 - name: SDNRDBTYPE
310 value: MARIADB
311 - name: SDNRDBURL
312 value: "jdbc:mysql://{{ include "common.mariadbService" . }}:3306/{{ .Values.config.sdnr.mariadb.databaseName}}"
313 - name: SDNR_DB_DATABASE
314 value: {{ .Values.config.sdnr.mariadb.databaseName }}
315 - name: SDNRDBUSERNAME
316 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "sdnrdb-secret" "key" "login") | indent 12 }}
317 - name: SDNRDBPASSWORD
318 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "sdnrdb-secret" "key" "password") | indent 12 }}
319 - name: SDNR_ASYNC_HANDLING
320 value: {{ .Values.config.sdnr.mariadb.asyncHandling | default "false" | quote }}
321 - name: SDNR_ASYNC_POOLSIZE
322 value: {{ .Values.config.sdnr.mariadb.asyncPoolSize | default 200 | quote }}
Andreas Geisslercfd84342023-08-16 17:18:49 +0200323 {{- else }}
Alexander Dehn9b797d62020-04-21 09:53:50 +0000324 - name: SDNRDBURL
Andreas Geissler2af50792023-03-27 17:11:27 +0200325 value: "http://{{ .Values.elasticsearch.service.name | default "sdnrdb"}}.{{.Release.Namespace}}:{{.Values.elasticsearch.service.port | default "9200"}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000326 {{- if .Values.config.sdnr.sdnrdbTrustAllCerts }}
327 - name: SDNRDBTRUSTALLCERTS
328 value: "true"
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100329 {{- end }}
demskeq84e1f84c2023-07-04 08:39:43 +0000330 {{- end }}
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100331 {{- if .Values.global.cmpv2Enabled }}
332 - name: ODL_CERT_DIR
333 value: {{ (mustFirst (.Values.certificates)).mountPath }}
334 {{- end }}
demskeq8b43e92c2021-02-12 15:43:48 +0100335 - name: ENABLE_OAUTH
336 value: "{{ .Values.config.sdnr.oauth.enabled | default "false" }}"
demskeq827854662021-04-08 14:49:47 +0200337 - name: SDNR_NETCONF_CALLHOME_ENABLED
338 value: "{{ .Values.config.sdnr.netconfCallHome.enabled | default "false" }}"
sebdetb205f402021-10-20 12:16:02 +0200339 - name: SDNR_VES_COLLECTOR_ENABLED
340 value: "{{ .Values.config.sdnr.vesCollector.enabled }}"
341 - name: SDNR_VES_COLLECTOR_TLS_ENABLED
342 value: "{{ .Values.config.sdnr.vesCollector.tls.enabled }}"
343 - name: SDNR_VES_COLLECTOR_TRUST_ALL_CERTS
344 value: "{{ .Values.config.sdnr.vesCollector.trustAllCertificates }}"
345 - name: SDNR_VES_COLLECTOR_IP
346 value: "{{ .Values.config.sdnr.vesCollector.address }}"
347 - name: SDNR_VES_COLLECTOR_PORT
348 value: "{{ .Values.config.sdnr.vesCollector.port }}"
349 - name: SDNR_VES_COLLECTOR_VERSION
350 value: "{{ .Values.config.sdnr.vesCollector.version | default "v7" }}"
351 - name: SDNR_VES_COLLECTOR_REPORTING_ENTITY_NAME
352 value: "{{ .Values.config.sdnr.vesCollector.reportingEntityName | default "ONAP SDN-R" }}"
353 - name: SDNR_VES_COLLECTOR_EVENTLOG_MSG_DETAIL
354 value: "{{ .Values.config.sdnr.vesCollector.eventLogMsgDetail | default "SHORT" }}"
355 - name: SDNR_VES_COLLECTOR_USERNAME
356 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "login") | indent 12 }}
357 - name: SDNR_VES_COLLECTOR_PASSWORD
358 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "password") | indent 12 }}
demskeq895bf73a2023-05-09 12:31:07 +0000359 - name: SDNR_WEBSOCKET_PORT
360 value: "{{ .Values.sdnrWebsocketPort | default "8182"}}"
demskeq83166b222023-04-26 10:27:00 +0200361 - name: SDNR_KAFKA_ENABLED
362 value: "{{ .Values.config.sdnr.kafka.enabled | default "false" }}"
363 {{ if .Values.config.sdnr.kafka.enabled }}
364 - name: SDNR_KAFKA_BOOTSTRAP_SERVERS
365 value: "{{ .Values.config.sdnr.kafka.bootstrapServers | default (include "common.release" .) }}-strimzi-kafka-bootstrap.{{.Release.Namespace}}:9092"
366 - name: SDNR_KAFKA_SECURITY_PROTOCOL
367 value: "{{ .Values.config.sdnr.kafka.securityProtocol | default "PLAINTEXT" }}"
368 - name: SDNR_KAFKA_SASL_MECHANISM
369 value: "{{ .Values.config.sdnr.kafka.saslMechanism | default "PLAIN" }}"
370 - name: SDNR_KAFKA_SASL_JASS_CONFIG
371 value: "{{ .Values.config.sdnr.kafka.saslJassConfig | default "PLAIN" }}"
372 {{ end }}
373
sebdetb205f402021-10-20 12:16:02 +0200374
jmac065e2ce2018-03-29 01:18:02 +0000375 volumeMounts:
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200376{{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100377{{ include "common.certManager.volumeMounts" . | indent 10 }}
378{{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000379 - mountPath: /etc/localtime
380 name: localtime
381 readOnly: true
382 - mountPath: /opt/opendaylight/current/etc/org.ops4j.pax.logging.cfg
383 name: sdnc-logging-cfg-config
384 subPath: org.ops4j.pax.logging.cfg
jmaca68f4cb2018-05-10 22:44:19 +0000385 - mountPath: {{ .Values.config.binDir }}/installSdncDb.sh
386 name: bin
jmac065e2ce2018-03-29 01:18:02 +0000387 subPath: installSdncDb.sh
Dan Timoney2ee28a52021-01-15 16:39:50 -0500388 - mountPath: {{ .Values.config.binDir }}/createLinks.sh
389 name: bin
390 subPath: createLinks.sh
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200391 - mountPath: {{ .Values.config.ccsdkConfigDir }}/aaiclient.properties
392 name: properties
393 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000394 - mountPath: {{ .Values.config.configDir }}/aaiclient.properties
395 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000396 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000397 - mountPath: {{ .Values.config.configDir }}/dblib.properties
398 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000399 subPath: dblib.properties
jmac7c434672018-05-11 20:14:17 +0000400 - mountPath: {{ .Values.config.configDir }}/lcm-dg.properties
401 name: properties
402 subPath: lcm-dg.properties
jmaca68f4cb2018-05-10 22:44:19 +0000403 - mountPath: {{ .Values.config.configDir }}/svclogic.properties
404 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000405 subPath: svclogic.properties
406 - mountPath: /opt/onap/sdnc/svclogic/config/svclogic.properties
jmaca68f4cb2018-05-10 22:44:19 +0000407 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000408 subPath: svclogic.properties
Alexis de Talhouët43c67e02018-09-20 16:49:16 -0400409 - mountPath: {{ .Values.config.configDir }}/netbox.properties
410 name: properties
411 subPath: netbox.properties
412 - mountPath: {{ .Values.config.configDir }}/blueprints-processor-adaptor.properties
413 name: properties
414 subPath: blueprints-processor-adaptor.properties
jmac8d6dc962018-04-26 14:26:55 +0000415 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100416 name: {{ include "common.fullname" . }}-data
Maciej Wereski537d71e2021-11-03 13:31:44 +0000417 - mountPath: {{ .Values.log.path }}
jmac065e2ce2018-03-29 01:18:02 +0000418 name: logs
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400419 - mountPath: {{ .Values.config.odl.salConfigDir }}/{{ .Values.config.odl.salConfigVersion}}/sal-clustering-config-{{ .Values.config.odl.salConfigVersion}}-akkaconf.xml
420 name: properties
421 subPath: akka.conf
422 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.controller.cluster.datastore.cfg
423 name: properties
424 subPath: org.opendaylight.controller.cluster.datastore.cfg
Dan Timoney9520e7c2021-01-12 11:10:58 -0500425 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.aaa.filterchain.cfg
426 name: properties
427 subPath: org.opendaylight.aaa.filterchain.cfg
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400428 - mountPath: {{ .Values.config.odl.binDir }}/setenv
429 name: properties
430 subPath: setenv
Alexander Dehn9b797d62020-04-21 09:53:50 +0000431 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-registrar.properties
432 name: properties
433 subPath: mountpoint-registrar.properties
434 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-state-provider.properties
435 name: properties
436 subPath: mountpoint-state-provider.properties
demskeq8a86300a2021-02-10 09:53:33 +0100437 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.daexim.cfg
438 name: properties
439 subPath: org.opendaylight.daexim.cfg
demskeq8b43e92c2021-02-12 15:43:48 +0100440 {{- if .Values.config.sdnr.oauth.enabled }}
441 - mountPath: {{ .Values.config.odl.etcDir }}/oauth-provider.config.json
442 name: properties
443 subPath: oauth-provider.config.json
444 {{ end }}
Satoshi Fujii54bfd172021-07-04 16:39:41 +0000445 resources: {{ include "common.resources" . | nindent 12 }}
jmac065e2ce2018-03-29 01:18:02 +0000446 # side car containers
Maciej Wereski537d71e2021-11-03 13:31:44 +0000447 {{ include "common.log.sidecar" . | nindent 8 }}
Satoshi Fujii54bfd172021-07-04 16:39:41 +0000448 {{- if .Values.nodeSelector }}
449 nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
450 {{- end }}
451 {{- if .Values.affinity }}
452 affinity: {{ toYaml .Values.affinity | nindent 8 }}
453 {{- end }}
Andreas Geisslerbd0d31a2024-03-20 09:51:32 +0100454 {{- include "common.imagePullSecrets" . | nindent 6 }}
farida azmy32c5ed82021-08-04 14:46:09 +0200455 serviceAccountName: {{ include "common.fullname" (dict "suffix" "read" "dot" . )}}
jmac065e2ce2018-03-29 01:18:02 +0000456 volumes:
457 - name: localtime
458 hostPath:
459 path: /etc/localtime
460 - name: logs
461 emptyDir: {}
Maciej Wereski537d71e2021-11-03 13:31:44 +0000462 {{ include "common.log.volumes" . | nindent 8 }}
jmac065e2ce2018-03-29 01:18:02 +0000463 - name: sdnc-logging-cfg-config
464 configMap:
465 name: {{ include "common.fullname" . }}-log-configmap
jmaca68f4cb2018-05-10 22:44:19 +0000466 - name: bin
jmac065e2ce2018-03-29 01:18:02 +0000467 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000468 name: {{ include "common.fullname" . }}-bin
469 defaultMode: 0755
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100470 - name: config-input
jmac065e2ce2018-03-29 01:18:02 +0000471 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000472 name: {{ include "common.fullname" . }}-properties
473 defaultMode: 0644
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100474 - name: properties
475 emptyDir:
476 medium: Memory
jmac8d6dc962018-04-26 14:26:55 +0000477 {{ if not .Values.persistence.enabled }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100478 - name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000479 emptyDir: {}
480 {{ else }}
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200481{{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100482{{ include "common.certManager.volumes" . | nindent 8 }}
483{{- end }}
jmac8d6dc962018-04-26 14:26:55 +0000484 volumeClaimTemplates:
485 - metadata:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100486 name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000487 labels:
488 name: {{ include "common.fullname" . }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100489 chart: "{{ .Chart.Name }}-{{ .Chart.Version }}"
Krzysztof Opasiak137d7cc2020-01-24 23:49:11 +0100490 release: "{{ include "common.release" . }}"
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100491 heritage: "{{ .Release.Service }}"
jmac8d6dc962018-04-26 14:26:55 +0000492 spec:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100493 accessModes:
494 - {{ .Values.persistence.accessMode }}
495 storageClassName: {{ include "common.storageClass" . }}
jmac8d6dc962018-04-26 14:26:55 +0000496 resources:
497 requests:
498 storage: {{ .Values.persistence.size }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100499 {{- end }}