ajay_dp001 | 80f9f5c | 2021-03-23 21:27:51 +0530 | [diff] [blame] | 1 | # ================================ LICENSE_START ============================= |
| 2 | # ============================================================================ |
| 3 | # Copyright (C) 2021 Nordix Foundation. |
Jack Lucas | c979732 | 2022-03-18 12:32:59 -0400 | [diff] [blame] | 4 | # Copyright (c) 2022 J. F. Lucas. All rights reserved. |
ajay_dp001 | 80f9f5c | 2021-03-23 21:27:51 +0530 | [diff] [blame] | 5 | # ============================================================================ |
| 6 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 7 | # you may not use this file except in compliance with the License. |
| 8 | # You may obtain a copy of the License at |
| 9 | # |
| 10 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 11 | # |
| 12 | # Unless required by applicable law or agreed to in writing, software |
| 13 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 14 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 15 | # See the License for the specific language governing permissions and |
| 16 | # limitations under the License. |
| 17 | # ================================= LICENSE_END ============================== |
| 18 | |
| 19 | ################################################################# |
| 20 | # Global Configuration Defaults. |
| 21 | ################################################################# |
| 22 | global: |
| 23 | nodePortPrefix: 302 |
| 24 | nodePortPrefixExt: 304 |
Maciej Wereski | 7000a7c | 2021-12-16 12:24:06 +0100 | [diff] [blame] | 25 | centralizedLoggingEnabled: true |
ajay_dp001 | 80f9f5c | 2021-03-23 21:27:51 +0530 | [diff] [blame] | 26 | |
| 27 | ################################################################# |
| 28 | # Filebeat Configuration Defaults. |
| 29 | ################################################################# |
| 30 | filebeatConfig: |
| 31 | logstashServiceName: log-ls |
| 32 | logstashPort: 5044 |
| 33 | |
| 34 | ################################################################# |
| 35 | # Secrets Configuration. |
| 36 | ################################################################# |
| 37 | secrets: |
| 38 | - uid: &aafCredsUID aafcreds |
| 39 | type: basicAuth |
| 40 | login: '{{ .Values.aafCreds.identity }}' |
| 41 | password: '{{ .Values.aafCreds.password }}' |
| 42 | passwordPolicy: required |
| 43 | - uid: &pgUserCredsSecretUid pg-user-creds |
| 44 | name: &pgUserCredsSecretName '{{ include "common.release" . }}-pmsh-pg-user-creds' |
| 45 | type: basicAuth |
| 46 | externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "pmsh-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}' |
| 47 | login: '{{ .Values.postgres.config.pgUserName }}' |
| 48 | password: '{{ .Values.postgres.config.pgUserPassword }}' |
| 49 | passwordPolicy: generate |
| 50 | |
| 51 | ################################################################# |
| 52 | # InitContainer Images. |
| 53 | ################################################################# |
| 54 | tlsImage: onap/org.onap.dcaegen2.deployments.tls-init-container:2.1.0 |
ajay_dp001 | 80f9f5c | 2021-03-23 21:27:51 +0530 | [diff] [blame] | 55 | |
| 56 | ################################################################# |
| 57 | # Application Configuration Defaults. |
| 58 | ################################################################# |
| 59 | # Application Image |
Vijay Venkatesh Kumar | 41fc5a2 | 2022-03-08 16:28:05 -0500 | [diff] [blame] | 60 | image: onap/org.onap.dcaegen2.services.pmsh:2.0.0 |
ajay_dp001 | 80f9f5c | 2021-03-23 21:27:51 +0530 | [diff] [blame] | 61 | pullPolicy: Always |
| 62 | |
| 63 | # Log directory where logging sidecar should look for log files |
Maciej Wereski | 7000a7c | 2021-12-16 12:24:06 +0100 | [diff] [blame] | 64 | # if path is set to null sidecar won't be deployed in spite of |
| 65 | # global.centralizedLoggingEnabled setting. |
| 66 | log: |
| 67 | path: /var/log/ONAP/dcaegen2/services/pmsh |
| 68 | logConfigMapNamePrefix: '{{ include "common.fullname" . }}' |
ajay_dp001 | 80f9f5c | 2021-03-23 21:27:51 +0530 | [diff] [blame] | 69 | |
| 70 | # Directory where TLS certs should be stored |
| 71 | # if absent, no certs will be retrieved and stored |
| 72 | certDirectory: /opt/app/pmsh/etc/certs |
| 73 | |
| 74 | # TLS role -- set to true if microservice acts as server |
| 75 | # If true, an init container will retrieve a server cert |
| 76 | # and key from AAF and mount them in certDirectory. |
| 77 | tlsServer: true |
| 78 | |
| 79 | # Dependencies |
| 80 | readinessCheck: |
| 81 | wait_for: |
ajay_dp001 | 80f9f5c | 2021-03-23 21:27:51 +0530 | [diff] [blame] | 82 | - aaf-cm |
| 83 | - &postgresName dcae-pmsh-postgres |
| 84 | |
| 85 | # Probe Configuration |
| 86 | readiness: |
| 87 | initialDelaySeconds: 10 |
| 88 | periodSeconds: 15 |
| 89 | timeoutSeconds: 1 |
| 90 | path: /healthcheck |
| 91 | scheme: HTTPS |
| 92 | port: 8443 |
| 93 | |
| 94 | # Service Configuration |
| 95 | service: |
| 96 | type: ClusterIP |
| 97 | name: dcae-pmsh |
| 98 | ports: |
| 99 | - name: https |
| 100 | port: 8443 |
| 101 | port_protocol: http |
| 102 | |
| 103 | # AAF Credentials |
| 104 | aafCreds: |
| 105 | identity: dcae@dcae.onap.org |
| 106 | password: demo123456! |
| 107 | |
| 108 | credentials: |
| 109 | - name: AAF_IDENTITY |
| 110 | uid: *aafCredsUID |
| 111 | key: login |
| 112 | - name: AAF_PASSWORD |
| 113 | uid: *aafCredsUID |
| 114 | key: password |
| 115 | |
| 116 | # Initial Application Configuration |
| 117 | applicationConfig: |
| 118 | enable_tls: true |
| 119 | aaf_identity: ${AAF_IDENTITY} |
| 120 | aaf_password: ${AAF_PASSWORD} |
| 121 | key_path: /opt/app/pmsh/etc/certs/key.pem |
| 122 | cert_path: /opt/app/pmsh/etc/certs/cert.pem |
| 123 | ca_cert_path: /opt/app/pmsh/etc/certs/cacert.pem |
| 124 | control_loop_name: pmsh-control-loop |
| 125 | operational_policy_name: pmsh-operational-policy |
| 126 | pmsh_policy: |
| 127 | subscription: |
| 128 | subscriptionName: ExtraPM-All-gNB-R2B |
| 129 | administrativeState: LOCKED |
| 130 | fileBasedGP: 15 |
| 131 | fileLocation: "/pm/pm.xml" |
| 132 | nfFilter: { "nfNames": [ "^pnf.*","^vnf.*" ],"modelInvariantIDs": [ ],"modelVersionIDs": [ ],"modelNames": [ ] } |
| 133 | measurementGroups: [ { "measurementGroup": { "measurementTypes": [ { "measurementType": "countera" },{ "measurementType": "counterb" } ],"managedObjectDNsBasic": [ { "DN": "dna" },{ "DN": "dnb" } ] } },{ "measurementGroup": { "measurementTypes": [ { "measurementType": "counterc" },{ "measurementType": "counterd" } ],"managedObjectDNsBasic": [ { "DN": "dnc" },{ "DN": "dnd" } ] } } ] |
| 134 | streams_publishes: |
| 135 | policy_pm_publisher: |
| 136 | type: message_router |
| 137 | dmaap_info: |
| 138 | topic_url: "https://message-router:3905/events/unauthenticated.DCAE_CL_OUTPUT" |
| 139 | streams_subscribes: |
| 140 | policy_pm_subscriber: |
| 141 | type: message_router |
| 142 | dmaap_info: |
| 143 | topic_url: "https://message-router:3905/events/unauthenticated.PMSH_CL_INPUT" |
| 144 | aai_subscriber: |
| 145 | type: message_router |
| 146 | dmaap_info: |
| 147 | topic_url: "https://message-router:3905/events/AAI-EVENT" |
| 148 | |
| 149 | applicationEnv: |
| 150 | PMSH_PG_URL: &dcaePmshPgPrimary dcae-pmsh-pg-primary |
| 151 | PMSH_PG_USERNAME: |
| 152 | secretUid: *pgUserCredsSecretUid |
| 153 | key: login |
| 154 | PMSH_PG_PASSWORD: |
| 155 | secretUid: *pgUserCredsSecretUid |
| 156 | key: password |
| 157 | |
| 158 | # Resource Limit Flavor -By Default Using Small |
| 159 | flavor: small |
| 160 | |
| 161 | # Segregation for Different Environment (Small and Large) |
| 162 | resources: |
| 163 | small: |
| 164 | limits: |
| 165 | cpu: 1 |
| 166 | memory: 1Gi |
| 167 | requests: |
| 168 | cpu: 1 |
| 169 | memory: 1Gi |
| 170 | large: |
| 171 | limits: |
| 172 | cpu: 2 |
| 173 | memory: 2Gi |
| 174 | requests: |
| 175 | cpu: 2 |
| 176 | memory: 2Gi |
| 177 | unlimited: {} |
| 178 | |
| 179 | ################################################################# |
| 180 | # Application configuration Overriding Defaults in the Postgres. |
| 181 | ################################################################# |
| 182 | postgres: |
| 183 | nameOverride: *postgresName |
| 184 | service: |
| 185 | name: *postgresName |
| 186 | name2: *dcaePmshPgPrimary |
| 187 | name3: dcae-pmsh-pg-replica |
| 188 | container: |
| 189 | name: |
| 190 | primary: dcae-pmsh-pg-primary |
| 191 | replica: dcae-pmsh-pg-replica |
| 192 | persistence: |
| 193 | mountSubPath: pmsh/data |
| 194 | mountInitPath: pmsh |
| 195 | config: |
| 196 | pgUserName: pmsh |
| 197 | pgDatabase: pmsh |
farida azmy | cb03ac7 | 2021-09-12 16:14:12 +0200 | [diff] [blame] | 198 | pgUserExternalSecret: *pgUserCredsSecretName |
| 199 | |
| 200 | #Pods Service Account |
| 201 | serviceAccount: |
| 202 | nameOverride: dcae-pmsh |
| 203 | roles: |
| 204 | - read |