blob: 0263dfddc1f63a6bc1c36308241e45347722ee9f [file] [log] [blame]
Alexander Dehn9b797d62020-04-21 09:53:50 +00001# Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002# Copyright © 2017 Amdocs, Bell Canada
3#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
jmac065e2ce2018-03-29 01:18:02 +000016#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
jmac0e4f7172018-09-07 18:06:43 +000021 nodePortPrefixExt: 304
jmac065e2ce2018-03-29 01:18:02 +000022 persistence:
23 mountPath: /dockerdata-nfs
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +000024 aafEnabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010025 mariadbGalera:
26 #This flag allows SO to instantiate its own mariadb-galera cluster
27 #If shared instance is used, this chart assumes that DB already exists
28 localCluster: false
29 service: mariadb-galera
30 internalPort: 3306
31 nameOverride: mariadb-galera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010032 service: mariadb-galera
egernug27578332020-03-26 10:27:55 +000033 # Enabling CMPv2
34 cmpv2Enabled: true
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +010035 CMPv2CertManagerIntegration: false
egernug27578332020-03-26 10:27:55 +000036 platform:
37 certServiceClient:
Remigiusz Janeczekce152ff2020-12-29 08:53:17 +010038 image: onap/org.onap.oom.platform.cert-service.oom-certservice-client:2.3.2
egernug27578332020-03-26 10:27:55 +000039 secret:
40 name: oom-cert-service-client-tls-secret
41 mountPath: /etc/onap/oom/certservice/certs/
42 envVariables:
43 # Certificate related
44 cert_path: /var/custom-certs
45 cmpv2Organization: "Linux-Foundation"
46 cmpv2OrganizationalUnit: "ONAP"
47 cmpv2Location: "San-Francisco"
48 cmpv2Country: "US"
49 # Client configuration related
50 caName: "RA"
51 common_name: "sdnc.simpledemo.onap.org"
52 requestURL: "https://oom-cert-service:8443/v1/certificate/"
53 requestTimeout: "30000"
54 keystorePath: "/etc/onap/oom/certservice/certs/certServiceClient-keystore.jks"
55 outputType: "P12"
56 keystorePassword: "secret"
57 truststorePath: "/etc/onap/oom/certservice/certs/truststore.jks"
58 truststorePassword: "secret"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010059
60#################################################################
61# Secrets metaconfig
62#################################################################
63secrets:
64 - uid: db-root-password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010065 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010066 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010067 # If we're using shared mariadb, we need to use the secret name (second
68 # part).
69 # If not, we do the same trick than for user db secret hat allows you
70 # override this secret using external one with the same field that is used
71 # to pass this to subchart.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010072 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010073 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
74 ternary
75 ""
76 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
77 (include "common.mariadb.secret.rootPassSecretName"
78 (dict "dot" .
79 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
80 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010081 - uid: db-secret
82 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
83 type: basicAuth
84 # This is a nasty trick that allows you override this secret using external one
85 # with the same field that is used to pass this to subchart
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010086 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
87 ternary
88 ""
89 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
90 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
91 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010092 - uid: odl-creds
93 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
94 type: basicAuth
95 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
96 login: '{{ .Values.config.odlUser }}'
97 password: '{{ .Values.config.odlPassword }}'
98 # For now this is left hardcoded but should be revisited in a future
99 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100100 - uid: netbox-apikey
101 type: password
102 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
103 password: '{{ .Values.config.netboxApikey }}'
104 passwordPolicy: required
105 - uid: aai-user-creds
106 type: basicAuth
107 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
108 login: '{{ .Values.config.aaiUser }}'
109 password: '{{ .Values.config.aaiPassword }}'
110 passwordPolicy: required
111 - uid: modeling-user-creds
112 type: basicAuth
113 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
114 login: '{{ .Values.config.modelingUser }}'
115 password: '{{ .Values.config.modelingPassword }}'
116 passwordPolicy: required
117 - uid: restconf-creds
118 type: basicAuth
119 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
120 login: '{{ .Values.config.restconfUser }}'
121 password: '{{ .Values.config.restconfPassword }}'
122 passwordPolicy: required
123 - uid: ansible-creds
124 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
125 type: basicAuth
126 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
127 login: '{{ .Values.config.ansibleUser }}'
128 password: '{{ .Values.config.ansiblePassword }}'
129 passwordPolicy: required
130 - uid: scaleout-creds
131 type: basicAuth
132 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
133 login: '{{ .Values.config.scaleoutUser }}'
134 password: '{{ .Values.config.scaleoutPassword }}'
135 passwordPolicy: required
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100136 - uid: keystore-password
137 type: password
138 password: secret
139 passwordPolicy: required
140#################################################################
141# Certificates
142#################################################################
143certificates:
Jan Malkiewicz7a0f2eb2021-01-12 11:59:28 +0100144 - commonName: sdnc.simpledemo.onap.org
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100145 dnsNames:
146 - sdnc.simpledemo.onap.org
147 p12Keystore:
148 create: true
149 passwordSecretRef:
150 name: keystore-password
151 key: password
152 jksKeystore:
153 create: true
154 passwordSecretRef:
155 name: keystore-password
156 key: password
jmac065e2ce2018-03-29 01:18:02 +0000157#################################################################
158# Application configuration defaults.
159#################################################################
160# application images
Alexander Dehn238450f2020-10-27 13:03:53 +0000161
jmac065e2ce2018-03-29 01:18:02 +0000162pullPolicy: Always
Dan Timoneyaa79ff62020-11-18 16:43:33 -0500163image: onap/sdnc-image:2.0.4
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400164
jmac065e2ce2018-03-29 01:18:02 +0000165# flag to enable debugging - application support required
166debugEnabled: false
167
168# application configuration
BorislavG5f3b6192018-03-25 18:12:38 +0300169config:
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400170 odlUid: 100
171 odlGid: 101
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100172 odlUser: admin
jmaca68f4cb2018-05-10 22:44:19 +0000173 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100174 # odlCredsExternalSecret: some secret
175 netboxApikey: onceuponatimeiplayedwithnetbox20180814
176 # netboxApikeyExternalSecret: some secret
177 aaiUser: sdnc@sdnc.onap.org
178 aaiPassword: demo123456!
179 # aaiCredsExternalSecret: some secret
180 modelingUser: ccsdkapps
181 modelingPassword: ccsdkapps
182 # modelingCredsExternalSecret: some secret
183 restconfUser: admin
184 restconfPassword: admin
185 # restconfCredsExternalSecret: some secret
186 scaleoutUser: admin
187 scaleoutPassword: admin
188 # scaleoutExternalSecret: some secret
189 ansibleUser: sdnc
190 ansiblePassword: sdnc
191 # ansibleCredsExternalSecret: some secret
192 dbSdnctlDatabase: &sdncDbName sdnctl
jmac065e2ce2018-03-29 01:18:02 +0000193 enableClustering: true
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400194 sdncHome: /opt/onap/sdnc
jmaca68f4cb2018-05-10 22:44:19 +0000195 binDir: /opt/onap/sdnc/bin
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400196 etcDir: /opt/onap/sdnc/data
Trevor Tait567ff1e2018-05-01 16:20:54 -0400197 geoEnabled: false
Neha Jain7b0d6c62018-05-17 14:34:49 -0400198# if geoEnabled is set to true here, mysql.geoEnabled must be set to true
Trevor Tait567ff1e2018-05-01 16:20:54 -0400199# if geoEnabled is set to true the following 3 values must be set to their proper values
200 myODLCluster: 127.0.0.1
201 peerODLCluster: 127.0.0.1
Mohammadreza Pasandidehb642ee52018-06-19 15:19:53 -0400202 isPrimaryCluster: true
jmac065e2ce2018-03-29 01:18:02 +0000203 configDir: /opt/onap/sdnc/data/properties
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200204 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
jmac065e2ce2018-03-29 01:18:02 +0000205 dmaapTopic: SUCCESS
jmaca68f4cb2018-05-10 22:44:19 +0000206 dmaapPort: 3904
BorislavG5f3b6192018-03-25 18:12:38 +0300207 logstashServiceName: log-ls
208 logstashPort: 5044
jmac7c434672018-05-11 20:14:17 +0000209 ansibleServiceName: sdnc-ansible-server
210 ansiblePort: 8000
Dan Timoneya98765b2020-09-14 11:57:55 -0400211 javaHome: /opt/java/openjdk
jmac7c434672018-05-11 20:14:17 +0000212
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400213 odl:
214 etcDir: /opt/opendaylight/etc
215 binDir: /opt/opendaylight/bin
Dan Timoneya98765b2020-09-14 11:57:55 -0400216 gcLogDir: /opt/opendaylight/data/log
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400217 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
Alexander Dehn9b797d62020-04-21 09:53:50 +0000218 salConfigVersion: 1.9.1
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400219 akka:
220 seedNodeTimeout: 15s
221 circuitBreaker:
222 maxFailures: 10
223 callTimeout: 90s
224 resetTimeout: 30s
225 recoveryEventTimeout: 90s
226 datastore:
227 persistentActorRestartMinBackoffInSeconds: 10
228 persistentActorRestartMaxBackoffInSeconds: 40
229 persistentActorRestartResetBackoffInSeconds: 20
230 shardTransactionCommitTimeoutInSeconds: 120
231 shardIsolatedLeaderCheckIntervalInMillis: 30000
232 operationTimeoutInSeconds: 120
233 javaOptions:
234 maxGCPauseMillis: 100
235 parallelGCThreads : 3
Dan Timoneya98765b2020-09-14 11:57:55 -0400236 numberGCLogFiles: 10
237 minMemory: 512m
238 maxMemory: 2048m
239 gcLogOptions: ""
240 # Next line enables gc logging
241 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000242 # enables sdnr functionality
243 sdnr:
Alexander Dehn5c1105e2020-09-14 20:55:56 +0000244 enabled: true
Alexander Dehn9b797d62020-04-21 09:53:50 +0000245 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
246 # mode: dm - SDNC contains sdnr device manager + ODLUX components
247 mode: dm
248 # sdnronly: true starts sdnc container with odl and sdnrwt features only
249 sdnronly: false
250 sdnrdbTrustAllCerts: true
251 mountpointRegistrarEnabled: false
252 mountpointStateProviderEnabled: false
253
254
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400255
jmac065e2ce2018-03-29 01:18:02 +0000256# dependency / sub-chart configuration
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200257certInitializer:
258 nameOverride: sdnc-cert-initializer
Jozsef Csongvai9d4d5af2020-07-13 11:10:25 -0400259 truststoreMountpath: /opt/onap/sdnc/data/stores
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200260 fqdn: "sdnc"
261 app_ns: "org.osaaf.aaf"
262 fqi: "sdnc@sdnc.onap.org"
263 fqi_namespace: org.onap.sdnc
264 public_fqdn: "sdnc.onap.org"
265 aafDeployFqi: "deployer@people.osaaf.org"
266 aafDeployPass: demo123456!
267 cadi_latitude: "38.0"
268 cadi_longitude: "-72.0"
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200269 credsPath: /opt/app/osaaf/local
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200270 aaf_add_config: >
271 cd /opt/app/osaaf/local;
272 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +0000273
Alexander Dehn9b797d62020-04-21 09:53:50 +0000274# dependency / sub-chart configuration
275network-name-gen:
276 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100277mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100278 nameOverride: &sdnc-db sdnc-db
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100279 config: &mariadbGaleraConfig
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100280 rootPasswordExternalSecret: *rootDbSecret
281 userName: &dbUser sdnctl
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100282 userCredentialsExternalSecret: *dbSecretName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100283 rootUser:
284 externalSecret: *rootDbSecret
285 db:
286 user: *dbUser
287 externalSecret: *dbSecretName
jmac065e2ce2018-03-29 01:18:02 +0000288 service:
289 name: sdnc-dbhost
jmac065e2ce2018-03-29 01:18:02 +0000290 sdnctlPrefix: sdnc
291 persistence:
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000292 mountSubPath: sdnc/mariadb-galera
jmac065e2ce2018-03-29 01:18:02 +0000293 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000294 replicaCount: 1
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100295 serviceAccount:
296 nameOverride: *sdnc-db
jmac065e2ce2018-03-29 01:18:02 +0000297
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100298cds:
299 enabled: false
300
301dmaap-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000302 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100303 nameOverride: sdnc-dmaap-listener
304 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100305 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100306 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100307 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100308 mysqlDatabase: *sdncDbName
309 config:
310 sdncChartName: sdnc
311 dmaapPort: 3904
312 sdncPort: 8282
313 configDir: /opt/onap/sdnc/data/properties
314 odlCredsExternalSecret: *odlCredsSecretName
315
316ueb-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000317 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100318 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100319 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100320 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100321 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100322 mysqlDatabase: *sdncDbName
323 nameOverride: sdnc-ueb-listener
324 config:
325 sdncPort: 8282
326 sdncChartName: sdnc
327 configDir: /opt/onap/sdnc/data/properties
328 odlCredsExternalSecret: *odlCredsSecretName
329
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100330sdnc-ansible-server:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000331 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100332 config:
333 restCredsExternalSecret: *ansibleSecretName
334 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100335 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100336 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100337 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100338 mysqlDatabase: ansible
339 service:
340 name: sdnc-ansible-server
341 internalPort: 8000
342
jmac065e2ce2018-03-29 01:18:02 +0000343dgbuilder:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000344 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000345 nameOverride: sdnc-dgbuilder
Dan Timoneycb0a81f2020-07-15 17:31:43 -0400346 certInitializer:
347 nameOverride: sdnc-dgbuilder-cert-initializer
jmac065e2ce2018-03-29 01:18:02 +0000348 config:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100349 db:
350 dbName: *sdncDbName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100351 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
352 ternary
353 (printf "%s-sdnc-db-root-password" (include "common.release" .))
354 (include "common.mariadb.secret.rootPassSecretName"
355 (dict "dot" . "chartName" "mariadb-galera")) }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100356 userCredentialsExternalSecret: *dbSecretName
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000357 dbPodName: mariadb-galera
358 dbServiceName: mariadb-galera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100359 # This should be revisited and changed to plain text
jmac70863e12018-05-16 14:53:03 +0000360 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100361 mariadb-galera:
jmac065e2ce2018-03-29 01:18:02 +0000362 service:
BorislavG1ffbd992018-04-24 07:56:27 +0000363 name: sdnc-dgbuilder
jmac065e2ce2018-03-29 01:18:02 +0000364 nodePort: "03"
365
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200366 ingress:
367 enabled: false
368 service:
369 - baseaddr: "sdnc-dgbuilder"
370 name: "sdnc-dgbuilder"
371 port: 3000
Alexander Dehn9b797d62020-04-21 09:53:50 +0000372 - baseaddr: "sdnc-web-service"
373 name: "sdnc-web-service"
374 port: 8443
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200375 config:
376 ssl: "redirect"
377
Alexander Dehn9b797d62020-04-21 09:53:50 +0000378
379
Alexander Dehnab86ec12020-02-05 14:38:54 +0000380# local elasticsearch cluster
381localElasticCluster: true
382elasticsearch:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100383 nameOverride: &elasticSearchName sdnrdb
Alexander Dehnab86ec12020-02-05 14:38:54 +0000384 name: sdnrdb-cluster
Krzysztof Opasiakc6152ce2020-05-09 01:43:08 +0200385 certInitializer:
Alexander Dehnab86ec12020-02-05 14:38:54 +0000386 fqdn: "sdnc"
387 fqi_namespace: org.onap.sdnc
388 fqi: "sdnc@sdnc.onap.org"
389 service:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100390 name: *elasticSearchName
Alexander Dehnab86ec12020-02-05 14:38:54 +0000391 master:
392 replicaCount: 3
393 # dedicatednode: "yes"
394 # working as master node only, in this case increase replicaCount for elasticsearch-data
395 # dedicatednode: "no"
396 # handles master and data node functionality
397 dedicatednode: "no"
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100398 nameOverride: *elasticSearchName
399 cluster_name: *elasticSearchName
Alexander Dehn9b797d62020-04-21 09:53:50 +0000400# enable
401sdnc-web:
Alexander Dehn8789a722020-10-16 14:29:05 +0000402 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000403# default number of instances
404replicaCount: 1
405
406nodeSelector: {}
407
408affinity: {}
409
410# probe configuration parameters
411liveness:
412 initialDelaySeconds: 10
413 periodSeconds: 10
414 # necessary to disable liveness probe when setting breakpoints
415 # in debugger so K8s doesn't restart unresponsive container
416 enabled: true
417
418readiness:
419 initialDelaySeconds: 10
420 periodSeconds: 10
421
422service:
423 type: NodePort
424 name: sdnc
BorislavG1ffbd992018-04-24 07:56:27 +0000425 portName: sdnc
jmac065e2ce2018-03-29 01:18:02 +0000426 internalPort: 8181
427 internalPort2: 8101
428 internalPort3: 8080
Timoney, Dan (dt5972)c6de2692019-08-14 14:22:37 -0400429 internalPort4: 8443
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400430
jmac065e2ce2018-03-29 01:18:02 +0000431 #port
432 externalPort: 8282
jmac065e2ce2018-03-29 01:18:02 +0000433
434 externalPort2: 8202
jmac065e2ce2018-03-29 01:18:02 +0000435
436 externalPort3: 8280
jmac065e2ce2018-03-29 01:18:02 +0000437
jmaca68f4cb2018-05-10 22:44:19 +0000438 externalPort4: 8443
439 nodePort4: 67
440
jmac065e2ce2018-03-29 01:18:02 +0000441 clusterPort: 2550
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400442 clusterPort2: 2650
443 clusterPort3: 2681
444
445 geoNodePort1: 61
446 geoNodePort2: 62
447 geoNodePort3: 63
448 geoNodePort4: 64
449 geoNodePort5: 65
450 geoNodePort6: 66
jmac065e2ce2018-03-29 01:18:02 +0000451
jmac8d6dc962018-04-26 14:26:55 +0000452## Persist data to a persitent volume
453persistence:
454 enabled: true
455
456 ## A manually managed Persistent Volume and Claim
457 ## Requires persistence.enabled: true
458 ## If defined, PVC must be created manually before volume will be bound
459 # existingClaim:
460 volumeReclaimPolicy: Retain
461
462 ## database data Persistent Volume Storage Class
463 ## If defined, storageClassName: <storageClass>
464 ## If set to "-", storageClassName: "", which disables dynamic provisioning
465 ## If undefined (the default) or set to null, no storageClassName spec is
466 ## set, choosing the default provisioner. (gp2 on AWS, standard on
467 ## GKE, AWS & OpenStack)
468 accessMode: ReadWriteOnce
469 size: 1Gi
470 mountPath: /dockerdata-nfs
471 mountSubPath: sdnc/mdsal
472 mdsalPath: /opt/opendaylight/current/daexim
473
egernug27578332020-03-26 10:27:55 +0000474certpersistence:
475 enabled: true
476
477 ## A manually managed Persistent Volume and Claim
478 ## Requires persistence.enabled: true
479 ## If defined, PVC must be created manually before volume will be bound
480 # existingClaim:
481
482 volumeReclaimPolicy: Retain
483 accessMode: ReadWriteOnce
484 size: 50Mi
485 mountPath: /dockerdata-nfs
486 mountSubPath: sdnc/certs
487 certPath: /opt/app/osaaf
488 ##storageClass: "manual"
489
jmac065e2ce2018-03-29 01:18:02 +0000490ingress:
491 enabled: false
Lucjan Bryndza08448402019-11-27 14:26:54 +0100492 service:
Lucjan Bryndza05649652020-04-29 08:52:33 +0000493 - baseaddr: "sdnc.api"
Lucjan Bryndza08448402019-11-27 14:26:54 +0100494 name: "sdnc"
495 port: 8443
496 config:
497 ssl: "redirect"
jmac065e2ce2018-03-29 01:18:02 +0000498
toshrajbhardwaj72b5f0f2018-09-13 02:45:22 +0000499#Resource Limit flavor -By Default using small
500flavor: small
501#segregation for different envionment (Small and Large)
502
503resources:
Mandeep Khindade045712018-09-19 18:11:57 +0000504 small:
505 limits:
506 cpu: 2
507 memory: 4Gi
508 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000509 cpu: 1
510 memory: 2Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000511 large:
512 limits:
513 cpu: 4
514 memory: 8Gi
515 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000516 cpu: 2
517 memory: 4Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000518 unlimited: {}