blob: 37f5f6535b9c7bf89c9a9995a97b557b3c972623 [file] [log] [blame]
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00001# Copyright © 2017 Amdocs, Bell Canada
2#
3# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
Mike Elliottd32d36e2018-02-12 15:54:03 -050014# Default values for mariadb.
15# This is a YAML-formatted file.
16# Declare variables to be passed into your templates.
jmacc4f04d32018-10-12 18:24:24 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
Mike Elliottd32d36e2018-02-12 15:54:03 -050021 nodePortPrefix: 302
jmacc4f04d32018-10-12 18:24:24 +000022 nodePortPrefixExt: 304
23 repository: nexus3.onap.org:10001
Mandeep Khinda0fe4eb72018-04-20 21:02:45 +000024 readinessRepository: oomk8s
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000025 readinessImage: readiness-check:2.0.2
Mandeep Khinda0fe4eb72018-04-20 21:02:45 +000026 ubuntuInitRepository: registry.hub.docker.com
jmacc4f04d32018-10-12 18:24:24 +000027
28#################################################################
Krzysztof Opasiak2f8f4b62020-03-04 23:06:16 +010029# Secrets metaconfig
30#################################################################
31secrets:
32 - uid: db-root-pass
33 name: '{{ include "common.release" . }}-so-mariadb-root-pass'
34 type: password
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010035 externalSecret: '{{ tpl (default "" .Values.db.rootPasswordExternalSecret) . }}'
Krzysztof Opasiak2f8f4b62020-03-04 23:06:16 +010036 password: '{{ .Values.db.rootPassword }}'
37 passwordPolicy: required
38 - uid: db-backup-creds
39 name: '{{ include "common.release" . }}-so-mariadb-backup-creds'
40 type: basicAuth
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010041 externalSecret: '{{ tpl (default "" .Values.db.backupCredsExternalSecret) . }}'
Krzysztof Opasiak2f8f4b62020-03-04 23:06:16 +010042 login: '{{ .Values.db.backupUser }}'
43 password: '{{ .Values.db.backupPassword }}'
44 passwordPolicy: required
45 annotations:
46 helm.sh/hook: pre-upgrade,pre-install
47 helm.sh/hook-weight: "0"
48 helm.sh/hook-delete-policy: before-hook-creation
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +010049 - uid: db-user-creds
50 type: basicAuth
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010051 externalSecret: '{{ tpl (default "" .Values.db.userCredsExternalSecret) . }}'
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +010052 login: '{{ .Values.db.userName }}'
53 password: '{{ .Values.db.userPassword }}'
54 - uid: db-admin-creds
55 type: basicAuth
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010056 externalSecret: '{{ tpl (default "" .Values.db.adminCredsExternalSecret) . }}'
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +010057 login: '{{ .Values.db.adminName }}'
58 password: '{{ .Values.db.adminPassword }}'
59 - uid: camunda-db-creds
60 type: basicAuth
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010061 externalSecret: '{{ tpl (default "" .Values.db.camunda.dbCredsExternalSecret) . }}'
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +010062 login: '{{ .Values.db.camunda.userName }}'
63 password: '{{ .Values.db.camunda.password }}'
64 - uid: request-db-creds
65 type: basicAuth
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010066 externalSecret: '{{ tpl (default "" .Values.db.request.dbCredsExternalSecret) . }}'
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +010067 login: '{{ .Values.db.request.userName }}'
68 password: '{{ .Values.db.request.password }}'
69 - uid: catalog-db-creds
70 type: basicAuth
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010071 externalSecret: '{{ tpl (default "" .Values.db.catalog.dbCredsExternalSecret) . }}'
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +010072 login: '{{ .Values.db.catalog.userName }}'
73 password: '{{ .Values.db.catalog.password }}'
rope2524df55192020-08-24 13:55:58 +010074 - uid: nfvo-db-creds
75 type: basicAuth
76 externalSecret: '{{ tpl (default "" .Values.db.nfvo.dbCredsExternalSecret) . }}'
77 login: '{{ .Values.db.nfvo.userName }}'
78 password: '{{ .Values.db.nfvo.password }}'
Krzysztof Opasiak2f8f4b62020-03-04 23:06:16 +010079
80#################################################################
jmacc4f04d32018-10-12 18:24:24 +000081# Application configuration defaults.
82#################################################################
Mike Elliottd32d36e2018-02-12 15:54:03 -050083# application image
84repository: nexus3.onap.org:10001
Ramesh Parthasarathya4aaf362019-03-13 20:59:51 +000085image: mariadb:10.1.38
Mike Elliottd32d36e2018-02-12 15:54:03 -050086pullPolicy: Always
Mandeep Khinda0fe4eb72018-04-20 21:02:45 +000087ubuntuInitImage: oomk8s/ubuntu-init:2.0.0
jmacc4f04d32018-10-12 18:24:24 +000088
Krzysztof Opasiak2f8f4b62020-03-04 23:06:16 +010089# db config
90db:
91 rootPassword: secretpassword
92 # rootPasswordExternalSecret: some secret
93 backupPassword: secretpassword
94 backupUser: root
95 # backupCredsExternalSecret: some secret
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +010096 userName: so_user
97 userPassword: so_User123
98 # userCredsExternalSecret: some secret
99 adminName: so_admin
100 adminPassword: so_Admin123
101 # adminCredsExternalSecret: some secret
102 camunda:
103 userName: camundauser
104 password: camunda123
105 # dbCredsExternalSecret: some secret
106 request:
107 userName: requestuser
108 password: request123
109 # dbCredsExternalSecret: some secret
110 catalog:
111 userName: cataloguser
112 password: catalog123
113 # dbCredsExternalSecret: some secret
rope2524df55192020-08-24 13:55:58 +0100114 nfvo:
115 userName: nfvouser
116 # dbCredsExternalSecret: some secret
Krzysztof Opasiakf68b7282020-03-25 23:22:46 +0100117
Mike Elliottd32d36e2018-02-12 15:54:03 -0500118# application configuration
119config:
Mandeep Khinda0fe4eb72018-04-20 21:02:45 +0000120 # gerrit branch where the latest heat code is checked in
Ramesh Parthasarathybef9c7b2019-03-01 21:21:20 +0000121 gerritBranch: master
Mandeep Khinda0fe4eb72018-04-20 21:02:45 +0000122 # gerrit project where the latest heat code is checked in
123 gerritProject: http://gerrit.onap.org/r/so/docker-config.git
Mike Elliottd32d36e2018-02-12 15:54:03 -0500124# default number of instances
Mike Elliottd32d36e2018-02-12 15:54:03 -0500125nodeSelector: {}
Mike Elliottd32d36e2018-02-12 15:54:03 -0500126affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000127
128ingress:
129 enabled: false
130
131# Resource Limit flavor
132flavor: small
133
134resources:
135 small:
136 limits:
137 cpu: 2
138 memory: 4Gi
139 requests:
140 cpu: 1
141 memory: 2Gi
142 large:
143 limits:
144 cpu: 4
145 memory: 8Gi
146 requests:
147 cpu: 2
148 memory: 4Gi
149 unlimited: {}
150
Mike Elliottd32d36e2018-02-12 15:54:03 -0500151persistence:
152 enabled: true
Mike Elliottd32d36e2018-02-12 15:54:03 -0500153 ## A manually managed Persistent Volume and Claim
154 ## Requires persistence.enabled: true
155 ## If defined, PVC must be created manually before volume will be bound
156 # existingClaim:
157 volumeReclaimPolicy: Retain
Mike Elliottd32d36e2018-02-12 15:54:03 -0500158 ## database data Persistent Volume Storage Class
159 ## If defined, storageClassName: <storageClass>
160 ## If set to "-", storageClassName: "", which disables dynamic provisioning
161 ## If undefined (the default) or set to null, no storageClassName spec is
162 ## set, choosing the default provisioner. (gp2 on AWS, standard on
163 ## GKE, AWS & OpenStack)
164 ##
165 # storageClass: "-"
166 accessMode: ReadWriteMany
167 size: 2Gi
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000168
Mike Elliottd32d36e2018-02-12 15:54:03 -0500169 mountPath: /dockerdata-nfs
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000170 mountSubPath: so/migration