blob: 1d2fa266eace12f31b62c4d4f2766b9236ffa994 [file] [log] [blame]
Alexander Dehn9b797d62020-04-21 09:53:50 +00001# Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002# Copyright © 2017 Amdocs, Bell Canada
3#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
jmac065e2ce2018-03-29 01:18:02 +000016#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
jmac0e4f7172018-09-07 18:06:43 +000021 nodePortPrefixExt: 304
jmac065e2ce2018-03-29 01:18:02 +000022 persistence:
23 mountPath: /dockerdata-nfs
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +000024 aafEnabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010025 mariadbGalera:
26 #This flag allows SO to instantiate its own mariadb-galera cluster
27 #If shared instance is used, this chart assumes that DB already exists
28 localCluster: false
29 service: mariadb-galera
30 internalPort: 3306
31 nameOverride: mariadb-galera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010032 service: mariadb-galera
egernug27578332020-03-26 10:27:55 +000033 # Enabling CMPv2
34 cmpv2Enabled: true
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +010035 CMPv2CertManagerIntegration: false
egernug27578332020-03-26 10:27:55 +000036 platform:
37 certServiceClient:
Remigiusz Janeczekce152ff2020-12-29 08:53:17 +010038 image: onap/org.onap.oom.platform.cert-service.oom-certservice-client:2.3.2
egernug27578332020-03-26 10:27:55 +000039 secret:
40 name: oom-cert-service-client-tls-secret
41 mountPath: /etc/onap/oom/certservice/certs/
42 envVariables:
43 # Certificate related
44 cert_path: /var/custom-certs
45 cmpv2Organization: "Linux-Foundation"
46 cmpv2OrganizationalUnit: "ONAP"
47 cmpv2Location: "San-Francisco"
48 cmpv2Country: "US"
49 # Client configuration related
50 caName: "RA"
51 common_name: "sdnc.simpledemo.onap.org"
52 requestURL: "https://oom-cert-service:8443/v1/certificate/"
53 requestTimeout: "30000"
54 keystorePath: "/etc/onap/oom/certservice/certs/certServiceClient-keystore.jks"
55 outputType: "P12"
56 keystorePassword: "secret"
57 truststorePath: "/etc/onap/oom/certservice/certs/truststore.jks"
58 truststorePassword: "secret"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010059
60#################################################################
61# Secrets metaconfig
62#################################################################
63secrets:
64 - uid: db-root-password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010065 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010066 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010067 # If we're using shared mariadb, we need to use the secret name (second
68 # part).
69 # If not, we do the same trick than for user db secret hat allows you
70 # override this secret using external one with the same field that is used
71 # to pass this to subchart.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010072 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010073 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
74 ternary
75 ""
76 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
77 (include "common.mariadb.secret.rootPassSecretName"
78 (dict "dot" .
79 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
80 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010081 - uid: db-secret
82 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
83 type: basicAuth
84 # This is a nasty trick that allows you override this secret using external one
85 # with the same field that is used to pass this to subchart
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010086 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
87 ternary
88 ""
89 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
90 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
91 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010092 - uid: odl-creds
93 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
94 type: basicAuth
95 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
96 login: '{{ .Values.config.odlUser }}'
97 password: '{{ .Values.config.odlPassword }}'
98 # For now this is left hardcoded but should be revisited in a future
99 passwordPolicy: required
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100100 - uid: netbox-apikey
101 type: password
102 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
103 password: '{{ .Values.config.netboxApikey }}'
104 passwordPolicy: required
105 - uid: aai-user-creds
106 type: basicAuth
107 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
108 login: '{{ .Values.config.aaiUser }}'
109 password: '{{ .Values.config.aaiPassword }}'
110 passwordPolicy: required
111 - uid: modeling-user-creds
112 type: basicAuth
113 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
114 login: '{{ .Values.config.modelingUser }}'
115 password: '{{ .Values.config.modelingPassword }}'
116 passwordPolicy: required
117 - uid: restconf-creds
118 type: basicAuth
119 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
120 login: '{{ .Values.config.restconfUser }}'
121 password: '{{ .Values.config.restconfPassword }}'
122 passwordPolicy: required
123 - uid: ansible-creds
124 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
125 type: basicAuth
126 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
127 login: '{{ .Values.config.ansibleUser }}'
128 password: '{{ .Values.config.ansiblePassword }}'
129 passwordPolicy: required
130 - uid: scaleout-creds
131 type: basicAuth
132 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
133 login: '{{ .Values.config.scaleoutUser }}'
134 password: '{{ .Values.config.scaleoutPassword }}'
135 passwordPolicy: required
Jan Malkiewicz0e53c9f2020-12-08 15:08:01 +0100136 - uid: keystore-password
137 type: password
138 password: secret
139 passwordPolicy: required
140#################################################################
141# Certificates
142#################################################################
143certificates:
144 - name: onap-sdnc-certificate
145 secretName: onap-sdnc-certificate
146 commonName: sdnc.simpledemo.onap.org
147 dnsNames:
148 - sdnc.simpledemo.onap.org
149 p12Keystore:
150 create: true
151 passwordSecretRef:
152 name: keystore-password
153 key: password
154 jksKeystore:
155 create: true
156 passwordSecretRef:
157 name: keystore-password
158 key: password
jmac065e2ce2018-03-29 01:18:02 +0000159#################################################################
160# Application configuration defaults.
161#################################################################
162# application images
Alexander Dehn238450f2020-10-27 13:03:53 +0000163
jmac065e2ce2018-03-29 01:18:02 +0000164pullPolicy: Always
Dan Timoneyaa79ff62020-11-18 16:43:33 -0500165image: onap/sdnc-image:2.0.4
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400166
jmac065e2ce2018-03-29 01:18:02 +0000167# flag to enable debugging - application support required
168debugEnabled: false
169
170# application configuration
BorislavG5f3b6192018-03-25 18:12:38 +0300171config:
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400172 odlUid: 100
173 odlGid: 101
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100174 odlUser: admin
jmaca68f4cb2018-05-10 22:44:19 +0000175 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100176 # odlCredsExternalSecret: some secret
177 netboxApikey: onceuponatimeiplayedwithnetbox20180814
178 # netboxApikeyExternalSecret: some secret
179 aaiUser: sdnc@sdnc.onap.org
180 aaiPassword: demo123456!
181 # aaiCredsExternalSecret: some secret
182 modelingUser: ccsdkapps
183 modelingPassword: ccsdkapps
184 # modelingCredsExternalSecret: some secret
185 restconfUser: admin
186 restconfPassword: admin
187 # restconfCredsExternalSecret: some secret
188 scaleoutUser: admin
189 scaleoutPassword: admin
190 # scaleoutExternalSecret: some secret
191 ansibleUser: sdnc
192 ansiblePassword: sdnc
193 # ansibleCredsExternalSecret: some secret
194 dbSdnctlDatabase: &sdncDbName sdnctl
jmac065e2ce2018-03-29 01:18:02 +0000195 enableClustering: true
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400196 sdncHome: /opt/onap/sdnc
jmaca68f4cb2018-05-10 22:44:19 +0000197 binDir: /opt/onap/sdnc/bin
Timoney, Dan (dt5972)a3bc1a52019-06-26 16:16:52 -0400198 etcDir: /opt/onap/sdnc/data
Trevor Tait567ff1e2018-05-01 16:20:54 -0400199 geoEnabled: false
Neha Jain7b0d6c62018-05-17 14:34:49 -0400200# if geoEnabled is set to true here, mysql.geoEnabled must be set to true
Trevor Tait567ff1e2018-05-01 16:20:54 -0400201# if geoEnabled is set to true the following 3 values must be set to their proper values
202 myODLCluster: 127.0.0.1
203 peerODLCluster: 127.0.0.1
Mohammadreza Pasandidehb642ee52018-06-19 15:19:53 -0400204 isPrimaryCluster: true
jmac065e2ce2018-03-29 01:18:02 +0000205 configDir: /opt/onap/sdnc/data/properties
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200206 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
jmac065e2ce2018-03-29 01:18:02 +0000207 dmaapTopic: SUCCESS
jmaca68f4cb2018-05-10 22:44:19 +0000208 dmaapPort: 3904
BorislavG5f3b6192018-03-25 18:12:38 +0300209 logstashServiceName: log-ls
210 logstashPort: 5044
jmac7c434672018-05-11 20:14:17 +0000211 ansibleServiceName: sdnc-ansible-server
212 ansiblePort: 8000
Dan Timoneya98765b2020-09-14 11:57:55 -0400213 javaHome: /opt/java/openjdk
jmac7c434672018-05-11 20:14:17 +0000214
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400215 odl:
216 etcDir: /opt/opendaylight/etc
217 binDir: /opt/opendaylight/bin
Dan Timoneya98765b2020-09-14 11:57:55 -0400218 gcLogDir: /opt/opendaylight/data/log
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400219 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
Alexander Dehn9b797d62020-04-21 09:53:50 +0000220 salConfigVersion: 1.9.1
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400221 akka:
222 seedNodeTimeout: 15s
223 circuitBreaker:
224 maxFailures: 10
225 callTimeout: 90s
226 resetTimeout: 30s
227 recoveryEventTimeout: 90s
228 datastore:
229 persistentActorRestartMinBackoffInSeconds: 10
230 persistentActorRestartMaxBackoffInSeconds: 40
231 persistentActorRestartResetBackoffInSeconds: 20
232 shardTransactionCommitTimeoutInSeconds: 120
233 shardIsolatedLeaderCheckIntervalInMillis: 30000
234 operationTimeoutInSeconds: 120
235 javaOptions:
236 maxGCPauseMillis: 100
237 parallelGCThreads : 3
Dan Timoneya98765b2020-09-14 11:57:55 -0400238 numberGCLogFiles: 10
239 minMemory: 512m
240 maxMemory: 2048m
241 gcLogOptions: ""
242 # Next line enables gc logging
243 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000244 # enables sdnr functionality
245 sdnr:
Alexander Dehn5c1105e2020-09-14 20:55:56 +0000246 enabled: true
Alexander Dehn9b797d62020-04-21 09:53:50 +0000247 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
248 # mode: dm - SDNC contains sdnr device manager + ODLUX components
249 mode: dm
250 # sdnronly: true starts sdnc container with odl and sdnrwt features only
251 sdnronly: false
252 sdnrdbTrustAllCerts: true
253 mountpointRegistrarEnabled: false
254 mountpointStateProviderEnabled: false
255
256
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400257
jmac065e2ce2018-03-29 01:18:02 +0000258# dependency / sub-chart configuration
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200259certInitializer:
260 nameOverride: sdnc-cert-initializer
Jozsef Csongvai9d4d5af2020-07-13 11:10:25 -0400261 truststoreMountpath: /opt/onap/sdnc/data/stores
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200262 fqdn: "sdnc"
263 app_ns: "org.osaaf.aaf"
264 fqi: "sdnc@sdnc.onap.org"
265 fqi_namespace: org.onap.sdnc
266 public_fqdn: "sdnc.onap.org"
267 aafDeployFqi: "deployer@people.osaaf.org"
268 aafDeployPass: demo123456!
269 cadi_latitude: "38.0"
270 cadi_longitude: "-72.0"
Krzysztof Opasiak6bab0cc2020-04-29 00:55:47 +0200271 credsPath: /opt/app/osaaf/local
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200272 aaf_add_config: >
273 cd /opt/app/osaaf/local;
274 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
Agarwal, Ruchira (ra1926)ec7c75e2019-10-01 17:36:24 +0000275
Alexander Dehn9b797d62020-04-21 09:53:50 +0000276# dependency / sub-chart configuration
277network-name-gen:
278 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100279mariadb-galera: &mariadbGalera
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100280 nameOverride: &sdnc-db sdnc-db
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100281 config: &mariadbGaleraConfig
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100282 rootPasswordExternalSecret: *rootDbSecret
283 userName: &dbUser sdnctl
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100284 userCredentialsExternalSecret: *dbSecretName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100285 rootUser:
286 externalSecret: *rootDbSecret
287 db:
288 user: *dbUser
289 externalSecret: *dbSecretName
jmac065e2ce2018-03-29 01:18:02 +0000290 service:
291 name: sdnc-dbhost
jmac065e2ce2018-03-29 01:18:02 +0000292 sdnctlPrefix: sdnc
293 persistence:
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000294 mountSubPath: sdnc/mariadb-galera
jmac065e2ce2018-03-29 01:18:02 +0000295 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000296 replicaCount: 1
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100297 serviceAccount:
298 nameOverride: *sdnc-db
jmac065e2ce2018-03-29 01:18:02 +0000299
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100300cds:
301 enabled: false
302
303dmaap-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000304 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100305 nameOverride: sdnc-dmaap-listener
306 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100307 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100308 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100309 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100310 mysqlDatabase: *sdncDbName
311 config:
312 sdncChartName: sdnc
313 dmaapPort: 3904
314 sdncPort: 8282
315 configDir: /opt/onap/sdnc/data/properties
316 odlCredsExternalSecret: *odlCredsSecretName
317
318ueb-listener:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000319 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100320 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100321 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100322 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100323 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100324 mysqlDatabase: *sdncDbName
325 nameOverride: sdnc-ueb-listener
326 config:
327 sdncPort: 8282
328 sdncChartName: sdnc
329 configDir: /opt/onap/sdnc/data/properties
330 odlCredsExternalSecret: *odlCredsSecretName
331
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100332sdnc-ansible-server:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000333 enabled: true
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100334 config:
335 restCredsExternalSecret: *ansibleSecretName
336 mariadb-galera:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100337 <<: *mariadbGalera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100338 config:
Konrad Bańkaa9d44032020-03-19 18:31:34 +0100339 <<: *mariadbGaleraConfig
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100340 mysqlDatabase: ansible
341 service:
342 name: sdnc-ansible-server
343 internalPort: 8000
344
jmac065e2ce2018-03-29 01:18:02 +0000345dgbuilder:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000346 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000347 nameOverride: sdnc-dgbuilder
Dan Timoneycb0a81f2020-07-15 17:31:43 -0400348 certInitializer:
349 nameOverride: sdnc-dgbuilder-cert-initializer
jmac065e2ce2018-03-29 01:18:02 +0000350 config:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100351 db:
352 dbName: *sdncDbName
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100353 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
354 ternary
355 (printf "%s-sdnc-db-root-password" (include "common.release" .))
356 (include "common.mariadb.secret.rootPassSecretName"
357 (dict "dot" . "chartName" "mariadb-galera")) }}'
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100358 userCredentialsExternalSecret: *dbSecretName
Mahendra Raghuwanshib76cb282019-04-09 10:13:07 +0000359 dbPodName: mariadb-galera
360 dbServiceName: mariadb-galera
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100361 # This should be revisited and changed to plain text
jmac70863e12018-05-16 14:53:03 +0000362 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100363 mariadb-galera:
jmac065e2ce2018-03-29 01:18:02 +0000364 service:
BorislavG1ffbd992018-04-24 07:56:27 +0000365 name: sdnc-dgbuilder
jmac065e2ce2018-03-29 01:18:02 +0000366 nodePort: "03"
367
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200368 ingress:
369 enabled: false
370 service:
371 - baseaddr: "sdnc-dgbuilder"
372 name: "sdnc-dgbuilder"
373 port: 3000
Alexander Dehn9b797d62020-04-21 09:53:50 +0000374 - baseaddr: "sdnc-web-service"
375 name: "sdnc-web-service"
376 port: 8443
Sylvain Desbureauxe54644e2020-05-04 11:45:16 +0200377 config:
378 ssl: "redirect"
379
Alexander Dehn9b797d62020-04-21 09:53:50 +0000380
381
Alexander Dehnab86ec12020-02-05 14:38:54 +0000382# local elasticsearch cluster
383localElasticCluster: true
384elasticsearch:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100385 nameOverride: &elasticSearchName sdnrdb
Alexander Dehnab86ec12020-02-05 14:38:54 +0000386 name: sdnrdb-cluster
Krzysztof Opasiakc6152ce2020-05-09 01:43:08 +0200387 certInitializer:
Alexander Dehnab86ec12020-02-05 14:38:54 +0000388 fqdn: "sdnc"
389 fqi_namespace: org.onap.sdnc
390 fqi: "sdnc@sdnc.onap.org"
391 service:
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100392 name: *elasticSearchName
Alexander Dehnab86ec12020-02-05 14:38:54 +0000393 master:
394 replicaCount: 3
395 # dedicatednode: "yes"
396 # working as master node only, in this case increase replicaCount for elasticsearch-data
397 # dedicatednode: "no"
398 # handles master and data node functionality
399 dedicatednode: "no"
Sylvain Desbureaux829344b2020-11-19 17:07:26 +0100400 nameOverride: *elasticSearchName
401 cluster_name: *elasticSearchName
Alexander Dehn9b797d62020-04-21 09:53:50 +0000402# enable
403sdnc-web:
Alexander Dehn8789a722020-10-16 14:29:05 +0000404 enabled: true
jmac065e2ce2018-03-29 01:18:02 +0000405# default number of instances
406replicaCount: 1
407
408nodeSelector: {}
409
410affinity: {}
411
412# probe configuration parameters
413liveness:
414 initialDelaySeconds: 10
415 periodSeconds: 10
416 # necessary to disable liveness probe when setting breakpoints
417 # in debugger so K8s doesn't restart unresponsive container
418 enabled: true
419
420readiness:
421 initialDelaySeconds: 10
422 periodSeconds: 10
423
424service:
425 type: NodePort
426 name: sdnc
BorislavG1ffbd992018-04-24 07:56:27 +0000427 portName: sdnc
jmac065e2ce2018-03-29 01:18:02 +0000428 internalPort: 8181
429 internalPort2: 8101
430 internalPort3: 8080
Timoney, Dan (dt5972)c6de2692019-08-14 14:22:37 -0400431 internalPort4: 8443
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400432
jmac065e2ce2018-03-29 01:18:02 +0000433 #port
434 externalPort: 8282
jmac065e2ce2018-03-29 01:18:02 +0000435
436 externalPort2: 8202
jmac065e2ce2018-03-29 01:18:02 +0000437
438 externalPort3: 8280
jmac065e2ce2018-03-29 01:18:02 +0000439
jmaca68f4cb2018-05-10 22:44:19 +0000440 externalPort4: 8443
441 nodePort4: 67
442
jmac065e2ce2018-03-29 01:18:02 +0000443 clusterPort: 2550
Mohammadreza Pasandidehb756fb72018-04-03 10:06:45 -0400444 clusterPort2: 2650
445 clusterPort3: 2681
446
447 geoNodePort1: 61
448 geoNodePort2: 62
449 geoNodePort3: 63
450 geoNodePort4: 64
451 geoNodePort5: 65
452 geoNodePort6: 66
jmac065e2ce2018-03-29 01:18:02 +0000453
jmac8d6dc962018-04-26 14:26:55 +0000454## Persist data to a persitent volume
455persistence:
456 enabled: true
457
458 ## A manually managed Persistent Volume and Claim
459 ## Requires persistence.enabled: true
460 ## If defined, PVC must be created manually before volume will be bound
461 # existingClaim:
462 volumeReclaimPolicy: Retain
463
464 ## database data Persistent Volume Storage Class
465 ## If defined, storageClassName: <storageClass>
466 ## If set to "-", storageClassName: "", which disables dynamic provisioning
467 ## If undefined (the default) or set to null, no storageClassName spec is
468 ## set, choosing the default provisioner. (gp2 on AWS, standard on
469 ## GKE, AWS & OpenStack)
470 accessMode: ReadWriteOnce
471 size: 1Gi
472 mountPath: /dockerdata-nfs
473 mountSubPath: sdnc/mdsal
474 mdsalPath: /opt/opendaylight/current/daexim
475
egernug27578332020-03-26 10:27:55 +0000476certpersistence:
477 enabled: true
478
479 ## A manually managed Persistent Volume and Claim
480 ## Requires persistence.enabled: true
481 ## If defined, PVC must be created manually before volume will be bound
482 # existingClaim:
483
484 volumeReclaimPolicy: Retain
485 accessMode: ReadWriteOnce
486 size: 50Mi
487 mountPath: /dockerdata-nfs
488 mountSubPath: sdnc/certs
489 certPath: /opt/app/osaaf
490 ##storageClass: "manual"
491
jmac065e2ce2018-03-29 01:18:02 +0000492ingress:
493 enabled: false
Lucjan Bryndza08448402019-11-27 14:26:54 +0100494 service:
Lucjan Bryndza05649652020-04-29 08:52:33 +0000495 - baseaddr: "sdnc.api"
Lucjan Bryndza08448402019-11-27 14:26:54 +0100496 name: "sdnc"
497 port: 8443
498 config:
499 ssl: "redirect"
jmac065e2ce2018-03-29 01:18:02 +0000500
toshrajbhardwaj72b5f0f2018-09-13 02:45:22 +0000501#Resource Limit flavor -By Default using small
502flavor: small
503#segregation for different envionment (Small and Large)
504
505resources:
Mandeep Khindade045712018-09-19 18:11:57 +0000506 small:
507 limits:
508 cpu: 2
509 memory: 4Gi
510 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000511 cpu: 1
512 memory: 2Gi
Mandeep Khindade045712018-09-19 18:11:57 +0000513 large:
514 limits:
515 cpu: 4
516 memory: 8Gi
517 requests:
Mandeep Khinda3c134252018-09-19 23:56:37 +0000518 cpu: 2
519 memory: 4Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000520 unlimited: {}