Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 1 | # Copyright © 2017 Amdocs, Bell Canada |
| 2 | # |
| 3 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | # you may not use this file except in compliance with the License. |
| 5 | # You may obtain a copy of the License at |
| 6 | # |
| 7 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | # |
| 9 | # Unless required by applicable law or agreed to in writing, software |
| 10 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | # See the License for the specific language governing permissions and |
| 13 | # limitations under the License. |
| 14 | |
| 15 | ################################################################# |
| 16 | # Global configuration defaults. |
| 17 | ################################################################# |
| 18 | global: # global defaults |
| 19 | nodePortPrefix: 302 |
| 20 | ubuntuInitRepository: registry.hub.docker.com |
| 21 | persistence: {} |
| 22 | |
| 23 | # application image |
| 24 | repository: nexus3.onap.org:10001 |
Andreas Geissler | 4ae3fad | 2022-11-09 11:04:24 +0100 | [diff] [blame] | 25 | image: onap/testsuite:1.11.1 |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 26 | pullPolicy: Always |
| 27 | |
| 28 | ubuntuInitImage: oomk8s/ubuntu-init:2.0.0 |
| 29 | |
| 30 | # flag to enable debugging - application support required |
| 31 | debugEnabled: false |
| 32 | |
| 33 | ################################################################# |
| 34 | # Application configuration defaults. |
| 35 | ################################################################# |
| 36 | config: |
| 37 | useIngressHost: |
| 38 | enabled: false |
| 39 | aaf_service: |
| 40 | enabled: true |
| 41 | https: true |
| 42 | hostname: aafservice |
| 43 | aai: |
| 44 | enabled: true |
| 45 | https: true |
| 46 | hostname: aai.api.sparky |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 47 | clamp: |
| 48 | enabled: true |
| 49 | https: true |
| 50 | cli: |
| 51 | enabled: true |
| 52 | https: true |
| 53 | dcae_healthcheck: |
| 54 | enabled: false |
| 55 | dcae_ves_collector: |
| 56 | enabled: false |
| 57 | dcae_ves_colector_https: |
| 58 | enabled: false |
| 59 | https: true |
| 60 | dmaap_dr_prov: |
| 61 | enabled: true |
| 62 | https: true |
| 63 | hostname: dmaapdrprov |
| 64 | dmaap_dr_node: |
| 65 | enabled: true |
| 66 | https: true |
| 67 | hostname: dmaapdrnode |
| 68 | log_es: |
| 69 | enabled: false |
| 70 | log_kibana: |
| 71 | enabled: false |
| 72 | log_ls_http: |
| 73 | enabled: false |
| 74 | pomba_aaictxbuilder: |
| 75 | enabled: false |
| 76 | pomba_sdctxbuilder: |
| 77 | enabled: false |
| 78 | pomba_networkdiscoveryctxbuilder: |
| 79 | enabled: false |
| 80 | pomba_servicedecomposition: |
| 81 | enabled: false |
| 82 | pomba_sdncctxbuilder: |
| 83 | enabled: false |
| 84 | pomba_networkdiscovery: |
| 85 | enabled: false |
| 86 | pomba_validation_service: |
| 87 | enabled: false |
| 88 | pomba_kibana: |
| 89 | enabled: false |
| 90 | pomba_es: |
| 91 | enabled: false |
| 92 | pomba_contextaggregator: |
| 93 | enabled: false |
| 94 | message_router: |
| 95 | enabled: false |
| 96 | https: true |
| 97 | dmaap_bc: |
| 98 | enabled: true |
| 99 | https: true |
| 100 | hostname: dmaapbc |
| 101 | music: |
| 102 | enabled: false |
| 103 | https: true |
| 104 | nbi: |
| 105 | enabled: false |
| 106 | https: true |
| 107 | oof_has_api: |
| 108 | enabled: true |
| 109 | https: true |
| 110 | oof_osdf: |
| 111 | enabled: true |
| 112 | https: true |
| 113 | hostname: oofsdf |
| 114 | oof_cmso: |
| 115 | enabled: false |
| 116 | https: true |
| 117 | msb_iag: |
| 118 | enabled: false |
| 119 | pdp: |
| 120 | enabled: false |
| 121 | drools: |
| 122 | enabled: false |
| 123 | policy_api: |
| 124 | enabled: false |
| 125 | policy_pap: |
| 126 | enabled: false |
| 127 | policy_distribution: |
| 128 | enabled: false |
| 129 | policy_xacml_pdp: |
| 130 | enabled: false |
| 131 | policy_apex_pdp: |
| 132 | enabled: false |
| 133 | policy_distribution: |
| 134 | enabled: false |
| 135 | portal_app: |
| 136 | enabled: false |
| 137 | https: true |
| 138 | hostname: portal.api |
| 139 | sdc_be: |
| 140 | enabled: true |
| 141 | https: true |
| 142 | sdc_onboarding_be: |
| 143 | enabled: false |
| 144 | https: true |
| 145 | sdc_fe: |
| 146 | enabled: true |
| 147 | hostname: sdc.api.fe |
| 148 | https: true |
| 149 | sdc_dcae_be: |
| 150 | enabled: false |
| 151 | https: true |
| 152 | sdnc: |
| 153 | enabled: false |
| 154 | https: true |
| 155 | sdnc_portal: |
| 156 | enabled: false |
| 157 | https: true |
| 158 | so: |
| 159 | enabled: true |
| 160 | hostname: so.api |
| 161 | so_sdc_controller: |
| 162 | enabled: false |
| 163 | so_pbmn_infra: |
| 164 | enabled: false |
| 165 | so_catalog_db_adapter: |
| 166 | enabled: false |
| 167 | so_openstack_adapter: |
| 168 | enabled: false |
| 169 | so_request_db_adapter: |
| 170 | enabled: false |
| 171 | so_sdnc_adapter: |
| 172 | enabled: false |
| 173 | so_vfc_adapter: |
| 174 | enabled: false |
| 175 | so_vnfm_adapter: |
| 176 | enabled: false |
| 177 | so_nssmf_adapter: |
| 178 | enabled: false |
| 179 | vid: |
| 180 | enabled: false |
| 181 | refrepo: |
| 182 | enabled: true |
| 183 | https: true |
| 184 | cds_blueprints_processor_http: |
| 185 | enabled: true |
| 186 | hostname: blueprintsprocessorhttp |
| 187 | dcae_hv_ves_collector: |
| 188 | enabled: false |
| 189 | message_router_kafka: |
| 190 | enabled: false |
| 191 | inventory: |
| 192 | enabled: false |
| 193 | https: true |
| 194 | deployment-handler: |
| 195 | enabled: false |
| 196 | https: true |
| 197 | aaf_sms: |
| 198 | enabled: false |
| 199 | https: true |
| 200 | |
| 201 | # for access to test logs |
| 202 | robotWebUser: "test" |
| 203 | robotWebPassword: "test" |
| 204 | |
| 205 | # openStackEncryptedPasswordHere should match the encrypted string used in SO and APPC and overridden per environment |
| 206 | openStackEncryptedPasswordHere: "c124921a3a0efbe579782cde8227681e" |
| 207 | openStackSoEncryptedPassword: "SAME_STRING_AS_SO_JAVA_ENCRYPTED_PASSWORD" |
| 208 | |
| 209 | # Demo configuration |
| 210 | # Nexus demo artifact version. Maps to GLOBAL_INJECTED_ARTIFACTS_VERSION |
| 211 | # 1.6.0 Frankfurt change or override for your release to match demo:vnfs/vFW/scripts/pom.xml version |
| 212 | demoArtifactsVersion: "1.7.0" |
| 213 | # Nexus demo artifact URL. |
| 214 | demoArtifactsRepoUrl: "https://nexus.onap.org/content/repositories/releases" |
| 215 | # Openstack medium sized flavour name. Maps GLOBAL_INJECTED_VM_FLAVOR |
| 216 | openStackFlavourMedium: "m1.medium" |
| 217 | |
| 218 | ################# Openstack .RC Parameters ################################333 |
| 219 | # KEYSTONE Version 3 Required for Rocky and beyond |
| 220 | # Openstack Keystone API version. Valid values are [ v2.0, v3 ]. Maps to GLOBAL_INJECTED_OPENSTACK_KEYSTONE_API_VERSION |
| 221 | openStackKeystoneAPIVersion: "v2.0" |
| 222 | |
| 223 | # OS_AUTH_URL without the /v3 or /v2.0 from the openstack .RC file |
| 224 | # Openstack keystone URL. Maps to GLOBAL_INJECTED_KEYSTONE |
| 225 | openStackKeyStoneUrl: "http://1.2.3.4:5000" |
| 226 | |
| 227 | # OS_PROJECT_ID from the openstack .RC file |
| 228 | # Openstack tenant UUID where VNFs will be spawned. Maps to GLOBAL_INJECTED_OPENSTACK_TENANT_ID |
| 229 | openStackTenantId: "47899782ed714295b1151681fdfd51f5" |
| 230 | |
| 231 | # OS_PROJECT_NAME from the openstack .RC file |
| 232 | # Project name of Openstack where VNFs will be spawned. Maps to GLOBAL_INJECTED_OPENSTACK_PROJECT_NAME |
| 233 | openStackProjectName: "onap" |
| 234 | |
| 235 | # OS_USERNAME from the openstack .RC file |
| 236 | # username for Openstack tenant where VNFs will be spawned. Maps to GLOBAL_INJECTED_OPENSTACK_USERNAME |
| 237 | openStackUserName: "tenantUsername" |
| 238 | |
| 239 | # OS_PROJECT_DOMAIN_ID from the openstack .RC file |
| 240 | # in some environments it is a string but in other environmens it may be a numeric |
| 241 | # Domain id of openstack where VNFs will be deployed. Maps to GLOBAL_INJECTED_OPENSTACK_DOMAIN_ID |
| 242 | openStackDomainId: "default" |
| 243 | |
| 244 | # OS_USER_DOMAIN from the openstack .RC file |
| 245 | # Use Domain of openstack where VNFs will be deployed. Maps to GLOBAL_INJECTED_OPENSTACK_USER_DOMAIN |
| 246 | openStackUserDomain: "Default" |
| 247 | |
| 248 | |
| 249 | # UUID of the Openstack network that can assign floating ips. Maps to GLOBAL_INJECTED_PUBLIC_NET_ID |
| 250 | openStackPublicNetId: "e8f51958045716781ffc" |
| 251 | openStackPublicNetworkName: "public" |
| 252 | # Openstack region. Maps to GLOBAL_INJECTED_REGION |
| 253 | openStackRegion: "RegionOne" |
| 254 | |
| 255 | |
| 256 | # Values for second cloud instante for VNF instantiatioen testing and keystone v3 |
| 257 | openStackRegionRegionThree: "RegionThree" |
| 258 | openStackKeyStoneUrlRegionThree: "http://1.2.3.4:5000" |
| 259 | openStackKeystoneAPIVersionRegionThree: "v3" |
| 260 | openStackUserNameRegionThree: "demo" |
| 261 | # this is the java encrypted password that is needed for SO |
| 262 | openSackMsoEncryptdPasswordRegionThree: "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" |
| 263 | openStackTenantIdRegionThree: "3583253e932845a09cd4c8ca2f31d095" |
| 264 | openStackProjectNameRegionThree: "Integration-SB-RegionThree" |
| 265 | openStackDomainIdRegionThree: "Default" |
| 266 | # |
| 267 | # Openstack glance image name for Ubuntu 14. Maps to GLOBAL_INJECTED_UBUNTU_1404_IMAGE |
| 268 | ubuntu14Image: "Ubuntu_14_trusty" |
| 269 | # Openstack glance image name for Ubuntu 16. Maps to GLOBAL_INJECTED_UBUNTU_1604_IMAGE |
| 270 | ubuntu16Image: "Ubuntu_16_xenial" |
| 271 | # DANOS image and flavor references |
| 272 | danosImage: "danos-ves-image" |
| 273 | danosFlavor: "danos" |
| 274 | # GLOBAL_INJECTED_SCRIPT_VERSION. Maps to GLOBAL_INJECTED_SCRIPT_VERSION |
| 275 | # 1.6.0 Frankfurt change or override for your release to match demo:vnfs/vFW/scripts/pom.xml version |
| 276 | scriptVersion: "1.7.0" |
| 277 | # Openstack network to which VNFs will bind their primary (first) interface. Maps to GLOBAL_INJECTED_NETWORK |
| 278 | openStackPrivateNetId: "e8f51956-00dd-4425-af36-045716781ffc" |
| 279 | # Openstack security group for instantiating VNFs |
| 280 | openStackSecurityGroup: "onap_sg" |
| 281 | # SDNC Preload configuration |
| 282 | # Openstack subnet UUID for the network defined by openStackPrivateNetId. Maps to onap_private_subnet_id |
| 283 | openStackPrivateSubnetId: "e8f51956-00dd-4425-af36-045716781ffc" |
| 284 | # CIDR notation for the Openstack private network where VNFs will be spawned. Maps to onap_private_net_cidr |
| 285 | openStackPrivateNetCidr: "10.0.0.0/8" |
| 286 | # The first 2 octets of the private Openstack subnet where VNFs will be spawned. |
| 287 | # Needed because sdnc preload templates hardcodes things like this 10.0.${ecompnet}.X |
| 288 | openStackOamNetworkCidrPrefix: "10.0" |
| 289 | # If you network allowed a /16 for the ONAP OAM then leave blank and robot will assign |
| 290 | # a random variable to be able to instantiate multple vFWCL, vLB etc in your environemtn |
| 291 | # if you only provided a /24 then provide the 3rd octet you use for your /24 |
| 292 | openStackOamNetwork3rdOctet: "" |
| 293 | # VID protocol/port until Selenium issue with SSL resolved |
| 294 | # https/8443 vs http/8080 |
| 295 | vidServerProtocol: "https" |
| 296 | vidServerPort: "8443" |
| 297 | # Override with Pub Key for access to VNF |
| 298 | vnfPubKey: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKXDgoo3+WOqcUG8/5uUbk81+yczgwC4Y8ywTmuQqbNxlY1oQ0YxdMUqUnhitSXs5S/yRuAVOYHwGg2mCs20oAINrP+mxBI544AMIb9itPjCtgqtE2EWo6MmnFGbHB4Sx3XioE7F4VPsh7japsIwzOjbrQe+Mua1TGQ5d4nfEOQaaglXLLPFfuc7WbhbJbK6Q7rHqZfRcOwAMXgDoBqlyqKeiKwnumddo2RyNT8ljYmvB6buz7KnMinzo7qB0uktVT05FH9Rg0CTWH5norlG5qXgP2aukL0gk1ph8iAt7uYLf1ktp+LJI2gaF6L0/qli9EmVCSLr1uJ38Q8CBflhkh imported-openssh-key" |
| 299 | # Override with Private Key for access to VNF |
| 300 | vnfPrivateKey: "onap_dev.yaml" |
| 301 | # Override with DCAE VES Collector external IP |
| 302 | dcaeCollectorIp: "FILL_IN_WITH_DCAE_VES_COLLECTOR_IP" |
| 303 | # kubernetes external IP for Portal GUI tests |
| 304 | kubernetesExternalIp: "10.0.0.14" |
| 305 | |
| 306 | |
| 307 | # Credentials for ONAP Component |
| 308 | # AAF |
| 309 | aafUsername: "demo@people.osaaf.org" |
| 310 | aafPassword: "demo123456!" |
| 311 | # AAI |
| 312 | aaiUsername: "aai@aai.onap.org" |
| 313 | aaiPassword: "demo123456!" |
othman touijer | 2b764d0 | 2022-01-05 14:40:37 +0100 | [diff] [blame] | 314 | # SDC |
| 315 | sdcUsername: "beep" |
| 316 | sdcPassword: "boop" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 317 | # DCAE |
| 318 | dcaeUsername: "dcae@dcae.onap.org" |
| 319 | dcaePassword: "demo123456!" |
Jack Lucas | 7e843bf | 2021-03-16 08:54:27 -0400 | [diff] [blame] | 320 | dcaeMsUsername: "dcae@dcae.onap.org" |
| 321 | dcaeMsPassword: "demo123456!" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 322 | # DROOLS |
| 323 | droolsUsername: "demo@people.osaaf.org" |
| 324 | droolsPassword: "demo123456!" |
| 325 | # OOF |
| 326 | oofCmsoUsername: "oof@oof.onap.org" |
| 327 | oofCmsoPassword: "demo123456!" |
| 328 | # POLICY |
| 329 | policyAuth: "dGVzdHBkcDphbHBoYTEyMw==" |
| 330 | policyClientAuth: "cHl0aG9uOnRlc3Q=" |
| 331 | policyUsername: "demo@people.osaaf.org" |
| 332 | policyPassword: "demo123456!" |
| 333 | policyComponentUsername: "healthcheck" |
| 334 | policyComponentPassword: "zb!XztG34" |
adheli.tavares | eada20b | 2021-11-29 09:14:13 +0000 | [diff] [blame] | 335 | policyAdminUsername: "policyadmin" |
| 336 | policyAdminPassword: "zb!XztG34" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 337 | # PORTAL |
| 338 | portalUsername: "demo" |
| 339 | portalPassword: "Kp8bJ4SXszM0WXlhak3eHlcse" |
| 340 | # SO |
| 341 | soUsername: "InfraPortalClient" |
| 342 | soPassword: "password1$" |
| 343 | soCatdbUsername: "bpel" |
| 344 | soCatdbPassword: "password1$" |
| 345 | # SDNC |
| 346 | sdncUsername: "admin" |
| 347 | sdncPassword: "Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U" |
| 348 | # VID |
| 349 | vidUsername: "demo" |
| 350 | vidPassword: "Kp8bJ4SXszM0WX" |
| 351 | vidHealthUsername: "Default" |
| 352 | vidHealthPassword: "AppPassword!1" |
| 353 | # DMAAP BC |
| 354 | bcUsername: "dmaap-bc@dmaap-bc.onap.org" |
| 355 | bcPassword: "demo123456!" |
efiacor | 26c1f7a | 2022-04-25 13:27:18 +0100 | [diff] [blame] | 356 | |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 357 | # DMAAP KAFKA JAAS |
| 358 | kafkaJaasUsername: "admin" |
| 359 | kafkaJaasPassword: "admin_secret" |
| 360 | |
efiacor | 26c1f7a | 2022-04-25 13:27:18 +0100 | [diff] [blame] | 361 | # STRIMZI KAFKA JAAS |
| 362 | strimziKafkaJaasUsername: "strimzi-kafka-admin" |
| 363 | |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 364 | #OOF |
| 365 | oofUsername: "oof@oof.onap.org" |
| 366 | oofPassword: "demo123456!" |
| 367 | cmsoUsername: "oof@oof.onap.org" |
| 368 | cmsoPassword: "demo123456!" |
| 369 | oofOsdfPciOptUsername: "oof@oof.onap.org" |
| 370 | oofOsdfPciOptPassword: "demo123456!" |
| 371 | oofHomingUsername: "admin1" |
| 372 | oofHomingPassword: "plan.15" |
| 373 | |
Krzysztof Kuzmicki | 0b06cdd | 2021-09-30 14:13:39 +0200 | [diff] [blame] | 374 | #K8S chart repository - ChartMuseum |
| 375 | k8sChartRepoUsername: "onapinitializer" |
| 376 | k8sChartRepoPassword: "demo123456!" |
| 377 | |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 378 | |
| 379 | # default number of instances |
| 380 | replicaCount: 1 |
| 381 | |
| 382 | nodeSelector: {} |
| 383 | |
| 384 | affinity: {} |
| 385 | |
| 386 | # Resource Limit flavor -By Default using small |
| 387 | flavor: small |
| 388 | # Segregation for Different environment (Small and Large) |
| 389 | resources: |
| 390 | small: |
| 391 | limits: |
| 392 | cpu: 2000m |
| 393 | memory: 4Gi |
| 394 | requests: |
| 395 | cpu: 500m |
| 396 | memory: 1Gi |
| 397 | large: |
| 398 | limits: |
| 399 | cpu: 4000m |
| 400 | memory: 8Gi |
| 401 | requests: |
| 402 | cpu: 1000m |
| 403 | memory: 2Gi |
| 404 | unlimited: {} |
| 405 | |
| 406 | # probe configuration parameters |
| 407 | liveness: |
| 408 | initialDelaySeconds: 180 |
| 409 | periodSeconds: 10 |
| 410 | # necessary to disable liveness probe when setting breakpoints |
| 411 | # in debugger so K8s doesn't restart unresponsive container |
| 412 | enabled: true |
| 413 | |
| 414 | readiness: |
| 415 | initialDelaySeconds: 180 |
| 416 | periodSeconds: 10 |
| 417 | |
| 418 | service: |
| 419 | name: robot |
Michal Jagiello | 323baaf | 2022-04-01 13:00:09 +0000 | [diff] [blame] | 420 | type: ClusterIP |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 421 | portName: httpd |
| 422 | externalPort: 443 |
| 423 | internalPort: 443 |
| 424 | nodePort: "09" |
| 425 | |
| 426 | ingress: |
| 427 | enabled: false |
| 428 | service: |
Andreas Geissler | 51900a9 | 2022-08-03 13:10:35 +0200 | [diff] [blame] | 429 | - baseaddr: "robot-api" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 430 | name: "robot" |
| 431 | port: 443 |
| 432 | config: |
| 433 | ssl: "redirect" |
| 434 | |
| 435 | |
| 436 | ## Persist data to a persitent volume |
| 437 | persistence: |
| 438 | enabled: true |
| 439 | |
| 440 | ## A manually managed Persistent Volume and Claim |
| 441 | ## Requires persistence.enabled: true |
| 442 | ## If defined, PVC must be created manually before volume will be bound |
| 443 | # existingClaim: |
| 444 | volumeReclaimPolicy: Retain |
| 445 | |
| 446 | ## database data Persistent Volume Storage Class |
| 447 | ## If defined, storageClassName: <storageClass> |
| 448 | ## If set to "-", storageClassName: "", which disables dynamic provisioning |
| 449 | ## If undefined (the default) or set to null, no storageClassName spec is |
| 450 | ## set, choosing the default provisioner. (gp2 on AWS, standard on |
| 451 | ## GKE, AWS & OpenStack) |
| 452 | ## |
| 453 | # storageClass: "-" |
| 454 | accessMode: ReadWriteOnce |
| 455 | size: 2Gi |
| 456 | mountPath: /dockerdata-nfs |
| 457 | mountSubPath: robot/logs |
Krzysztof Kuzmicki | 6c6269d | 2022-03-25 11:51:18 +0100 | [diff] [blame] | 458 | |
| 459 | #Pods Service Account |
| 460 | serviceAccount: |
| 461 | nameOverride: robot |
| 462 | roles: |
Andreas Geissler | 2156401 | 2022-10-27 15:00:10 +0200 | [diff] [blame] | 463 | - read |