vaibhav_16dec | e04b2fe | 2018-03-22 09:07:12 +0000 | [diff] [blame] | 1 | # Copyright © 2017 Amdocs, Bell Canada |
| 2 | # |
| 3 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | # you may not use this file except in compliance with the License. |
| 5 | # You may obtain a copy of the License at |
| 6 | # |
| 7 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | # |
| 9 | # Unless required by applicable law or agreed to in writing, software |
| 10 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | # See the License for the specific language governing permissions and |
| 13 | # limitations under the License. |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 14 | # Default values for mariadb. |
| 15 | # This is a YAML-formatted file. |
| 16 | # Declare variables to be passed into your templates. |
jmac | c4f04d3 | 2018-10-12 18:24:24 +0000 | [diff] [blame] | 17 | ################################################################# |
| 18 | # Global configuration defaults. |
| 19 | ################################################################# |
| 20 | global: |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 21 | nodePortPrefix: 302 |
jmac | c4f04d3 | 2018-10-12 18:24:24 +0000 | [diff] [blame] | 22 | nodePortPrefixExt: 304 |
| 23 | repository: nexus3.onap.org:10001 |
Sylvain Desbureaux | 1694e1d | 2020-08-21 09:58:25 +0200 | [diff] [blame] | 24 | readinessImage: onap/oom/readiness:3.0.1 |
Mandeep Khinda | 0fe4eb7 | 2018-04-20 21:02:45 +0000 | [diff] [blame] | 25 | ubuntuInitRepository: registry.hub.docker.com |
seshukm | 0df1f8e | 2020-08-17 21:45:49 +0530 | [diff] [blame] | 26 | mariadbGalera: |
Sylvain Desbureaux | d055a17 | 2020-10-30 14:32:03 +0100 | [diff] [blame] | 27 | nameOverride: &mariadbName mariadb-galera |
seshukm | 0df1f8e | 2020-08-17 21:45:49 +0530 | [diff] [blame] | 28 | serviceName: mariadb-galera |
| 29 | servicePort: "3306" |
| 30 | migration: |
| 31 | enabled: false |
| 32 | dbHost: mariadb-galera |
| 33 | dbPort: 3306 |
| 34 | dbUser: root |
| 35 | dbPassword: secretpassword |
Sylvain Desbureaux | d055a17 | 2020-10-30 14:32:03 +0100 | [diff] [blame] | 36 | |
| 37 | readinessCheck: |
| 38 | wait_for: |
| 39 | - *mariadbName |
| 40 | |
jmac | c4f04d3 | 2018-10-12 18:24:24 +0000 | [diff] [blame] | 41 | ################################################################# |
Krzysztof Opasiak | 2f8f4b6 | 2020-03-04 23:06:16 +0100 | [diff] [blame] | 42 | # Secrets metaconfig |
| 43 | ################################################################# |
| 44 | secrets: |
| 45 | - uid: db-root-pass |
| 46 | name: '{{ include "common.release" . }}-so-mariadb-root-pass' |
| 47 | type: password |
Krzysztof Opasiak | c53ff54 | 2020-03-28 02:14:37 +0100 | [diff] [blame] | 48 | externalSecret: '{{ tpl (default "" .Values.db.rootPasswordExternalSecret) . }}' |
Krzysztof Opasiak | 2f8f4b6 | 2020-03-04 23:06:16 +0100 | [diff] [blame] | 49 | password: '{{ .Values.db.rootPassword }}' |
| 50 | passwordPolicy: required |
| 51 | - uid: db-backup-creds |
| 52 | name: '{{ include "common.release" . }}-so-mariadb-backup-creds' |
| 53 | type: basicAuth |
Krzysztof Opasiak | c53ff54 | 2020-03-28 02:14:37 +0100 | [diff] [blame] | 54 | externalSecret: '{{ tpl (default "" .Values.db.backupCredsExternalSecret) . }}' |
Krzysztof Opasiak | 2f8f4b6 | 2020-03-04 23:06:16 +0100 | [diff] [blame] | 55 | login: '{{ .Values.db.backupUser }}' |
| 56 | password: '{{ .Values.db.backupPassword }}' |
| 57 | passwordPolicy: required |
| 58 | annotations: |
| 59 | helm.sh/hook: pre-upgrade,pre-install |
| 60 | helm.sh/hook-weight: "0" |
| 61 | helm.sh/hook-delete-policy: before-hook-creation |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 62 | - uid: db-user-creds |
| 63 | type: basicAuth |
Krzysztof Opasiak | c53ff54 | 2020-03-28 02:14:37 +0100 | [diff] [blame] | 64 | externalSecret: '{{ tpl (default "" .Values.db.userCredsExternalSecret) . }}' |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 65 | login: '{{ .Values.db.userName }}' |
| 66 | password: '{{ .Values.db.userPassword }}' |
| 67 | - uid: db-admin-creds |
| 68 | type: basicAuth |
Krzysztof Opasiak | c53ff54 | 2020-03-28 02:14:37 +0100 | [diff] [blame] | 69 | externalSecret: '{{ tpl (default "" .Values.db.adminCredsExternalSecret) . }}' |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 70 | login: '{{ .Values.db.adminName }}' |
| 71 | password: '{{ .Values.db.adminPassword }}' |
| 72 | - uid: camunda-db-creds |
| 73 | type: basicAuth |
Krzysztof Opasiak | c53ff54 | 2020-03-28 02:14:37 +0100 | [diff] [blame] | 74 | externalSecret: '{{ tpl (default "" .Values.db.camunda.dbCredsExternalSecret) . }}' |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 75 | login: '{{ .Values.db.camunda.userName }}' |
| 76 | password: '{{ .Values.db.camunda.password }}' |
| 77 | - uid: request-db-creds |
| 78 | type: basicAuth |
Krzysztof Opasiak | c53ff54 | 2020-03-28 02:14:37 +0100 | [diff] [blame] | 79 | externalSecret: '{{ tpl (default "" .Values.db.request.dbCredsExternalSecret) . }}' |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 80 | login: '{{ .Values.db.request.userName }}' |
| 81 | password: '{{ .Values.db.request.password }}' |
| 82 | - uid: catalog-db-creds |
| 83 | type: basicAuth |
Krzysztof Opasiak | c53ff54 | 2020-03-28 02:14:37 +0100 | [diff] [blame] | 84 | externalSecret: '{{ tpl (default "" .Values.db.catalog.dbCredsExternalSecret) . }}' |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 85 | login: '{{ .Values.db.catalog.userName }}' |
| 86 | password: '{{ .Values.db.catalog.password }}' |
rope252 | 4df5519 | 2020-08-24 13:55:58 +0100 | [diff] [blame] | 87 | - uid: nfvo-db-creds |
| 88 | type: basicAuth |
| 89 | externalSecret: '{{ tpl (default "" .Values.db.nfvo.dbCredsExternalSecret) . }}' |
| 90 | login: '{{ .Values.db.nfvo.userName }}' |
| 91 | password: '{{ .Values.db.nfvo.password }}' |
Krzysztof Opasiak | 2f8f4b6 | 2020-03-04 23:06:16 +0100 | [diff] [blame] | 92 | |
| 93 | ################################################################# |
jmac | c4f04d3 | 2018-10-12 18:24:24 +0000 | [diff] [blame] | 94 | # Application configuration defaults. |
| 95 | ################################################################# |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 96 | # application image |
| 97 | repository: nexus3.onap.org:10001 |
Ramesh Parthasarathy | a4aaf36 | 2019-03-13 20:59:51 +0000 | [diff] [blame] | 98 | image: mariadb:10.1.38 |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 99 | pullPolicy: Always |
Mandeep Khinda | 0fe4eb7 | 2018-04-20 21:02:45 +0000 | [diff] [blame] | 100 | ubuntuInitImage: oomk8s/ubuntu-init:2.0.0 |
jmac | c4f04d3 | 2018-10-12 18:24:24 +0000 | [diff] [blame] | 101 | |
Krzysztof Opasiak | 2f8f4b6 | 2020-03-04 23:06:16 +0100 | [diff] [blame] | 102 | # db config |
| 103 | db: |
| 104 | rootPassword: secretpassword |
| 105 | # rootPasswordExternalSecret: some secret |
| 106 | backupPassword: secretpassword |
| 107 | backupUser: root |
| 108 | # backupCredsExternalSecret: some secret |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 109 | userName: so_user |
| 110 | userPassword: so_User123 |
| 111 | # userCredsExternalSecret: some secret |
| 112 | adminName: so_admin |
| 113 | adminPassword: so_Admin123 |
| 114 | # adminCredsExternalSecret: some secret |
| 115 | camunda: |
| 116 | userName: camundauser |
| 117 | password: camunda123 |
| 118 | # dbCredsExternalSecret: some secret |
| 119 | request: |
| 120 | userName: requestuser |
| 121 | password: request123 |
| 122 | # dbCredsExternalSecret: some secret |
| 123 | catalog: |
| 124 | userName: cataloguser |
| 125 | password: catalog123 |
| 126 | # dbCredsExternalSecret: some secret |
rope252 | 4df5519 | 2020-08-24 13:55:58 +0100 | [diff] [blame] | 127 | nfvo: |
| 128 | userName: nfvouser |
| 129 | # dbCredsExternalSecret: some secret |
Krzysztof Opasiak | f68b728 | 2020-03-25 23:22:46 +0100 | [diff] [blame] | 130 | |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 131 | # application configuration |
| 132 | config: |
Mandeep Khinda | 0fe4eb7 | 2018-04-20 21:02:45 +0000 | [diff] [blame] | 133 | # gerrit branch where the latest heat code is checked in |
Ramesh Parthasarathy | bef9c7b | 2019-03-01 21:21:20 +0000 | [diff] [blame] | 134 | gerritBranch: master |
Mandeep Khinda | 0fe4eb7 | 2018-04-20 21:02:45 +0000 | [diff] [blame] | 135 | # gerrit project where the latest heat code is checked in |
| 136 | gerritProject: http://gerrit.onap.org/r/so/docker-config.git |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 137 | # default number of instances |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 138 | nodeSelector: {} |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 139 | affinity: {} |
Mahendra Raghuwanshi | 72b69c1 | 2019-04-04 10:43:25 +0000 | [diff] [blame] | 140 | |
| 141 | ingress: |
| 142 | enabled: false |
| 143 | |
| 144 | # Resource Limit flavor |
| 145 | flavor: small |
| 146 | |
| 147 | resources: |
| 148 | small: |
| 149 | limits: |
| 150 | cpu: 2 |
| 151 | memory: 4Gi |
| 152 | requests: |
| 153 | cpu: 1 |
| 154 | memory: 2Gi |
| 155 | large: |
| 156 | limits: |
| 157 | cpu: 4 |
| 158 | memory: 8Gi |
| 159 | requests: |
| 160 | cpu: 2 |
| 161 | memory: 4Gi |
| 162 | unlimited: {} |
| 163 | |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 164 | persistence: |
| 165 | enabled: true |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 166 | ## A manually managed Persistent Volume and Claim |
| 167 | ## Requires persistence.enabled: true |
| 168 | ## If defined, PVC must be created manually before volume will be bound |
| 169 | # existingClaim: |
| 170 | volumeReclaimPolicy: Retain |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 171 | ## database data Persistent Volume Storage Class |
| 172 | ## If defined, storageClassName: <storageClass> |
| 173 | ## If set to "-", storageClassName: "", which disables dynamic provisioning |
| 174 | ## If undefined (the default) or set to null, no storageClassName spec is |
| 175 | ## set, choosing the default provisioner. (gp2 on AWS, standard on |
| 176 | ## GKE, AWS & OpenStack) |
| 177 | ## |
| 178 | # storageClass: "-" |
| 179 | accessMode: ReadWriteMany |
| 180 | size: 2Gi |
Mahendra Raghuwanshi | 72b69c1 | 2019-04-04 10:43:25 +0000 | [diff] [blame] | 181 | |
Mike Elliott | d32d36e | 2018-02-12 15:54:03 -0500 | [diff] [blame] | 182 | mountPath: /dockerdata-nfs |
Mahendra Raghuwanshi | 72b69c1 | 2019-04-04 10:43:25 +0000 | [diff] [blame] | 183 | mountSubPath: so/migration |