blob: 4a361c651660c8eb8c915fae0e940e09fde25089 [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
seshukm0df1f8e2020-08-17 21:45:49 +05302# Copyright © 2020 Huawei
Sylvain Desbureauxd3114052021-02-23 16:45:52 +01003# Copyright © 2021 Orange
egernugd3c55ab2023-01-19 15:50:37 +00004# Modifications Copyright © 2023 Nordix Foundation
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00005# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000016#################################################################
17# Global configuration defaults.
18#################################################################
19global:
20 nodePortPrefix: 302
21 nodePortPrefixExt: 304
Maciej Wereskidf9ba222021-11-05 14:38:18 +000022 centralizedLoggingEnabled: true
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000023 mariadbGalera:
24 nameOverride: mariadb-galera
25 serviceName: mariadb-galera
rope2524d3f3682020-09-02 20:49:21 +010026 servicePort: '3306'
krishnaa9692b606b2020-10-30 11:29:21 +053027 service: mariadb-galera
28 internalPort: '3306'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010029 # mariadbRootPassword: secretpassword
30 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053031 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000032 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
33 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000034 persistence:
35 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020036 #This configuration specifies Service and port for SDNC OAM interface
37 sdncOamService: sdnc-oam
38 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000039 #This configuration will run the migration. The configurations are for backing up the data
40 #from DB and then restoring it to the present versions preferred DB.
41 migration:
42 enabled: false
43 dbHost: mariadb-galera
44 dbPort: 3306
45 dbUser: root
46 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010047 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000048 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000049 app:
50 siteName: onapheat
51 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
52 defaultCloudOwner: onap
sekharhuawei2e799e92020-11-14 17:06:56 +053053
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010054readinessCheck:
55 wait_for:
Prabhjot Singh Sethi46e17562021-08-20 22:40:23 +053056 jobs:
57 - '{{ include "common.release" . }}-so-mariadb-config-job'
Sylvain Desbureauxd055a172020-10-30 14:32:03 +010058
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010059#################################################################
60# Secrets metaconfig
61#################################################################
62secrets:
63 - uid: db-root-pass
64 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
65 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010066 externalSecret: '{{ .Values.global.mariadbGalera.localCluster | ternary
67 .Values.global.mariadbGalera.rootPasswordExternalSecret
68 (default (include "common.mariadb.secret.rootPassSecretName"
69 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride))
70 .Values.global.mariadbGalera.rootPasswordExternalSecret) }}'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010071 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
72 - uid: db-backup-creds
73 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
74 type: basicAuth
75 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
76 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
77 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
78 passwordPolicy: required
79 annotations:
80 helm.sh/hook: pre-upgrade,pre-install
rope2524d3f3682020-09-02 20:49:21 +010081 helm.sh/hook-weight: '0'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010082 helm.sh/hook-delete-policy: before-hook-creation
83 - uid: db-user-creds
84 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
85 type: basicAuth
86 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
87 login: '{{ .Values.dbCreds.userName }}'
88 password: '{{ .Values.dbCreds.userPassword }}'
89 passwordPolicy: generate
90 - uid: db-admin-creds
91 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
92 type: basicAuth
93 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
94 login: '{{ .Values.dbCreds.adminName }}'
95 password: '{{ .Values.dbCreds.adminPassword }}'
96 passwordPolicy: generate
sekharhuawei2e799e92020-11-14 17:06:56 +053097 - uid: 'mso-key'
Priyadharshini7dc03852020-08-27 04:36:03 -070098 name: &mso-key '{{ include "common.release" . }}-mso-key'
99 type: password
sekharhuawei2e799e92020-11-14 17:06:56 +0530100 password: '{{ .Values.mso.msoKey }}'
Priyadharshini7dc03852020-08-27 04:36:03 -0700101 - uid: mso-oof-auth
102 name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
103 type: basicAuth
104 login: '{{ .Values.mso.oof.login }}'
105 password: '{{ .Values.mso.oof.password }}'
106 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530107 - uid: server-actuator-creds
108 name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
109 type: basicAuth
110 externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
111 login: '{{ .Values.server.actuator.username }}'
112 password: '{{ .Values.server.actuator.password }}'
113 passwordPolicy: required
114 - uid: server-bpel-creds
115 name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
116 type: basicAuth
117 externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
118 login: '{{ .Values.server.bpel.username }}'
119 password: '{{ .Values.server.bpel.password }}'
120 passwordPolicy: required
sekharhuawei2e799e92020-11-14 17:06:56 +0530121 - uid: so-aai-creds
122 name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
123 type: basicAuth
124 externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
125 login: '{{ .Values.server.aai.username }}'
126 password: '{{ .Values.server.aai.password }}'
127 passwordPolicy: required
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100128
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100129##################################################################
jmacc4f04d32018-10-12 18:24:24 +0000130# Application configuration defaults.
131#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100132
133dbSecrets: &dbSecrets
134 userCredsExternalSecret: *dbUserCredsSecretName
135 adminCredsExternalSecret: *dbAdminCredsSecretName
136
137# unused in this, just to pass to subcharts
138dbCreds:
139 userName: so_user
140 adminName: so_admin
141
Lukasz Rajewski3f0b0a72023-04-17 16:15:48 +0000142image: onap/so/api-handler-infra:1.12.1
sekharhuawei2e799e92020-11-14 17:06:56 +0530143
144server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530145 aai:
146 username: aai@aai.onap.org
147 password: demo123456!
148 # aaiCredsExternalSecret: some secret
149 actuator:
150 username: mso_admin
151 password: password1$
152 # actuatorCredsExternalSecret: some secret
153 bpel:
154 username: bpel
155 password: password1$
156 # bpelCredsExternalSecret: some secret
157
jmacc4f04d32018-10-12 18:24:24 +0000158pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000159replicaCount: 1
160minReadySeconds: 10
seshukm0df1f8e2020-08-17 21:45:49 +0530161containerPort: &containerPort 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000162logPath: ./logs/apih/
163app: api-handler-infra
164service:
seshukm0df1f8e2020-08-17 21:45:49 +0530165 type: NodePort
seshukm0df1f8e2020-08-17 21:45:49 +0530166 internalPort: *containerPort
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100167 ports:
168 - name: http
169 port: *containerPort
170 nodePort: '77'
171 annotations:
172 msb.onap.org/service-info: |
173 {{ if .Values.global.msbEnabled -}}[
174 {
175 "serviceName": "so",
176 "version": "v1",
177 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
178 "protocol": "REST",
179 "port": "{{ .Values.service.internalPort }}",
180 "visualRange":"0",
181 "lb_policy":"ip_hash"
182 },
183 {
184 "serviceName": "so",
185 "version": "v1",
186 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
187 "protocol": "REST",
188 "port": "{{ .Values.service.internalPort }}",
189 "visualRange":"0",
190 "lb_policy":"ip_hash"
191 },
192 {
193 "serviceName": "so",
194 "version": "v1",
195 "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
196 "protocol": "REST",
197 "port": "{{ .Values.service.internalPort }}",
198 "visualRange":"0",
199 "lb_policy":"ip_hash"
200 },
201 {
202 "serviceName": "so",
203 "version": "v1",
204 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
205 "protocol": "REST",
206 "port": "{{ .Values.service.internalPort }}",
207 "visualRange":"0",
208 "lb_policy":"ip_hash"
209 },
210 {
211 "serviceName": "so",
212 "version": "v1",
213 "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
214 "protocol": "REST",
215 "port": "{{ .Values.service.internalPort }}",
216 "visualRange":"0",
217 "lb_policy":"ip_hash"
218 },
219 {
220 "serviceName": "so",
221 "version": "v1",
222 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
223 "protocol": "REST",
224 "port": "{{ .Values.service.internalPort }}",
225 "visualRange":"0",
226 "lb_policy":"ip_hash"
227 },
228 {
229 "serviceName": "so",
230 "version": "v1",
231 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
232 "protocol": "REST",
233 "port": "{{ .Values.service.internalPort }}",
234 "visualRange":"0",
235 "lb_policy":"ip_hash"
236 },
237 {
238 "serviceName": "so",
239 "version": "v1",
240 "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
241 "protocol": "REST",
242 "port": "{{ .Values.service.internalPort }}",
243 "visualRange":"0",
244 "lb_policy":"ip_hash"
245 },
246 {
247 "serviceName": "so",
248 "version": "v1",
249 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
250 "protocol": "REST",
251 "port": "{{ .Values.service.internalPort }}",
252 "visualRange":"0",
253 "lb_policy":"ip_hash"
254 },
255 {
256 "serviceName": "so",
257 "version": "v1",
258 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
259 "protocol": "REST",
260 "port": "{{ .Values.service.internalPort }}",
261 "visualRange":"0",
262 "lb_policy":"ip_hash"
263 },
264 {
265 "serviceName": "so",
266 "version": "v1",
267 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
268 "protocol": "REST",
269 "port": "{{ .Values.service.internalPort }}",
270 "visualRange":"0",
271 "lb_policy":"ip_hash"
272 },
273 {
274 "serviceName": "so",
275 "version": "v1",
276 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
277 "protocol": "REST",
278 "port": "{{ .Values.service.internalPort }}",
279 "visualRange":"0",
280 "lb_policy":"ip_hash"
281 },
282 {
283 "serviceName": "so",
284 "version": "v1",
285 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
286 "protocol": "REST",
287 "port": "{{ .Values.service.internalPort }}",
288 "visualRange":"0",
289 "lb_policy":"ip_hash"
290 },
291 {
292 "serviceName": "so",
293 "version": "v1",
294 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
295 "protocol": "REST",
296 "port": "{{ .Values.service.internalPort }}",
297 "visualRange":"0",
298 "lb_policy":"ip_hash"
299 },
300 {
301 "serviceName": "so",
302 "version": "v1",
303 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
304 "protocol": "REST",
305 "port": "{{ .Values.service.internalPort }}",
306 "visualRange":"0",
307 "lb_policy":"ip_hash"
308 },
309 {
310 "serviceName": "so",
311 "version": "v1",
312 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
313 "protocol": "REST",
314 "port": "{{ .Values.service.internalPort }}",
315 "visualRange":"0",
316 "lb_policy":"ip_hash"
317 },
318 {
319 "serviceName": "so",
320 "version": "v1",
321 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
322 "protocol": "REST",
323 "port": "{{ .Values.service.internalPort }}",
324 "visualRange":"0",
325 "lb_policy":"ip_hash"
326 },
327 {
328 "serviceName": "so",
329 "version": "v1",
330 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
331 "protocol": "REST",
332 "port": "{{ .Values.service.internalPort }}",
333 "visualRange":"0",
334 "lb_policy":"ip_hash"
335 },
336 {
337 "serviceName": "so",
338 "version": "v1",
339 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
340 "protocol": "REST",
341 "port": "{{ .Values.service.internalPort }}",
342 "visualRange":"0",
343 "lb_policy":"ip_hash"
344 },
345 {
346 "serviceName": "so",
347 "version": "v1",
348 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
349 "protocol": "REST",
350 "port": "{{ .Values.service.internalPort }}",
351 "visualRange":"0",
352 "lb_policy":"ip_hash"
353 },
354 {
355 "serviceName": "so",
356 "version": "v1",
357 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
358 "protocol": "REST",
359 "port": "{{ .Values.service.internalPort }}",
360 "visualRange":"0",
361 "lb_policy":"ip_hash"
362 },
363 {
364 "serviceName": "so",
365 "version": "v1",
366 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
367 "protocol": "REST",
368 "port": "{{ .Values.service.internalPort }}",
369 "visualRange":"0",
370 "lb_policy":"ip_hash"
371 },
372 {
373 "serviceName": "so",
374 "version": "v1",
375 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
376 "protocol": "REST",
377 "port": "{{ .Values.service.internalPort }}",
378 "visualRange":"0",
379 "lb_policy":"ip_hash"
380 },
381 {
382 "serviceName": "so",
383 "version": "v1",
384 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
385 "protocol": "REST",
386 "port": "{{ .Values.service.internalPort }}",
387 "visualRange":"0",
388 "lb_policy":"ip_hash"
389 },
390 {
391 "serviceName": "so",
392 "version": "v1",
393 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
394 "protocol": "REST",
395 "port": "{{ .Values.service.internalPort }}",
396 "visualRange":"0",
397 "lb_policy":"ip_hash"
398 },
399 {
400 "serviceName": "so",
401 "version": "v1",
402 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
403 "protocol": "REST",
404 "port": "{{ .Values.service.internalPort }}",
405 "visualRange":"0",
406 "lb_policy":"ip_hash"
407 },
408 {
409 "serviceName": "so",
410 "version": "v1",
411 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
412 "protocol": "REST",
413 "port": "{{ .Values.service.internalPort }}",
414 "visualRange":"0",
415 "lb_policy":"ip_hash"
416 },
417 {
418 "serviceName": "so",
419 "version": "v1",
420 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
421 "protocol": "REST",
422 "port": "{{ .Values.service.internalPort }}",
423 "visualRange":"0",
424 "lb_policy":"ip_hash"
425 },
426 {
427 "serviceName": "so",
428 "version": "v1",
429 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
430 "protocol": "REST",
431 "port": "{{ .Values.service.internalPort }}",
432 "visualRange":"0",
433 "lb_policy":"ip_hash"
434 },
435 {
436 "serviceName": "so",
437 "version": "v1",
438 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
439 "protocol": "REST",
440 "port": "{{ .Values.service.internalPort }}",
441 "visualRange":"0",
442 "lb_policy":"ip_hash"
443 },
444 {
445 "serviceName": "so",
446 "version": "v1",
447 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
448 "protocol": "REST",
449 "port": "{{ .Values.service.internalPort }}",
450 "visualRange":"0",
451 "lb_policy":"ip_hash"
452 },
453 {
454 "serviceName": "so",
455 "version": "v1",
456 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
457 "protocol": "REST",
458 "port": "{{ .Values.service.internalPort }}",
459 "visualRange":"0",
460 "lb_policy":"ip_hash"
461 },
462 {
463 "serviceName": "so",
464 "version": "v1",
465 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
466 "protocol": "REST",
467 "port": "{{ .Values.service.internalPort }}",
468 "visualRange":"0",
469 "lb_policy":"ip_hash"
470 },
471 {
472 "serviceName": "so",
473 "version": "v1",
474 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
475 "protocol": "REST",
476 "port": "{{ .Values.service.internalPort }}",
477 "visualRange":"0",
478 "lb_policy":"ip_hash"
479 },
480 {
481 "serviceName": "so",
482 "version": "v1",
483 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
484 "protocol": "REST",
485 "port": "{{ .Values.service.internalPort }}",
486 "visualRange":"0",
487 "lb_policy":"ip_hash"
488 },
489 {
490 "serviceName": "so",
491 "version": "v1",
492 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
493 "protocol": "REST",
494 "port": "{{ .Values.service.internalPort }}",
495 "visualRange":"0",
496 "lb_policy":"ip_hash"
497 },
498 {
499 "serviceName": "so",
500 "version": "v1",
501 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
502 "protocol": "REST",
503 "port": "{{ .Values.service.internalPort }}",
504 "visualRange":"0",
505 "lb_policy":"ip_hash"
506 },
507 {
508 "serviceName": "so",
509 "version": "v1",
510 "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
511 "protocol": "REST",
512 "port": "{{ .Values.service.internalPort }}",
513 "visualRange":"0",
514 "lb_policy":"ip_hash"
515 },
516 {
517 "serviceName": "so",
518 "version": "v1",
519 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
520 "protocol": "REST",
521 "port": "{{ .Values.service.internalPort }}",
522 "visualRange":"0",
523 "lb_policy":"ip_hash"
524 },
525 {
526 "serviceName": "so",
527 "version": "v1",
528 "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
529 "protocol": "REST",
530 "port": "{{ .Values.service.internalPort }}",
531 "visualRange":"0",
532 "lb_policy":"ip_hash"
533 }
534 ]{{ end }}
535
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000536updateStrategy:
seshukm0df1f8e2020-08-17 21:45:49 +0530537 type: RollingUpdate
538 maxUnavailable: 1
539 maxSurge: 1
540
Andreas Geisslerad61ccf2023-02-23 09:17:36 +0100541################################################################
seshukm0df1f8e2020-08-17 21:45:49 +0530542# soHelpers part
543#################################################################
544soHelpers:
seshukm0df1f8e2020-08-17 21:45:49 +0530545 containerPort: *containerPort
546
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400547# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000548flavor: small
549# Segregation for Different environment (Small and Large)
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000550resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000551 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000552 limits:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000553 cpu: 2000m
vaibhav16dec0da88292018-08-13 06:10:27 +0000554 memory: 4Gi
555 requests:
556 cpu: 500m
557 memory: 1Gi
558 large:
559 limits:
560 cpu: 4000m
561 memory: 8Gi
562 requests:
563 cpu: 1000m
564 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000565 unlimited: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000566
Mike Elliottd32d36e2018-02-12 15:54:03 -0500567nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500568affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000569
sunilb0a97ab22020-02-25 10:18:48 +0530570# application configuration
571config:
572 logstashServiceName: log-ls
573 logstashPort: 5044
Marcin Wilkad9b3762021-10-13 18:20:43 +0200574 # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
575 openStackKeystoneVersion: "KEYSTONE"
sunilb0a97ab22020-02-25 10:18:48 +0530576
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000577#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
578#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
579# --set so.global.mariadbGalera.localCluster=true \
580# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
581# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
582mariadb-galera:
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100583 rootUser:
584 externalSecret: *dbRootPassSecretName
585 nameOverride: &so-mariadb so-mariadb-galera
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000586 replicaCount: 1
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000587 persistence:
588 mountSubPath: so/mariadb-galera/data
589 enabled: true
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100590 serviceAccount:
591 nameOverride: *so-mariadb
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200592
593ingress:
594 enabled: false
595 service:
Andreas Geissler51900a92022-08-03 13:10:35 +0200596 - baseaddr: 'so-api'
rope2524d3f3682020-09-02 20:49:21 +0100597 name: 'so'
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200598 port: 8080
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000599
AndrewLambc58d4c22023-03-09 11:03:31 +0000600serviceMesh:
601 authorizationPolicy:
602 authorizedPrincipals:
603 - serviceAccount: consul-read
604 - serviceAccount: consul-server-read
605 - serviceAccount: nbi-read
AndrewLambab2704a2023-04-05 14:45:11 +0100606 - serviceAccount: policy-drools-pdp-read
607 - serviceAccount: so-bpmn-infra-read
608 - serviceAccount: robot-read
AndrewLambc58d4c22023-03-09 11:03:31 +0000609 - serviceAccount: istio-ingress
610 namespace: istio-ingress
611
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000612mso:
613 adapters:
614 requestDb:
615 auth: Basic YnBlbDpwYXNzd29yZDEk
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000616 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
sekharhuawei2e799e92020-11-14 17:06:56 +0530617 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000618 sdc:
619 client:
620 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
621 aai:
622 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
Priyadharshini7dc03852020-08-27 04:36:03 -0700623 oof:
624 login: test
625 password: testpwd
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000626 so:
627 operationalEnv:
628 dmaap:
629 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
630 health:
631 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100632
seshukm0df1f8e2020-08-17 21:45:49 +0530633so-bpmn-infra:
634 db:
635 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000636 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100637
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000638so-catalog-db-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530639 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100640 db:
641 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100642
sekharhuawei2e799e92020-11-14 17:06:56 +0530643so-cnf-adapter:
644 enabled: true
645 db:
646 <<: *dbSecrets
647 server:
sekharhuawei2e799e92020-11-14 17:06:56 +0530648 aaiCredsExternalSecret: *aai-secrets
649 actuatorCredsExternalSecret: *actuator-secrets
650 mso:
651 msoKeySecret: *mso-key
652
egernugd3c55ab2023-01-19 15:50:37 +0000653so-cnfm-lcm:
654 enabled: true
655 db:
656 <<: *dbSecrets
657
AndrewLamb8e090442020-10-15 09:28:09 +0100658so-etsi-nfvo-ns-lcm:
659 enabled: true
rope2524d3f3682020-09-02 20:49:21 +0100660 db:
661 <<: *dbSecrets
AndrewLamb8e090442020-10-15 09:28:09 +0100662
sekharhuawei2e799e92020-11-14 17:06:56 +0530663so-mariadb:
664 db:
665 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
666 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
667 backupCredsExternalSecret: *dbBackupCredsSecretName
668 userCredsExternalSecret: *dbUserCredsSecretName
669 adminCredsExternalSecret: *dbAdminCredsSecretName
670
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100671so-admin-cockpit:
seshukm0df1f8e2020-08-17 21:45:49 +0530672 enabled: true
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100673 db:
674 <<: *dbSecrets
675
sekharhuawei2e799e92020-11-14 17:06:56 +0530676so-nssmf-adapter:
677 enabled: true
678 server:
679 actuatorCredsExternalSecret: *actuator-secrets
680 bpelCredsExternalSecret: *bpel-secrets
681 db:
682 <<: *dbSecrets
683
684so-oof-adapter:
685 enabled: true
686 db:
687 <<: *dbSecrets
688 mso:
689 msoKeySecret: *mso-key
690 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
691 oof:
692 authSecret: *mso-oof-auth
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000693 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
sekharhuawei2e799e92020-11-14 17:06:56 +0530694
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000695so-openstack-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530696 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100697 db:
698 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000699 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100700
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000701so-request-db-adapter:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100702 db:
703 <<: *dbSecrets
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100704
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000705so-sdc-controller:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100706 db:
707 <<: *dbSecrets
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000708 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100709
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000710so-sdnc-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530711 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100712 db:
713 <<: *dbSecrets
seshukm610d97d2021-03-19 02:57:36 +0530714 mso:
715 msoKeySecret: *mso-key
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000716 logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100717
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100718so-ve-vnfm-adapter:
Sylvain Desbureaux28d56562020-11-02 17:54:05 +0100719 enabled: false
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100720
seshukm87ccd872021-03-30 21:45:16 +0530721so-etsi-sol005-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530722 enabled: true
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100723 db:
724 <<: *dbSecrets
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100725
Sylvain Desbureaux1eff56b2021-02-25 14:13:01 +0100726so-etsi-sol003-adapter:
seshukm0df1f8e2020-08-17 21:45:49 +0530727 enabled: true
farida azmy87f46222021-04-06 15:25:15 +0200728
729#Pods Service Account
730serviceAccount:
731 nameOverride: so
732 roles:
733 - read
Maciej Wereskidf9ba222021-11-05 14:38:18 +0000734
735#Log configuration
736log:
737 path: /var/log/onap