blob: f41ec7f17ff923fa5296a26f1f3f789ba3c38250 [file] [log] [blame]
# Copyright © 2019 Amdocs, Bell Canada
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
###################################################################
# This override file enables helm charts for all ONAP applications.
###################################################################
#ingress virtualhost based configuration
#ingress virtualhost based configuration
global:
masterPassword: secretpassword
cluster-issuer: &cluster-issuer selfsigned-cluster-issuer
#cluster-issuer: &cluster-issuer acme-issuer
ingress:
enabled: true
# enable all component's Ingress interfaces
enable_all: true
# All http requests via ingress will be redirected
# Provider: ingress, istio, gw-api
provider: ingress
# Ingress class (only for provider "ingress"): e.g. nginx, traefik
ingressClass: nginx
# Ingress Selector (only for provider "istio") to match with the
# ingress pod label "istio=ingress"
ingressSelector: ingress
# optional: common used Gateway (for Istio, GW-API) and listener names
commonGateway:
name: ""
httpListener: ""
httpsListener: ""
virtualhost:
# Default Ingress base URL
# can be overwritten in component by setting ingress.baseurlOverride
baseurl: &baseurl smo.o-ran-sc.org
# prefix for baseaddr
# can be overwritten in component by setting ingress.preaddrOverride
preaddr: ""
# postfix for baseaddr
# can be overwritten in component by setting ingress.postaddrOverride
postaddr: ""
#config:
#ssl: "redirect"
# you can set an own Secret containing a certificate
# tls:
# secret: 'my-ingress-cert'
# optional: Namespace of the Istio IngressGateway
# namespace: istio-ingress
# don't need ejbca server
addTestingComponents: &testing false
centralizedLoggingEnabled: &centralizedLogging false
# Disabling CMPv2
cmpv2Enabled: false
aafEnabled: false
# disable TLS on pod/service level
tlsEnabled: false
# common global images
drProvClientImage: onap/dmaap/datarouter-prov-client:2.1.15
cassandra:
enabled: false
mariadb-galera:
enabled: true
replicaCount: 1
mariadbOperator:
appVersion: 11.1.2
persistence:
storageClassName: onap-mariadb-data
size: 3Gi
galera:
enabled: false
postgres:
enabled: false
aaf:
enabled: false
aaf-sms:
cps:
# you must always set the same values as value set in cps.enabled
enabled: true
aai:
enabled: false
cds:
enabled: false
cli:
enabled: false
# Today, "contrib" chart that hosting these components must also be enabled
# in order to make it work. So `contrib.enabled` must have the same value than
# addTestingComponents
contrib:
enabled: *testing
consul:
enabled: false
cps:
enabled: false
dcaegen2:
enabled: false
dcaegen2-services:
enabled: true
dcae-datafile-collector:
enabled: true
dcae-datalake-admin-ui:
enabled: false
dcae-datalake-des:
enabled: false
dcae-datalake-feeder:
enabled: false
dcae-heartbeat:
enabled: false
dcae-hv-ves-collector:
enabled: false
dcae-kpi-ms:
enabled: false
dcae-ms-healthcheck:
enabled: true
dcae-pm-mapper:
enabled: true
dcae-pmsh:
enabled: false
dcae-prh:
enabled: false
dcae-restconf-collector:
enabled: false
dcae-slice-analysis-ms:
enabled: false
dcae-snmptrap-collector:
enabled: false
dcae-son-handler:
enabled: false
dcae-tcagen2:
enabled: false
dcae-ves-collector:
enabled: true
ingress:
config:
ssl: dontuse
tls:
secret: dcae-ves-tls
annotations:
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/ssl-redirect: "true"
cert-manager.io/cluster-issuer: *cluster-issuer
service:
- baseaddr: "dcae-ves-collector"
name: "dcae-ves-collector"
port: 8080
applicationConfig:
auth.method: "noAuth"
dcae-ves-mapper:
enabled: true
dcae-ves-openapi-manager:
enabled: false
holmes:
enabled: false
dmaap:
enabled: true
message-router:
enabled: true
dmaap-bc:
enabled: false
dmaap-dr-prov:
enabled: true
dmaap-dr-node:
enabled: true
oof:
enabled: false
msb:
enabled: false
multicloud:
enabled: false
nbi:
enabled: false
platform:
enabled: true
chartmuseum:
enabled: true
oom-cert-service:
enabled: false
cmpv2-cert-service:
enabled: false
keycloak-init:
enabled: false
oauth2-proxy:
enabled: false
policy:
enabled: false
portal:
enabled: false
robot:
enabled: true
sdc:
enabled: false
sdnc:
enabled: true
elasticsearch:
enabled: false
replicaCount: 1
mysql:
replicaCount: 1
ueb-listener:
enabled: false
sdnc-ansible-server:
enabled: false
dgbuilder:
enabled: false
cds:
enabled: false
dmaap-listener:
enabled: false
network-name-gen:
enabled: false
config:
odlPassword: admin
sdnr:
enabled: true
# mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
# mode: dm - SDNC contains sdnr device manager + ODLUX components
mode: dm
# sdnronly: true starts sdnc container with odl and sdnrwt features only
sdnronly: true
sdnrdbTrustAllCerts: true
mountpointRegistrarEnabled: true
mountpointStateProviderEnabled: true
netconfCallHome:
enabled: true
kafka:
enabled: true
# vesCollector:
# enabled: true
# tls:
# enabled: true
# trustAllCertificates: true
# username: sample1
# password: sample1
# address: dcae-ves-collector.onap
# port: 8443
# eventLogMsgDetail: LONG
mariadb:
## for legacy eleasticsearch database
# enabled: false
enabled: true
sdnc-web:
ingress:
config:
ssl: dontuse
tls:
secret: sdnc-web-tls
service:
- baseaddr: "sdnc-web"
name: "sdnc-web"
port: 8080
plain_port: 8080
annotations:
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/ssl-redirect: "true"
cert-manager.io/cluster-issuer: *cluster-issuer
so:
enabled: false
strimzi:
enabled: true
config:
advertizedPortBroker0: &advertizedPortBroker0 9000
advertizedPortBroker1: &advertizedPortBroker1 9001
advertizedPortBroker2: &advertizedPortBroker2 9002
ingress:
enabled: false
service:
- baseaddr: "kafka-bootstrap-api"
name: "onap-strimzi-kafka-external-bootstrap"
port: 9094
exposedPort: 9010
exposedProtocol: TLS
- baseaddr: "kafka-0-api"
name: "onap-strimzi-kafka-0"
port: 9094
exposedPort: *advertizedPortBroker0
exposedProtocol: TLS
- baseaddr: "kafka-1-api"
name: "onap-strimzi-kafka-1"
port: 9094
exposedPort: *advertizedPortBroker1
exposedProtocol: TLS
- baseaddr: "kafka-2-api"
name: "onap-strimzi-kafka-2"
port: 9094
exposedPort: *advertizedPortBroker2
exposedProtocol: TLS
replicaCount: 1
strimzi-kafka-bridge:
enabled: false
uui:
enabled: false
vfc:
enabled: false
vnfsdk:
enabled: false
modeling:
enabled: false
a1policymanagement:
enabled: false