1 # ================================ LICENSE_START =============================
2 # ============================================================================
3 # Copyright (C) 2021 Nordix Foundation.
4 # ============================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
16 # ================================= LICENSE_END ==============================
18 #################################################################
19 # Global Configuration Defaults.
20 #################################################################
23 nodePortPrefixExt: 304
25 #################################################################
26 # Filebeat Configuration Defaults.
27 #################################################################
29 logstashServiceName: log-ls
32 #################################################################
33 # Secrets Configuration.
34 #################################################################
36 - uid: &aafCredsUID aafcreds
38 login: '{{ .Values.aafCreds.identity }}'
39 password: '{{ .Values.aafCreds.password }}'
40 passwordPolicy: required
41 - uid: &pgUserCredsSecretUid pg-user-creds
42 name: &pgUserCredsSecretName '{{ include "common.release" . }}-pmsh-pg-user-creds'
44 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "pmsh-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
45 login: '{{ .Values.postgres.config.pgUserName }}'
46 password: '{{ .Values.postgres.config.pgUserPassword }}'
47 passwordPolicy: generate
49 #################################################################
50 # InitContainer Images.
51 #################################################################
52 tlsImage: onap/org.onap.dcaegen2.deployments.tls-init-container:2.1.0
53 consulLoaderImage: onap/org.onap.dcaegen2.deployments.consul-loader-container:1.1.0
55 #################################################################
56 # Application Configuration Defaults.
57 #################################################################
59 image: onap/org.onap.dcaegen2.services.pmsh:1.3.1
62 # Log directory where logging sidecar should look for log files
63 # if absent, no sidecar will be deployed
64 logDirectory: /var/log/ONAP/dcaegen2/services/pmsh
66 # Directory where TLS certs should be stored
67 # if absent, no certs will be retrieved and stored
68 certDirectory: /opt/app/pmsh/etc/certs
70 # TLS role -- set to true if microservice acts as server
71 # If true, an init container will retrieve a server cert
72 # and key from AAF and mount them in certDirectory.
78 - dcae-config-binding-service
80 - &postgresName dcae-pmsh-postgres
84 initialDelaySeconds: 10
91 # Service Configuration
102 identity: dcae@dcae.onap.org
103 password: demo123456!
113 # Initial Application Configuration
116 aaf_identity: ${AAF_IDENTITY}
117 aaf_password: ${AAF_PASSWORD}
118 key_path: /opt/app/pmsh/etc/certs/key.pem
119 cert_path: /opt/app/pmsh/etc/certs/cert.pem
120 ca_cert_path: /opt/app/pmsh/etc/certs/cacert.pem
121 control_loop_name: pmsh-control-loop
122 operational_policy_name: pmsh-operational-policy
125 subscriptionName: ExtraPM-All-gNB-R2B
126 administrativeState: LOCKED
128 fileLocation: "/pm/pm.xml"
129 nfFilter: { "nfNames": [ "^pnf.*","^vnf.*" ],"modelInvariantIDs": [ ],"modelVersionIDs": [ ],"modelNames": [ ] }
130 measurementGroups: [ { "measurementGroup": { "measurementTypes": [ { "measurementType": "countera" },{ "measurementType": "counterb" } ],"managedObjectDNsBasic": [ { "DN": "dna" },{ "DN": "dnb" } ] } },{ "measurementGroup": { "measurementTypes": [ { "measurementType": "counterc" },{ "measurementType": "counterd" } ],"managedObjectDNsBasic": [ { "DN": "dnc" },{ "DN": "dnd" } ] } } ]
135 topic_url: "https://message-router:3905/events/unauthenticated.DCAE_CL_OUTPUT"
137 policy_pm_subscriber:
140 topic_url: "https://message-router:3905/events/unauthenticated.PMSH_CL_INPUT"
144 topic_url: "https://message-router:3905/events/AAI-EVENT"
147 PMSH_PG_URL: &dcaePmshPgPrimary dcae-pmsh-pg-primary
149 secretUid: *pgUserCredsSecretUid
152 secretUid: *pgUserCredsSecretUid
155 # Resource Limit Flavor -By Default Using Small
158 # Segregation for Different Environment (Small and Large)
176 #################################################################
177 # Application configuration Overriding Defaults in the Postgres.
178 #################################################################
180 nameOverride: *postgresName
183 name2: *dcaePmshPgPrimary
184 name3: dcae-pmsh-pg-replica
187 primary: dcae-pmsh-pg-primary
188 replica: dcae-pmsh-pg-replica
190 mountSubPath: pmsh/data
195 pgUserExternalSecret: *pgUserCredsSecretName