1 # ================================ LICENSE_START =============================
2 # ============================================================================
3 # Copyright (C) 2021 Nordix Foundation.
4 # ============================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
16 # ================================= LICENSE_END ==============================
18 #################################################################
19 # Global Configuration Defaults.
20 #################################################################
23 nodePortPrefixExt: 304
24 centralizedLoggingEnabled: true
26 #################################################################
27 # Filebeat Configuration Defaults.
28 #################################################################
30 logstashServiceName: log-ls
33 #################################################################
34 # Secrets Configuration.
35 #################################################################
37 - uid: &aafCredsUID aafcreds
39 login: '{{ .Values.aafCreds.identity }}'
40 password: '{{ .Values.aafCreds.password }}'
41 passwordPolicy: required
42 - uid: &pgUserCredsSecretUid pg-user-creds
43 name: &pgUserCredsSecretName '{{ include "common.release" . }}-pmsh-pg-user-creds'
45 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "pmsh-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
46 login: '{{ .Values.postgres.config.pgUserName }}'
47 password: '{{ .Values.postgres.config.pgUserPassword }}'
48 passwordPolicy: generate
50 #################################################################
51 # InitContainer Images.
52 #################################################################
53 tlsImage: onap/org.onap.dcaegen2.deployments.tls-init-container:2.1.0
54 consulLoaderImage: onap/org.onap.dcaegen2.deployments.consul-loader-container:1.1.1
56 #################################################################
57 # Application Configuration Defaults.
58 #################################################################
60 image: onap/org.onap.dcaegen2.services.pmsh:1.3.2
63 # Log directory where logging sidecar should look for log files
64 # if path is set to null sidecar won't be deployed in spite of
65 # global.centralizedLoggingEnabled setting.
67 path: /var/log/ONAP/dcaegen2/services/pmsh
68 logConfigMapNamePrefix: '{{ include "common.fullname" . }}'
70 # Directory where TLS certs should be stored
71 # if absent, no certs will be retrieved and stored
72 certDirectory: /opt/app/pmsh/etc/certs
74 # TLS role -- set to true if microservice acts as server
75 # If true, an init container will retrieve a server cert
76 # and key from AAF and mount them in certDirectory.
82 - dcae-config-binding-service
84 - &postgresName dcae-pmsh-postgres
88 initialDelaySeconds: 10
95 # Service Configuration
106 identity: dcae@dcae.onap.org
107 password: demo123456!
117 # Initial Application Configuration
120 aaf_identity: ${AAF_IDENTITY}
121 aaf_password: ${AAF_PASSWORD}
122 key_path: /opt/app/pmsh/etc/certs/key.pem
123 cert_path: /opt/app/pmsh/etc/certs/cert.pem
124 ca_cert_path: /opt/app/pmsh/etc/certs/cacert.pem
125 control_loop_name: pmsh-control-loop
126 operational_policy_name: pmsh-operational-policy
129 subscriptionName: ExtraPM-All-gNB-R2B
130 administrativeState: LOCKED
132 fileLocation: "/pm/pm.xml"
133 nfFilter: { "nfNames": [ "^pnf.*","^vnf.*" ],"modelInvariantIDs": [ ],"modelVersionIDs": [ ],"modelNames": [ ] }
134 measurementGroups: [ { "measurementGroup": { "measurementTypes": [ { "measurementType": "countera" },{ "measurementType": "counterb" } ],"managedObjectDNsBasic": [ { "DN": "dna" },{ "DN": "dnb" } ] } },{ "measurementGroup": { "measurementTypes": [ { "measurementType": "counterc" },{ "measurementType": "counterd" } ],"managedObjectDNsBasic": [ { "DN": "dnc" },{ "DN": "dnd" } ] } } ]
139 topic_url: "https://message-router:3905/events/unauthenticated.DCAE_CL_OUTPUT"
141 policy_pm_subscriber:
144 topic_url: "https://message-router:3905/events/unauthenticated.PMSH_CL_INPUT"
148 topic_url: "https://message-router:3905/events/AAI-EVENT"
151 PMSH_PG_URL: &dcaePmshPgPrimary dcae-pmsh-pg-primary
153 secretUid: *pgUserCredsSecretUid
156 secretUid: *pgUserCredsSecretUid
159 # Resource Limit Flavor -By Default Using Small
162 # Segregation for Different Environment (Small and Large)
180 #################################################################
181 # Application configuration Overriding Defaults in the Postgres.
182 #################################################################
184 nameOverride: *postgresName
187 name2: *dcaePmshPgPrimary
188 name3: dcae-pmsh-pg-replica
191 primary: dcae-pmsh-pg-primary
192 replica: dcae-pmsh-pg-replica
194 mountSubPath: pmsh/data
199 pgUserExternalSecret: *pgUserCredsSecretName
201 #Pods Service Account
203 nameOverride: dcae-pmsh