1 # ================================ LICENSE_START =============================
2 # ============================================================================
3 # Copyright (C) 2021 Nordix Foundation.
4 # ============================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
16 # ================================= LICENSE_END ==============================
18 #################################################################
19 # Global Configuration Defaults.
20 #################################################################
23 nodePortPrefixExt: 304
24 centralizedLoggingEnabled: true
26 #################################################################
27 # Filebeat Configuration Defaults.
28 #################################################################
30 logstashServiceName: log-ls
33 #################################################################
34 # Secrets Configuration.
35 #################################################################
37 - uid: &aafCredsUID aafcreds
39 login: '{{ .Values.aafCreds.identity }}'
40 password: '{{ .Values.aafCreds.password }}'
41 passwordPolicy: required
42 - uid: &pgUserCredsSecretUid pg-user-creds
43 name: &pgUserCredsSecretName '{{ include "common.release" . }}-pmsh-pg-user-creds'
45 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "pmsh-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
46 login: '{{ .Values.postgres.config.pgUserName }}'
47 password: '{{ .Values.postgres.config.pgUserPassword }}'
48 passwordPolicy: generate
50 #################################################################
51 # InitContainer Images.
52 #################################################################
53 tlsImage: onap/org.onap.dcaegen2.deployments.tls-init-container:2.1.0
54 consulLoaderImage: onap/org.onap.dcaegen2.deployments.consul-loader-container:1.1.1
56 #################################################################
57 # Application Configuration Defaults.
58 #################################################################
60 image: onap/org.onap.dcaegen2.services.pmsh:2.0.0
63 # Log directory where logging sidecar should look for log files
64 # if path is set to null sidecar won't be deployed in spite of
65 # global.centralizedLoggingEnabled setting.
67 path: /var/log/ONAP/dcaegen2/services/pmsh
68 logConfigMapNamePrefix: '{{ include "common.fullname" . }}'
70 # Directory where TLS certs should be stored
71 # if absent, no certs will be retrieved and stored
72 certDirectory: /opt/app/pmsh/etc/certs
74 # TLS role -- set to true if microservice acts as server
75 # If true, an init container will retrieve a server cert
76 # and key from AAF and mount them in certDirectory.
83 - &postgresName dcae-pmsh-postgres
87 initialDelaySeconds: 10
94 # Service Configuration
105 identity: dcae@dcae.onap.org
106 password: demo123456!
116 # Initial Application Configuration
119 aaf_identity: ${AAF_IDENTITY}
120 aaf_password: ${AAF_PASSWORD}
121 key_path: /opt/app/pmsh/etc/certs/key.pem
122 cert_path: /opt/app/pmsh/etc/certs/cert.pem
123 ca_cert_path: /opt/app/pmsh/etc/certs/cacert.pem
124 control_loop_name: pmsh-control-loop
125 operational_policy_name: pmsh-operational-policy
128 subscriptionName: ExtraPM-All-gNB-R2B
129 administrativeState: LOCKED
131 fileLocation: "/pm/pm.xml"
132 nfFilter: { "nfNames": [ "^pnf.*","^vnf.*" ],"modelInvariantIDs": [ ],"modelVersionIDs": [ ],"modelNames": [ ] }
133 measurementGroups: [ { "measurementGroup": { "measurementTypes": [ { "measurementType": "countera" },{ "measurementType": "counterb" } ],"managedObjectDNsBasic": [ { "DN": "dna" },{ "DN": "dnb" } ] } },{ "measurementGroup": { "measurementTypes": [ { "measurementType": "counterc" },{ "measurementType": "counterd" } ],"managedObjectDNsBasic": [ { "DN": "dnc" },{ "DN": "dnd" } ] } } ]
138 topic_url: "https://message-router:3905/events/unauthenticated.DCAE_CL_OUTPUT"
140 policy_pm_subscriber:
143 topic_url: "https://message-router:3905/events/unauthenticated.PMSH_CL_INPUT"
147 topic_url: "https://message-router:3905/events/AAI-EVENT"
150 PMSH_PG_URL: &dcaePmshPgPrimary dcae-pmsh-pg-primary
152 secretUid: *pgUserCredsSecretUid
155 secretUid: *pgUserCredsSecretUid
158 # Resource Limit Flavor -By Default Using Small
161 # Segregation for Different Environment (Small and Large)
179 #################################################################
180 # Application configuration Overriding Defaults in the Postgres.
181 #################################################################
183 nameOverride: *postgresName
186 name2: *dcaePmshPgPrimary
187 name3: dcae-pmsh-pg-replica
190 primary: dcae-pmsh-pg-primary
191 replica: dcae-pmsh-pg-replica
193 mountSubPath: pmsh/data
198 pgUserExternalSecret: *pgUserCredsSecretName
200 #Pods Service Account
202 nameOverride: dcae-pmsh