1 # ================================ LICENSE_START =============================
2 # ============================================================================
3 # Copyright (C) 2021 Nordix Foundation.
4 # Copyright (c) 2022 J. F. Lucas. All rights reserved.
5 # ============================================================================
6 # Licensed under the Apache License, Version 2.0 (the "License");
7 # you may not use this file except in compliance with the License.
8 # You may obtain a copy of the License at
10 # http://www.apache.org/licenses/LICENSE-2.0
12 # Unless required by applicable law or agreed to in writing, software
13 # distributed under the License is distributed on an "AS IS" BASIS,
14 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 # See the License for the specific language governing permissions and
16 # limitations under the License.
17 # ================================= LICENSE_END ==============================
19 #################################################################
20 # Global Configuration Defaults.
21 #################################################################
24 nodePortPrefixExt: 304
25 centralizedLoggingEnabled: true
27 #################################################################
28 # Filebeat Configuration Defaults.
29 #################################################################
31 logstashServiceName: log-ls
34 #################################################################
35 # Secrets Configuration.
36 #################################################################
38 - uid: &aafCredsUID aafcreds
40 login: '{{ .Values.aafCreds.identity }}'
41 password: '{{ .Values.aafCreds.password }}'
42 passwordPolicy: required
43 - uid: &pgUserCredsSecretUid pg-user-creds
44 name: &pgUserCredsSecretName '{{ include "common.release" . }}-pmsh-pg-user-creds'
46 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "pmsh-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
47 login: '{{ .Values.postgres.config.pgUserName }}'
48 password: '{{ .Values.postgres.config.pgUserPassword }}'
49 passwordPolicy: generate
51 #################################################################
52 # InitContainer Images.
53 #################################################################
54 tlsImage: onap/org.onap.dcaegen2.deployments.tls-init-container:2.1.0
56 #################################################################
57 # Application Configuration Defaults.
58 #################################################################
60 image: onap/org.onap.dcaegen2.services.pmsh:2.2.2
63 # Log directory where logging sidecar should look for log files
64 # if path is set to null sidecar won't be deployed in spite of
65 # global.centralizedLoggingEnabled setting.
67 path: /var/log/ONAP/dcaegen2/services/pmsh
68 logConfigMapNamePrefix: '{{ include "common.fullname" . }}'
70 # Directory where TLS certs should be stored
71 # if absent, no certs will be retrieved and stored
72 certDirectory: /opt/app/pmsh/etc/certs
74 # TLS role -- set to true if microservice acts as server
75 # If true, an init container will retrieve a server cert
76 # and key from AAF and mount them in certDirectory.
83 - &postgresName dcae-pmsh-postgres
87 initialDelaySeconds: 10
94 # Service Configuration
105 identity: dcae@dcae.onap.org
106 password: demo123456!
116 # Initial Application Configuration
119 aaf_identity: ${AAF_IDENTITY}
120 aaf_password: ${AAF_PASSWORD}
121 key_path: /opt/app/pmsh/etc/certs/key.pem
122 cert_path: /opt/app/pmsh/etc/certs/cert.pem
123 ca_cert_path: /opt/app/pmsh/etc/certs/cacert.pem
124 control_loop_name: pmsh-control-loop
125 operational_policy_name: pmsh-operational-policy
128 subscriptionName: ExtraPM-All-gNB-R2B
129 administrativeState: LOCKED
131 fileLocation: "/pm/pm.xml"
132 nfFilter: { "nfNames": [ "^pnf.*","^vnf.*" ],"modelInvariantIDs": [ ],"modelVersionIDs": [ ],"modelNames": [ ] }
133 measurementGroups: [ { "measurementGroup": { "measurementTypes": [ { "measurementType": "countera" },{ "measurementType": "counterb" } ],"managedObjectDNsBasic": [ { "DN": "dna" },{ "DN": "dnb" } ] } },{ "measurementGroup": { "measurementTypes": [ { "measurementType": "counterc" },{ "measurementType": "counterd" } ],"managedObjectDNsBasic": [ { "DN": "dnc" },{ "DN": "dnd" } ] } } ]
138 topic_url: "https://message-router:3905/events/unauthenticated.DCAE_CL_OUTPUT"
140 policy_pm_subscriber:
143 topic_url: "https://message-router:3905/events/unauthenticated.PMSH_CL_INPUT"
147 topic_url: "https://message-router:3905/events/AAI-EVENT"
150 PMSH_PG_URL: &dcaePmshPgPrimary dcae-pmsh-pg-primary
152 secretUid: *pgUserCredsSecretUid
155 secretUid: *pgUserCredsSecretUid
158 # Resource Limit Flavor -By Default Using Small
161 # Segregation for Different Environment (Small and Large)
179 #################################################################
180 # Application configuration Overriding Defaults in the Postgres.
181 #################################################################
183 nameOverride: *postgresName
186 name2: *dcaePmshPgPrimary
187 name3: dcae-pmsh-pg-replica
190 primary: dcae-pmsh-pg-primary
191 replica: dcae-pmsh-pg-replica
193 mountSubPath: pmsh/data
198 pgUserExternalSecret: *pgUserCredsSecretName
200 #Pods Service Account
202 nameOverride: dcae-pmsh