1 # Copyright © 2019 Amdocs, Bell Canada
2 # Copyright (c) 2020 Nordix Foundation, Modifications
3 # Modifications Copyright © 2020-2021 Nokia
4 # Modifications Copyright © 2023 Nordix Foundation
6 # Licensed under the Apache License, Version 2.0 (the "License");
7 # you may not use this file except in compliance with the License.
8 # You may obtain a copy of the License at
10 # http://www.apache.org/licenses/LICENSE-2.0
12 # Unless required by applicable law or agreed to in writing, software
13 # distributed under the License is distributed on an "AS IS" BASIS,
14 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 # See the License for the specific language governing permissions and
16 # limitations under the License.
18 #################################################################
19 # Global configuration overrides.
21 # These overrides will affect all helm charts (ie. applications)
22 # that are listed below and are 'enabled'.
23 #################################################################
25 # Change to an unused port prefix range to prevent port conflicts
26 # with other instances running within the same k8s cluster
28 nodePortPrefixExt: 304
31 # Four different repositories are used
32 # You can change individually these repositories to ones that will serve the
33 # right images. If credentials are needed for one of them, see below.
34 repository: nexus3.onap.org:10001
35 dockerHubRepository: &dockerHubRepository docker.io
36 elasticRepository: &elasticRepository docker.elastic.co
37 quayRepository: quay.io
38 googleK8sRepository: k8s.gcr.io
39 githubContainerRegistry: ghcr.io
42 # they're optional. If the target repository doesn't need them, comment them
46 # If you want / need authentication on the repositories, please set
47 # Don't set them if the target repo is the same than others
48 # so id you've set repository to value `my.private.repo` and same for
49 # dockerHubRepository, you'll have to configure only repository (exclusive) OR
61 # Default definition of the secret containing the docker image repository
62 # credentials. In the default ONAP deployment the secret is created by the
63 # repository-wrapper component, which uses the secrets defined above.
64 # If this is not wanted or other secrets are created, alternative secret
66 # Overrides for specific images can be done, if the "image" entry is used as
67 # a map and the "pullSecrets" is used, e.g.
71 # - myRegistryKeySecretName
74 - '{{ include "common.namespace" . }}-docker-registry-key'
76 # common global images
77 # Busybox for simple shell manipulation
78 busyboxImage: busybox:1.34.1
81 curlImage: curlimages/curl:7.80.0
83 # env substitution image
84 envsubstImage: dibi/envsubst:1
86 # generate htpasswd files image
87 # there's only latest image for htpasswd
88 htpasswdImage: xmartlabs/htpasswd:latest
90 # kubenretes client image
91 kubectlImage: bitnami/kubectl:1.22.4
94 loggingImage: beats/filebeat:5.5.0
96 # mariadb client image
97 mariadbImage: bitnami/mariadb:10.5.8
100 nginxImage: bitnami/nginx:1.21.4
102 # postgreSQL client and server image
103 postgresImage: crunchydata/crunchy-postgres:centos8-13.2-4.6.1
105 # readiness check image
106 readinessImage: onap/oom/readiness:5.0.1
112 jreImage: onap/integration-java11:10.0.0
114 # default clusterName
115 # {{ template "common.fullname" . }}.{{ template "common.namespace" . }}.svc.{{ .Values.global.clusterName }}
116 clusterName: cluster.local
118 # default mount path root directory referenced
119 # by persistent volumes and log files
121 mountPath: /dockerdata-nfs
122 enableDefaultStorageclass: false
124 storageclassProvisioner: kubernetes.io/no-provisioner
125 volumeReclaimPolicy: Retain
127 # Global flag to enable the creation of default roles instead of using
128 # common roles-wrapper
129 createDefaultRoles: false
131 # override default resource limit flavor for all charts
134 # flag to enable debugging - application support required
137 # default password complexity
138 # available options: phrase, name, pin, basic, short, medium, long, maximum security
139 # More datails: https://www.masterpasswordapp.com/masterpassword-algorithm.pdf
140 passwordStrength: long
142 # configuration to set log level to all components (the one that are using
143 # "common.log.level" to set this)
144 # can be overrided per components by setting logConfiguration.logLevelOverride
145 # to the desired value
148 # Global ingress configuration
150 # generally enable ingress for ONAP components
152 # enable all component's Ingress interfaces
155 # Provider: ingress, istio, gw-api
157 # Ingress class (only for provider "ingress"): e.g. nginx, traefik
159 # Ingress Selector (only for provider "istio") to match with the
160 # ingress pod label "istio=ingress"
161 ingressSelector: ingress
162 # optional: common used Gateway (for Istio, GW-API) and listener names
168 # default Ingress base URL and preAddr- and postAddr settings
169 # Ingress URLs result:
170 # <preaddr><component.ingress.service.baseaddr><postaddr>.<baseurl>
172 # Default Ingress base URL
173 # can be overwritten in component by setting ingress.baseurlOverride
174 baseurl: "simpledemo.onap.org"
175 # prefix for baseaddr
176 # can be overwritten in component by setting ingress.preaddrOverride
178 # postfix for baseaddr
179 # can be overwritten in component by setting ingress.postaddrOverride
182 # All http (port 80) requests via ingress will be redirected
183 # to port 443 on Ingress controller
184 # only valid for Istio Gateway (ServiceMesh enabled)
187 # you can set an own Secret containing a certificate
188 # only valid for Istio Gateway (ServiceMesh enabled)
190 # secret: 'my-ingress-cert'
192 # optional: Namespace of the Istio IngressGateway or Gateway-API
193 # only valid for Istio Gateway (ServiceMesh enabled)
194 namespace: istio-ingress
196 # Global Service Mesh configuration
200 # be aware that linkerd is not well tested
201 engine: "istio" # valid value: istio or linkerd
203 # Global Istio Authorization Policy configuration
204 authorizationPolicies:
208 # If enabled, exporters (for prometheus) will be deployed
209 # if custom resources set to yes, CRD from prometheus operartor will be
211 # Not all components have it enabled.
215 custom_resources: false
218 # POC Mode, only for use in development environment
219 # Keep it enabled in production
223 # POC Mode, only for use in development environment
226 # default values for certificates
229 renewBefore: 720h #30 days
230 duration: 8760h #365 days
232 organization: "Linux-Foundation"
234 locality: "San-Francisco"
235 province: "California"
236 organizationalUnit: "ONAP"
238 group: certmanager.onap.org
240 name: cmpv2-issuer-onap
246 clientSecretName: oom-cert-service-client-tls-secret
247 keystoreKeyRef: keystore.jks
248 truststoreKeyRef: truststore.jks
249 keystorePasswordSecretName: oom-cert-service-certificates-password
250 keystorePasswordSecretKey: password
251 truststorePasswordSecretName: oom-cert-service-certificates-password
252 truststorePasswordSecretKey: password
254 # Indicates offline deployment build
255 # Set to true if you are rendering helm charts for offline deployment
256 # Otherwise keep it disabled
257 offlineDeploymentBuild: false
260 # Set to false if you want to disable TLS for NodePorts. Be aware that this
261 # will loosen your security.
262 # if set this element will force or not tls even if serviceMesh.tls is set.
266 # Currently, centralized logging is not in best shape so it's disabled by
268 centralizedLoggingEnabled: ¢ralizedLogging false
270 # Example of specific for the components where you want to disable TLS only for
272 # if set this element will force or not tls even if global.serviceMesh.tls and
273 # global.tlsEnabled is set otherwise.
277 # Global storage configuration
278 # Set to "-" for default, or with the name of the storage class
279 # Please note that if you use AAF, CDS, SDC, Netbox or Robot, you need a
280 # storageclass with RWX capabilities (or set specific configuration for these
285 # Example of specific for the components which requires RWX:
287 # cds-blueprints-processor:
289 # storageClassOverride: "My_RWX_Storage_Class"
293 # storageClassOverride: "My_RWX_Storage_Class"
295 #################################################################
296 # Enable/disable and configure helm charts (ie. applications)
297 # to customize the ONAP deployment.
298 #################################################################
333 # openstack configuration
334 openStackRegion: "Yolo"
335 openStackVNFTenantId: "1234"
343 # openStackEncryptedPasswordHere should match the encrypted string used in SO and overridden per environment
344 openStackEncryptedPasswordHere: "c124921a3a0efbe579782cde8227681e"
360 # necessary to disable liveness probe when setting breakpoints
361 # in debugger so K8s doesn't restart unresponsive container
364 # so server configuration
366 # message router configuration
368 # openstack configuration
369 openStackUserName: "vnf_user"
370 openStackRegion: "RegionOne"
371 openStackKeyStoneUrl: "http://1.2.3.4:5000"
372 openStackServiceTenantName: "service"
373 openStackEncryptedPasswordHere: "c124921a3a0efbe579782cde8227681e"
375 # in order to enable static password for so-monitoring uncomment:
379 # password: demo123456!
383 # Kafka replication & disk storage should be dimensioned
384 # according to each given system use case.
391 # Strimzi kafka bridge is an optional http api towards
392 # kafka provided by https://strimzi.io/docs/bridge/latest/
393 strimzi-kafka-bridge: