2 # Copyright © 2020 Samsung Electronics
3 # Copyright © 2017 Amdocs, Bell Canada
4 # Copyright © 2021 Nokia
6 # Licensed under the Apache License, Version 2.0 (the "License");
7 # you may not use this file except in compliance with the License.
8 # You may obtain a copy of the License at
10 # http://www.apache.org/licenses/LICENSE-2.0
12 # Unless required by applicable law or agreed to in writing, software
13 # distributed under the License is distributed on an "AS IS" BASIS,
14 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 # See the License for the specific language governing permissions and
16 # limitations under the License.
21 metadata: {{- include "common.resourceMetadata" . | nindent 2 }}
23 selector: {{- include "common.selectors" . | nindent 4 }}
24 serviceName: {{ include "common.servicename" . }}-cluster
25 podManagementPolicy: Parallel
26 replicas: {{ .Values.replicaCount }}
28 metadata: {{- include "common.templateMetadata" . | nindent 6 }}
35 - "cd /config-input && for PFILE in `ls -1 .`; do envsubst <${PFILE} >/config/${PFILE}; done"
37 - name: AAI_CLIENT_NAME
38 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 10 }}
39 - name: AAI_CLIENT_PASSWORD
40 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 10 }}
41 - name: AAI_TRUSTSTORE_PASSWORD
42 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 10 }}
43 - name: ANSIBLE_TRUSTSTORE_PASSWORD
44 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 10 }}
46 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 10 }}
48 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 10 }}
50 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 10 }}
52 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 10 }}
54 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 10 }}
56 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 10 }}
57 - name: HONEYCOMB_USER
58 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 10 }}
59 - name: HONEYCOMB_PASSWORD
60 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 10 }}
61 - name: TRUSTSTORE_PASSWORD
62 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 10 }}
63 - name: KEYSTORE_PASSWORD
64 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 10 }}
66 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 10 }}
67 - name: DMAAP_PASSWORD
68 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 10 }}
70 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 10 }}
71 - name: MODELSERVICE_USER
72 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "login") | indent 10 }}
73 - name: MODELSERVICE_PASSWORD
74 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "password") | indent 10 }}
76 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "login") | indent 10 }}
77 - name: RESTCONF_PASSWORD
78 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "password") | indent 10 }}
80 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "login") | indent 10 }}
81 - name: ANSIBLE_PASSWORD
82 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "password") | indent 10 }}
84 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "login") | indent 10 }}
85 - name: SCALEOUT_PASSWORD
86 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "password") | indent 10 }}
88 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "netbox-apikey" "key" "password") | indent 10 }}
90 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
91 - name: SDNC_DB_PASSWORD
92 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
94 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
95 - name: MYSQL_PASSWORD
96 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
97 - name: ODL_ADMIN_USERNAME
98 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
100 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
101 - name: ODL_ADMIN_PASSWORD
102 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
104 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
105 {{ if .Values.config.sdnr.oauth.enabled }}
106 - name: OAUTH_TOKEN_SECRET
107 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "oauth-token-secret" "key" "password") | indent 10 }}
108 - name: KEYCLOAK_SECRET
109 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keycloak-secret" "key" "password") | indent 10 }}
110 - name: ENABLE_ODLUX_RBAC
111 value: "{{ .Values.config.sdnr.oauth.odluxRbac.enabled | default "true" }}"
113 - name: SDNR_KAFKA_ENABLED
114 value: "{{ .Values.config.sdnr.kafka.enabled | default "false" }}"
115 {{ if .Values.config.sdnr.kafka.enabled }}
116 - name: SDNR_KAFKA_BOOTSTRAP_SERVERS
117 value: "{{ .Values.config.sdnr.kafka.bootstrapServers | default (include "common.release" .) }}-strimzi-kafka-bootstrap.{{.Release.Namespace}}:9092"
118 - name: SDNR_KAFKA_SECURITY_PROTOCOL
119 value: "{{ .Values.config.sdnr.kafka.securityProtocol | default "SASL_PLAINTEXT" }}"
120 - name: SDNR_KAFKA_SASL_MECHANISM
121 value: "{{ .Values.config.sdnr.kafka.saslMechanism | default "SCRAM-SHA-512" }}"
122 - name: SDNR_KAFKA_SASL_JASS_CONFIG
125 name: {{ include "common.name" . }}-ku
126 key: sasl.jaas.config
129 - mountPath: /config-input
133 image: {{ include "repositoryGenerator.image.envsubst" . }}
134 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
135 name: {{ include "common.name" . }}-update-config
136 {{ if or .Values.dgbuilder.enabled .Values.config.sdnr.enabled -}}
140 {{ if .Values.dgbuilder.enabled -}}
142 - {{ include "common.mariadbAppName" . }}
144 - {{ include "common.fullname" . }}-dbinit-job
146 {{ if .Values.config.sdnr.enabled -}}
148 - {{ include "common.fullname" . }}-sdnrdb-init-job
155 fieldPath: metadata.namespace
156 image: {{ include "repositoryGenerator.image.readiness" . }}
157 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
158 name: {{ include "common.name" . }}-readiness
167 - name: {{ include "common.name" . }}-chown
168 image: {{ include "repositoryGenerator.image.busybox" . }}
174 mkdir {{ .Values.persistence.mdsalPath }}/journal
175 mkdir {{ .Values.persistence.mdsalPath }}/snapshots
176 mkdir {{ .Values.persistence.mdsalPath }}/daexim
177 chown -R {{ .Values.config.odlUid }}:{{ .Values.config.odlGid}} {{ .Values.persistence.mdsalPath }}
179 - mountPath: {{ .Values.persistence.mdsalPath }}
180 name: {{ include "common.fullname" . }}-data
182 - name: {{ include "common.name" . }}
183 image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }}
184 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
185 {{- if .Values.global.cmpv2Enabled }}
186 {{- $linkCommand := include "common.certManager.linkVolumeMounts" . }}
190 command: ["sh", "-c", {{$linkCommand | quote}} ]
192 command: ["/bin/bash"]
193 args: ["-c", "/opt/onap/sdnc/bin/createLinks.sh ; /opt/onap/sdnc/bin/startODL.sh"]
195 - containerPort: {{ .Values.service.internalPort }}
196 - containerPort: {{ .Values.service.internalPort2 }}
197 - containerPort: {{ .Values.service.internalPort3 }}
198 - containerPort: {{ .Values.service.clusterPort }}
199 {{- if .Values.config.sdnr.netconfCallHome.enabled }}
200 - containerPort: {{ .Values.service.callHomePort }}
204 port: {{ .Values.service.internalPort }}
205 initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }}
206 periodSeconds: {{ .Values.readiness.periodSeconds }}
208 {{ if and .Values.config.sdnr.enabled .Values.config.sdnr.sdnronly -}}
209 - name: MYSQL_ROOT_PASSWORD
210 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-root-password" "key" "password") | indent 12 }}
212 - name: ODL_ADMIN_USERNAME
213 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
215 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
216 - name: ODL_ADMIN_PASSWORD
217 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
219 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
221 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
222 - name: SDNC_DB_PASSWORD
223 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
225 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
226 - name: MYSQL_PASSWORD
227 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
228 - name: MYSQL_DATABASE
229 value: "{{ .Values.config.dbSdnctlDatabase }}"
230 - name: SDNC_CONFIG_DIR
231 value: "{{ .Values.config.configDir }}"
232 - name: AAI_CLIENT_NAME
233 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 12 }}
234 - name: AAI_CLIENT_PASSWORD
235 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 12 }}
236 - name: AAI_TRUSTSTORE_PASSWORD
237 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 12 }}
238 - name: ANSIBLE_TRUSTSTORE_PASSWORD
239 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 12 }}
241 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 12 }}
243 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 12 }}
245 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 12 }}
246 - name: NENG_PASSWORD
247 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 12 }}
249 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 12 }}
251 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 12 }}
252 - name: HONEYCOMB_USER
253 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 12 }}
254 - name: HONEYCOMB_PASSWORD
255 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 12 }}
256 - name: TRUSTSTORE_PASSWORD
257 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 12 }}
258 - name: KEYSTORE_PASSWORD
259 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 12 }}
261 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 12 }}
262 - name: DMAAP_PASSWORD
263 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 12 }}
264 - name: DMAAP_AUTHKEY
265 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 12 }}
266 - name: ENABLE_ODL_CLUSTER
267 value: "{{ .Values.config.enableClustering }}"
268 - name: MY_ODL_CLUSTER
269 value: "{{ .Values.config.myODLCluster }}"
270 - name: PEER_ODL_CLUSTER
271 value: "{{ .Values.config.peerODLCluster }}"
272 - name: IS_PRIMARY_CLUSTER
273 value: "{{ .Values.config.isPrimaryCluster }}"
275 value: "{{ .Values.config.geoEnabled}}"
276 - name: SDNC_AAF_ENABLED
278 - name: SDNC_REPLICAS
279 value: "{{ .Values.replicaCount }}"
281 value: {{ include "common.mariadbService" . }}
283 value: {{ .Values.persistence.mdsalPath }}
285 value: {{ .Values.persistence.daeximPath }}
287 value: {{ .Values.persistence.journalPath }}
288 - name: SNAPSHOTS_PATH
289 value: {{ .Values.persistence.snapshotsPath }}
291 value: "{{ .Values.config.javaHome}}"
293 value: "-Xms{{.Values.config.odl.javaOptions.minMemory}} -Xmx{{.Values.config.odl.javaOptions.maxMemory}}"
294 - name: LOG4J_FORMAT_MSG_NO_LOOKUPS
296 - name: KARAF_CONSOLE_LOG_LEVEL
297 value: "{{ include "common.log.level" . }}"
299 value: "{{ .Values.config.sdnr.enabled | default "false"}}"
300 {{- if eq .Values.config.sdnr.mode "web" }}
305 value: "{{ .Values.config.sdnr.sdnronly | default "false" }}"
306 {{- if .Values.config.sdnr.mariadb.enabled }}
307 - name: SDNRCONTROLLERID
312 value: "jdbc:mysql://{{ include "common.mariadbService" . }}:3306/{{ .Values.config.sdnr.mariadb.databaseName}}"
313 - name: SDNR_DB_DATABASE
314 value: {{ .Values.config.sdnr.mariadb.databaseName }}
315 - name: SDNRDBUSERNAME
316 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "sdnrdb-secret" "key" "login") | indent 12 }}
317 - name: SDNRDBPASSWORD
318 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "sdnrdb-secret" "key" "password") | indent 12 }}
319 - name: SDNR_ASYNC_HANDLING
320 value: {{ .Values.config.sdnr.mariadb.asyncHandling | default "false" | quote }}
321 - name: SDNR_ASYNC_POOLSIZE
322 value: {{ .Values.config.sdnr.mariadb.asyncPoolSize | default 200 | quote }}
325 value: "http://{{ .Values.elasticsearch.service.name | default "sdnrdb"}}.{{.Release.Namespace}}:{{.Values.elasticsearch.service.port | default "9200"}}"
326 {{- if .Values.config.sdnr.sdnrdbTrustAllCerts }}
327 - name: SDNRDBTRUSTALLCERTS
331 {{- if .Values.global.cmpv2Enabled }}
333 value: {{ (mustFirst (.Values.certificates)).mountPath }}
336 value: "{{ .Values.config.sdnr.oauth.enabled | default "false" }}"
337 - name: SDNR_NETCONF_CALLHOME_ENABLED
338 value: "{{ .Values.config.sdnr.netconfCallHome.enabled | default "false" }}"
339 - name: SDNR_VES_COLLECTOR_ENABLED
340 value: "{{ .Values.config.sdnr.vesCollector.enabled }}"
341 - name: SDNR_VES_COLLECTOR_TLS_ENABLED
342 value: "{{ .Values.config.sdnr.vesCollector.tls.enabled }}"
343 - name: SDNR_VES_COLLECTOR_TRUST_ALL_CERTS
344 value: "{{ .Values.config.sdnr.vesCollector.trustAllCertificates }}"
345 - name: SDNR_VES_COLLECTOR_IP
346 value: "{{ .Values.config.sdnr.vesCollector.address }}"
347 - name: SDNR_VES_COLLECTOR_PORT
348 value: "{{ .Values.config.sdnr.vesCollector.port }}"
349 - name: SDNR_VES_COLLECTOR_VERSION
350 value: "{{ .Values.config.sdnr.vesCollector.version | default "v7" }}"
351 - name: SDNR_VES_COLLECTOR_REPORTING_ENTITY_NAME
352 value: "{{ .Values.config.sdnr.vesCollector.reportingEntityName | default "ONAP SDN-R" }}"
353 - name: SDNR_VES_COLLECTOR_EVENTLOG_MSG_DETAIL
354 value: "{{ .Values.config.sdnr.vesCollector.eventLogMsgDetail | default "SHORT" }}"
355 - name: SDNR_VES_COLLECTOR_USERNAME
356 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "login") | indent 12 }}
357 - name: SDNR_VES_COLLECTOR_PASSWORD
358 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "password") | indent 12 }}
359 - name: SDNR_WEBSOCKET_PORT
360 value: "{{ .Values.sdnrWebsocketPort | default "8182"}}"
361 - name: SDNR_KAFKA_ENABLED
362 value: "{{ .Values.config.sdnr.kafka.enabled | default "false" }}"
363 {{ if .Values.config.sdnr.kafka.enabled }}
364 - name: SDNR_KAFKA_BOOTSTRAP_SERVERS
365 value: "{{ .Values.config.sdnr.kafka.bootstrapServers | default (include "common.release" .) }}-strimzi-kafka-bootstrap.{{.Release.Namespace}}:9092"
366 - name: SDNR_KAFKA_SECURITY_PROTOCOL
367 value: "{{ .Values.config.sdnr.kafka.securityProtocol | default "PLAINTEXT" }}"
368 - name: SDNR_KAFKA_SASL_MECHANISM
369 value: "{{ .Values.config.sdnr.kafka.saslMechanism | default "PLAIN" }}"
370 - name: SDNR_KAFKA_SASL_JASS_CONFIG
371 value: "{{ .Values.config.sdnr.kafka.saslJassConfig | default "PLAIN" }}"
376 {{- if .Values.global.cmpv2Enabled }}
377 {{ include "common.certManager.volumeMounts" . | indent 10 }}
379 - mountPath: /etc/localtime
382 - mountPath: /opt/opendaylight/current/etc/org.ops4j.pax.logging.cfg
383 name: sdnc-logging-cfg-config
384 subPath: org.ops4j.pax.logging.cfg
385 - mountPath: {{ .Values.config.binDir }}/installSdncDb.sh
387 subPath: installSdncDb.sh
388 - mountPath: {{ .Values.config.binDir }}/createLinks.sh
390 subPath: createLinks.sh
391 - mountPath: {{ .Values.config.ccsdkConfigDir }}/aaiclient.properties
393 subPath: aaiclient.properties
394 - mountPath: {{ .Values.config.configDir }}/aaiclient.properties
396 subPath: aaiclient.properties
397 - mountPath: {{ .Values.config.configDir }}/dblib.properties
399 subPath: dblib.properties
400 - mountPath: {{ .Values.config.configDir }}/lcm-dg.properties
402 subPath: lcm-dg.properties
403 - mountPath: {{ .Values.config.configDir }}/svclogic.properties
405 subPath: svclogic.properties
406 - mountPath: /opt/onap/sdnc/svclogic/config/svclogic.properties
408 subPath: svclogic.properties
409 - mountPath: {{ .Values.config.configDir }}/netbox.properties
411 subPath: netbox.properties
412 - mountPath: {{ .Values.config.configDir }}/blueprints-processor-adaptor.properties
414 subPath: blueprints-processor-adaptor.properties
415 - mountPath: {{ .Values.persistence.mdsalPath }}
416 name: {{ include "common.fullname" . }}-data
417 - mountPath: {{ .Values.log.path }}
419 - mountPath: {{ .Values.config.odl.salConfigDir }}/{{ .Values.config.odl.salConfigVersion}}/sal-clustering-config-{{ .Values.config.odl.salConfigVersion}}-akkaconf.xml
422 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.controller.cluster.datastore.cfg
424 subPath: org.opendaylight.controller.cluster.datastore.cfg
425 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.aaa.filterchain.cfg
427 subPath: org.opendaylight.aaa.filterchain.cfg
428 - mountPath: {{ .Values.config.odl.binDir }}/setenv
431 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-registrar.properties
433 subPath: mountpoint-registrar.properties
434 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-state-provider.properties
436 subPath: mountpoint-state-provider.properties
437 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.daexim.cfg
439 subPath: org.opendaylight.daexim.cfg
440 {{- if .Values.config.sdnr.oauth.enabled }}
441 - mountPath: {{ .Values.config.odl.etcDir }}/oauth-provider.config.json
443 subPath: oauth-provider.config.json
445 resources: {{ include "common.resources" . | nindent 12 }}
446 # side car containers
447 {{ include "common.log.sidecar" . | nindent 8 }}
448 {{- if .Values.nodeSelector }}
449 nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
451 {{- if .Values.affinity }}
452 affinity: {{ toYaml .Values.affinity | nindent 8 }}
455 - name: "{{ include "common.namespace" . }}-docker-registry-key"
456 serviceAccountName: {{ include "common.fullname" (dict "suffix" "read" "dot" . )}}
463 {{ include "common.log.volumes" . | nindent 8 }}
464 - name: sdnc-logging-cfg-config
466 name: {{ include "common.fullname" . }}-log-configmap
469 name: {{ include "common.fullname" . }}-bin
473 name: {{ include "common.fullname" . }}-properties
478 {{ if not .Values.persistence.enabled }}
479 - name: {{ include "common.fullname" . }}-data
482 {{- if .Values.global.cmpv2Enabled }}
483 {{ include "common.certManager.volumes" . | nindent 8 }}
485 volumeClaimTemplates:
487 name: {{ include "common.fullname" . }}-data
489 name: {{ include "common.fullname" . }}
490 chart: "{{ .Chart.Name }}-{{ .Chart.Version }}"
491 release: "{{ include "common.release" . }}"
492 heritage: "{{ .Release.Service }}"
495 - {{ .Values.persistence.accessMode }}
496 storageClassName: {{ include "common.storageClass" . }}
499 storage: {{ .Values.persistence.size }}