1 # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
2 # Copyright © 2017 Amdocs, Bell Canada
3 # Copyright © 2021 Nokia
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 #################################################################
18 # Global configuration defaults.
19 #################################################################
22 nodePortPrefixExt: 304
24 mountPath: /dockerdata-nfs
27 #This flag allows SO to instantiate its own mariadb-galera cluster
28 #If shared instance is used, this chart assumes that DB already exists
30 service: mariadb-galera
32 nameOverride: mariadb-galera
34 #################################################################
36 #################################################################
38 - uid: db-root-password
39 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
41 # If we're using shared mariadb, we need to use the secret name (second
43 # If not, we do the same trick than for user db secret hat allows you
44 # override this secret using external one with the same field that is used
45 # to pass this to subchart.
46 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
47 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
50 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
51 (include "common.mariadb.secret.rootPassSecretName"
53 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
54 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
56 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
58 # This is a nasty trick that allows you override this secret using external one
59 # with the same field that is used to pass this to subchart
60 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
63 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
64 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
65 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
67 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
69 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
70 login: '{{ .Values.config.odlUser }}'
71 password: '{{ .Values.config.odlPassword }}'
72 # For now this is left hardcoded but should be revisited in a future
73 passwordPolicy: required
74 - uid: dmaap-proxy-creds
75 name: &dmaapProxyCredsSecretName '{{ include "common.release" . }}-sdnc-dmaap-proxy-creds'
77 externalSecret: '{{ .Values.config.dmaapProxyCredsExternalSecret }}'
78 login: '{{ .Values.config.sdnr.dmaapProxy.user }}'
79 password: '{{ .Values.config.sdnr.dmaapProxy.password }}'
80 # For now this is left hardcoded but should be revisited in a future
81 passwordPolicy: required
84 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
85 password: '{{ .Values.config.netboxApikey }}'
86 passwordPolicy: required
87 - uid: aai-truststore-password
89 externalSecret: '{{ .Values.config.aaiTruststoreExternalSecret }}'
90 password: '{{ .Values.config.aaiTruststorePassword }}'
91 passwordPolicy: required
92 - uid: ansible-truststore-password
94 externalSecret: '{{ .Values.config.ansibleTruststoreExternalSecret }}'
95 password: '{{ .Values.config.ansibleTruststorePassword }}'
96 passwordPolicy: required
97 - uid: truststore-password
99 externalSecret: '{{ .Values.config.truststoreExternalSecret }}'
100 password: '{{ .Values.config.truststorePassword }}'
101 passwordPolicy: required
102 - uid: keystore-password
104 externalSecret: '{{ .Values.config.keystoreExternalSecret }}'
105 password: '{{ .Values.config.keystorePassword }}'
106 passwordPolicy: required
109 externalSecret: '{{ .Values.config.dmaapAuthKeyExternalSecret }}'
110 password: '{{ .Values.config.dmaapAuthKey }}'
111 passwordPolicy: required
112 - uid: aai-user-creds
114 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
115 login: '{{ .Values.config.aaiUser }}'
116 password: '{{ .Values.config.aaiPassword }}'
117 passwordPolicy: required
120 externalSecret: '{{ .Values.config.soCredsExternalSecret}}'
121 login: '{{ .Values.config.soUser }}'
122 password: '{{ .Values.config.soPassword }}'
123 passwordPolicy: required
124 - uid: neng-user-creds
126 externalSecret: '{{ .Values.config.nengCredsExternalSecret}}'
127 login: '{{ .Values.config.nengUser }}'
128 password: '{{ .Values.config.nengPassword }}'
129 passwordPolicy: required
130 - uid: cds-user-creds
132 externalSecret: '{{ .Values.config.cdsCredsExternalSecret}}'
133 login: '{{ .Values.config.cdsUser }}'
134 password: '{{ .Values.config.cdsPassword }}'
135 passwordPolicy: required
136 - uid: honeycomb-user-creds
138 externalSecret: '{{ .Values.config.honeycombCredsExternalSecret}}'
139 login: '{{ .Values.config.honeycombUser }}'
140 password: '{{ .Values.config.honeycombPassword }}'
141 passwordPolicy: required
142 - uid: dmaap-user-creds
144 externalSecret: '{{ .Values.config.dmaapCredsExternalSecret}}'
145 login: '{{ .Values.config.dmaapUser }}'
146 password: '{{ .Values.config.dmaapPassword }}'
147 passwordPolicy: required
148 - uid: modeling-user-creds
150 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
151 login: '{{ .Values.config.modelingUser }}'
152 password: '{{ .Values.config.modelingPassword }}'
153 passwordPolicy: required
154 - uid: restconf-creds
156 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
157 login: '{{ .Values.config.restconfUser }}'
158 password: '{{ .Values.config.restconfPassword }}'
159 passwordPolicy: required
161 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
163 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
164 login: '{{ .Values.config.ansibleUser }}'
165 password: '{{ .Values.config.ansiblePassword }}'
166 passwordPolicy: required
167 - uid: scaleout-creds
169 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
170 login: '{{ .Values.config.scaleoutUser }}'
171 password: '{{ .Values.config.scaleoutPassword }}'
172 passwordPolicy: required
173 - uid: oauth-token-secret
175 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.tokenExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
176 password: '{{ .Values.config.sdnr.oauth.tokenSecret }}'
177 passwordPolicy: required
178 - uid: keycloak-secret
180 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.providersSecrets.keycloakExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
181 password: '{{ .Values.config.sdnr.oauth.providersSecrets.keycloak }}'
182 passwordPolicy: required
184 #################################################################
186 #################################################################
188 - mountPath: /var/custom-certs
189 commonName: sdnc.simpledemo.onap.org
191 - sdnc.simpledemo.onap.org
197 name: sdnc-cmpv2-keystore-password
200 group: certmanager.onap.org
202 name: cmpv2-issuer-onap
203 #################################################################
204 # Application configuration defaults.
205 #################################################################
209 image: onap/sdnc-image:2.1.6
211 # flag to enable debugging - application support required
214 # application configuration
219 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
220 # odlCredsExternalSecret: some secret
221 netboxApikey: onceuponatimeiplayedwithnetbox20180814
222 # netboxApikeyExternalSecret: some secret
223 aaiTruststorePassword: changeit
224 # aaiTruststoreExternalSecret: some secret
225 ansibleTruststorePassword: changeit
226 # ansibleTruststoreExternalSecret: some secret
227 truststorePassword: adminadmin
228 # truststoreExternalSecret: some secret
229 keystorePassword: adminadmin
230 # keystoreExternalSecret: some secret
231 aaiUser: sdnc@sdnc.onap.org
232 aaiPassword: demo123456!
233 # aaiCredsExternalSecret: some secret
235 soPassword: password1$
236 # soCredsExternalSecret: some secret
238 nengPassword: ccsdkapps
239 # nengCredsExternalSecret: some secret
241 cdsPassword: ccsdkapps
242 # cdsCredsExternalSecret: some secret
244 honeycombPassword: admin
245 # honeycombCredsExternalSecret: some secret
248 dmaapAuthKey: "fs20cKwalJ6ry4kX:7Hqm6BDZK47IKxGRkOPFk33qMYs="
249 # dmaapCredsExternalSecret: some secret
250 # dmaapAuthKeyExternalSecret: some secret
251 modelingUser: ccsdkapps
252 modelingPassword: ccsdkapps
253 # modelingCredsExternalSecret: some secret
255 restconfPassword: admin
256 # restconfCredsExternalSecret: some secret
258 scaleoutPassword: admin
259 # scaleoutExternalSecret: some secret
261 ansiblePassword: sdnc
262 # ansibleCredsExternalSecret: some secret
263 dbSdnctlDatabase: &sdncDbName sdnctl
264 enableClustering: true
265 sdncHome: /opt/onap/sdnc
266 binDir: /opt/onap/sdnc/bin
267 etcDir: /opt/onap/sdnc/data
269 # if geoEnabled is set to true here, mysql.geoEnabled must be set to true
270 # if geoEnabled is set to true the following 3 values must be set to their proper values
271 myODLCluster: 127.0.0.1
272 peerODLCluster: 127.0.0.1
273 isPrimaryCluster: true
274 configDir: /opt/onap/sdnc/data/properties
275 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
278 logstashServiceName: log-ls
280 ansibleServiceName: sdnc-ansible-server
282 javaHome: /opt/java/openjdk
285 etcDir: /opt/opendaylight/etc
286 binDir: /opt/opendaylight/bin
287 gcLogDir: /opt/opendaylight/data/log
288 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
289 salConfigVersion: 1.10.4
296 recoveryEventTimeout: 90s
298 persistentActorRestartMinBackoffInSeconds: 10
299 persistentActorRestartMaxBackoffInSeconds: 40
300 persistentActorRestartResetBackoffInSeconds: 20
301 shardTransactionCommitTimeoutInSeconds: 120
302 shardIsolatedLeaderCheckIntervalInMillis: 30000
303 operationTimeoutInSeconds: 120
305 maxGCPauseMillis: 100
306 parallelGCThreads : 3
311 # Next line enables gc logging
312 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
313 # enables sdnr functionality
316 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
317 # mode: dm - SDNC contains sdnr device manager + ODLUX components
319 # sdnronly: true starts sdnc container with odl and sdnrwt features only
321 sdnrdbTrustAllCerts: true
322 mountpointRegistrarEnabled: false
323 mountpointStateProviderEnabled: false
327 # enable and set dmaap-proxy for mountpointRegistrar
332 password: addPasswordHere
336 tokenIssuer: ONAP SDNC
338 supportOdlusers: true
343 # example definition for a oauth provider
345 keycloak: d8d7ed52-0691-4353-9ac6-5383e72e9c46
349 host: http://keycloak:8080
351 secret: ${KEYCLOAK_SECRET}
353 title: ONAP Keycloak Provider
357 # dependency / sub-chart configuration
359 nameOverride: sdnc-cert-initializer
360 truststoreMountpath: /opt/onap/sdnc/data/stores
362 app_ns: "org.osaaf.aaf"
363 fqi: "sdnc@sdnc.onap.org"
364 fqi_namespace: org.onap.sdnc
365 public_fqdn: "sdnc.onap.org"
366 aafDeployFqi: "deployer@people.osaaf.org"
367 aafDeployPass: demo123456!
368 cadi_latitude: "38.0"
369 cadi_longitude: "-72.0"
370 credsPath: /opt/app/osaaf/local
372 cd /opt/app/osaaf/local;
373 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
375 # dependency / sub-chart configuration
378 mariadb-galera: &mariadbGalera
379 nameOverride: &sdnc-db sdnc-db
380 config: &mariadbGaleraConfig
381 rootPasswordExternalSecret: *rootDbSecret
382 userName: &dbUser sdnctl
383 userCredentialsExternalSecret: *dbSecretName
385 externalSecret: *rootDbSecret
388 externalSecret: *dbSecretName
393 mountSubPath: sdnc/mariadb-galera
397 nameOverride: *sdnc-db
404 nameOverride: sdnc-dmaap-listener
408 <<: *mariadbGaleraConfig
409 mysqlDatabase: *sdncDbName
414 configDir: /opt/onap/sdnc/data/properties
415 odlCredsExternalSecret: *odlCredsSecretName
422 <<: *mariadbGaleraConfig
423 mysqlDatabase: *sdncDbName
424 nameOverride: sdnc-ueb-listener
428 configDir: /opt/onap/sdnc/data/properties
429 odlCredsExternalSecret: *odlCredsSecretName
434 restCredsExternalSecret: *ansibleSecretName
438 <<: *mariadbGaleraConfig
439 mysqlDatabase: ansible
441 name: sdnc-ansible-server
446 nameOverride: sdnc-dgbuilder
448 nameOverride: sdnc-dgbuilder-cert-initializer
452 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
454 (printf "%s-sdnc-db-root-password" (include "common.release" .))
455 (include "common.mariadb.secret.rootPassSecretName"
456 (dict "dot" . "chartName" "mariadb-galera")) }}'
457 userCredentialsExternalSecret: *dbSecretName
458 dbPodName: mariadb-galera
459 dbServiceName: mariadb-galera
460 # This should be revisited and changed to plain text
461 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
470 - baseaddr: "sdnc-dgbuilder"
471 name: "sdnc-dgbuilder"
473 - baseaddr: "sdnc-web-service"
474 name: "sdnc-web-service"
481 # local elasticsearch cluster
482 localElasticCluster: true
484 nameOverride: &elasticSearchName sdnrdb
488 fqi_namespace: org.onap.sdnc
489 fqi: "sdnc@sdnc.onap.org"
491 name: *elasticSearchName
494 # dedicatednode: "yes"
495 # working as master node only, in this case increase replicaCount for elasticsearch-data
496 # dedicatednode: "no"
497 # handles master and data node functionality
499 nameOverride: *elasticSearchName
500 cluster_name: sdnrdb-cluster
504 # default number of instances
511 # probe configuration parameters
513 initialDelaySeconds: 10
515 # necessary to disable liveness probe when setting breakpoints
516 # in debugger so K8s doesn't restart unresponsive container
520 initialDelaySeconds: 10
556 ## Persist data to a persitent volume
560 ## A manually managed Persistent Volume and Claim
561 ## Requires persistence.enabled: true
562 ## If defined, PVC must be created manually before volume will be bound
564 volumeReclaimPolicy: Retain
566 ## database data Persistent Volume Storage Class
567 ## If defined, storageClassName: <storageClass>
568 ## If set to "-", storageClassName: "", which disables dynamic provisioning
569 ## If undefined (the default) or set to null, no storageClassName spec is
570 ## set, choosing the default provisioner. (gp2 on AWS, standard on
571 ## GKE, AWS & OpenStack)
572 accessMode: ReadWriteOnce
574 mountPath: /dockerdata-nfs
575 mountSubPath: sdnc/mdsal
576 mdsalPath: /opt/opendaylight/mdsal
577 daeximPath: /opt/opendaylight/mdsal/daexim
578 journalPath: /opt/opendaylight/journal
579 snapshotsPath: /opt/opendaylight/snapshots
584 ## A manually managed Persistent Volume and Claim
585 ## Requires persistence.enabled: true
586 ## If defined, PVC must be created manually before volume will be bound
589 volumeReclaimPolicy: Retain
590 accessMode: ReadWriteOnce
592 mountPath: /dockerdata-nfs
593 mountSubPath: sdnc/certs
594 certPath: /opt/app/osaaf
595 ##storageClass: "manual"
600 - baseaddr: "sdnc.api"
606 #Resource Limit flavor -By Default using small
608 #segregation for different envionment (Small and Large)