1 # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
2 # Copyright © 2017 Amdocs, Bell Canada
3 # Copyright © 2021 Nokia
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 #################################################################
18 # Global configuration defaults.
19 #################################################################
22 nodePortPrefixExt: 304
24 mountPath: /dockerdata-nfs
27 #This flag allows SO to instantiate its own mariadb-galera cluster
28 #If shared instance is used, this chart assumes that DB already exists
30 service: mariadb-galera
32 nameOverride: mariadb-galera
33 # Enabling CMPv2 with CertManager
34 CMPv2CertManagerIntegration: false
36 #################################################################
38 #################################################################
40 - uid: db-root-password
41 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
43 # If we're using shared mariadb, we need to use the secret name (second
45 # If not, we do the same trick than for user db secret hat allows you
46 # override this secret using external one with the same field that is used
47 # to pass this to subchart.
48 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
49 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
52 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
53 (include "common.mariadb.secret.rootPassSecretName"
55 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
56 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
58 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
60 # This is a nasty trick that allows you override this secret using external one
61 # with the same field that is used to pass this to subchart
62 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
65 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
66 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
67 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
69 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
71 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
72 login: '{{ .Values.config.odlUser }}'
73 password: '{{ .Values.config.odlPassword }}'
74 # For now this is left hardcoded but should be revisited in a future
75 passwordPolicy: required
76 - uid: dmaap-proxy-creds
77 name: &dmaapProxyCredsSecretName '{{ include "common.release" . }}-sdnc-dmaap-proxy-creds'
79 externalSecret: '{{ .Values.config.dmaapProxyCredsExternalSecret }}'
80 login: '{{ .Values.config.sdnr.dmaapProxy.user }}'
81 password: '{{ .Values.config.sdnr.dmaapProxy.password }}'
82 # For now this is left hardcoded but should be revisited in a future
83 passwordPolicy: required
86 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
87 password: '{{ .Values.config.netboxApikey }}'
88 passwordPolicy: required
91 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
92 login: '{{ .Values.config.aaiUser }}'
93 password: '{{ .Values.config.aaiPassword }}'
94 passwordPolicy: required
95 - uid: modeling-user-creds
97 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
98 login: '{{ .Values.config.modelingUser }}'
99 password: '{{ .Values.config.modelingPassword }}'
100 passwordPolicy: required
101 - uid: restconf-creds
103 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
104 login: '{{ .Values.config.restconfUser }}'
105 password: '{{ .Values.config.restconfPassword }}'
106 passwordPolicy: required
108 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
110 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
111 login: '{{ .Values.config.ansibleUser }}'
112 password: '{{ .Values.config.ansiblePassword }}'
113 passwordPolicy: required
114 - uid: scaleout-creds
116 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
117 login: '{{ .Values.config.scaleoutUser }}'
118 password: '{{ .Values.config.scaleoutPassword }}'
119 passwordPolicy: required
120 - uid: keystore-password
123 passwordPolicy: required
124 #################################################################
126 #################################################################
128 - mountPath: /var/custom-certs
129 commonName: sdnc.simpledemo.onap.org
131 - sdnc.simpledemo.onap.org
135 name: keystore-password
140 name: keystore-password
142 #################################################################
143 # Application configuration defaults.
144 #################################################################
148 image: onap/sdnc-image:2.0.5
150 # flag to enable debugging - application support required
153 # application configuration
158 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
159 # odlCredsExternalSecret: some secret
160 netboxApikey: onceuponatimeiplayedwithnetbox20180814
161 # netboxApikeyExternalSecret: some secret
162 aaiUser: sdnc@sdnc.onap.org
163 aaiPassword: demo123456!
164 # aaiCredsExternalSecret: some secret
165 modelingUser: ccsdkapps
166 modelingPassword: ccsdkapps
167 # modelingCredsExternalSecret: some secret
169 restconfPassword: admin
170 # restconfCredsExternalSecret: some secret
172 scaleoutPassword: admin
173 # scaleoutExternalSecret: some secret
175 ansiblePassword: sdnc
176 # ansibleCredsExternalSecret: some secret
177 dbSdnctlDatabase: &sdncDbName sdnctl
178 enableClustering: true
179 sdncHome: /opt/onap/sdnc
180 binDir: /opt/onap/sdnc/bin
181 etcDir: /opt/onap/sdnc/data
183 # if geoEnabled is set to true here, mysql.geoEnabled must be set to true
184 # if geoEnabled is set to true the following 3 values must be set to their proper values
185 myODLCluster: 127.0.0.1
186 peerODLCluster: 127.0.0.1
187 isPrimaryCluster: true
188 configDir: /opt/onap/sdnc/data/properties
189 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
192 logstashServiceName: log-ls
194 ansibleServiceName: sdnc-ansible-server
196 javaHome: /opt/java/openjdk
199 etcDir: /opt/opendaylight/etc
200 binDir: /opt/opendaylight/bin
201 gcLogDir: /opt/opendaylight/data/log
202 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
203 salConfigVersion: 1.10.4
210 recoveryEventTimeout: 90s
212 persistentActorRestartMinBackoffInSeconds: 10
213 persistentActorRestartMaxBackoffInSeconds: 40
214 persistentActorRestartResetBackoffInSeconds: 20
215 shardTransactionCommitTimeoutInSeconds: 120
216 shardIsolatedLeaderCheckIntervalInMillis: 30000
217 operationTimeoutInSeconds: 120
219 maxGCPauseMillis: 100
220 parallelGCThreads : 3
225 # Next line enables gc logging
226 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
227 # enables sdnr functionality
230 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
231 # mode: dm - SDNC contains sdnr device manager + ODLUX components
233 # sdnronly: true starts sdnc container with odl and sdnrwt features only
235 sdnrdbTrustAllCerts: true
236 mountpointRegistrarEnabled: false
237 mountpointStateProviderEnabled: false
238 # enable and set dmaap-proxy for mountpointRegistrar
243 password: addPasswordHere
250 # dependency / sub-chart configuration
252 nameOverride: sdnc-cert-initializer
253 truststoreMountpath: /opt/onap/sdnc/data/stores
255 app_ns: "org.osaaf.aaf"
256 fqi: "sdnc@sdnc.onap.org"
257 fqi_namespace: org.onap.sdnc
258 public_fqdn: "sdnc.onap.org"
259 aafDeployFqi: "deployer@people.osaaf.org"
260 aafDeployPass: demo123456!
261 cadi_latitude: "38.0"
262 cadi_longitude: "-72.0"
263 credsPath: /opt/app/osaaf/local
265 cd /opt/app/osaaf/local;
266 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
268 # dependency / sub-chart configuration
271 mariadb-galera: &mariadbGalera
272 nameOverride: &sdnc-db sdnc-db
273 config: &mariadbGaleraConfig
274 rootPasswordExternalSecret: *rootDbSecret
275 userName: &dbUser sdnctl
276 userCredentialsExternalSecret: *dbSecretName
278 externalSecret: *rootDbSecret
281 externalSecret: *dbSecretName
286 mountSubPath: sdnc/mariadb-galera
290 nameOverride: *sdnc-db
297 nameOverride: sdnc-dmaap-listener
301 <<: *mariadbGaleraConfig
302 mysqlDatabase: *sdncDbName
307 configDir: /opt/onap/sdnc/data/properties
308 odlCredsExternalSecret: *odlCredsSecretName
315 <<: *mariadbGaleraConfig
316 mysqlDatabase: *sdncDbName
317 nameOverride: sdnc-ueb-listener
321 configDir: /opt/onap/sdnc/data/properties
322 odlCredsExternalSecret: *odlCredsSecretName
327 restCredsExternalSecret: *ansibleSecretName
331 <<: *mariadbGaleraConfig
332 mysqlDatabase: ansible
334 name: sdnc-ansible-server
339 nameOverride: sdnc-dgbuilder
341 nameOverride: sdnc-dgbuilder-cert-initializer
345 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
347 (printf "%s-sdnc-db-root-password" (include "common.release" .))
348 (include "common.mariadb.secret.rootPassSecretName"
349 (dict "dot" . "chartName" "mariadb-galera")) }}'
350 userCredentialsExternalSecret: *dbSecretName
351 dbPodName: mariadb-galera
352 dbServiceName: mariadb-galera
353 # This should be revisited and changed to plain text
354 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
363 - baseaddr: "sdnc-dgbuilder"
364 name: "sdnc-dgbuilder"
366 - baseaddr: "sdnc-web-service"
367 name: "sdnc-web-service"
374 # local elasticsearch cluster
375 localElasticCluster: true
377 nameOverride: &elasticSearchName sdnrdb
381 fqi_namespace: org.onap.sdnc
382 fqi: "sdnc@sdnc.onap.org"
384 name: *elasticSearchName
387 # dedicatednode: "yes"
388 # working as master node only, in this case increase replicaCount for elasticsearch-data
389 # dedicatednode: "no"
390 # handles master and data node functionality
392 nameOverride: *elasticSearchName
393 cluster_name: *elasticSearchName
397 # default number of instances
404 # probe configuration parameters
406 initialDelaySeconds: 10
408 # necessary to disable liveness probe when setting breakpoints
409 # in debugger so K8s doesn't restart unresponsive container
413 initialDelaySeconds: 10
446 ## Persist data to a persitent volume
450 ## A manually managed Persistent Volume and Claim
451 ## Requires persistence.enabled: true
452 ## If defined, PVC must be created manually before volume will be bound
454 volumeReclaimPolicy: Retain
456 ## database data Persistent Volume Storage Class
457 ## If defined, storageClassName: <storageClass>
458 ## If set to "-", storageClassName: "", which disables dynamic provisioning
459 ## If undefined (the default) or set to null, no storageClassName spec is
460 ## set, choosing the default provisioner. (gp2 on AWS, standard on
461 ## GKE, AWS & OpenStack)
462 accessMode: ReadWriteOnce
464 mountPath: /dockerdata-nfs
465 mountSubPath: sdnc/mdsal
466 mdsalPath: /opt/opendaylight/mdsal
467 daeximPath: /opt/opendaylight/daexim
468 journalPath: /opt/opendaylight/journal
469 snapshotsPath: /opt/opendaylight/snapshots
474 ## A manually managed Persistent Volume and Claim
475 ## Requires persistence.enabled: true
476 ## If defined, PVC must be created manually before volume will be bound
479 volumeReclaimPolicy: Retain
480 accessMode: ReadWriteOnce
482 mountPath: /dockerdata-nfs
483 mountSubPath: sdnc/certs
484 certPath: /opt/app/osaaf
485 ##storageClass: "manual"
490 - baseaddr: "sdnc.api"
496 #Resource Limit flavor -By Default using small
498 #segregation for different envionment (Small and Large)