1 # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
2 # Copyright © 2017 Amdocs, Bell Canada
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 #################################################################
17 # Global configuration defaults.
18 #################################################################
21 nodePortPrefixExt: 304
22 repository: nexus3.onap.org:10001
23 readinessImage: onap/oom/readiness:3.0.1
24 loggingRepository: docker.elastic.co
25 loggingImage: beats/filebeat:5.5.0
27 mountPath: /dockerdata-nfs
30 envsubstImage: dibi/envsubst
32 #This flag allows SO to instantiate its own mariadb-galera cluster
33 #If shared instance is used, this chart assumes that DB already exists
35 service: mariadb-galera
37 nameOverride: mariadb-galera
42 image: onap/org.onap.oom.platform.cert-service.oom-certservice-client:2.0.0
44 name: oom-cert-service-client-tls-secret
45 mountPath: /etc/onap/oom/certservice/certs/
48 cert_path: /var/custom-certs
49 cmpv2Organization: "Linux-Foundation"
50 cmpv2OrganizationalUnit: "ONAP"
51 cmpv2Location: "San-Francisco"
53 # Client configuration related
55 common_name: "sdnc.simpledemo.onap.org"
56 requestURL: "https://oom-cert-service:8443/v1/certificate/"
57 requestTimeout: "30000"
58 keystorePath: "/etc/onap/oom/certservice/certs/certServiceClient-keystore.jks"
60 keystorePassword: "secret"
61 truststorePath: "/etc/onap/oom/certservice/certs/truststore.jks"
62 truststorePassword: "secret"
64 #################################################################
66 #################################################################
68 - uid: db-root-password
69 name: '{{ include "common.release" . }}-sdnc-db-root-password'
71 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
72 ternary (default (include "common.mariadb.secret.rootPassSecretName"
73 (dict "dot" . "chartName"
74 (index .Values "mariadb-galera" "nameOverride")))
75 (index .Values "mariadb-galera" "config"
76 "mariadbRootPasswordExternalSecret"))
77 (include "common.mariadb.secret.rootPassSecretName"
78 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
79 password: '{{ (index .Values "mariadb-galera" "config" "mariadbRootPassword") }}'
81 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
83 # This is a nasty trick that allows you override this secret using external one
84 # with the same field that is used to pass this to subchart
85 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "config" "userCredentialsExternalSecret")) .) (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "config" "userCredentialsExternalSecret"))}}'
86 login: '{{ index .Values "mariadb-galera" "config" "userName" }}'
87 password: '{{ index .Values "mariadb-galera" "config" "userPassword" }}'
89 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
91 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
92 login: '{{ .Values.config.odlUser }}'
93 password: '{{ .Values.config.odlPassword }}'
94 # For now this is left hardcoded but should be revisited in a future
95 passwordPolicy: required
98 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
99 password: '{{ .Values.config.netboxApikey }}'
100 passwordPolicy: required
101 - uid: aai-user-creds
103 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
104 login: '{{ .Values.config.aaiUser }}'
105 password: '{{ .Values.config.aaiPassword }}'
106 passwordPolicy: required
107 - uid: modeling-user-creds
109 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
110 login: '{{ .Values.config.modelingUser }}'
111 password: '{{ .Values.config.modelingPassword }}'
112 passwordPolicy: required
113 - uid: restconf-creds
115 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
116 login: '{{ .Values.config.restconfUser }}'
117 password: '{{ .Values.config.restconfPassword }}'
118 passwordPolicy: required
120 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
122 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
123 login: '{{ .Values.config.ansibleUser }}'
124 password: '{{ .Values.config.ansiblePassword }}'
125 passwordPolicy: required
126 - uid: scaleout-creds
128 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
129 login: '{{ .Values.config.scaleoutUser }}'
130 password: '{{ .Values.config.scaleoutPassword }}'
131 passwordPolicy: required
132 #################################################################
133 # Application configuration defaults.
134 #################################################################
136 repository: nexus3.onap.org:10001
138 image: onap/sdnc-image:2.0.2
139 busyboxRepository: docker.io
140 busyboxImage: busybox:1.30
142 # flag to enable debugging - application support required
145 # application configuration
150 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
151 # odlCredsExternalSecret: some secret
152 netboxApikey: onceuponatimeiplayedwithnetbox20180814
153 # netboxApikeyExternalSecret: some secret
154 aaiUser: sdnc@sdnc.onap.org
155 aaiPassword: demo123456!
156 # aaiCredsExternalSecret: some secret
157 modelingUser: ccsdkapps
158 modelingPassword: ccsdkapps
159 # modelingCredsExternalSecret: some secret
161 restconfPassword: admin
162 # restconfCredsExternalSecret: some secret
164 scaleoutPassword: admin
165 # scaleoutExternalSecret: some secret
167 ansiblePassword: sdnc
168 # ansibleCredsExternalSecret: some secret
169 dbSdnctlDatabase: &sdncDbName sdnctl
170 enableClustering: true
171 sdncHome: /opt/onap/sdnc
172 binDir: /opt/onap/sdnc/bin
173 etcDir: /opt/onap/sdnc/data
175 # if geoEnabled is set to true here, mysql.geoEnabled must be set to true
176 # if geoEnabled is set to true the following 3 values must be set to their proper values
177 myODLCluster: 127.0.0.1
178 peerODLCluster: 127.0.0.1
179 isPrimaryCluster: true
180 configDir: /opt/onap/sdnc/data/properties
181 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
184 logstashServiceName: log-ls
186 ansibleServiceName: sdnc-ansible-server
188 javaHome: /opt/java/openjdk
191 etcDir: /opt/opendaylight/etc
192 binDir: /opt/opendaylight/bin
193 gcLogDir: /opt/opendaylight/data/log
194 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
195 salConfigVersion: 1.9.1
202 recoveryEventTimeout: 90s
204 persistentActorRestartMinBackoffInSeconds: 10
205 persistentActorRestartMaxBackoffInSeconds: 40
206 persistentActorRestartResetBackoffInSeconds: 20
207 shardTransactionCommitTimeoutInSeconds: 120
208 shardIsolatedLeaderCheckIntervalInMillis: 30000
209 operationTimeoutInSeconds: 120
211 maxGCPauseMillis: 100
212 parallelGCThreads : 3
217 # Next line enables gc logging
218 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
219 # enables sdnr functionality
222 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
223 # mode: dm - SDNC contains sdnr device manager + ODLUX components
225 # sdnronly: true starts sdnc container with odl and sdnrwt features only
227 sdnrdbTrustAllCerts: true
228 mountpointRegistrarEnabled: false
229 mountpointStateProviderEnabled: false
233 # dependency / sub-chart configuration
235 nameOverride: sdnc-cert-initializer
236 truststoreMountpath: /opt/onap/sdnc/data/stores
238 app_ns: "org.osaaf.aaf"
239 fqi: "sdnc@sdnc.onap.org"
240 fqi_namespace: org.onap.sdnc
241 public_fqdn: "sdnc.onap.org"
242 aafDeployFqi: "deployer@people.osaaf.org"
243 aafDeployPass: demo123456!
244 cadi_latitude: "38.0"
245 cadi_longitude: "-72.0"
246 credsPath: /opt/app/osaaf/local
248 cd /opt/app/osaaf/local;
249 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
251 # dependency / sub-chart configuration
254 mariadb-galera: &mariadbGalera
255 nameOverride: sdnc-db
256 config: &mariadbGaleraConfig
257 rootPasswordExternalSecret: '{{ ternary (include "common.release" .)-sdnc-db-root-password "" .Values.global.mariadbGalera.localCluster }}'
259 userCredentialsExternalSecret: *dbSecretName
265 mountSubPath: sdnc/mariadb-galera
274 nameOverride: sdnc-dmaap-listener
278 <<: *mariadbGaleraConfig
279 mysqlDatabase: *sdncDbName
284 configDir: /opt/onap/sdnc/data/properties
285 odlCredsExternalSecret: *odlCredsSecretName
292 <<: *mariadbGaleraConfig
293 mysqlDatabase: *sdncDbName
294 nameOverride: sdnc-ueb-listener
298 configDir: /opt/onap/sdnc/data/properties
299 odlCredsExternalSecret: *odlCredsSecretName
304 restCredsExternalSecret: *ansibleSecretName
308 <<: *mariadbGaleraConfig
309 mysqlDatabase: ansible
311 name: sdnc-ansible-server
316 nameOverride: sdnc-dgbuilder
318 nameOverride: sdnc-dgbuilder-cert-initializer
322 rootPasswordExternalSecret: '{{ ternary (printf "%s-sdnc-db-root-password" (include "common.release" .)) (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" "mariadb-galera")) .Values.global.mariadbGalera.localCluster }}'
323 userCredentialsExternalSecret: *dbSecretName
324 dbPodName: mariadb-galera
325 dbServiceName: mariadb-galera
326 # This should be revisited and changed to plain text
327 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
336 - baseaddr: "sdnc-dgbuilder"
337 name: "sdnc-dgbuilder"
339 - baseaddr: "sdnc-web-service"
340 name: "sdnc-web-service"
347 # local elasticsearch cluster
348 localElasticCluster: true
354 fqi_namespace: org.onap.sdnc
355 fqi: "sdnc@sdnc.onap.org"
360 # dedicatednode: "yes"
361 # working as master node only, in this case increase replicaCount for elasticsearch-data
362 # dedicatednode: "no"
363 # handles master and data node functionality
369 # default number of instances
376 # probe configuration parameters
378 initialDelaySeconds: 10
380 # necessary to disable liveness probe when setting breakpoints
381 # in debugger so K8s doesn't restart unresponsive container
385 initialDelaySeconds: 10
418 ## Persist data to a persitent volume
422 ## A manually managed Persistent Volume and Claim
423 ## Requires persistence.enabled: true
424 ## If defined, PVC must be created manually before volume will be bound
426 volumeReclaimPolicy: Retain
428 ## database data Persistent Volume Storage Class
429 ## If defined, storageClassName: <storageClass>
430 ## If set to "-", storageClassName: "", which disables dynamic provisioning
431 ## If undefined (the default) or set to null, no storageClassName spec is
432 ## set, choosing the default provisioner. (gp2 on AWS, standard on
433 ## GKE, AWS & OpenStack)
434 accessMode: ReadWriteOnce
436 mountPath: /dockerdata-nfs
437 mountSubPath: sdnc/mdsal
438 mdsalPath: /opt/opendaylight/current/daexim
443 ## A manually managed Persistent Volume and Claim
444 ## Requires persistence.enabled: true
445 ## If defined, PVC must be created manually before volume will be bound
448 volumeReclaimPolicy: Retain
449 accessMode: ReadWriteOnce
451 mountPath: /dockerdata-nfs
452 mountSubPath: sdnc/certs
453 certPath: /opt/app/osaaf
454 ##storageClass: "manual"
459 - baseaddr: "sdnc.api"
465 #Resource Limit flavor -By Default using small
467 #segregation for different envionment (Small and Large)