1 # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
2 # Copyright © 2017 Amdocs, Bell Canada
3 # Copyright © 2021 Nokia
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 #################################################################
18 # Global configuration defaults.
19 #################################################################
22 nodePortPrefixExt: 304
24 mountPath: /dockerdata-nfs
26 centralizedLoggingEnabled: true
28 #This flag allows SO to instantiate its own mariadb-galera cluster
29 #If shared instance is used, this chart assumes that DB already exists
31 service: mariadb-galera
33 nameOverride: mariadb-galera
35 #################################################################
37 #################################################################
39 - uid: db-root-password
40 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
42 # If we're using shared mariadb, we need to use the secret name (second
44 # If not, we do the same trick than for user db secret hat allows you
45 # override this secret using external one with the same field that is used
46 # to pass this to subchart.
47 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
48 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
51 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
52 (include "common.mariadb.secret.rootPassSecretName"
54 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
55 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
57 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
59 # This is a nasty trick that allows you override this secret using external one
60 # with the same field that is used to pass this to subchart
61 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
64 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
65 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
66 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
68 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
70 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
71 login: '{{ .Values.config.odlUser }}'
72 password: '{{ .Values.config.odlPassword }}'
73 # For now this is left hardcoded but should be revisited in a future
74 passwordPolicy: required
75 - uid: dmaap-proxy-creds
76 name: &dmaapProxyCredsSecretName '{{ include "common.release" . }}-sdnc-dmaap-proxy-creds'
78 externalSecret: '{{ .Values.config.dmaapProxyCredsExternalSecret }}'
79 login: '{{ .Values.config.sdnr.dmaapProxy.user }}'
80 password: '{{ .Values.config.sdnr.dmaapProxy.password }}'
81 # For now this is left hardcoded but should be revisited in a future
82 passwordPolicy: required
85 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
86 password: '{{ .Values.config.netboxApikey }}'
87 passwordPolicy: required
88 - uid: aai-truststore-password
90 externalSecret: '{{ .Values.config.aaiTruststoreExternalSecret }}'
91 password: '{{ .Values.config.aaiTruststorePassword }}'
92 passwordPolicy: required
93 - uid: ansible-truststore-password
95 externalSecret: '{{ .Values.config.ansibleTruststoreExternalSecret }}'
96 password: '{{ .Values.config.ansibleTruststorePassword }}'
97 passwordPolicy: required
98 - uid: truststore-password
100 externalSecret: '{{ .Values.config.truststoreExternalSecret }}'
101 password: '{{ .Values.config.truststorePassword }}'
102 passwordPolicy: required
103 - uid: keystore-password
105 externalSecret: '{{ .Values.config.keystoreExternalSecret }}'
106 password: '{{ .Values.config.keystorePassword }}'
107 passwordPolicy: required
110 externalSecret: '{{ .Values.config.dmaapAuthKeyExternalSecret }}'
111 password: '{{ .Values.config.dmaapAuthKey }}'
112 passwordPolicy: required
113 - uid: aai-user-creds
115 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
116 login: '{{ .Values.config.aaiUser }}'
117 password: '{{ .Values.config.aaiPassword }}'
118 passwordPolicy: required
121 externalSecret: '{{ .Values.config.soCredsExternalSecret}}'
122 login: '{{ .Values.config.soUser }}'
123 password: '{{ .Values.config.soPassword }}'
124 passwordPolicy: required
125 - uid: neng-user-creds
127 externalSecret: '{{ .Values.config.nengCredsExternalSecret}}'
128 login: '{{ .Values.config.nengUser }}'
129 password: '{{ .Values.config.nengPassword }}'
130 passwordPolicy: required
131 - uid: cds-user-creds
133 externalSecret: '{{ .Values.config.cdsCredsExternalSecret}}'
134 login: '{{ .Values.config.cdsUser }}'
135 password: '{{ .Values.config.cdsPassword }}'
136 passwordPolicy: required
137 - uid: honeycomb-user-creds
139 externalSecret: '{{ .Values.config.honeycombCredsExternalSecret}}'
140 login: '{{ .Values.config.honeycombUser }}'
141 password: '{{ .Values.config.honeycombPassword }}'
142 passwordPolicy: required
143 - uid: dmaap-user-creds
145 externalSecret: '{{ .Values.config.dmaapCredsExternalSecret}}'
146 login: '{{ .Values.config.dmaapUser }}'
147 password: '{{ .Values.config.dmaapPassword }}'
148 passwordPolicy: required
149 - uid: modeling-user-creds
151 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
152 login: '{{ .Values.config.modelingUser }}'
153 password: '{{ .Values.config.modelingPassword }}'
154 passwordPolicy: required
155 - uid: restconf-creds
157 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
158 login: '{{ .Values.config.restconfUser }}'
159 password: '{{ .Values.config.restconfPassword }}'
160 passwordPolicy: required
162 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
164 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
165 login: '{{ .Values.config.ansibleUser }}'
166 password: '{{ .Values.config.ansiblePassword }}'
167 passwordPolicy: required
168 - uid: scaleout-creds
170 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
171 login: '{{ .Values.config.scaleoutUser }}'
172 password: '{{ .Values.config.scaleoutPassword }}'
173 passwordPolicy: required
174 - uid: oauth-token-secret
176 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.tokenExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
177 password: '{{ .Values.config.sdnr.oauth.tokenSecret }}'
178 passwordPolicy: required
179 - uid: keycloak-secret
181 externalSecret: '{{ ternary (tpl (default "" .Values.config.sdnr.oauth.providersSecrets.keycloakExternalSecret) .) "oauth-disabled" .Values.config.sdnr.oauth.enabled }}'
182 password: '{{ .Values.config.sdnr.oauth.providersSecrets.keycloak }}'
183 passwordPolicy: required
184 - uid: ves-collector-secret
186 login: '{{ .Values.config.sdnr.vesCollector.username }}'
187 password: '{{ .Values.config.sdnr.vesCollector.password }}'
188 #################################################################
190 #################################################################
192 - mountPath: /var/custom-certs
193 commonName: sdnc.simpledemo.onap.org
195 - sdnc.simpledemo.onap.org
201 name: sdnc-cmpv2-keystore-password
204 group: certmanager.onap.org
206 name: cmpv2-issuer-onap
207 #################################################################
208 # Application configuration defaults.
209 #################################################################
213 image: onap/sdnc-image:2.3.0
215 # flag to enable debugging - application support required
218 # application configuration
223 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
224 # odlCredsExternalSecret: some secret
225 netboxApikey: onceuponatimeiplayedwithnetbox20180814
226 # netboxApikeyExternalSecret: some secret
227 aaiTruststorePassword: changeit
228 # aaiTruststoreExternalSecret: some secret
229 ansibleTruststorePassword: changeit
230 # ansibleTruststoreExternalSecret: some secret
231 truststorePassword: adminadmin
232 # truststoreExternalSecret: some secret
233 keystorePassword: adminadmin
234 # keystoreExternalSecret: some secret
235 aaiUser: sdnc@sdnc.onap.org
236 aaiPassword: demo123456!
237 # aaiCredsExternalSecret: some secret
239 soPassword: password1$
240 # soCredsExternalSecret: some secret
242 nengPassword: ccsdkapps
243 # nengCredsExternalSecret: some secret
245 cdsPassword: ccsdkapps
246 # cdsCredsExternalSecret: some secret
248 honeycombPassword: admin
249 # honeycombCredsExternalSecret: some secret
252 dmaapAuthKey: "fs20cKwalJ6ry4kX:7Hqm6BDZK47IKxGRkOPFk33qMYs="
253 # dmaapCredsExternalSecret: some secret
254 # dmaapAuthKeyExternalSecret: some secret
255 modelingUser: ccsdkapps
256 modelingPassword: ccsdkapps
257 # modelingCredsExternalSecret: some secret
259 restconfPassword: admin
260 # restconfCredsExternalSecret: some secret
262 scaleoutPassword: admin
263 # scaleoutExternalSecret: some secret
265 ansiblePassword: sdnc
266 # ansibleCredsExternalSecret: some secret
268 dbSdnctlDatabase: &sdncDbName sdnctl
269 enableClustering: true
270 sdncHome: /opt/onap/sdnc
271 binDir: /opt/onap/sdnc/bin
272 etcDir: /opt/onap/sdnc/data
274 # if geoEnabled is set to true here, mysql.geoEnabled must be set to true
275 # if geoEnabled is set to true the following 3 values must be set to their proper values
276 myODLCluster: 127.0.0.1
277 peerODLCluster: 127.0.0.1
278 isPrimaryCluster: true
279 configDir: /opt/onap/sdnc/data/properties
280 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
283 logstashServiceName: log-ls
285 ansibleServiceName: sdnc-ansible-server
287 javaHome: /opt/java/openjdk
290 etcDir: /opt/opendaylight/etc
291 binDir: /opt/opendaylight/bin
292 gcLogDir: /opt/opendaylight/data/log
293 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
294 salConfigVersion: 1.10.4
301 recoveryEventTimeout: 90s
303 persistentActorRestartMinBackoffInSeconds: 10
304 persistentActorRestartMaxBackoffInSeconds: 40
305 persistentActorRestartResetBackoffInSeconds: 20
306 shardTransactionCommitTimeoutInSeconds: 120
307 shardIsolatedLeaderCheckIntervalInMillis: 30000
308 operationTimeoutInSeconds: 120
310 maxGCPauseMillis: 100
311 parallelGCThreads : 3
316 # Next line enables gc logging
317 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
318 # enables sdnr functionality
321 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
322 # mode: dm - SDNC contains sdnr device manager + ODLUX components
324 # sdnronly: true starts sdnc container with odl and sdnrwt features only
326 sdnrdbTrustAllCerts: true
327 mountpointRegistrarEnabled: false
328 mountpointStateProviderEnabled: false
332 # enable and set dmaap-proxy for mountpointRegistrar
337 password: addPasswordHere
341 tokenIssuer: ONAP SDNC
343 supportOdlusers: true
348 # example definition for a oauth provider
350 keycloak: d8d7ed52-0691-4353-9ac6-5383e72e9c46
354 host: http://keycloak:8080
356 secret: ${KEYCLOAK_SECRET}
358 title: ONAP Keycloak Provider
365 trustAllCertificates: false
368 address: dcae-ves-collector.onap
371 reportingEntityName: ONAP SDN-R
372 eventLogMsgDetail: SHORT
374 # dependency / sub-chart configuration
376 nameOverride: sdnc-cert-initializer
377 truststoreMountpath: /opt/onap/sdnc/data/stores
379 app_ns: "org.osaaf.aaf"
380 fqi: "sdnc@sdnc.onap.org"
381 fqi_namespace: org.onap.sdnc
382 public_fqdn: "sdnc.onap.org"
383 aafDeployFqi: "deployer@people.osaaf.org"
384 aafDeployPass: demo123456!
385 cadi_latitude: "38.0"
386 cadi_longitude: "-72.0"
387 credsPath: /opt/app/osaaf/local
389 cd /opt/app/osaaf/local;
390 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
392 # dependency / sub-chart configuration
395 mariadb-galera: &mariadbGalera
396 nameOverride: &sdnc-db sdnc-db
397 config: &mariadbGaleraConfig
398 rootPasswordExternalSecret: *rootDbSecret
399 userName: &dbUser sdnctl
400 userCredentialsExternalSecret: *dbSecretName
402 externalSecret: *rootDbSecret
405 externalSecret: *dbSecretName
410 mountSubPath: sdnc/mariadb-galera
414 nameOverride: *sdnc-db
421 nameOverride: sdnc-dmaap-listener
425 <<: *mariadbGaleraConfig
426 mysqlDatabase: *sdncDbName
431 configDir: /opt/onap/sdnc/data/properties
432 odlCredsExternalSecret: *odlCredsSecretName
439 <<: *mariadbGaleraConfig
440 mysqlDatabase: *sdncDbName
441 nameOverride: sdnc-ueb-listener
445 configDir: /opt/onap/sdnc/data/properties
446 odlCredsExternalSecret: *odlCredsSecretName
451 restCredsExternalSecret: *ansibleSecretName
455 <<: *mariadbGaleraConfig
456 mysqlDatabase: ansible
458 name: sdnc-ansible-server
463 nameOverride: sdnc-dgbuilder
465 nameOverride: sdnc-dgbuilder-cert-initializer
469 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
471 (printf "%s-sdnc-db-root-password" (include "common.release" .))
472 (include "common.mariadb.secret.rootPassSecretName"
473 (dict "dot" . "chartName" "mariadb-galera")) }}'
474 userCredentialsExternalSecret: *dbSecretName
475 dbPodName: mariadb-galera
476 dbServiceName: mariadb-galera
477 # This should be revisited and changed to plain text
478 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
480 nameOverride: sdnc-dgbuilder
489 - baseaddr: "sdnc-dgbuilder"
490 name: "sdnc-dgbuilder"
492 - baseaddr: "sdnc-web-service"
493 name: "sdnc-web-service"
500 # local elasticsearch cluster
501 localElasticCluster: true
503 nameOverride: &elasticSearchName sdnrdb
507 fqi_namespace: org.onap.sdnc
508 fqi: "sdnc@sdnc.onap.org"
510 name: *elasticSearchName
513 # dedicatednode: "yes"
514 # working as master node only, in this case increase replicaCount for elasticsearch-data
515 # dedicatednode: "no"
516 # handles master and data node functionality
518 nameOverride: *elasticSearchName
519 cluster_name: sdnrdb-cluster
524 # default number of instances
531 # probe configuration parameters
533 initialDelaySeconds: 10
535 # necessary to disable liveness probe when setting breakpoints
536 # in debugger so K8s doesn't restart unresponsive container
540 initialDelaySeconds: 10
576 ## Persist data to a persitent volume
580 ## A manually managed Persistent Volume and Claim
581 ## Requires persistence.enabled: true
582 ## If defined, PVC must be created manually before volume will be bound
584 volumeReclaimPolicy: Retain
586 ## database data Persistent Volume Storage Class
587 ## If defined, storageClassName: <storageClass>
588 ## If set to "-", storageClassName: "", which disables dynamic provisioning
589 ## If undefined (the default) or set to null, no storageClassName spec is
590 ## set, choosing the default provisioner. (gp2 on AWS, standard on
591 ## GKE, AWS & OpenStack)
592 accessMode: ReadWriteOnce
594 mountPath: /dockerdata-nfs
595 mountSubPath: sdnc/mdsal
596 mdsalPath: /opt/opendaylight/mdsal
597 daeximPath: /opt/opendaylight/mdsal/daexim
598 journalPath: /opt/opendaylight/segmented-journal
599 snapshotsPath: /opt/opendaylight/snapshots
604 ## A manually managed Persistent Volume and Claim
605 ## Requires persistence.enabled: true
606 ## If defined, PVC must be created manually before volume will be bound
609 volumeReclaimPolicy: Retain
610 accessMode: ReadWriteOnce
612 mountPath: /dockerdata-nfs
613 mountSubPath: sdnc/certs
614 certPath: /opt/app/osaaf
615 ##storageClass: "manual"
620 - baseaddr: "sdnc.api"
626 #Resource Limit flavor -By Default using small
628 #segregation for different envionment (Small and Large)
647 #Pods Service Account