1 # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
2 # Copyright © 2017 Amdocs, Bell Canada
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 #################################################################
17 # Global configuration defaults.
18 #################################################################
21 nodePortPrefixExt: 304
23 mountPath: /dockerdata-nfs
26 #This flag allows SO to instantiate its own mariadb-galera cluster
27 #If shared instance is used, this chart assumes that DB already exists
29 service: mariadb-galera
31 nameOverride: mariadb-galera
32 service: mariadb-galera
37 image: onap/org.onap.oom.platform.cert-service.oom-certservice-client:2.3.1
39 name: oom-cert-service-client-tls-secret
40 mountPath: /etc/onap/oom/certservice/certs/
43 cert_path: /var/custom-certs
44 cmpv2Organization: "Linux-Foundation"
45 cmpv2OrganizationalUnit: "ONAP"
46 cmpv2Location: "San-Francisco"
48 # Client configuration related
50 common_name: "sdnc.simpledemo.onap.org"
51 requestURL: "https://oom-cert-service:8443/v1/certificate/"
52 requestTimeout: "30000"
53 keystorePath: "/etc/onap/oom/certservice/certs/certServiceClient-keystore.jks"
55 keystorePassword: "secret"
56 truststorePath: "/etc/onap/oom/certservice/certs/truststore.jks"
57 truststorePassword: "secret"
59 #################################################################
61 #################################################################
63 - uid: db-root-password
64 name: &rootDbSecret '{{ include "common.release" . }}-sdnc-db-root-password'
66 # If we're using shared mariadb, we need to use the secret name (second
68 # If not, we do the same trick than for user db secret hat allows you
69 # override this secret using external one with the same field that is used
70 # to pass this to subchart.
71 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
72 ternary ((hasSuffix "sdnc-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
75 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
76 (include "common.mariadb.secret.rootPassSecretName"
78 "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
79 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
81 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
83 # This is a nasty trick that allows you override this secret using external one
84 # with the same field that is used to pass this to subchart
85 externalSecret: '{{ (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "db" "externalSecret")) |
88 (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) }}'
89 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
90 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
92 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
94 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
95 login: '{{ .Values.config.odlUser }}'
96 password: '{{ .Values.config.odlPassword }}'
97 # For now this is left hardcoded but should be revisited in a future
98 passwordPolicy: required
101 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
102 password: '{{ .Values.config.netboxApikey }}'
103 passwordPolicy: required
104 - uid: aai-user-creds
106 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
107 login: '{{ .Values.config.aaiUser }}'
108 password: '{{ .Values.config.aaiPassword }}'
109 passwordPolicy: required
110 - uid: modeling-user-creds
112 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
113 login: '{{ .Values.config.modelingUser }}'
114 password: '{{ .Values.config.modelingPassword }}'
115 passwordPolicy: required
116 - uid: restconf-creds
118 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
119 login: '{{ .Values.config.restconfUser }}'
120 password: '{{ .Values.config.restconfPassword }}'
121 passwordPolicy: required
123 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
125 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
126 login: '{{ .Values.config.ansibleUser }}'
127 password: '{{ .Values.config.ansiblePassword }}'
128 passwordPolicy: required
129 - uid: scaleout-creds
131 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
132 login: '{{ .Values.config.scaleoutUser }}'
133 password: '{{ .Values.config.scaleoutPassword }}'
134 passwordPolicy: required
135 #################################################################
136 # Application configuration defaults.
137 #################################################################
141 image: onap/sdnc-image:2.0.4
143 # flag to enable debugging - application support required
146 # application configuration
151 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
152 # odlCredsExternalSecret: some secret
153 netboxApikey: onceuponatimeiplayedwithnetbox20180814
154 # netboxApikeyExternalSecret: some secret
155 aaiUser: sdnc@sdnc.onap.org
156 aaiPassword: demo123456!
157 # aaiCredsExternalSecret: some secret
158 modelingUser: ccsdkapps
159 modelingPassword: ccsdkapps
160 # modelingCredsExternalSecret: some secret
162 restconfPassword: admin
163 # restconfCredsExternalSecret: some secret
165 scaleoutPassword: admin
166 # scaleoutExternalSecret: some secret
168 ansiblePassword: sdnc
169 # ansibleCredsExternalSecret: some secret
170 dbSdnctlDatabase: &sdncDbName sdnctl
171 enableClustering: true
172 sdncHome: /opt/onap/sdnc
173 binDir: /opt/onap/sdnc/bin
174 etcDir: /opt/onap/sdnc/data
176 # if geoEnabled is set to true here, mysql.geoEnabled must be set to true
177 # if geoEnabled is set to true the following 3 values must be set to their proper values
178 myODLCluster: 127.0.0.1
179 peerODLCluster: 127.0.0.1
180 isPrimaryCluster: true
181 configDir: /opt/onap/sdnc/data/properties
182 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
185 logstashServiceName: log-ls
187 ansibleServiceName: sdnc-ansible-server
189 javaHome: /opt/java/openjdk
192 etcDir: /opt/opendaylight/etc
193 binDir: /opt/opendaylight/bin
194 gcLogDir: /opt/opendaylight/data/log
195 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
196 salConfigVersion: 1.9.1
203 recoveryEventTimeout: 90s
205 persistentActorRestartMinBackoffInSeconds: 10
206 persistentActorRestartMaxBackoffInSeconds: 40
207 persistentActorRestartResetBackoffInSeconds: 20
208 shardTransactionCommitTimeoutInSeconds: 120
209 shardIsolatedLeaderCheckIntervalInMillis: 30000
210 operationTimeoutInSeconds: 120
212 maxGCPauseMillis: 100
213 parallelGCThreads : 3
218 # Next line enables gc logging
219 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
220 # enables sdnr functionality
223 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
224 # mode: dm - SDNC contains sdnr device manager + ODLUX components
226 # sdnronly: true starts sdnc container with odl and sdnrwt features only
228 sdnrdbTrustAllCerts: true
229 mountpointRegistrarEnabled: false
230 mountpointStateProviderEnabled: false
234 # dependency / sub-chart configuration
236 nameOverride: sdnc-cert-initializer
237 truststoreMountpath: /opt/onap/sdnc/data/stores
239 app_ns: "org.osaaf.aaf"
240 fqi: "sdnc@sdnc.onap.org"
241 fqi_namespace: org.onap.sdnc
242 public_fqdn: "sdnc.onap.org"
243 aafDeployFqi: "deployer@people.osaaf.org"
244 aafDeployPass: demo123456!
245 cadi_latitude: "38.0"
246 cadi_longitude: "-72.0"
247 credsPath: /opt/app/osaaf/local
249 cd /opt/app/osaaf/local;
250 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
252 # dependency / sub-chart configuration
255 mariadb-galera: &mariadbGalera
256 nameOverride: &sdnc-db sdnc-db
257 config: &mariadbGaleraConfig
258 rootPasswordExternalSecret: *rootDbSecret
259 userName: &dbUser sdnctl
260 userCredentialsExternalSecret: *dbSecretName
262 externalSecret: *rootDbSecret
265 externalSecret: *dbSecretName
270 mountSubPath: sdnc/mariadb-galera
274 nameOverride: *sdnc-db
281 nameOverride: sdnc-dmaap-listener
285 <<: *mariadbGaleraConfig
286 mysqlDatabase: *sdncDbName
291 configDir: /opt/onap/sdnc/data/properties
292 odlCredsExternalSecret: *odlCredsSecretName
299 <<: *mariadbGaleraConfig
300 mysqlDatabase: *sdncDbName
301 nameOverride: sdnc-ueb-listener
305 configDir: /opt/onap/sdnc/data/properties
306 odlCredsExternalSecret: *odlCredsSecretName
311 restCredsExternalSecret: *ansibleSecretName
315 <<: *mariadbGaleraConfig
316 mysqlDatabase: ansible
318 name: sdnc-ansible-server
323 nameOverride: sdnc-dgbuilder
325 nameOverride: sdnc-dgbuilder-cert-initializer
329 rootPasswordExternalSecret: '{{ .Values.global.mariadbGalera.localCluster |
331 (printf "%s-sdnc-db-root-password" (include "common.release" .))
332 (include "common.mariadb.secret.rootPassSecretName"
333 (dict "dot" . "chartName" "mariadb-galera")) }}'
334 userCredentialsExternalSecret: *dbSecretName
335 dbPodName: mariadb-galera
336 dbServiceName: mariadb-galera
337 # This should be revisited and changed to plain text
338 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
347 - baseaddr: "sdnc-dgbuilder"
348 name: "sdnc-dgbuilder"
350 - baseaddr: "sdnc-web-service"
351 name: "sdnc-web-service"
358 # local elasticsearch cluster
359 localElasticCluster: true
361 nameOverride: &elasticSearchName sdnrdb
365 fqi_namespace: org.onap.sdnc
366 fqi: "sdnc@sdnc.onap.org"
368 name: *elasticSearchName
371 # dedicatednode: "yes"
372 # working as master node only, in this case increase replicaCount for elasticsearch-data
373 # dedicatednode: "no"
374 # handles master and data node functionality
376 nameOverride: *elasticSearchName
377 cluster_name: *elasticSearchName
381 # default number of instances
388 # probe configuration parameters
390 initialDelaySeconds: 10
392 # necessary to disable liveness probe when setting breakpoints
393 # in debugger so K8s doesn't restart unresponsive container
397 initialDelaySeconds: 10
430 ## Persist data to a persitent volume
434 ## A manually managed Persistent Volume and Claim
435 ## Requires persistence.enabled: true
436 ## If defined, PVC must be created manually before volume will be bound
438 volumeReclaimPolicy: Retain
440 ## database data Persistent Volume Storage Class
441 ## If defined, storageClassName: <storageClass>
442 ## If set to "-", storageClassName: "", which disables dynamic provisioning
443 ## If undefined (the default) or set to null, no storageClassName spec is
444 ## set, choosing the default provisioner. (gp2 on AWS, standard on
445 ## GKE, AWS & OpenStack)
446 accessMode: ReadWriteOnce
448 mountPath: /dockerdata-nfs
449 mountSubPath: sdnc/mdsal
450 mdsalPath: /opt/opendaylight/current/daexim
455 ## A manually managed Persistent Volume and Claim
456 ## Requires persistence.enabled: true
457 ## If defined, PVC must be created manually before volume will be bound
460 volumeReclaimPolicy: Retain
461 accessMode: ReadWriteOnce
463 mountPath: /dockerdata-nfs
464 mountSubPath: sdnc/certs
465 certPath: /opt/app/osaaf
466 ##storageClass: "manual"
471 - baseaddr: "sdnc.api"
477 #Resource Limit flavor -By Default using small
479 #segregation for different envionment (Small and Large)