beSslPort: <%= @ssl_port %>
version: 1.1.0
released: 2012-11-30
-toscaConformanceLevel: 5.0
+toscaConformanceLevel: 11.0
minToscaConformanceLevel: 3.0
-titanCfgFile: /var/lib/jetty/config/catalog-be/titan.properties
-titanInMemoryGraph: false
-titanLockTimeout: 1800
-# The interval to try and reconnect to titan DB when it is down during ASDC startup:
-titanReconnectIntervalInSeconds: 3
+janusGraphCfgFile: /var/lib/jetty/config/catalog-be/janusgraph.properties
+janusGraphInMemoryGraph: false
+janusGraphLockTimeout: 1800
+# The interval to try and reconnect to JanusGraph DB when it is down during ASDC startup:
+janusGraphReconnectIntervalInSeconds: 3
-# The read timeout towards Titan DB when health check is invoked:
-titanHealthCheckReadTimeout: 1
+# The read timeout towards JanusGraph DB when health check is invoked:
+janusGraphHealthCheckReadTimeout: 1
# The interval to try and reconnect to Elasticsearch when it is down during ASDC startup:
-esReconnectIntervalInSeconds: 3
uebHealthCheckReconnectIntervalInSeconds: 15
uebHealthCheckReadTimeout: 4
file: groups.yml
- policies:
file: policies.yml
+ - annotations:
+ file: annotations.yml
+
# Users
users:
tom: passwd
bob: passwd
+# access restriction
+authCookie:
+ securityKey: "sdcaccessrestrictionsecureykey"
+ maxSessionTimeOut: 86400000
+ sessionIdleTimeOut: 3600000
+ cookieName: "AuthenticationCookie"
+ path: /
+ domain: ""
+ isHttpOnly: true
+ # redirect variable name from portal.properties file
+ redirectURL: ""
+ excludedUrls: [<%= node['access_restriction']['excluded_urls'] %>]
+ onboardingExcludedUrls: [<%= node['access_restriction']['excluded_urls_onboarding'] %>]
+
+
cassandraConfig:
cassandraHosts: [<%= @cassandra_ip %>]
+ cassandraPort: <%= @cassandra_port %>
localDataCenter: <%= @DC_NAME %>
reconnectTimeout : 30000
socketReadTimeout: <%= @socket_read_timeout %>
authenticate: true
username: <%= @cassandra_usr %>
password: <%= @cassandra_pwd %>
- ssl: false
- truststorePath : /config/.truststore
- truststorePassword : Aa123456
+ ssl: <%= @cassandra_ssl_enabled %>
+ truststorePath : /var/lib/jetty/etc/truststore
+ truststorePassword : <%= @cassandra_truststore_password %>
keySpaces:
- - { name: dox, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @DC_NAME %>','<%= @rep_factor %>']}
- - { name: sdcaudit, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @DC_NAME %>','<%= @rep_factor %>']}
- - { name: sdcartifact, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @DC_NAME %>','<%= @rep_factor %>']}
- - { name: sdccomponent, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @DC_NAME %>','<%= @rep_factor %>']}
- - { name: sdcrepository, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @DC_NAME %>','<%= @rep_factor %>']}
-
-#Application-specific settings of ES
-elasticSearch:
- # Mapping of index prefix to time-based frame. For example, if below is configured:
- #
- # - indexPrefix: auditingevents
- # creationPeriod: minute
- #
- # then ES object of type which is mapped to "auditingevents-*" template, and created on 2015-12-23 13:24:54, will enter "auditingevents-2015-12-23-13-24" index.
- # Another object created on 2015-12-23 13:25:54, will enter "auditingevents-2015-12-23-13-25" index.
- # If creationPeriod: month, both of the above will enter "auditingevents-2015-12" index.
- #
- # PLEASE NOTE: the timestamps are created in UTC/GMT timezone! This is needed so that timestamps will be correctly presented in Kibana.
- #
- # Legal values for creationPeriod - year, month, day, hour, minute, none (meaning no time-based behaviour).
- #
- # If no creationPeriod is configured for indexPrefix, default behavour is creationPeriod: month.
-
- indicesTimeFrequency:
- - indexPrefix: auditingevents
- creationPeriod: month
- - indexPrefix: monitoring_events
- creationPeriod: month
+ - { name: dox, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @REP_STRING %>']}
+ - { name: sdcaudit, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @REP_STRING %>']}
+ - { name: sdcartifact, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @REP_STRING %>']}
+ - { name: sdccomponent, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @REP_STRING %>']}
+ - { name: sdcrepository, replicationStrategy: NetworkTopologyStrategy, replicationInfo: ['<%= @REP_STRING %>']}
+
+
artifactTypes:
- CHEF
- PUPPET
- SNMP_TRAP
- GUIDE
- PLAN
+ - CONTROLLER_BLUEPRINT_ARCHIVE
+ - PNF_SW_INFORMATION
licenseTypes:
- User
- CP
- VL
- VF
+ - CR
- VFCMT
- Abstract
- CVFC
deploymentResourceArtifacts:
-
+ cdsBlueprint:
+ displayName: "CDS Blueprint"
+ type: CONTROLLER_BLUEPRINT_ARCHIVE
+ description: "CDS deployment artifact"
+ fileExtension: "zip"
deploymentResourceInstanceArtifacts:
heatEnv:
- Generic
excludeResourceType:
- PNF
+ - CR
informationalResourceArtifacts:
features:
displayName: Features
enabled: false
isProxy: false
probeIntervalInSeconds: 15
-defaultHeatArtifactTimeoutMinutes: 60
+heatArtifactDeploymentTimeout:
+ defaultMinutes: 30
+ minMinutes: 1
+ maxMinutes: 120
serviceDeploymentArtifacts:
+ CONTROLLER_BLUEPRINT_ARCHIVE:
+ acceptedTypes:
+ - zip
YANG_XML:
acceptedTypes:
- xml
MODEL_QUERY_SPEC:
acceptedTypes:
- xml
+ UCPE_LAYER_2_CONFIGURATION:
+ acceptedTypes:
+ - xml
#AAI Artifacts
AAI_SERVICE_MODEL:
PLAN:
acceptedTypes:
- xml
+ WORKFLOW:
+ acceptedTypes:
+
resourceDeploymentArtifacts:
HEAT:
HEAT_ARTIFACT:
acceptedTypes:
validForResourceTypes: *allResourceTypes
+ CLOUD_TECHNOLOGY_SPECIFIC_ARTIFACT:
+ acceptedTypes:
+ - zip
+ - tgz
+ - csar
+ validForResourceTypes: *allResourceTypes
YANG_XML:
acceptedTypes:
- xml
acceptedTypes:
- yaml
- yml
- validForResourceTypes: *allResourceTypes
+ validForResourceTypes:
+ - VFC
+ - CP
+ - VL
+ - VF
+ - CR
+ - VFCMT
+ - Abstract
+ - CVFC
+ - PNF
PERFORMANCE_COUNTER:
acceptedTypes:
- csv
DCAE_DOC:
acceptedTypes:
validForResourceTypes:
- - VF
- - VFCMT
+ - VF
+ - VFCMT
DCAE_EVENT:
acceptedTypes:
validForResourceTypes:
- VF
OTHER:
acceptedTypes:
- validForResourceTypes: *allResourceTypes
+ validForResourceTypes:
+ - VFC
+ - CVFC
+ - CP
+ - VL
+ - VF
+ - VFCMT
+ - Abstract
+ - PNF
SNMP_POLL:
acceptedTypes:
validForResourceTypes: *allResourceTypes
SNMP_TRAP:
acceptedTypes:
validForResourceTypes: *allResourceTypes
+ PM_DICTIONARY:
+ acceptedTypes:
+ - yaml
+ - yml
+ validForResourceTypes:
+ - VF
+ - PNF
+ YANG_MODULE:
+ acceptedTypes:
+ - yang
+ validForResourceTypes:
+ - VF
+ - PNF
+ ANSIBLE_PLAYBOOK:
+ acceptedTypes:
+ - yaml
+ - yml
+ validForResourceTypes:
+ - VF
+ - PNF
+ ONBOARDED_PACKAGE:
+ acceptedTypes:
+ - csar
+ - zip
+ validForResourceTypes:
+ - VF
+ - PNF
+ CONTROLLER_BLUEPRINT_ARCHIVE:
+ acceptedTypes:
+ - zip
+ validForResourceTypes:
+ - VF
+ - PNF
#PLAN
PLAN:
validForResourceTypes:
- VF
- VFC
+ WORKFLOW:
+ acceptedTypes:
+ validForResourceTypes:
+ - VFC
+ - CP
+ - VL
+ - VF
+ - CR
+ - VFCMT
+ - Abstract
+ - CVFC
+ - PNF
resourceInstanceDeploymentArtifacts:
HEAT_ENV:
validForResourceTypes: *allResourceTypes
OTHER:
acceptedTypes:
- validForResourceTypes:
+ validForResourceTypes:
- VFC
- CVFC
- CP
- VL
- VF
+ - CR
- VFCMT
- Abstract
- PNF
+ PNF_SW_INFORMATION:
+ acceptedTypes:
+ - yaml
+ - yml
+ validForResourceTypes:
+ - PNF
SNMP_POLL:
acceptedTypes:
validForResourceTypes: *allResourceTypes
- VF
- VFC
- CVFC
-
-resourceInformationalDeployedArtifacts:
-
-
-requirementsToFulfillBeforeCert:
-
-capabilitiesToConsumeBeforeCert:
+ - PNF
unLoggedUrls:
+ - /sdc2/rest/monitoring
- /sdc2/rest/healthCheck
cleanComponentsConfiguration:
heatEnvArtifactFooter: ""
onboarding:
+ host: <%= node['ONBOARDING_BE_VIP'] %>
<% if node[:disableHttp] -%>
protocol: https
- host: <%= @catalog_ip %>
- port: <%= node['BE'][:https_port] %>
+ port: <%= node['ONBOARDING_BE'][:https_port] %>
<% else %>
protocol: http
- host: <%= @catalog_ip %>
- port: <%= node['BE'][:http_port] %>
+ port: <%= node['ONBOARDING_BE'][:http_port] %>
<% end -%>
downloadCsarUri: "/onboarding-api/v1.0/vendor-software-products/packages"
healthCheckUri: "/onboarding-api/v1.0/healthcheck"
dcae:
+ host: <%= @dcae_be_vip %>
<% if node[:disableHttp] -%>
protocol: https
- host: <%= @catalog_ip %>
- port: <%= node['BE'][:https_port] %>
+ port: <%= node['DCAE']['BE'][:https_port] %>
<% else %>
protocol: http
- host: <%= @catalog_ip %>
- port: <%= node['BE'][:http_port] %>
- <% end -%>
-
+ port: <%= node['DCAE']['BE'][:http_port] %>
+ <% end -%>
healthCheckUri: "/dcae/healthCheck"
# #GSS IDNS
disableAudit: false
+consumerBusinessLogic: true
+
vfModuleProperties:
min_vf_module_instances:
forBaseModule: 1
VFC: org.openecomp.resource.abstract.nodes.VFC
CVFC: org.openecomp.resource.abstract.nodes.VFC
VF : org.openecomp.resource.abstract.nodes.VF
+ CR : org.openecomp.resource.abstract.nodes.CR
PNF: org.openecomp.resource.abstract.nodes.PNF
Service: org.openecomp.resource.abstract.nodes.service
- Needed_Non-Revenue
- Useful_Non-Revenue
- General_Non-Revenue
+
+gabConfig:
+ - artifactType: 'VES_EVENTS'
+ pathsAndNamesDefinitions:
+ -
+ friendlyName: "Action"
+ path: "event.action[2]"
+ searchable: true
+ -
+ friendlyName: "Comment"
+ path: "event.comment"
+ searchable: true
+ -
+ friendlyName: "Alarm Additional Information"
+ path: "event.structure.faultFields.structure.alarmAdditionalInformation.comment"
+ searchable: true
+ - artifactType: 'PM_DICTIONARY'
+ pathsAndNamesDefinitions:
+ -
+ friendlyName: "measType"
+ path: "pmMetaData.pmFields.measType"
+ searchable: true
+ -
+ friendlyName: "measDescription"
+ path: "pmMetaData.pmFields.measDescription"
+ searchable: true
+ -
+ friendlyName: "measCondition"
+ path: "pmMetaData.pmFields.measCondition"
+ searchable: false
+ -
+ friendlyName: "measResultUnits"
+ path: "pmMetaData.pmFields.measResultUnits"
+ searchable: false
+ -
+ friendlyName: "measResultRange"
+ path: "pmMetaData.pmFields.measResultRange"
+ searchable: false
+ -
+ friendlyName: "measObjClass"
+ path: "pmMetaData.pmFields.measObjClass"
+ searchable: true
+ -
+ friendlyName: "measCollectionMethod"
+ path: "pmMetaData.pmFields.measCollectionMethod"
+ searchable: false
+ -
+ friendlyName: "measInfoId"
+ path: "pmMetaData.pmFields.measInfoId"
+ searchable: true
+ -
+ friendlyName: "iMeasInfoId"
+ path: "pmMetaData.pmFields.iMeasInfoId"
+ searchable: false
+
+dmaapConsumerConfiguration:
+ active: <%= @dmaap_active %>
+ hosts: localhost:3905
+ consumerGroup: sdc
+ consumerId: mama
+ timeoutMs: 15000
+ limit: 1
+ pollingInterval: 2
+ topic: topic
+ latitude: 32.109333
+ longitude: 34.855499
+ version: 1.0
+ serviceName: localhost/events
+ environment: TEST
+ partner: BOT_R
+ routeOffer: MR1
+ protocol: https
+ contenttype: application/json
+ dme2TraceOn: true
+ aftEnvironment: AFTUAT
+ aftDme2ConnectionTimeoutMs: 15000
+ aftDme2RoundtripTimeoutMs: 240000
+ aftDme2ReadTimeoutMs: 50000
+ dme2preferredRouterFilePath: DME2preferredRouter.txt
+ timeLimitForNotificationHandleMs: 120000
+ credential:
+ username: user
+ password:
+ aftDme2SslEnable: true
+ aftDme2ClientKeystore: /var/lib/jetty/etc/truststore
+ aftDme2ClientKeystorePassword: ""
+ aftDme2ClientSslCertAlias: certman
+
+dmaapProducerConfiguration:
+ active: true
+ hosts: <%= node['DMAAP']['producer']['host']%>
+ consumerGroup: sdc-<%= node.chef_environment %>-<%= node['DMAAP']['random_id'] %>
+ consumerId: sdc-<%= node.chef_environment %>1-<%= node['DMAAP']['random_id'] %>
+ timeoutMs: 15000
+ limit: 1
+ pollingInterval: 2
+ topic: <%= node['DMAAP']['producer']['topic'] %>
+ latitude: 32.109333
+ longitude: 34.855499
+ version: 1.0
+ serviceName: <%= node['DMAAP']['producer']['serviceName'] %>
+ environment: <%= node['DMAAP']['producer']['environment'] %>
+ partner: BOT_R
+ routeOffer: MR1
+ protocol: <%= node['http_protocol'] %>
+ contenttype: application/json
+ dme2TraceOn: true
+ aftEnvironment: <%= node['DMAAP']['producer']['aftEnvironment']%>
+ aftDme2ConnectionTimeoutMs: 15000
+ aftDme2RoundtripTimeoutMs: 240000
+ aftDme2ReadTimeoutMs: 50000
+ dme2preferredRouterFilePath: <%= node['DMAAP']['producer']['dme2preferredRouterFilePath'] %>
+ timeLimitForNotificationHandleMs: 120000
+ credential:
+ username: <%= node['DMAAP']['producer']['username'] %>
+ password: <%= node['DMAAP']['producer']['password'] %>
+ aftDme2SslEnable: true
+ aftDme2ClientKeystore: /var/lib/jetty/etc/truststore
+ aftDme2ClientKeystorePassword: <%= node['jetty']['dmaap_truststore_pwd'] %>
+ aftDme2ClientSslCertAlias: certman
+
+
+# ToDo: AF - had to remove due to configuration laod class failure
+#dmeConfiguration:
+# lookupUriFormat: "http://DME2RESOLVE/service=%s/version=1.0.0/envContext=%s/routeOffer=DEFAULT"
+# dme2Search: DME2SEARCH
+# dme2Resolve: DME2RESOLVE
+
+excludedPolicyTypesMapping:
+ # VF:
+ # - a.b.c
+ # - c.d.e
+ #CR:
+ # - x.y.z
+
+excludedGroupTypesMapping:
+ CR:
+ - org.openecomp.groups.VfModule
+ - org.openecomp.groups.heat.HeatStack
+ - org.openecomp.groups.Group
+ - tosca.groups.Root
+ PNF:
+ - org.openecomp.groups.VfModule
+ - org.openecomp.groups.heat.HeatStack
+ - org.openecomp.groups.Group
+ - tosca.groups.Root
+ VF:
+ - org.openecomp.groups.VfModule
+ - org.openecomp.groups.heat.HeatStack
+ - org.openecomp.groups.Group
+ - tosca.groups.Root
+ Service:
+ - org.openecomp.groups.VfModule
+ - org.openecomp.groups.heat.HeatStack
+ - org.openecomp.groups.Group
+ - tosca.groups.Root
+
+healthStatusExclude:
+ - DE
+ - DMAAP
+ - DMAAP_PRODUCER
+ - ON_BOARDING
+ - DCAE
+ - PORTAL
+ - External API
+
+#Auto Healing
+enableAutoHealing: false
+appVersion: <%= @app_version %>
+
+artifactGeneratorConfig: Artifact-Generator.properties
+resourcesForUpgrade:
+ 8.0:
+ - org.openecomp.resource.cp.extCP
+ - tosca.nodes.network.Network
+ - tosca.nodes.network.Port
+ - org.openecomp.resource.cp.nodes.network.SubInterface
+skipUpgradeFailedVfs: true
+skipUpgradeVSPs: true
+autoHealingOwner: jh0003
+supportAllottedResourcesAndProxy: true
+deleteLockTimeoutInSeconds: 60
+maxDeleteComponents: 10
+
+# Cadi filter (access restriction) Parameters
+aafNamespace: <%= node['aafNamespace'] %>
+aafAuthNeeded: <%= node['access_restriction']['aafAuthNeeded'] %>
+
+cadiFilterParams:
+ AFT_LATITUDE: "32.780140"
+ AFT_LONGITUDE: "-96.800451"
+ hostname: <%= node['BE_VIP'] %>
+ aaf_id: <%= node['access_restriction']['aaf_id'] %>
+ aaf_env: <%= node['access_restriction']['aaf_env'] %>
+ aaf_url: <%= node['access_restriction']['aaf_url'] %>
+ csp_domain: <%= node['access_restriction']['csp_domain'] %>
+ cadi_keyfile: <%= node['access_restriction']['cadi_keyfile'] %>
+ aaf_password: <%= node['access_restriction']['aaf_password'] %>
+ cadi_loglevel: <%= node['access_restriction']['cadi_loglevel'] %>
+ AFT_ENVIRONMENT: <%= node['access_restriction']['AFT_ENVIRONMENT'] %>
+ cadiX509Issuers: <%= node['access_restriction']['cadiX509Issuers'] %>
+ cadi_truststore: <%= node['access_restriction']['cadi_truststore'] %>
+ cadi_truststore_password: <%= node['access_restriction']['cadi_truststore_password'] %>
+