1 # ================================ LICENSE_START =============================
2 # ============================================================================
3 # Copyright (C) 2021 Nordix Foundation.
4 # Copyright (c) 2022 J. F. Lucas. All rights reserved.
5 # ============================================================================
6 # Licensed under the Apache License, Version 2.0 (the "License");
7 # you may not use this file except in compliance with the License.
8 # You may obtain a copy of the License at
10 # http://www.apache.org/licenses/LICENSE-2.0
12 # Unless required by applicable law or agreed to in writing, software
13 # distributed under the License is distributed on an "AS IS" BASIS,
14 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 # See the License for the specific language governing permissions and
16 # limitations under the License.
17 # ================================= LICENSE_END ==============================
19 #################################################################
20 # Global Configuration Defaults.
21 #################################################################
24 nodePortPrefixExt: 304
25 centralizedLoggingEnabled: true
27 #################################################################
28 # Filebeat Configuration Defaults.
29 #################################################################
31 logstashServiceName: log-ls
34 #################################################################
35 # Secrets Configuration.
36 #################################################################
38 - uid: &aafCredsUID aafcreds
40 login: '{{ .Values.aafCreds.identity }}'
41 password: '{{ .Values.aafCreds.password }}'
42 passwordPolicy: required
43 - uid: &pgUserCredsSecretUid pg-user-creds
44 name: &pgUserCredsSecretName '{{ include "common.release" . }}-pmsh-pg-user-creds'
46 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "pmsh-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
47 login: '{{ .Values.postgres.config.pgUserName }}'
48 password: '{{ .Values.postgres.config.pgUserPassword }}'
49 passwordPolicy: generate
51 #################################################################
52 # InitContainer Images.
53 #################################################################
54 tlsImage: onap/org.onap.dcaegen2.deployments.tls-init-container:2.1.0
56 #################################################################
57 # Application Configuration Defaults.
58 #################################################################
60 image: onap/org.onap.dcaegen2.services.pmsh:2.2.2
63 # Log directory where logging sidecar should look for log files
64 # if path is set to null sidecar won't be deployed in spite of
65 # global.centralizedLoggingEnabled setting.
67 path: /var/log/ONAP/dcaegen2/services/pmsh
68 logConfigMapNamePrefix: '{{ include "common.fullname" . }}'
70 # Directory where TLS certs should be stored
71 # if absent, no certs will be retrieved and stored
72 certDirectory: /opt/app/pmsh/etc/certs
74 # TLS role -- set to true if microservice acts as server
75 # If true, an init container will retrieve a server cert
76 # and key from AAF and mount them in certDirectory.
82 - &postgresName dcae-pmsh-postgres
87 initialDelaySeconds: 10
94 # Service Configuration
106 identity: dcae@dcae.onap.org
107 password: demo123456!
117 # Initial Application Configuration
120 aaf_identity: ${AAF_IDENTITY}
121 aaf_password: ${AAF_PASSWORD}
122 key_path: /opt/app/pmsh/etc/certs/key.pem
123 cert_path: /opt/app/pmsh/etc/certs/cert.pem
124 ca_cert_path: /opt/app/pmsh/etc/certs/cacert.pem
125 control_loop_name: pmsh-control-loop
126 operational_policy_name: pmsh-operational-policy
129 subscriptionName: ExtraPM-All-gNB-R2B
130 administrativeState: LOCKED
132 fileLocation: "/pm/pm.xml"
133 nfFilter: { "nfNames": [ "^pnf.*","^vnf.*" ],"modelInvariantIDs": [ ],"modelVersionIDs": [ ],"modelNames": [ ] }
134 measurementGroups: [ { "measurementGroup": { "measurementTypes": [ { "measurementType": "countera" },{ "measurementType": "counterb" } ],"managedObjectDNsBasic": [ { "DN": "dna" },{ "DN": "dnb" } ] } },{ "measurementGroup": { "measurementTypes": [ { "measurementType": "counterc" },{ "measurementType": "counterd" } ],"managedObjectDNsBasic": [ { "DN": "dnc" },{ "DN": "dnd" } ] } } ]
139 topic_url: "http://message-router:3904/events/unauthenticated.DCAE_CL_OUTPUT"
141 policy_pm_subscriber:
144 topic_url: "http://message-router:3904/events/unauthenticated.PMSH_CL_INPUT"
148 topic_url: "http://message-router:3904/events/AAI-EVENT"
151 PMSH_PG_URL: &dcaePmshPgPrimary dcae-pmsh-pg-primary
153 secretUid: *pgUserCredsSecretUid
156 secretUid: *pgUserCredsSecretUid
158 PMSH_API_PORT: '8080'
160 # Resource Limit Flavor -By Default Using Small
163 # Segregation for Different Environment (Small and Large)
181 #################################################################
182 # Application configuration Overriding Defaults in the Postgres.
183 #################################################################
185 nameOverride: *postgresName
188 name2: *dcaePmshPgPrimary
189 name3: dcae-pmsh-pg-replica
192 primary: dcae-pmsh-pg-primary
193 replica: dcae-pmsh-pg-replica
195 mountSubPath: pmsh/data
200 pgUserExternalSecret: *pgUserCredsSecretName
202 #Pods Service Account
204 nameOverride: dcae-pmsh