1 # Copyright © 2020 Samsung Electronics, highstreet technologies GmbH
2 # Copyright © 2017 Amdocs, Bell Canada
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 #################################################################
17 # Global configuration defaults.
18 #################################################################
21 nodePortPrefixExt: 304
23 mountPath: /dockerdata-nfs
26 #This flag allows SO to instantiate its own mariadb-galera cluster
27 #If shared instance is used, this chart assumes that DB already exists
29 service: mariadb-galera
31 nameOverride: mariadb-galera
36 image: onap/org.onap.oom.platform.cert-service.oom-certservice-client:2.3.1
38 name: oom-cert-service-client-tls-secret
39 mountPath: /etc/onap/oom/certservice/certs/
42 cert_path: /var/custom-certs
43 cmpv2Organization: "Linux-Foundation"
44 cmpv2OrganizationalUnit: "ONAP"
45 cmpv2Location: "San-Francisco"
47 # Client configuration related
49 common_name: "sdnc.simpledemo.onap.org"
50 requestURL: "https://oom-cert-service:8443/v1/certificate/"
51 requestTimeout: "30000"
52 keystorePath: "/etc/onap/oom/certservice/certs/certServiceClient-keystore.jks"
54 keystorePassword: "secret"
55 truststorePath: "/etc/onap/oom/certservice/certs/truststore.jks"
56 truststorePassword: "secret"
58 #################################################################
60 #################################################################
62 - uid: db-root-password
63 name: '{{ include "common.release" . }}-sdnc-db-root-password'
65 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
66 ternary (default (include "common.mariadb.secret.rootPassSecretName"
67 (dict "dot" . "chartName"
68 (index .Values "mariadb-galera" "nameOverride")))
69 (index .Values "mariadb-galera" "config"
70 "mariadbRootPasswordExternalSecret"))
71 (include "common.mariadb.secret.rootPassSecretName"
72 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
73 password: '{{ (index .Values "mariadb-galera" "config" "mariadbRootPassword") }}'
75 name: &dbSecretName '{{ include "common.release" . }}-sdnc-db-secret'
77 # This is a nasty trick that allows you override this secret using external one
78 # with the same field that is used to pass this to subchart
79 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "config" "userCredentialsExternalSecret")) .) (hasSuffix "sdnc-db-secret" (index .Values "mariadb-galera" "config" "userCredentialsExternalSecret"))}}'
80 login: '{{ index .Values "mariadb-galera" "config" "userName" }}'
81 password: '{{ index .Values "mariadb-galera" "config" "userPassword" }}'
83 name: &odlCredsSecretName '{{ include "common.release" . }}-sdnc-odl-creds'
85 externalSecret: '{{ .Values.config.odlCredsExternalSecret }}'
86 login: '{{ .Values.config.odlUser }}'
87 password: '{{ .Values.config.odlPassword }}'
88 # For now this is left hardcoded but should be revisited in a future
89 passwordPolicy: required
92 externalSecret: '{{ .Values.config.netboxApikeyExternalSecret }}'
93 password: '{{ .Values.config.netboxApikey }}'
94 passwordPolicy: required
97 externalSecret: '{{ .Values.config.aaiCredsExternalSecret}}'
98 login: '{{ .Values.config.aaiUser }}'
99 password: '{{ .Values.config.aaiPassword }}'
100 passwordPolicy: required
101 - uid: modeling-user-creds
103 externalSecret: '{{ .Values.config.modelingCredsExternalSecret}}'
104 login: '{{ .Values.config.modelingUser }}'
105 password: '{{ .Values.config.modelingPassword }}'
106 passwordPolicy: required
107 - uid: restconf-creds
109 externalSecret: '{{ .Values.config.restconfCredsExternalSecret}}'
110 login: '{{ .Values.config.restconfUser }}'
111 password: '{{ .Values.config.restconfPassword }}'
112 passwordPolicy: required
114 name: &ansibleSecretName '{{ include "common.release" . }}-sdnc-ansible-creds'
116 externalSecret: '{{ .Values.config.ansibleCredsExternalSecret}}'
117 login: '{{ .Values.config.ansibleUser }}'
118 password: '{{ .Values.config.ansiblePassword }}'
119 passwordPolicy: required
120 - uid: scaleout-creds
122 externalSecret: '{{ .Values.config.scaleoutCredsExternalSecret}}'
123 login: '{{ .Values.config.scaleoutUser }}'
124 password: '{{ .Values.config.scaleoutPassword }}'
125 passwordPolicy: required
126 #################################################################
127 # Application configuration defaults.
128 #################################################################
132 image: onap/sdnc-image:2.0.4
134 # flag to enable debugging - application support required
137 # application configuration
142 odlPassword: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
143 # odlCredsExternalSecret: some secret
144 netboxApikey: onceuponatimeiplayedwithnetbox20180814
145 # netboxApikeyExternalSecret: some secret
146 aaiUser: sdnc@sdnc.onap.org
147 aaiPassword: demo123456!
148 # aaiCredsExternalSecret: some secret
149 modelingUser: ccsdkapps
150 modelingPassword: ccsdkapps
151 # modelingCredsExternalSecret: some secret
153 restconfPassword: admin
154 # restconfCredsExternalSecret: some secret
156 scaleoutPassword: admin
157 # scaleoutExternalSecret: some secret
159 ansiblePassword: sdnc
160 # ansibleCredsExternalSecret: some secret
161 dbSdnctlDatabase: &sdncDbName sdnctl
162 enableClustering: true
163 sdncHome: /opt/onap/sdnc
164 binDir: /opt/onap/sdnc/bin
165 etcDir: /opt/onap/sdnc/data
167 # if geoEnabled is set to true here, mysql.geoEnabled must be set to true
168 # if geoEnabled is set to true the following 3 values must be set to their proper values
169 myODLCluster: 127.0.0.1
170 peerODLCluster: 127.0.0.1
171 isPrimaryCluster: true
172 configDir: /opt/onap/sdnc/data/properties
173 ccsdkConfigDir: /opt/onap/ccsdk/data/properties
176 logstashServiceName: log-ls
178 ansibleServiceName: sdnc-ansible-server
180 javaHome: /opt/java/openjdk
183 etcDir: /opt/opendaylight/etc
184 binDir: /opt/opendaylight/bin
185 gcLogDir: /opt/opendaylight/data/log
186 salConfigDir: /opt/opendaylight/system/org/opendaylight/controller/sal-clustering-config
187 salConfigVersion: 1.9.1
194 recoveryEventTimeout: 90s
196 persistentActorRestartMinBackoffInSeconds: 10
197 persistentActorRestartMaxBackoffInSeconds: 40
198 persistentActorRestartResetBackoffInSeconds: 20
199 shardTransactionCommitTimeoutInSeconds: 120
200 shardIsolatedLeaderCheckIntervalInMillis: 30000
201 operationTimeoutInSeconds: 120
203 maxGCPauseMillis: 100
204 parallelGCThreads : 3
209 # Next line enables gc logging
210 # gcLogOptions: "-Xlog:gc=trace:file={{.Values.config.odl.gcLogDir}}/gc-%t.log}:time,level,tags:filecount={{.Values.config.odl.javaOptions.numberGCLogFiles}}"
211 # enables sdnr functionality
214 # mode: web - SDNC contains device manager only plus dedicated webserver service for ODLUX (default),
215 # mode: dm - SDNC contains sdnr device manager + ODLUX components
217 # sdnronly: true starts sdnc container with odl and sdnrwt features only
219 sdnrdbTrustAllCerts: true
220 mountpointRegistrarEnabled: false
221 mountpointStateProviderEnabled: false
225 # dependency / sub-chart configuration
227 nameOverride: sdnc-cert-initializer
228 truststoreMountpath: /opt/onap/sdnc/data/stores
230 app_ns: "org.osaaf.aaf"
231 fqi: "sdnc@sdnc.onap.org"
232 fqi_namespace: org.onap.sdnc
233 public_fqdn: "sdnc.onap.org"
234 aafDeployFqi: "deployer@people.osaaf.org"
235 aafDeployPass: demo123456!
236 cadi_latitude: "38.0"
237 cadi_longitude: "-72.0"
238 credsPath: /opt/app/osaaf/local
240 cd /opt/app/osaaf/local;
241 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1
243 # dependency / sub-chart configuration
246 mariadb-galera: &mariadbGalera
247 nameOverride: sdnc-db
248 config: &mariadbGaleraConfig
249 rootPasswordExternalSecret: '{{ ternary (include "common.release" .)-sdnc-db-root-password "" .Values.global.mariadbGalera.localCluster }}'
251 userCredentialsExternalSecret: *dbSecretName
257 mountSubPath: sdnc/mariadb-galera
266 nameOverride: sdnc-dmaap-listener
270 <<: *mariadbGaleraConfig
271 mysqlDatabase: *sdncDbName
276 configDir: /opt/onap/sdnc/data/properties
277 odlCredsExternalSecret: *odlCredsSecretName
284 <<: *mariadbGaleraConfig
285 mysqlDatabase: *sdncDbName
286 nameOverride: sdnc-ueb-listener
290 configDir: /opt/onap/sdnc/data/properties
291 odlCredsExternalSecret: *odlCredsSecretName
296 restCredsExternalSecret: *ansibleSecretName
300 <<: *mariadbGaleraConfig
301 mysqlDatabase: ansible
303 name: sdnc-ansible-server
308 nameOverride: sdnc-dgbuilder
310 nameOverride: sdnc-dgbuilder-cert-initializer
314 rootPasswordExternalSecret: '{{ ternary (printf "%s-sdnc-db-root-password" (include "common.release" .)) (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" "mariadb-galera")) .Values.global.mariadbGalera.localCluster }}'
315 userCredentialsExternalSecret: *dbSecretName
316 dbPodName: mariadb-galera
317 dbServiceName: mariadb-galera
318 # This should be revisited and changed to plain text
319 dgUserPassword: cc03e747a6afbbcbf8be7668acfebee5
328 - baseaddr: "sdnc-dgbuilder"
329 name: "sdnc-dgbuilder"
331 - baseaddr: "sdnc-web-service"
332 name: "sdnc-web-service"
339 # local elasticsearch cluster
340 localElasticCluster: true
342 nameOverride: &elasticSearchName sdnrdb
346 fqi_namespace: org.onap.sdnc
347 fqi: "sdnc@sdnc.onap.org"
349 name: *elasticSearchName
352 # dedicatednode: "yes"
353 # working as master node only, in this case increase replicaCount for elasticsearch-data
354 # dedicatednode: "no"
355 # handles master and data node functionality
357 nameOverride: *elasticSearchName
358 cluster_name: *elasticSearchName
362 # default number of instances
369 # probe configuration parameters
371 initialDelaySeconds: 10
373 # necessary to disable liveness probe when setting breakpoints
374 # in debugger so K8s doesn't restart unresponsive container
378 initialDelaySeconds: 10
411 ## Persist data to a persitent volume
415 ## A manually managed Persistent Volume and Claim
416 ## Requires persistence.enabled: true
417 ## If defined, PVC must be created manually before volume will be bound
419 volumeReclaimPolicy: Retain
421 ## database data Persistent Volume Storage Class
422 ## If defined, storageClassName: <storageClass>
423 ## If set to "-", storageClassName: "", which disables dynamic provisioning
424 ## If undefined (the default) or set to null, no storageClassName spec is
425 ## set, choosing the default provisioner. (gp2 on AWS, standard on
426 ## GKE, AWS & OpenStack)
427 accessMode: ReadWriteOnce
429 mountPath: /dockerdata-nfs
430 mountSubPath: sdnc/mdsal
431 mdsalPath: /opt/opendaylight/current/daexim
436 ## A manually managed Persistent Volume and Claim
437 ## Requires persistence.enabled: true
438 ## If defined, PVC must be created manually before volume will be bound
441 volumeReclaimPolicy: Retain
442 accessMode: ReadWriteOnce
444 mountPath: /dockerdata-nfs
445 mountSubPath: sdnc/certs
446 certPath: /opt/app/osaaf
447 ##storageClass: "manual"
452 - baseaddr: "sdnc.api"
458 #Resource Limit flavor -By Default using small
460 #segregation for different envionment (Small and Large)