014cbadbab71d6708e657eff0a0f830095bf1edc
[oom.git] / kubernetes / so / values.yaml
1 # Copyright © 2018 AT&T USA
2 # Copyright © 2020 Huawei
3 # Copyright © 2021 Orange
4 # Modifications Copyright © 2023 Nordix Foundation
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
8 #
9 #       http://www.apache.org/licenses/LICENSE-2.0
10 #
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
16 #################################################################
17 # Global configuration defaults.
18 #################################################################
19 global:
20   nodePortPrefix: 302
21   nodePortPrefixExt: 304
22   centralizedLoggingEnabled: true
23   mariadbGalera:
24     nameOverride: mariadb-galera
25     serviceName: mariadb-galera
26     servicePort: '3306'
27     service: mariadb-galera
28     internalPort: '3306'
29     # mariadbRootPassword: secretpassword
30     # rootPasswordExternalSecret: some secret
31     #This flag allows SO to instantiate its own mariadb-galera cluster,
32     #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
33     localCluster: false
34   persistence:
35     mountPath: /dockerdata-nfs
36   #This configuration specifies Service and port for SDNC OAM interface
37   sdncOamService: sdnc-oam
38   sdncOamPort: 8282
39   #This configuration will run the migration. The configurations are for backing up the data
40   #from DB and then restoring it to the present versions preferred DB.
41   migration:
42     enabled: false
43     dbHost: mariadb-galera
44     dbPort: 3306
45     dbUser: root
46     dbPassword: secretpassword
47     # dbCredsExternalSecret: some secret
48   msbEnabled: true
49   app:
50     siteName: onapheat
51     auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
52     defaultCloudOwner: onap
53
54   soSdcListenerKafkaUser: so-sdc-list-user
55
56 readinessCheck:
57   wait_for:
58     jobs:
59       - '{{ include "common.release" . }}-so-mariadb-config-job'
60
61 #################################################################
62 # Secrets metaconfig
63 #################################################################
64 secrets:
65   - uid: db-root-pass
66     name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
67     type: password
68     externalSecret: '{{ .Values.global.mariadbGalera.localCluster | ternary
69       .Values.global.mariadbGalera.rootPasswordExternalSecret
70       (default (include "common.mariadb.secret.rootPassSecretName"
71         (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride))
72         .Values.global.mariadbGalera.rootPasswordExternalSecret)  }}'
73     password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
74   - uid: db-backup-creds
75     name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
76     type: basicAuth
77     externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
78     login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
79     password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
80     passwordPolicy: required
81     annotations:
82       helm.sh/hook: pre-upgrade,pre-install
83       helm.sh/hook-weight: '0'
84       helm.sh/hook-delete-policy: before-hook-creation
85   - uid: db-user-creds
86     name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
87     type: basicAuth
88     externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
89     login: '{{ .Values.dbCreds.userName }}'
90     password: '{{ .Values.dbCreds.userPassword }}'
91     passwordPolicy: generate
92   - uid: db-admin-creds
93     name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
94     type: basicAuth
95     externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
96     login: '{{ .Values.dbCreds.adminName }}'
97     password: '{{ .Values.dbCreds.adminPassword }}'
98     passwordPolicy: generate
99   - uid: 'mso-key'
100     name: &mso-key '{{ include "common.release" . }}-mso-key'
101     type: password
102     password: '{{ .Values.mso.msoKey }}'
103   - uid: mso-oof-auth
104     name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
105     type: basicAuth
106     login: '{{ .Values.mso.oof.login }}'
107     password: '{{ .Values.mso.oof.password }}'
108     passwordPolicy: required
109   - uid: server-actuator-creds
110     name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
111     type: basicAuth
112     externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
113     login: '{{ .Values.server.actuator.username }}'
114     password: '{{ .Values.server.actuator.password }}'
115     passwordPolicy: required
116   - uid: server-bpel-creds
117     name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
118     type: basicAuth
119     externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
120     login: '{{ .Values.server.bpel.username }}'
121     password: '{{ .Values.server.bpel.password }}'
122     passwordPolicy: required
123   - uid: so-aai-creds
124     name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
125     type: basicAuth
126     externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
127     login: '{{ .Values.server.aai.username }}'
128     password: '{{ .Values.server.aai.password }}'
129     passwordPolicy: required
130
131 ##################################################################
132 # Application configuration defaults.
133 #################################################################
134
135 dbSecrets: &dbSecrets
136   userCredsExternalSecret: *dbUserCredsSecretName
137   adminCredsExternalSecret: *dbAdminCredsSecretName
138
139 # unused in this, just to pass to subcharts
140 dbCreds:
141   userName: so_user
142   adminName: so_admin
143
144 image: onap/so/api-handler-infra:1.11.0
145
146 server:
147   aai:
148     username: aai@aai.onap.org
149     password: demo123456!
150   # aaiCredsExternalSecret: some secret
151   actuator:
152     username: mso_admin
153     password: password1$
154   # actuatorCredsExternalSecret: some secret
155   bpel:
156     username: bpel
157     password: password1$
158   # bpelCredsExternalSecret: some secret
159
160 pullPolicy: Always
161 replicaCount: 1
162 minReadySeconds: 10
163 containerPort: &containerPort 8080
164 logPath: ./logs/apih/
165 app: api-handler-infra
166 service:
167   type: NodePort
168   internalPort: *containerPort
169   ports:
170     - name: http
171       port: *containerPort
172       nodePort: '77'
173   annotations:
174     msb.onap.org/service-info: |
175       {{ if .Values.global.msbEnabled -}}[
176         {
177           "serviceName": "so",
178           "version": "v1",
179           "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
180           "protocol": "REST",
181           "port": "{{ .Values.service.internalPort }}",
182           "visualRange":"0",
183           "lb_policy":"ip_hash"
184         },
185         {
186           "serviceName": "so",
187           "version": "v1",
188           "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
189           "protocol": "REST",
190           "port": "{{ .Values.service.internalPort }}",
191           "visualRange":"0",
192           "lb_policy":"ip_hash"
193         },
194         {
195           "serviceName": "so",
196           "version": "v1",
197           "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
198           "protocol": "REST",
199           "port": "{{ .Values.service.internalPort }}",
200           "visualRange":"0",
201           "lb_policy":"ip_hash"
202         },
203         {
204           "serviceName": "so",
205           "version": "v1",
206           "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
207           "protocol": "REST",
208           "port": "{{ .Values.service.internalPort }}",
209           "visualRange":"0",
210           "lb_policy":"ip_hash"
211         },
212         {
213           "serviceName": "so",
214           "version": "v1",
215           "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
216           "protocol": "REST",
217           "port": "{{ .Values.service.internalPort }}",
218           "visualRange":"0",
219           "lb_policy":"ip_hash"
220         },
221         {
222           "serviceName": "so",
223           "version": "v1",
224           "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
225           "protocol": "REST",
226           "port": "{{ .Values.service.internalPort }}",
227           "visualRange":"0",
228           "lb_policy":"ip_hash"
229         },
230         {
231           "serviceName": "so",
232           "version": "v1",
233           "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
234           "protocol": "REST",
235           "port": "{{ .Values.service.internalPort }}",
236           "visualRange":"0",
237           "lb_policy":"ip_hash"
238         },
239         {
240           "serviceName": "so",
241           "version": "v1",
242           "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
243           "protocol": "REST",
244           "port": "{{ .Values.service.internalPort }}",
245           "visualRange":"0",
246           "lb_policy":"ip_hash"
247         },
248         {
249           "serviceName": "so",
250           "version": "v1",
251           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
252           "protocol": "REST",
253           "port": "{{ .Values.service.internalPort }}",
254           "visualRange":"0",
255           "lb_policy":"ip_hash"
256         },
257         {
258           "serviceName": "so",
259           "version": "v1",
260           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
261           "protocol": "REST",
262           "port": "{{ .Values.service.internalPort }}",
263           "visualRange":"0",
264           "lb_policy":"ip_hash"
265         },
266         {
267           "serviceName": "so",
268           "version": "v1",
269           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
270           "protocol": "REST",
271           "port": "{{ .Values.service.internalPort }}",
272           "visualRange":"0",
273           "lb_policy":"ip_hash"
274         },
275         {
276           "serviceName": "so",
277           "version": "v1",
278           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
279           "protocol": "REST",
280           "port": "{{ .Values.service.internalPort }}",
281           "visualRange":"0",
282           "lb_policy":"ip_hash"
283         },
284         {
285           "serviceName": "so",
286           "version": "v1",
287           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
288           "protocol": "REST",
289           "port": "{{ .Values.service.internalPort }}",
290           "visualRange":"0",
291           "lb_policy":"ip_hash"
292         },
293         {
294           "serviceName": "so",
295           "version": "v1",
296           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
297           "protocol": "REST",
298           "port": "{{ .Values.service.internalPort }}",
299           "visualRange":"0",
300           "lb_policy":"ip_hash"
301         },
302         {
303           "serviceName": "so",
304           "version": "v1",
305           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
306           "protocol": "REST",
307           "port": "{{ .Values.service.internalPort }}",
308           "visualRange":"0",
309           "lb_policy":"ip_hash"
310         },
311         {
312           "serviceName": "so",
313           "version": "v1",
314           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
315           "protocol": "REST",
316           "port": "{{ .Values.service.internalPort }}",
317           "visualRange":"0",
318           "lb_policy":"ip_hash"
319         },
320         {
321           "serviceName": "so",
322           "version": "v1",
323           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
324           "protocol": "REST",
325           "port": "{{ .Values.service.internalPort }}",
326           "visualRange":"0",
327           "lb_policy":"ip_hash"
328         },
329         {
330           "serviceName": "so",
331           "version": "v1",
332           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
333           "protocol": "REST",
334           "port": "{{ .Values.service.internalPort }}",
335           "visualRange":"0",
336           "lb_policy":"ip_hash"
337         },
338         {
339           "serviceName": "so",
340           "version": "v1",
341           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
342           "protocol": "REST",
343           "port": "{{ .Values.service.internalPort }}",
344           "visualRange":"0",
345           "lb_policy":"ip_hash"
346         },
347         {
348           "serviceName": "so",
349           "version": "v1",
350           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
351           "protocol": "REST",
352           "port": "{{ .Values.service.internalPort }}",
353           "visualRange":"0",
354           "lb_policy":"ip_hash"
355         },
356         {
357           "serviceName": "so",
358           "version": "v1",
359           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
360           "protocol": "REST",
361           "port": "{{ .Values.service.internalPort }}",
362           "visualRange":"0",
363           "lb_policy":"ip_hash"
364         },
365         {
366           "serviceName": "so",
367           "version": "v1",
368           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
369           "protocol": "REST",
370           "port": "{{ .Values.service.internalPort }}",
371           "visualRange":"0",
372           "lb_policy":"ip_hash"
373         },
374         {
375           "serviceName": "so",
376           "version": "v1",
377           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
378           "protocol": "REST",
379           "port": "{{ .Values.service.internalPort }}",
380           "visualRange":"0",
381           "lb_policy":"ip_hash"
382         },
383         {
384           "serviceName": "so",
385           "version": "v1",
386           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
387           "protocol": "REST",
388           "port": "{{ .Values.service.internalPort }}",
389           "visualRange":"0",
390           "lb_policy":"ip_hash"
391         },
392         {
393           "serviceName": "so",
394           "version": "v1",
395           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
396           "protocol": "REST",
397           "port": "{{ .Values.service.internalPort }}",
398           "visualRange":"0",
399           "lb_policy":"ip_hash"
400         },
401         {
402           "serviceName": "so",
403           "version": "v1",
404           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
405           "protocol": "REST",
406           "port": "{{ .Values.service.internalPort }}",
407           "visualRange":"0",
408           "lb_policy":"ip_hash"
409         },
410         {
411           "serviceName": "so",
412           "version": "v1",
413           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
414           "protocol": "REST",
415           "port": "{{ .Values.service.internalPort }}",
416           "visualRange":"0",
417           "lb_policy":"ip_hash"
418         },
419         {
420           "serviceName": "so",
421           "version": "v1",
422           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
423           "protocol": "REST",
424           "port": "{{ .Values.service.internalPort }}",
425           "visualRange":"0",
426           "lb_policy":"ip_hash"
427         },
428         {
429           "serviceName": "so",
430           "version": "v1",
431           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
432           "protocol": "REST",
433           "port": "{{ .Values.service.internalPort }}",
434           "visualRange":"0",
435           "lb_policy":"ip_hash"
436         },
437         {
438           "serviceName": "so",
439           "version": "v1",
440           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
441           "protocol": "REST",
442           "port": "{{ .Values.service.internalPort }}",
443           "visualRange":"0",
444           "lb_policy":"ip_hash"
445         },
446         {
447           "serviceName": "so",
448           "version": "v1",
449           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
450           "protocol": "REST",
451           "port": "{{ .Values.service.internalPort }}",
452           "visualRange":"0",
453           "lb_policy":"ip_hash"
454         },
455         {
456           "serviceName": "so",
457           "version": "v1",
458           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
459           "protocol": "REST",
460           "port": "{{ .Values.service.internalPort }}",
461           "visualRange":"0",
462           "lb_policy":"ip_hash"
463         },
464         {
465           "serviceName": "so",
466           "version": "v1",
467           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
468           "protocol": "REST",
469           "port": "{{ .Values.service.internalPort }}",
470           "visualRange":"0",
471           "lb_policy":"ip_hash"
472         },
473         {
474           "serviceName": "so",
475           "version": "v1",
476           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
477           "protocol": "REST",
478           "port": "{{ .Values.service.internalPort }}",
479           "visualRange":"0",
480           "lb_policy":"ip_hash"
481         },
482         {
483           "serviceName": "so",
484           "version": "v1",
485           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
486           "protocol": "REST",
487           "port": "{{ .Values.service.internalPort }}",
488           "visualRange":"0",
489           "lb_policy":"ip_hash"
490         },
491         {
492           "serviceName": "so",
493           "version": "v1",
494           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
495           "protocol": "REST",
496           "port": "{{ .Values.service.internalPort }}",
497           "visualRange":"0",
498           "lb_policy":"ip_hash"
499         },
500         {
501           "serviceName": "so",
502           "version": "v1",
503           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
504           "protocol": "REST",
505           "port": "{{ .Values.service.internalPort }}",
506           "visualRange":"0",
507           "lb_policy":"ip_hash"
508         },
509         {
510           "serviceName": "so",
511           "version": "v1",
512           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
513           "protocol": "REST",
514           "port": "{{ .Values.service.internalPort }}",
515           "visualRange":"0",
516           "lb_policy":"ip_hash"
517         },
518         {
519           "serviceName": "so",
520           "version": "v1",
521           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
522           "protocol": "REST",
523           "port": "{{ .Values.service.internalPort }}",
524           "visualRange":"0",
525           "lb_policy":"ip_hash"
526         },
527         {
528           "serviceName": "so",
529           "version": "v1",
530           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
531           "protocol": "REST",
532           "port": "{{ .Values.service.internalPort }}",
533           "visualRange":"0",
534           "lb_policy":"ip_hash"
535         }
536       ]{{ end }}
537
538 updateStrategy:
539   type: RollingUpdate
540   maxUnavailable: 1
541   maxSurge: 1
542
543 ################################################################
544 # soHelpers part
545 #################################################################
546 soHelpers:
547   containerPort: *containerPort
548
549 # Resource Limit flavor -By Default using small
550 flavor: small
551 # Segregation for Different environment (Small and Large)
552 resources:
553   small:
554     limits:
555       cpu: 2000m
556       memory: 4Gi
557     requests:
558       cpu: 500m
559       memory: 1Gi
560   large:
561     limits:
562       cpu: 4000m
563       memory: 8Gi
564     requests:
565       cpu: 1000m
566       memory: 2Gi
567   unlimited: {}
568
569 nodeSelector: {}
570 affinity: {}
571
572 # application configuration
573 config:
574   logstashServiceName: log-ls
575   logstashPort: 5044
576   # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
577   openStackKeystoneVersion: "KEYSTONE"
578
579 #Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
580 #helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
581 #                                                       --set so.global.mariadbGalera.localCluster=true \
582 #                                                       --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
583 #                                                       --set so.global.mariadbGalera.serviceName=so-mariadb-galera
584 mariadb-galera:
585   rootUser:
586     externalSecret: *dbRootPassSecretName
587   nameOverride: &so-mariadb so-mariadb-galera
588   replicaCount: 1
589   persistence:
590     mountSubPath: so/mariadb-galera/data
591     enabled: true
592   serviceAccount:
593     nameOverride: *so-mariadb
594
595 ingress:
596   enabled: false
597   service:
598     - baseaddr: 'so-api'
599       name: 'so'
600       port: 8080
601
602 mso:
603   adapters:
604     requestDb:
605       auth: Basic YnBlbDpwYXNzd29yZDEk
606   camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
607   msoKey: 07a7159d3bf51a0e53be7a8f89699be7
608   sdc:
609     client:
610       auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
611   aai:
612     auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
613   oof:
614     login: test
615     password: testpwd
616   so:
617     operationalEnv:
618       dmaap:
619         auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
620   health:
621     auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
622
623 so-bpmn-infra:
624   db:
625     <<: *dbSecrets
626   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
627
628 so-catalog-db-adapter:
629   enabled: true
630   db:
631     <<: *dbSecrets
632
633 so-cnf-adapter:
634   enabled: true
635   db:
636     <<: *dbSecrets
637   server:
638     aaiCredsExternalSecret: *aai-secrets
639     actuatorCredsExternalSecret: *actuator-secrets
640   mso:
641     msoKeySecret: *mso-key
642
643 so-cnfm-lcm:
644   enabled: true
645   db:
646     <<: *dbSecrets
647
648 so-etsi-nfvo-ns-lcm:
649   enabled: true
650   db:
651     <<: *dbSecrets
652
653 so-mariadb:
654   db:
655     rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
656     rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
657     backupCredsExternalSecret: *dbBackupCredsSecretName
658     userCredsExternalSecret: *dbUserCredsSecretName
659     adminCredsExternalSecret: *dbAdminCredsSecretName
660
661 so-admin-cockpit:
662   enabled: true
663   db:
664     <<: *dbSecrets
665
666 so-nssmf-adapter:
667   enabled: true
668   server:
669     actuatorCredsExternalSecret: *actuator-secrets
670     bpelCredsExternalSecret: *bpel-secrets
671   db:
672     <<: *dbSecrets
673
674 so-oof-adapter:
675   enabled: true
676   db:
677     <<: *dbSecrets
678   mso:
679     msoKeySecret: *mso-key
680     camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
681     oof:
682       authSecret: *mso-oof-auth
683   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
684
685 so-openstack-adapter:
686   enabled: true
687   db:
688     <<: *dbSecrets
689   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
690
691 so-request-db-adapter:
692   db:
693     <<: *dbSecrets
694
695 so-sdc-controller:
696   db:
697     <<: *dbSecrets
698   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
699   config:
700     jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.soSdcListenerKafkaUser }}'
701
702 so-sdnc-adapter:
703   enabled: true
704   db:
705     <<: *dbSecrets
706   mso:
707     msoKeySecret: *mso-key
708   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
709
710 so-ve-vnfm-adapter:
711   enabled: false
712
713 so-etsi-sol005-adapter:
714   enabled: true
715   db:
716     <<: *dbSecrets
717
718 so-etsi-sol003-adapter:
719   enabled: true
720
721 #Pods Service Account
722 serviceAccount:
723   nameOverride: so
724   roles:
725     - read
726
727 #Log configuration
728 log:
729   path: /var/log/onap