229decdf383a563645a55c4c913eb8cc921308c7
[oom.git] / kubernetes / so / values.yaml
1 # Copyright © 2018 AT&T USA
2 # Copyright © 2020 Huawei
3 # Copyright © 2021 Orange
4 # Modifications Copyright © 2023 Nordix Foundation
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
8 #
9 #       http://www.apache.org/licenses/LICENSE-2.0
10 #
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
16 #################################################################
17 # Global configuration defaults.
18 #################################################################
19 global:
20   nodePortPrefix: 302
21   nodePortPrefixExt: 304
22   centralizedLoggingEnabled: true
23   mariadbGalera:
24     # flag to enable the DB creation via mariadb-operator
25     useOperator: true
26     nameOverride: mariadb-galera
27     servicePort: '3306'
28     service: mariadb-galera
29     internalPort: '3306'
30     #This flag allows SO to instantiate its own mariadb-galera cluster,
31     #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
32     localCluster: false
33   persistence:
34     mountPath: /dockerdata-nfs
35   #This configuration specifies Service and port for SDNC OAM interface
36   sdncOamService: sdnc-oam
37   sdncOamPort: 8282
38   #This configuration will run the migration. The configurations are for backing up the data
39   #from DB and then restoring it to the present versions preferred DB.
40   migration:
41     enabled: false
42     dbHost: mariadb-galera
43     dbPort: 3306
44     dbUser: root
45     dbPassword: secretpassword
46     # dbCredsExternalSecret: some secret
47   msbEnabled: true
48   app:
49     siteName: onapheat
50     auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
51     defaultCloudOwner: onap
52
53 readinessCheck:
54   wait_for:
55     jobs:
56       - '{{ include "common.release" . }}-so-mariadb-config-job'
57
58 #################################################################
59 # Secrets metaconfig
60 #################################################################
61 secrets:
62   - uid: db-root-pass
63     name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
64     type: password
65     # If we're using shared mariadb, we need to use the secret name (second
66     # part).
67     # If not, we do the same trick than for user db secret hat allows you
68     # override this secret using external one with the same field that is used
69     # to pass this to subchart.
70     externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
71       ternary ((hasSuffix "so-db-root-pass" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
72                   ternary
73                     ""
74                     (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .))
75               (include "common.mariadb.secret.rootPassSecretName"
76                 (dict "dot" .
77                       "chartName" .Values.global.mariadbGalera.nameOverride)) }}'
78     password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
79   - uid: db-backup-creds
80     name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
81     type: basicAuth
82     externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
83     login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
84     password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
85     passwordPolicy: required
86     annotations:
87       helm.sh/hook: pre-upgrade,pre-install
88       helm.sh/hook-weight: '0'
89       helm.sh/hook-delete-policy: before-hook-creation
90   - uid: db-user-creds
91     name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
92     type: basicAuth
93     externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
94     login: '{{ .Values.dbCreds.userName }}'
95     password: '{{ .Values.dbCreds.userPassword }}'
96     passwordPolicy: generate
97   - uid: db-admin-creds
98     name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
99     type: basicAuth
100     externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
101     login: '{{ .Values.dbCreds.adminName }}'
102     password: '{{ .Values.dbCreds.adminPassword }}'
103     passwordPolicy: generate
104   - uid: 'mso-key'
105     name: &mso-key '{{ include "common.release" . }}-mso-key'
106     type: password
107     password: '{{ .Values.mso.msoKey }}'
108   - uid: mso-oof-auth
109     name: &mso-oof-auth '{{ include "common.release" . }}-mso-oof-auth'
110     type: basicAuth
111     login: '{{ .Values.mso.oof.login }}'
112     password: '{{ .Values.mso.oof.password }}'
113     passwordPolicy: required
114   - uid: server-actuator-creds
115     name: &actuator-secrets '{{ include "common.release" . }}-so-server-actuator-creds'
116     type: basicAuth
117     externalSecret: '{{ tpl (default "" .Values.server.actuatorCredsExternalSecret) . }}'
118     login: '{{ .Values.server.actuator.username }}'
119     password: '{{ .Values.server.actuator.password }}'
120     passwordPolicy: required
121   - uid: server-bpel-creds
122     name: &bpel-secrets '{{ include "common.release" . }}-so-server-bpel-creds'
123     type: basicAuth
124     externalSecret: '{{ tpl (default "" .Values.server.bpelCredsExternalSecret) . }}'
125     login: '{{ .Values.server.bpel.username }}'
126     password: '{{ .Values.server.bpel.password }}'
127     passwordPolicy: required
128   - uid: so-aai-creds
129     name: &aai-secrets '{{ include "common.release" . }}-so-server-aai-creds'
130     type: basicAuth
131     externalSecret: '{{ tpl (default "" .Values.server.aaiCredsExternalSecret) . }}'
132     login: '{{ .Values.server.aai.username }}'
133     password: '{{ .Values.server.aai.password }}'
134     passwordPolicy: required
135
136 ##################################################################
137 # Application configuration defaults.
138 #################################################################
139
140 dbSecrets: &dbSecrets
141   userCredsExternalSecret: *dbUserCredsSecretName
142   adminCredsExternalSecret: *dbAdminCredsSecretName
143
144 # unused in this, just to pass to subcharts
145 dbCreds:
146   userName: so_user
147   adminName: so_admin
148
149 image: onap/so/api-handler-infra:1.12.2
150
151 server:
152   aai:
153     username: aai@aai.onap.org
154     password: demo123456!
155   # aaiCredsExternalSecret: some secret
156   actuator:
157     username: mso_admin
158     password: password1$
159   # actuatorCredsExternalSecret: some secret
160   bpel:
161     username: bpel
162     password: password1$
163   # bpelCredsExternalSecret: some secret
164
165 pullPolicy: Always
166 replicaCount: 1
167 minReadySeconds: 10
168 containerPort: &containerPort 8080
169 logPath: ./logs/apih/
170 app: api-handler-infra
171 service:
172   type: NodePort
173   internalPort: *containerPort
174   ports:
175     - name: http
176       port: *containerPort
177       nodePort: '77'
178   annotations:
179     msb.onap.org/service-info: |
180       {{ if .Values.global.msbEnabled -}}[
181         {
182           "serviceName": "so",
183           "version": "v1",
184           "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments",
185           "protocol": "REST",
186           "port": "{{ .Values.service.internalPort }}",
187           "visualRange":"0",
188           "lb_policy":"ip_hash"
189         },
190         {
191           "serviceName": "so",
192           "version": "v1",
193           "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/activate",
194           "protocol": "REST",
195           "port": "{{ .Values.service.internalPort }}",
196           "visualRange":"0",
197           "lb_policy":"ip_hash"
198         },
199         {
200           "serviceName": "so",
201           "version": "v1",
202           "url": "/onap/so/infra/cloudResources/{version:[vV][1]}/operationalEnvironments/{operationalEnvironmentId}/deactivate",
203           "protocol": "REST",
204           "port": "{{ .Values.service.internalPort }}",
205           "visualRange":"0",
206           "lb_policy":"ip_hash"
207         },
208         {
209           "serviceName": "so",
210           "version": "v1",
211           "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}/{requestId}/unlock",
212           "protocol": "REST",
213           "port": "{{ .Values.service.internalPort }}",
214           "visualRange":"0",
215           "lb_policy":"ip_hash"
216         },
217         {
218           "serviceName": "so",
219           "version": "v1",
220           "url": "/onap/so/infra/cloudResourcesRequests/{version:[vV][1]}",
221           "protocol": "REST",
222           "port": "{{ .Values.service.internalPort }}",
223           "visualRange":"0",
224           "lb_policy":"ip_hash"
225         },
226         {
227           "serviceName": "so",
228           "version": "v1",
229           "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}",
230           "protocol": "REST",
231           "port": "{{ .Values.service.internalPort }}",
232           "visualRange":"0",
233           "lb_policy":"ip_hash"
234         },
235         {
236           "serviceName": "so",
237           "version": "v1",
238           "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}",
239           "protocol": "REST",
240           "port": "{{ .Values.service.internalPort }}",
241           "visualRange":"0",
242           "lb_policy":"ip_hash"
243         },
244         {
245           "serviceName": "so",
246           "version": "v1",
247           "url": "/onap/so/infra/orchestrationRequests/{version:[vV][4-7]}/{requestId}/unlock",
248           "protocol": "REST",
249           "port": "{{ .Values.service.internalPort }}",
250           "visualRange":"0",
251           "lb_policy":"ip_hash"
252         },
253         {
254           "serviceName": "so",
255           "version": "v1",
256           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances",
257           "protocol": "REST",
258           "port": "{{ .Values.service.internalPort }}",
259           "visualRange":"0",
260           "lb_policy":"ip_hash"
261         },
262         {
263           "serviceName": "so",
264           "version": "v1",
265           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/activate",
266           "protocol": "REST",
267           "port": "{{ .Values.service.internalPort }}",
268           "visualRange":"0",
269           "lb_policy":"ip_hash"
270         },
271         {
272           "serviceName": "so",
273           "version": "v1",
274           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/deactivate",
275           "protocol": "REST",
276           "port": "{{ .Values.service.internalPort }}",
277           "visualRange":"0",
278           "lb_policy":"ip_hash"
279         },
280         {
281           "serviceName": "so",
282           "version": "v1",
283           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}",
284           "protocol": "REST",
285           "port": "{{ .Values.service.internalPort }}",
286           "visualRange":"0",
287           "lb_policy":"ip_hash"
288         },
289         {
290           "serviceName": "so",
291           "version": "v1",
292           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][7]}/serviceInstances/assign",
293           "protocol": "REST",
294           "port": "{{ .Values.service.internalPort }}",
295           "visualRange":"0",
296           "lb_policy":"ip_hash"
297         },
298         {
299           "serviceName": "so",
300           "version": "v1",
301           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/unassign",
302           "protocol": "REST",
303           "port": "{{ .Values.service.internalPort }}",
304           "visualRange":"0",
305           "lb_policy":"ip_hash"
306         },
307         {
308           "serviceName": "so",
309           "version": "v1",
310           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations",
311           "protocol": "REST",
312           "port": "{{ .Values.service.internalPort }}",
313           "visualRange":"0",
314           "lb_policy":"ip_hash"
315         },
316         {
317           "serviceName": "so",
318           "version": "v1",
319           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}",
320           "protocol": "REST",
321           "port": "{{ .Values.service.internalPort }}",
322           "visualRange":"0",
323           "lb_policy":"ip_hash"
324         },
325         {
326           "serviceName": "so",
327           "version": "v1",
328           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/enablePort",
329           "protocol": "REST",
330           "port": "{{ .Values.service.internalPort }}",
331           "visualRange":"0",
332           "lb_policy":"ip_hash"
333         },
334         {
335           "serviceName": "so",
336           "version": "v1",
337           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/disablePort",
338           "protocol": "REST",
339           "port": "{{ .Values.service.internalPort }}",
340           "visualRange":"0",
341           "lb_policy":"ip_hash"
342         },
343         {
344           "serviceName": "so",
345           "version": "v1",
346           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/activate",
347           "protocol": "REST",
348           "port": "{{ .Values.service.internalPort }}",
349           "visualRange":"0",
350           "lb_policy":"ip_hash"
351         },
352         {
353           "serviceName": "so",
354           "version": "v1",
355           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/configurations/{configurationInstanceId}/deactivate",
356           "protocol": "REST",
357           "port": "{{ .Values.service.internalPort }}",
358           "visualRange":"0",
359           "lb_policy":"ip_hash"
360         },
361         {
362           "serviceName": "so",
363           "version": "v1",
364           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/addRelationships",
365           "protocol": "REST",
366           "port": "{{ .Values.service.internalPort }}",
367           "visualRange":"0",
368           "lb_policy":"ip_hash"
369         },
370         {
371           "serviceName": "so",
372           "version": "v1",
373           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/removeRelationships",
374           "protocol": "REST",
375           "port": "{{ .Values.service.internalPort }}",
376           "visualRange":"0",
377           "lb_policy":"ip_hash"
378         },
379         {
380           "serviceName": "so",
381           "version": "v1",
382           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs",
383           "protocol": "REST",
384           "port": "{{ .Values.service.internalPort }}",
385           "visualRange":"0",
386           "lb_policy":"ip_hash"
387         },
388         {
389           "serviceName": "so",
390           "version": "v1",
391           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/replace",
392           "protocol": "REST",
393           "port": "{{ .Values.service.internalPort }}",
394           "visualRange":"0",
395           "lb_policy":"ip_hash"
396         },
397         {
398           "serviceName": "so",
399           "version": "v1",
400           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
401           "protocol": "REST",
402           "port": "{{ .Values.service.internalPort }}",
403           "visualRange":"0",
404           "lb_policy":"ip_hash"
405         },
406         {
407           "serviceName": "so",
408           "version": "v1",
409           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/applyUpdatedConfig",
410           "protocol": "REST",
411           "port": "{{ .Values.service.internalPort }}",
412           "visualRange":"0",
413           "lb_policy":"ip_hash"
414         },
415         {
416           "serviceName": "so",
417           "version": "v1",
418           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}",
419           "protocol": "REST",
420           "port": "{{ .Values.service.internalPort }}",
421           "visualRange":"0",
422           "lb_policy":"ip_hash"
423         },
424         {
425           "serviceName": "so",
426           "version": "v1",
427           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules",
428           "protocol": "REST",
429           "port": "{{ .Values.service.internalPort }}",
430           "visualRange":"0",
431           "lb_policy":"ip_hash"
432         },
433         {
434           "serviceName": "so",
435           "version": "v1",
436           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/replace",
437           "protocol": "REST",
438           "port": "{{ .Values.service.internalPort }}",
439           "visualRange":"0",
440           "lb_policy":"ip_hash"
441         },
442         {
443           "serviceName": "so",
444           "version": "v1",
445           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
446           "protocol": "REST",
447           "port": "{{ .Values.service.internalPort }}",
448           "visualRange":"0",
449           "lb_policy":"ip_hash"
450         },
451         {
452           "serviceName": "so",
453           "version": "v1",
454           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][6-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/inPlaceSoftwareUpdate",
455           "protocol": "REST",
456           "port": "{{ .Values.service.internalPort }}",
457           "visualRange":"0",
458           "lb_policy":"ip_hash"
459         },
460         {
461           "serviceName": "so",
462           "version": "v1",
463           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}",
464           "protocol": "REST",
465           "port": "{{ .Values.service.internalPort }}",
466           "visualRange":"0",
467           "lb_policy":"ip_hash"
468         },
469         {
470           "serviceName": "so",
471           "version": "v1",
472           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/{vfmoduleInstanceId}/deactivateAndCloudDelete",
473           "protocol": "REST",
474           "port": "{{ .Values.service.internalPort }}",
475           "visualRange":"0",
476           "lb_policy":"ip_hash"
477         },
478         {
479           "serviceName": "so",
480           "version": "v1",
481           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/vfModules/scaleOut",
482           "protocol": "REST",
483           "port": "{{ .Values.service.internalPort }}",
484           "visualRange":"0",
485           "lb_policy":"ip_hash"
486         },
487         {
488           "serviceName": "so",
489           "version": "v1",
490           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups",
491           "protocol": "REST",
492           "port": "{{ .Values.service.internalPort }}",
493           "visualRange":"0",
494           "lb_policy":"ip_hash"
495         },
496         {
497           "serviceName": "so",
498           "version": "v1",
499           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
500           "protocol": "REST",
501           "port": "{{ .Values.service.internalPort }}",
502           "visualRange":"0",
503           "lb_policy":"ip_hash"
504         },
505         {
506           "serviceName": "so",
507           "version": "v1",
508           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/vnfs/{vnfInstanceId}/volumeGroups/{volumeGroupInstanceId}",
509           "protocol": "REST",
510           "port": "{{ .Values.service.internalPort }}",
511           "visualRange":"0",
512           "lb_policy":"ip_hash"
513         },
514         {
515           "serviceName": "so",
516           "version": "v1",
517           "url": "/onap/so/infra/serviceInstantiation/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks",
518           "protocol": "REST",
519           "port": "{{ .Values.service.internalPort }}",
520           "visualRange":"0",
521           "lb_policy":"ip_hash"
522         },
523         {
524           "serviceName": "so",
525           "version": "v1",
526           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
527           "protocol": "REST",
528           "port": "{{ .Values.service.internalPort }}",
529           "visualRange":"0",
530           "lb_policy":"ip_hash"
531         },
532         {
533           "serviceName": "so",
534           "version": "v1",
535           "url": "/onap/so/infra/serviceInstantiationRequests/{version:[vV][5-7]}/serviceInstances/{serviceInstanceId}/networks/{networkInstanceId}",
536           "protocol": "REST",
537           "port": "{{ .Values.service.internalPort }}",
538           "visualRange":"0",
539           "lb_policy":"ip_hash"
540         }
541       ]{{ end }}
542
543 updateStrategy:
544   type: RollingUpdate
545   maxUnavailable: 1
546   maxSurge: 1
547
548 ################################################################
549 # soHelpers part
550 #################################################################
551 soHelpers:
552   containerPort: *containerPort
553
554 # Resource Limit flavor -By Default using small
555 flavor: small
556 # Segregation for Different environment (Small and Large)
557 resources:
558   small:
559     limits:
560       cpu: 1
561       memory: 4Gi
562     requests:
563       cpu: 0.5
564       memory: 1Gi
565   large:
566     limits:
567       cpu: 2
568       memory: 8Gi
569     requests:
570       cpu: 1
571       memory: 2Gi
572   unlimited: {}
573
574 nodeSelector: {}
575 affinity: {}
576
577 # application configuration
578 config:
579   logstashServiceName: log-ls
580   logstashPort: 5044
581   # "KEYSTONE" for keystone v2, "KEYSTONE_V3" for keystone v3
582   openStackKeystoneVersion: "KEYSTONE"
583
584 #Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
585 #helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
586 #                                                       --set so.global.mariadbGalera.localCluster=true \
587 #                                                       --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
588 #                                                       --set so.global.mariadbGalera.serviceName=so-mariadb-galera
589 mariadb-galera: &mariadbGalera
590   rootUser:
591     externalSecret: *dbRootPassSecretName
592   nameOverride: &so-mariadb so-mariadb-galera
593   replicaCount: 1
594   service:
595     name: *so-mariadb
596     portName: *so-mariadb
597     internalPort: 3306
598   mariadbOperator:
599     galera:
600       enabled: false
601   persistence:
602     mountSubPath: so/mariadb-galera/data
603     enabled: true
604   serviceAccount:
605     nameOverride: *so-mariadb
606
607 ingress:
608   enabled: false
609   service:
610     - baseaddr: 'so-api'
611       name: 'so'
612       port: 8080
613
614 serviceMesh:
615   authorizationPolicy:
616     authorizedPrincipals:
617       - serviceAccount: consul-read
618       - serviceAccount: consul-server-read
619       - serviceAccount: nbi-read
620       - serviceAccount: policy-drools-pdp-read
621       - serviceAccount: so-bpmn-infra-read
622       - serviceAccount: robot-read
623       - serviceAccount: istio-ingress
624         namespace: istio-ingress
625
626 mso:
627   adapters:
628     requestDb:
629       auth: Basic YnBlbDpwYXNzd29yZDEk
630   camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
631   msoKey: 07a7159d3bf51a0e53be7a8f89699be7
632   sdc:
633     client:
634       auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
635   aai:
636     auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
637   oof:
638     login: test
639     password: testpwd
640   so:
641     operationalEnv:
642       dmaap:
643         auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
644   health:
645     auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
646
647 so-bpmn-infra:
648   mariadb-galera:
649     <<: *mariadbGalera
650   db:
651     <<: *dbSecrets
652   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
653
654 so-catalog-db-adapter:
655   enabled: true
656   mariadb-galera:
657     <<: *mariadbGalera
658   db:
659     <<: *dbSecrets
660
661 so-cnf-adapter:
662   enabled: true
663   mariadb-galera:
664     <<: *mariadbGalera
665   db:
666     <<: *dbSecrets
667   server:
668     aaiCredsExternalSecret: *aai-secrets
669     actuatorCredsExternalSecret: *actuator-secrets
670   mso:
671     msoKeySecret: *mso-key
672
673 so-cnfm-lcm:
674   enabled: true
675   mariadb-galera:
676     <<: *mariadbGalera
677   db:
678     <<: *dbSecrets
679
680 so-etsi-nfvo-ns-lcm:
681   enabled: true
682   mariadb-galera:
683     <<: *mariadbGalera
684   db:
685     <<: *dbSecrets
686
687 so-mariadb:
688   mariadb-galera:
689     <<: *mariadbGalera
690   db:
691     rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
692     #rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
693     rootPasswordExternalSecret: '{{ ternary (tpl .Values.db.rootPasswordExternalSecretLocalDb .) (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
694     backupCredsExternalSecret: *dbBackupCredsSecretName
695     userCredsExternalSecret: *dbUserCredsSecretName
696     adminCredsExternalSecret: *dbAdminCredsSecretName
697
698 so-admin-cockpit:
699   enabled: true
700   mariadb-galera:
701     <<: *mariadbGalera
702   db:
703     <<: *dbSecrets
704
705 so-nssmf-adapter:
706   enabled: true
707   server:
708     actuatorCredsExternalSecret: *actuator-secrets
709     bpelCredsExternalSecret: *bpel-secrets
710   mariadb-galera:
711     <<: *mariadbGalera
712   db:
713     <<: *dbSecrets
714
715 so-oof-adapter:
716   enabled: true
717   mariadb-galera:
718     <<: *mariadbGalera
719   db:
720     <<: *dbSecrets
721   mso:
722     msoKeySecret: *mso-key
723     camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
724     oof:
725       authSecret: *mso-oof-auth
726   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
727
728 so-openstack-adapter:
729   enabled: true
730   mariadb-galera:
731     <<: *mariadbGalera
732   db:
733     <<: *dbSecrets
734   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
735
736 so-request-db-adapter:
737   mariadb-galera:
738     <<: *mariadbGalera
739   db:
740     <<: *dbSecrets
741
742 so-sdc-controller:
743   mariadb-galera:
744     <<: *mariadbGalera
745   db:
746     <<: *dbSecrets
747   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
748
749 so-sdnc-adapter:
750   enabled: true
751   mariadb-galera:
752     <<: *mariadbGalera
753   db:
754     <<: *dbSecrets
755   mso:
756     msoKeySecret: *mso-key
757   logConfigMapNamePrefix: '{{ include "common.release" . }}-so'
758
759 so-ve-vnfm-adapter:
760   enabled: false
761
762 so-etsi-sol005-adapter:
763   enabled: true
764   mariadb-galera:
765     <<: *mariadbGalera
766   db:
767     <<: *dbSecrets
768
769 so-etsi-sol003-adapter:
770   enabled: true
771
772 #Pods Service Account
773 serviceAccount:
774   nameOverride: so
775   roles:
776     - read
777
778 #Log configuration
779 log:
780   path: /var/log/onap