Merge "[SO] Correct connection configuration to sdnc"
[oom.git] / kubernetes / so / values.yaml
1 # Copyright © 2018 AT&T USA
2 #
3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
6 #
7 #       http://www.apache.org/licenses/LICENSE-2.0
8 #
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
14 #################################################################
15 # Global configuration defaults.
16 #################################################################
17 global:
18   nodePortPrefix: 302
19   nodePortPrefixExt: 304
20   repository: nexus3.onap.org:10001
21   readinessRepository: oomk8s
22   readinessImage: readiness-check:2.0.2
23   loggingRepository: docker.elastic.co
24   loggingImage: beats/filebeat:5.5.0
25   soBaseImage: onap/so/base-image:1.0
26   mariadbGalera:
27     nameOverride: mariadb-galera
28     serviceName: mariadb-galera
29     servicePort: "3306"
30     # mariadbRootPassword: secretpassword
31     # rootPasswordExternalSecret: some secret
32     #This flag allows SO to instantiate its own mariadb-galera cluster,
33     #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
34     localCluster: false
35   persistence:
36     mountPath: /dockerdata-nfs
37   #This configuration specifies Service and port for SDNC OAM interface
38   sdncOamService: sdnc-oam
39   sdncOamPort: 8282
40   #This configuration will run the migration. The configurations are for backing up the data
41   #from DB and then restoring it to the present versions preferred DB.
42   migration:
43     enabled: false
44     dbHost: mariadb-galera
45     dbPort: 3306
46     dbUser: root
47     dbPassword: secretpassword
48     # dbCredsExternalSecret: some secret
49   msbEnabled: true
50   security:
51     aaf:
52       enabled: false
53   aaf:
54     auth:
55       header: Basic c29Ac28ub25hcC5vcmc6ZGVtbzEyMzQ1Ngo=
56       encrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
57   app:
58     siteName: onapheat
59     auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
60     defaultCloudOwner: onap
61     cadi:
62       cadiLoglevel: DEBUG
63       cadiKeyFile: /app/org.onap.so.keyfile
64       cadiTrustStore: /app/org.onap.so.trust.jks
65       cadiTruststorePassword: enc:MFpuxKeYK6Eo6QXjDUjtOBbp0FthY7SB4mKSIJm_RWC
66       cadiLatitude: 38.4329
67       cadiLongitude: -90.43248
68       aafEnv: IST
69       aafApiVersion: 2.1
70       aafRootNs: org.onap.so
71       aafLocateUrl: https://aaf-locate.onap:8095
72       aafUrl: https://aaf-locate.onap:8095/locate/org.osaaf.aaf.service:2.1
73     msoKey: 07a7159d3bf51a0e53be7a8f89699be7
74   client:
75     certs:
76       trustStorePassword: b25hcDRzbw==
77       keyStorePassword: c280b25hcA==
78   certificates:
79     path: /etc/ssl/certs
80     share_path: /usr/local/share/ca-certificates/
81
82 #################################################################
83 # Secrets metaconfig
84 #################################################################
85 secrets:
86   - uid: db-root-pass
87     name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
88     type: password
89     externalSecret: '{{ ternary .Values.global.mariadbGalera.rootPasswordExternalSecret (default (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.rootPasswordExternalSecret) .Values.global.mariadbGalera.localCluster }}'
90     password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
91   - uid: db-backup-creds
92     name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
93     type: basicAuth
94     externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
95     login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
96     password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
97     passwordPolicy: required
98     annotations:
99       helm.sh/hook: pre-upgrade,pre-install
100       helm.sh/hook-weight: "0"
101       helm.sh/hook-delete-policy: before-hook-creation
102   - uid: db-user-creds
103     name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
104     type: basicAuth
105     externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
106     login: '{{ .Values.dbCreds.userName }}'
107     password: '{{ .Values.dbCreds.userPassword }}'
108     passwordPolicy: generate
109   - uid: db-admin-creds
110     name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
111     type: basicAuth
112     externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
113     login: '{{ .Values.dbCreds.adminName }}'
114     password: '{{ .Values.dbCreds.adminPassword }}'
115     passwordPolicy: generate
116   - uid: "so-onap-certs"
117     name: &so-certs '{{ include "common.release" . }}-so-certs'
118     externalSecret: '{{ tpl (default "" .Values.certSecret) . }}'
119     type: generic
120     filePaths:
121       - resources/config/certificates/onap-ca.crt
122       - resources/config/certificates/msb-ca.crt
123
124 #################################################################
125 # Application configuration defaults.
126 #################################################################
127
128 dbSecrets: &dbSecrets
129   userCredsExternalSecret: *dbUserCredsSecretName
130   adminCredsExternalSecret: *dbAdminCredsSecretName
131
132 # unused in this, just to pass to subcharts
133 dbCreds:
134   userName: so_user
135   adminName: so_admin
136
137 repository: nexus3.onap.org:10001
138 image: onap/so/api-handler-infra:1.6.0
139 pullPolicy: Always
140 replicaCount: 1
141 minReadySeconds: 10
142 containerPort: 8080
143 logPath: ./logs/apih/
144 app: api-handler-infra
145 service:
146     type: NodePort
147     nodePort: 77
148     internalPort: 8080
149     externalPort: 8080
150     portName: so-apih-port
151 updateStrategy:
152     type: RollingUpdate
153     maxUnavailable: 1
154     maxSurge: 1
155 # Resource Limit flavor -By Default using small
156 flavor: small
157 # Segregation for Different environment (Small and Large)
158 persistence:
159   certificatesPath: /certificates
160 resources:
161   small:
162     limits:
163       cpu: 2000m
164       memory: 4Gi
165     requests:
166       cpu: 500m
167       memory: 1Gi
168   large:
169     limits:
170       cpu: 4000m
171       memory: 8Gi
172     requests:
173       cpu: 1000m
174       memory: 2Gi
175   unlimited: {}
176 livenessProbe:
177     path: /manage/health
178     scheme: HTTP
179     initialDelaySeconds: 600
180     periodSeconds: 60
181     timeoutSeconds: 10
182     successThreshold: 1
183     failureThreshold: 3
184
185 nodeSelector: {}
186 affinity: {}
187
188 # application configuration
189 config:
190   logstashServiceName: log-ls
191   logstashPort: 5044
192
193 #Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
194 #helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
195 #                                                       --set so.global.mariadbGalera.localCluster=true \
196 #                                                       --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
197 #                                                       --set so.global.mariadbGalera.serviceName=so-mariadb-galera
198 mariadb-galera:
199   config:
200     mariadbRootPasswordExternalSecret: *dbRootPassSecretName
201   nameOverride: so-mariadb-galera
202   replicaCount: 1
203   service:
204     name: so-mariadb-galera
205   persistence:
206     mountSubPath: so/mariadb-galera/data
207     enabled: true
208
209 ingress:
210   enabled: false
211   service:
212     - baseaddr: "so"
213       name: "so"
214       port: 8080
215   config:
216     ssl: "none"
217
218 mso:
219   adapters:
220     requestDb:
221       auth: Basic YnBlbDpwYXNzd29yZDEk
222   config:
223     cadi:
224       aafId: so@so.onap.org
225       aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
226       apiEnforcement: org.onap.so.apihPerm
227       noAuthn: /manage/health
228   camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
229   sdc:
230     client:
231       auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
232   aai:
233     auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
234   so:
235     operationalEnv:
236       dmaap:
237         auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
238   health:
239     auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
240
241 so-bpmn-infra:
242   certSecret: *so-certs
243   db:
244     <<: *dbSecrets
245   cds:
246     auth: Basic Y2NzZGthcHBzOmNjc2RrYXBwcw==
247   aai:
248     auth: 221187EFA3AD4E33600DE0488F287099934CE65C3D0697BCECC00BB58E784E07CD74A24581DC31DBC086FF63DF116378776E9BE3D1325885
249   mso:
250     key: 07a7159d3bf51a0e53be7a8f89699be7
251     adapters:
252       requestDb:
253         auth: Basic YnBlbDpwYXNzd29yZDEk
254       db:
255         auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
256         password: wLg4sjrAFUS8rfVfdvTXeQ==
257       po:
258         auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
259     config:
260       cadi:
261         aafId: so@so.onap.org
262         aaafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
263         apiEnforcement: org.onap.so.bpmnPerm
264         noAuthn: /manage/health
265     sdnc:
266       password: 1D78CFC35382B6938A989066A7A7EAEF4FE933D2919BABA99EB4763737F39876C333EE5F
267     sniro:
268       auth: test:testpwd
269       endpoint: http://replaceme:28090/optimizationInstance/V1/create
270     oof:
271       auth: test:testpwd
272   so:
273     vnfm:
274       adapter:
275         auth: Basic dm5mbTpwYXNzd29yZDEk
276
277 so-catalog-db-adapter:
278   certSecret: *so-certs
279   db:
280     <<: *dbSecrets
281   mso:
282     config:
283       cadi:
284         aafId: so@so.onap.org
285         aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
286         apiEnforcement: org.onap.so.catalogDbAdapterPerm
287         noAuthn: /manage/health
288     adapters:
289       db:
290         auth: Basic YnBlbDpwYXNzd29yZDEk
291
292 so-monitoring:
293   certSecret: *so-certs
294   db:
295     <<: *dbSecrets
296
297 so-openstack-adapter:
298   certSecret: *so-certs
299   db:
300     <<: *dbSecrets
301   aaf:
302     auth:
303       encrypted: 7F182B0C05D58A23A1C4966B9CDC9E0B8BC5CD53BC8C7B4083D869F8D53E9BDC3EFD55C94B1D3F
304   aai:
305     auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
306   org:
307     onap:
308       so:
309         adapters:
310           bpelauth: D1A67FA93B6A6419132D0F83CC771AF774FD3C60853C50C22C8C6FC5088CC79E9E81EDE9EA39F22B2F66A0068E
311           valet:
312             basic_auth: bXNvOkphY2tkYXdzIGxvdmUgbXkgYmlnIHNwaGlueCBvZiBxdWFydHouCg==
313   mso:
314     msoKey: 07a7159d3bf51a0e53be7a8f89699be7
315     auth: BEA8637716A7EB617DF472BA6552D22F68C1CB17B0D094D77DDA562F4ADAAC4457CAB848E1A4
316     basicUser: poBpmn
317     config:
318       cadi:
319         aafId: so@so.onap.org
320         aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
321         apiEnforcement: org.onap.so.openStackAdapterPerm
322         noAuthn: /manage/health
323     db:
324       auth: Basic YnBlbDpwYXNzd29yZDEk
325
326 so-request-db-adapter:
327   certSecret: *so-certs
328   db:
329     <<: *dbSecrets
330   mso:
331     config:
332       cadi:
333         aafId: so@so.onap.org
334         aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
335         apiEnforcement: org.onap.so.requestDbAdapterPerm
336         noAuthn: /manage/health
337     adapters:
338       requestDb:
339         auth: Basic YnBlbDpwYXNzd29yZDEk
340
341 so-sdc-controller:
342   certSecret: *so-certs
343   db:
344     <<: *dbSecrets
345   aai:
346     auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
347   mso:
348     msoKey: 07a7159d3bf51a0e53be7a8f89699be7
349     config:
350       cadi:
351         aafId: so@so.onap.org
352         aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
353         apiEnforcement: org.onap.so.sdcControllerPerm
354         noAuthn: /manage/health
355     asdc:
356       config:
357         key: 566B754875657232314F5548556D3665
358     requestDb:
359       auth: Basic YnBlbDpwYXNzd29yZDEk
360     asdc-connections:
361       asdc-controller1:
362         password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
363
364 so-sdnc-adapter:
365   certSecret: *so-certs
366   db:
367     <<: *dbSecrets
368   org:
369     onap:
370       so:
371         adapters:
372           sdnc:
373             bpelauth: 4C18603C5AE7E3A42A6CED95CDF9C0BA9B2109B3725747662E5D34E5FDF63DA9ADEBB08185098F14699195FDE9475100
374             sdncauth: ED07A7EE5F099FA53369C3DF2240AD68A00154676EEDBC6F8C16BAA83B1912941B8941ABD48683D2C1072DA7040659692DE936A59BBF42A038CF71DE67B4A375190071EC76EA657801B033C135
375             network:
376                 encryptionKey: 07a7159d3bf51a0e53be7a8f89699be7
377   mso:
378     config:
379       cadi:
380         aafId: so@so.onap.org
381         aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
382         apiEnforcement: org.onap.so.sdncAdapterPerm
383         noAuthn: /manage/health
384     adapters:
385       requestDb:
386         auth: Basic YnBlbDpwYXNzd29yZDEk
387     rest:
388       aafEncrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
389
390 so-ve-vnfm-adapter:
391   certSecret: *so-certs
392
393 so-vfc-adapter:
394   certSecret: *so-certs
395   db:
396     <<: *dbSecrets
397   mso:
398     config:
399       cadi:
400         aafId: so@so.onap.org
401         aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
402         apiEnforcement: org.onap.so.vfcAdapterPerm
403         noAuthn: /manage/health
404     adapters:
405       requestDb:
406         auth: Basic YnBlbDpwYXNzd29yZDEk
407
408 so-vnfm-adapter:
409   certSecret: *so-certs
410   aaf:
411     auth:
412       username: so@so.onap.org
413       password: 8DB1C939BFC6A35C3832D0E52E452D0E05AE2537AF142CECD125FF827C05A972FDD0F4700547DA
414   aai:
415     auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
416   sdc:
417     username: mso
418     password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
419     key: 566B754875657232314F5548556D3665
420   mso:
421     key: 07a7159d3bf51a0e53be7a8f89699be7
422     config:
423       cadi:
424         aafId: so@so.onap.org
425         aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
426         apiEnforcement: org.onap.so.vnfmAdapterPerm
427         noAuthn: /manage/health
428
429 so-mariadb:
430   db:
431     rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
432     rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
433     backupCredsExternalSecret: *dbBackupCredsSecretName
434     userCredsExternalSecret: *dbUserCredsSecretName
435     adminCredsExternalSecret: *dbAdminCredsSecretName