mirror of
https://github.com/Telecominfraproject/wlan-cloud-ucentral-deploy.git
synced 2026-01-27 10:23:04 +00:00
286 lines
8.3 KiB
YAML
286 lines
8.3 KiB
YAML
environments:
|
|
default:
|
|
values:
|
|
- global:
|
|
name: devcgw
|
|
namespace: openwifi-devcgw
|
|
domain: cicd.lab.wlan.tip.build
|
|
certificateARN: arn:aws:acm:us-east-2:289708231103:certificate/299d7444-acc4-46c2-ae83-40d2cd5f49be
|
|
- kafka:
|
|
enabled: true
|
|
- redis:
|
|
enabled: true
|
|
- postgres:
|
|
enabled: true
|
|
pgUser:
|
|
password: postgres
|
|
cgwUser:
|
|
name: cgw
|
|
password: 123
|
|
- cgw:
|
|
enabled: true
|
|
tag: next
|
|
- cgw2:
|
|
enabled: true
|
|
cgw01:
|
|
values:
|
|
- global:
|
|
name: cgw01
|
|
namespace: openlan-cgw01
|
|
domain: cicd.lab.wlan.tip.build
|
|
certificateARN: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
|
- kafka:
|
|
enabled: true
|
|
- redis:
|
|
enabled: true
|
|
- postgres:
|
|
enabled: true
|
|
pgUser:
|
|
password: openlancgw
|
|
cgwUser:
|
|
name: cgw
|
|
password: openlancgw
|
|
- cgw:
|
|
enabled: true
|
|
tag: next
|
|
- cgw2:
|
|
enabled: true
|
|
|
|
---
|
|
|
|
helmDefaults:
|
|
force: false
|
|
timeout: 300
|
|
createNamespace: true
|
|
|
|
releases:
|
|
- name: kafka
|
|
version: 28.3.0
|
|
namespace: {{ .Environment.Values.global.namespace }}
|
|
condition: kafka.enabled
|
|
chart: oci://registry-1.docker.io/bitnamicharts/kafka
|
|
labels:
|
|
group: base
|
|
app: kafka
|
|
values:
|
|
- image:
|
|
repository: bitnamilegacy/kafka
|
|
- defaultInitContainers:
|
|
volumePermissions:
|
|
image:
|
|
repository: bitnamilegacy/os-shell
|
|
- autoDiscovery:
|
|
volumePermissions:
|
|
image:
|
|
repository: bitnamilegacy/kubectl
|
|
- metrics:
|
|
jmx:
|
|
image:
|
|
repository: bitnamilegacy/jmx-exporter
|
|
- fullnameOverride: kafka
|
|
- volumePermissions:
|
|
enabled: true
|
|
- commonAnnotations:
|
|
cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
|
|
- readinessProbe:
|
|
initialDelaySeconds: 45
|
|
- livenessProbe:
|
|
initialDelaySeconds: 60
|
|
- heapOpts: -Xmx1024m -Xms1024m
|
|
- kraft:
|
|
enabled: true
|
|
- zookeeper:
|
|
enabled: false
|
|
- provisioning:
|
|
enabled: true
|
|
topics:
|
|
- name: CnC
|
|
partitions: 1
|
|
replicationFactor: 1
|
|
- name: CnC_Res
|
|
partitions: 1
|
|
replicationFactor: 1
|
|
- controller:
|
|
persistence:
|
|
size: 80Gi
|
|
replicaCount: 1
|
|
extraConfig: |-
|
|
maxMessageBytes = 1048588
|
|
offsets.topic.replication.factor = 1
|
|
transaction.state.log.replication.factor = 1
|
|
extraEnvVars:
|
|
- name: ALLOW_PLAINTEXT_LISTENER
|
|
value: "yes"
|
|
resources:
|
|
requests:
|
|
cpu: 500m
|
|
memory: 512Mi
|
|
limits:
|
|
cpu: 750m
|
|
memory: 2Gi
|
|
- listeners:
|
|
client:
|
|
protocol: PLAINTEXT
|
|
containerPort: 9092
|
|
controller:
|
|
protocol: "PLAINTEXT"
|
|
- broker:
|
|
replicaCount: 0
|
|
persistence:
|
|
size: 80Gi
|
|
resources:
|
|
requests:
|
|
cpu: 500m
|
|
memory: 512Mi
|
|
limits:
|
|
cpu: 750m
|
|
memory: 2Gi
|
|
|
|
- name: postgres
|
|
namespace: {{ .Environment.Values.global.namespace }}
|
|
chart: oci://registry-1.docker.io/bitnamicharts/postgresql
|
|
version: 13.4.3
|
|
condition: postgres.enabled
|
|
labels:
|
|
group: base
|
|
app: postgres
|
|
values:
|
|
- image:
|
|
repository: bitnamilegacy/postgresql
|
|
- volumePermissions:
|
|
image:
|
|
repository: bitnamilegacy/os-shell
|
|
- metrics:
|
|
image:
|
|
repository: bitnamilegacy/postgres-exporter
|
|
- fullnameOverride: pgsql
|
|
# workaround for: postgresql.conf file not detected. Generating it...
|
|
# cp: cannot create regular file '/bitnami/postgresql/conf/postgresql.conf': Permission denied
|
|
- volumePermissions:
|
|
enabled: true
|
|
- global:
|
|
postgresql:
|
|
auth:
|
|
postgresPassword: {{ .Environment.Values.postgres.pgUser.password }}
|
|
- auth:
|
|
postgresPassword: {{ .Environment.Values.postgres.pgUser.password }}
|
|
- primary:
|
|
persistence:
|
|
size: 40Gi
|
|
extendedConfiguration: |-
|
|
max_connections = 550
|
|
shared_buffers = 128MB
|
|
log_error_verbosity = verbose
|
|
tcp_keepalives_idle = 300
|
|
tcp_keepalives_interval = 30
|
|
tcp_user_timeout = 300
|
|
initdb:
|
|
scripts:
|
|
initusers.sql: |-
|
|
CREATE USER {{ .Environment.Values.postgres.cgwUser.name }};
|
|
ALTER USER cgw WITH ENCRYPTED PASSWORD '{{ .Environment.Values.postgres.cgwUser.password }}';
|
|
CREATE DATABASE cgw OWNER {{ .Environment.Values.postgres.cgwUser.name }};
|
|
\c cgw
|
|
CREATE TABLE infrastructure_groups (id INT PRIMARY KEY, reserved_size INT, actual_size INT);
|
|
ALTER TABLE infrastructure_groups OWNER TO {{ .Environment.Values.postgres.cgwUser.name }};
|
|
CREATE TABLE infras (mac MACADDR PRIMARY KEY, infra_group_id INT, FOREIGN KEY(infra_group_id) REFERENCES infrastructure_groups(id) ON DELETE CASCADE);
|
|
ALTER TABLE infras OWNER TO {{ .Environment.Values.postgres.cgwUser.name }};
|
|
|
|
- name: redis
|
|
namespace: {{ .Environment.Values.global.namespace }}
|
|
chart: oci://registry-1.docker.io/bitnamicharts/redis
|
|
version: 19.5.2
|
|
condition: redis.enabled
|
|
labels:
|
|
group: base
|
|
app: redis
|
|
values:
|
|
- image:
|
|
repository: bitnamilegacy/redis
|
|
- sentinel:
|
|
image:
|
|
repository: bitnamilegacy/redis-sentinel
|
|
- metrics:
|
|
image:
|
|
repository: bitnamilegacy/redis-exporter
|
|
- volumePermissions:
|
|
image:
|
|
repository: bitnamilegacy/os-shell
|
|
- kubectl:
|
|
image:
|
|
repository: bitnamilegacy/kubectl
|
|
- sysctl:
|
|
image:
|
|
repository: bitnamilegacy/os-shell
|
|
- architecture: standalone
|
|
- auth:
|
|
enabled: false
|
|
- master:
|
|
persistence:
|
|
size: 20Gi
|
|
extraEnvVars:
|
|
- name: ALLOW_EMPTY_PASSWORD
|
|
value: "yes"
|
|
|
|
- name: cgw
|
|
namespace: {{ .Environment.Values.global.namespace }}
|
|
chart: ../../openlan-cgw/helm
|
|
#chart: "git+https://github.com/Telecominfraproject/openlan-cgw@helm?ref=main"
|
|
version: 0.1.0
|
|
condition: cgw.enabled
|
|
labels:
|
|
group: apps
|
|
app: cgw
|
|
values:
|
|
- values/certs.tip.yaml
|
|
# this one is generated from GH secrets:
|
|
- values/certs.device.yaml
|
|
- values/cgw.yaml
|
|
- values/cgw-{{ .Environment.Values.global.name }}-1.yaml
|
|
- images:
|
|
cgw:
|
|
tag: {{ .Environment.Values.cgw.tag }}
|
|
- public_env_variables:
|
|
CGW_ID: 0
|
|
CGW_DB_USERNAME: "{{ .Environment.Values.postgres.cgwUser.name }}"
|
|
CGW_GRPC_PUBLIC_HOST: cgw-cgw
|
|
CGW_GRPC_PUBLIC_PORT: 50051
|
|
- secret_env_variables:
|
|
CGW_DB_PASSWORD: "{{ .Environment.Values.postgres.cgwUser.password }}"
|
|
- services:
|
|
cgw:
|
|
annotations:
|
|
external-dns.alpha.kubernetes.io/hostname: cgw-{{ .Environment.Values.global.name }}.{{ .Environment.Values.global.domain }}
|
|
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: {{ .Environment.Values.global.certificateARN }}
|
|
|
|
- name: cgw2
|
|
namespace: {{ .Environment.Values.global.namespace }}
|
|
chart: ../../openlan-cgw/helm
|
|
#chart: "git+https://github.com/Telecominfraproject/openlan-cgw@helm?ref=main"
|
|
version: 0.1.0
|
|
condition: cgw2.enabled
|
|
labels:
|
|
group: apps
|
|
app: cgw2
|
|
values:
|
|
- values/certs.tip.yaml
|
|
# this one is generated from GH secrets:
|
|
- values/certs.device.yaml
|
|
- values/cgw.yaml
|
|
- values/cgw-{{ .Environment.Values.global.name }}-2.yaml
|
|
- images:
|
|
cgw:
|
|
tag: {{ .Environment.Values.cgw.tag }}
|
|
- public_env_variables:
|
|
CGW_ID: 1
|
|
CGW_DB_USERNAME: "{{ .Environment.Values.postgres.cgwUser.name }}"
|
|
CGW_GRPC_PUBLIC_HOST: cgw2-cgw2
|
|
CGW_GRPC_PUBLIC_PORT: 50051
|
|
- secret_env_variables:
|
|
CGW_DB_PASSWORD: "{{ .Environment.Values.postgres.cgwUser.password }}"
|
|
- services:
|
|
cgw:
|
|
annotations:
|
|
external-dns.alpha.kubernetes.io/hostname: cgw2-{{ .Environment.Values.global.name }}.{{ .Environment.Values.global.domain }}
|
|
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: {{ .Environment.Values.global.certificateARN }}
|