blob: 77e1eef2efaadf41dd880f5e4b94b726de985a33 [file] [log] [blame]
# SPDX-FileCopyrightText: 2020-present Open Networking Foundation <info@opennetworking.org>
#
# SPDX-License-Identifier: LicenseRef-ONF-Member-Only-1.0
# Default values for all Aether Helm charts.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
global:
fullnameOverride: "onos"
nameOverride: ""
import:
grafana:
enabled: true
prometheus:
chronos:
enabled: true
chronos-exporter:
enabled: true
aether-enterprise-portal:
enabled: true
aether-enterprise-portal:
grafana:
proxyEnabled: true
service: chronos-grafana
prometheus:
proxyEnabled: true
service: chronos-prometheus-chronos-server
grafana:
image:
tag: 8.1.8
fullnameOverride: chronos-grafana
adminPassword: admin@123
sidecar:
dashboards:
enabled: true
label: chronos_dashboard
labelValue: chronos-dashboard
datasources:
enabled: true
label: chronos_datasource
labelValue: chronos-datasource
source:
- name: chronos
protocol: http
service: chronos-prometheus-chronos-server
port: 80
grafana.ini:
log:
level: debug
server:
domain: aether-roc-gui:8183
root_url: "%(protocol)s://%(domain)s/grafana/"
serve_from_sub_path: true
security:
allow_embedding: true
auth:
disable_login_form: false
oauth_auto_login: false
auth.anonymous:
enabled: false
hide_version: false
# Disabled other auth types for the moment - see aether-roc-gui/docs/grafana.md
auth.proxy:
enabled: false
header_name: X-WEBAUTH-USER
header_property: username
auto_sign_up: true
enable_login_token: true
auth.jwt:
enabled: false
header_name: X-JWT-Assertion
username_claim: name
email_claim: email
jwk_set_url: "https://keycloak.opennetworking.org/auth/realms/master/protocol/openid-connect/certs"
cache_ttl: 60m
auth.generic_oauth:
enabled: false
client_id: aether-roc-gui
# client_secret: YWV0aGVyLXJvYy1ndWkK
scopes: "openid profile email groups"
empty_scopes: false
auth_url: "http://k3u-keycloak:5557/auth/realms/master/protocol/openid-connect/auth"
token_url: "http://k3u-keycloak:5557/auth/realms/master/protocol/openid-connect/token"
api_url: "http://k3u-keycloak:5557/auth/realms/master/protocol/openid-connect/userinfo"
allowed_domains: opennetworking.org
allow_sign_up: true
name: KeyCloak
prometheus-chronos:
alertmanager:
persistentVolume:
enabled: false
server:
persistentVolume:
enabled: false
fullnameOverride: chronos-prometheus-chronos-server
pushgateway:
enabled: false
nodeExporter:
enabled: false
kubeStateMetrics:
enabled: false
alertmanager:
enabled: false
serverFiles:
prometheus.yml:
scrape_configs:
- job_name: chronos-exporter
scrape_interval: 2s
static_configs:
- targets:
- chronos-exporter:2112