| # Copyright (c) 2022 VEXXHOST, Inc. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| # not use this file except in compliance with the License. You may obtain |
| # a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| # License for the specific language governing permissions and limitations |
| # under the License. |
| |
| _openstack_helm_octavia_values: |
| endpoints: "{{ openstack_helm_endpoints }}" |
| images: |
| tags: |
| bootstrap: "{{ lookup('vexxhost.atmosphere.image_ref', 'bootstrap', output='ref') }}" |
| db_drop: "{{ lookup('vexxhost.atmosphere.image_ref', 'db_drop', output='ref') }}" |
| db_init: "{{ lookup('vexxhost.atmosphere.image_ref', 'db_init', output='ref') }}" |
| dep_check: "{{ lookup('vexxhost.atmosphere.image_ref', 'dep_check', output='ref') }}" |
| ks_endpoints: "{{ lookup('vexxhost.atmosphere.image_ref', 'ks_endpoints', output='ref') }}" |
| ks_service: "{{ lookup('vexxhost.atmosphere.image_ref', 'ks_service', output='ref') }}" |
| ks_user: "{{ lookup('vexxhost.atmosphere.image_ref', 'ks_user', output='ref') }}" |
| rabbit_init: "{{ lookup('vexxhost.atmosphere.image_ref', 'rabbit_init', output='ref') }}" |
| octavia_api: "{{ lookup('vexxhost.atmosphere.image_ref', 'octavia_api', output='ref') }}" |
| octavia_db_sync: "{{ lookup('vexxhost.atmosphere.image_ref', 'octavia_db_sync', output='ref') }}" |
| octavia_health_manager: "{{ lookup('vexxhost.atmosphere.image_ref', 'octavia_health_manager', output='ref') }}" |
| octavia_health_manager_init: "{{ lookup('vexxhost.atmosphere.image_ref', 'octavia_health_manager_init', output='ref') }}" |
| octavia_housekeeping: "{{ lookup('vexxhost.atmosphere.image_ref', 'octavia_housekeeping', output='ref') }}" |
| octavia_worker: "{{ lookup('vexxhost.atmosphere.image_ref', 'octavia_worker', output='ref') }}" |
| openvswitch_vswitchd: "{{ lookup('vexxhost.atmosphere.image_ref', 'openvswitch_vswitchd', output='ref') }}" |
| pod: |
| mounts: |
| octavia_api: |
| octavia_api: |
| volumeMounts: |
| - name: octavia-server-ca |
| mountPath: /etc/octavia/certs/server |
| - name: octavia-client-certs |
| mountPath: /etc/octavia/certs/client |
| volumes: |
| - name: octavia-server-ca |
| secret: |
| secretName: octavia-server-ca |
| - name: octavia-client-certs |
| secret: |
| secretName: octavia-client-certs |
| octavia_worker: |
| octavia_worker: |
| volumeMounts: |
| - name: octavia-server-ca |
| mountPath: /etc/octavia/certs/server |
| - name: octavia-client-certs |
| mountPath: /etc/octavia/certs/client |
| volumes: |
| - name: octavia-server-ca |
| secret: |
| secretName: octavia-server-ca |
| - name: octavia-client-certs |
| secret: |
| secretName: octavia-client-certs |
| octavia_housekeeping: |
| octavia_housekeeping: |
| volumeMounts: |
| - name: octavia-server-ca |
| mountPath: /etc/octavia/certs/server |
| - name: octavia-client-certs |
| mountPath: /etc/octavia/certs/client |
| volumes: |
| - name: octavia-server-ca |
| secret: |
| secretName: octavia-server-ca |
| - name: octavia-client-certs |
| secret: |
| secretName: octavia-client-certs |
| octavia_health_manager: |
| octavia_health_manager: |
| volumeMounts: |
| - name: octavia-server-ca |
| mountPath: /etc/octavia/certs/server |
| - name: octavia-client-certs |
| mountPath: /etc/octavia/certs/client |
| volumes: |
| - name: octavia-server-ca |
| secret: |
| secretName: octavia-server-ca |
| - name: octavia-client-certs |
| secret: |
| secretName: octavia-client-certs |
| replicas: |
| api: 3 |
| worker: 3 |
| housekeeping: 3 |
| conf: |
| octavia: |
| DEFAULT: |
| log_config_append: null |
| certificates: |
| ca_certificate: /etc/octavia/certs/server/ca.crt |
| ca_private_key: /etc/octavia/certs/server/tls.key |
| ca_private_key_passphrase: null |
| endpoint_type: internalURL |
| cinder: |
| endpoint_type: internalURL |
| controller_worker: |
| amp_boot_network_list: "{{ _openstack_helm_octavia_management_network.id }}" |
| amp_flavor_id: "{{ _openstack_helm_octavia_amphora_flavor.id }}" |
| amp_image_owner_id: "{{ _openstack_helm_octavia_amphora_image.image.owner }}" |
| amp_secgroup_list: "{{ _openstack_helm_octavia_amphora_sg.id }}" |
| amp_ssh_key_name: null |
| client_ca: /etc/octavia/certs/client/ca.crt |
| workers: 4 |
| glance: |
| endpoint_type: internalURL |
| haproxy_amphora: |
| client_cert: /etc/octavia/certs/client/tls-combined.pem |
| server_ca: /etc/octavia/certs/server/ca.crt |
| health_manager: |
| controller_ip_port_list: "{{ _openstack_helm_octavia_controller_ip_port_list | join(',') }}" |
| heartbeat_key: "{{ openstack_helm_octavia_heartbeat_key }}" |
| oslo_messaging_notifications: |
| driver: noop |
| neutron: |
| endpoint_type: internalURL |
| nova: |
| endpoint_type: internalURL |
| service_auth: |
| endpoint_type: internalURL |
| manifests: |
| ingress_api: false |
| service_ingress_api: false |