Add virtual-mcp-pike-dvr-ssl

The model uses SSL on internal/public endpoints.

Change-Id: I2a38ffdc93c9658bd1fb99c5fca29a0436362e04
Related-Prod: PROD-17943
diff --git a/classes/cluster/virtual-mcp-pike-dvr-ssl/init.yml b/classes/cluster/virtual-mcp-pike-dvr-ssl/init.yml
new file mode 100644
index 0000000..6075456
--- /dev/null
+++ b/classes/cluster/virtual-mcp-pike-dvr-ssl/init.yml
@@ -0,0 +1,37 @@
+classes:
+- system.linux.network.dynamic_hosts
+- service.grafana.collector
+- system.heka.log_collector.single
+- system.heka.log_collector.output.telegraf
+- system.linux.system.repo.mcp.extra
+- system.linux.system.single
+- system.rsyslog.client.single
+- system.prometheus.collector
+- system.telegraf.agent
+- system.openssh.server.team.lab
+- system.openssh.server.team.tcpcloud
+- system.openssh.server.team.mcp_qa
+- cluster.virtual-mcp-pike-dvr-ssl.infra
+- cluster.virtual-mcp-pike-dvr-ssl.openstack
+- cluster.virtual-mcp-pike-dvr-ssl.stacklight
+- cluster.overrides
+parameters:
+  _param:
+    cluster_domain: virtual-mcp-pike-dvr-ssl.local
+    cluster_name: virtual-mcp-pike-dvr-ssl
+    salt_minion_ca_host: cfg01.${linux:system:domain}
+    # infra service addresses
+    infra_config_hostname: cfg01
+    infra_config_address: 172.16.10.100
+    # stacklight service addresses
+    stacklight_monitor_address: 172.16.10.253
+    stacklight_monitor_node01_address: 172.16.10.107
+    stacklight_monitor_node02_address: 172.16.10.108
+    stacklight_monitor_node03_address: 172.16.10.109
+    stacklight_telemetry_address: ${_param:stacklight_monitor_address}
+    stacklight_log_address: ${_param:stacklight_monitor_address}
+    stacklight_telemetry_node01_address: ${_param:stacklight_monitor_node01_address}
+  salt:
+    minion:
+      trusted_ca_minions:
+        - cfg01.${linux:system:domain}