| # Copyright © 2017 Amdocs, Bell Canada |
| # Modifications Copyright © 2018, 2020 AT&T |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| ################################################################# |
| # Global configuration defaults. |
| ################################################################# |
| global: |
| env: |
| tomcatDir: "/usr/local/tomcat" |
| nodePortPrefix: 302 |
| persistence: {} |
| #AAF service |
| aafEnabled: true |
| |
| ################################################################ |
| # Secrets metaconfig |
| ################################################################# |
| |
| secrets: |
| - uid: portal-cass |
| type: basicAuth |
| externalSecret: '{{ tpl (default "" .Values.cassandra.config.cassandraExternalSecret) . }}' |
| login: '{{ .Values.cassandra.config.cassandraUsername }}' |
| password: '{{ .Values.cassandra.config.cassandraPassword }}' |
| passwordPolicy: required |
| - uid: portal-backend-db |
| type: basicAuth |
| externalSecret: '{{ tpl (default "" .Values.mariadb.config.backendDbExternalSecret) . }}' |
| login: '{{ .Values.mariadb.config.backendUserName }}' |
| password: '{{ .Values.mariadb.config.backendPassword }}' |
| passwordPolicy: required |
| - uid: cipher-enc-key |
| type: password |
| externalSecret: '{{ .Values.config.cipherEncKeyExternalSecret}}' |
| password: '{{ .Values.config.cipherEncKey }}' |
| passwordPolicy: required |
| |
| ################################################################# |
| # Application configuration defaults. |
| ################################################################# |
| |
| # application image |
| image: onap/portal-sdk:3.4.2 |
| pullPolicy: Always |
| |
| # application configuration |
| config: |
| # cipherEncKeyExternalSecret: some secret |
| cipherEncKey: AGLDdG4D04BKm2IxIWEr8o== |
| |
| |
| #AAF local config |
| aafURL: https://aaf-service:8100/authz/ |
| certInitializer: |
| nameOverride: portal-sdk-cert-initializer |
| aafDeployFqi: deployer@people.osaaf.org |
| aafDeployPass: demo123456! |
| fqdn: portal |
| fqi: portal@portal.onap.org |
| public_fqdn: portal.onap.org |
| cadi_latitude: "38.0" |
| cadi_longitude: "-72.0" |
| credsPath: /opt/app/osaaf/local |
| app_ns: org.osaaf.aaf |
| permission_user: 1000 |
| permission_group: 999 |
| keystoreFile: "org.onap.portal.p12" |
| truststoreFile: "org.onap.portal.trust.jks" |
| aaf_add_config: | |
| echo "cadi_truststore_password=$cadi_truststore_password" > {{ .Values.credsPath }}/mycreds.prop |
| echo "cadi_keystore_password_p12=$cadi_keystore_password_p12" >> {{ .Values.credsPath }}/mycreds.prop |
| |
| # flag to enable debugging - application support required |
| debugEnabled: false |
| |
| # default number of instances |
| replicaCount: 1 |
| |
| nodeSelector: {} |
| |
| affinity: {} |
| |
| # probe configuration parameters |
| liveness: |
| initialDelaySeconds: 10 |
| periodSeconds: 10 |
| # necessary to disable liveness probe when setting breakpoints |
| # in debugger so K8s doesn't restart unresponsive container |
| enabled: true |
| |
| readiness: |
| initialDelaySeconds: 10 |
| periodSeconds: 10 |
| |
| service: |
| type: NodePort |
| name: portal-sdk |
| portName: portal-sdk |
| internalPort: 8443 |
| externalPort: 8443 |
| nodePort: 12 |
| |
| mariadb: |
| service: |
| name: portal-db |
| config: |
| # backendDbExternalSecret: some secret |
| backendUserName: portal |
| backendPassword: portal |
| widget: |
| service: |
| name: portal-widget |
| cassandra: |
| service: |
| name: portal-cassandra |
| config: |
| # cassandraExternalSecret: some secret |
| cassandraUsername: root |
| cassandraPassword: Aa123456 |
| messageRouter: |
| service: |
| name: message-router |
| |
| ingress: |
| enabled: false |
| service: |
| - baseaddr: portal-sdk |
| name: "portal-sdk" |
| port: 8443 |
| config: |
| ssl: "redirect" |
| |
| # Resource Limit flavor -By Default using small |
| flavor: small |
| # Segregation for Different environment (Small and Large) |
| resources: |
| small: |
| limits: |
| cpu: 600m |
| memory: 1.6Gi |
| requests: |
| cpu: 10m |
| memory: 1.3Gi |
| large: |
| limits: |
| cpu: 8 |
| memory: 20Gi |
| requests: |
| cpu: 4 |
| memory: 10Gi |
| unlimited: {} |
| |
| # Log configuration |
| log: |
| path: /var/log/onap |
| logConfigMapNamePrefix: '{{ include "common.fullname" . }}' |