blob: ccd82232842ed2fffe589b59f5a5022eeb8ca731 [file] [log] [blame]
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00001# Copyright © 2017 Amdocs, Bell Canada
jhhd4258672020-08-09 12:08:08 -05002# Modifications Copyright © 2018-2020 AT&T Intellectual Property
adheli.tavaresbf35e552024-07-25 10:03:13 +01003# Modifications Copyright (C) 2021-2024 Nordix Foundation.
Andreas Geissler57681132024-07-29 10:18:26 +02004# Modifications Copyright © 2024 Deutsche Telekom
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17
mayankg2703ced85142018-03-20 05:42:53 +000018#################################################################
19# Global configuration defaults.
20#################################################################
21global:
Andreas Geisslerfd5b5962024-01-23 11:26:47 +010022 mariadbGalera:
23 # flag to enable the DB creation via mariadb-operator
24 useOperator: true
25 # if useOperator set to "true", set "enableServiceAccount to "false"
26 # as the SA is created by the Operator
27 enableServiceAccount: false
saul.gillef208b02023-04-26 16:16:05 +010028 localCluster: true
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010029 # '&mariadbConfig' means we "store" the values for later use in the file
30 # with '*mariadbConfig' pointer.
31 config: &mariadbConfig
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010032 mysqlDatabase: policyadmin
Andreas Geissler53490fa2024-04-17 09:42:16 +020033 service: &mariadbService policy-mariadb
34 internalPort: 3306
35 nameOverride: *mariadbService
Andreas Geisslerfd5b5962024-01-23 11:26:47 +010036 # (optional) if localCluster=false and an external secret is used set this variable
37 #userRootSecret: <secretName>
Rashmi Pujarec452b52022-04-21 12:29:14 -040038 prometheusEnabled: false
waynedunican368aced2022-02-15 08:27:57 +000039 postgres:
40 localCluster: false
41 service:
42 name: pgset
43 name2: tcp-pgset-primary
44 name3: tcp-pgset-replica
45 container:
46 name: postgres
rameshiyer27bc8a6a42024-03-11 17:18:11 +000047 kafkaBootstrap: strimzi-kafka-bootstrap:9092
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +010048 policyKafkaUser: policy-kafka-user
efiacor6910bbe2023-03-03 14:53:16 +000049 kafkaTopics:
50 acRuntimeTopic:
51 name: policy.clamp-runtime-acm
mayankg2703ced85142018-03-20 05:42:53 +000052#################################################################
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020053# Secrets metaconfig
54#################################################################
55secrets:
56 - uid: db-root-password
57 name: &dbRootPassSecretName '{{ include "common.release" . }}-policy-db-root-password'
58 type: password
Andreas Geisslerfd5b5962024-01-23 11:26:47 +010059 externalSecret: '{{ .Values.global.mariadbGalera.localCluster |
60 ternary (( hasSuffix "policy-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) |
61 ternary
62 ""
63 (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .)
64 )
65 ( (not (empty (default "" .Values.global.mariadbGalera.userRootSecret))) |
66 ternary
67 .Values.global.mariadbGalera.userRootSecret
68 (include "common.mariadb.secret.rootPassSecretName"
69 (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)
70 )
71 ) }}'
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010072 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020073 policy: generate
74 - uid: db-secret
75 name: &dbSecretName '{{ include "common.release" . }}-policy-db-secret'
76 type: basicAuth
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010077 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) (hasSuffix "policy-db-secret" (index .Values "mariadb-galera" "db" "externalSecret"))}}'
78 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
79 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020080 passwordPolicy: generate
saul.gill7124a4b2021-09-09 12:02:49 +010081 - uid: policy-app-user-creds
82 name: &policyAppCredsSecret '{{ include "common.release" . }}-policy-app-user-creds'
83 type: basicAuth
84 externalSecret: '{{ tpl (default "" .Values.config.policyAppUserExternalSecret) . }}'
85 login: '{{ .Values.config.policyAppUserName }}'
86 password: '{{ .Values.config.policyAppUserPassword }}'
87 passwordPolicy: generate
rameshiyer27ff176652021-09-21 15:19:05 +010088 - uid: policy-pap-user-creds
89 name: &policyPapCredsSecret '{{ include "common.release" . }}-policy-pap-user-creds'
90 type: basicAuth
91 externalSecret: '{{ tpl (default "" .Values.restServer.policyPapUserExternalSecret) . }}'
92 login: '{{ .Values.restServer.policyPapUserName }}'
93 password: '{{ .Values.restServer.policyPapUserPassword }}'
94 passwordPolicy: required
95 - uid: policy-api-user-creds
96 name: &policyApiCredsSecret '{{ include "common.release" . }}-policy-api-user-creds'
97 type: basicAuth
98 externalSecret: '{{ tpl (default "" .Values.restServer.policyApiUserExternalSecret) . }}'
99 login: '{{ .Values.restServer.policyApiUserName }}'
100 password: '{{ .Values.restServer.policyApiUserPassword }}'
101 passwordPolicy: required
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +0200102
jhhd4258672020-08-09 12:08:08 -0500103db: &dbSecretsHook
104 credsExternalSecret: *dbSecretName
105
106policy-api:
107 enabled: true
108 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100109 restServer:
110 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100111 config:
112 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500113policy-pap:
114 enabled: true
115 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100116 restServer:
117 papUserExternalSecret: *policyPapCredsSecret
118 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100119 config:
120 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500121policy-xacml-pdp:
122 enabled: true
123 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100124 config:
125 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500126policy-apex-pdp:
127 enabled: true
128 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100129 config:
130 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500131policy-drools-pdp:
rameshiyer27bc8a6a42024-03-11 17:18:11 +0000132 enabled: false
jhhd4258672020-08-09 12:08:08 -0500133 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100134 config:
135 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500136policy-distribution:
137 enabled: true
138 db: *dbSecretsHook
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000139policy-clamp-ac-k8s-ppnt:
rameshiyer2701b8cc02021-09-21 15:07:50 +0100140 enabled: true
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000141policy-clamp-ac-pf-ppnt:
rameshiyer27ff176652021-09-21 15:19:05 +0100142 enabled: true
143 restServer:
144 apiUserExternalSecret: *policyApiCredsSecret
145 papUserExternalSecret: *policyPapCredsSecret
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000146policy-clamp-ac-http-ppnt:
rameshiyer273c3402d2021-09-21 15:14:39 +0100147 enabled: true
aravind.est8d728302022-12-07 12:26:28 +0000148policy-clamp-ac-a1pms-ppnt:
149 enabled: true
aravind.est0879dfc2023-02-22 09:05:50 +0000150policy-clamp-ac-kserve-ppnt:
151 enabled: true
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000152policy-clamp-runtime-acm:
saul.gill7124a4b2021-09-09 12:02:49 +0100153 enabled: true
154 db: *dbSecretsHook
155 config:
156 appUserExternalSecret: *policyAppCredsSecret
efiacor6910bbe2023-03-03 14:53:16 +0000157policy-nexus:
158 enabled: false
159 config:
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100160 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500161
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +0200162#################################################################
jhhd4258672020-08-09 12:08:08 -0500163# DB configuration defaults.
mayankg2703ced85142018-03-20 05:42:53 +0000164#################################################################
jhhd4258672020-08-09 12:08:08 -0500165
jhhd74fe9f2021-04-15 11:04:39 -0500166dbmigrator:
saul.gill1fa9c252024-05-20 15:34:32 +0100167 image: onap/policy-db-migrator:3.1.3
jhhd74fe9f2021-04-15 11:04:39 -0500168 schema: policyadmin
169 policy_home: "/opt/app/policy"
170
mayankg2703ced85142018-03-20 05:42:53 +0000171subChartsOnly:
172 enabled: true
BorislavG5f3b6192018-03-25 18:12:38 +0300173
mayankg2703ced85142018-03-20 05:42:53 +0000174# flag to enable debugging - application support required
175debugEnabled: false
176
mayankg2703ced85142018-03-20 05:42:53 +0000177# default number of instances
178replicaCount: 1
179
180nodeSelector: {}
181
182affinity: {}
183
184# probe configuration parameters
185liveness:
186 initialDelaySeconds: 10
187 periodSeconds: 10
188 # necessary to disable liveness probe when setting breakpoints
189 # in debugger so K8s doesn't restart unresponsive container
190 enabled: true
191
192readiness:
193 initialDelaySeconds: 10
194 periodSeconds: 10
195
saul.gill7124a4b2021-09-09 12:02:49 +0100196
197config:
198 policyAppUserName: runtimeUser
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100199 policyPdpPapTopic:
200 name: policy-pdp-pap
201 partitions: 10
202 retentionMs: 7200000
203 segmentBytes: 1073741824
204 consumer:
205 groupId: policy-group
206 policyHeartbeatTopic:
207 name: policy-heartbeat
208 partitions: 10
209 retentionMs: 7200000
210 segmentBytes: 1073741824
211 consumer:
212 groupId: policy-group
213 policyNotificationTopic:
214 name: policy-notification
215 partitions: 10
216 retentionMs: 7200000
217 segmentBytes: 1073741824
218 consumer:
219 groupId: policy-group
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100220 someConfig: blah
saul.gill7124a4b2021-09-09 12:02:49 +0100221
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100222mariadb-galera:
Andreas Geisslerfd5b5962024-01-23 11:26:47 +0100223 # mariadb-galera.config and global.mariadbGalera.config must be equals
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100224 db:
Andreas Geisslercfd84342023-08-16 17:18:49 +0200225 user: policy-user
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100226 # password:
227 externalSecret: *dbSecretName
228 name: &mysqlDbName policyadmin
229 rootUser:
230 externalSecret: *dbRootPassSecretName
Andreas Geissler53490fa2024-04-17 09:42:16 +0200231 nameOverride: *mariadbService
Andreas Geisslerfd5b5962024-01-23 11:26:47 +0100232 # mariadb-galera.service and global.mariadbGalera.service must be equals
Andreas Geissler53490fa2024-04-17 09:42:16 +0200233 service:
234 name: *mariadbService
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100235 replicaCount: 1
Andreas Geisslercfd84342023-08-16 17:18:49 +0200236 mariadbOperator:
237 galera:
238 enabled: false
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100239 persistence:
240 enabled: true
241 mountSubPath: policy/maria/data
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100242 serviceAccount:
Andreas Geissler53490fa2024-04-17 09:42:16 +0200243 nameOverride: *mariadbService
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100244
waynedunican368aced2022-02-15 08:27:57 +0000245postgresImage: library/postgres:latest
246# application configuration override for postgres
247postgres:
248 nameOverride: &postgresName policy-postgres
249 service:
250 name: *postgresName
251 name2: policy-pg-primary
252 name3: policy-pg-replica
253 container:
254 name:
255 primary: policy-pg-primary
256 replica: policy-pg-replica
257 persistence:
258 mountSubPath: policy/postgres/data
259 mountInitPath: policy
260 config:
Andreas Geisslercfd84342023-08-16 17:18:49 +0200261 pgUserName: policy-user
waynedunican368aced2022-02-15 08:27:57 +0000262 pgDatabase: policyadmin
saul.gillef208b02023-04-26 16:16:05 +0100263 pgUserExternalSecret: *dbSecretName
264 pgRootPasswordExternalSecret: *dbRootPassSecretName
waynedunican368aced2022-02-15 08:27:57 +0000265
266readinessCheck:
Andreas Geissleree119102024-04-11 13:53:39 +0200267 wait_for_postgres:
268 services:
269 - '{{ .Values.global.postgres.service.name2 }}'
270 wait_for_mariadb:
271 services:
272 - '{{ include "common.mariadbService" . }}'
waynedunican368aced2022-02-15 08:27:57 +0000273
rameshiyer27ff176652021-09-21 15:19:05 +0100274restServer:
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000275 policyPapUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100276 policyPapUserPassword: zb!XztG34
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000277 policyApiUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100278 policyApiUserPassword: zb!XztG34
279
jhhbf8d8a92020-09-10 14:01:49 -0500280# Resource Limit flavor -By Default using small
281# Segregation for Different environment (small, large, or unlimited)
282flavor: small
283resources:
284 small:
285 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100286 cpu: "1"
287 memory: "4Gi"
jhhbf8d8a92020-09-10 14:01:49 -0500288 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100289 cpu: "100m"
290 memory: "1Gi"
jhhbf8d8a92020-09-10 14:01:49 -0500291 large:
292 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100293 cpu: "2"
294 memory: "8Gi"
jhhbf8d8a92020-09-10 14:01:49 -0500295 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100296 cpu: "200m"
297 memory: "2Gi"
jhhbf8d8a92020-09-10 14:01:49 -0500298 unlimited: {}
299
Andreas Geissler57681132024-07-29 10:18:26 +0200300securityContext:
301 user_id: 100
302 group_id: 65533
303
farida azmyc1178372021-04-11 12:55:33 +0200304#Pods Service Account
305serviceAccount:
306 nameOverride: policy
307 roles:
308 - read