blob: e8f8ad609913d26758f3257ac2adf3ff6fbb79f9 [file] [log] [blame]
mmis9cb50292018-09-19 00:31:35 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
mmis9cb50292018-09-19 00:31:35 +01004# ================================================================================
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16#
17# SPDX-License-Identifier: Apache-2.0
18# ============LICENSE_END=========================================================
19
20#################################################################
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020021# Secrets metaconfig
22#################################################################
23secrets:
24 - uid: restserver-creds
25 type: basicAuth
26 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
27 login: '{{ .Values.restServer.user }}'
28 password: '{{ .Values.restServer.password }}'
29 passwordPolicy: required
30 - uid: apiparameters-creds
31 type: basicAuth
32 externalSecret: '{{ tpl (default "" .Values.apiParameters.credsExternalSecret) . }}'
33 login: '{{ .Values.apiParameters.user }}'
34 password: '{{ .Values.apiParameters.password }}'
35 passwordPolicy: required
36 - uid: papparameters-creds
37 type: basicAuth
38 externalSecret: '{{ tpl (default "" .Values.papParameters.credsExternalSecret) . }}'
39 login: '{{ .Values.papParameters.user }}'
40 password: '{{ .Values.papParameters.password }}'
41 passwordPolicy: required
42 - uid: sdcbe-creds
43 type: basicAuth
44 externalSecret: '{{ tpl (default "" .Values.sdcBe.credsExternalSecret) . }}'
45 login: '{{ .Values.sdcBe.user }}'
46 password: '{{ .Values.sdcBe.password }}'
47 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050048 - uid: keystore-password
49 type: password
50 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
51 password: '{{ .Values.certStores.keyStorePassword }}'
52 passwordPolicy: required
53 - uid: truststore-password
54 type: password
55 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
56 password: '{{ .Values.certStores.trustStorePassword }}'
57 passwordPolicy: required
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020058
59#################################################################
mmis9cb50292018-09-19 00:31:35 +010060# Global configuration defaults.
61#################################################################
62global:
63 persistence: {}
jhhd4258672020-08-09 12:08:08 -050064 aafEnabled: true
mmis9cb50292018-09-19 00:31:35 +010065
66#################################################################
67# Application configuration defaults.
68#################################################################
69# application image
liamfallon312ab372021-12-13 14:33:33 +000070image: onap/policy-distribution:2.7.0
mmis9cb50292018-09-19 00:31:35 +010071pullPolicy: Always
72
73# flag to enable debugging - application support required
74debugEnabled: false
75
76# application configuration
77
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020078restServer:
79 user: healthcheck
80 password: zb!XztG34
81apiParameters:
adheli.tavaresf3656cd2021-11-10 14:54:32 +000082 user: policyadmin
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020083 password: zb!XztG34
84papParameters:
adheli.tavaresf3656cd2021-11-10 14:54:32 +000085 user: policyadmin
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020086 password: zb!XztG34
87sdcBe:
88 user: policy
89 password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
jhhd4258672020-08-09 12:08:08 -050090certStores:
91 keyStorePassword: Pol1cy_0nap
92 trustStorePassword: Pol1cy_0nap
93
94certInitializer:
95 nameOverride: policy-distribution-cert-initializer
96 aafDeployFqi: deployer@people.osaaf.org
97 aafDeployPass: demo123456!
98 fqdn: policy
99 fqi: policy@policy.onap.org
100 public_fqdn: policy.onap.org
101 cadi_latitude: "0.0"
102 cadi_longitude: "0.0"
103 credsPath: /opt/app/osaaf/local
104 app_ns: org.osaaf.aaf
105 uid: 100
106 gid: 101
107 aaf_add_config: >
jhhd4258672020-08-09 12:08:08 -0500108 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
109 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
110 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
Dominik Mizyn4aa534f2020-04-14 18:03:53 +0200111
mmis9cb50292018-09-19 00:31:35 +0100112# default number of instances
113replicaCount: 1
114
115nodeSelector: {}
116
117affinity: {}
118
119# probe configuration parameters
120liveness:
121 initialDelaySeconds: 20
122 periodSeconds: 10
123 # necessary to disable liveness probe when setting breakpoints
124 # in debugger so K8s doesn't restart unresponsive container
125 enabled: true
126
127readiness:
128 initialDelaySeconds: 20
129 periodSeconds: 10
130
131service:
132 type: ClusterIP
133 name: policy-distribution
134 portName: policy-distribution
jhh59ce22d2019-05-14 17:59:36 -0500135 externalPort: 6969
mmis9cb50292018-09-19 00:31:35 +0100136 internalPort: 6969
137
138ingress:
139 enabled: false
140
jhhd4258672020-08-09 12:08:08 -0500141flavor: small
142resources:
143 small:
144 limits:
145 cpu: 1
146 memory: 4Gi
147 requests:
148 cpu: 100m
149 memory: 1Gi
150 large:
151 limits:
152 cpu: 2
153 memory: 8Gi
154 requests:
155 cpu: 200m
156 memory: 2Gi
157 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200158
159#Pods Service Account
160serviceAccount:
161 nameOverride: policy-distribution
162 roles:
163 - read
Rashmi Pujara8b09262022-03-15 21:58:57 -0400164
165prometheus:
166 enabled: true
167
168metrics:
169 serviceMonitor:
170 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
171 # The default operator for prometheus enforces the below label.
172 labels:
173 release: prometheus
174 enabled: true
175 port: policy-distribution
176 interval: 60s
177 isHttps: true
178 basicAuth:
179 enabled: true
180 externalSecretNameSuffix: policy-distribution-restserver-creds
181 externalSecretUserKey: login
182 externalSecretPasswordKey: password
183 selector:
184 app: '{{ include "common.name" . }}'
185 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
186 release: '{{ include "common.release" . }}'
187 heritage: '{{ .Release.Service }}'