blob: 2ce75030150a984bed1689acca6ea4658da12a42 [file] [log] [blame]
jhhd74fe9f2021-04-15 11:04:39 -05001# Copyright © 2017 Amdocs
2# Copyright © 2017, 2021 Bell Canada
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright © 2018-2021 AT&T Intellectual Property
mayankg2703ced85142018-03-20 05:42:53 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17#################################################################
18# Global configuration defaults.
19#################################################################
20global:
21 nodePortPrefix: 302
jhh01096592019-09-04 07:47:25 -050022
mayankg2703ced85142018-03-20 05:42:53 +000023#################################################################
Krzysztof Opasiak68b1c922020-03-26 23:59:36 +010024# Secrets metaconfig
25#################################################################
26secrets:
27 - uid: db-secret
28 type: basicAuth
29 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
30 login: '{{ .Values.db.user }}'
31 password: '{{ .Values.db.password }}'
32 passwordPolicy: required
33
34#################################################################
mayankg2703ced85142018-03-20 05:42:53 +000035# Application configuration defaults.
36#################################################################
37# application image
a.sreekumar2f377362022-02-09 12:40:57 +000038image: onap/policy-pdpd-cl:1.10.1
mayankg2703ced85142018-03-20 05:42:53 +000039pullPolicy: Always
40
41# flag to enable debugging - application support required
42debugEnabled: false
43
mayankg2703ced85142018-03-20 05:42:53 +000044# default number of instances
Jorge Hernandezd9f75452018-06-04 11:18:52 -050045replicaCount: 1
mayankg2703ced85142018-03-20 05:42:53 +000046
47nodeSelector: {}
48
49affinity: {}
50
51# probe configuration parameters
52liveness:
Jorge Hernandez432aa312018-06-04 18:20:43 -050053 initialDelaySeconds: 180
mayankg2703ced85142018-03-20 05:42:53 +000054 periodSeconds: 10
55 # necessary to disable liveness probe when setting breakpoints
56 # in debugger so K8s doesn't restart unresponsive container
Jorge Hernandez328eadb2018-05-15 07:52:21 -050057 enabled: true
mayankg2703ced85142018-03-20 05:42:53 +000058
59readiness:
Jorge Hernandezd9f75452018-06-04 11:18:52 -050060 initialDelaySeconds: 60
mayankg2703ced85142018-03-20 05:42:53 +000061 periodSeconds: 10
62
63service:
jhh59ce22d2019-05-14 17:59:36 -050064 type: ClusterIP
jhhd4258672020-08-09 12:08:08 -050065 name: policy-drools-pdp
66 portName: policy-drools-pdp
jhh59ce22d2019-05-14 17:59:36 -050067 internalPort: 6969
mayankg2703ced85142018-03-20 05:42:53 +000068 externalPort: 6969
69 nodePort: 17
jhh59ce22d2019-05-14 17:59:36 -050070 internalPort2: 9696
mayankg2703ced85142018-03-20 05:42:53 +000071 externalPort2: 9696
72 nodePort2: 21
73
74ingress:
75 enabled: false
76
jhh01096592019-09-04 07:47:25 -050077# Default installation values to be overridden
78
jhhd4258672020-08-09 12:08:08 -050079certInitializer:
80 nameOverride: policy-drools-pdp-cert-initializer
81 aafDeployFqi: deployer@people.osaaf.org
82 aafDeployPass: demo123456!
83 fqdn: policy
84 fqi: policy@policy.onap.org
85 public_fqdn: policy.onap.org
86 cadi_latitude: "0.0"
87 cadi_longitude: "0.0"
88 credsPath: /opt/app/osaaf/local
89 app_ns: org.osaaf.aaf
jhh32367fc2021-03-10 13:10:47 -060090 uid: 100
91 gid: 101
jhhd4258672020-08-09 12:08:08 -050092 aaf_add_config: >
jhhd4258672020-08-09 12:08:08 -050093 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
94 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
jhh32367fc2021-03-10 13:10:47 -060095 echo "export CADI_KEYFILE='{{ .Values.credsPath }}/org.onap.policy.keyfile'" >> {{ .Values.credsPath }}/.ci;
jhhd4258672020-08-09 12:08:08 -050096 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
97
jhh01096592019-09-04 07:47:25 -050098server:
jhhed6839f2020-05-08 12:28:27 -050099 jvmOpts: -server -XshowSettings:vm
jhh01096592019-09-04 07:47:25 -0500100
101aaf:
jhh8534fea2019-09-20 14:35:20 -0500102 enabled: "false"
jhh01096592019-09-04 07:47:25 -0500103
104keystore:
105 password: Pol1cy_0nap
106
107truststore:
108 password: Pol1cy_0nap
109
110telemetry:
111 user: demo@people.osaaf.org
112 password: demo123456!
113
114nexus:
jhhd4258672020-08-09 12:08:08 -0500115 name: policy-nexus
116 port: 8081
jhh8534fea2019-09-20 14:35:20 -0500117 user: admin
jhh01096592019-09-04 07:47:25 -0500118 password: admin123
jhhd2b9ed82019-12-10 17:15:28 -0600119 offline: true
jhh01096592019-09-04 07:47:25 -0500120
121db:
jhhd4258672020-08-09 12:08:08 -0500122 name: policy-mariadb
jhh01096592019-09-04 07:47:25 -0500123 user: policy_user
124 password: policy_user
125
126pap:
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000127 user: policyadmin
jhh01096592019-09-04 07:47:25 -0500128 password: zb!XztG34
129
130pdp:
131 user: healthcheck
132 password: zb!XztG34
133
jhhdf5484e2020-04-06 15:08:35 -0500134papl:
135 user: testpap
136 password: alpha123
137
138pdpl:
139 user: testpdp
140 password: alpha123
141
jhh01096592019-09-04 07:47:25 -0500142aai:
143 user: policy@policy.onap.org
144 password: demo123456!
145
146so:
147 user: InfraPortalClient
148 password: password1$
149
150vfc:
151 user:
152 password:
153
154sdnc:
155 user: admin
156 password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
157
158dmaap:
159 brmsgw:
160 key:
161 password:
162 pap:
163 key:
164 password:
165
Rashmi Pujar3cfa4cc2019-10-17 16:05:50 -0400166cds:
167 grpc:
168 user: ccsdkapps
169 password: ccsdkapps
170 svcName: cds-blueprints-processor-grpc
171 svcPort: 9111
172
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000173# Resource Limit flavor -By Default using small
jhhd4258672020-08-09 12:08:08 -0500174# Segregation for Different environment (small, large, or unlimited)
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000175flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000176resources:
177 small:
178 limits:
179 cpu: 1
180 memory: 4Gi
181 requests:
182 cpu: 100m
183 memory: 1Gi
184 large:
185 limits:
186 cpu: 2
187 memory: 8Gi
188 requests:
189 cpu: 200m
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000190 memory: 2Gi
Pamela Dragosh54048d32018-11-09 07:09:41 -0500191 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200192
193#Pods Service Account
194serviceAccount:
195 nameOverride: policy-drools-pdp
196 roles:
197 - read