blob: 617ed100ef2428d87d72b735cb182bb6262015f1 [file] [log] [blame]
Mandeep Khinda1d123882018-03-27 01:26:59 +00001# Copyright © 2017 Amdocs, Bell Canada
ChrisC49931442020-02-19 09:45:54 +01002# Modifications Copyright © 2018, 2020 AT&T
Mandeep Khinda1d123882018-03-27 01:26:59 +00003#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
16#################################################################
17# Global configuration defaults.
18#################################################################
19global:
Krzysztof Opasiakeac587d2020-05-21 23:53:02 +020020 env:
21 tomcatDir: "/usr/local/tomcat"
Mandeep Khinda1d123882018-03-27 01:26:59 +000022 nodePortPrefix: 302
ChrisC49931442020-02-19 09:45:54 +010023 persistence: {}
ChrisC019b59c2020-04-03 13:58:44 +020024 #AAF service
ChrisC49931442020-02-19 09:45:54 +010025 aafEnabled: true
ChrisC019b59c2020-04-03 13:58:44 +020026
Sandeep Shah2ffb1ba2020-09-01 21:13:16 -050027################################################################
28# Secrets metaconfig
29#################################################################
30
31secrets:
32 - uid: portal-cass
33 type: basicAuth
34 externalSecret: '{{ tpl (default "" .Values.cassandra.config.cassandraExternalSecret) . }}'
35 login: '{{ .Values.cassandra.config.cassandraUsername }}'
36 password: '{{ .Values.cassandra.config.cassandraPassword }}'
37 passwordPolicy: required
Sandeep Shahd6b989d2020-09-25 15:53:18 -050038 - uid: portal-backend-db
39 type: basicAuth
40 externalSecret: '{{ tpl (default "" .Values.mariadb.config.backendDbExternalSecret) . }}'
41 login: '{{ .Values.mariadb.config.backendUserName }}'
42 password: '{{ .Values.mariadb.config.backendPassword }}'
43 passwordPolicy: required
Sandeep Shah2ffb1ba2020-09-01 21:13:16 -050044 - uid: cipher-enc-key
45 type: password
46 externalSecret: '{{ .Values.config.cipherEncKeyExternalSecret}}'
47 password: '{{ .Values.config.cipherEncKey }}'
48 passwordPolicy: required
49
Mandeep Khinda1d123882018-03-27 01:26:59 +000050#################################################################
51# Application configuration defaults.
52#################################################################
ChrisC49931442020-02-19 09:45:54 +010053
Mandeep Khinda1d123882018-03-27 01:26:59 +000054# application image
Sandeep Shahe614fd32020-10-30 10:34:08 -050055image: onap/portal-sdk:3.4.2
Mandeep Khinda1d123882018-03-27 01:26:59 +000056pullPolicy: Always
57
Sandeep Shah2ffb1ba2020-09-01 21:13:16 -050058# application configuration
59config:
60 # cipherEncKeyExternalSecret: some secret
61 cipherEncKey: AGLDdG4D04BKm2IxIWEr8o==
62
63
ChrisC49931442020-02-19 09:45:54 +010064#AAF local config
ChrisC53929942020-05-04 12:43:34 +020065aafURL: https://aaf-service:8100/authz/
Krzysztof Opasiak09f52792020-05-21 23:49:45 +020066certInitializer:
67 nameOverride: portal-sdk-cert-initializer
ChrisC49931442020-02-19 09:45:54 +010068 aafDeployFqi: deployer@people.osaaf.org
69 aafDeployPass: demo123456!
70 fqdn: portal
71 fqi: portal@portal.onap.org
Krzysztof Opasiak09f52792020-05-21 23:49:45 +020072 public_fqdn: portal.onap.org
ChrisC019b59c2020-04-03 13:58:44 +020073 cadi_latitude: "38.0"
74 cadi_longitude: "-72.0"
75 credsPath: /opt/app/osaaf/local
76 app_ns: org.osaaf.aaf
77 permission_user: 1000
78 permission_group: 999
ChrisC49931442020-02-19 09:45:54 +010079 keystoreFile: "org.onap.portal.p12"
80 truststoreFile: "org.onap.portal.trust.jks"
Sylvain Desbureaux9b457ab2021-02-23 16:34:37 +010081 aaf_add_config: |
82 echo "cadi_truststore_password=$cadi_truststore_password" > {{ .Values.credsPath }}/mycreds.prop
83 echo "cadi_keystore_password_p12=$cadi_keystore_password_p12" >> {{ .Values.credsPath }}/mycreds.prop
ChrisC019b59c2020-04-03 13:58:44 +020084
Mandeep Khinda1d123882018-03-27 01:26:59 +000085# flag to enable debugging - application support required
86debugEnabled: false
87
88# default number of instances
89replicaCount: 1
90
91nodeSelector: {}
92
93affinity: {}
94
95# probe configuration parameters
96liveness:
97 initialDelaySeconds: 10
98 periodSeconds: 10
99 # necessary to disable liveness probe when setting breakpoints
100 # in debugger so K8s doesn't restart unresponsive container
101 enabled: true
102
103readiness:
104 initialDelaySeconds: 10
105 periodSeconds: 10
106
107service:
hb123fb53c6a32018-07-12 14:21:16 -0400108 type: NodePort
Mandeep Khinda1d123882018-03-27 01:26:59 +0000109 name: portal-sdk
BorislavG1ffbd992018-04-24 07:56:27 +0000110 portName: portal-sdk
ChrisC49931442020-02-19 09:45:54 +0100111 internalPort: 8443
112 externalPort: 8443
BorislavGcdbd3ab2018-07-17 08:42:23 +0000113 nodePort: 12
Mandeep Khinda1d123882018-03-27 01:26:59 +0000114
115mariadb:
Mandeep Khindaf8b8f072018-04-26 14:35:38 +0000116 service:
Mandeep Khinda1d123882018-03-27 01:26:59 +0000117 name: portal-db
Sandeep Shahd6b989d2020-09-25 15:53:18 -0500118 config:
119 # backendDbExternalSecret: some secret
120 backendUserName: portal
121 backendPassword: portal
Mandeep Khinda454e2fd2018-04-06 03:03:24 +0000122widget:
Mandeep Khindaf8b8f072018-04-26 14:35:38 +0000123 service:
Mandeep Khinda454e2fd2018-04-06 03:03:24 +0000124 name: portal-widget
Mandeep Khinda1d123882018-03-27 01:26:59 +0000125cassandra:
Mandeep Khindaf8b8f072018-04-26 14:35:38 +0000126 service:
Mandeep Khinda1d123882018-03-27 01:26:59 +0000127 name: portal-cassandra
128 config:
Sandeep Shah2ffb1ba2020-09-01 21:13:16 -0500129 # cassandraExternalSecret: some secret
Mandeep Khinda1d123882018-03-27 01:26:59 +0000130 cassandraUsername: root
131 cassandraPassword: Aa123456
Mandeep Khinda454e2fd2018-04-06 03:03:24 +0000132messageRouter:
Mandeep Khindaf8b8f072018-04-26 14:35:38 +0000133 service:
Mandeep Khinda454e2fd2018-04-06 03:03:24 +0000134 name: message-router
Mandeep Khinda1d123882018-03-27 01:26:59 +0000135
136ingress:
137 enabled: false
Lucjan Bryndzaac1080a2019-11-26 13:04:47 +0100138 service:
Lucjan Bryndza05649652020-04-29 08:52:33 +0000139 - baseaddr: portal-sdk
Lucjan Bryndzaac1080a2019-11-26 13:04:47 +0100140 name: "portal-sdk"
ChrisC49931442020-02-19 09:45:54 +0100141 port: 8443
Lucjan Bryndzaac1080a2019-11-26 13:04:47 +0100142 config:
Sylvain Desbureaux105b3522020-05-06 15:23:16 +0200143 ssl: "redirect"
Mandeep Khinda1d123882018-03-27 01:26:59 +0000144
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000145# Resource Limit flavor -By Default using small
Nishukumar75d48b92018-09-19 12:11:51 +0000146flavor: small
147# Segregation for Different environment (Small and Large)
148resources:
149 small:
150 limits:
Sylvain Desbureaux22b89c72019-10-29 12:00:36 +0100151 cpu: 600m
152 memory: 1.6Gi
Nishukumar75d48b92018-09-19 12:11:51 +0000153 requests:
Sylvain Desbureaux22b89c72019-10-29 12:00:36 +0100154 cpu: 10m
155 memory: 1.3Gi
Nishukumar75d48b92018-09-19 12:11:51 +0000156 large:
157 limits:
158 cpu: 8
159 memory: 20Gi
160 requests:
161 cpu: 4
162 memory: 10Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000163 unlimited: {}
Maciej Wereskid5d4a852021-11-15 15:19:11 +0100164
165# Log configuration
166log:
167 path: /var/log/onap
168logConfigMapNamePrefix: '{{ include "common.fullname" . }}'
farida azmy31234fc2021-11-02 11:37:40 +0200169#Pods Service Account
170serviceAccount:
171 nameOverride: portal-sdk
172 roles:
173 - read