blob: 44ae16de1dce1ae9fdfb4f5fe177ef245ef6ecfe [file] [log] [blame]
Michael Mokryafae9972019-03-11 14:46:34 -05001# ============LICENSE_START=======================================================
jhh999c2242021-02-24 12:10:02 -06002# Copyright (C) 2019-2021 AT&T Intellectual Property. All rights reserved.
Michael Mokryafae9972019-03-11 14:46:34 -05003# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 persistence: {}
24
25#################################################################
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020026# Secrets metaconfig
27#################################################################
28secrets:
29 - uid: db-secret
30 type: basicAuth
31 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
32 login: '{{ .Values.db.user }}'
33 password: '{{ .Values.db.password }}'
34 passwordPolicy: required
Dominik Mizync88bcc92020-04-14 18:20:20 +020035 - uid: restserver-creds
36 type: basicAuth
37 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
38 login: '{{ .Values.restServer.user }}'
39 password: '{{ .Values.restServer.password }}'
40 passwordPolicy: required
41 - uid: api-creds
42 type: basicAuth
43 externalSecret: '{{ tpl (default "" .Values.apiServer.credsExternalSecret) . }}'
44 login: '{{ .Values.apiServer.user }}'
45 password: '{{ .Values.apiServer.password }}'
46 passwordPolicy: required
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020047
48#################################################################
Michael Mokryafae9972019-03-11 14:46:34 -050049# Application configuration defaults.
50#################################################################
51# application image
saul.gill5e611402023-03-02 11:49:23 +000052image: onap/policy-xacml-pdp:2.8.1
Michael Mokryafae9972019-03-11 14:46:34 -050053pullPolicy: Always
54
55# flag to enable debugging - application support required
56debugEnabled: false
57
58# application configuration
59
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020060db:
61 user: policy_user
62 password: policy_user
jhhd4258672020-08-09 12:08:08 -050063 service:
64 name: policy-mariadb
65 internalPort: 3306
66
Dominik Mizync88bcc92020-04-14 18:20:20 +020067restServer:
68 user: healthcheck
69 password: zb!XztG34
jhhd4258672020-08-09 12:08:08 -050070
Dominik Mizync88bcc92020-04-14 18:20:20 +020071apiServer:
adheli.tavaresf3656cd2021-11-10 14:54:32 +000072 user: policyadmin
Dominik Mizync88bcc92020-04-14 18:20:20 +020073 password: zb!XztG34
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020074
Michael Mokryafae9972019-03-11 14:46:34 -050075# default number of instances
ramverma39a79a42019-05-02 13:07:36 +000076replicaCount: 1
Michael Mokryafae9972019-03-11 14:46:34 -050077
78nodeSelector: {}
79
80affinity: {}
81
82# probe configuration parameters
83liveness:
84 initialDelaySeconds: 20
85 periodSeconds: 10
86 # necessary to disable liveness probe when setting breakpoints
87 # in debugger so K8s doesn't restart unresponsive container
88 enabled: true
89
90readiness:
91 initialDelaySeconds: 20
92 periodSeconds: 10
93
94service:
95 type: ClusterIP
96 name: policy-xacml-pdp
Michael Mokryafae9972019-03-11 14:46:34 -050097 internalPort: 6969
Andreas Geisslerf10c5552023-03-21 18:09:46 +010098 ports:
99 - name: http
100 port: 6969
Michael Mokryafae9972019-03-11 14:46:34 -0500101
102ingress:
103 enabled: false
104
jhhd4258672020-08-09 12:08:08 -0500105flavor: small
106resources:
107 small:
108 limits:
109 cpu: 1
110 memory: 4Gi
111 requests:
112 cpu: 100m
113 memory: 1Gi
114 large:
115 limits:
116 cpu: 2
117 memory: 8Gi
118 requests:
119 cpu: 200m
120 memory: 2Gi
121 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200122
123#Pods Service Account
124serviceAccount:
125 nameOverride: policy-xacml-pdp
126 roles:
127 - read
Rashmi Pujara8b09262022-03-15 21:58:57 -0400128
Rashmi Pujara8b09262022-03-15 21:58:57 -0400129metrics:
130 serviceMonitor:
131 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
132 # The default operator for prometheus enforces the below label.
133 labels:
134 release: prometheus
135 enabled: true
136 port: policy-xacml-pdp
137 interval: 60s
Andreas Geisslerf10c5552023-03-21 18:09:46 +0100138 isHttps: false
Rashmi Pujara8b09262022-03-15 21:58:57 -0400139 basicAuth:
140 enabled: true
141 externalSecretNameSuffix: policy-xacml-pdp-restserver-creds
142 externalSecretUserKey: login
143 externalSecretPasswordKey: password
144 selector:
145 app: '{{ include "common.name" . }}'
146 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
147 release: '{{ include "common.release" . }}'
148 heritage: '{{ .Release.Service }}'