blob: b1a26fb6699f22780b9621d00319645d37091ddf [file] [log] [blame]
jhhd74fe9f2021-04-15 11:04:39 -05001# Copyright © 2017 Amdocs
2# Copyright © 2017, 2021 Bell Canada
jhh0d1c0e82022-04-08 14:36:15 -05003# Modifications Copyright © 2018-2022 AT&T Intellectual Property
Andreas Geissler57681132024-07-29 10:18:26 +02004# Modifications Copyright © 2024 Deutsche Telekom
mayankg2703ced85142018-03-20 05:42:53 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17
18#################################################################
19# Global configuration defaults.
20#################################################################
21global:
22 nodePortPrefix: 302
jhh01096592019-09-04 07:47:25 -050023
mayankg2703ced85142018-03-20 05:42:53 +000024#################################################################
Krzysztof Opasiak68b1c922020-03-26 23:59:36 +010025# Secrets metaconfig
26#################################################################
27secrets:
28 - uid: db-secret
29 type: basicAuth
30 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
31 login: '{{ .Values.db.user }}'
32 password: '{{ .Values.db.password }}'
33 passwordPolicy: required
jhh0d1c0e82022-04-08 14:36:15 -050034 - uid: telemetry-creds
35 type: basicAuth
36 externalSecret: '{{ tpl (default "" .Values.telemetry.credsExternalSecret) . }}'
37 login: '{{ .Values.telemetry.user }}'
38 password: '{{ .Values.telemetry.password }}'
39 passwordPolicy: required
Krzysztof Opasiak68b1c922020-03-26 23:59:36 +010040
41#################################################################
mayankg2703ced85142018-03-20 05:42:53 +000042# Application configuration defaults.
43#################################################################
44# application image
saul.gill1fa9c252024-05-20 15:34:32 +010045image: onap/policy-pdpd-cl:2.1.3
mayankg2703ced85142018-03-20 05:42:53 +000046pullPolicy: Always
47
48# flag to enable debugging - application support required
49debugEnabled: false
50
mayankg2703ced85142018-03-20 05:42:53 +000051# default number of instances
Jorge Hernandezd9f75452018-06-04 11:18:52 -050052replicaCount: 1
mayankg2703ced85142018-03-20 05:42:53 +000053
54nodeSelector: {}
55
56affinity: {}
57
58# probe configuration parameters
59liveness:
Jorge Hernandez432aa312018-06-04 18:20:43 -050060 initialDelaySeconds: 180
jhh0d1c0e82022-04-08 14:36:15 -050061 periodSeconds: 60
62 timeoutSeconds: 10
mayankg2703ced85142018-03-20 05:42:53 +000063 # necessary to disable liveness probe when setting breakpoints
64 # in debugger so K8s doesn't restart unresponsive container
Jorge Hernandez328eadb2018-05-15 07:52:21 -050065 enabled: true
mayankg2703ced85142018-03-20 05:42:53 +000066
67readiness:
Jorge Hernandezd9f75452018-06-04 11:18:52 -050068 initialDelaySeconds: 60
mayankg2703ced85142018-03-20 05:42:53 +000069 periodSeconds: 10
70
71service:
jhh59ce22d2019-05-14 17:59:36 -050072 type: ClusterIP
jhhd4258672020-08-09 12:08:08 -050073 name: policy-drools-pdp
jhh59ce22d2019-05-14 17:59:36 -050074 internalPort: 6969
Andreas Geisslerf10c5552023-03-21 18:09:46 +010075 ports:
76 - name: http
77 port: 6969
78 - name: http-2
79 port: 9696
mayankg2703ced85142018-03-20 05:42:53 +000080
81ingress:
82 enabled: false
83
AndrewLamb7ef78ae2023-04-20 16:24:13 +010084serviceMesh:
85 authorizationPolicy:
86 authorizedPrincipals:
rameshiyer27bc8a6a42024-03-11 17:18:11 +000087 - serviceAccount: strimzi-kafka-read
AndrewLamb7ef78ae2023-04-20 16:24:13 +010088
jhh01096592019-09-04 07:47:25 -050089server:
jhhed6839f2020-05-08 12:28:27 -050090 jvmOpts: -server -XshowSettings:vm
jhh01096592019-09-04 07:47:25 -050091
jhh01096592019-09-04 07:47:25 -050092telemetry:
93 user: demo@people.osaaf.org
94 password: demo123456!
95
96nexus:
jhhd4258672020-08-09 12:08:08 -050097 name: policy-nexus
98 port: 8081
jhh8534fea2019-09-20 14:35:20 -050099 user: admin
jhh01096592019-09-04 07:47:25 -0500100 password: admin123
jhhd2b9ed82019-12-10 17:15:28 -0600101 offline: true
jhh01096592019-09-04 07:47:25 -0500102
103db:
jhhd4258672020-08-09 12:08:08 -0500104 name: policy-mariadb
Andreas Geisslercfd84342023-08-16 17:18:49 +0200105 user: policy-user
jhh01096592019-09-04 07:47:25 -0500106 password: policy_user
107
108pap:
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000109 user: policyadmin
jhh01096592019-09-04 07:47:25 -0500110 password: zb!XztG34
111
112pdp:
113 user: healthcheck
114 password: zb!XztG34
115
jhhdf5484e2020-04-06 15:08:35 -0500116papl:
117 user: testpap
118 password: alpha123
119
120pdpl:
121 user: testpdp
122 password: alpha123
123
jhh01096592019-09-04 07:47:25 -0500124aai:
125 user: policy@policy.onap.org
126 password: demo123456!
127
128so:
129 user: InfraPortalClient
130 password: password1$
131
132vfc:
133 user:
134 password:
135
136sdnc:
137 user: admin
138 password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
139
140dmaap:
141 brmsgw:
142 key:
143 password:
144 pap:
145 key:
146 password:
147
Rashmi Pujar3cfa4cc2019-10-17 16:05:50 -0400148cds:
149 grpc:
150 user: ccsdkapps
151 password: ccsdkapps
152 svcName: cds-blueprints-processor-grpc
153 svcPort: 9111
154
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000155# Resource Limit flavor -By Default using small
jhhd4258672020-08-09 12:08:08 -0500156# Segregation for Different environment (small, large, or unlimited)
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000157flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000158resources:
159 small:
160 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100161 cpu: "1"
Andreas Geissler8cbb3d92024-03-12 16:44:56 +0100162 memory: "800Mi"
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000163 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100164 cpu: "0.5"
Andreas Geissler8cbb3d92024-03-12 16:44:56 +0100165 memory: "800Mi"
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000166 large:
167 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100168 cpu: "2"
169 memory: "1.6Gi"
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000170 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100171 cpu: "1"
172 memory: "1.6Gi"
Pamela Dragosh54048d32018-11-09 07:09:41 -0500173 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200174
Andreas Geissler57681132024-07-29 10:18:26 +0200175securityContext:
176 user_id: 100
177 group_id: 102
178
179dirSizes:
180 emptyDir:
181 sizeLimit: 1Gi
182 logDir:
183 sizeLimit: 500Mi
184
farida azmyc1178372021-04-11 12:55:33 +0200185#Pods Service Account
186serviceAccount:
187 nameOverride: policy-drools-pdp
188 roles:
189 - read
jhh0d1c0e82022-04-08 14:36:15 -0500190
jhh0d1c0e82022-04-08 14:36:15 -0500191metrics:
192 serviceMonitor:
193 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
194 # The default operator for prometheus enforces the below label.
195 labels:
196 release: prometheus
197 enabled: true
198 port: policy-drools-pdp-9696
199 interval: 60s
Andreas Geisslerf10c5552023-03-21 18:09:46 +0100200 isHttps: false
jhh0d1c0e82022-04-08 14:36:15 -0500201 basicAuth:
202 enabled: true
203 externalSecretNameSuffix: policy-drools-pdp-telemetry-creds
204 externalSecretUserKey: login
205 externalSecretPasswordKey: password
206 selector:
207 app: '{{ include "common.name" . }}'
208 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
209 release: '{{ include "common.release" . }}'
210 heritage: '{{ .Release.Service }}'
rameshiyer27bc8a6a42024-03-11 17:18:11 +0000211
212config:
213 # Event consumption (kafka) properties
214 kafka:
215 consumer:
216 groupId: policy-drools-pdp
217 app:
218 listener:
219 policyPdpPapTopic: policy-pdp-pap
220
221# Strimzi Kafka config
222kafkaUser:
223 authenticationType: scram-sha-512
224 acls:
225 - name: policy-drools-pdp
226 type: group
227 operations: [ Create, Describe, Read, Write ]
228 - name: policy-pdp-pap
229 type: topic
230 patternType: prefix
231 operations: [ Create, Describe, Read, Write ]