vaibhav_16dec | e04b2fe | 2018-03-22 09:07:12 +0000 | [diff] [blame] | 1 | # Copyright © 2017 Amdocs, Bell Canada |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 2 | # Modifications Copyright © 2018-2020 AT&T Intellectual Property |
efiacor | ab235f4 | 2023-02-15 11:51:52 +0000 | [diff] [blame] | 3 | # Modifications Copyright (C) 2021-2023 Nordix Foundation. |
vaibhav_16dec | e04b2fe | 2018-03-22 09:07:12 +0000 | [diff] [blame] | 4 | # |
| 5 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 6 | # you may not use this file except in compliance with the License. |
| 7 | # You may obtain a copy of the License at |
| 8 | # |
| 9 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 10 | # |
| 11 | # Unless required by applicable law or agreed to in writing, software |
| 12 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 14 | # See the License for the specific language governing permissions and |
| 15 | # limitations under the License. |
| 16 | |
mayankg2703 | ced8514 | 2018-03-20 05:42:53 +0000 | [diff] [blame] | 17 | ################################################################# |
| 18 | # Global configuration defaults. |
| 19 | ################################################################# |
| 20 | global: |
Andreas Geissler | fd5b596 | 2024-01-23 11:26:47 +0100 | [diff] [blame] | 21 | mariadbGalera: |
| 22 | # flag to enable the DB creation via mariadb-operator |
| 23 | useOperator: true |
| 24 | # if useOperator set to "true", set "enableServiceAccount to "false" |
| 25 | # as the SA is created by the Operator |
| 26 | enableServiceAccount: false |
saul.gill | ef208b0 | 2023-04-26 16:16:05 +0100 | [diff] [blame] | 27 | localCluster: true |
Sylvain Desbureaux | 4898dc0 | 2019-11-14 13:35:13 +0100 | [diff] [blame] | 28 | # '&mariadbConfig' means we "store" the values for later use in the file |
| 29 | # with '*mariadbConfig' pointer. |
| 30 | config: &mariadbConfig |
Sylvain Desbureaux | 4898dc0 | 2019-11-14 13:35:13 +0100 | [diff] [blame] | 31 | mysqlDatabase: policyadmin |
| 32 | service: &mariadbService |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 33 | name: &policy-mariadb policy-mariadb |
Sylvain Desbureaux | 4898dc0 | 2019-11-14 13:35:13 +0100 | [diff] [blame] | 34 | internalPort: 3306 |
Andreas Geissler | fd5b596 | 2024-01-23 11:26:47 +0100 | [diff] [blame] | 35 | nameOverride: *policy-mariadb |
| 36 | # (optional) if localCluster=false and an external secret is used set this variable |
| 37 | #userRootSecret: <secretName> |
Rashmi Pujar | ec452b5 | 2022-04-21 12:29:14 -0400 | [diff] [blame] | 38 | prometheusEnabled: false |
waynedunican | 368aced | 2022-02-15 08:27:57 +0000 | [diff] [blame] | 39 | postgres: |
| 40 | localCluster: false |
| 41 | service: |
| 42 | name: pgset |
| 43 | name2: tcp-pgset-primary |
| 44 | name3: tcp-pgset-replica |
| 45 | container: |
| 46 | name: postgres |
efiacor | 6910bbe | 2023-03-03 14:53:16 +0000 | [diff] [blame] | 47 | #Strimzi Kafka properties |
| 48 | useStrimziKafka: true |
saul.gill | ef208b0 | 2023-04-26 16:16:05 +0100 | [diff] [blame] | 49 | # Temporary flag to disable strimzi for pf components - will be removed after native kafka support is added for drools and xacml |
| 50 | useStrimziKafkaPf: false |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 51 | kafkaBootstrap: strimzi-kafka-bootstrap |
| 52 | policyKafkaUser: policy-kafka-user |
efiacor | 6910bbe | 2023-03-03 14:53:16 +0000 | [diff] [blame] | 53 | kafkaTopics: |
| 54 | acRuntimeTopic: |
| 55 | name: policy.clamp-runtime-acm |
mayankg2703 | ced8514 | 2018-03-20 05:42:53 +0000 | [diff] [blame] | 56 | |
| 57 | ################################################################# |
Krzysztof Opasiak | 98a79cc | 2020-04-01 22:33:58 +0200 | [diff] [blame] | 58 | # Secrets metaconfig |
| 59 | ################################################################# |
| 60 | secrets: |
| 61 | - uid: db-root-password |
| 62 | name: &dbRootPassSecretName '{{ include "common.release" . }}-policy-db-root-password' |
| 63 | type: password |
Andreas Geissler | fd5b596 | 2024-01-23 11:26:47 +0100 | [diff] [blame] | 64 | externalSecret: '{{ .Values.global.mariadbGalera.localCluster | |
| 65 | ternary (( hasSuffix "policy-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret")) | |
| 66 | ternary |
| 67 | "" |
| 68 | (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .) |
| 69 | ) |
| 70 | ( (not (empty (default "" .Values.global.mariadbGalera.userRootSecret))) | |
| 71 | ternary |
| 72 | .Values.global.mariadbGalera.userRootSecret |
| 73 | (include "common.mariadb.secret.rootPassSecretName" |
| 74 | (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride) |
| 75 | ) |
| 76 | ) }}' |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 77 | password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}' |
Krzysztof Opasiak | 98a79cc | 2020-04-01 22:33:58 +0200 | [diff] [blame] | 78 | policy: generate |
| 79 | - uid: db-secret |
| 80 | name: &dbSecretName '{{ include "common.release" . }}-policy-db-secret' |
| 81 | type: basicAuth |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 82 | externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) (hasSuffix "policy-db-secret" (index .Values "mariadb-galera" "db" "externalSecret"))}}' |
| 83 | login: '{{ index .Values "mariadb-galera" "db" "user" }}' |
| 84 | password: '{{ index .Values "mariadb-galera" "db" "password" }}' |
Krzysztof Opasiak | 98a79cc | 2020-04-01 22:33:58 +0200 | [diff] [blame] | 85 | passwordPolicy: generate |
saul.gill | 7124a4b | 2021-09-09 12:02:49 +0100 | [diff] [blame] | 86 | - uid: policy-app-user-creds |
| 87 | name: &policyAppCredsSecret '{{ include "common.release" . }}-policy-app-user-creds' |
| 88 | type: basicAuth |
| 89 | externalSecret: '{{ tpl (default "" .Values.config.policyAppUserExternalSecret) . }}' |
| 90 | login: '{{ .Values.config.policyAppUserName }}' |
| 91 | password: '{{ .Values.config.policyAppUserPassword }}' |
| 92 | passwordPolicy: generate |
rameshiyer27 | ff17665 | 2021-09-21 15:19:05 +0100 | [diff] [blame] | 93 | - uid: policy-pap-user-creds |
| 94 | name: &policyPapCredsSecret '{{ include "common.release" . }}-policy-pap-user-creds' |
| 95 | type: basicAuth |
| 96 | externalSecret: '{{ tpl (default "" .Values.restServer.policyPapUserExternalSecret) . }}' |
| 97 | login: '{{ .Values.restServer.policyPapUserName }}' |
| 98 | password: '{{ .Values.restServer.policyPapUserPassword }}' |
| 99 | passwordPolicy: required |
| 100 | - uid: policy-api-user-creds |
| 101 | name: &policyApiCredsSecret '{{ include "common.release" . }}-policy-api-user-creds' |
| 102 | type: basicAuth |
| 103 | externalSecret: '{{ tpl (default "" .Values.restServer.policyApiUserExternalSecret) . }}' |
| 104 | login: '{{ .Values.restServer.policyApiUserName }}' |
| 105 | password: '{{ .Values.restServer.policyApiUserPassword }}' |
| 106 | passwordPolicy: required |
Krzysztof Opasiak | 98a79cc | 2020-04-01 22:33:58 +0200 | [diff] [blame] | 107 | |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 108 | db: &dbSecretsHook |
| 109 | credsExternalSecret: *dbSecretName |
| 110 | |
| 111 | policy-api: |
| 112 | enabled: true |
| 113 | db: *dbSecretsHook |
rameshiyer27 | ff17665 | 2021-09-21 15:19:05 +0100 | [diff] [blame] | 114 | restServer: |
| 115 | apiUserExternalSecret: *policyApiCredsSecret |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 116 | config: |
| 117 | jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}' |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 118 | policy-pap: |
| 119 | enabled: true |
| 120 | db: *dbSecretsHook |
rameshiyer27 | ff17665 | 2021-09-21 15:19:05 +0100 | [diff] [blame] | 121 | restServer: |
| 122 | papUserExternalSecret: *policyPapCredsSecret |
| 123 | apiUserExternalSecret: *policyApiCredsSecret |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 124 | config: |
| 125 | jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}' |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 126 | policy-xacml-pdp: |
| 127 | enabled: true |
| 128 | db: *dbSecretsHook |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 129 | config: |
| 130 | jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}' |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 131 | policy-apex-pdp: |
| 132 | enabled: true |
| 133 | db: *dbSecretsHook |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 134 | config: |
| 135 | jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}' |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 136 | policy-drools-pdp: |
| 137 | enabled: true |
| 138 | db: *dbSecretsHook |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 139 | config: |
| 140 | jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}' |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 141 | policy-distribution: |
| 142 | enabled: true |
| 143 | db: *dbSecretsHook |
FrancescoFioraEst | 9c79e26 | 2022-02-22 13:12:19 +0000 | [diff] [blame] | 144 | policy-clamp-ac-k8s-ppnt: |
rameshiyer27 | 01b8cc0 | 2021-09-21 15:07:50 +0100 | [diff] [blame] | 145 | enabled: true |
FrancescoFioraEst | 9c79e26 | 2022-02-22 13:12:19 +0000 | [diff] [blame] | 146 | policy-clamp-ac-pf-ppnt: |
rameshiyer27 | ff17665 | 2021-09-21 15:19:05 +0100 | [diff] [blame] | 147 | enabled: true |
| 148 | restServer: |
| 149 | apiUserExternalSecret: *policyApiCredsSecret |
| 150 | papUserExternalSecret: *policyPapCredsSecret |
FrancescoFioraEst | 9c79e26 | 2022-02-22 13:12:19 +0000 | [diff] [blame] | 151 | policy-clamp-ac-http-ppnt: |
rameshiyer27 | 3c3402d | 2021-09-21 15:14:39 +0100 | [diff] [blame] | 152 | enabled: true |
aravind.est | 8d72830 | 2022-12-07 12:26:28 +0000 | [diff] [blame] | 153 | policy-clamp-ac-a1pms-ppnt: |
| 154 | enabled: true |
aravind.est | 0879dfc | 2023-02-22 09:05:50 +0000 | [diff] [blame] | 155 | policy-clamp-ac-kserve-ppnt: |
| 156 | enabled: true |
FrancescoFioraEst | 9c79e26 | 2022-02-22 13:12:19 +0000 | [diff] [blame] | 157 | policy-clamp-runtime-acm: |
saul.gill | 7124a4b | 2021-09-09 12:02:49 +0100 | [diff] [blame] | 158 | enabled: true |
| 159 | db: *dbSecretsHook |
| 160 | config: |
| 161 | appUserExternalSecret: *policyAppCredsSecret |
efiacor | 6910bbe | 2023-03-03 14:53:16 +0000 | [diff] [blame] | 162 | policy-nexus: |
| 163 | enabled: false |
| 164 | config: |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 165 | jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}' |
ktimoney | b3aef7b | 2021-09-13 08:27:58 +0100 | [diff] [blame] | 166 | policy-gui: |
amatthews | 736bf37 | 2021-12-14 16:04:15 +0000 | [diff] [blame] | 167 | enabled: false |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 168 | config: |
| 169 | jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}' |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 170 | |
Krzysztof Opasiak | 98a79cc | 2020-04-01 22:33:58 +0200 | [diff] [blame] | 171 | ################################################################# |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 172 | # DB configuration defaults. |
mayankg2703 | ced8514 | 2018-03-20 05:42:53 +0000 | [diff] [blame] | 173 | ################################################################# |
jhh | d425867 | 2020-08-09 12:08:08 -0500 | [diff] [blame] | 174 | |
jhh | d74fe9f | 2021-04-15 11:04:39 -0500 | [diff] [blame] | 175 | dbmigrator: |
saul.gill | 9964927 | 2023-12-12 16:14:52 +0000 | [diff] [blame] | 176 | image: onap/policy-db-migrator:3.1.0 |
jhh | d74fe9f | 2021-04-15 11:04:39 -0500 | [diff] [blame] | 177 | schema: policyadmin |
| 178 | policy_home: "/opt/app/policy" |
| 179 | |
mayankg2703 | ced8514 | 2018-03-20 05:42:53 +0000 | [diff] [blame] | 180 | subChartsOnly: |
| 181 | enabled: true |
BorislavG | 5f3b619 | 2018-03-25 18:12:38 +0300 | [diff] [blame] | 182 | |
mayankg2703 | ced8514 | 2018-03-20 05:42:53 +0000 | [diff] [blame] | 183 | # flag to enable debugging - application support required |
| 184 | debugEnabled: false |
| 185 | |
mayankg2703 | ced8514 | 2018-03-20 05:42:53 +0000 | [diff] [blame] | 186 | # default number of instances |
| 187 | replicaCount: 1 |
| 188 | |
| 189 | nodeSelector: {} |
| 190 | |
| 191 | affinity: {} |
| 192 | |
| 193 | # probe configuration parameters |
| 194 | liveness: |
| 195 | initialDelaySeconds: 10 |
| 196 | periodSeconds: 10 |
| 197 | # necessary to disable liveness probe when setting breakpoints |
| 198 | # in debugger so K8s doesn't restart unresponsive container |
| 199 | enabled: true |
| 200 | |
| 201 | readiness: |
| 202 | initialDelaySeconds: 10 |
| 203 | periodSeconds: 10 |
| 204 | |
saul.gill | 7124a4b | 2021-09-09 12:02:49 +0100 | [diff] [blame] | 205 | |
| 206 | config: |
| 207 | policyAppUserName: runtimeUser |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 208 | useStrimziKafka: true |
Sirisha_Manchikanti | 73c5f00 | 2022-07-25 17:04:45 +0100 | [diff] [blame] | 209 | policyPdpPapTopic: |
| 210 | name: policy-pdp-pap |
| 211 | partitions: 10 |
| 212 | retentionMs: 7200000 |
| 213 | segmentBytes: 1073741824 |
| 214 | consumer: |
| 215 | groupId: policy-group |
| 216 | policyHeartbeatTopic: |
| 217 | name: policy-heartbeat |
| 218 | partitions: 10 |
| 219 | retentionMs: 7200000 |
| 220 | segmentBytes: 1073741824 |
| 221 | consumer: |
| 222 | groupId: policy-group |
| 223 | policyNotificationTopic: |
| 224 | name: policy-notification |
| 225 | partitions: 10 |
| 226 | retentionMs: 7200000 |
| 227 | segmentBytes: 1073741824 |
| 228 | consumer: |
| 229 | groupId: policy-group |
Sirisha_Manchikanti | b402a59 | 2022-09-09 12:01:20 +0100 | [diff] [blame] | 230 | someConfig: blah |
saul.gill | 7124a4b | 2021-09-09 12:02:49 +0100 | [diff] [blame] | 231 | |
Sylvain Desbureaux | 4898dc0 | 2019-11-14 13:35:13 +0100 | [diff] [blame] | 232 | mariadb-galera: |
Andreas Geissler | fd5b596 | 2024-01-23 11:26:47 +0100 | [diff] [blame] | 233 | # mariadb-galera.config and global.mariadbGalera.config must be equals |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 234 | db: |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 235 | user: policy-user |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 236 | # password: |
| 237 | externalSecret: *dbSecretName |
| 238 | name: &mysqlDbName policyadmin |
| 239 | rootUser: |
| 240 | externalSecret: *dbRootPassSecretName |
| 241 | nameOverride: *policy-mariadb |
Andreas Geissler | fd5b596 | 2024-01-23 11:26:47 +0100 | [diff] [blame] | 242 | # mariadb-galera.service and global.mariadbGalera.service must be equals |
Sylvain Desbureaux | 4898dc0 | 2019-11-14 13:35:13 +0100 | [diff] [blame] | 243 | service: *mariadbService |
| 244 | replicaCount: 1 |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 245 | mariadbOperator: |
| 246 | galera: |
| 247 | enabled: false |
Sylvain Desbureaux | 4898dc0 | 2019-11-14 13:35:13 +0100 | [diff] [blame] | 248 | persistence: |
| 249 | enabled: true |
| 250 | mountSubPath: policy/maria/data |
Sylvain Desbureaux | 93a5b49 | 2020-11-27 11:07:42 +0100 | [diff] [blame] | 251 | serviceAccount: |
| 252 | nameOverride: *policy-mariadb |
Sylvain Desbureaux | 4898dc0 | 2019-11-14 13:35:13 +0100 | [diff] [blame] | 253 | |
waynedunican | 368aced | 2022-02-15 08:27:57 +0000 | [diff] [blame] | 254 | postgresImage: library/postgres:latest |
| 255 | # application configuration override for postgres |
| 256 | postgres: |
| 257 | nameOverride: &postgresName policy-postgres |
| 258 | service: |
| 259 | name: *postgresName |
| 260 | name2: policy-pg-primary |
| 261 | name3: policy-pg-replica |
| 262 | container: |
| 263 | name: |
| 264 | primary: policy-pg-primary |
| 265 | replica: policy-pg-replica |
| 266 | persistence: |
| 267 | mountSubPath: policy/postgres/data |
| 268 | mountInitPath: policy |
| 269 | config: |
Andreas Geissler | cfd8434 | 2023-08-16 17:18:49 +0200 | [diff] [blame] | 270 | pgUserName: policy-user |
waynedunican | 368aced | 2022-02-15 08:27:57 +0000 | [diff] [blame] | 271 | pgDatabase: policyadmin |
saul.gill | ef208b0 | 2023-04-26 16:16:05 +0100 | [diff] [blame] | 272 | pgUserExternalSecret: *dbSecretName |
| 273 | pgRootPasswordExternalSecret: *dbRootPassSecretName |
waynedunican | 368aced | 2022-02-15 08:27:57 +0000 | [diff] [blame] | 274 | |
| 275 | readinessCheck: |
| 276 | wait_for: |
| 277 | - '{{ ternary .Values.postgres.service.name "postgres" .Values.global.postgres.localCluster }}' |
Andreas Geissler | 060bc37 | 2024-03-11 17:26:53 +0100 | [diff] [blame] | 278 | wait_for_global_operator: |
| 279 | pods: |
| 280 | - '{{ .Values.global.mariadbGalera.nameOverride }}-0' |
| 281 | wait_for_local_operator: |
| 282 | pods: |
| 283 | - '{{ index .Values "mariadb-galera" "nameOverride" }}-0' |
| 284 | wait_for_global: |
| 285 | apps: |
| 286 | - '{{ include "common.mariadbAppName" . }}' |
| 287 | wait_for_local: |
| 288 | apps: |
| 289 | - '{{ include "common.mariadbAppName" . }}' |
waynedunican | 368aced | 2022-02-15 08:27:57 +0000 | [diff] [blame] | 290 | |
rameshiyer27 | ff17665 | 2021-09-21 15:19:05 +0100 | [diff] [blame] | 291 | restServer: |
adheli.tavares | f3656cd | 2021-11-10 14:54:32 +0000 | [diff] [blame] | 292 | policyPapUserName: policyadmin |
rameshiyer27 | ff17665 | 2021-09-21 15:19:05 +0100 | [diff] [blame] | 293 | policyPapUserPassword: zb!XztG34 |
adheli.tavares | f3656cd | 2021-11-10 14:54:32 +0000 | [diff] [blame] | 294 | policyApiUserName: policyadmin |
rameshiyer27 | ff17665 | 2021-09-21 15:19:05 +0100 | [diff] [blame] | 295 | policyApiUserPassword: zb!XztG34 |
| 296 | |
jhh | bf8d8a9 | 2020-09-10 14:01:49 -0500 | [diff] [blame] | 297 | # Resource Limit flavor -By Default using small |
| 298 | # Segregation for Different environment (small, large, or unlimited) |
| 299 | flavor: small |
| 300 | resources: |
| 301 | small: |
| 302 | limits: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 303 | cpu: "1" |
| 304 | memory: "4Gi" |
jhh | bf8d8a9 | 2020-09-10 14:01:49 -0500 | [diff] [blame] | 305 | requests: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 306 | cpu: "100m" |
| 307 | memory: "1Gi" |
jhh | bf8d8a9 | 2020-09-10 14:01:49 -0500 | [diff] [blame] | 308 | large: |
| 309 | limits: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 310 | cpu: "2" |
| 311 | memory: "8Gi" |
jhh | bf8d8a9 | 2020-09-10 14:01:49 -0500 | [diff] [blame] | 312 | requests: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 313 | cpu: "200m" |
| 314 | memory: "2Gi" |
jhh | bf8d8a9 | 2020-09-10 14:01:49 -0500 | [diff] [blame] | 315 | unlimited: {} |
| 316 | |
farida azmy | c117837 | 2021-04-11 12:55:33 +0200 | [diff] [blame] | 317 | #Pods Service Account |
| 318 | serviceAccount: |
| 319 | nameOverride: policy |
| 320 | roles: |
| 321 | - read |