blob: 45ade02a49de86db5cba2c18ec9c5bd442bbe47a [file] [log] [blame]
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00001# Copyright © 2017 Amdocs, Bell Canada
jhhd4258672020-08-09 12:08:08 -05002# Modifications Copyright © 2018-2020 AT&T Intellectual Property
FrancescoFioraEst9c79e262022-02-22 13:12:19 +00003# Modifications Copyright (C) 2021-2022 Nordix Foundation.
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
mayankg2703ced85142018-03-20 05:42:53 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
jhhd4258672020-08-09 12:08:08 -050021 aafEnabled: true
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010022 mariadb:
23 # '&mariadbConfig' means we "store" the values for later use in the file
24 # with '*mariadbConfig' pointer.
25 config: &mariadbConfig
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010026 mysqlDatabase: policyadmin
27 service: &mariadbService
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010028 name: &policy-mariadb policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010029 internalPort: 3306
Rashmi Pujarec452b52022-04-21 12:29:14 -040030 prometheusEnabled: false
waynedunican368aced2022-02-15 08:27:57 +000031 postgres:
32 localCluster: false
33 service:
34 name: pgset
35 name2: tcp-pgset-primary
36 name3: tcp-pgset-replica
37 container:
38 name: postgres
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +010039 kafkaBootstrap: strimzi-kafka-bootstrap
40 policyKafkaUser: policy-kafka-user
mayankg2703ced85142018-03-20 05:42:53 +000041
42#################################################################
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020043# Secrets metaconfig
44#################################################################
45secrets:
46 - uid: db-root-password
47 name: &dbRootPassSecretName '{{ include "common.release" . }}-policy-db-root-password'
48 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010049 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .) (hasSuffix "policy-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret"))}}'
50 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020051 policy: generate
52 - uid: db-secret
53 name: &dbSecretName '{{ include "common.release" . }}-policy-db-secret'
54 type: basicAuth
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010055 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) (hasSuffix "policy-db-secret" (index .Values "mariadb-galera" "db" "externalSecret"))}}'
56 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
57 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020058 passwordPolicy: generate
saul.gill7124a4b2021-09-09 12:02:49 +010059 - uid: policy-app-user-creds
60 name: &policyAppCredsSecret '{{ include "common.release" . }}-policy-app-user-creds'
61 type: basicAuth
62 externalSecret: '{{ tpl (default "" .Values.config.policyAppUserExternalSecret) . }}'
63 login: '{{ .Values.config.policyAppUserName }}'
64 password: '{{ .Values.config.policyAppUserPassword }}'
65 passwordPolicy: generate
rameshiyer27ff176652021-09-21 15:19:05 +010066 - uid: policy-pap-user-creds
67 name: &policyPapCredsSecret '{{ include "common.release" . }}-policy-pap-user-creds'
68 type: basicAuth
69 externalSecret: '{{ tpl (default "" .Values.restServer.policyPapUserExternalSecret) . }}'
70 login: '{{ .Values.restServer.policyPapUserName }}'
71 password: '{{ .Values.restServer.policyPapUserPassword }}'
72 passwordPolicy: required
73 - uid: policy-api-user-creds
74 name: &policyApiCredsSecret '{{ include "common.release" . }}-policy-api-user-creds'
75 type: basicAuth
76 externalSecret: '{{ tpl (default "" .Values.restServer.policyApiUserExternalSecret) . }}'
77 login: '{{ .Values.restServer.policyApiUserName }}'
78 password: '{{ .Values.restServer.policyApiUserPassword }}'
79 passwordPolicy: required
waynedunican368aced2022-02-15 08:27:57 +000080 - uid: pg-root-pass
81 name: &pgRootPassSecretName '{{ include "common.release" . }}-policy-pg-root-pass'
82 type: password
83 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgRootPasswordExternalSecret) .) (hasSuffix "policy-pg-root-pass" .Values.postgres.config.pgRootPasswordExternalSecret) }}'
84 password: '{{ .Values.postgres.config.pgRootpassword }}'
85 policy: generate
86 - uid: pg-user-creds
87 name: &pgUserCredsSecretName '{{ include "common.release" . }}-policy-pg-user-creds'
88 type: basicAuth
89 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "policy-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
90 login: '{{ .Values.postgres.config.pgUserName }}'
91 password: '{{ .Values.postgres.config.pgUserPassword }}'
92 passwordPolicy: generate
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020093
jhhd4258672020-08-09 12:08:08 -050094db: &dbSecretsHook
95 credsExternalSecret: *dbSecretName
96
97policy-api:
98 enabled: true
99 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100100 restServer:
101 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100102 config:
103 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500104policy-pap:
105 enabled: true
106 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100107 restServer:
108 papUserExternalSecret: *policyPapCredsSecret
109 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100110 config:
111 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500112policy-xacml-pdp:
113 enabled: true
114 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100115 config:
116 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500117policy-apex-pdp:
118 enabled: true
119 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100120 config:
121 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500122policy-drools-pdp:
123 enabled: true
124 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100125 config:
126 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500127policy-distribution:
128 enabled: true
129 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100130 config:
131 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000132policy-clamp-ac-k8s-ppnt:
rameshiyer2701b8cc02021-09-21 15:07:50 +0100133 enabled: true
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100134 config:
135 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000136policy-clamp-ac-pf-ppnt:
rameshiyer27ff176652021-09-21 15:19:05 +0100137 enabled: true
138 restServer:
139 apiUserExternalSecret: *policyApiCredsSecret
140 papUserExternalSecret: *policyPapCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100141 config:
142 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000143policy-clamp-ac-http-ppnt:
rameshiyer273c3402d2021-09-21 15:14:39 +0100144 enabled: true
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100145 config:
146 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
aravind.est8d728302022-12-07 12:26:28 +0000147policy-clamp-ac-a1pms-ppnt:
148 enabled: true
149 config:
150 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500151policy-nexus:
jhhbf8d8a92020-09-10 14:01:49 -0500152 enabled: false
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100153 config:
154 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000155policy-clamp-runtime-acm:
saul.gill7124a4b2021-09-09 12:02:49 +0100156 enabled: true
157 db: *dbSecretsHook
158 config:
159 appUserExternalSecret: *policyAppCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100160 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
ktimoneyb3aef7b2021-09-13 08:27:58 +0100161policy-gui:
amatthews736bf372021-12-14 16:04:15 +0000162 enabled: false
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100163 config:
164 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500165
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +0200166#################################################################
jhhd4258672020-08-09 12:08:08 -0500167# DB configuration defaults.
mayankg2703ced85142018-03-20 05:42:53 +0000168#################################################################
jhhd4258672020-08-09 12:08:08 -0500169
mayankg2703ced85142018-03-20 05:42:53 +0000170repository: nexus3.onap.org:10001
kerenj3b697f62017-08-23 11:21:21 +0000171pullPolicy: Always
Alexis de Talhouëtdf4db0b2017-12-11 08:36:25 -0500172
Sylvain Desbureaux7c8c6862020-11-19 18:02:37 +0100173mariadb:
174 image: mariadb:10.5.8
175
jhhd74fe9f2021-04-15 11:04:39 -0500176dbmigrator:
liamfalloncbb72812022-10-21 18:13:29 +0100177 image: onap/policy-db-migrator:2.5.1
jhhd74fe9f2021-04-15 11:04:39 -0500178 schema: policyadmin
179 policy_home: "/opt/app/policy"
180
mayankg2703ced85142018-03-20 05:42:53 +0000181subChartsOnly:
182 enabled: true
BorislavG5f3b6192018-03-25 18:12:38 +0300183
mayankg2703ced85142018-03-20 05:42:53 +0000184# flag to enable debugging - application support required
185debugEnabled: false
186
mayankg2703ced85142018-03-20 05:42:53 +0000187# default number of instances
188replicaCount: 1
189
190nodeSelector: {}
191
192affinity: {}
193
194# probe configuration parameters
195liveness:
196 initialDelaySeconds: 10
197 periodSeconds: 10
198 # necessary to disable liveness probe when setting breakpoints
199 # in debugger so K8s doesn't restart unresponsive container
200 enabled: true
201
202readiness:
203 initialDelaySeconds: 10
204 periodSeconds: 10
205
saul.gill7124a4b2021-09-09 12:02:49 +0100206
207config:
208 policyAppUserName: runtimeUser
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100209 useStrimziKafka: true
210 acRuntimeTopic:
211 name: policy-acruntime-participant
212 partitions: 10
213 retentionMs: 7200000
214 segmentBytes: 1073741824
215 consumer:
216 groupId: policy-group
217 policyPdpPapTopic:
218 name: policy-pdp-pap
219 partitions: 10
220 retentionMs: 7200000
221 segmentBytes: 1073741824
222 consumer:
223 groupId: policy-group
224 policyHeartbeatTopic:
225 name: policy-heartbeat
226 partitions: 10
227 retentionMs: 7200000
228 segmentBytes: 1073741824
229 consumer:
230 groupId: policy-group
231 policyNotificationTopic:
232 name: policy-notification
233 partitions: 10
234 retentionMs: 7200000
235 segmentBytes: 1073741824
236 consumer:
237 groupId: policy-group
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100238 someConfig: blah
saul.gill7124a4b2021-09-09 12:02:49 +0100239
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100240mariadb-galera:
241 # mariadb-galera.config and global.mariadb.config must be equals
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100242 db:
243 user: policy_user
244 # password:
245 externalSecret: *dbSecretName
246 name: &mysqlDbName policyadmin
247 rootUser:
248 externalSecret: *dbRootPassSecretName
249 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100250 # mariadb-galera.service and global.mariadb.service must be equals
251 service: *mariadbService
252 replicaCount: 1
253 persistence:
254 enabled: true
255 mountSubPath: policy/maria/data
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100256 serviceAccount:
257 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100258
waynedunican368aced2022-02-15 08:27:57 +0000259postgresImage: library/postgres:latest
260# application configuration override for postgres
261postgres:
262 nameOverride: &postgresName policy-postgres
263 service:
264 name: *postgresName
265 name2: policy-pg-primary
266 name3: policy-pg-replica
267 container:
268 name:
269 primary: policy-pg-primary
270 replica: policy-pg-replica
271 persistence:
272 mountSubPath: policy/postgres/data
273 mountInitPath: policy
274 config:
275 pgUserName: policy_user
276 pgDatabase: policyadmin
277 pgUserExternalSecret: *pgUserCredsSecretName
278 pgRootPasswordExternalSecret: *pgRootPassSecretName
279
280readinessCheck:
281 wait_for:
282 - '{{ ternary .Values.postgres.service.name "postgres" .Values.global.postgres.localCluster }}'
283
rameshiyer27ff176652021-09-21 15:19:05 +0100284restServer:
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000285 policyPapUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100286 policyPapUserPassword: zb!XztG34
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000287 policyApiUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100288 policyApiUserPassword: zb!XztG34
289
jhhbf8d8a92020-09-10 14:01:49 -0500290# Resource Limit flavor -By Default using small
291# Segregation for Different environment (small, large, or unlimited)
292flavor: small
293resources:
294 small:
295 limits:
296 cpu: 1
297 memory: 4Gi
298 requests:
299 cpu: 100m
300 memory: 1Gi
301 large:
302 limits:
303 cpu: 2
304 memory: 8Gi
305 requests:
306 cpu: 200m
307 memory: 2Gi
308 unlimited: {}
309
farida azmyc1178372021-04-11 12:55:33 +0200310#Pods Service Account
311serviceAccount:
312 nameOverride: policy
313 roles:
314 - read