blob: 79fed0c79c72a5b5168732268b848c3b5aa0e3ee [file] [log] [blame]
mmis95971132018-07-17 00:13:13 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhhd2b9ed82019-12-10 17:15:28 -06003# Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
mmis95971132018-07-17 00:13:13 +01004# ================================================================================
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16#
17# SPDX-License-Identifier: Apache-2.0
18# ============LICENSE_END=========================================================
19
20#################################################################
21# Global configuration defaults.
22#################################################################
23global:
24 nodePortPrefix: 302
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +020025 readinessImage: onap/oom/readiness:3.0.1
jhhd4258672020-08-09 12:08:08 -050026 envsubstImage: dibi/envsubst
27 aafEnabled: true
mmis95971132018-07-17 00:13:13 +010028 persistence: {}
29
30#################################################################
Dominik Mizynb8c44b42020-04-21 10:48:27 +020031# Secrets metaconfig
32#################################################################
33secrets:
34 - uid: restserver-creds
35 type: basicAuth
36 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
37 login: '{{ .Values.restServer.user }}'
38 password: '{{ .Values.restServer.password }}'
39 - uid: truststore-pass
40 type: password
jhhd4258672020-08-09 12:08:08 -050041 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
42 password: '{{ .Values.certStores.trustStorePassword }}'
43 passwordPolicy: required
44 - uid: keystore-pass
45 type: password
46 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
47 password: '{{ .Values.certStores.keyStorePassword }}'
48 passwordPolicy: required
Dominik Mizynb8c44b42020-04-21 10:48:27 +020049
50#################################################################
mmis95971132018-07-17 00:13:13 +010051# Application configuration defaults.
52#################################################################
53# application image
54repository: nexus3.onap.org:10001
jhha7dbd022020-07-13 10:55:47 -050055image: onap/policy-apex-pdp:2.4.0
mmis95971132018-07-17 00:13:13 +010056pullPolicy: Always
57
58# flag to enable debugging - application support required
59debugEnabled: false
60
61# application configuration
62
Dominik Mizynb8c44b42020-04-21 10:48:27 +020063restServer:
64 user: healthcheck
65 password: zb!XztG34
66truststore:
67 password: Pol1cy_0nap
jhhd4258672020-08-09 12:08:08 -050068certStores:
69 keyStorePassword: Pol1cy_0nap
70 trustStorePassword: Pol1cy_0nap
71
72certInitializer:
73 nameOverride: policy-apex-pdp-cert-initializer
74 aafDeployFqi: deployer@people.osaaf.org
75 aafDeployPass: demo123456!
76 fqdn: policy
77 fqi: policy@policy.onap.org
78 public_fqdn: policy.onap.org
79 cadi_latitude: "0.0"
80 cadi_longitude: "0.0"
81 credsPath: /opt/app/osaaf/local
82 app_ns: org.osaaf.aaf
83 uid: 101
84 gid: 102
85 aaf_add_config: >
86 /opt/app/aaf_config/bin/agent.sh;
87 export $(/opt/app/aaf_config/bin/agent.sh local showpass
88 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
89 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
90 echo "export KEYSTORE_PASSWORD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
91 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
Dominik Mizynb8c44b42020-04-21 10:48:27 +020092
mmis95971132018-07-17 00:13:13 +010093# default number of instances
94replicaCount: 1
95
96nodeSelector: {}
97
98affinity: {}
99
100# probe configuration parameters
101liveness:
102 initialDelaySeconds: 20
103 periodSeconds: 10
104 # necessary to disable liveness probe when setting breakpoints
105 # in debugger so K8s doesn't restart unresponsive container
106 enabled: true
107
108readiness:
109 initialDelaySeconds: 20
110 periodSeconds: 10
111
112service:
jhh59ce22d2019-05-14 17:59:36 -0500113 type: ClusterIP
mmis95971132018-07-17 00:13:13 +0100114 name: policy-apex-pdp
115 portName: policy-apex-pdp
a.sreekumar7f4efaf2019-04-16 16:24:01 +0000116 externalPort: 6969
jhh59ce22d2019-05-14 17:59:36 -0500117 internalPort: 6969
mmis95971132018-07-17 00:13:13 +0100118 nodePort: 37
119
120ingress:
121 enabled: false
122
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000123# Resource Limit flavor -By Default using small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000124# Segregation for Different environment (Small and Large)
jhhd4258672020-08-09 12:08:08 -0500125flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000126resources:
127 small:
128 limits:
129 cpu: 1
130 memory: 4Gi
131 requests:
132 cpu: 10m
133 memory: 1Gi
134 large:
135 limits:
136 cpu: 2
137 memory: 8Gi
138 requests:
139 cpu: 20m
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000140 memory: 2Gi
Pamela Dragosh54048d32018-11-09 07:09:41 -0500141 unlimited: {}