blob: cef846cb0e8b03bafee9ce72bd343e5961dc6137 [file] [log] [blame]
mmis95971132018-07-17 00:13:13 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
Sirisha_Manchikantib402a592022-09-09 12:01:20 +01004# Modifications Copyright © 2022 Nordix Foundation
Andreas Geisslerf10c5552023-03-21 18:09:46 +01005# Modification (C) 2023 Deutsche Telekom. All rights reserved.
mmis95971132018-07-17 00:13:13 +01006# ================================================================================
7# Licensed under the Apache License, Version 2.0 (the "License");
8# you may not use this file except in compliance with the License.
9# You may obtain a copy of the License at
10#
11# http://www.apache.org/licenses/LICENSE-2.0
12#
13# Unless required by applicable law or agreed to in writing, software
14# distributed under the License is distributed on an "AS IS" BASIS,
15# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16# See the License for the specific language governing permissions and
17# limitations under the License.
18#
19# SPDX-License-Identifier: Apache-2.0
20# ============LICENSE_END=========================================================
21
22#################################################################
23# Global configuration defaults.
24#################################################################
25global:
26 nodePortPrefix: 302
27 persistence: {}
28
29#################################################################
Dominik Mizynb8c44b42020-04-21 10:48:27 +020030# Secrets metaconfig
31#################################################################
32secrets:
33 - uid: restserver-creds
34 type: basicAuth
35 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
36 login: '{{ .Values.restServer.user }}'
37 password: '{{ .Values.restServer.password }}'
Sirisha_Manchikantib402a592022-09-09 12:01:20 +010038 - uid: policy-kafka-user
39 externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}'
40 type: genericKV
41 envs:
42 - name: sasl.jaas.config
43 value: '{{ .Values.config.someConfig }}'
44 policy: generate
Dominik Mizynb8c44b42020-04-21 10:48:27 +020045
46#################################################################
mmis95971132018-07-17 00:13:13 +010047# Application configuration defaults.
48#################################################################
49# application image
saul.gill5e611402023-03-02 11:49:23 +000050image: onap/policy-apex-pdp:2.9.1
mmis95971132018-07-17 00:13:13 +010051pullPolicy: Always
52
53# flag to enable debugging - application support required
54debugEnabled: false
55
56# application configuration
57
Dominik Mizynb8c44b42020-04-21 10:48:27 +020058restServer:
59 user: healthcheck
60 password: zb!XztG34
Dominik Mizynb8c44b42020-04-21 10:48:27 +020061
mmis95971132018-07-17 00:13:13 +010062# default number of instances
63replicaCount: 1
64
65nodeSelector: {}
66
67affinity: {}
68
69# probe configuration parameters
70liveness:
71 initialDelaySeconds: 20
72 periodSeconds: 10
73 # necessary to disable liveness probe when setting breakpoints
74 # in debugger so K8s doesn't restart unresponsive container
75 enabled: true
76
77readiness:
78 initialDelaySeconds: 20
79 periodSeconds: 10
80
81service:
jhh59ce22d2019-05-14 17:59:36 -050082 type: ClusterIP
mmis95971132018-07-17 00:13:13 +010083 name: policy-apex-pdp
jhh59ce22d2019-05-14 17:59:36 -050084 internalPort: 6969
Andreas Geisslerf10c5552023-03-21 18:09:46 +010085 ports:
86 - name: http
87 port: 6969
mmis95971132018-07-17 00:13:13 +010088
89ingress:
90 enabled: false
91
AndrewLamb7ef78ae2023-04-20 16:24:13 +010092serviceMesh:
93 authorizationPolicy:
94 authorizedPrincipals:
95 - serviceAccount: message-router-read
96
vaibhavjayas4136f5d2018-08-17 07:01:05 +000097# Resource Limit flavor -By Default using small
vaibhavjayas4136f5d2018-08-17 07:01:05 +000098# Segregation for Different environment (Small and Large)
jhhd4258672020-08-09 12:08:08 -050099flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000100resources:
101 small:
102 limits:
103 cpu: 1
104 memory: 4Gi
105 requests:
106 cpu: 10m
107 memory: 1Gi
108 large:
109 limits:
110 cpu: 2
111 memory: 8Gi
112 requests:
113 cpu: 20m
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000114 memory: 2Gi
Pamela Dragosh54048d32018-11-09 07:09:41 -0500115 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200116
117#Pods Service Account
118serviceAccount:
119 nameOverride: policy-apex-pdp
120 roles:
121 - read
Rashmi Pujara8b09262022-03-15 21:58:57 -0400122
Rashmi Pujara8b09262022-03-15 21:58:57 -0400123metrics:
124 serviceMonitor:
125 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
126 # The default operator for prometheus enforces the below label.
127 labels:
128 release: prometheus
129 enabled: true
130 port: policy-apex-pdp
131 interval: 60s
Andreas Geisslerf10c5552023-03-21 18:09:46 +0100132 isHttps: false
Rashmi Pujara8b09262022-03-15 21:58:57 -0400133 basicAuth:
134 enabled: true
135 externalSecretNameSuffix: policy-apex-pdp-restserver-creds
136 externalSecretUserKey: login
137 externalSecretPasswordKey: password
138 selector:
139 app: '{{ include "common.name" . }}'
140 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
141 release: '{{ include "common.release" . }}'
142 heritage: '{{ .Release.Service }}'
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100143
144# application configuration
145config:
146# Event consumption (kafka) properties
147 useStrimziKafka: true
148 kafkaBootstrap: strimzi-kafka-bootstrap
149 kafka:
150 consumer:
151 groupId: policy-group
152 app:
153 listener:
154 policyPdpPapTopic: policy-pdp-pap
155# If targeting a custom kafka cluster, ie useStrimziKakfa: false
156# uncomment below config and target your kafka bootstrap servers,
157# along with any other security config.
158#
159# eventConsumption:
160# spring.kafka.bootstrap-servers: <kafka-bootstrap>:9092
161# spring.kafka.security.protocol: PLAINTEXT
162# spring.kafka.consumer.group-id: policy-group
163#
164# Any new property can be added in the env by setting in overrides in the format mentioned below
165# All the added properties must be in "key: value" format instead of yaml.