blob: 3fd1a26f366ebad6ca52891b6fa9ffb91521417e [file] [log] [blame]
mmis95971132018-07-17 00:13:13 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
Sirisha_Manchikantib402a592022-09-09 12:01:20 +01004# Modifications Copyright © 2022 Nordix Foundation
Andreas Geisslerf10c5552023-03-21 18:09:46 +01005# Modification (C) 2023 Deutsche Telekom. All rights reserved.
mmis95971132018-07-17 00:13:13 +01006# ================================================================================
7# Licensed under the Apache License, Version 2.0 (the "License");
8# you may not use this file except in compliance with the License.
9# You may obtain a copy of the License at
10#
11# http://www.apache.org/licenses/LICENSE-2.0
12#
13# Unless required by applicable law or agreed to in writing, software
14# distributed under the License is distributed on an "AS IS" BASIS,
15# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16# See the License for the specific language governing permissions and
17# limitations under the License.
18#
19# SPDX-License-Identifier: Apache-2.0
20# ============LICENSE_END=========================================================
21
22#################################################################
23# Global configuration defaults.
24#################################################################
25global:
26 nodePortPrefix: 302
27 persistence: {}
28
29#################################################################
Dominik Mizynb8c44b42020-04-21 10:48:27 +020030# Secrets metaconfig
31#################################################################
32secrets:
33 - uid: restserver-creds
34 type: basicAuth
35 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
36 login: '{{ .Values.restServer.user }}'
37 password: '{{ .Values.restServer.password }}'
Sirisha_Manchikantib402a592022-09-09 12:01:20 +010038 - uid: policy-kafka-user
39 externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}'
40 type: genericKV
41 envs:
42 - name: sasl.jaas.config
43 value: '{{ .Values.config.someConfig }}'
44 policy: generate
Dominik Mizynb8c44b42020-04-21 10:48:27 +020045
46#################################################################
mmis95971132018-07-17 00:13:13 +010047# Application configuration defaults.
48#################################################################
49# application image
saul.gill82b27e62024-04-26 12:45:10 +010050image: onap/policy-apex-pdp:3.1.2
mmis95971132018-07-17 00:13:13 +010051pullPolicy: Always
52
53# flag to enable debugging - application support required
54debugEnabled: false
55
56# application configuration
57
Dominik Mizynb8c44b42020-04-21 10:48:27 +020058restServer:
59 user: healthcheck
60 password: zb!XztG34
Dominik Mizynb8c44b42020-04-21 10:48:27 +020061
mmis95971132018-07-17 00:13:13 +010062# default number of instances
63replicaCount: 1
64
65nodeSelector: {}
66
67affinity: {}
68
69# probe configuration parameters
70liveness:
71 initialDelaySeconds: 20
72 periodSeconds: 10
73 # necessary to disable liveness probe when setting breakpoints
74 # in debugger so K8s doesn't restart unresponsive container
75 enabled: true
76
77readiness:
78 initialDelaySeconds: 20
79 periodSeconds: 10
80
81service:
jhh59ce22d2019-05-14 17:59:36 -050082 type: ClusterIP
mmis95971132018-07-17 00:13:13 +010083 name: policy-apex-pdp
jhh59ce22d2019-05-14 17:59:36 -050084 internalPort: 6969
Andreas Geisslerf10c5552023-03-21 18:09:46 +010085 ports:
86 - name: http
87 port: 6969
mmis95971132018-07-17 00:13:13 +010088
89ingress:
90 enabled: false
91
AndrewLamb7ef78ae2023-04-20 16:24:13 +010092serviceMesh:
93 authorizationPolicy:
94 authorizedPrincipals:
rameshiyer27bc8a6a42024-03-11 17:18:11 +000095 - serviceAccount: strimzi-kafka-read
AndrewLamb7ef78ae2023-04-20 16:24:13 +010096
vaibhavjayas4136f5d2018-08-17 07:01:05 +000097# Resource Limit flavor -By Default using small
vaibhavjayas4136f5d2018-08-17 07:01:05 +000098# Segregation for Different environment (Small and Large)
jhhd4258672020-08-09 12:08:08 -050099flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000100resources:
101 small:
102 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100103 cpu: "1"
104 memory: "1Gi"
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000105 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100106 cpu: "0.5"
107 memory: "1Gi"
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000108 large:
109 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100110 cpu: "2"
111 memory: "2Gi"
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000112 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100113 cpu: "1"
114 memory: "2Gi"
Pamela Dragosh54048d32018-11-09 07:09:41 -0500115 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200116
117#Pods Service Account
118serviceAccount:
119 nameOverride: policy-apex-pdp
120 roles:
121 - read
Rashmi Pujara8b09262022-03-15 21:58:57 -0400122
Rashmi Pujara8b09262022-03-15 21:58:57 -0400123metrics:
124 serviceMonitor:
125 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
126 # The default operator for prometheus enforces the below label.
127 labels:
128 release: prometheus
129 enabled: true
130 port: policy-apex-pdp
131 interval: 60s
Andreas Geisslerf10c5552023-03-21 18:09:46 +0100132 isHttps: false
Rashmi Pujara8b09262022-03-15 21:58:57 -0400133 basicAuth:
134 enabled: true
135 externalSecretNameSuffix: policy-apex-pdp-restserver-creds
136 externalSecretUserKey: login
137 externalSecretPasswordKey: password
138 selector:
139 app: '{{ include "common.name" . }}'
140 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
141 release: '{{ include "common.release" . }}'
142 heritage: '{{ .Release.Service }}'
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100143
144# application configuration
145config:
146# Event consumption (kafka) properties
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100147 kafka:
148 consumer:
saul.gillef208b02023-04-26 16:16:05 +0100149 groupId: policy-apex
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100150 app:
151 listener:
152 policyPdpPapTopic: policy-pdp-pap
rameshiyer27bc8a6a42024-03-11 17:18:11 +0000153
saul.gillef208b02023-04-26 16:16:05 +0100154kafkaUser:
155 authenticationType: scram-sha-512
156 acls:
157 - name: policy-apex
158 type: group
159 operations: [Create, Describe, Read, Write]
160 - name: policy-pdp-pap
161 type: topic
162 patternType: prefix
163 operations: [Create, Describe, Read, Write]
164 - name: policy-heartbeat
165 type: topic
166 patternType: prefix
167 operations: [Create, Describe, Read, Write]