blob: 6b2d9a14eb6dee3301814bfc93fb2f19b7604868 [file] [log] [blame]
jhhd74fe9f2021-04-15 11:04:39 -05001# Copyright © 2017 Amdocs
2# Copyright © 2017, 2021 Bell Canada
jhh0d1c0e82022-04-08 14:36:15 -05003# Modifications Copyright © 2018-2022 AT&T Intellectual Property
mayankg2703ced85142018-03-20 05:42:53 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17#################################################################
18# Global configuration defaults.
19#################################################################
20global:
21 nodePortPrefix: 302
jhh01096592019-09-04 07:47:25 -050022
mayankg2703ced85142018-03-20 05:42:53 +000023#################################################################
Krzysztof Opasiak68b1c922020-03-26 23:59:36 +010024# Secrets metaconfig
25#################################################################
26secrets:
27 - uid: db-secret
28 type: basicAuth
29 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
30 login: '{{ .Values.db.user }}'
31 password: '{{ .Values.db.password }}'
32 passwordPolicy: required
jhh0d1c0e82022-04-08 14:36:15 -050033 - uid: telemetry-creds
34 type: basicAuth
35 externalSecret: '{{ tpl (default "" .Values.telemetry.credsExternalSecret) . }}'
36 login: '{{ .Values.telemetry.user }}'
37 password: '{{ .Values.telemetry.password }}'
38 passwordPolicy: required
Krzysztof Opasiak68b1c922020-03-26 23:59:36 +010039
40#################################################################
mayankg2703ced85142018-03-20 05:42:53 +000041# Application configuration defaults.
42#################################################################
43# application image
liamfallon2c51ce82022-11-29 14:53:18 +000044image: onap/policy-pdpd-cl:1.11.2
mayankg2703ced85142018-03-20 05:42:53 +000045pullPolicy: Always
46
47# flag to enable debugging - application support required
48debugEnabled: false
49
mayankg2703ced85142018-03-20 05:42:53 +000050# default number of instances
Jorge Hernandezd9f75452018-06-04 11:18:52 -050051replicaCount: 1
mayankg2703ced85142018-03-20 05:42:53 +000052
53nodeSelector: {}
54
55affinity: {}
56
57# probe configuration parameters
58liveness:
Jorge Hernandez432aa312018-06-04 18:20:43 -050059 initialDelaySeconds: 180
jhh0d1c0e82022-04-08 14:36:15 -050060 periodSeconds: 60
61 timeoutSeconds: 10
mayankg2703ced85142018-03-20 05:42:53 +000062 # necessary to disable liveness probe when setting breakpoints
63 # in debugger so K8s doesn't restart unresponsive container
Jorge Hernandez328eadb2018-05-15 07:52:21 -050064 enabled: true
mayankg2703ced85142018-03-20 05:42:53 +000065
66readiness:
Jorge Hernandezd9f75452018-06-04 11:18:52 -050067 initialDelaySeconds: 60
mayankg2703ced85142018-03-20 05:42:53 +000068 periodSeconds: 10
69
70service:
jhh59ce22d2019-05-14 17:59:36 -050071 type: ClusterIP
jhhd4258672020-08-09 12:08:08 -050072 name: policy-drools-pdp
amatthews736bf372021-12-14 16:04:15 +000073 portName: http
jhh59ce22d2019-05-14 17:59:36 -050074 internalPort: 6969
mayankg2703ced85142018-03-20 05:42:53 +000075 externalPort: 6969
76 nodePort: 17
jhh59ce22d2019-05-14 17:59:36 -050077 internalPort2: 9696
mayankg2703ced85142018-03-20 05:42:53 +000078 externalPort2: 9696
79 nodePort2: 21
80
81ingress:
82 enabled: false
83
jhh01096592019-09-04 07:47:25 -050084# Default installation values to be overridden
85
jhhd4258672020-08-09 12:08:08 -050086certInitializer:
87 nameOverride: policy-drools-pdp-cert-initializer
88 aafDeployFqi: deployer@people.osaaf.org
89 aafDeployPass: demo123456!
90 fqdn: policy
91 fqi: policy@policy.onap.org
92 public_fqdn: policy.onap.org
93 cadi_latitude: "0.0"
94 cadi_longitude: "0.0"
95 credsPath: /opt/app/osaaf/local
96 app_ns: org.osaaf.aaf
jhh32367fc2021-03-10 13:10:47 -060097 uid: 100
98 gid: 101
jhhd4258672020-08-09 12:08:08 -050099 aaf_add_config: >
jhhd4258672020-08-09 12:08:08 -0500100 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
101 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
jhh32367fc2021-03-10 13:10:47 -0600102 echo "export CADI_KEYFILE='{{ .Values.credsPath }}/org.onap.policy.keyfile'" >> {{ .Values.credsPath }}/.ci;
jhhd4258672020-08-09 12:08:08 -0500103 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
104
jhh01096592019-09-04 07:47:25 -0500105server:
jhhed6839f2020-05-08 12:28:27 -0500106 jvmOpts: -server -XshowSettings:vm
jhh01096592019-09-04 07:47:25 -0500107
108aaf:
jhh8534fea2019-09-20 14:35:20 -0500109 enabled: "false"
jhh01096592019-09-04 07:47:25 -0500110
111keystore:
112 password: Pol1cy_0nap
113
114truststore:
115 password: Pol1cy_0nap
116
117telemetry:
118 user: demo@people.osaaf.org
119 password: demo123456!
120
121nexus:
jhhd4258672020-08-09 12:08:08 -0500122 name: policy-nexus
123 port: 8081
jhh8534fea2019-09-20 14:35:20 -0500124 user: admin
jhh01096592019-09-04 07:47:25 -0500125 password: admin123
jhhd2b9ed82019-12-10 17:15:28 -0600126 offline: true
jhh01096592019-09-04 07:47:25 -0500127
128db:
jhhd4258672020-08-09 12:08:08 -0500129 name: policy-mariadb
jhh01096592019-09-04 07:47:25 -0500130 user: policy_user
131 password: policy_user
132
133pap:
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000134 user: policyadmin
jhh01096592019-09-04 07:47:25 -0500135 password: zb!XztG34
136
137pdp:
138 user: healthcheck
139 password: zb!XztG34
140
jhhdf5484e2020-04-06 15:08:35 -0500141papl:
142 user: testpap
143 password: alpha123
144
145pdpl:
146 user: testpdp
147 password: alpha123
148
jhh01096592019-09-04 07:47:25 -0500149aai:
150 user: policy@policy.onap.org
151 password: demo123456!
152
153so:
154 user: InfraPortalClient
155 password: password1$
156
157vfc:
158 user:
159 password:
160
161sdnc:
162 user: admin
163 password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
164
165dmaap:
166 brmsgw:
167 key:
168 password:
169 pap:
170 key:
171 password:
172
Rashmi Pujar3cfa4cc2019-10-17 16:05:50 -0400173cds:
174 grpc:
175 user: ccsdkapps
176 password: ccsdkapps
177 svcName: cds-blueprints-processor-grpc
178 svcPort: 9111
179
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000180# Resource Limit flavor -By Default using small
jhhd4258672020-08-09 12:08:08 -0500181# Segregation for Different environment (small, large, or unlimited)
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000182flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000183resources:
184 small:
185 limits:
186 cpu: 1
187 memory: 4Gi
188 requests:
189 cpu: 100m
190 memory: 1Gi
191 large:
192 limits:
193 cpu: 2
194 memory: 8Gi
195 requests:
196 cpu: 200m
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000197 memory: 2Gi
Pamela Dragosh54048d32018-11-09 07:09:41 -0500198 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200199
200#Pods Service Account
201serviceAccount:
202 nameOverride: policy-drools-pdp
203 roles:
204 - read
jhh0d1c0e82022-04-08 14:36:15 -0500205
jhh0d1c0e82022-04-08 14:36:15 -0500206metrics:
207 serviceMonitor:
208 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
209 # The default operator for prometheus enforces the below label.
210 labels:
211 release: prometheus
212 enabled: true
213 port: policy-drools-pdp-9696
214 interval: 60s
215 isHttps: true
216 basicAuth:
217 enabled: true
218 externalSecretNameSuffix: policy-drools-pdp-telemetry-creds
219 externalSecretUserKey: login
220 externalSecretPasswordKey: password
221 selector:
222 app: '{{ include "common.name" . }}'
223 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
224 release: '{{ include "common.release" . }}'
225 heritage: '{{ .Release.Service }}'