blob: c9a5a068fbe52c8cb01adf5292e59778e49601a5 [file] [log] [blame]
Michael Mokryafae9972019-03-11 14:46:34 -05001# ============LICENSE_START=======================================================
jhh999c2242021-02-24 12:10:02 -06002# Copyright (C) 2019-2021 AT&T Intellectual Property. All rights reserved.
Michael Mokryafae9972019-03-11 14:46:34 -05003# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 persistence: {}
24
25#################################################################
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020026# Secrets metaconfig
27#################################################################
28secrets:
29 - uid: db-secret
30 type: basicAuth
31 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
32 login: '{{ .Values.db.user }}'
33 password: '{{ .Values.db.password }}'
34 passwordPolicy: required
Dominik Mizync88bcc92020-04-14 18:20:20 +020035 - uid: restserver-creds
36 type: basicAuth
37 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
38 login: '{{ .Values.restServer.user }}'
39 password: '{{ .Values.restServer.password }}'
40 passwordPolicy: required
41 - uid: api-creds
42 type: basicAuth
43 externalSecret: '{{ tpl (default "" .Values.apiServer.credsExternalSecret) . }}'
44 login: '{{ .Values.apiServer.user }}'
45 password: '{{ .Values.apiServer.password }}'
46 passwordPolicy: required
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020047
48#################################################################
Michael Mokryafae9972019-03-11 14:46:34 -050049# Application configuration defaults.
50#################################################################
51# application image
saul.gill82b27e62024-04-26 12:45:10 +010052image: onap/policy-xacml-pdp:3.1.2
Michael Mokryafae9972019-03-11 14:46:34 -050053pullPolicy: Always
54
rameshiyer27bc8a6a42024-03-11 17:18:11 +000055componentName: &componentName policy-xacml-pdp
56
Michael Mokryafae9972019-03-11 14:46:34 -050057# flag to enable debugging - application support required
58debugEnabled: false
59
60# application configuration
61
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020062db:
Andreas Geisslercfd84342023-08-16 17:18:49 +020063 user: policy-user
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020064 password: policy_user
jhhd4258672020-08-09 12:08:08 -050065 service:
66 name: policy-mariadb
67 internalPort: 3306
68
Dominik Mizync88bcc92020-04-14 18:20:20 +020069restServer:
70 user: healthcheck
71 password: zb!XztG34
jhhd4258672020-08-09 12:08:08 -050072
Dominik Mizync88bcc92020-04-14 18:20:20 +020073apiServer:
adheli.tavaresf3656cd2021-11-10 14:54:32 +000074 user: policyadmin
Dominik Mizync88bcc92020-04-14 18:20:20 +020075 password: zb!XztG34
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020076
Michael Mokryafae9972019-03-11 14:46:34 -050077# default number of instances
ramverma39a79a42019-05-02 13:07:36 +000078replicaCount: 1
Michael Mokryafae9972019-03-11 14:46:34 -050079
80nodeSelector: {}
81
82affinity: {}
83
84# probe configuration parameters
85liveness:
86 initialDelaySeconds: 20
87 periodSeconds: 10
88 # necessary to disable liveness probe when setting breakpoints
89 # in debugger so K8s doesn't restart unresponsive container
90 enabled: true
91
92readiness:
93 initialDelaySeconds: 20
94 periodSeconds: 10
95
96service:
97 type: ClusterIP
rameshiyer27bc8a6a42024-03-11 17:18:11 +000098 name: *componentName
Michael Mokryafae9972019-03-11 14:46:34 -050099 internalPort: 6969
Andreas Geisslerf10c5552023-03-21 18:09:46 +0100100 ports:
101 - name: http
102 port: 6969
Michael Mokryafae9972019-03-11 14:46:34 -0500103
104ingress:
105 enabled: false
106
AndrewLamb7ef78ae2023-04-20 16:24:13 +0100107serviceMesh:
108 authorizationPolicy:
109 authorizedPrincipals:
110 - serviceAccount: dcae-datafile-collector-read
111 - serviceAccount: dcae-datalake-admin-ui-read
112 - serviceAccount: dcae-datalake-des-read
113 - serviceAccount: dcae-datalake-feeder-read
114 - serviceAccount: dcae-heartbeat-read
115 - serviceAccount: dcae-hv-ves-collector-read
116 - serviceAccount: dcae-kpi-ms-read
117 - serviceAccount: dcae-pm-mapper-read
118 - serviceAccount: dcae-pmsh-read
119 - serviceAccount: dcae-prh-read
120 - serviceAccount: dcae-restconf-collector-read
121 - serviceAccount: dcae-slice-analysis-ms-read
122 - serviceAccount: dcae-snmptrap-collector-read
123 - serviceAccount: dcae-son-handler-read
124 - serviceAccount: dcae-tcagen2-read
125 - serviceAccount: dcae-ves-collector-read
126 - serviceAccount: dcae-ves-mapper-read
127 - serviceAccount: dcae-ves-openapi-manager-read
rameshiyer27bc8a6a42024-03-11 17:18:11 +0000128 - serviceAccount: strimzi-kafka-read
AndrewLamb7ef78ae2023-04-20 16:24:13 +0100129 - serviceAccount: oof-read
130 - serviceAccount: sdnc-read
131
jhhd4258672020-08-09 12:08:08 -0500132flavor: small
133resources:
134 small:
135 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100136 cpu: "1"
137 memory: "1Gi"
jhhd4258672020-08-09 12:08:08 -0500138 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100139 cpu: "0.5"
140 memory: "1Gi"
jhhd4258672020-08-09 12:08:08 -0500141 large:
142 limits:
Andreas Geissler47537432024-02-27 08:55:23 +0100143 cpu: "2"
144 memory: "2Gi"
jhhd4258672020-08-09 12:08:08 -0500145 requests:
Andreas Geissler47537432024-02-27 08:55:23 +0100146 cpu: "1"
147 memory: "2Gi"
jhhd4258672020-08-09 12:08:08 -0500148 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200149
150#Pods Service Account
151serviceAccount:
rameshiyer27bc8a6a42024-03-11 17:18:11 +0000152 nameOverride: *componentName
farida azmyc1178372021-04-11 12:55:33 +0200153 roles:
154 - read
Rashmi Pujara8b09262022-03-15 21:58:57 -0400155
Rashmi Pujara8b09262022-03-15 21:58:57 -0400156metrics:
157 serviceMonitor:
158 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
159 # The default operator for prometheus enforces the below label.
160 labels:
161 release: prometheus
162 enabled: true
163 port: policy-xacml-pdp
164 interval: 60s
Andreas Geisslerf10c5552023-03-21 18:09:46 +0100165 isHttps: false
Rashmi Pujara8b09262022-03-15 21:58:57 -0400166 basicAuth:
167 enabled: true
168 externalSecretNameSuffix: policy-xacml-pdp-restserver-creds
169 externalSecretUserKey: login
170 externalSecretPasswordKey: password
171 selector:
172 app: '{{ include "common.name" . }}'
173 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
174 release: '{{ include "common.release" . }}'
175 heritage: '{{ .Release.Service }}'
rameshiyer27bc8a6a42024-03-11 17:18:11 +0000176
177config:
178 # Event consumption (kafka) properties
179 kafka:
180 consumer:
181 groupId: policy-xacml-pdp
182 app:
183 listener:
184 policyPdpPapTopic: policy-pdp-pap
185
186# Strimzi Kafka config
187kafkaUser:
188 authenticationType: scram-sha-512
189 acls:
190 - name: policy-xacml-pdp
191 type: group
192 operations: [ Create, Describe, Read, Write ]
193 - name: policy-pdp-pap
194 type: topic
195 patternType: prefix
196 operations: [ Create, Describe, Read, Write ]
197
198