blob: e15f8350a150283c7bc880ada136d3e658e10b3a [file] [log] [blame]
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00001# Copyright © 2017 Amdocs, Bell Canada
jhhd4258672020-08-09 12:08:08 -05002# Modifications Copyright © 2018-2020 AT&T Intellectual Property
efiacorab235f42023-02-15 11:51:52 +00003# Modifications Copyright (C) 2021-2023 Nordix Foundation.
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
mayankg2703ced85142018-03-20 05:42:53 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
efiacor6910bbe2023-03-03 14:53:16 +000021 aafEnabled: false
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010022 mariadb:
23 # '&mariadbConfig' means we "store" the values for later use in the file
24 # with '*mariadbConfig' pointer.
25 config: &mariadbConfig
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010026 mysqlDatabase: policyadmin
27 service: &mariadbService
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010028 name: &policy-mariadb policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010029 internalPort: 3306
Rashmi Pujarec452b52022-04-21 12:29:14 -040030 prometheusEnabled: false
waynedunican368aced2022-02-15 08:27:57 +000031 postgres:
32 localCluster: false
33 service:
34 name: pgset
35 name2: tcp-pgset-primary
36 name3: tcp-pgset-replica
37 container:
38 name: postgres
efiacor6910bbe2023-03-03 14:53:16 +000039 #Strimzi Kafka properties
40 useStrimziKafka: true
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +010041 kafkaBootstrap: strimzi-kafka-bootstrap
42 policyKafkaUser: policy-kafka-user
efiacor6910bbe2023-03-03 14:53:16 +000043 kafkaTopics:
44 acRuntimeTopic:
45 name: policy.clamp-runtime-acm
mayankg2703ced85142018-03-20 05:42:53 +000046
47#################################################################
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020048# Secrets metaconfig
49#################################################################
50secrets:
51 - uid: db-root-password
52 name: &dbRootPassSecretName '{{ include "common.release" . }}-policy-db-root-password'
53 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010054 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .) (hasSuffix "policy-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret"))}}'
55 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020056 policy: generate
57 - uid: db-secret
58 name: &dbSecretName '{{ include "common.release" . }}-policy-db-secret'
59 type: basicAuth
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010060 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) (hasSuffix "policy-db-secret" (index .Values "mariadb-galera" "db" "externalSecret"))}}'
61 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
62 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020063 passwordPolicy: generate
saul.gill7124a4b2021-09-09 12:02:49 +010064 - uid: policy-app-user-creds
65 name: &policyAppCredsSecret '{{ include "common.release" . }}-policy-app-user-creds'
66 type: basicAuth
67 externalSecret: '{{ tpl (default "" .Values.config.policyAppUserExternalSecret) . }}'
68 login: '{{ .Values.config.policyAppUserName }}'
69 password: '{{ .Values.config.policyAppUserPassword }}'
70 passwordPolicy: generate
rameshiyer27ff176652021-09-21 15:19:05 +010071 - uid: policy-pap-user-creds
72 name: &policyPapCredsSecret '{{ include "common.release" . }}-policy-pap-user-creds'
73 type: basicAuth
74 externalSecret: '{{ tpl (default "" .Values.restServer.policyPapUserExternalSecret) . }}'
75 login: '{{ .Values.restServer.policyPapUserName }}'
76 password: '{{ .Values.restServer.policyPapUserPassword }}'
77 passwordPolicy: required
78 - uid: policy-api-user-creds
79 name: &policyApiCredsSecret '{{ include "common.release" . }}-policy-api-user-creds'
80 type: basicAuth
81 externalSecret: '{{ tpl (default "" .Values.restServer.policyApiUserExternalSecret) . }}'
82 login: '{{ .Values.restServer.policyApiUserName }}'
83 password: '{{ .Values.restServer.policyApiUserPassword }}'
84 passwordPolicy: required
waynedunican368aced2022-02-15 08:27:57 +000085 - uid: pg-root-pass
86 name: &pgRootPassSecretName '{{ include "common.release" . }}-policy-pg-root-pass'
87 type: password
88 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgRootPasswordExternalSecret) .) (hasSuffix "policy-pg-root-pass" .Values.postgres.config.pgRootPasswordExternalSecret) }}'
89 password: '{{ .Values.postgres.config.pgRootpassword }}'
90 policy: generate
91 - uid: pg-user-creds
92 name: &pgUserCredsSecretName '{{ include "common.release" . }}-policy-pg-user-creds'
93 type: basicAuth
94 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "policy-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
95 login: '{{ .Values.postgres.config.pgUserName }}'
96 password: '{{ .Values.postgres.config.pgUserPassword }}'
97 passwordPolicy: generate
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020098
jhhd4258672020-08-09 12:08:08 -050099db: &dbSecretsHook
100 credsExternalSecret: *dbSecretName
101
102policy-api:
103 enabled: true
104 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100105 restServer:
106 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100107 config:
108 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500109policy-pap:
110 enabled: true
111 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100112 restServer:
113 papUserExternalSecret: *policyPapCredsSecret
114 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100115 config:
116 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500117policy-xacml-pdp:
118 enabled: true
119 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100120 config:
121 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500122policy-apex-pdp:
123 enabled: true
124 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100125 config:
126 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500127policy-drools-pdp:
128 enabled: true
129 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100130 config:
131 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500132policy-distribution:
133 enabled: true
134 db: *dbSecretsHook
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000135policy-clamp-ac-k8s-ppnt:
rameshiyer2701b8cc02021-09-21 15:07:50 +0100136 enabled: true
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000137policy-clamp-ac-pf-ppnt:
rameshiyer27ff176652021-09-21 15:19:05 +0100138 enabled: true
139 restServer:
140 apiUserExternalSecret: *policyApiCredsSecret
141 papUserExternalSecret: *policyPapCredsSecret
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000142policy-clamp-ac-http-ppnt:
rameshiyer273c3402d2021-09-21 15:14:39 +0100143 enabled: true
aravind.est8d728302022-12-07 12:26:28 +0000144policy-clamp-ac-a1pms-ppnt:
145 enabled: true
aravind.est0879dfc2023-02-22 09:05:50 +0000146policy-clamp-ac-kserve-ppnt:
147 enabled: true
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000148policy-clamp-runtime-acm:
saul.gill7124a4b2021-09-09 12:02:49 +0100149 enabled: true
150 db: *dbSecretsHook
151 config:
152 appUserExternalSecret: *policyAppCredsSecret
efiacor6910bbe2023-03-03 14:53:16 +0000153policy-nexus:
154 enabled: false
155 config:
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100156 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
ktimoneyb3aef7b2021-09-13 08:27:58 +0100157policy-gui:
amatthews736bf372021-12-14 16:04:15 +0000158 enabled: false
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100159 config:
160 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500161
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +0200162#################################################################
jhhd4258672020-08-09 12:08:08 -0500163# DB configuration defaults.
mayankg2703ced85142018-03-20 05:42:53 +0000164#################################################################
jhhd4258672020-08-09 12:08:08 -0500165
jhhd74fe9f2021-04-15 11:04:39 -0500166dbmigrator:
saul.gill5e611402023-03-02 11:49:23 +0000167 image: onap/policy-db-migrator:2.6.1
jhhd74fe9f2021-04-15 11:04:39 -0500168 schema: policyadmin
169 policy_home: "/opt/app/policy"
170
mayankg2703ced85142018-03-20 05:42:53 +0000171subChartsOnly:
172 enabled: true
BorislavG5f3b6192018-03-25 18:12:38 +0300173
mayankg2703ced85142018-03-20 05:42:53 +0000174# flag to enable debugging - application support required
175debugEnabled: false
176
mayankg2703ced85142018-03-20 05:42:53 +0000177# default number of instances
178replicaCount: 1
179
180nodeSelector: {}
181
182affinity: {}
183
184# probe configuration parameters
185liveness:
186 initialDelaySeconds: 10
187 periodSeconds: 10
188 # necessary to disable liveness probe when setting breakpoints
189 # in debugger so K8s doesn't restart unresponsive container
190 enabled: true
191
192readiness:
193 initialDelaySeconds: 10
194 periodSeconds: 10
195
saul.gill7124a4b2021-09-09 12:02:49 +0100196
197config:
198 policyAppUserName: runtimeUser
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100199 useStrimziKafka: true
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100200 policyPdpPapTopic:
201 name: policy-pdp-pap
202 partitions: 10
203 retentionMs: 7200000
204 segmentBytes: 1073741824
205 consumer:
206 groupId: policy-group
207 policyHeartbeatTopic:
208 name: policy-heartbeat
209 partitions: 10
210 retentionMs: 7200000
211 segmentBytes: 1073741824
212 consumer:
213 groupId: policy-group
214 policyNotificationTopic:
215 name: policy-notification
216 partitions: 10
217 retentionMs: 7200000
218 segmentBytes: 1073741824
219 consumer:
220 groupId: policy-group
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100221 someConfig: blah
saul.gill7124a4b2021-09-09 12:02:49 +0100222
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100223mariadb-galera:
224 # mariadb-galera.config and global.mariadb.config must be equals
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100225 db:
226 user: policy_user
227 # password:
228 externalSecret: *dbSecretName
229 name: &mysqlDbName policyadmin
230 rootUser:
231 externalSecret: *dbRootPassSecretName
232 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100233 # mariadb-galera.service and global.mariadb.service must be equals
234 service: *mariadbService
235 replicaCount: 1
236 persistence:
237 enabled: true
238 mountSubPath: policy/maria/data
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100239 serviceAccount:
240 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100241
waynedunican368aced2022-02-15 08:27:57 +0000242postgresImage: library/postgres:latest
243# application configuration override for postgres
244postgres:
245 nameOverride: &postgresName policy-postgres
246 service:
247 name: *postgresName
248 name2: policy-pg-primary
249 name3: policy-pg-replica
250 container:
251 name:
252 primary: policy-pg-primary
253 replica: policy-pg-replica
254 persistence:
255 mountSubPath: policy/postgres/data
256 mountInitPath: policy
257 config:
258 pgUserName: policy_user
259 pgDatabase: policyadmin
260 pgUserExternalSecret: *pgUserCredsSecretName
261 pgRootPasswordExternalSecret: *pgRootPassSecretName
262
263readinessCheck:
264 wait_for:
265 - '{{ ternary .Values.postgres.service.name "postgres" .Values.global.postgres.localCluster }}'
266
rameshiyer27ff176652021-09-21 15:19:05 +0100267restServer:
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000268 policyPapUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100269 policyPapUserPassword: zb!XztG34
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000270 policyApiUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100271 policyApiUserPassword: zb!XztG34
272
jhhbf8d8a92020-09-10 14:01:49 -0500273# Resource Limit flavor -By Default using small
274# Segregation for Different environment (small, large, or unlimited)
275flavor: small
276resources:
277 small:
278 limits:
279 cpu: 1
280 memory: 4Gi
281 requests:
282 cpu: 100m
283 memory: 1Gi
284 large:
285 limits:
286 cpu: 2
287 memory: 8Gi
288 requests:
289 cpu: 200m
290 memory: 2Gi
291 unlimited: {}
292
farida azmyc1178372021-04-11 12:55:33 +0200293#Pods Service Account
294serviceAccount:
295 nameOverride: policy
296 roles:
297 - read