blob: 21e9df41e6a51bc8020d54e593c8bb7349ebf2ae [file] [log] [blame]
mmis95971132018-07-17 00:13:13 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhhd2b9ed82019-12-10 17:15:28 -06003# Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
mmis95971132018-07-17 00:13:13 +01004# ================================================================================
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16#
17# SPDX-License-Identifier: Apache-2.0
18# ============LICENSE_END=========================================================
19
20#################################################################
21# Global configuration defaults.
22#################################################################
23global:
24 nodePortPrefix: 302
jhhd4258672020-08-09 12:08:08 -050025 readinessRepository: oomk8s
26 readinessImage: readiness-check:2.0.0
27 envsubstImage: dibi/envsubst
28 aafEnabled: true
mmis95971132018-07-17 00:13:13 +010029 persistence: {}
30
31#################################################################
Dominik Mizynb8c44b42020-04-21 10:48:27 +020032# Secrets metaconfig
33#################################################################
34secrets:
35 - uid: restserver-creds
36 type: basicAuth
37 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
38 login: '{{ .Values.restServer.user }}'
39 password: '{{ .Values.restServer.password }}'
40 - uid: truststore-pass
41 type: password
jhhd4258672020-08-09 12:08:08 -050042 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
43 password: '{{ .Values.certStores.trustStorePassword }}'
44 passwordPolicy: required
45 - uid: keystore-pass
46 type: password
47 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
48 password: '{{ .Values.certStores.keyStorePassword }}'
49 passwordPolicy: required
Dominik Mizynb8c44b42020-04-21 10:48:27 +020050
51#################################################################
mmis95971132018-07-17 00:13:13 +010052# Application configuration defaults.
53#################################################################
54# application image
55repository: nexus3.onap.org:10001
jhha7dbd022020-07-13 10:55:47 -050056image: onap/policy-apex-pdp:2.4.0
mmis95971132018-07-17 00:13:13 +010057pullPolicy: Always
58
59# flag to enable debugging - application support required
60debugEnabled: false
61
62# application configuration
63
Dominik Mizynb8c44b42020-04-21 10:48:27 +020064restServer:
65 user: healthcheck
66 password: zb!XztG34
67truststore:
68 password: Pol1cy_0nap
jhhd4258672020-08-09 12:08:08 -050069certStores:
70 keyStorePassword: Pol1cy_0nap
71 trustStorePassword: Pol1cy_0nap
72
73certInitializer:
74 nameOverride: policy-apex-pdp-cert-initializer
75 aafDeployFqi: deployer@people.osaaf.org
76 aafDeployPass: demo123456!
77 fqdn: policy
78 fqi: policy@policy.onap.org
79 public_fqdn: policy.onap.org
80 cadi_latitude: "0.0"
81 cadi_longitude: "0.0"
82 credsPath: /opt/app/osaaf/local
83 app_ns: org.osaaf.aaf
84 uid: 101
85 gid: 102
86 aaf_add_config: >
87 /opt/app/aaf_config/bin/agent.sh;
88 export $(/opt/app/aaf_config/bin/agent.sh local showpass
89 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
90 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
91 echo "export KEYSTORE_PASSWORD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
92 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
Dominik Mizynb8c44b42020-04-21 10:48:27 +020093
mmis95971132018-07-17 00:13:13 +010094# default number of instances
95replicaCount: 1
96
97nodeSelector: {}
98
99affinity: {}
100
101# probe configuration parameters
102liveness:
103 initialDelaySeconds: 20
104 periodSeconds: 10
105 # necessary to disable liveness probe when setting breakpoints
106 # in debugger so K8s doesn't restart unresponsive container
107 enabled: true
108
109readiness:
110 initialDelaySeconds: 20
111 periodSeconds: 10
112
113service:
jhh59ce22d2019-05-14 17:59:36 -0500114 type: ClusterIP
mmis95971132018-07-17 00:13:13 +0100115 name: policy-apex-pdp
116 portName: policy-apex-pdp
a.sreekumar7f4efaf2019-04-16 16:24:01 +0000117 externalPort: 6969
jhh59ce22d2019-05-14 17:59:36 -0500118 internalPort: 6969
mmis95971132018-07-17 00:13:13 +0100119 nodePort: 37
120
121ingress:
122 enabled: false
123
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000124# Resource Limit flavor -By Default using small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000125# Segregation for Different environment (Small and Large)
jhhd4258672020-08-09 12:08:08 -0500126flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000127resources:
128 small:
129 limits:
130 cpu: 1
131 memory: 4Gi
132 requests:
133 cpu: 10m
134 memory: 1Gi
135 large:
136 limits:
137 cpu: 2
138 memory: 8Gi
139 requests:
140 cpu: 20m
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000141 memory: 2Gi
Pamela Dragosh54048d32018-11-09 07:09:41 -0500142 unlimited: {}