blob: 6799635776b86b11a6a5a82e58beb1f98829e645 [file] [log] [blame]
aravind.est8d728302022-12-07 12:26:28 +00001# ============LICENSE_START=======================================================
2# Copyright (C) 2022 Nordix Foundation.
3# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 persistence: {}
24 aafEnabled: false
25
26#################################################################
27# Secrets metaconfig
28#################################################################
29secrets:
30 - uid: restserver-secret
31 type: basicAuth
32 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
33 login: '{{ .Values.restServer.user }}'
34 password: '{{ .Values.restServer.password }}'
35 passwordPolicy: required
36 - uid: keystore-password
37 type: password
38 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
39 password: '{{ .Values.certStores.keyStorePassword }}'
40 passwordPolicy: required
41 - uid: truststore-password
42 type: password
43 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
44 password: '{{ .Values.certStores.trustStorePassword }}'
45 passwordPolicy: required
46 - uid: policy-kafka-user
47 externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}'
48 type: genericKV
49 envs:
50 - name: sasl.jaas.config
51 value: '{{ .Values.config.someConfig }}'
52 policy: generate
53
54certStores:
55 keyStorePassword: Pol1cy_0nap
56 trustStorePassword: Pol1cy_0nap
57
58#################################################################
59# Application configuration defaults.
60#################################################################
61# application image
saul.gill5e611402023-03-02 11:49:23 +000062image: onap/policy-clamp-ac-a1pms-ppnt:6.4.1
aravind.est8d728302022-12-07 12:26:28 +000063pullPolicy: Always
64
65# application configuration
66restServer:
67 user: participantUser
68 password: zb!XztG34
69
70a1pmsconfig:
71 a1pms:
72 baseUrl: http://a1policymanagement.onap:8081
73 headers:
74 content-type: application/json
75 endpoints:
76 health: /a1-policy/v2/rics
77 services: /a1-policy/v2/services
78 service: /a1-policy/v2/services/{service_id}
79
80# flag to enable debugging - application support required
81debugEnabled: false
82
83# default number of instances
84replicaCount: 1
85
86nodeSelector: {}
87
88affinity: {}
89ingress:
90 enabled: false
91
92# probe configuration parameters
93liveness:
94 initialDelaySeconds: 20
95 periodSeconds: 10
96 # necessary to disable liveness probe when setting breakpoints
97 # in debugger so K8s doesn't restart unresponsive container
98 enabled: true
99 port: a1pms-api
100
101readiness:
102 initialDelaySeconds: 20
103 periodSeconds: 10
104 port: a1pms-api
105
106service:
107 type: ClusterIP
108 name: policy-clamp-ac-a1pms-ppnt
109 ports:
110 - name: a1pms-api
111 port: 8086
112 nodePort: 42
113
114
115flavor: small
116resources:
117 small:
118 limits:
119 cpu: 1
120 memory: 4Gi
121 requests:
122 cpu: 100m
123 memory: 1Gi
124 large:
125 limits:
126 cpu: 2
127 memory: 8Gi
128 requests:
129 cpu: 200m
130 memory: 2Gi
131 unlimited: {}
132#Pods Service Account
133serviceAccount:
134 nameOverride: policy-clamp-ac-a1pms-ppnt
135 roles:
136 - create
137
138config:
139# Event consumption (kafka) properties
140 useStrimziKafka: true
141 kafkaBootstrap: strimzi-kafka-bootstrap
142 kafka:
143 consumer:
144 groupId: policy-group
145 app:
146 listener:
147 acRuntimeTopic: policy-acruntime-participant
148# If targeting a custom kafka cluster, ie useStrimziKakfa: false
149# uncomment below config and target your kafka bootstrap servers,
150# along with any other security config.
151#
152# eventConsumption:
153# spring.kafka.bootstrap-servers: <kafka-bootstrap>:9092
154# spring.kafka.security.protocol: PLAINTEXT
155# spring.kafka.consumer.group-id: policy-group
156#
157# Any new property can be added in the env by setting in overrides in the format mentioned below
158# All the added properties must be in "key: value" format instead of yaml.
159# additional:
160# spring.config.max-size: 200
161# spring.config.min-size: 10
162