blob: 457f5b3c77258366810ffd2c4146074746c4c4c9 [file] [log] [blame]
mmis9cb50292018-09-19 00:31:35 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
efiacorab235f42023-02-15 11:51:52 +00004# Modifications Copyright (C) 2023 Nordix Foundation
mmis9cb50292018-09-19 00:31:35 +01005# ================================================================================
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17#
18# SPDX-License-Identifier: Apache-2.0
19# ============LICENSE_END=========================================================
20
21#################################################################
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020022# Secrets metaconfig
23#################################################################
24secrets:
25 - uid: restserver-creds
26 type: basicAuth
27 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
28 login: '{{ .Values.restServer.user }}'
29 password: '{{ .Values.restServer.password }}'
30 passwordPolicy: required
31 - uid: apiparameters-creds
32 type: basicAuth
33 externalSecret: '{{ tpl (default "" .Values.apiParameters.credsExternalSecret) . }}'
34 login: '{{ .Values.apiParameters.user }}'
35 password: '{{ .Values.apiParameters.password }}'
36 passwordPolicy: required
37 - uid: papparameters-creds
38 type: basicAuth
39 externalSecret: '{{ tpl (default "" .Values.papParameters.credsExternalSecret) . }}'
40 login: '{{ .Values.papParameters.user }}'
41 password: '{{ .Values.papParameters.password }}'
42 passwordPolicy: required
43 - uid: sdcbe-creds
44 type: basicAuth
45 externalSecret: '{{ tpl (default "" .Values.sdcBe.credsExternalSecret) . }}'
46 login: '{{ .Values.sdcBe.user }}'
47 password: '{{ .Values.sdcBe.password }}'
48 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050049 - uid: keystore-password
50 type: password
51 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
52 password: '{{ .Values.certStores.keyStorePassword }}'
53 passwordPolicy: required
54 - uid: truststore-password
55 type: password
56 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
57 password: '{{ .Values.certStores.trustStorePassword }}'
58 passwordPolicy: required
efiacorab235f42023-02-15 11:51:52 +000059
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020060#################################################################
mmis9cb50292018-09-19 00:31:35 +010061# Global configuration defaults.
62#################################################################
63global:
64 persistence: {}
jhhd4258672020-08-09 12:08:08 -050065 aafEnabled: true
mmis9cb50292018-09-19 00:31:35 +010066
67#################################################################
68# Application configuration defaults.
69#################################################################
70# application image
saul.gill5e611402023-03-02 11:49:23 +000071image: onap/policy-distribution:2.9.1
mmis9cb50292018-09-19 00:31:35 +010072pullPolicy: Always
73
74# flag to enable debugging - application support required
75debugEnabled: false
76
efiacorab235f42023-02-15 11:51:52 +000077#Strimzi Kafka User def
78kafkaUser:
79 acls:
80 - name: policy-distribution
81 type: group
82 operations: [Read]
83 - name: SDC-DISTR
84 type: topic
85 patternType: prefix
86 operations: [Read, Write]
mmis9cb50292018-09-19 00:31:35 +010087
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020088restServer:
89 user: healthcheck
90 password: zb!XztG34
91apiParameters:
adheli.tavaresf3656cd2021-11-10 14:54:32 +000092 user: policyadmin
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020093 password: zb!XztG34
94papParameters:
adheli.tavaresf3656cd2021-11-10 14:54:32 +000095 user: policyadmin
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020096 password: zb!XztG34
97sdcBe:
98 user: policy
99 password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
jhhd4258672020-08-09 12:08:08 -0500100certStores:
101 keyStorePassword: Pol1cy_0nap
102 trustStorePassword: Pol1cy_0nap
103
104certInitializer:
105 nameOverride: policy-distribution-cert-initializer
106 aafDeployFqi: deployer@people.osaaf.org
107 aafDeployPass: demo123456!
108 fqdn: policy
109 fqi: policy@policy.onap.org
110 public_fqdn: policy.onap.org
111 cadi_latitude: "0.0"
112 cadi_longitude: "0.0"
113 credsPath: /opt/app/osaaf/local
114 app_ns: org.osaaf.aaf
115 uid: 100
116 gid: 101
117 aaf_add_config: >
jhhd4258672020-08-09 12:08:08 -0500118 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
119 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
120 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
Dominik Mizyn4aa534f2020-04-14 18:03:53 +0200121
mmis9cb50292018-09-19 00:31:35 +0100122# default number of instances
123replicaCount: 1
124
125nodeSelector: {}
126
127affinity: {}
128
129# probe configuration parameters
130liveness:
131 initialDelaySeconds: 20
132 periodSeconds: 10
133 # necessary to disable liveness probe when setting breakpoints
134 # in debugger so K8s doesn't restart unresponsive container
135 enabled: true
136
137readiness:
138 initialDelaySeconds: 20
139 periodSeconds: 10
140
141service:
142 type: ClusterIP
143 name: policy-distribution
amatthews736bf372021-12-14 16:04:15 +0000144 portName: http
jhh59ce22d2019-05-14 17:59:36 -0500145 externalPort: 6969
mmis9cb50292018-09-19 00:31:35 +0100146 internalPort: 6969
147
148ingress:
149 enabled: false
150
jhhd4258672020-08-09 12:08:08 -0500151flavor: small
152resources:
153 small:
154 limits:
155 cpu: 1
156 memory: 4Gi
157 requests:
158 cpu: 100m
159 memory: 1Gi
160 large:
161 limits:
162 cpu: 2
163 memory: 8Gi
164 requests:
165 cpu: 200m
166 memory: 2Gi
167 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200168
169#Pods Service Account
170serviceAccount:
171 nameOverride: policy-distribution
172 roles:
173 - read
Rashmi Pujara8b09262022-03-15 21:58:57 -0400174
Rashmi Pujara8b09262022-03-15 21:58:57 -0400175metrics:
176 serviceMonitor:
177 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
178 # The default operator for prometheus enforces the below label.
179 labels:
180 release: prometheus
181 enabled: true
182 port: policy-distribution
183 interval: 60s
184 isHttps: true
185 basicAuth:
186 enabled: true
187 externalSecretNameSuffix: policy-distribution-restserver-creds
188 externalSecretUserKey: login
189 externalSecretPasswordKey: password
190 selector:
191 app: '{{ include "common.name" . }}'
192 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
193 release: '{{ include "common.release" . }}'
194 heritage: '{{ .Release.Service }}'