blob: 5478e5baa8ecf4dbad18ec7c4fb95af31280d493 [file] [log] [blame]
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00001# Copyright © 2017 Amdocs, Bell Canada
jhhd4258672020-08-09 12:08:08 -05002# Modifications Copyright © 2018-2020 AT&T Intellectual Property
jhhd74fe9f2021-04-15 11:04:39 -05003# Modifications Copyright (C) 2021 Nordix Foundation.
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
mayankg2703ced85142018-03-20 05:42:53 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
jhhd4258672020-08-09 12:08:08 -050021 aafEnabled: true
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010022 mariadb:
23 # '&mariadbConfig' means we "store" the values for later use in the file
24 # with '*mariadbConfig' pointer.
25 config: &mariadbConfig
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010026 mysqlDatabase: policyadmin
27 service: &mariadbService
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010028 name: &policy-mariadb policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010029 internalPort: 3306
mayankg2703ced85142018-03-20 05:42:53 +000030
31#################################################################
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020032# Secrets metaconfig
33#################################################################
34secrets:
35 - uid: db-root-password
36 name: &dbRootPassSecretName '{{ include "common.release" . }}-policy-db-root-password'
37 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010038 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .) (hasSuffix "policy-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret"))}}'
39 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020040 policy: generate
41 - uid: db-secret
42 name: &dbSecretName '{{ include "common.release" . }}-policy-db-secret'
43 type: basicAuth
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010044 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) (hasSuffix "policy-db-secret" (index .Values "mariadb-galera" "db" "externalSecret"))}}'
45 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
46 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020047 passwordPolicy: generate
48
jhhd4258672020-08-09 12:08:08 -050049db: &dbSecretsHook
50 credsExternalSecret: *dbSecretName
51
52policy-api:
53 enabled: true
54 db: *dbSecretsHook
55policy-pap:
56 enabled: true
57 db: *dbSecretsHook
58policy-xacml-pdp:
59 enabled: true
60 db: *dbSecretsHook
61policy-apex-pdp:
62 enabled: true
63 db: *dbSecretsHook
64policy-drools-pdp:
65 enabled: true
66 db: *dbSecretsHook
67policy-distribution:
68 enabled: true
69 db: *dbSecretsHook
sebdet5c449882021-01-13 11:35:56 +010070policy-clamp-be:
71 enabled: true
72 db: *dbSecretsHook
73policy-clamp-fe:
74 enabled: true
jhhd4258672020-08-09 12:08:08 -050075policy-nexus:
jhhbf8d8a92020-09-10 14:01:49 -050076 enabled: false
jhhd4258672020-08-09 12:08:08 -050077
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020078#################################################################
jhhd4258672020-08-09 12:08:08 -050079# DB configuration defaults.
mayankg2703ced85142018-03-20 05:42:53 +000080#################################################################
jhhd4258672020-08-09 12:08:08 -050081
mayankg2703ced85142018-03-20 05:42:53 +000082repository: nexus3.onap.org:10001
kerenj3b697f62017-08-23 11:21:21 +000083pullPolicy: Always
Alexis de Talhouëtdf4db0b2017-12-11 08:36:25 -050084
Sylvain Desbureaux7c8c6862020-11-19 18:02:37 +010085mariadb:
86 image: mariadb:10.5.8
87
jhhd74fe9f2021-04-15 11:04:39 -050088dbmigrator:
89 image: onap/policy-db-migrator:2.3.0
90 schema: policyadmin
91 policy_home: "/opt/app/policy"
92
mayankg2703ced85142018-03-20 05:42:53 +000093subChartsOnly:
94 enabled: true
BorislavG5f3b6192018-03-25 18:12:38 +030095
mayankg2703ced85142018-03-20 05:42:53 +000096# flag to enable debugging - application support required
97debugEnabled: false
98
mayankg2703ced85142018-03-20 05:42:53 +000099# default number of instances
100replicaCount: 1
101
102nodeSelector: {}
103
104affinity: {}
105
106# probe configuration parameters
107liveness:
108 initialDelaySeconds: 10
109 periodSeconds: 10
110 # necessary to disable liveness probe when setting breakpoints
111 # in debugger so K8s doesn't restart unresponsive container
112 enabled: true
113
114readiness:
115 initialDelaySeconds: 10
116 periodSeconds: 10
117
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100118mariadb-galera:
119 # mariadb-galera.config and global.mariadb.config must be equals
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100120 db:
121 user: policy_user
122 # password:
123 externalSecret: *dbSecretName
124 name: &mysqlDbName policyadmin
125 rootUser:
126 externalSecret: *dbRootPassSecretName
127 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100128 # mariadb-galera.service and global.mariadb.service must be equals
129 service: *mariadbService
130 replicaCount: 1
131 persistence:
132 enabled: true
133 mountSubPath: policy/maria/data
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100134 serviceAccount:
135 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100136
jhhbf8d8a92020-09-10 14:01:49 -0500137# Resource Limit flavor -By Default using small
138# Segregation for Different environment (small, large, or unlimited)
139flavor: small
140resources:
141 small:
142 limits:
143 cpu: 1
144 memory: 4Gi
145 requests:
146 cpu: 100m
147 memory: 1Gi
148 large:
149 limits:
150 cpu: 2
151 memory: 8Gi
152 requests:
153 cpu: 200m
154 memory: 2Gi
155 unlimited: {}
156
farida azmyc1178372021-04-11 12:55:33 +0200157#Pods Service Account
158serviceAccount:
159 nameOverride: policy
160 roles:
161 - read