blob: 6b1313381575f7b92af8f722b910cf71f8c16eb7 [file] [log] [blame]
mmis95971132018-07-17 00:13:13 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhhd2b9ed82019-12-10 17:15:28 -06003# Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
mmis95971132018-07-17 00:13:13 +01004# ================================================================================
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16#
17# SPDX-License-Identifier: Apache-2.0
18# ============LICENSE_END=========================================================
19
20#################################################################
21# Global configuration defaults.
22#################################################################
23global:
24 nodePortPrefix: 302
jhhd4258672020-08-09 12:08:08 -050025 aafEnabled: true
mmis95971132018-07-17 00:13:13 +010026 persistence: {}
27
28#################################################################
Dominik Mizynb8c44b42020-04-21 10:48:27 +020029# Secrets metaconfig
30#################################################################
31secrets:
32 - uid: restserver-creds
33 type: basicAuth
34 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
35 login: '{{ .Values.restServer.user }}'
36 password: '{{ .Values.restServer.password }}'
37 - uid: truststore-pass
38 type: password
jhhd4258672020-08-09 12:08:08 -050039 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
40 password: '{{ .Values.certStores.trustStorePassword }}'
41 passwordPolicy: required
42 - uid: keystore-pass
43 type: password
44 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
45 password: '{{ .Values.certStores.keyStorePassword }}'
46 passwordPolicy: required
Dominik Mizynb8c44b42020-04-21 10:48:27 +020047
48#################################################################
mmis95971132018-07-17 00:13:13 +010049# Application configuration defaults.
50#################################################################
51# application image
Jim Hahn98274272020-11-16 18:18:11 -050052image: onap/policy-apex-pdp:2.4.4
mmis95971132018-07-17 00:13:13 +010053pullPolicy: Always
54
55# flag to enable debugging - application support required
56debugEnabled: false
57
58# application configuration
59
Dominik Mizynb8c44b42020-04-21 10:48:27 +020060restServer:
61 user: healthcheck
62 password: zb!XztG34
63truststore:
64 password: Pol1cy_0nap
jhhd4258672020-08-09 12:08:08 -050065certStores:
66 keyStorePassword: Pol1cy_0nap
67 trustStorePassword: Pol1cy_0nap
68
69certInitializer:
70 nameOverride: policy-apex-pdp-cert-initializer
71 aafDeployFqi: deployer@people.osaaf.org
72 aafDeployPass: demo123456!
73 fqdn: policy
74 fqi: policy@policy.onap.org
75 public_fqdn: policy.onap.org
76 cadi_latitude: "0.0"
77 cadi_longitude: "0.0"
78 credsPath: /opt/app/osaaf/local
79 app_ns: org.osaaf.aaf
80 uid: 101
81 gid: 102
82 aaf_add_config: >
83 /opt/app/aaf_config/bin/agent.sh;
84 export $(/opt/app/aaf_config/bin/agent.sh local showpass
85 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
86 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
87 echo "export KEYSTORE_PASSWORD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
88 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
Dominik Mizynb8c44b42020-04-21 10:48:27 +020089
mmis95971132018-07-17 00:13:13 +010090# default number of instances
91replicaCount: 1
92
93nodeSelector: {}
94
95affinity: {}
96
97# probe configuration parameters
98liveness:
99 initialDelaySeconds: 20
100 periodSeconds: 10
101 # necessary to disable liveness probe when setting breakpoints
102 # in debugger so K8s doesn't restart unresponsive container
103 enabled: true
104
105readiness:
106 initialDelaySeconds: 20
107 periodSeconds: 10
108
109service:
jhh59ce22d2019-05-14 17:59:36 -0500110 type: ClusterIP
mmis95971132018-07-17 00:13:13 +0100111 name: policy-apex-pdp
112 portName: policy-apex-pdp
a.sreekumar7f4efaf2019-04-16 16:24:01 +0000113 externalPort: 6969
jhh59ce22d2019-05-14 17:59:36 -0500114 internalPort: 6969
mmis95971132018-07-17 00:13:13 +0100115 nodePort: 37
116
117ingress:
118 enabled: false
119
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000120# Resource Limit flavor -By Default using small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000121# Segregation for Different environment (Small and Large)
jhhd4258672020-08-09 12:08:08 -0500122flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000123resources:
124 small:
125 limits:
126 cpu: 1
127 memory: 4Gi
128 requests:
129 cpu: 10m
130 memory: 1Gi
131 large:
132 limits:
133 cpu: 2
134 memory: 8Gi
135 requests:
136 cpu: 20m
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000137 memory: 2Gi
Pamela Dragosh54048d32018-11-09 07:09:41 -0500138 unlimited: {}