blob: 7abd75d83246bf3230b715130e2b79b321f4094e [file] [log] [blame]
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00001# Copyright © 2017 Amdocs, Bell Canada
jhhd4258672020-08-09 12:08:08 -05002# Modifications Copyright © 2018-2020 AT&T Intellectual Property
efiacorab235f42023-02-15 11:51:52 +00003# Modifications Copyright (C) 2021-2023 Nordix Foundation.
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
mayankg2703ced85142018-03-20 05:42:53 +000017#################################################################
18# Global configuration defaults.
19#################################################################
20global:
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010021 mariadb:
22 # '&mariadbConfig' means we "store" the values for later use in the file
23 # with '*mariadbConfig' pointer.
24 config: &mariadbConfig
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010025 mysqlDatabase: policyadmin
26 service: &mariadbService
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010027 name: &policy-mariadb policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +010028 internalPort: 3306
Rashmi Pujarec452b52022-04-21 12:29:14 -040029 prometheusEnabled: false
waynedunican368aced2022-02-15 08:27:57 +000030 postgres:
31 localCluster: false
32 service:
33 name: pgset
34 name2: tcp-pgset-primary
35 name3: tcp-pgset-replica
36 container:
37 name: postgres
efiacor6910bbe2023-03-03 14:53:16 +000038 #Strimzi Kafka properties
39 useStrimziKafka: true
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +010040 kafkaBootstrap: strimzi-kafka-bootstrap
41 policyKafkaUser: policy-kafka-user
efiacor6910bbe2023-03-03 14:53:16 +000042 kafkaTopics:
43 acRuntimeTopic:
44 name: policy.clamp-runtime-acm
mayankg2703ced85142018-03-20 05:42:53 +000045
46#################################################################
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020047# Secrets metaconfig
48#################################################################
49secrets:
50 - uid: db-root-password
51 name: &dbRootPassSecretName '{{ include "common.release" . }}-policy-db-root-password'
52 type: password
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010053 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "rootUser" "externalSecret")) .) (hasSuffix "policy-db-root-password" (index .Values "mariadb-galera" "rootUser" "externalSecret"))}}'
54 password: '{{ (index .Values "mariadb-galera" "rootUser" "password") }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020055 policy: generate
56 - uid: db-secret
57 name: &dbSecretName '{{ include "common.release" . }}-policy-db-secret'
58 type: basicAuth
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +010059 externalSecret: '{{ ternary "" (tpl (default "" (index .Values "mariadb-galera" "db" "externalSecret")) .) (hasSuffix "policy-db-secret" (index .Values "mariadb-galera" "db" "externalSecret"))}}'
60 login: '{{ index .Values "mariadb-galera" "db" "user" }}'
61 password: '{{ index .Values "mariadb-galera" "db" "password" }}'
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020062 passwordPolicy: generate
saul.gill7124a4b2021-09-09 12:02:49 +010063 - uid: policy-app-user-creds
64 name: &policyAppCredsSecret '{{ include "common.release" . }}-policy-app-user-creds'
65 type: basicAuth
66 externalSecret: '{{ tpl (default "" .Values.config.policyAppUserExternalSecret) . }}'
67 login: '{{ .Values.config.policyAppUserName }}'
68 password: '{{ .Values.config.policyAppUserPassword }}'
69 passwordPolicy: generate
rameshiyer27ff176652021-09-21 15:19:05 +010070 - uid: policy-pap-user-creds
71 name: &policyPapCredsSecret '{{ include "common.release" . }}-policy-pap-user-creds'
72 type: basicAuth
73 externalSecret: '{{ tpl (default "" .Values.restServer.policyPapUserExternalSecret) . }}'
74 login: '{{ .Values.restServer.policyPapUserName }}'
75 password: '{{ .Values.restServer.policyPapUserPassword }}'
76 passwordPolicy: required
77 - uid: policy-api-user-creds
78 name: &policyApiCredsSecret '{{ include "common.release" . }}-policy-api-user-creds'
79 type: basicAuth
80 externalSecret: '{{ tpl (default "" .Values.restServer.policyApiUserExternalSecret) . }}'
81 login: '{{ .Values.restServer.policyApiUserName }}'
82 password: '{{ .Values.restServer.policyApiUserPassword }}'
83 passwordPolicy: required
waynedunican368aced2022-02-15 08:27:57 +000084 - uid: pg-root-pass
85 name: &pgRootPassSecretName '{{ include "common.release" . }}-policy-pg-root-pass'
86 type: password
87 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgRootPasswordExternalSecret) .) (hasSuffix "policy-pg-root-pass" .Values.postgres.config.pgRootPasswordExternalSecret) }}'
88 password: '{{ .Values.postgres.config.pgRootpassword }}'
89 policy: generate
90 - uid: pg-user-creds
91 name: &pgUserCredsSecretName '{{ include "common.release" . }}-policy-pg-user-creds'
92 type: basicAuth
93 externalSecret: '{{ ternary "" (tpl (default "" .Values.postgres.config.pgUserExternalSecret) .) (hasSuffix "policy-pg-user-creds" .Values.postgres.config.pgUserExternalSecret) }}'
94 login: '{{ .Values.postgres.config.pgUserName }}'
95 password: '{{ .Values.postgres.config.pgUserPassword }}'
96 passwordPolicy: generate
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +020097
jhhd4258672020-08-09 12:08:08 -050098db: &dbSecretsHook
99 credsExternalSecret: *dbSecretName
100
101policy-api:
102 enabled: true
103 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100104 restServer:
105 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100106 config:
107 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500108policy-pap:
109 enabled: true
110 db: *dbSecretsHook
rameshiyer27ff176652021-09-21 15:19:05 +0100111 restServer:
112 papUserExternalSecret: *policyPapCredsSecret
113 apiUserExternalSecret: *policyApiCredsSecret
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100114 config:
115 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500116policy-xacml-pdp:
117 enabled: true
118 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100119 config:
120 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500121policy-apex-pdp:
122 enabled: true
123 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100124 config:
125 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500126policy-drools-pdp:
127 enabled: true
128 db: *dbSecretsHook
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100129 config:
130 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500131policy-distribution:
132 enabled: true
133 db: *dbSecretsHook
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000134policy-clamp-ac-k8s-ppnt:
rameshiyer2701b8cc02021-09-21 15:07:50 +0100135 enabled: true
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000136policy-clamp-ac-pf-ppnt:
rameshiyer27ff176652021-09-21 15:19:05 +0100137 enabled: true
138 restServer:
139 apiUserExternalSecret: *policyApiCredsSecret
140 papUserExternalSecret: *policyPapCredsSecret
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000141policy-clamp-ac-http-ppnt:
rameshiyer273c3402d2021-09-21 15:14:39 +0100142 enabled: true
aravind.est8d728302022-12-07 12:26:28 +0000143policy-clamp-ac-a1pms-ppnt:
144 enabled: true
aravind.est0879dfc2023-02-22 09:05:50 +0000145policy-clamp-ac-kserve-ppnt:
146 enabled: true
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000147policy-clamp-runtime-acm:
saul.gill7124a4b2021-09-09 12:02:49 +0100148 enabled: true
149 db: *dbSecretsHook
150 config:
151 appUserExternalSecret: *policyAppCredsSecret
efiacor6910bbe2023-03-03 14:53:16 +0000152policy-nexus:
153 enabled: false
154 config:
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100155 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
ktimoneyb3aef7b2021-09-13 08:27:58 +0100156policy-gui:
amatthews736bf372021-12-14 16:04:15 +0000157 enabled: false
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100158 config:
159 jaasConfExternalSecret: '{{ include "common.release" . }}-{{ .Values.global.policyKafkaUser }}'
jhhd4258672020-08-09 12:08:08 -0500160
Krzysztof Opasiak98a79cc2020-04-01 22:33:58 +0200161#################################################################
jhhd4258672020-08-09 12:08:08 -0500162# DB configuration defaults.
mayankg2703ced85142018-03-20 05:42:53 +0000163#################################################################
jhhd4258672020-08-09 12:08:08 -0500164
jhhd74fe9f2021-04-15 11:04:39 -0500165dbmigrator:
saul.gill5e611402023-03-02 11:49:23 +0000166 image: onap/policy-db-migrator:2.6.1
jhhd74fe9f2021-04-15 11:04:39 -0500167 schema: policyadmin
168 policy_home: "/opt/app/policy"
169
mayankg2703ced85142018-03-20 05:42:53 +0000170subChartsOnly:
171 enabled: true
BorislavG5f3b6192018-03-25 18:12:38 +0300172
mayankg2703ced85142018-03-20 05:42:53 +0000173# flag to enable debugging - application support required
174debugEnabled: false
175
mayankg2703ced85142018-03-20 05:42:53 +0000176# default number of instances
177replicaCount: 1
178
179nodeSelector: {}
180
181affinity: {}
182
183# probe configuration parameters
184liveness:
185 initialDelaySeconds: 10
186 periodSeconds: 10
187 # necessary to disable liveness probe when setting breakpoints
188 # in debugger so K8s doesn't restart unresponsive container
189 enabled: true
190
191readiness:
192 initialDelaySeconds: 10
193 periodSeconds: 10
194
saul.gill7124a4b2021-09-09 12:02:49 +0100195
196config:
197 policyAppUserName: runtimeUser
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100198 useStrimziKafka: true
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100199 policyPdpPapTopic:
200 name: policy-pdp-pap
201 partitions: 10
202 retentionMs: 7200000
203 segmentBytes: 1073741824
204 consumer:
205 groupId: policy-group
206 policyHeartbeatTopic:
207 name: policy-heartbeat
208 partitions: 10
209 retentionMs: 7200000
210 segmentBytes: 1073741824
211 consumer:
212 groupId: policy-group
213 policyNotificationTopic:
214 name: policy-notification
215 partitions: 10
216 retentionMs: 7200000
217 segmentBytes: 1073741824
218 consumer:
219 groupId: policy-group
Sirisha_Manchikantib402a592022-09-09 12:01:20 +0100220 someConfig: blah
saul.gill7124a4b2021-09-09 12:02:49 +0100221
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100222mariadb-galera:
223 # mariadb-galera.config and global.mariadb.config must be equals
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100224 db:
225 user: policy_user
226 # password:
227 externalSecret: *dbSecretName
228 name: &mysqlDbName policyadmin
229 rootUser:
230 externalSecret: *dbRootPassSecretName
231 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100232 # mariadb-galera.service and global.mariadb.service must be equals
233 service: *mariadbService
234 replicaCount: 1
235 persistence:
236 enabled: true
237 mountSubPath: policy/maria/data
Sylvain Desbureaux93a5b492020-11-27 11:07:42 +0100238 serviceAccount:
239 nameOverride: *policy-mariadb
Sylvain Desbureaux4898dc02019-11-14 13:35:13 +0100240
waynedunican368aced2022-02-15 08:27:57 +0000241postgresImage: library/postgres:latest
242# application configuration override for postgres
243postgres:
244 nameOverride: &postgresName policy-postgres
245 service:
246 name: *postgresName
247 name2: policy-pg-primary
248 name3: policy-pg-replica
249 container:
250 name:
251 primary: policy-pg-primary
252 replica: policy-pg-replica
253 persistence:
254 mountSubPath: policy/postgres/data
255 mountInitPath: policy
256 config:
257 pgUserName: policy_user
258 pgDatabase: policyadmin
259 pgUserExternalSecret: *pgUserCredsSecretName
260 pgRootPasswordExternalSecret: *pgRootPassSecretName
261
262readinessCheck:
263 wait_for:
264 - '{{ ternary .Values.postgres.service.name "postgres" .Values.global.postgres.localCluster }}'
265
rameshiyer27ff176652021-09-21 15:19:05 +0100266restServer:
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000267 policyPapUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100268 policyPapUserPassword: zb!XztG34
adheli.tavaresf3656cd2021-11-10 14:54:32 +0000269 policyApiUserName: policyadmin
rameshiyer27ff176652021-09-21 15:19:05 +0100270 policyApiUserPassword: zb!XztG34
271
jhhbf8d8a92020-09-10 14:01:49 -0500272# Resource Limit flavor -By Default using small
273# Segregation for Different environment (small, large, or unlimited)
274flavor: small
275resources:
276 small:
277 limits:
278 cpu: 1
279 memory: 4Gi
280 requests:
281 cpu: 100m
282 memory: 1Gi
283 large:
284 limits:
285 cpu: 2
286 memory: 8Gi
287 requests:
288 cpu: 200m
289 memory: 2Gi
290 unlimited: {}
291
farida azmyc1178372021-04-11 12:55:33 +0200292#Pods Service Account
293serviceAccount:
294 nameOverride: policy
295 roles:
296 - read