blob: 3318a199f10ff1c70534cbc181d62f7c2b3fa1a1 [file] [log] [blame]
mmis95971132018-07-17 00:13:13 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
mmis95971132018-07-17 00:13:13 +01004# ================================================================================
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16#
17# SPDX-License-Identifier: Apache-2.0
18# ============LICENSE_END=========================================================
19
20#################################################################
21# Global configuration defaults.
22#################################################################
23global:
24 nodePortPrefix: 302
jhhd4258672020-08-09 12:08:08 -050025 aafEnabled: true
mmis95971132018-07-17 00:13:13 +010026 persistence: {}
27
28#################################################################
Dominik Mizynb8c44b42020-04-21 10:48:27 +020029# Secrets metaconfig
30#################################################################
31secrets:
32 - uid: restserver-creds
33 type: basicAuth
34 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
35 login: '{{ .Values.restServer.user }}'
36 password: '{{ .Values.restServer.password }}'
37 - uid: truststore-pass
38 type: password
jhhd4258672020-08-09 12:08:08 -050039 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
40 password: '{{ .Values.certStores.trustStorePassword }}'
41 passwordPolicy: required
42 - uid: keystore-pass
43 type: password
44 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
45 password: '{{ .Values.certStores.keyStorePassword }}'
46 passwordPolicy: required
Dominik Mizynb8c44b42020-04-21 10:48:27 +020047
48#################################################################
mmis95971132018-07-17 00:13:13 +010049# Application configuration defaults.
50#################################################################
51# application image
liamfallon66c78e52021-10-14 13:15:45 +010052image: onap/policy-apex-pdp:2.6.1
mmis95971132018-07-17 00:13:13 +010053pullPolicy: Always
54
55# flag to enable debugging - application support required
56debugEnabled: false
57
58# application configuration
59
Dominik Mizynb8c44b42020-04-21 10:48:27 +020060restServer:
61 user: healthcheck
62 password: zb!XztG34
63truststore:
64 password: Pol1cy_0nap
jhhd4258672020-08-09 12:08:08 -050065certStores:
66 keyStorePassword: Pol1cy_0nap
67 trustStorePassword: Pol1cy_0nap
68
69certInitializer:
70 nameOverride: policy-apex-pdp-cert-initializer
71 aafDeployFqi: deployer@people.osaaf.org
72 aafDeployPass: demo123456!
73 fqdn: policy
74 fqi: policy@policy.onap.org
75 public_fqdn: policy.onap.org
76 cadi_latitude: "0.0"
77 cadi_longitude: "0.0"
78 credsPath: /opt/app/osaaf/local
79 app_ns: org.osaaf.aaf
80 uid: 101
81 gid: 102
82 aaf_add_config: >
jhhd4258672020-08-09 12:08:08 -050083 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
84 echo "export KEYSTORE_PASSWORD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
85 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
Dominik Mizynb8c44b42020-04-21 10:48:27 +020086
mmis95971132018-07-17 00:13:13 +010087# default number of instances
88replicaCount: 1
89
90nodeSelector: {}
91
92affinity: {}
93
94# probe configuration parameters
95liveness:
96 initialDelaySeconds: 20
97 periodSeconds: 10
98 # necessary to disable liveness probe when setting breakpoints
99 # in debugger so K8s doesn't restart unresponsive container
100 enabled: true
101
102readiness:
103 initialDelaySeconds: 20
104 periodSeconds: 10
105
106service:
jhh59ce22d2019-05-14 17:59:36 -0500107 type: ClusterIP
mmis95971132018-07-17 00:13:13 +0100108 name: policy-apex-pdp
109 portName: policy-apex-pdp
a.sreekumar7f4efaf2019-04-16 16:24:01 +0000110 externalPort: 6969
jhh59ce22d2019-05-14 17:59:36 -0500111 internalPort: 6969
mmis95971132018-07-17 00:13:13 +0100112 nodePort: 37
113
114ingress:
115 enabled: false
116
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000117# Resource Limit flavor -By Default using small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000118# Segregation for Different environment (Small and Large)
jhhd4258672020-08-09 12:08:08 -0500119flavor: small
vaibhavjayas4136f5d2018-08-17 07:01:05 +0000120resources:
121 small:
122 limits:
123 cpu: 1
124 memory: 4Gi
125 requests:
126 cpu: 10m
127 memory: 1Gi
128 large:
129 limits:
130 cpu: 2
131 memory: 8Gi
132 requests:
133 cpu: 20m
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000134 memory: 2Gi
Pamela Dragosh54048d32018-11-09 07:09:41 -0500135 unlimited: {}
farida azmyc1178372021-04-11 12:55:33 +0200136
137#Pods Service Account
138serviceAccount:
139 nameOverride: policy-apex-pdp
140 roles:
141 - read