Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 1 | # Copyright © 2017 Amdocs, Bell Canada |
| 2 | # |
| 3 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | # you may not use this file except in compliance with the License. |
| 5 | # You may obtain a copy of the License at |
| 6 | # |
| 7 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | # |
| 9 | # Unless required by applicable law or agreed to in writing, software |
| 10 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | # See the License for the specific language governing permissions and |
| 13 | # limitations under the License. |
| 14 | |
| 15 | ################################################################# |
| 16 | # Global configuration defaults. |
| 17 | ################################################################# |
| 18 | global: # global defaults |
| 19 | nodePortPrefix: 302 |
| 20 | ubuntuInitRepository: registry.hub.docker.com |
| 21 | persistence: {} |
| 22 | |
| 23 | # application image |
| 24 | repository: nexus3.onap.org:10001 |
Jack Lucas | 562c54b | 2023-08-30 10:55:06 -0400 | [diff] [blame] | 25 | image: onap/testsuite:1.12.2 |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 26 | pullPolicy: Always |
| 27 | |
| 28 | ubuntuInitImage: oomk8s/ubuntu-init:2.0.0 |
| 29 | |
| 30 | # flag to enable debugging - application support required |
| 31 | debugEnabled: false |
| 32 | |
| 33 | ################################################################# |
| 34 | # Application configuration defaults. |
| 35 | ################################################################# |
| 36 | config: |
| 37 | useIngressHost: |
| 38 | enabled: false |
| 39 | aaf_service: |
| 40 | enabled: true |
| 41 | https: true |
| 42 | hostname: aafservice |
| 43 | aai: |
| 44 | enabled: true |
| 45 | https: true |
| 46 | hostname: aai.api.sparky |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 47 | clamp: |
| 48 | enabled: true |
| 49 | https: true |
| 50 | cli: |
| 51 | enabled: true |
| 52 | https: true |
| 53 | dcae_healthcheck: |
| 54 | enabled: false |
| 55 | dcae_ves_collector: |
| 56 | enabled: false |
| 57 | dcae_ves_colector_https: |
| 58 | enabled: false |
| 59 | https: true |
efiacor | 2123fec | 2022-12-09 13:40:55 +0000 | [diff] [blame] | 60 | message_router: |
| 61 | enabled: false |
| 62 | https: false |
| 63 | dmaap_bc: |
| 64 | enabled: true |
| 65 | https: false |
| 66 | hostname: dmaapbc |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 67 | dmaap_dr_prov: |
| 68 | enabled: true |
efiacor | 2123fec | 2022-12-09 13:40:55 +0000 | [diff] [blame] | 69 | https: false |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 70 | hostname: dmaapdrprov |
| 71 | dmaap_dr_node: |
| 72 | enabled: true |
efiacor | 2123fec | 2022-12-09 13:40:55 +0000 | [diff] [blame] | 73 | https: false |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 74 | hostname: dmaapdrnode |
| 75 | log_es: |
| 76 | enabled: false |
| 77 | log_kibana: |
| 78 | enabled: false |
| 79 | log_ls_http: |
| 80 | enabled: false |
| 81 | pomba_aaictxbuilder: |
| 82 | enabled: false |
| 83 | pomba_sdctxbuilder: |
| 84 | enabled: false |
| 85 | pomba_networkdiscoveryctxbuilder: |
| 86 | enabled: false |
| 87 | pomba_servicedecomposition: |
| 88 | enabled: false |
| 89 | pomba_sdncctxbuilder: |
| 90 | enabled: false |
| 91 | pomba_networkdiscovery: |
| 92 | enabled: false |
| 93 | pomba_validation_service: |
| 94 | enabled: false |
| 95 | pomba_kibana: |
| 96 | enabled: false |
| 97 | pomba_es: |
| 98 | enabled: false |
| 99 | pomba_contextaggregator: |
| 100 | enabled: false |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 101 | music: |
| 102 | enabled: false |
| 103 | https: true |
| 104 | nbi: |
| 105 | enabled: false |
| 106 | https: true |
| 107 | oof_has_api: |
| 108 | enabled: true |
| 109 | https: true |
| 110 | oof_osdf: |
| 111 | enabled: true |
| 112 | https: true |
| 113 | hostname: oofsdf |
| 114 | oof_cmso: |
| 115 | enabled: false |
| 116 | https: true |
| 117 | msb_iag: |
| 118 | enabled: false |
| 119 | pdp: |
| 120 | enabled: false |
| 121 | drools: |
| 122 | enabled: false |
| 123 | policy_api: |
| 124 | enabled: false |
| 125 | policy_pap: |
| 126 | enabled: false |
| 127 | policy_distribution: |
| 128 | enabled: false |
| 129 | policy_xacml_pdp: |
| 130 | enabled: false |
| 131 | policy_apex_pdp: |
| 132 | enabled: false |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 133 | portal_app: |
| 134 | enabled: false |
| 135 | https: true |
| 136 | hostname: portal.api |
| 137 | sdc_be: |
| 138 | enabled: true |
| 139 | https: true |
| 140 | sdc_onboarding_be: |
| 141 | enabled: false |
| 142 | https: true |
| 143 | sdc_fe: |
| 144 | enabled: true |
| 145 | hostname: sdc.api.fe |
| 146 | https: true |
| 147 | sdc_dcae_be: |
| 148 | enabled: false |
| 149 | https: true |
| 150 | sdnc: |
| 151 | enabled: false |
| 152 | https: true |
| 153 | sdnc_portal: |
| 154 | enabled: false |
| 155 | https: true |
| 156 | so: |
| 157 | enabled: true |
| 158 | hostname: so.api |
| 159 | so_sdc_controller: |
| 160 | enabled: false |
| 161 | so_pbmn_infra: |
| 162 | enabled: false |
| 163 | so_catalog_db_adapter: |
| 164 | enabled: false |
| 165 | so_openstack_adapter: |
| 166 | enabled: false |
| 167 | so_request_db_adapter: |
| 168 | enabled: false |
| 169 | so_sdnc_adapter: |
| 170 | enabled: false |
| 171 | so_vfc_adapter: |
| 172 | enabled: false |
| 173 | so_vnfm_adapter: |
| 174 | enabled: false |
| 175 | so_nssmf_adapter: |
| 176 | enabled: false |
| 177 | vid: |
| 178 | enabled: false |
| 179 | refrepo: |
| 180 | enabled: true |
| 181 | https: true |
| 182 | cds_blueprints_processor_http: |
| 183 | enabled: true |
| 184 | hostname: blueprintsprocessorhttp |
| 185 | dcae_hv_ves_collector: |
| 186 | enabled: false |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 187 | inventory: |
| 188 | enabled: false |
| 189 | https: true |
| 190 | deployment-handler: |
| 191 | enabled: false |
| 192 | https: true |
| 193 | aaf_sms: |
| 194 | enabled: false |
| 195 | https: true |
| 196 | |
| 197 | # for access to test logs |
| 198 | robotWebUser: "test" |
| 199 | robotWebPassword: "test" |
| 200 | |
| 201 | # openStackEncryptedPasswordHere should match the encrypted string used in SO and APPC and overridden per environment |
| 202 | openStackEncryptedPasswordHere: "c124921a3a0efbe579782cde8227681e" |
| 203 | openStackSoEncryptedPassword: "SAME_STRING_AS_SO_JAVA_ENCRYPTED_PASSWORD" |
| 204 | |
| 205 | # Demo configuration |
| 206 | # Nexus demo artifact version. Maps to GLOBAL_INJECTED_ARTIFACTS_VERSION |
| 207 | # 1.6.0 Frankfurt change or override for your release to match demo:vnfs/vFW/scripts/pom.xml version |
| 208 | demoArtifactsVersion: "1.7.0" |
| 209 | # Nexus demo artifact URL. |
| 210 | demoArtifactsRepoUrl: "https://nexus.onap.org/content/repositories/releases" |
| 211 | # Openstack medium sized flavour name. Maps GLOBAL_INJECTED_VM_FLAVOR |
| 212 | openStackFlavourMedium: "m1.medium" |
| 213 | |
| 214 | ################# Openstack .RC Parameters ################################333 |
| 215 | # KEYSTONE Version 3 Required for Rocky and beyond |
| 216 | # Openstack Keystone API version. Valid values are [ v2.0, v3 ]. Maps to GLOBAL_INJECTED_OPENSTACK_KEYSTONE_API_VERSION |
| 217 | openStackKeystoneAPIVersion: "v2.0" |
| 218 | |
| 219 | # OS_AUTH_URL without the /v3 or /v2.0 from the openstack .RC file |
| 220 | # Openstack keystone URL. Maps to GLOBAL_INJECTED_KEYSTONE |
| 221 | openStackKeyStoneUrl: "http://1.2.3.4:5000" |
| 222 | |
| 223 | # OS_PROJECT_ID from the openstack .RC file |
| 224 | # Openstack tenant UUID where VNFs will be spawned. Maps to GLOBAL_INJECTED_OPENSTACK_TENANT_ID |
| 225 | openStackTenantId: "47899782ed714295b1151681fdfd51f5" |
| 226 | |
| 227 | # OS_PROJECT_NAME from the openstack .RC file |
| 228 | # Project name of Openstack where VNFs will be spawned. Maps to GLOBAL_INJECTED_OPENSTACK_PROJECT_NAME |
| 229 | openStackProjectName: "onap" |
| 230 | |
| 231 | # OS_USERNAME from the openstack .RC file |
| 232 | # username for Openstack tenant where VNFs will be spawned. Maps to GLOBAL_INJECTED_OPENSTACK_USERNAME |
| 233 | openStackUserName: "tenantUsername" |
| 234 | |
| 235 | # OS_PROJECT_DOMAIN_ID from the openstack .RC file |
| 236 | # in some environments it is a string but in other environmens it may be a numeric |
| 237 | # Domain id of openstack where VNFs will be deployed. Maps to GLOBAL_INJECTED_OPENSTACK_DOMAIN_ID |
| 238 | openStackDomainId: "default" |
| 239 | |
| 240 | # OS_USER_DOMAIN from the openstack .RC file |
| 241 | # Use Domain of openstack where VNFs will be deployed. Maps to GLOBAL_INJECTED_OPENSTACK_USER_DOMAIN |
| 242 | openStackUserDomain: "Default" |
| 243 | |
| 244 | |
| 245 | # UUID of the Openstack network that can assign floating ips. Maps to GLOBAL_INJECTED_PUBLIC_NET_ID |
| 246 | openStackPublicNetId: "e8f51958045716781ffc" |
| 247 | openStackPublicNetworkName: "public" |
| 248 | # Openstack region. Maps to GLOBAL_INJECTED_REGION |
| 249 | openStackRegion: "RegionOne" |
| 250 | |
| 251 | |
| 252 | # Values for second cloud instante for VNF instantiatioen testing and keystone v3 |
| 253 | openStackRegionRegionThree: "RegionThree" |
| 254 | openStackKeyStoneUrlRegionThree: "http://1.2.3.4:5000" |
| 255 | openStackKeystoneAPIVersionRegionThree: "v3" |
| 256 | openStackUserNameRegionThree: "demo" |
| 257 | # this is the java encrypted password that is needed for SO |
| 258 | openSackMsoEncryptdPasswordRegionThree: "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" |
| 259 | openStackTenantIdRegionThree: "3583253e932845a09cd4c8ca2f31d095" |
| 260 | openStackProjectNameRegionThree: "Integration-SB-RegionThree" |
| 261 | openStackDomainIdRegionThree: "Default" |
| 262 | # |
| 263 | # Openstack glance image name for Ubuntu 14. Maps to GLOBAL_INJECTED_UBUNTU_1404_IMAGE |
| 264 | ubuntu14Image: "Ubuntu_14_trusty" |
| 265 | # Openstack glance image name for Ubuntu 16. Maps to GLOBAL_INJECTED_UBUNTU_1604_IMAGE |
| 266 | ubuntu16Image: "Ubuntu_16_xenial" |
| 267 | # DANOS image and flavor references |
| 268 | danosImage: "danos-ves-image" |
| 269 | danosFlavor: "danos" |
| 270 | # GLOBAL_INJECTED_SCRIPT_VERSION. Maps to GLOBAL_INJECTED_SCRIPT_VERSION |
| 271 | # 1.6.0 Frankfurt change or override for your release to match demo:vnfs/vFW/scripts/pom.xml version |
| 272 | scriptVersion: "1.7.0" |
| 273 | # Openstack network to which VNFs will bind their primary (first) interface. Maps to GLOBAL_INJECTED_NETWORK |
| 274 | openStackPrivateNetId: "e8f51956-00dd-4425-af36-045716781ffc" |
| 275 | # Openstack security group for instantiating VNFs |
| 276 | openStackSecurityGroup: "onap_sg" |
| 277 | # SDNC Preload configuration |
| 278 | # Openstack subnet UUID for the network defined by openStackPrivateNetId. Maps to onap_private_subnet_id |
| 279 | openStackPrivateSubnetId: "e8f51956-00dd-4425-af36-045716781ffc" |
| 280 | # CIDR notation for the Openstack private network where VNFs will be spawned. Maps to onap_private_net_cidr |
| 281 | openStackPrivateNetCidr: "10.0.0.0/8" |
| 282 | # The first 2 octets of the private Openstack subnet where VNFs will be spawned. |
| 283 | # Needed because sdnc preload templates hardcodes things like this 10.0.${ecompnet}.X |
| 284 | openStackOamNetworkCidrPrefix: "10.0" |
| 285 | # If you network allowed a /16 for the ONAP OAM then leave blank and robot will assign |
| 286 | # a random variable to be able to instantiate multple vFWCL, vLB etc in your environemtn |
| 287 | # if you only provided a /24 then provide the 3rd octet you use for your /24 |
| 288 | openStackOamNetwork3rdOctet: "" |
| 289 | # VID protocol/port until Selenium issue with SSL resolved |
| 290 | # https/8443 vs http/8080 |
| 291 | vidServerProtocol: "https" |
| 292 | vidServerPort: "8443" |
| 293 | # Override with Pub Key for access to VNF |
| 294 | vnfPubKey: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKXDgoo3+WOqcUG8/5uUbk81+yczgwC4Y8ywTmuQqbNxlY1oQ0YxdMUqUnhitSXs5S/yRuAVOYHwGg2mCs20oAINrP+mxBI544AMIb9itPjCtgqtE2EWo6MmnFGbHB4Sx3XioE7F4VPsh7japsIwzOjbrQe+Mua1TGQ5d4nfEOQaaglXLLPFfuc7WbhbJbK6Q7rHqZfRcOwAMXgDoBqlyqKeiKwnumddo2RyNT8ljYmvB6buz7KnMinzo7qB0uktVT05FH9Rg0CTWH5norlG5qXgP2aukL0gk1ph8iAt7uYLf1ktp+LJI2gaF6L0/qli9EmVCSLr1uJ38Q8CBflhkh imported-openssh-key" |
| 295 | # Override with Private Key for access to VNF |
| 296 | vnfPrivateKey: "onap_dev.yaml" |
| 297 | # Override with DCAE VES Collector external IP |
| 298 | dcaeCollectorIp: "FILL_IN_WITH_DCAE_VES_COLLECTOR_IP" |
| 299 | # kubernetes external IP for Portal GUI tests |
| 300 | kubernetesExternalIp: "10.0.0.14" |
| 301 | |
| 302 | |
| 303 | # Credentials for ONAP Component |
| 304 | # AAF |
| 305 | aafUsername: "demo@people.osaaf.org" |
| 306 | aafPassword: "demo123456!" |
| 307 | # AAI |
| 308 | aaiUsername: "aai@aai.onap.org" |
| 309 | aaiPassword: "demo123456!" |
othman touijer | 2b764d0 | 2022-01-05 14:40:37 +0100 | [diff] [blame] | 310 | # SDC |
| 311 | sdcUsername: "beep" |
| 312 | sdcPassword: "boop" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 313 | # DCAE |
| 314 | dcaeUsername: "dcae@dcae.onap.org" |
| 315 | dcaePassword: "demo123456!" |
Jack Lucas | 7e843bf | 2021-03-16 08:54:27 -0400 | [diff] [blame] | 316 | dcaeMsUsername: "dcae@dcae.onap.org" |
| 317 | dcaeMsPassword: "demo123456!" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 318 | # DROOLS |
| 319 | droolsUsername: "demo@people.osaaf.org" |
| 320 | droolsPassword: "demo123456!" |
| 321 | # OOF |
| 322 | oofCmsoUsername: "oof@oof.onap.org" |
| 323 | oofCmsoPassword: "demo123456!" |
| 324 | # POLICY |
| 325 | policyAuth: "dGVzdHBkcDphbHBoYTEyMw==" |
| 326 | policyClientAuth: "cHl0aG9uOnRlc3Q=" |
| 327 | policyUsername: "demo@people.osaaf.org" |
| 328 | policyPassword: "demo123456!" |
| 329 | policyComponentUsername: "healthcheck" |
| 330 | policyComponentPassword: "zb!XztG34" |
adheli.tavares | eada20b | 2021-11-29 09:14:13 +0000 | [diff] [blame] | 331 | policyAdminUsername: "policyadmin" |
| 332 | policyAdminPassword: "zb!XztG34" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 333 | # PORTAL |
| 334 | portalUsername: "demo" |
| 335 | portalPassword: "Kp8bJ4SXszM0WXlhak3eHlcse" |
| 336 | # SO |
| 337 | soUsername: "InfraPortalClient" |
| 338 | soPassword: "password1$" |
| 339 | soCatdbUsername: "bpel" |
| 340 | soCatdbPassword: "password1$" |
| 341 | # SDNC |
| 342 | sdncUsername: "admin" |
| 343 | sdncPassword: "Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U" |
| 344 | # VID |
| 345 | vidUsername: "demo" |
| 346 | vidPassword: "Kp8bJ4SXszM0WX" |
| 347 | vidHealthUsername: "Default" |
| 348 | vidHealthPassword: "AppPassword!1" |
efiacor | 2123fec | 2022-12-09 13:40:55 +0000 | [diff] [blame] | 349 | |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 350 | # DMAAP BC |
| 351 | bcUsername: "dmaap-bc@dmaap-bc.onap.org" |
| 352 | bcPassword: "demo123456!" |
efiacor | 26c1f7a | 2022-04-25 13:27:18 +0100 | [diff] [blame] | 353 | |
efiacor | 2123fec | 2022-12-09 13:40:55 +0000 | [diff] [blame] | 354 | # STRIMZI KAFKA |
| 355 | strimziKafkaUsername: "strimzi-kafka-admin" |
efiacor | 26c1f7a | 2022-04-25 13:27:18 +0100 | [diff] [blame] | 356 | |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 357 | #OOF |
| 358 | oofUsername: "oof@oof.onap.org" |
| 359 | oofPassword: "demo123456!" |
| 360 | cmsoUsername: "oof@oof.onap.org" |
| 361 | cmsoPassword: "demo123456!" |
| 362 | oofOsdfPciOptUsername: "oof@oof.onap.org" |
| 363 | oofOsdfPciOptPassword: "demo123456!" |
| 364 | oofHomingUsername: "admin1" |
| 365 | oofHomingPassword: "plan.15" |
| 366 | |
Krzysztof Kuzmicki | 0b06cdd | 2021-09-30 14:13:39 +0200 | [diff] [blame] | 367 | #K8S chart repository - ChartMuseum |
| 368 | k8sChartRepoUsername: "onapinitializer" |
| 369 | k8sChartRepoPassword: "demo123456!" |
| 370 | |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 371 | |
| 372 | # default number of instances |
| 373 | replicaCount: 1 |
| 374 | |
| 375 | nodeSelector: {} |
| 376 | |
| 377 | affinity: {} |
| 378 | |
| 379 | # Resource Limit flavor -By Default using small |
| 380 | flavor: small |
| 381 | # Segregation for Different environment (Small and Large) |
| 382 | resources: |
| 383 | small: |
| 384 | limits: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 385 | cpu: "2000m" |
| 386 | memory: "4Gi" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 387 | requests: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 388 | cpu: "500m" |
| 389 | memory: "1Gi" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 390 | large: |
| 391 | limits: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 392 | cpu: "4000m" |
| 393 | memory: "8Gi" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 394 | requests: |
Andreas Geissler | 4753743 | 2024-02-27 08:55:23 +0100 | [diff] [blame] | 395 | cpu: "1000m" |
| 396 | memory: "2Gi" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 397 | unlimited: {} |
| 398 | |
| 399 | # probe configuration parameters |
| 400 | liveness: |
| 401 | initialDelaySeconds: 180 |
| 402 | periodSeconds: 10 |
| 403 | # necessary to disable liveness probe when setting breakpoints |
| 404 | # in debugger so K8s doesn't restart unresponsive container |
| 405 | enabled: true |
| 406 | |
| 407 | readiness: |
| 408 | initialDelaySeconds: 180 |
| 409 | periodSeconds: 10 |
| 410 | |
| 411 | service: |
| 412 | name: robot |
Michal Jagiello | 323baaf | 2022-04-01 13:00:09 +0000 | [diff] [blame] | 413 | type: ClusterIP |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 414 | portName: httpd |
| 415 | externalPort: 443 |
| 416 | internalPort: 443 |
| 417 | nodePort: "09" |
| 418 | |
| 419 | ingress: |
| 420 | enabled: false |
| 421 | service: |
Andreas Geissler | 51900a9 | 2022-08-03 13:10:35 +0200 | [diff] [blame] | 422 | - baseaddr: "robot-api" |
Sylvain Desbureaux | 16bdf24 | 2020-12-07 10:28:24 +0100 | [diff] [blame] | 423 | name: "robot" |
| 424 | port: 443 |
| 425 | config: |
| 426 | ssl: "redirect" |
| 427 | |
| 428 | |
| 429 | ## Persist data to a persitent volume |
| 430 | persistence: |
| 431 | enabled: true |
| 432 | |
| 433 | ## A manually managed Persistent Volume and Claim |
| 434 | ## Requires persistence.enabled: true |
| 435 | ## If defined, PVC must be created manually before volume will be bound |
| 436 | # existingClaim: |
| 437 | volumeReclaimPolicy: Retain |
| 438 | |
| 439 | ## database data Persistent Volume Storage Class |
| 440 | ## If defined, storageClassName: <storageClass> |
| 441 | ## If set to "-", storageClassName: "", which disables dynamic provisioning |
| 442 | ## If undefined (the default) or set to null, no storageClassName spec is |
| 443 | ## set, choosing the default provisioner. (gp2 on AWS, standard on |
| 444 | ## GKE, AWS & OpenStack) |
| 445 | ## |
| 446 | # storageClass: "-" |
| 447 | accessMode: ReadWriteOnce |
| 448 | size: 2Gi |
| 449 | mountPath: /dockerdata-nfs |
| 450 | mountSubPath: robot/logs |
Krzysztof Kuzmicki | 6c6269d | 2022-03-25 11:51:18 +0100 | [diff] [blame] | 451 | |
| 452 | #Pods Service Account |
| 453 | serviceAccount: |
| 454 | nameOverride: robot |
| 455 | roles: |
Andreas Geissler | 2156401 | 2022-10-27 15:00:10 +0200 | [diff] [blame] | 456 | - read |