1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2022 Bell Canada. All rights reserved.
3 # Modifications Copyright © 2022 Nordix Foundation
4 # ================================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 # SPDX-License-Identifier: Apache-2.0
18 # ============LICENSE_END=========================================================
23 name: "${RESTSERVER_USER}"
24 password: "${RESTSERVER_PASSWORD}"
27 preferred-json-mapper: gson
29 {{ if not .Values.global.postgres.localCluster }}
30 url: jdbc:mariadb://{{ .Values.db.service.name }}:{{ .Values.db.service.internalPort }}/policyadmin
31 driverClassName: org.mariadb.jdbc.Driver
32 username: "${SQL_USER}"
33 password: "${SQL_PASSWORD}"
39 dialect: org.hibernate.dialect.MariaDB103Dialect
43 physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl
44 implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy
46 url: jdbc:postgresql://{{ .Values.db.service.pgName }}:{{ .Values.db.service.internalPgPort }}/policyadmin
47 driverClassName: org.postgresql.Driver
48 username: "${SQL_USER}"
49 password: "${SQL_PASSWORD}"
51 connectionTimeout: 30000
59 physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl
60 implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy
63 dialect: org.hibernate.dialect.PostgreSQLDialect
72 context-path: /policy/pap/v1
78 {{ if .Values.global.useStrimziKafkaPf }}
79 pdp-pap.name: {{ .Values.config.kafka.topics.policyPdpPap }}
80 notification.name: {{ .Values.config.kafka.topics.policyNotification }}
81 heartbeat.name: {{ .Values.config.kafka.topics.policyHeartbeat }}
83 pdp-pap.name: {{ .Values.dmaap.topics.policyPdpPap }}
84 notification.name: {{ .Values.dmaap.topics.policyNotification }}
85 heartbeat.name: {{ .Values.dmaap.topics.policyHeartbeat }}
92 stateChangeParameters:
95 savePdpStatisticsInDb: true
100 {{ if .Values.global.useStrimziKafkaPf }}
101 topic: {{ .Values.config.kafka.topics.policyPdpPap }}
103 - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092
104 topicCommInfrastructure: kafka
106 group.id : {{ .Values.config.kafka.consumer.groupId }}
107 security.protocol: SASL_PLAINTEXT
108 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
109 sasl.jaas.config: ${JAASLOGIN}
111 topic: {{ .Values.dmaap.topics.policyPdpPap }}
113 - ${topicServer:message-router}
114 topicCommInfrastructure: dmaap
118 {{ if .Values.global.useStrimziKafkaPf }}
119 topic: {{ .Values.config.kafka.topics.policyHeartbeat }}
120 effectiveTopic: {{ .Values.config.kafka.topics.policyPdpPap }}
122 - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092
123 topicCommInfrastructure: kafka
125 group.id : {{ .Values.config.kafka.consumer.groupId }}
126 security.protocol: SASL_PLAINTEXT
127 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
128 sasl.jaas.config: ${JAASLOGIN}
130 topic: {{ .Values.dmaap.topics.policyHeartbeat }}
131 effectiveTopic: {{ .Values.dmaap.topics.policyPdpPap }}
133 - ${topicServer:message-router}
134 topicCommInfrastructure: dmaap
138 {{ if .Values.global.useStrimziKafkaPf }}
139 topic: {{ .Values.config.kafka.topics.policyPdpPap }}
141 - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092
142 topicCommInfrastructure: kafka
144 group.id : {{ .Values.config.kafka.consumer.groupId }}
145 security.protocol: SASL_PLAINTEXT
146 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
147 sasl.jaas.config: ${JAASLOGIN}
149 topic: {{ .Values.dmaap.topics.policyPdpPap }}
151 - ${topicServer:message-router}
152 topicCommInfrastructure: dmaap
155 {{ if .Values.global.useStrimziKafkaPf }}
156 topic: {{ .Values.config.kafka.topics.policyNotification }}
158 - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092
159 topicCommInfrastructure: kafka
161 group.id : {{ .Values.config.kafka.consumer.groupId }}
162 security.protocol: SASL_PLAINTEXT
163 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
164 sasl.jaas.config: ${JAASLOGIN}
166 topic: {{ .Values.dmaap.topics.policyNotification }}
168 - ${topicServer:message-router}
169 topicCommInfrastructure: dmaap
171 # If Strimzi Kafka to be used for communication, replace following configuration for topicSources and topicSinks
173 # - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
174 # topicCommInfrastructure: kafka
176 # security.protocol: SASL_PLAINTEXT
177 # sasl.mechanism: SCRAM-SHA-512
178 # sasl.jaas.config: ${JAASLOGIN}
180 healthCheckRestClientParameters:
184 userName: "${API_USER}"
185 password: "${API_PASSWORD}"
187 basePath: policy/api/v1/healthcheck
188 - clientName: distribution
189 hostname: policy-distribution
191 userName: "${DISTRIBUTION_USER}"
192 password: "${DISTRIBUTION_PASSWORD}"
194 basePath: healthcheck
201 include: health, metrics, prometheus
202 path-mapping.prometheus: metrics