1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2022 Bell Canada. All rights reserved.
3 # Modifications Copyright © 2022 Nordix Foundation
4 # ================================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 # SPDX-License-Identifier: Apache-2.0
18 # ============LICENSE_END=========================================================
23 name: "${RESTSERVER_USER}"
24 password: "${RESTSERVER_PASSWORD}"
27 preferred-json-mapper: gson
29 {{ if not .Values.global.postgres.localCluster }}
30 url: jdbc:mariadb://{{ .Values.db.service.name }}:{{ .Values.db.service.internalPort }}/policyadmin
31 driverClassName: org.mariadb.jdbc.Driver
32 username: "${SQL_USER}"
33 password: "${SQL_PASSWORD}"
39 dialect: org.hibernate.dialect.MariaDB103Dialect
43 physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl
44 implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy
46 url: jdbc:postgresql://{{ .Values.db.service.pgName }}:{{ .Values.db.service.internalPgPort }}/policyadmin
47 driverClassName: org.postgresql.Driver
48 username: "${SQL_USER}"
49 password: "${SQL_PASSWORD}"
51 connectionTimeout: 30000
59 physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl
60 implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy
63 dialect: org.hibernate.dialect.PostgreSQLDialect
72 context-path: /policy/pap/v1
78 pdp-pap.name: {{ .Values.config.kafka.topics.policyPdpPap }}
79 notification.name: {{ .Values.config.kafka.topics.policyNotification }}
80 heartbeat.name: {{ .Values.config.kafka.topics.policyHeartbeat }}
86 stateChangeParameters:
89 savePdpStatisticsInDb: true
94 topic: {{ .Values.config.kafka.topics.policyPdpPap }}
96 - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
97 topicCommInfrastructure: kafka
99 group.id : {{ .Values.config.kafka.consumer.groupId }}
100 security.protocol: SASL_PLAINTEXT
101 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
102 sasl.jaas.config: ${JAASLOGIN}
105 topic: {{ .Values.config.kafka.topics.policyHeartbeat }}
106 effectiveTopic: {{ .Values.config.kafka.topics.policyPdpPap }}
108 - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
109 topicCommInfrastructure: kafka
111 group.id : {{ .Values.config.kafka.consumer.groupId }}
112 security.protocol: SASL_PLAINTEXT
113 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
114 sasl.jaas.config: ${JAASLOGIN}
117 topic: {{ .Values.config.kafka.topics.policyPdpPap }}
119 - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
120 topicCommInfrastructure: kafka
122 group.id : {{ .Values.config.kafka.consumer.groupId }}
123 security.protocol: SASL_PLAINTEXT
124 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
125 sasl.jaas.config: ${JAASLOGIN}
127 topic: {{ .Values.config.kafka.topics.policyNotification }}
129 - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
130 topicCommInfrastructure: kafka
132 group.id : {{ .Values.config.kafka.consumer.groupId }}
133 security.protocol: SASL_PLAINTEXT
134 sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
135 sasl.jaas.config: ${JAASLOGIN}
137 # If Strimzi Kafka to be used for communication, replace following configuration for topicSources and topicSinks
139 # - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
140 # topicCommInfrastructure: kafka
142 # security.protocol: SASL_PLAINTEXT
143 # sasl.mechanism: SCRAM-SHA-512
144 # sasl.jaas.config: ${JAASLOGIN}
146 healthCheckRestClientParameters:
150 userName: "${API_USER}"
151 password: "${API_PASSWORD}"
153 basePath: policy/api/v1/healthcheck
154 - clientName: distribution
155 hostname: policy-distribution
157 userName: "${DISTRIBUTION_USER}"
158 password: "${DISTRIBUTION_PASSWORD}"
160 basePath: healthcheck
167 include: health, metrics, prometheus
168 path-mapping.prometheus: metrics