1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2022 Bell Canada. All rights reserved.
3 # Modifications Copyright © 2022 Nordix Foundation
4 # ================================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 # SPDX-License-Identifier: Apache-2.0
18 # ============LICENSE_END=========================================================
23 name: "${RESTSERVER_USER}"
24 password: "${RESTSERVER_PASSWORD}"
27 preferred-json-mapper: gson
29 url: jdbc:mariadb://{{ .Values.db.service.name }}:{{ .Values.db.service.internalPort}}/policyadmin
30 driverClassName: org.mariadb.jdbc.Driver
31 username: "${SQL_USER}"
32 password: "${SQL_PASSWORD}"
38 dialect: org.hibernate.dialect.MariaDB103Dialect
42 physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl
43 implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy
46 group-id: {{ .Values.config.kafka.consumer.groupId }}
47 {{- if .Values.config.useStrimziKafka }}
48 bootstrap-servers: {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
49 security.protocol: SASL_PLAINTEXT
51 mechanism: SCRAM-SHA-512
52 jaas.config: ${JAASLOGIN}
54 {{ toYaml .Values.config.eventConsumption | nindent 2 }}
60 enabled: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
70 stateChangeParameters:
73 savePdpStatisticsInDb: false
76 - topic: POLICY-PDP-PAP
79 useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
81 topicCommInfrastructure: dmaap
82 - topic: POLICY-HEARTBEAT
83 effectiveTopic: POLICY-PDP-PAP
84 consumerGroup: policy-pap
87 useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
89 topicCommInfrastructure: dmaap
91 - topic: POLICY-PDP-PAP
94 useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
95 topicCommInfrastructure: dmaap
96 - topic: POLICY-NOTIFICATION
99 useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
100 topicCommInfrastructure: dmaap
101 # If Strimzi Kafka to be used for communication, replace following configuration for topicSources and topicSinks
103 # - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
104 # topicCommInfrastructure: kafka
106 # security.protocol: SASL_PLAINTEXT
107 # sasl.mechanism: SCRAM-SHA-512
108 # sasl.jaas.config: ${JAASLOGIN}
110 healthCheckRestClientParameters:
114 userName: "${API_USER}"
115 password: "${API_PASSWORD}"
116 useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
117 basePath: policy/api/v1/healthcheck
118 - clientName: distribution
119 hostname: policy-distribution
121 userName: "${DISTRIBUTION_USER}"
122 password: "${DISTRIBUTION_PASSWORD}"
123 useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
124 basePath: healthcheck
126 hostname: message-router
128 useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}
136 include: health, metrics, prometheus
137 path-mapping.prometheus: metrics