# Copyright © 2018 Amdocs, Bell Canada # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. ################################################################# # Global configuration defaults. ################################################################# global: nodePortPrefix: 302 nodePortPrefixExt: 304 aafEnabled: true ################################################################# # AAF Part ################################################################# certInitializer: nameOverride: sdc-wfd-fe-cert-init aafDeployFqi: deployer@people.osaaf.org aafDeployPass: demo123456! fqdn: sdc fqi: sdc@sdc.onap.org public_fqdn: sdc.onap.org cadi_longitude: "0.0" cadi_latitude: "0.0" app_ns: org.osaaf.aaf credsPath: /opt/app/osaaf/local addconfig: true keystoreFile: "org.onap.sdc.p12" truststoreFile: "org.onap.sdc.trust.jks" permission_user: 352070 permission_group: 35953 aaf_add_config: | echo "cadi_keystore_password_p12=$cadi_keystore_password_p12" > {{ .Values.credsPath }}/mycreds.prop echo "cadi_truststore_password=$cadi_truststore_password" >> {{ .Values.credsPath }}/mycreds.prop ################################################################# # Application configuration defaults. ################################################################# # application image image: onap/sdc-workflow-frontend:1.7.0 pullPolicy: Always # flag to enable debugging - application support required debugEnabled: false config: javaOptions: "-Xmx256m -Xms256m" backendServerURL: https: "https://sdc-wfd-be:8443" http: "http://sdc-wfd-be:8080" # following flag decides whether to check the certificate on the outgoing proxy request or whether to trust all parties isTrustAll: true # https relevant settings. Change in case you have other trust files then default ones. #environment file env: name: AUTO security: isDefaultStore: false # default number of instances replicaCount: 1 nodeSelector: {} affinity: {} # probe configuration parameters liveness: initialDelaySeconds: 1 periodSeconds: 10 successThreshold: 1 failureThreshold: 3 # necessary to disable liveness probe when setting breakpoints # in debugger so K8s doesn't restart unresponsive container enabled: true readiness: initialDelaySeconds: 1 periodSeconds: 10 successThreshold: 1 failureThreshold: 3 startup: initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 failureThreshold: 60 service: type: NodePort internalPort: 8080 externalPort: 8080 internalPort2: 8443 externalPort2: 8443 portName: sdc-wfd-fe nodePort: "56" # only one node port. set to http or https port depending on isHttpsEnabled property ingress: enabled: false service: - baseaddr: "sdcwfdfe" name: "sdc-wfd-fe" port: 8443 annotations: ingress.kubernetes.io/secure-backends: "false" nginx.ingress.kubernetes.io/secure-backends: "false" nginx.ingress.kubernetes.io/proxy-body-size: "0" nginx.ingress.kubernetes.io/ssl-redirect: "true" nginx.ingress.kubernetes.io/backend-protocol: "HTTP" nginx.ingress.kubernetes.io/rewrite-target: "/workflows/" # Resource Limit flavor -By Default using small # Segregation for Different environment (Small and Large) flavor: small resources: small: limits: cpu: 500m memory: 2Gi requests: cpu: 40m memory: 1Gi large: limits: cpu: 1 memory: 4Gi requests: cpu: 80m memory: 2Gi unlimited: {} #Pods Service Account serviceAccount: nameOverride: sdc-wfd-fe roles: - read #Log configuration log: path: /var/log/onap logConfigMapNamePrefix: '{{ include "common.fullname" . }}'