diff options
author | Andreas Geissler <andreas-geissler@telekom.de> | 2023-03-14 19:44:19 +0000 |
---|---|---|
committer | Gerrit Code Review <gerrit@onap.org> | 2023-03-14 19:44:19 +0000 |
commit | 8a626708ed05ca337586695b2056441fc6405fec (patch) | |
tree | 92003f4373c76afaa9e26bb2684968017248d29f /kubernetes/policy/components/policy-clamp-ac-a1pms-ppnt/values.yaml | |
parent | 1ca95eead50a3b8994751b013d7b39dc1e5e3562 (diff) | |
parent | 6910bbe1e3f2e44e5e100b8fec34a6da8b8eb231 (diff) |
Merge "[POLICY-PPNT] Move policy-clamp-ppnt use case to use strimzi kafka"
Diffstat (limited to 'kubernetes/policy/components/policy-clamp-ac-a1pms-ppnt/values.yaml')
-rwxr-xr-x | kubernetes/policy/components/policy-clamp-ac-a1pms-ppnt/values.yaml | 52 |
1 files changed, 24 insertions, 28 deletions
diff --git a/kubernetes/policy/components/policy-clamp-ac-a1pms-ppnt/values.yaml b/kubernetes/policy/components/policy-clamp-ac-a1pms-ppnt/values.yaml index 6799635776..885f2c9793 100755 --- a/kubernetes/policy/components/policy-clamp-ac-a1pms-ppnt/values.yaml +++ b/kubernetes/policy/components/policy-clamp-ac-a1pms-ppnt/values.yaml @@ -1,5 +1,5 @@ # ============LICENSE_START======================================================= -# Copyright (C) 2022 Nordix Foundation. +# Copyright (C) 2022-2023 Nordix Foundation. # ================================================================================ # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -22,6 +22,11 @@ global: persistence: {} aafEnabled: false + #Strimzi Kafka properties + useStrimziKafka: set-via-parent-chart-global-value + kafkaTopics: + acRuntimeTopic: + name: &acRuntimeTopic policy.clamp-runtime-acm ################################################################# # Secrets metaconfig @@ -43,13 +48,6 @@ secrets: externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}' password: '{{ .Values.certStores.trustStorePassword }}' passwordPolicy: required - - uid: policy-kafka-user - externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}' - type: genericKV - envs: - - name: sasl.jaas.config - value: '{{ .Values.config.someConfig }}' - policy: generate certStores: keyStorePassword: Pol1cy_0nap @@ -62,6 +60,8 @@ certStores: image: onap/policy-clamp-ac-a1pms-ppnt:6.4.1 pullPolicy: Always +componentName: &componentName policy-clamp-ac-a1pms-ppnt + # application configuration restServer: user: participantUser @@ -105,7 +105,7 @@ readiness: service: type: ClusterIP - name: policy-clamp-ac-a1pms-ppnt + name: *componentName ports: - name: a1pms-api port: 8086 @@ -131,32 +131,28 @@ resources: unlimited: {} #Pods Service Account serviceAccount: - nameOverride: policy-clamp-ac-a1pms-ppnt + nameOverride: *componentName roles: - create config: -# Event consumption (kafka) properties - useStrimziKafka: true - kafkaBootstrap: strimzi-kafka-bootstrap - kafka: - consumer: - groupId: policy-group - app: - listener: - acRuntimeTopic: policy-acruntime-participant -# If targeting a custom kafka cluster, ie useStrimziKakfa: false -# uncomment below config and target your kafka bootstrap servers, -# along with any other security config. -# -# eventConsumption: -# spring.kafka.bootstrap-servers: <kafka-bootstrap>:9092 -# spring.kafka.security.protocol: PLAINTEXT -# spring.kafka.consumer.group-id: policy-group -# # Any new property can be added in the env by setting in overrides in the format mentioned below # All the added properties must be in "key: value" format instead of yaml. # additional: # spring.config.max-size: 200 # spring.config.min-size: 10 +# Strimzi Kafka config +kafkaUser: + authenticationType: scram-sha-512 + acls: + - name: *componentName + type: group + operations: [Read] + - name: *acRuntimeTopic + type: topic + operations: [Read, Write] + +readinessCheck: + wait_for: + - message-router
\ No newline at end of file |