aboutsummaryrefslogtreecommitdiffstats
path: root/kubernetes/a1policymanagement/values.yaml
AgeCommit message (Collapse)AuthorFilesLines
2024-03-14[COMMON] Harmonize resource settings, Part 2Andreas Geissler1-2/+2
Some settings are still wrongly interpreted (e.g. 0.02Gi) Therefor they are changed to non-floating numbers (e.g. 20Mi) Issue-ID: OOM-3273 Change-Id: Icc88dead1ac5b1df8629d6adcc438a739e20522e Signed-off-by: Andreas Geissler <andreas-geissler@telekom.de>
2024-02-28[COMMON] Harmonize resource settingsAndreas Geissler1-8/+8
Update all resource settings to the kubernetes recommended normalized form. Fix ReadinessCheck resource limits. Issue-ID: OOM-3273 Change-Id: Ie10903b801e4dc1689bcec092162d711a431a7a6 Signed-off-by: Andreas Geissler <andreas-geissler@telekom.de>
2023-06-22[SDNC] Bump SDNC and CCSDK versions for London releaseDan Timoney1-1/+1
Bump versions of SDNC and CCSDK docker images for London release, bump sdnc version to 2.5.2 to resolve gating issues bump sdnc version to 2.5.3 to add missing Bierman API karaf feature bump sdnc version to 2.5.5 to resolve HTTP PATCH issue ueb-listener to use sdc-distr-client 2.0.0 (kafka native) Use Strimzi KafkaUser template Issue-ID: CCSDK-3876 Issue-ID: CCSDK-1789 Issue-ID: CCSDK-3908 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: I053058f09bad1f5d1578979134eed43eee1d76eb
2023-06-20[A1P] Increase resource limits for "small" flavourAndreas Geissler1-2/+2
To prevent startup problems for a1policymanagement pod the resource request and limit settings are adjusted Issue-ID: OOM-3180 Signed-off-by: Andreas Geissler <andreas-geissler@telekom.de> Change-Id: I9ea07b908171ab4741f7c3a56dce8806dd58db69
2023-03-20[A1P] Chart Cleanup from TLS/AAFAndreas Geissler1-38/+9
Update the charts and remove all TLS/AAF related entries Issue-ID: OOM-3112 Signed-off-by: Andreas Geissler <andreas-geissler@telekom.de> Change-Id: I50dc3aea3360ee0d593942481edcb7ff7b572cbd
2023-02-28[PMS] Removal of usage of DMaaPPatrikBuhr1-2/+0
Usage of DMaap is removed from PMS. This commit removes DMaaP from configuration files. Issue-ID: CCSDK-3852 Signed-off-by: PatrikBuhr <patrik.buhr@est.tech> Change-Id: I836f5275ba174d757b940b6442d9d5143d6a3cb1
2022-10-21[A1POLICYMANAGEMENT] Make A1P ServiceMesh compatibleAndreas Geissler1-0/+1
Update the application config to run in Istio SM by using HTTP instead of HTTPS and disable AAF dependency Issue-ID: OOM-3008 Signed-off-by: Andreas Geissler <andreas-geissler@telekom.de> Change-Id: I3882912d98b05861114848902f35d254fa49c9d8
2022-06-08[SDNC] Update image to install final Jakarta fixesDan Timoney1-1/+1
Update versions for SDNC images to install final Jakarta fixes. Issue-ID: SDNC-1706 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: Ic0c7ddf9f61f020889aa814d7031f6f76a473a8f
2022-04-19[CCSDK][SDNC] Install Jakarta versionsDan Timoney1-1/+1
Install Jakarta M4 versions of CCSDK and SDNC docker containers Issue-ID: CCSDK-3604 Issue-ID: SDNC-1672 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: Ifd5da73e9fd6937e9e395522b49f60263f64d472
2022-01-25[SDNC] Upgrade log4j to version 2.17.1Dan Timoney1-1/+1
Update SDNC image versions to address log4j vulnerability by upgrading to version 2.17.1 of log4j-core Issue-ID: SDNC-1655 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: I0b227e2b2ebaab1a915ab39d69b790f8d7b99a39
2021-10-31[SDNC] Bump version for Istanbul RCDan Timoney1-1/+1
Bump version of SDNC and CCSDK images for Istanbul RC milestone. Issue-ID: SDNC-1615 Issue-ID: CCSDK-3483 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: Id3a3627765e5623aa6cd8bffbfad1679ae6afef6
2021-10-10[SDNC] Bump versions for IstanbulDan Timoney1-1/+1
Bump image versions for SDNC for Istanbul release Issue-ID: SDNC-1609 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: Iecfb133ce8563ccfabf1a38af9d8c26d99d398f4
2021-10-04Merge "[COMMON] Add and run pre-commit linters via tox"Sylvain Desbureaux1-1/+1
2021-09-28[A1POLICYMANAGEMENT] Update chart with service accountfarida azmy1-1/+5
Add service account to requirements, values and deployment/statefulset. Issue-ID: OOM-2844 Signed-off-by: farida azmy <farida.azmy.ext@orange.com> Change-Id: I06c320e8bcf0f98fe65d31f4508177bd5d40a27d
2021-09-26[COMMON] Add and run pre-commit linters via toxguillaume.lambert1-1/+1
- create a .pre-commit-config.yaml configuration file with * gitlint * trailing blanks linter * tabs removal linter - exclude .git folder from it - exclude Makefiles since tabs are mandatory by default in them - create a tox pre-commit profile to run it from tox note gitlint is not runnable at this pre-commit stage - create pre-commit-install and pre-commit-uninstall tox profiles to (un)install hooks locally and (un)perform tests at each "git commit" call (i.e. without calling manually the pre-commit tox profile) - precise pre-commit stages/types in the pre-commit configuration file so that hooks are installed correctly. This avoids messages about skipped tests when they are run at a wrong stage. Issue-ID: OOM-2643 Signed-off-by: guillaume.lambert <guillaume.lambert@orange.com> Change-Id: Ie95bb4f6f90be80b05a1398973caffeff7936881
2021-06-11[PMS] Persistent storage of policies and type definitionsPatrikBuhr1-1/+2
Improvements: - Using common metadata for the PV and the PVC. - Changed the deployment to a stateful set. Even Deployments with one replica using ReadWriteOnce volume are not recommended. This is because the default Deployment strategy creates a second Pod before bringing down the first Pod on a recreate. The Deployment may fail in deadlock as the second Pod can't start because the ReadWriteOnce volume is already in use, and the first Pod won't be removed because the second Pod has not yet started. Instead, use a StatefulSet with ReadWriteOnce volumes. Change-Id: If3477be43eee5348a9142cceb832bbb2bf9d6017 Issue-ID: CCSDK-3256 Signed-off-by: PatrikBuhr <patrik.buhr@est.tech>
2021-04-29[PMS] Persistent storage of policies and type definitionsPatrikBuhr1-2/+27
Policy types and type definitions are stored persistently to survive a restart of PMS. Added persistent volume claim. Change-Id: Ia947bb71a6bdee3a8e576337b2870c54ee3c08f9 Issue-ID: CCSDK-3256 Signed-off-by: PatrikBuhr <patrik.buhr@est.tech>
2021-04-14Merge "[CCSDK] Install bug fix for A1 policy manager"Sylvain Desbureaux1-1/+1
2021-04-13[CCSDK] Install bug fix for A1 policy managerDan Timoney1-1/+1
Bump version of a1 policy manager to install bug fix for issue CCSDK-3227, which is causing flood of log message to sdnc pod. Issue-ID: CCSDK-3227 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: Ia43dfed07490571d3d1fa588d894fc13c282c4e2
2021-04-08[GLOBAL] Don't try to set keypassword when storetype is PKCS12Krzysztof Opasiak1-5/+0
It seems that for PKCS12 stores there is no keypassword so we are getting this error in our logs: keytool error: java.lang.UnsupportedOperationException: -keypasswd commands not supported if -storetype is PKCS12 Let's fix this by just not trying to set key password for PKCS12 stores. Issue-ID: OOM-1 Change-Id: I8f4cc5a0b54029b3c1baa83b61092942e34ffab2 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
2021-04-01Merge "[CCSDK] Fix error logs due to empty URL"Sylvain Desbureaux1-4/+17
2021-03-31[CCSDK-SDNC] Bump versions for HonoluluDan Timoney1-1/+1
Bump versions of CCSDK (including CDS) and SDNC images for SDNC Honolulu release. Fixed issues found in CDS command-executor and py-executor pods. Added missing env variable settings. Issue-ID: CCSDK-3125 Issue-ID: SDNC-1473 Issue-ID: CCSDK-3192 Issue-ID: CCSDK-3197 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: Id3bbe696313c568dc9ffb328715a7fc572330411
2021-03-30[CCSDK] Fix error logs due to empty URLRehanRaza1-4/+17
The gating tests for Honolulu have reported flooding of error messages in SDNC because the ricLink in values.yaml was not set. The information about RICs can now be provided in values.yaml Change-Id: I8ef67c27ed95432fb90de88b2976f39068fa7be0 Issue-ID: CCSDK-3227 Signed-off-by: RehanRaza <muhammad.rehan.raza@est.tech> [Improve ric list generation] Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
2021-02-28[A1P] Retrieve the certificates automaticallySylvain Desbureaux1-0/+38
Instead of using hardcoded certificates in the container, let's retrieve them automatically. Issue-ID: OOM-2681 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: If08469469fecdc8bf86d080980f221e5941a2329
2020-11-21[A1Policy] Uses new tpls for repos / imagesSylvain Desbureaux1-3/+1
This commit makes A1 Policy Management chart to use the new generator for repositories and images. Issue-ID: OOM-2364 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I862bb425b05e152c669f8ff6ecbe34c96af4f6e7
2020-11-05[CCSDK] Make a1policymanagement react on ConfigMap updatesKonrad Bańka1-1/+4
Updated Deployment spec to template ConfigMap files in runtime allowing live reaction of application to config changes. Provided Configmaps with scripts to handle monitoring configmap-provided files. Updated envsubst to explicitly point to downloaded version. Issue-ID: CCSDK-2958 Signed-off-by: Konrad Bańka <k.banka@samsung.com> Change-Id: I22e18f2838c0956f899cb9fa96d9fd862e6c6942
2020-10-30[CCSDK] Update a1policymanagement image versionKonrad Bańka1-1/+1
Current version was pointing to Honolulu candidate image, while before branch-off, it should contain Guilin one. Issue-ID: CCSDK-2962 Signed-off-by: Konrad Bańka <k.banka@samsung.com> Change-Id: I732203d0c3cdf0f5e5d833e6bbd060ee03783075
2020-09-24[A1POLICYMANAGEMENT] Guilin version bumpLathish1-1/+1
Bump image versions to use Guilin M4 version of A1 Policy Management image Issue-ID: CCSDK-2854 Change-Id: Iee58442b0cd56c1a3e68a96d4ce62c32e810f90a Signed-off-by: Lathish <lathishbabu.ganesan@est.tech>
2020-09-16Add A1 Policy Management Service helm chartsLathish1-0/+89
Issue-ID: CCSDK-2492 Change-Id: Ide809298d075471b457cfb93fee77658c7cb597c Signed-off-by: Lathish <lathishbabu.ganesan@est.tech>