aboutsummaryrefslogtreecommitdiffstats
path: root/kubernetes/policy/components/policy-pap/resources/config/papParameters.yaml
blob: 58dfc9f497a876a246ba1273299d776a11dbf580 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
#  ============LICENSE_START=======================================================
#   Copyright (C) 2022 Bell Canada. All rights reserved.
#   Modifications Copyright © 2022-2024 Nordix Foundation
#  ================================================================================
#  Licensed under the Apache License, Version 2.0 (the "License");
#  you may not use this file except in compliance with the License.
#  You may obtain a copy of the License at
#
#       http://www.apache.org/licenses/LICENSE-2.0
#
#  Unless required by applicable law or agreed to in writing, software
#  distributed under the License is distributed on an "AS IS" BASIS,
#  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
#  See the License for the specific language governing permissions and
#  limitations under the License.
#
#  SPDX-License-Identifier: Apache-2.0
#  ============LICENSE_END=========================================================

spring:
  security:
    user:
      name: "${RESTSERVER_USER}"
      password: "${RESTSERVER_PASSWORD}"
  http:
    converters:
      preferred-json-mapper: gson
  datasource:
{{ if .Values.global.mariadbGalera.useInPolicy }}
    url: jdbc:mariadb://{{ .Values.db.service.name }}:{{ .Values.db.service.internalPort }}/policyadmin
    driverClassName: org.mariadb.jdbc.Driver
    username: "${SQL_USER}"
    password: "${SQL_PASSWORD}"
    hikari:
      maximumPoolSize: 20
  jpa:
    hibernate:
      ddl-auto: none
      naming:
        physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl
        implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy
{{- else }}
    url: jdbc:postgresql://{{ .Values.db.service.pgName }}:{{ .Values.db.service.internalPgPort }}/policyadmin
    driverClassName: org.postgresql.Driver
    username: "${SQL_USER}"
    password: "${SQL_PASSWORD}"
    hikari:
      connectionTimeout: 30000
      idleTimeout: 600000
      maxLifetime: 1800000
      maximumPoolSize: 10
  jpa:
    hibernate:
      ddl-auto: none
      naming:
        physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl
        implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy
{{ end }}

server:
  port: 6969
  ssl:
    enabled: false
  servlet:
    context-path: /policy/pap/v1

pap:
  name: PapGroup
  topic:
    pdp-pap.name: {{ .Values.config.kafka.topics.policyPdpPap }}
    notification.name: {{ .Values.config.kafka.topics.policyNotification }}
    heartbeat.name: {{ .Values.config.kafka.topics.policyHeartbeat }}
  pdpParameters:
    heartBeatMs: 120000
    updateParameters:
      maxRetryCount: 1
      maxWaitMs: 30000
    stateChangeParameters:
      maxRetryCount: 1
      maxWaitMs: 30000
  savePdpStatisticsInDb: true
  topicParameterGroup:
    topicSources:
      - useHttps: false
        fetchTimeout: 15000
        topic: {{ .Values.config.kafka.topics.policyPdpPap }}
        servers:
          - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
        topicCommInfrastructure: kafka
        additionalProps:
          group.id : {{ .Values.config.kafka.consumer.groupId }}
          security.protocol: SASL_PLAINTEXT
          sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
          sasl.jaas.config: ${JAASLOGIN}
      - useHttps: false
        fetchTimeout: 15000
        topic: {{ .Values.config.kafka.topics.policyHeartbeat }}
        effectiveTopic: {{ .Values.config.kafka.topics.policyPdpPap }}
        servers:
          - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
        topicCommInfrastructure: kafka
        additionalProps:
          group.id : {{ .Values.config.kafka.consumer.groupId }}
          security.protocol: SASL_PLAINTEXT
          sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
          sasl.jaas.config: ${JAASLOGIN}
    topicSinks:
      - useHttps: false
        topic: {{ .Values.config.kafka.topics.policyPdpPap }}
        servers:
          - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
        topicCommInfrastructure: kafka
        additionalProps:
          group.id : {{ .Values.config.kafka.consumer.groupId }}
          security.protocol: SASL_PLAINTEXT
          sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
          sasl.jaas.config: ${JAASLOGIN}
      - useHttps: false
        topic: {{ .Values.config.kafka.topics.policyNotification }}
        servers:
          - {{ include "common.release" . }}-{{ .Values.global.kafkaBootstrap }}
        topicCommInfrastructure: kafka
        additionalProps:
          group.id : {{ .Values.config.kafka.consumer.groupId }}
          security.protocol: SASL_PLAINTEXT
          sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }}
          sasl.jaas.config: ${JAASLOGIN}

# If Strimzi Kafka to be used for communication, replace following configuration for topicSources and topicSinks
#          servers:
#            - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
#          topicCommInfrastructure: kafka
#          additionalProps:
#            security.protocol: SASL_PLAINTEXT
#            sasl.mechanism: SCRAM-SHA-512
#            sasl.jaas.config: ${JAASLOGIN}

  healthCheckRestClientParameters:
  - clientName: api
    hostname: policy-api
    port: 6969
    userName: "${API_USER}"
    password: "${API_PASSWORD}"
    useHttps: false
    basePath: policy/api/v1/healthcheck

management:
  endpoints:
    web:
      base-path: /
      exposure:
        include: health, metrics, prometheus
      path-mapping.prometheus: metrics