deploy-templates/values.yaml (146 lines of code) (raw):

global: kafkaOperator: replicationFactor: 3 registry: bpms: replicas: 1 hpa: enabled: false minReplicas: 1 maxReplicas: 3 istio: sidecar: enabled: true resources: requests: {} limits: {} container: resources: requests: {} limits: {} envVars: {} podAnnotations: {} image: name: business-process-management version: latest port: 8080 service: type: ClusterIP port: 8080 appConfigMountPath: "/app/config/main" camundaVarsMountPath: "/app/config/camunda" appSecretsMountPath: "/app/secrets/main" cephSecretMountPath: "/app/secrets/ceph" fileStorageSecretMountPath: "/app/secrets/fileStorage" systemUserKeycloakClientSecretsMountPath: "/app/secrets/system-user-client" officerSystemClientSecretsMountPath: "/app/secrets/officer-system-client" citizenKeycloakClientSecretsMountPath: "/app/secrets/citizen-realm-admin-client" officerKeycloakClientSecretsMountPath: "/app/secrets/officer-realm-admin-client" prometheusScrapePath: "/actuator/prometheus" readinessPath: "/actuator/health/readiness" livenessPath: "/actuator/health/liveness" officerConfigMountPath: "/app/config/registry-regulation/officer-roles" citizenConfigMountPath: "/app/config/registry-regulation/citizen-roles" redisSecretsMountPath: "/app/secrets/redis" officerConfigMapName: officer-roles citizenConfigMapName: citizen-roles registrySecrets: secretRootPath: "/app/secrets" trembitaRegistriesSecretsName: trembita-registries-secrets externalSystemsSecretsName: external-systems-secrets registryConfigs: configRootPath: "/app/config/registry-regulation" trembitaRegistriesConfigurationName: trembita-registries-configuration trembitaRegistriesConfigurationPath: "registry-regulation/trembita-registries-configuration" diiaConfigurationName: diia-configuration externalSystemsConfigurationName: external-systems-configuration externalSystemsEndpointConfigurationName: external-systems-endpoint-configuration notificationBlacklistConfigurationName: notification-blacklist-configuration db: url: citus-master port: 5432 name: camunda secret: operational-pguser-postgres camunda: bpm: historyLevel: AUDIT databaseHistoryLevel: ACTIVITY ingress: # expose the service with a route or an ingress depending on platform type platform: openshift # openshift or kubernetes ceph: host: ${CEPH_BUCKET_HOST} fileStorage: bucketName: lowcode-file-storage monitoring: namespace: openshift-monitoring keycloak: citizenClient: clientName: realm-admin realm: citizen-portal public: false secretName: keycloak-realm-admin-citizen-client-secret officerClient: clientName: realm-admin realm: officer-portal public: false secretName: keycloak-realm-admin-officer-client-secret systemUserClient: clientName: system-user realm: officer-portal public: false secretName: keycloak-system-user-officer-client-secret officerSystemClient: clientName: user-attributes-management realm: officer-portal public: false secretName: keycloak-realm-officer-user-attributes-management-client-secret realms: admin: admin external: external-system certificatesEndpoint: /protocol/openid-connect/certs deployProfile: prod storage: form-data: type: redis cleaningEndEventEnabled: true message-payload: type: redis backend: redis: scan-count: 100 password: ${REDIS_PASSWORD} sentinel: master: mymaster nodes: ${redis.endpoint} file-data: type: ceph backend: ceph: http-endpoint: ${ceph.http-endpoint} access-key: ${ceph.file-storage-access-key} secret-key: ${ceph.file-storage-secret-key} bucket: ${ceph.file-storage-bucket} s3: config: client: protocol: http options: pathStyleAccess: true kafka: service: kafka-cluster-kafka-bootstrap:9093 user: bpms-user clusterName: kafka-cluster sslEnabled: true sslCertType: PEM sslUserKey: ${KAFKA_USER_KEYSTORE_KEY} sslUserCertificate: ${KAFKA_USER_KEYSTORE_CERTIFICATE} sslClusterCertificate: ${KAFKA_CLUSTER_TRUSTSTORE} numPartitions: 15 errorHandlerInitialInterval: 1500 errorHandlerMaxElapsedTime: 6000 errorHandlerMultiplier: 2 restTemplate: sslCheckingEnabled: false readSecretsRoleName: read-secrets-role redis: secretName: redis-auth