deploy-templates/values.yaml (146 lines of code) (raw):
global:
kafkaOperator:
replicationFactor: 3
registry:
bpms:
replicas: 1
hpa:
enabled: false
minReplicas: 1
maxReplicas: 3
istio:
sidecar:
enabled: true
resources:
requests: {}
limits: {}
container:
resources:
requests: {}
limits: {}
envVars: {}
podAnnotations: {}
image:
name: business-process-management
version: latest
port: 8080
service:
type: ClusterIP
port: 8080
appConfigMountPath: "/app/config/main"
camundaVarsMountPath: "/app/config/camunda"
appSecretsMountPath: "/app/secrets/main"
cephSecretMountPath: "/app/secrets/ceph"
fileStorageSecretMountPath: "/app/secrets/fileStorage"
systemUserKeycloakClientSecretsMountPath: "/app/secrets/system-user-client"
officerSystemClientSecretsMountPath: "/app/secrets/officer-system-client"
citizenKeycloakClientSecretsMountPath: "/app/secrets/citizen-realm-admin-client"
officerKeycloakClientSecretsMountPath: "/app/secrets/officer-realm-admin-client"
prometheusScrapePath: "/actuator/prometheus"
readinessPath: "/actuator/health/readiness"
livenessPath: "/actuator/health/liveness"
officerConfigMountPath: "/app/config/registry-regulation/officer-roles"
citizenConfigMountPath: "/app/config/registry-regulation/citizen-roles"
redisSecretsMountPath: "/app/secrets/redis"
officerConfigMapName: officer-roles
citizenConfigMapName: citizen-roles
registrySecrets:
secretRootPath: "/app/secrets"
trembitaRegistriesSecretsName: trembita-registries-secrets
externalSystemsSecretsName: external-systems-secrets
registryConfigs:
configRootPath: "/app/config/registry-regulation"
trembitaRegistriesConfigurationName: trembita-registries-configuration
trembitaRegistriesConfigurationPath: "registry-regulation/trembita-registries-configuration"
diiaConfigurationName: diia-configuration
externalSystemsConfigurationName: external-systems-configuration
externalSystemsEndpointConfigurationName: external-systems-endpoint-configuration
notificationBlacklistConfigurationName: notification-blacklist-configuration
db:
url: citus-master
port: 5432
name: camunda
secret: operational-pguser-postgres
camunda:
bpm:
historyLevel: AUDIT
databaseHistoryLevel: ACTIVITY
ingress: # expose the service with a route or an ingress depending on platform type
platform: openshift # openshift or kubernetes
ceph:
host: ${CEPH_BUCKET_HOST}
fileStorage:
bucketName: lowcode-file-storage
monitoring:
namespace: openshift-monitoring
keycloak:
citizenClient:
clientName: realm-admin
realm: citizen-portal
public: false
secretName: keycloak-realm-admin-citizen-client-secret
officerClient:
clientName: realm-admin
realm: officer-portal
public: false
secretName: keycloak-realm-admin-officer-client-secret
systemUserClient:
clientName: system-user
realm: officer-portal
public: false
secretName: keycloak-system-user-officer-client-secret
officerSystemClient:
clientName: user-attributes-management
realm: officer-portal
public: false
secretName: keycloak-realm-officer-user-attributes-management-client-secret
realms:
admin: admin
external: external-system
certificatesEndpoint: /protocol/openid-connect/certs
deployProfile: prod
storage:
form-data:
type: redis
cleaningEndEventEnabled: true
message-payload:
type: redis
backend:
redis:
scan-count: 100
password: ${REDIS_PASSWORD}
sentinel:
master: mymaster
nodes: ${redis.endpoint}
file-data:
type: ceph
backend:
ceph:
http-endpoint: ${ceph.http-endpoint}
access-key: ${ceph.file-storage-access-key}
secret-key: ${ceph.file-storage-secret-key}
bucket: ${ceph.file-storage-bucket}
s3:
config:
client:
protocol: http
options:
pathStyleAccess: true
kafka:
service: kafka-cluster-kafka-bootstrap:9093
user: bpms-user
clusterName: kafka-cluster
sslEnabled: true
sslCertType: PEM
sslUserKey: ${KAFKA_USER_KEYSTORE_KEY}
sslUserCertificate: ${KAFKA_USER_KEYSTORE_CERTIFICATE}
sslClusterCertificate: ${KAFKA_CLUSTER_TRUSTSTORE}
numPartitions: 15
errorHandlerInitialInterval: 1500
errorHandlerMaxElapsedTime: 6000
errorHandlerMultiplier: 2
restTemplate:
sslCheckingEnabled: false
readSecretsRoleName: read-secrets-role
redis:
secretName: redis-auth