CNC Console Helm Configurable Values

The custom-cncconsole_values.yaml file can also be downloaded from OHC.

---
cmservice:
  dockerRegistry: ocspf-registry.us.oracle.com:5000
  image:
    name: ocscp/cncc/cncc-cmservice-cm-tag
    tag: helm-tag
    # Pull Policy - Possible Values are:- Always, IfNotPresent, Never  
    pullPolicy: Always
  resources:
    limits:
      cpu: 2
      memory: 2Gi
    requests:
      cpu: 2
      memory: 1Gi
  deployment:
    envManageNF: SCP, NRF, PCF
    nodeSelectorEnabled: false
    nodeSelectorKey: zone
    nodeSelectorValue: app
  service:
    http:
      port: 8442
    type: ClusterIP
  commonServices:
    routes:
  
ingress-gateway:
  global:
    # Docker registry name
    dockerRegistry: ocspf-registry.us.oracle.com:5000/ocscp
      
    # port on which NRF's API-Gateway service is exposed
    # If httpsEnabled is false, this Port would be HTTP/2.0 Port (unsecured)
    # If httpsEnabled is true, this Port would be HTTPS/2.0 Port (secured SSL)
    publicHttpSignalingPort: 80
    publicHttpsSignallingPort: 443
    serviceAccountName: ''
      
    #Specify type of service - Possible values are :- ClusterIP, NodePort, LoadBalancer and ExternalName
    type: LoadBalancer
      
    #Enable or disable IP Address allocation from Metallb Pool
    metalLbIpAllocationEnabled: true
    
    #Address Pool Annotation for Metallb
    metalLbIpAllocationAnnotation: "metallb.universe.tf/address-pool: oam"
      
    #If Static load balancer IP needs to be set, then set staticIpAddressEnabled flag to true and provide value for staticIpAddress
    #Else random IP will be assigned by the metalLB from its IP Pool
    staticIpAddressEnabled: false
    staticIpAddress: ""
    
    #If Static node port needs to be set, then set staticNodePortEnabled flag to true and provide value for staticNodePort
    #Else random node port will be assigned by K8
    staticNodePortEnabled: false
    staticHttpNodePort: 30075
    staticHttpsNodePort: 30043
    
  image:
    # image name
    name: cncc/cncc-apigateway-api-tag
    # tag name of image
    tag: helm-tag
    # Pull Policy - Possible Values are:- Always, IfNotPresent, Never
    pullPolicy: Always
      
  initContainersImage:
    # inint Containers image name
    name: cncc/apigw-configurationinit-init-tag
    # tag name of init Container image
    tag: helm-tag
    # Pull Policy - Possible Values are:- Always, IfNotPresent, Never
    pullPolicy: Always
      
  updateContainersImage:
    # update Containers image name
    name: cncc/apigw-configurationupdate-update-tag
    # tag name of update Container image
    tag: helm-tag
    # Pull Policy - Possible Values are:- Always, IfNotPresent, Never
    pullPolicy: Always  
      
  service:
    ssl:
      tlsVersion: TLSv1.2
        
      privateKey:
        k8SecretName: ingress-secret
        k8NameSpace: cncc
        rsa:
          fileName: rsa_private_key_pkcs1.pem
        ecdsa:
          fileName: ssl_ecdsa_private_key.pem
  
      certificate:
        k8SecretName: ingress-secret
        k8NameSpace: cncc
        rsa:
          fileName: tmp.cer
        ecdsa:
          fileName: ssl_ecdsa_certificate.crt
  
      caBundle:
        k8SecretName: ingress-secret
        k8NameSpace: cncc
        fileName: caroot.cer
  
      keyStorePassword:
        k8SecretName: ingress-secret
        k8NameSpace: cncc
        fileName: key.txt
  
      trustStorePassword:
        k8SecretName: ingress-secret
        k8NameSpace: cncc
        fileName: trust.txt
  
      initialAlgorithm: RSA256
        
  ports:
    # ContainerPort represents a network port in a single container
    containerPort: 8081
    containersslPort: 8443
    actuatorPort: 9090
    
  log:
    level: WARN
    
  readinessProbe:
    # tells the kubelet that it should wait second before performing the first probe
    initialDelaySeconds: 30
    # Number of seconds after which the probe times out
    timeoutSeconds: 3
    # specifies that the kubelet should perform a liveness probe every xx seconds
    periodSeconds: 10
    # Minimum consecutive successes for the probe to be considered successful after having failed
    successThreshold: 1
    # When a Pod starts and the probe fails, Kubernetes will try failureThreshold times before giving up
    failureThreshold: 3
      
  livenessProbe:
    # tells the kubelet that it should wait second before performing the first probe
    initialDelaySeconds: 30
    # Number of seconds after which the probe times out
    timeoutSeconds: 3
    # specifies that the kubelet should perform a liveness probe every xx seconds
    periodSeconds: 15
    # Minimum consecutive successes for the probe to be considered successful after having failed
    successThreshold: 1
    # When a Pod starts and the probe fails, Kubernetes will try failureThreshold times before giving up
    failureThreshold: 3
    
  # Resource details
  resources:
    limits:
      cpu: 4
      initServiceCpu: 1
      updateServiceCpu: 1
      memory: 2Gi
    requests:
      cpu: 4
      initServiceCpu: 1
      updateServiceCpu: 1
      memory: 1Gi
    target:
      averageCpuUtil: 80
      
  # Nuber of Pods must always be available, even during a disruption.
  minAvailable: 1
  # Min replicas to scale to maintain an average CPU utilization
  minReplicas: 1
  # Max replicas to scale to maintain an average CPU utilization
  maxReplicas: 5
    
  # enable jagger tracing
  jaegerTracingEnabled: false
    
  openTracing :
    jaeger:
      udpSender:
        # udpsender host
        host: "occne-tracer-jaeger-agent.occne-infra"
        # udpsender port
        port: 6831
      probabilisticSampler: 0.5
  
  # label to override name of api-gateway micro-service name
  fullnameOverride: ingress
    
  # To Initialize SSL related infrastructure in init/update container
  initssl: false
    
  #OAUTH CONFIGURATION
  oauthValidatorEnabled: false
    
  #Server Configuration for http and https support
  enableIncomingHttp: true
  enableIncomingHttps: false
  enableOutgoingHttps: false
  serviceMeshCheck: false
  needClientAuth: false
    
  # enable cncc apigateway
  # Enabling will this will enable Identity-Access-Management(IAM)
  cncoamGatewayEnabled: true
    
  # IAM configuration
  # uri should include the IAM Loadbalancer IP and port (e.g. 10.145.22.70:8285)
  identityAccessMgt:
    #uri: http://10.75.213.121:30024
    uri: http://<IP>:<Port>
    path: /cncc/auth
    realm: cncc
    
routesConfig:
   # Note: Update FQDN and PORT with actual values. If not remove those routes else CNCC will fail to deploy. CNCC requires complete routes and not placeholders.
   # Examples for routes
   #- id: scpc_configuration
   # uri: http://10.75.153.121:31131
   # path: /soothsayer/v1/**
   #- id: default_configuration
   # uri: http://cncc-cmservice.cncc.svc.cluster.local:8442
   # path: /**
   - id: scpc_configuration
     uri: http://<FQDN>:<PORT>
     path: /soothsayer/v1/**
   - id: nrf_configuration
     uri: http://<FQDN>:<PORT>
     path: /nrf-configuration/v1/**
   - id: pcf_configuration
     uri: http://<FQDN>:<PORT>
     path: /pcfapi/**
     rewritePath: "/pcfapi(?<segment>/?.*), $\\{segment}"
   - id: default_mapping
     uri: http://<helmrelease>-cmservice.<namespace>.<domain>:8442
     path: /**