-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathvalues.yaml
More file actions
472 lines (419 loc) · 14.9 KB
/
values.yaml
File metadata and controls
472 lines (419 loc) · 14.9 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
# Global values
global:
hub:
endpoints:
auth: https://auth.privateaim.dev
core: https://core.privateaim.dev
messenger: https://messenger.privateaim.dev
storage: https://storage.privateaim.dev
auth:
robotUser:
robotSecret:
node:
ingress:
## @param global.node.ingress.enabled Toggle whether ingress should be enabled
enabled: false
## @param global.node.ingress.enabled Host name to be assigned to the Node UI (/) and Hub Adapter API (/api)
hostname:
keycloak:
## @param global.keycloak.hostname Hostname for a separate instance of keycloak. Overrides the /keycloak subpath
## Leave this blank unless you want to use your own IDP
hostname:
# kong values
kong:
image:
repository: kong
tag: "3.6"
env:
prefix: /kong_prefix/
database: postgres
# The default values for admin_listen include both ipv4 and ipv6 - if cluster does not support ipv6, it should be defined (minikube does not support ipv6)
# admin_listen: "127.0.0.1:8001"
admin:
enabled: true
type: ClusterIP
http:
enabled: true
servicePort: 80
tls:
enabled: false
manager:
enabled: false
portal:
enabled: false
portalapi:
enabled: false
proxy:
enabled: true
type: ClusterIP
http:
enabled: true
servicePort: 80
tls:
enabled: false
ingressController:
enabled: false
# Sub-chart
postgresql:
enabled: true
nameOverride: kong-postgresql
auth:
database: kong
username: kong
password: kong
postgresPassword: supersecretpassword
flame-node-result-service:
result-service-postgresql:
nameOverride:
fullnameOverride:
auth:
## @param auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user
##
enablePostgresUser: true
## @param auth.postgresPassword Password for the "postgres" admin user. Ignored if `auth.existingSecret` is provided
##
postgresPassword: admin
username: postgres
password: postgres
database: postgres_db
existingSecret:
## @param auth.secretKeys.adminPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
## @param auth.secretKeys.userPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
## @param auth.secretKeys.replicationPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
##
secretKeys:
adminPasswordKey: postgres-password
userPasswordKey: password
replicationPasswordKey: replication-password
## @param auth.usePasswordFiles Mount credentials as a files instead of using an environment variable
##
usePasswordFiles: false
## Hub services and data
hub:
## @param hub.coreApi Hub core API endpoint
coreURL: https://core.privateaim.dev
## @param hub.authURL Hub auth API endpoint
authURL: https://auth.privateaim.dev
## @param hub.storageURL Hub storage API endpoint
storageURL: https://storage.privateaim.dev
## Credentials used for retrieving a valid robot token from the hub
auth:
existingSecret:
robotUser:
robotSecret:
env:
MINIO_USE_SSL: false
MINIO_BUCKET: flame
OIDC_CERTS_URL:
OIDC_CLIENT_ID_CLAIM_NAME: azp
minio:
# All possible values can be found at https://github.com/minio/minio/blob/master/helm/minio/values.yaml
## Provide a name in place of minio for `app:` labels
nameOverride:
## Provide a name to substitute for the full names of resources
fullnameOverride:
## set kubernetes cluster domain where minio is running
clusterDomain: cluster.local
## Set default rootUser, rootPassword
## rootUser and rootPassword is generated when not set
## Distributed MinIO ref: https://min.io/docs/minio/linux/operations/install-deploy-manage/deploy-minio-multi-node-multi-drive.html
##
rootUser: admin
rootPassword: s3cr3t_p4ssw0rd
## Use existing Secret that store following variables:
##
## | Chart var | .data.<key> in Secret |
## |:----------------------|:-------------------------|
## | rootUser | rootUser |
## | rootPassword | rootPassword |
##
## All mentioned variables will be ignored in values file.
## .data.rootUser and .data.rootPassword are mandatory,
## others depend on enabled status of corresponding sections.
existingSecret:
## Path where PV would be mounted on the MinIO Pod
mountPath: /mnt/data
## List of buckets to be created after minio install
##
buckets: [
{
name: flame,
policy: none,
purge: false,
versioning: false,
objectlocking: false
}
]
# # Name of the bucket
# - name: bucket1
# # Policy to be set on the
# # bucket [none|download|upload|public]
# policy: none
# # Purge if bucket exists already
# purge: false
# # set versioning for
# # bucket [true|false]
# versioning: false # remove this key if you do not want versioning feature
# # set objectlocking for
# # bucket [true|false] NOTE: versioning is enabled by default if you use locking
# objectlocking: false
# - name: bucket2
# policy: none
# purge: false
# versioning: true
# # set objectlocking for
# # bucket [true|false] NOTE: versioning is enabled by default if you use locking
# objectlocking: false
## Set default image, imageTag, and imagePullPolicy. mode is used to indicate the
image:
repository: quay.io/minio/minio
tag: RELEASE.2024-03-03T17-50-39Z
pullPolicy: IfNotPresent
imagePullSecrets: []
## Update strategy for Deployments
deploymentUpdate:
type: RollingUpdate
maxUnavailable: 0
maxSurge: 100%
mode: standalone
# Number of drives attached to a node
drivesPerNode: 1
# Number of MinIO containers running
replicas: 1
# Number of expanded MinIO clusters
pools: 1
resources:
requests:
memory: 1Gi
## Update strategy for StatefulSets
statefulSetUpdate:
updateStrategy: RollingUpdate
persistence:
enabled: true
annotations: {}
## A manually managed Persistent Volume and Claim
## Requires persistence.enabled: true
## If defined, PVC must be created manually before volume will be bound
existingClaim:
## minio data Persistent Volume Storage Class
## If defined, storageClassName: <storageClass>
## If set to "-", storageClassName: "", which disables dynamic provisioning
## If undefined (the default) or set to null, no storageClassName spec is
## set, choosing the default provisioner. (gp2 on AWS, standard on
## GKE, AWS & OpenStack)
##
## Storage class of PV to bind. By default it looks for standard storage class.
## If the PV uses a different storage class, specify that here.
storageClass:
volumeName:
accessMode: ReadWriteOnce
size: 10Gi
# keycloak values
keycloak:
auth:
adminUser: admin
adminPassword: admin
ingress:
## @param ingress.enabled Enable ingress record generation for Keycloak
##
enabled: false
## @param ingress.hostname Default host for the ingress record
##
hostname: ""
## @param keycloak.proxyHeaders Set Keycloak proxy headers to "forwarded" or "xforwarded"
## If you are using a reverse proxy for anything other than https passthrough, then this needs to be set else 403
proxyHeaders: ""
postgresql:
enabled: true
nameOverride: keycloak-postgresql
auth:
postgresPassword: # Not needed since secret is provided
username: keycloak # custom user
password: keycloak # custom user pwd
database: keycloak
existingSecret: kc-password-secret # admin password, requires "password" key in secret
architecture: standalone
keycloakConfigCli:
## @param keycloakConfigCli.enabled Whether to enable keycloak-config-cli job
## Must be set to true to apply settings below
enabled: true
existingConfigmap: flame-default-realm
# hub-api-adapter Values
flame-node-hub-adapter:
## For defining ingress specific metadata
ingress:
## @param ingress.enabled Enable ingress record generation for the Hub Adapter
##
enabled: false
## @param ingress.pathType Ingress path type
##
pathType: Prefix
## @param ingress.hostname Default host for the ingress record (evaluated as template)
##
hostname:
## Keycloak related information
idp:
## @param idp.debug If true, the clientId and clientSecret will use pre-defined values
## The clientSecret will be defined using the "static" k8s secret key
debug: false
## @param idp.clientId Keycloak client ID for this service
clientId: hub-adapter
## @param idp.clientSecret Keycloak client secret. Ignored if `idp.existingSecret` is provided
## If not defined and no existingSecret provided, a random string is generated
clientSecret:
## @param idp.existingSecret Existing k8s secret containing Keycloak secret for this client
## idp.existingSecretKey should also be defined for custom k8s secret. Defaults to hub-adapter-kc-secret
existingSecret:
## @param idp.existingSecretKey Key where the Keycloak secret is being stored inside the existing k8s secret
existingSecretKey:
## @param idp.realm Keycloak realm that the client exists in
realm: flame
## @param idp.host URL to keycloak service
## Will be inferred using the Release.Name if not defined
host:
## Downstream node services
node:
## @param node.results Node results service endpoint
## @param node.kong Node Kong admin service endpoint
## @param node.po Node pod orchestrator service endpoint
results:
kong:
po:
## Hub services and data
hub:
## @param hub.coreApi Hub core API endpoint
coreApi: https://privateaim.net/core
## @param hub.authApi Hub auth API endpoint
authApi: https://privateaim.net/auth
## Credentials used for retrieving a valid token from the hub using a robot account
auth:
robotUser:
robotSecret:
## @param hub.auth.existingSecret Existing k8s secret containing secret for given hub robot ID
## The secret must have a key named "robotSecret"
existingSecret: ""
flame-node-pod-orchestration:
api:
version: 0.1.0
domain: localhost
idp:
debug: false
env:
NODE_NAME: flame
NODE_KEY:
NODE_KEY_PW:
HARBOR_URL: dev-harbor.personalhealthtrain.de
HARBOR_PW: test
HARBOR_USER: test
KEYCLOAK_URL:
KEYCLOAK_REALM: flame
RESULT_CLIENT_ID: service1
RESULT_CLIENT_SECRET:
POSTGRES_HOST:
postgresql:
nameOverride:
fullnameOverride:
auth:
## @param auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user
##
enablePostgresUser: true
## @param auth.postgresPassword Password for the "postgres" admin user. Ignored if `auth.existingSecret` is provided
##
postgresPassword: admin
username: postgres
password: postgres
database: postgres_db
existingSecret:
## @param auth.secretKeys.adminPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
## @param auth.secretKeys.userPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
## @param auth.secretKeys.replicationPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
##
secretKeys:
adminPasswordKey: postgres-password
userPasswordKey: password
replicationPasswordKey: replication-password
## @param auth.usePasswordFiles Mount credentials as a files instead of using an environment variable
##
usePasswordFiles: false
flame-node-message-broker:
# Uncomment, if you want to use a specific storage class.
# Otherwise, the default one will be used.
# common:
# storageClassName: yourStorageClassToBeUsed
broker:
AUTH_JWKS_URL:
HUB_BASE_URL:
HUB_AUTH_BASE_URL:
HUB_MESSENGER_BASE_URL:
HUB_AUTH_ROBOT_ID:
HUB_AUTH_ROBOT_SECRET:
flame-node-ui:
env: production
## For defining ingress specific metadata
ingress:
## @param ingress.enabled Enable ingress record generation for the Node UI
##
enabled: false
## @param ingress.pathType Ingress path type
##
pathType: ImplementationSpecific
## @param ingress.hostname Default host for the ingress record (evaluated as template)
##
hostname:
## @param ingress.path Default file path for the ingress hostname
##
path: /
## Keycloak related information
idp:
## @param idp.debug If true, the clientId and clientSecret will use pre-defined values
## The clientSecret will be defined using the "static" k8s secret key
debug: false
## @param idp.clientId Keycloak client ID for this service
clientId: node-ui
## @param idp.clientSecret Keycloak client secret. Ignored if `idp.existingSecret` is provided
## If not defined and no existingSecret provided, a random string is generated
clientSecret:
## @param idp.existingSecret Existing k8s secret containing Keycloak secret for this client
## idp.existingSecretKey should also be defined for custom k8s secret. Defaults to flame-service-secret
existingSecret:
## @param idp.existingSecretKey Key where the Keycloak secret is being stored inside the existing k8s secret
existingSecretKey:
## @param idp.realm Keycloak realm that the client exists in
realm: flame
## @param idp.host URL to keycloak service
## Will be set to localhost:8080 if not defined
host:
## @param idp.service Service name of keycloak
## Will be inferred using the Release.Name if not defined
service:
## Downstream node services
node:
## @param node.adapter Hub adapter endpoint
adapter:
## node-data-store deploys dummy blaze (FHIR) and minio (S3) data stores for testing the Flame Node
flame-node-data-store:
enabled: false
# blaze values
blaze:
service:
type: ClusterIP
port: 80
dataPopulatorJob:
enabled: true
env:
SYNTHEA_N_PATIENTS: 10
SYNTHEA_SEED: 3256262546
SYNTHEA_CLINICIAN_SEED: 3726451
TIMEOUT: 2
# minio values
minio:
rootUser: admin
rootPassword: admin123
mode: standalone
replicas: 1
resources:
requests:
memory: 1Gi
persistence:
enabled: true
size: 5Gi