Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
16 commits
Select commit Hold shift + click to select a range
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions all-in-one/confs/instance-1/deployment.toml
Original file line number Diff line number Diff line change
Expand Up @@ -181,6 +181,8 @@ enable = false
enable = true
token = {{ .Values.wso2.apim.configurations.ai.token | quote }}
endpoint = {{ .Values.wso2.apim.configurations.ai.endpoint | quote }}
token_endpoint = {{ .Values.wso2.apim.configurations.ai.token_endpoint | quote }}
key = {{ .Values.wso2.apim.configurations.ai.key | quote }}
{{- else }}
enable = false
{{- end }}
Expand Down
2 changes: 2 additions & 0 deletions all-in-one/confs/instance-2/deployment.toml
Original file line number Diff line number Diff line change
Expand Up @@ -181,6 +181,8 @@ enable = false
enable = true
token = {{ .Values.wso2.apim.configurations.ai.token | quote }}
endpoint = {{ .Values.wso2.apim.configurations.ai.endpoint | quote }}
token_endpoint = {{ .Values.wso2.apim.configurations.ai.token_endpoint | quote }}
key = {{ .Values.wso2.apim.configurations.ai.key | quote }}
{{- else }}
enable = false
{{- end }}
Expand Down
2 changes: 1 addition & 1 deletion all-in-one/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -589,7 +589,7 @@ wso2:
organization_id_local_claim: "http://wso2.org/claims/organizationId"

deployment:
# Confgiure High Availability
# Configure High Availability
highAvailability: false
# Container image configurations
image:
Expand Down
13 changes: 9 additions & 4 deletions distributed/gateway/README.md
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
# wso2am-universal-gw

![version: 4.5.0-3](https://img.shields.io/badge/Version-4.5.0--1-informational?style=flat-square) ![AppVersion: 4.5.0](https://img.shields.io/badge/AppVersion-4.5.0-informational?style=flat-square)
![Version: 4.5.0-3](https://img.shields.io/badge/Version-4.5.0--3-informational?style=flat-square) ![AppVersion: 4.5.0](https://img.shields.io/badge/AppVersion-4.5.0-informational?style=flat-square)

A Helm chart for the deployment of WSO2 API Management Universal Gateway profile

## Values

| Key | Type | Default | Description |
|-----|------|---------|-------------|
| aws.enabled | bool | `true` | If AWS is used as the cloud provider |
| aws.enabled | bool | `false` | If AWS is used as the cloud provider |
| aws.region | string | `""` | AWS region |
| aws.secretsManager.secretIdentifiers.internalKeystorePassword | object | `{"secretKey":"","secretName":""}` | Internal keystore password identifier in secrets manager |
| aws.secretsManager.secretIdentifiers.internalKeystorePassword.secretKey | string | `""` | AWS Secrets Manager secret key |
Expand All @@ -34,6 +34,7 @@ A Helm chart for the deployment of WSO2 API Management Universal Gateway profile
| gcp.secretsManager.secret.secretVersion | string | `""` | Version of the secret |
| gcp.secretsManager.secretProviderClass | string | `""` | Secret provider class |
| gcp.serviceAccountName | string | `""` | Service Account with access to read secrets |
| kubernetes.configMaps | object | `{"scripts":{"defaultMode":"0407"}}` | Set UNIX permissions over the executable scripts |
| kubernetes.enableAppArmor | bool | `false` | Enable AppArmor profiles for the deployment |
| kubernetes.ingress.gateway.annotations | object | `{"nginx.ingress.kubernetes.io/backend-protocol":"HTTPS","nginx.ingress.kubernetes.io/proxy-buffer-size":"8k","nginx.ingress.kubernetes.io/proxy-buffering":"on"}` | Ingress annotations for Gateway pass-through |
| kubernetes.ingress.gateway.hostname | string | `"gw.wso2.com"` | Ingress hostname for Gateway pass-through |
Expand All @@ -47,6 +48,9 @@ A Helm chart for the deployment of WSO2 API Management Universal Gateway profile
| kubernetes.ingress.websub.hostname | string | `"websub.wso2.com"` | Ingress hostname for Websub |
| kubernetes.ingressClass | string | `"nginx"` | Ingress class to be used for the ingress resource |
| kubernetes.securityContext.runAsUser | int | `10001` | User ID of the container |
| kubernetes.securityContext.seLinux | object | `{"enabled":false,"level":""}` | SELinux context for the container |
| kubernetes.securityContext.seccompProfile | object | `{"localhostProfile":"","type":"RuntimeDefault"}` | Seccomp profile for the container |
| kubernetes.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | Seccomp profile type(RuntimeDefault, Unconfined or Localhost) |
| wso2.ELKAnalytics | object | `{"enabled":false}` | ELK Analytics Parameters |
| wso2.apim.configurations.adminPassword | string | `""` | Super admin password |
| wso2.apim.configurations.adminUsername | string | `""` | Super admin username |
Expand All @@ -64,9 +68,9 @@ A Helm chart for the deployment of WSO2 API Management Universal Gateway profile
| wso2.apim.configurations.cors.enableForWS | bool | `false` | Enable CORS for Websockets |
| wso2.apim.configurations.cors.enabled | bool | `true` | CORS configuration enabled |
| wso2.apim.configurations.databases.jdbc.driver | string | `""` | JDBC driver class name |
| wso2.apim.configurations.databases.shared_db | object | `{"password":"","poolParameters":{"defaultAutoCommit":false,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000},"url":"","username":""}` | APIM SharedDB configurations. This is required for gateway only in a multi-tenancy scenario |
| wso2.apim.configurations.databases.shared_db | object | `{"password":"","poolParameters":{"defaultAutoCommit":true,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000},"url":"","username":""}` | APIM SharedDB configurations. This is required for gateway only in a multi-tenancy scenario |
| wso2.apim.configurations.databases.shared_db.password | string | `""` | APIM SharedDB password |
| wso2.apim.configurations.databases.shared_db.poolParameters | object | `{"defaultAutoCommit":false,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000}` | APIM database JDBC pool parameters |
| wso2.apim.configurations.databases.shared_db.poolParameters | object | `{"defaultAutoCommit":true,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000}` | APIM database JDBC pool parameters |
| wso2.apim.configurations.databases.shared_db.url | string | `""` | APIM SharedDB URL |
| wso2.apim.configurations.databases.shared_db.username | string | `""` | APIM SharedDB username |
| wso2.apim.configurations.databases.type | string | `""` | Database type. eg: mysql, oracle, mssql, postgres |
Expand All @@ -84,6 +88,7 @@ A Helm chart for the deployment of WSO2 API Management Universal Gateway profile
| wso2.apim.configurations.jwt.generatorImpl | string | `"org.wso2.carbon.apimgt.keymgt.token.JWTGenerator"` | |
| wso2.apim.configurations.jwt.header | string | `"X-JWT-Assertion"` | |
| wso2.apim.configurations.jwt.signingAlgorithm | string | `"SHA256withRSA"` | |
| wso2.apim.configurations.km.servicePort | int | `9443` | Key Manager service port |
| wso2.apim.configurations.km.serviceUrl | string | `"wso2am-cp-service"` | Key manager service name if default Resident KM is used |
| wso2.apim.configurations.oauth_config.authHeader | string | `"Authorization"` | OAuth authorization header name |
| wso2.apim.configurations.oauth_config.enableTokenEncryption | bool | `false` | Enable token encryption |
Expand Down
2 changes: 2 additions & 0 deletions distributed/gateway/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -247,6 +247,8 @@ wso2:
km:
# -- Key manager service name if default Resident KM is used
serviceUrl: "wso2am-cp-service"
# -- Key Manager service port
servicePort: 9443

iskm:
# If Identity Server is used as the Resident KM
Expand Down
17 changes: 11 additions & 6 deletions distributed/traffic-manager/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# wso2am-tm

![version: 4.5.0-3](https://img.shields.io/badge/Version-4.5.0--1-informational?style=flat-square) ![AppVersion: 4.5.0](https://img.shields.io/badge/AppVersion-4.5.0-informational?style=flat-square)
![Version: 4.5.0-3](https://img.shields.io/badge/Version-4.5.0--3-informational?style=flat-square) ![AppVersion: 4.5.0](https://img.shields.io/badge/AppVersion-4.5.0-informational?style=flat-square)

A Helm chart for the deployment of WSO2 API Management Traffic Manager profile

Expand All @@ -9,7 +9,7 @@ A Helm chart for the deployment of WSO2 API Management Traffic Manager profile
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| aws.ecr.registry | string | `""` | AWS Elastic Container Registry name |
| aws.enabled | bool | `true` | If AWS is used as the cloud provider |
| aws.enabled | bool | `false` | If AWS is used as the cloud provider |
| aws.region | string | `""` | AWS region |
| aws.secretsManager.secretIdentifiers.internalKeystorePassword | object | `{"secretKey":"","secretName":""}` | Internal keystore password identifier in secrets manager |
| aws.secretsManager.secretIdentifiers.internalKeystorePassword.secretKey | string | `""` | AWS Secrets Manager secret key |
Expand All @@ -36,26 +36,31 @@ A Helm chart for the deployment of WSO2 API Management Traffic Manager profile
| gcp.secretsManager.secret.secretVersion | string | `""` | Version of the secret |
| gcp.secretsManager.secretProviderClass | string | `""` | Secret provider class |
| gcp.serviceAccountName | string | `""` | Service Account with access to read secrets |
| kubernetes.configMaps | object | `{"scripts":{"defaultMode":"0407"}}` | Set UNIX permissions over the executable scripts |
| kubernetes.enableAppArmor | bool | `false` | Enable AppArmor profiles for the deployment |
| kubernetes.securityContext.runAsUser | int | `10001` | User ID of the container |
| kubernetes.securityContext.seLinux | object | `{"enabled":false,"level":""}` | SELinux context for the container |
| kubernetes.securityContext.seccompProfile | object | `{"localhostProfile":"","type":"RuntimeDefault"}` | Seccomp profile for the container |
| kubernetes.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | Seccomp profile type(RuntimeDefault, Unconfined or Localhost) |
| wso2.apim.configurations.adminPassword | string | `""` | Super admin password |
| wso2.apim.configurations.adminUsername | string | `""` | Super admin username |
| wso2.apim.configurations.databases.apim_db | object | `{"password":"","poolParameters":{"defaultAutoCommit":false,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000},"url":"","username":""}` | APIM AM_DB configurations. |
| wso2.apim.configurations.databases.apim_db | object | `{"password":"","poolParameters":{"defaultAutoCommit":true,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000},"url":"","username":""}` | APIM AM_DB configurations. |
| wso2.apim.configurations.databases.apim_db.password | string | `""` | APIM AM_DB password |
| wso2.apim.configurations.databases.apim_db.poolParameters | object | `{"defaultAutoCommit":false,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000}` | APIM database JDBC pool parameters |
| wso2.apim.configurations.databases.apim_db.poolParameters | object | `{"defaultAutoCommit":true,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000}` | APIM database JDBC pool parameters |
| wso2.apim.configurations.databases.apim_db.url | string | `""` | APIM AM_DB URL |
| wso2.apim.configurations.databases.apim_db.username | string | `""` | APIM AM_DB username |
| wso2.apim.configurations.databases.jdbc.driver | string | `""` | JDBC driver class name |
| wso2.apim.configurations.databases.shared_db | object | `{"password":"","poolParameters":{"defaultAutoCommit":false,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000},"url":"","username":""}` | APIM SharedDB configurations. |
| wso2.apim.configurations.databases.shared_db | object | `{"password":"","poolParameters":{"defaultAutoCommit":true,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000},"url":"","username":""}` | APIM SharedDB configurations. |
| wso2.apim.configurations.databases.shared_db.password | string | `""` | APIM SharedDB password |
| wso2.apim.configurations.databases.shared_db.poolParameters | object | `{"defaultAutoCommit":false,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000}` | APIM shared database JDBC pool parameters |
| wso2.apim.configurations.databases.shared_db.poolParameters | object | `{"defaultAutoCommit":true,"maxActive":100,"maxWait":60000,"minIdle":5,"testOnBorrow":true,"testWhileIdle":true,"validationInterval":30000}` | APIM shared database JDBC pool parameters |
| wso2.apim.configurations.databases.shared_db.url | string | `""` | APIM SharedDB URL |
| wso2.apim.configurations.databases.shared_db.username | string | `""` | APIM SharedDB username |
| wso2.apim.configurations.databases.type | string | `""` | Database type. eg: mysql, oracle, mssql, postgres |
| wso2.apim.configurations.eventhub.serviceUrl | string | `"wso2am-cp-service"` | Event hub (control plane) loadbalancer service url |
| wso2.apim.configurations.eventhub.urls | list | `["wso2am-cp-1-service","wso2am-cp-2-service"]` | Event hub service urls |
| wso2.apim.configurations.iskm.enabled | bool | `false` | |
| wso2.apim.configurations.iskm.serviceName | string | `""` | |
| wso2.apim.configurations.km.servicePort | int | `9443` | Key Manager service port |
| wso2.apim.configurations.km.serviceUrl | string | `"wso2am-cp-service"` | Key manager service name if default Resident KM is used |
| wso2.apim.configurations.oauth_config.enableTokenEncryption | bool | `false` | Enable token encryption |
| wso2.apim.configurations.oauth_config.enableTokenHashing | bool | `false` | Enable token hashing |
Expand Down
2 changes: 2 additions & 0 deletions distributed/traffic-manager/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -216,6 +216,8 @@ wso2:
km:
# -- Key manager service name if default Resident KM is used
serviceUrl: "wso2am-cp-service"
# -- Key Manager service port
servicePort: 9443

iskm:
# If Identity Server is used as the Resident KM
Expand Down
6 changes: 3 additions & 3 deletions docs/am-pattern-0-all-in-one/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ For advanced details on the deployment pattern, please refer to the official

If you want to try WSO2 API Manager with minimal configuration, you do not need to follow all the steps described above. You can simply use the default values provided in the default_values.yaml, which includes the H2 database and the default keystore and truststore. Once the service is up and running, deploy the NGINX Ingress Controller by following the steps outlined [here](#2-add-ingress-controller).
```bash
helm install apim wso2/wso2am-all-in-one --version 4.5.0-2 -f default_values.yaml
helm install apim wso2/wso2am-all-in-one --version 4.5.0-3 -f default_values.yaml
```

## Configuration
Expand Down Expand Up @@ -103,7 +103,7 @@ In addition to the primary, internal keystores and truststore files, you can als
- Refer the following sample command to create the secret and use it in the APIM.

```
kubectl create secret generic jks-secret --from-file=wso2carbon.jks --from-file=client-truststore.jks --from-file=wso2internal.jks -n <namespace>
kubectl create secret generic apim-keystore-secret --from-file=wso2carbon.jks --from-file=client-truststore.jks --from-file=wso2internal.jks -n <namespace>
```
> By default, this deployment uses the default keystores and truststores provided by the relevant WSO2 product.
> For advanced details with regards to managing custom Java keystores and truststores in a container based WSO2 product deployment
Expand Down Expand Up @@ -248,7 +248,7 @@ Now deploy the Helm Chart using the following command after creating a namespace

```bash
kubectl create namespace <namespace>
helm install <release-name> <helm-chart-path> --version 4.5.0-2 --namespace <namespace> --dependency-update -f values.yaml --create-namespace
helm install <release-name> <helm-chart-path> --version 4.5.0-3 --namespace <namespace> --dependency-update -f values.yaml --create-namespace
```


Expand Down
11 changes: 2 additions & 9 deletions docs/am-pattern-0-all-in-one/default_values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -482,15 +482,6 @@ wso2:
eventManagement:
hostname:
port:
highAvailability:
# -- Enable high availability.
enabled: false
eventDuplicateUrl: "apim-2-wso2am-all-in-one-am-service"
portOffset: 0
# -- Traffic manager service urls. You only need to define one if the TM is not in HA.
urls:
- "apim-1-wso2am-all-in-one-am-service"
- "apim-2-wso2am-all-in-one-am-service"

workflow:
enable: false
Expand Down Expand Up @@ -584,6 +575,8 @@ wso2:
organization_id_local_claim: "http://wso2.org/claims/organizationId"

deployment:
# Configure High Availability
highAvailability: true
# Container image configurations
image:
# -- Container registry credentials.
Expand Down
6 changes: 3 additions & 3 deletions docs/am-pattern-1-all-in-one-HA/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ For advanced details on this deployment pattern, please refer to the official

1. Deploy All-in-One HA:
```bash
helm install apim wso2/wso2am-all-in-one --version 4.5.0-2 -f default_values.yaml
helm install apim wso2/wso2am-all-in-one --version 4.5.0-3 -f default_values.yaml
```


Expand Down Expand Up @@ -168,7 +168,7 @@ It is recommended to use the [**NGINX Ingress Controller**](https://kubernetes.g
- Refer to the following sample command to create the secret and use it in the APIM:

```
kubectl create secret generic jks-secret --from-file=wso2carbon.jks --from-file=client-truststore.jks --from-file=wso2internal.jks -n <namespace>
kubectl create secret generic apim-keystore-secret --from-file=wso2carbon.jks --from-file=client-truststore.jks --from-file=wso2internal.jks -n <namespace>
```
> By default, this deployment uses the default keystores and truststores provided by the relevant WSO2 product.
> For advanced details regarding managing custom Java keystores and truststores in a container-based WSO2 product deployment,
Expand Down Expand Up @@ -315,7 +315,7 @@ Now deploy the Helm chart using the following command after creating a namespace

```bash
kubectl create namespace <namespace>
helm install <release-name> <helm-chart-path> --version 4.5.0-2 --namespace <namespace> --dependency-update -f values.yaml --create-namespace
helm install <release-name> <helm-chart-path> --version 4.5.0-3 --namespace <namespace> --dependency-update -f values.yaml --create-namespace
```

#### 2.6 Enable High Availability
Expand Down
2 changes: 1 addition & 1 deletion docs/am-pattern-1-all-in-one-HA/default_values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -590,7 +590,7 @@ wso2:
organization_id_local_claim: "http://wso2.org/claims/organizationId"

deployment:
# Confgiure High Availability
# Configure High Availability
highAvailability: true
# Container image configurations
image:
Expand Down
Loading