Skip to main content

KOBIL Shift parameter reference

Shift Configuration and Installation: Parameter Reference

Note: always refer to the used KOBIL Shift release "README" file

For Shift deployment the metaconfiguration allows the below Parameter/Values for configuration:

Values

KeyTypeDescriptionDefault
nameOverridestring""
fullnameOverridestring""
global.imagePullSecretslistImage pull secrets added to pod spes generated by this chart.["registry-secret"]
global.registrystringDocker registry for KOBIL provided docker images"kobilsystems.azurecr.io"
global.limitsobjectLimits for kubernetes object names{"lengths":{"commonName":63,"fullname":43,"releaseName":16}}
global.annotations.commonobjectCustom annotations added to deployment metadata and pod spec{}
global.annotations.workloadobjectCustom annotations added to pod spec{}
global.labels.workloadPodobjectCustom labels added to pod spec{}
global.routing.domainstringExternal domain name"local"
global.routing.tlsSecretstringName of kubernetes TLS secret for the required domain and subdomains"tls-secret"
global.routing.ingress.enabledboolGlobally enable/disable creation of ingress resources for services.false
global.routing.ingress.classstringIngress class name of the ingress controller.nil
global.routing.istio.enabledboolGlobally enable/disable creation of istio ingress gateways and virtual services. Requires istio operator.true
global.routing.istio.gatewaysobjectEnable/disable istio ingress gateways for the three API groups. public gateway only routes endpoints marked as public. external gateway routes endpoints marked as public and external. admin gateway routes all endpoints.{"admin":true,"external":false,"public":false}
global.routing.istio.options.gatewayNamePrefixstringPrefix for istio ingress gateway names. The final name is generated by appending -admin, -external, -public, respectively. Note, that istio ingress gateways names must be unique across the cluster."istio-ingressgateway"
global.routing.istio.options.gatewayAddAllHostsboolThe default setting (false), configures a wildcard (*) for the hosts exposed by the Istio ingress gateway. This means that any host is exposed. If set to true, all hosts required by Shift are added explicitely. The default (false) should be used if dedicated Istio ingress gateways are used for Shift and the gateway workloads are running in the same namespace as shift. Setting this value to true allows using an Istio ingress gateway that is shared by multiple applications. Note: When using a shared Istio ingress gateway, the TLS certificate and optional ingress resources must be manually created in the namespace where the Istio ingress gateway workload is running. The resources optionally generated by shift will not work in that case. Note: When using a shared Istio ingress gateway, Shift will configure the gateway to perform an SNI match on incoming requests. This will lead to issues if load balancers in front of Istio ingress gateway do not forward the SNI. See here for further information.false
global.routing.istio.options.gatewayHttpsRedirectboolIf set to true, the Istio ingress gateway will send a redirect for all http requests asking clients to use https.true
global.routing.istio.options.injectboolGlobally enable/disable injection of envoy sidecars.false
global.serviceMonitor.enabledboolGlobally enable/disable creation of monitoring.coreos.com/v1 serviceMonitor object. Requires prometheus operator.false
global.certs.managedbooltrue
global.certs.issuerNamestring"mbattery-ca-issuer"
global.certs.additionalDnsNameslist[]
global.ingressobjectGlobally enable/disable service ingress resources. Legacy value.{"enabled":false}
global.monitoringobjectGlobally enable/disable creation of monitoring.coreos.com/v1 serviceMonitor object. Requires prometheus operator. Legacy value.{"prometheus":{"serviceMonitor":{"enabled":false}}}
scpobjectSCP specific values{"enabled":true}
idpobjectIDP specific values{"enabled":true}
smartscreenobjectSmartscreen specific values{"enabled":true}
smartdashboardobjectSmartdashboard specific values{"enabled":true}
astsobjectAST services specific values{"enabled":true}
paymentobjectPAY services specific values{"enabled":false}
apiProxyobjectCustomApisSuperapps services specific values{"enabled":false}
partofstringValue of label app.kubernetes.io/part-of added to resources generated by this chart."shift"
componentstringValue of label app.kubernetes.io/component added to resources generated by this chart."shift-chart"
testInstallationboolSet to 'true' for test or demo deployments. When set to true, defaults values for security related parameters are applied to simplify deployment. Must not be used for production deployments.false
commonobjectSection for configuration parameters that are common to more than one service.{"ast":{"databaseEncryptionMasterKey":"","existingSecretEncryptionKeys":"","issuer":{"certs":[],"existingSecretIssuerCa":"","key":""},"redis":{"password":"password","user":"default"},"sessionEncryptionMasterKey":""},"datastores":{"database":{"tls":{"mode":"PREFER","trustStore":{"password":"","store":"","type":"JKS"}}},"mongoDb":{"host":"mongodb","port":27017,"tls":false,"tlsOpts":{"cacerts":"","certKey":""}},"redis":{"host":"redis","port":6379}},"existingSecretAdminCredentials":"","existingSecretDatastoreCredentials":"","idp":{"adminUser":{"password":"password","username":"admin"}},"payment":{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"payment","port":5432},"idp":{"authRole":"user","clientId":{"ui":"mpayUIPublic"}},"redis":{"password":"password"},"serviceProvider":{"tenant":"master"},"springBootAdmin":{"password":"password","username":"admin"},"stripe":{"apiKey":"apiKey","webhookSecret":"secret"}},"scp":{"enableP2PChat":true,"mediaMaxSizeBytes":16777216,"service":{"auth":{"password":"password","passwordHash":"password-hash","username":"scp-services"}}},"tracing":{"enable":{"ast":false,"idp":false,"scp":false,"smartscreen":false},"jaegerGrpcHost":"http://jaeger-collector.tracing.svc.cluster.local:14250/api/v2/spans","zipkinUrl":"http://jaeger-collector.tracing.svc.cluster.local:9411/api/v2/spans"}}
common.existingSecretDatastoreCredentialsstringThe name of an existing secret with datastore credentials. See README.md for details and the required structure. NOTE: When it's set, the datastore credentials configured in this file are ignored.""
common.existingSecretAdminCredentialsstringThe name of an existing secret with admin credentials. See README.md for details and the required structure. NOTE: When it's set, the admin credentials configured in this file are ignored.""
common.datastores.redisobjectCommon configuration of Redis used by all services{"host":"redis","port":6379}
common.datastores.database.tlsobjectOptional TLS configuration for database connection. Currently used by smartscreen and ast services.{"mode":"PREFER","trustStore":{"password":"","store":"","type":"JKS"}}
common.datastores.database.tls.modestringTLS mode. Supported values are PREFER: This mode tries to establish database connection using TLS. If that fails, it tries non-TLS connection. No server certificate validation is performed. VERIFY_CA: This mode requires TLS connection, i.e. there is no fallback to non-TLS. This mode performs server certificate validation against the provided trust store. VERIFY_FULL: This mode acts like VERIFY_CA with additional hostname verification of the server certificate."PREFER"
common.datastores.database.tls.trustStore.typestringType of the truststore. Supported types are JKS and PKCS12."JKS"
common.datastores.database.tls.trustStore.storestringTruststore of the selected type in BASE64 encoding. This setting is required for TLS modes VERIFY_CA and VERIFY_FULL.""
common.datastores.database.tls.trustStore.passwordstringPassword to open the truststore. This setting is required when a truststore is provided.""
common.datastores.mongoDbobjectCommon configuration of Mongo DB used by scp services{"host":"mongodb","port":27017,"tls":false,"tlsOpts":{"cacerts":"","certKey":""}}
common.scp.mediaMaxSizeBytesintThe maximum allowed size in Bytes of an attachment sent via SCP. Affects both attachments sent by apps and smartdashboard.16777216
common.ast.existingSecretEncryptionKeysstringThe name of an existing secret with encryption keys. See README.md for details and the required structure. NOTE: When it's set, the encryption keys configured in this file are ignored.""
common.ast.sessionEncryptionMasterKeystringEncryption master key for ast sessions. Must be randomly generated and unique for each Shift deployment. Must be set to an alphanumeric (UTF-8) string of length 64. Changing it invalidates all current ast sessions.""
common.ast.databaseEncryptionMasterKeystringEncryption master key for sensitive data store in database. Must be randomly generated and unique for each Shift deployment. Must be set to an alphanumeric (UTF-8) string of length 64. This value cannot be changed after installation.""
common.ast.issuerobjectThe issuer CA certificate and private key used to generate tenant signers. See README.md section Issuer CA for requirements on issuer CA generation.{"certs":[],"existingSecretIssuerCa":"","key":""}
common.ast.issuer.existingSecretIssuerCastringThe name of an existing secret with issuer CA. See README.md for details and the required structure. NOTE: When it's set, the issuer CA configured in this file is ignored.""
common.ast.issuer.certslistValid certificate chain for the issuer public key. The list must consist of base64 encoded certificates ordered from the root to the issuer certificate. If the issuer certificate is self-signed, the list consists of this one entry only. The public key of the issuer certificate must match common.ast.issuer.key. While the certificates can be changed, the issuer public key must not.[]
common.ast.issuer.keystringIssuer private and public key in PKCS#8 format as base64 string. Public key must match the issuer certificate in common.ast.issuer.certs. Keys must not be changed after installation. It is recommended to keep a backup of the keys for productive environments.""
common.ast.redisobjectRedis credentials used by ast services. The redis password is also used by idp-scp-connector.{"password":"password","user":"default"}
common.tracing.enableobjectEnable / Disable tracing for service groups.{"ast":false,"idp":false,"scp":false,"smartscreen":false}
common.tracing.jaegerGrpcHoststringhostname of tracing sink used by idp, ast and smartscreen services. Must support model.proto protocol on port 14250 (gRPC). For example a jaeger-collector: https://www.jaegertracing.io/docs/next-release/deployment/#agent"http://jaeger-collector.tracing.svc.cluster.local:14250/api/v2/spans"
common.tracing.zipkinUrlstringhostname of tracing sink used by scp services. Must support zipkin protocol on port 9411 (HTTP). For example a jaeger-collector: https://www.jaegertracing.io/docs/next-release/deployment/#collector"http://jaeger-collector.tracing.svc.cluster.local:9411/api/v2/spans"
common.paymentobjectSection for configuring common values for payment services.{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"payment","port":5432},"idp":{"authRole":"user","clientId":{"ui":"mpayUIPublic"}},"redis":{"password":"password"},"serviceProvider":{"tenant":"master"},"springBootAdmin":{"password":"password","username":"admin"},"stripe":{"apiKey":"apiKey","webhookSecret":"secret"}}
common.payment.idpobjectValues to configure IDP integration of payment services.{"authRole":"user","clientId":{"ui":"mpayUIPublic"}}
common.payment.idp.authRolestringRealm role required for administrative access to GUI. Must exist in master realm."user"
common.payment.idp.clientId.uistringID of public OICD client used for authenticating admin users. Must exist in master realm."mpayUIPublic"
common.payment.serviceProvider.tenantstringName of tenant for GUI admin user."master"
common.payment.redis.passwordstringRedis credentials used by payment services"password"
common.payment.stripeobjectConfiguration for Stripe payment processing platform.{"apiKey":"apiKey","webhookSecret":"secret"}
routing.istio.enabledboolEnable/disable creation of virtual service resource for endpoints currently maintained in this chart.true
routing.istio.ingressobjectDefinition of optional ingress resources for istio ingress gateways. For each API group (admin, external, public), the ingress can be enabled separately. This requires the respective istio ingress gateway to be enabled (global.routing.istio.gateways). Each ingress can be configured with ingress class, optional annotations. For TLS, the secret defined via global.routing.tlsSecret is used.{"admin":{"annotations":{},"class":null,"enabled":false},"external":{"annotations":{},"class":null,"enabled":false},"public":{"annotations":{},"class":null,"enabled":false}}
strimziobjectConfiguration of the Kafka custom resources. Requires Strimzi Kafka operator{"additionalTopics":null,"enabled":true,"sizing":{"custom":{"kafka":null,"zookeeper":null},"mode":"basic"},"storage":{"class":{"kafka":null,"zookeeper":null},"size":{"kafka":"20Gi","zookeeper":"5Gi"}}}
strimzi.enabledboolEnable/disable deployment of Kafka custom resources.true
strimzi.storageobjectStorage configuration for Kafka and Zookeeper.{"class":{"kafka":null,"zookeeper":null},"size":{"kafka":"20Gi","zookeeper":"5Gi"}}
strimzi.storage.sizeobjectSize of persistent volumes for Kafka and Zookeeper.{"kafka":"20Gi","zookeeper":"5Gi"}
strimzi.storage.classobjectStorage class to use for the persistent volumes. The default ~ uses the default Kubernetes storage class.{"kafka":null,"zookeeper":null}
strimzi.sizing.modestringConfigure seizing for Kafka cluster. Supported values are 'basic', 'tuned', and 'custom'. When using mode 'custom', values .custom.kafka and custom.zookeeper must be provided. See README.md for details. Note: Changing the sizing mode after deployment is highly discouraged, as it effects the topic replica count and partition assignment to nodes. It can even lead to data loss."basic"
strimzi.additionalTopicsstringConfiguration of additional Kafkatopic resource, c.f. https://strimzi.io/docs/operators/latest/configuring.html#ref-operator-topic-strnil
idpCoreobjectConfiguration for idp-core{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"idp_core","port":5432},"enabled":true,"replicaCount":1}
idpScpConnectorobjectConfiguration for idp-scp-connector{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"idp_scp_connector","port":5432},"enabled":true,"replicaCount":1}
idpSchedulerobjectConfiguration for idp-scheduler{"enabled":false,"replicaCount":1}
smartscreenFrontendobjectConfiguration for smartscreenfrontend{"enabled":true,"replicaCount":1}
smartscreenServicesobjectConfiguration for smartscreenservices{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"smartscreen_services","port":5432},"enabled":true}
smartscreenSearchobjectConfiguration for smartscreensearch{"database":{"auth":{"password":"password","username":"user"},"enabled":false,"host":"postgres-segment","name":"shift","port":5432,"schema":"tenant","sslMode":"PREFER","trustStore":"","trustStorePassword":"","trustStoreType":"JKS"},"enabled":true,"forDashboard":{"replicaCount":1},"forFrontend":{"replicaCount":1},"searchProviders":[]}
smartscreenSearch.forFrontendobjectSpecific configuration for the smartscreen-search-for-frontend deployment. valuesOverride must be added in this section.{"replicaCount":1}
smartscreenSearch.forDashboardobjectSpecific configuration for the smartscreen-search-for-dashboard deployment. valuesOverride must be added in this section.{"replicaCount":1}
smartscreenSearch.databaseobjectOptional configuration of database used by Segment{"auth":{"password":"password","username":"user"},"enabled":false,"host":"postgres-segment","name":"shift","port":5432,"schema":"tenant","sslMode":"PREFER","trustStore":"","trustStorePassword":"","trustStoreType":"JKS"}
smartscreenSearch.database.sslModestringTLS mode. Supported values are PREFER: This mode tries to establish database connection using TLS. If that fails, it tries non-TLS connection. No server certificate validation is performed. VERIFY_CA: This mode requires TLS connection, i.e. there is no fallback to non-TLS. This mode performs server certificate validation against the provided trust store. VERIFY_FULL: This mode acts like VERIFY_CA with additional hostname verification of the server certificate."PREFER"
smartscreenSearch.database.trustStoreTypestringType of the truststore. Supported types are JKS and PKCS12."JKS"
smartscreenSearch.database.trustStorestringTruststore of the selected type in BASE64 encoding. This setting is required for TLS modes VERIFY_CA and VERIFY_FULL.""
smartscreenSearch.database.trustStorePasswordstringPassword to open the truststore. This setting is required when a truststore is provided.""
smartscreenSearch.searchProviderslistAn array defining additional search providers. See below for an example.[]
smartscreenDashboardobjectConfiguration for smartscreendashboard{"enabled":true,"replicaCount":1}
smartscreenConnectorobjectConfiguration for smartscreenconnector{"enabled":false,"replicaCount":1}
smartscreenMediaobjectConfiguration for smartscreenmedia Uses the same physical db and db settings as smartscreenServices{"enabled":true,"replicaCount":1}
smartdashboardRoutesobjectConfiguration for smartdashboard-routes{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"smartdashboard","port":5432,"schema":"routes"}}
smartdashboardFrontendobjectConfiguration for smartdashboard-frontend{"enabled":true,"replicaCount":1}
smartdashboardSmartscreenobjectConfiguration for smartdashboard-smartscreen{"config":{"authenticationBrowserFlow":"browser"},"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"smartdashboard","port":5432,"schema":"smartscreen"},"enabled":true,"replicaCount":1}
smartdashboardSmartscreen.config.authenticationBrowserFlowstringDefault browser flow for OIDC clients created for MiniApps."browser"
smartdashboardUserManagementobjectConfiguration for smartdashboard-user-management{"config":{"mailTemplateName":"smartdashboard-update-profile.ftl","mailType":"UPDATE_USER_PROFILE","requiredActions":"KOBIL_UPDATE_USER_PROFILE","updateMailSubject":"Welcome to your KOBIL Shift Portal"},"enabled":true,"replicaCount":1}
smartdashboardUserManagement.config.mailTemplateNamestringEmail template to use when sending emails."smartdashboard-update-profile.ftl"
smartdashboardUserManagement.config.updateMailSubjectstringEmail subject for invitation emails."Welcome to your KOBIL Shift Portal"
smartdashboardUserManagement.config.mailTypestringDefines mail type to be sent when inviting a user. Should be set to UPDATE_USER_PROFILE when using ast-services and VERIFY when using SSMS."UPDATE_USER_PROFILE"
smartdashboardUserManagement.config.requiredActionsstringDefines required actions that need to be performed by user during first login. Should be set to KOBIL_UPDATE_USER_PROFILE when using ast-services and UPDATE_PASSWORD when using SSMS."KOBIL_UPDATE_USER_PROFILE"
smartdashboardAnalyticsobjectConfiguration for smartdashboard-analytics{"database":{"auth":{"password":"password","username":"user"},"host":"postgres-segment","name":"shift","port":5432,"schema":"tenant"},"enabled":false,"replicaCount":1}
smartdashboardAnalytics.databaseobjectDatabase used by Segment{"auth":{"password":"password","username":"user"},"host":"postgres-segment","name":"shift","port":5432,"schema":"tenant"}
smartdashboardReportsobjectConfiguration for smartdashboard-reports{"config":{"defaultEnv":"shift"},"enabled":false,"redis":{"password":"password","user":"default"},"replicaCount":1,"sentry":{"env":"environment=store","issueId":"sentry issue id","organization":"kobil-gmbh","project":"customer app","token":"sentry token","url":"https://sentry.io/api/0/","urlEvent":"events"}}
smartdashboardReports.sentryobjectSentry configuration{"env":"environment=store","issueId":"sentry issue id","organization":"kobil-gmbh","project":"customer app","token":"sentry token","url":"https://sentry.io/api/0/","urlEvent":"events"}
smartdashboardReports.sentry.urlEventstringEvents endpoint for sentry. Change to eventsv2 for older on premise installations."events"
smartdashboardReports.config.defaultEnvstringDefault sentry environment"shift"
smartdashboardReports.redisobjectRedis credentials used by smartdashboard-reports{"password":"password","user":"default"}
smartdashboardBroadcastobjectConfiguration for smartdashboard-broadcast{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"smartdashboard","port":5432,"schema":"broadcast"},"enabled":true,"replicaCount":1}
smartdashboardAppManagementobjectConfiguration for smartdashboard-app-management{"enabled":true,"replicaCount":1}
smartdashboardAppBuilderobjectConfiguration for smartdashboard-app-builder{"config":{"appBuilderProxyBaseUrl":"https://app-builder-proxy.example.com","bundleId":"com.example.app.{tenant}","externalApiKey":"api-key","flavorEnv":"test","flavorName":"shift","segment":{"authToken":"segment auth token","baseUrl":"https://api.segmentapis.com","selectedWarehouseId":"warehouse id for environment","sourceMetadataId":"source meta data id"},"sentry":{"baseToken":"sentry token","baseUrl":"https://sentry.io/api/0/","envName":"shift","orgEvent":"kobil-gmbh","team":"development"},"tlsBundle":""},"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"smartdashboard","port":5432,"schema":"appbuilder"},"enabled":false,"replicaCount":1}
smartdashboardAppBuilder.config.bundleIdstringApp bundle IP"com.example.app.{tenant}"
smartdashboardAppBuilder.config.externalApiKeystringAPI key for authentication at app builder proxy"api-key"
smartdashboardAppBuilder.config.appBuilderProxyBaseUrlstringURL of app-builder proxy"https://app-builder-proxy.example.com"
smartdashboardAppBuilder.config.tlsBundlestringThe TLS bundle to be included in sdk-config.jwt. Only a single certificate is supported. Must be set to the root CA that issued the TLS certificate on the public AST endpoints. Expected format is BASE64 encoded PEM.""
smartdashboardAppBuilder.config.segmentobjectSegment configuration{"authToken":"segment auth token","baseUrl":"https://api.segmentapis.com","selectedWarehouseId":"warehouse id for environment","sourceMetadataId":"source meta data id"}
smartdashboardAppBuilder.config.sentryobjectSentry configuration{"baseToken":"sentry token","baseUrl":"https://sentry.io/api/0/","envName":"shift","orgEvent":"kobil-gmbh","team":"development"}
smartdashboardWorkspaceManagementobjectConfiguration for smartdashboard-workspace-management{"config":{"emailTheme":"kobilv2","inviteMailSubject":"Welcome to your KOBIL Shift Portal","loginAccountAdminTheme":"kobilv2","loginTheme":"smart-dashboard","mailTemplateName":"smartdashboard-password-reset.ftl"},"enabled":true,"replicaCount":1}
smartdashboardWorkspaceManagement.configobjectEmail and theme settings{"emailTheme":"kobilv2","inviteMailSubject":"Welcome to your KOBIL Shift Portal","loginAccountAdminTheme":"kobilv2","loginTheme":"smart-dashboard","mailTemplateName":"smartdashboard-password-reset.ftl"}
smartdashboardKongConfigurationBackendobjectConfiguration for smartdashboard-kong-configuration-backend{"config":{"masterClientId":"client_id","masterClientSecret":"client_secret"},"enabled":true,"replicaCount":1}
smartdashboardKongConfigurationBackend.configobjectclient_id and client_secret of an OIDC client in IDP master realm. Must be manually created.{"masterClientId":"client_id","masterClientSecret":"client_secret"}
smartdashboardTile38objectConfiguration for smartdashboard-tile38{"config":{"tile38Host":"hostname","tile38Password":"password","tile38Protocol":"https","tile38User":"user"},"enabled":false,"replicaCount":1}
smartdashboardTile38.configobjectConfiguration of Tile38 server and basic auth credentials The Tile38 server must be reachable via standard ports, i.e. 80 for http and 443 for https.{"tile38Host":"hostname","tile38Password":"password","tile38Protocol":"https","tile38User":"user"}
audienceobjectConfiguration for audience services{"apiGateway":{"replicaCount":1},"custom":{},"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"audience","port":5432,"schema":"audience"},"enabled":false,"getEndpoints":{"replicaCount":1}}
audience.getEndpointsobjectSpecific configuration for the audience-get-endpoints deployment. valuesOverride must be added in this section.{"replicaCount":1}
audience.apiGatewayobjectSpecific configuration for the audience-api-gateway deployment. valuesOverride must be added in this section.{"replicaCount":1}
audience.customobjectSpecific configuration for the audience-custom deployment. valuesOverride must be added in this section.{}
scpAddressbookobjectConfiguration for scp-addressbook{"db":{"name":"scp_addressbook","password":"password","poolSize":5,"username":"user"},"enabled":true,"replicaCount":1}
scpPresenceobjectConfiguration for scp-presence{"db":{"name":"scp_presence","password":"password","poolSize":5,"username":"user"},"enabled":true,"replicaCount":1}
scpMessengerobjectConfiguration for scp-messenger{"db":{"name":"scp_messenger","password":"password","poolSize":5,"username":"user"},"enabled":true,"replicaCount":1}
scpMediaobjectConfiguration for scp-media{"db":{"name":"scp_media","password":"password","poolSize":5,"username":"user"},"enabled":true,"replicaCount":1}
scpGatewayobjectConfiguration for scp-gateway{"db":{"name":"scp_gateway","password":"password","poolSize":5,"username":"user"},"enabled":true,"replicaCount":1}
scpNotifierobjectConfiguration for scp-notifier{"app":{"body":"Body","title":"Push notification title"},"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"scp_notifier","poolSize":10,"port":5432,"ssl":{"enabled":false,"trustStore":""}},"enabled":true,"replicaCount":1}
scpNotifier.database.poolSizeintSize of database connection pool.10
scpNotifier.database.ssl.enabledboolSet to true to enable SSL connection to the postgres database without certificate validation.false
scpNotifier.database.ssl.trustStorestringWhen SSL it enabled, specify trust store to enable certificate chain validation. The truststore must be provided as single line string and contain a base64 encoded list of certificates in PEM format.""
scpNotifier.app.titlestringDefault push notification title used in case it is not specified in the push notification payload."Push notification title"
scpNotifier.app.bodystringDefault push notification body used in case it is not provided in the push notification payload."Body"
astcaobjectConfiguration for astca{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_ca","port":5432},"enabled":true,"replicaCount":1}
astcpbobjectConfiguration for astcpb{"enabled":true,"replicaCount":1}
astClientManagementobjectConfiguration for astclientmanagement{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_client_management","port":5432},"enabled":true,"replicaCount":1}
astClientPropertiesobjectConfiguration for ast-client-properties{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_client_properties","port":5432},"enabled":true,"replicaCount":1}
astLoginobjectConfiguration for astlogin{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_login","port":5432},"enabled":true,"replicaCount":1}
astStreamobjectConfiguration for ast-stream{"enabled":true,"replicaCount":1}
astVersionobjectConfiguration for ast-version{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_version","port":5432},"enabled":true,"replicaCount":1}
astLocalizationobjectConfiguration for ast-localization{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_localization","port":5432},"enabled":true,"replicaCount":1}
astTmsobjectConfiguration for ast-tms{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_tms","port":5432},"enabled":true,"replicaCount":1}
astWebhooksobjectConfiguration for ast-webhooks{"enabled":true,"replicaCount":1}
astKeyProtectionobjectConfiguration for ast-key-protection{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"ast_key_protection","port":5432},"enabled":true,"replicaCount":1}
payGuiobjectConfiguration for pay-gui{"enabled":true,"replicaCount":1}
paySchedulerobjectConfiguration for pay-scheduler{"enabled":true,"replicaCount":1}
payMerchantobjectConfiguration for pay-merchant{"enabled":true,"replicaCount":1}
payUiobjectConfiguration for pay-ui{"enabled":true,"replicaCount":1}
payScpobjectConfiguration for pay-scp{"enabled":true,"replicaCount":1}
payNotificationobjectConfiguration for pay-notification{"enabled":true,"replicaCount":1}
payResultobjectConfiguration for pay-result{"enabled":true,"replicaCount":1}
payPaymentobjectConfiguration for pay-payment{"enabled":true,"replicaCount":1}
payProcessingobjectConfiguration for pay-processing{"enabled":true,"replicaCount":1}
profileBackendobjectConfiguration for profile-backend{"app":{"awsAccessKeyId":"xxxxxxxxxxxxxxxxxxxx","awsRegion":"eu-central-1","awsS3BucketName":"profile-backend","awsSecretAccessKey":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"},"enabled":true,"replicaCount":1}
otpManagementobjectConfiguration for otp-management{"database":{"auth":{"password":"password","username":"user"},"host":"postgres","name":"otp_management","port":5432},"enabled":false,"otpVerification":{"maxResyncWindowSize":100,"maxVerifyWindowSize":3,"maximumRetryCounter":10},"replicaCount":1,"tokenImport":{"certificate":"","privateKey":""}}
otpManagement.otpVerification.maximumRetryCounterintHow many retries are allowed.10
otpManagement.otpVerification.maxVerifyWindowSizeintHow many consecutive OTPs the server tries at most in order to find an entered OTP.3
otpManagement.otpVerification.maxResyncWindowSizeintHow many values the server is trying out in order to find the 2 OTPs during a resync.100
otpManagement.tokenImport.certificatestringThe base64 encoded token import certificate. Token data (XML format) is encrypted based on respective public key. The public key needs to be provided with a certificate, as the certificate will be included in respective import files. This value must be provided.""
otpManagement.tokenImport.privateKeystringToken import private key in PKCS#8 format as base64 string. The private key is required to decrypt token data during import. This value must be provided.""