diff --git a/helm/dbrepo/dbrepo-aris-values.yaml b/helm/dbrepo/dbrepo-aris-values.yaml
index 634adaf4ea9cd0388a1418459242f33f34cbf8ed..cbaa753e9623d0159a818b0c02e33dbbda853bf6 100644
--- a/helm/dbrepo/dbrepo-aris-values.yaml
+++ b/helm/dbrepo/dbrepo-aris-values.yaml
@@ -86,7 +86,7 @@ dbrepo:
           allowPrivilegeEscalation: false
           seccompProfile:
             type: RuntimeDefault
-          capabilities:
+          capabilities: 
             drop:
               - ALL
         ports:
diff --git a/helm/dbrepo/ingr1.txt b/helm/dbrepo/ingr1.txt
new file mode 100644
index 0000000000000000000000000000000000000000..62185d3363d5473840b6b56c05b3e0921c47adaf
--- /dev/null
+++ b/helm/dbrepo/ingr1.txt
@@ -0,0 +1,44 @@
+kind: Ingress
+apiVersion: networking.k8s.io/v1
+metadata:
+  name: example
+  namespace: aris-dbrepo-dev
+  uid: bd483947-6db1-46ac-857e-523f652f3e34
+  resourceVersion: '691663457'
+  generation: 1
+  creationTimestamp: '2024-11-21T17:05:43Z'
+  managedFields:
+    - manager: Mozilla
+      operation: Update
+      apiVersion: networking.k8s.io/v1
+      time: '2024-11-21T17:05:43Z'
+      fieldsType: FieldsV1
+      fieldsV1:
+        'f:spec':
+          'f:rules': {}
+    - manager: route-controller-manager
+      operation: Update
+      apiVersion: networking.k8s.io/v1
+      time: '2024-11-21T17:05:43Z'
+      fieldsType: FieldsV1
+      fieldsV1:
+        'f:status':
+          'f:loadBalancer':
+            'f:ingress': {}
+      subresource: status
+spec:
+  rules:
+    - host: dbrepodev.arisnet.ac.at
+      http:
+        paths:
+          - path: /
+            pathType: Prefix
+            backend:
+              service:
+                name: ui
+                port:
+                  number: 80
+status:
+  loadBalancer:
+    ingress:
+      - hostname: router-default.arisnet.ac.at
diff --git a/helm/dbrepo/ingr2.txt b/helm/dbrepo/ingr2.txt
new file mode 100644
index 0000000000000000000000000000000000000000..8505360ebdb248b7d69351ba32d38bbf143f7c20
--- /dev/null
+++ b/helm/dbrepo/ingr2.txt
@@ -0,0 +1,61 @@
+kind: Ingress
+apiVersion: networking.k8s.io/v1
+metadata:
+  annotations:
+    haproxy.router.openshift.io/use-regex: 'true'
+    meta.helm.sh/release-name: dbrepo
+    meta.helm.sh/release-namespace: aris-dbrepo-dev
+  resourceVersion: '691661694'
+  name: dbrepo-ingress-basic
+  uid: 75363900-77e6-4d83-b067-b5183f25fee1
+  creationTimestamp: '2024-10-02T15:41:53Z'
+  generation: 5
+  managedFields:
+    - manager: helm
+      operation: Update
+      apiVersion: networking.k8s.io/v1
+      time: '2024-11-21T16:58:38Z'
+      fieldsType: FieldsV1
+      fieldsV1:
+        'f:metadata':
+          'f:annotations':
+            .: {}
+            'f:haproxy.router.openshift.io/use-regex': {}
+            'f:meta.helm.sh/release-name': {}
+            'f:meta.helm.sh/release-namespace': {}
+          'f:labels':
+            .: {}
+            'f:app.kubernetes.io/managed-by': {}
+        'f:spec':
+          'f:ingressClassName': {}
+          'f:tls': {}
+    - manager: Mozilla
+      operation: Update
+      apiVersion: networking.k8s.io/v1
+      time: '2024-11-21T17:04:09Z'
+      fieldsType: FieldsV1
+      fieldsV1:
+        'f:spec':
+          'f:rules': {}
+  namespace: aris-dbrepo-dev
+  labels:
+    app.kubernetes.io/managed-by: Helm
+spec:
+  ingressClassName: openshift-default
+  tls:
+    - hosts:
+        - dbrepo.arisnet.ac.at
+      secretName: dbrepo-ingress-tls-cert
+  rules:
+    - host: dbrepo.arisnet.ac.at
+      http:
+        paths:
+          - path: /
+            pathType: Prefix
+            backend:
+              service:
+                name: ui
+                port:
+                  number: 80
+status:
+  loadBalancer: {}
diff --git a/helm/dbrepo/templates/routes.yaml b/helm/dbrepo/templates/routes.yaml.bak
similarity index 100%
rename from helm/dbrepo/templates/routes.yaml
rename to helm/dbrepo/templates/routes.yaml.bak
diff --git a/helm/dbrepo/values.yaml b/helm/dbrepo/values.yaml
index 0122d3b2962ff1629d7934509fb1aef7c6b3ae24..19501583ccacf2bfd1f5c5d3c3b3ad1bbc67ed1e 100644
--- a/helm/dbrepo/values.yaml
+++ b/helm/dbrepo/values.yaml
@@ -372,7 +372,7 @@ searchdb:
 
 uploadservice:
   ## @param uploadservice.enabled Enable the Upload Service.
-  enabled: true
+  enabled: false
   ## @skip uploadservice.fullnameOverride
   fullnameOverride: upload-service
   ## @skip uploadservice.image
@@ -786,6 +786,12 @@ identityservice:
   ## @param identityservice.enabled Enable the Identity Service.
   enabled: true
   ## @skip identityservice.fullnameOverride
+  podAnnotations:
+    metadata.annotations.openshift.ioo/scc: nonroot
+  serviceAccount:
+    ## @param serviceAccount.create Enable creation of ServiceAccount for Apache pod
+    ##
+    create: false
   fullnameOverride: identity-service
   podSecurityContext:
     runAsNonRoot: true
@@ -819,8 +825,10 @@ identityservice:
   userPasswords: admin
   ## @param identityservice.group The group that contains the administrators for the broker service.
   group: system
-  ## @skip identityservice.ltb-passwd
-
+  logLevel: trace
+  env:
+    # set this to "true" to enable bootstrap debugging
+    BITNAMI_DEBUG: "true"
   ## @skip identityservice.phpldapadmin
   phpldapadmin:
     enabled: false
@@ -842,6 +850,14 @@ identityservice:
   persistence:
     ## @param identityservice.persistence.enabled If set to true, a PVC will be created.
     enabled: true
+    storageClassName: "rbd-storagepool-cluster"
+  extraVolumes:
+    - name: cache-volume
+      emptyDir: {}
+  # @skip ui.extraVolumeMounts
+  extraVolumeMounts:
+    - name: cache-volume
+      mountPath: /opt/bitnami/openldap/share/
   replication:
     ## @param identityservice.replication.enabled If set to true, the pods required a cluster. Needs `replicaCount` to be `3` or higher (of 2n+1).
     enabled: false
@@ -855,7 +871,7 @@ ui:
   enabled: true
   image:
     ## @skip ui.image.name
-    name: registry.datalab.tuwien.ac.at/dbrepo/ui:1.4.5
+    name: registry.datalab.tuwien.ac.at/dbrepo/ui:1.5.1 #todo updated because of memory leak in prometheus
     ## @skip ui.image.pullPolicy
     pullPolicy: Always
     ## @param ui.image.debug Set the logging level to `trace`. Otherwise, set to `info`.
@@ -965,27 +981,22 @@ ingress:
   enabled: true
   className: "openshift-default"
   tls:
-    enabled: true
+    enabled: false
     secretName: dbrepo-ingress-tls-cert
   annotations:
     basic:
-      #        cert-manager.io/cluster-issuer: letsencrypt-cluster-issuer
-      nginx.ingress.kubernetes.io/use-regex: "true"
+      haproxy.router.openshift.io/use-regex: "true"
     rewriteApi:
-      #        cert-manager.io/cluster-issuer: letsencrypt-cluster-issuer
-      nginx.ingress.kubernetes.io/use-regex: "true"
-      nginx.ingress.kubernetes.io/rewrite-target: /api/$1
+      haproxy.router.openshift.io/use-regex: "true"
+      haproxy.router.openshift.io/rewrite-target: /api/$1
     rewriteRoot:
-      #        cert-manager.io/cluster-issuer: letsencrypt-cluster-issuer
-      nginx.ingress.kubernetes.io/use-regex: "true"
-      nginx.ingress.kubernetes.io/rewrite-target: /$1
+      haproxy.router.openshift.io/use-regex: "true"
+      haproxy.router.openshift.io/rewrite-target: /$1
     rewriteRootSecure:
-      #        cert-manager.io/cluster-issuer: letsencrypt-cluster-issuer
-      nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
-      nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
-      nginx.ingress.kubernetes.io/use-regex: "true"
-      nginx.ingress.kubernetes.io/rewrite-target: /$1
+      haproxy.router.openshift.io/ssl-redirect: "true" # Use this for force SSL redirect
+      haproxy.router.openshift.io/backend-protocol: "HTTPS"
+      haproxy.router.openshift.io/use-regex: "true"
+      haproxy.router.openshift.io/rewrite-target: /$1
     rewritePid:
-      #        cert-manager.io/cluster-issuer: letsencrypt-cluster-issuer
-      nginx.ingress.kubernetes.io/use-regex: "true"
-      nginx.ingress.kubernetes.io/rewrite-target: /api/identifier/$1
+      haproxy.router.openshift.io/use-regex: "true"
+      haproxy.router.openshift.io/rewrite-target: /api/identifier/$1
diff --git a/helm/delete_all_routes.sh b/helm/delete_all_routes.sh
new file mode 100644
index 0000000000000000000000000000000000000000..9966fdb2cde9de3ab4e834cc95c39627959856ad
--- /dev/null
+++ b/helm/delete_all_routes.sh
@@ -0,0 +1 @@
+oc get routes.route.openshift.io -oname | xargs oc delete
diff --git a/helm/fix_identity.sh b/helm/fix_identity.sh
index 1d4cf69841b4ec382354ba0558cbe13b9334b332..c644e566c4c3a914232e84b2d50cdeeb482bd64b 100644
--- a/helm/fix_identity.sh
+++ b/helm/fix_identity.sh
@@ -64,6 +64,11 @@ oc patch statefulset $STATEFULSET_NAME -n $NAMESPACE --type='json' -p='[
   {
     "op": "remove",
     "path": "/spec/template/spec/containers/0/securityContext/runAsUser"
+  },
+  {
+    "op": "add",
+    "path": "/spec/template/spec/containers/0/securityContext/capabilities/add/-",
+    "value": "NET_BIND_SERVICE"
   }
 ]'