DBRepo Helm chart
DBRepo is a database repository system that allows researchers to ingest data into a central, versioned repository through common interfaces.
TL;DR
Download the
sample
values.yaml
for your deployment and update the variables, especially hostname
.
helm install my-release "oci://registry.datalab.tuwien.ac.at/dbrepo/helm/dbrepo" --values ./values.yaml --version "1.7.0"
Prerequisites
- Kubernetes 1.24+
- Optional PV provisioner support in the underlying infrastructure (for persistence).
- Optional ingress support in the underlying infrastructure: e.g. NGINX (for the UI).
- Optional certificate provisioner support in the underlying infrastructure: e.g. cert-manager (for production use).
Database Configuration
Note that the default configuration uses a lower memory bound (2GB) than the default MariaDB memory bound (4GB). We
consequently decreased the innodb_buffer_pool_size
to 1430MB (70% of the available memory). You need to increase this
variable when you increase the available Pod memory for performance.
Installing the Chart
To install the chart with the release name my-release
:
helm install my-release "oci://oci://registry.datalab.tuwien.ac.at/dbrepo/helm" --values ./values.yaml --version "1.7.0"
The command deploys DBRepo on the Kubernetes cluster in the default configuration. The Parameters section lists the parameters that can be configured during installation.
Uninstalling the Chart
To uninstall/delete the my-release
deployment:
helm delete my-release
The command removes all the Kubernetes components associated with the chart and deletes the release.
Parameters
Global parameters
Name | Description | Value |
---|---|---|
global.compatibility.openshift.adaptSecurityContext |
Adapt the securityContext sections of the deployment to make them compatible with Openshift restricted-v2 SCC: remove runAsUser, runAsGroup and fsGroup and let the platform use their allowed default IDs. Possible values: auto (apply if the detected running cluster is Openshift), force (perform the adaptation always), disabled (do not perform adaptation) | auto |
global.storageClass |
Global StorageClass for Persistent Volume(s) | "" |
Common parameters
Name | Description | Value |
---|---|---|
hostname |
The hostname. | example.com |
gateway |
The gateway endpoint. | https://example.com |
strategyType |
The image pull | RollingUpdate |
clusterDomain |
The cluster domain. | cluster.local |
Metadata Database
Name | Description | Value |
---|---|---|
metadatadb.enabled |
Enable the Metadata datadb. | true |
metadatadb.host |
The hostname for the microservices. | metadata-db |
metadatadb.extraFlags |
Extra flags to ensure the query store works as intended, ref https://www.ifs.tuwien.ac.at/infrastructures/dbrepo/1.6/api/data-db/#data | --character-set-server=utf8mb4 --collation-server=utf8mb4_general_ci |
metadatadb.rootUser.user |
The root username. | root |
metadatadb.rootUser.password |
The root user password. | dbrepo |
metadatadb.db.name |
The database name. | dbrepo |
metadatadb.galera.mariabackup.user |
The database backup username. | backup |
metadatadb.galera.mariabackup.password |
The database backup user password | backup |
metadatadb.jdbcExtraArgs |
The extra arguments for JDBC connections in the microservices. | "" |
metadatadb.configurationConfigMap |
The database configuration files. | metadata-db-config |
metadatadb.extraInitDbScripts |
Additional init.db scripts that are executed on the first start. | {} |
metadatadb.replicaCount |
The number of cluster nodes, should be uneven i.e. 2n+1 | 3 |
metadatadb.resourcesPreset |
The container resource preset | nano-hm |
metadatadb.persistence.enabled |
Enable persistent storage. | true |
Auth Service
Name | Description | Value |
---|---|---|
authservice.enabled |
Enable the Auth Service. | true |
authservice.image.debug |
Set the logging level to trace . Otherwise, set to info . |
false |
authservice.endpoint |
The hostname for the microservices. | http://auth-service |
authservice.production |
Start Keycloak with production profile. | true |
authservice.resourcesPreset |
The container resource presets | small |
authservice.jwt.pubkey |
The JWT public key from the dbrepo-client . |
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqqnHQ2BWWW9vDNLRCcxD++xZg/16oqMo/c1l+lcFEjjAIJjJp/HqrPYU/U9GvquGE6PbVFtTzW1KcKawOW+FJNOA3CGo8Q1TFEfz43B8rZpKsFbJKvQGVv1Z4HaKPvLUm7iMm8Hv91cLduuoWx6Q3DPe2vg13GKKEZe7UFghF+0T9u8EKzA/XqQ0OiICmsmYPbwvf9N3bCKsB/Y10EYmZRb8IhCoV9mmO5TxgWgiuNeCTtNCv2ePYqL/U0WvyGFW0reasIK8eg3KrAUj8DpyOgPOVBn3lBGf+3KFSYi+0bwZbJZWqbC/Xlk20Go1YfeJPRIt7ImxD27R/lNjgDO/MwIDAQAB |
authservice.tls.enabled |
Enable TLS/SSL communication. Required for HTTPS. | true |
authservice.tls.existingSecret |
The secret containing the tls.crt , tls.key and ca.crt . |
ingress-cert |
authservice.client.id |
The client id for the microservices. | dbrepo-client |
authservice.client.secret |
The client secret for the microservices. | MUwRc7yfXSJwX8AdRMWaQC3Nep1VjwgG |
authservice.setupJob.resourcesPreset |
The container resource preset | nano |
authservice.setupJob.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
Data Database
Name | Description | Value |
---|---|---|
datadb.host |
The hostname for the microservices. | data-db |
datadb.extraFlags |
Extra flags to ensure the query store works as intended, ref https://www.ifs.tuwien.ac.at/infrastructures/dbrepo/1.6/api/data-db/#data | --character-set-server=utf8mb4 --collation-server=utf8mb4_general_ci |
datadb.rootUser.user |
The root username. | root |
datadb.rootUser.password |
The root user password. | dbrepo |
datadb.db.name |
The database name. | dbrepo |
datadb.galera.mariabackup.user |
The database backup username. | backup |
datadb.galera.mariabackup.password |
The database backup user password | backup |
datadb.jdbcExtraArgs |
The extra arguments for JDBC connections in the microservices. | "" |
datadb.replicaCount |
The number of cluster nodes, should be uneven i.e. 2n+1 | 3 |
datadb.resourcesPreset |
The container resource preset | nano-hm |
datadb.persistence.enabled |
Enable persistent storage. | true |
Search Database
Name | Description | Value |
---|---|---|
searchdb.enabled |
Enable the Data datadb. | true |
searchdb.host |
The hostname for the microservices. | search-db |
searchdb.port |
The port for the microservices. | 9200 |
searchdb.coordinating.resourcesPreset |
The container resource preset | small |
searchdb.coordinating.replicaCount |
The number of pod replicas. | 1 |
searchdb.ingest.resourcesPreset |
The container resource preset | micro |
searchdb.ingest.replicaCount |
The number of pod replicas. | 1 |
searchdb.master.resourcesPreset |
The container resource preset | small |
searchdb.master.replicaCount |
The number of pod replicas. | 1 |
searchdb.data.resourcesPreset |
The container resource preset | medium |
searchdb.data.replicaCount |
The number of pod replicas. | 1 |
searchdb.clusterName |
The cluster name. | search-db |
Upload Service
Name | Description | Value |
---|---|---|
uploadservice.enabled |
Enable the Upload Service. | true |
uploadservice.s3.endpoint |
The S3-capable endpoint the microservice connects to. | http://storage-service-s3:8333 |
uploadservice.s3.bucket |
The S3 bucket name. | dbrepo |
uploadservice.s3.maxSize |
The maximum file size in bytes. | 2000000000 |
uploadservice.podSecurityContext.enabled |
Enable pods' Security Context | true |
uploadservice.podSecurityContext.fsGroupChangePolicy |
Set filesystem group change policy | Always |
uploadservice.podSecurityContext.sysctls |
Set kernel settings using the sysctl interface | [] |
uploadservice.podSecurityContext.supplementalGroups |
Set filesystem extra groups | [] |
uploadservice.podSecurityContext.fsGroup |
Set RabbitMQ pod's Security Context fsGroup | 0 |
uploadservice.containerSecurityContext.enabled |
Enable containers' Security Context | true |
uploadservice.containerSecurityContext.seLinuxOptions |
Set SELinux options in container | {} |
uploadservice.containerSecurityContext.runAsUser |
Set RabbitMQ containers' Security Context runAsUser | 1000 |
uploadservice.containerSecurityContext.runAsGroup |
Set RabbitMQ containers' Security Context runAsGroup | 1000 |
uploadservice.containerSecurityContext.runAsNonRoot |
Set RabbitMQ container's Security Context runAsNonRoot | true |
uploadservice.containerSecurityContext.allowPrivilegeEscalation |
Set container's privilege escalation | false |
uploadservice.containerSecurityContext.readOnlyRootFilesystem |
Set container's Security Context readOnlyRootFilesystem | false |
uploadservice.containerSecurityContext.capabilities.drop |
Set container's Security Context runAsNonRoot | ["ALL"] |
uploadservice.containerSecurityContext.seccompProfile.type |
Set container's Security Context seccomp profile | RuntimeDefault |
uploadservice.resourcesPreset |
The container resource preset | nano |
uploadservice.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
uploadservice.replicaCount |
The number of replicas. | 2 |
Broker Service
Name | Description | Value |
---|---|---|
brokerservice.enabled |
Enable the Broker Service. | true |
brokerservice.image.debug |
Set the logging level to trace . Otherwise, set to info . |
true |
brokerservice.endpoint |
The management api endpoint for the microservices. | http://broker-service:15672 |
brokerservice.host |
The hostname for the microservices. | broker-service |
brokerservice.port |
The port for the microservices. | 5672 |
brokerservice.virtualHost |
The default virtual host name. | dbrepo |
brokerservice.queueName |
The default queue name. | dbrepo |
brokerservice.exchangeName |
The default exchange name. | dbrepo |
brokerservice.routingKey |
The default routing key binding from the default queue to the default exchange. | dbrepo.# |
brokerservice.connectionTimeout |
The connection timeout in ms. | 60000 |
brokerservice.ldap.binddn |
The domain name the broker service should bind to. In many cases this is the admin user from identityservice.global.adminUser . |
cn=admin,dc=dbrepo,dc=at |
brokerservice.ldap.bindpw |
The password to bind on the identity service. In many cases this value is equal to identityservice.global.adminPassword . |
admin |
brokerservice.ldap.uidField |
The field containing the user id. | uid |
brokerservice.ldap.basedn |
The base domain name containing the users. | dc=dbrepo,dc=at |
brokerservice.ldap.userDnPattern |
The pattern to determine the user. | ${username} |
brokerservice.auth.tls.enabled |
Enable TLS support | false |
brokerservice.auth.tls.existingSecretFullChain |
If set to true the service uses the full chain in the certificate tls.crt , otherwise it attempts to read from ca.crt
|
false |
brokerservice.auth.tls.existingSecret |
Existing secret with certificate content | ingress-cert |
brokerservice.extraPlugins |
The list of plugins to be activated. | rabbitmq_prometheus rabbitmq_auth_backend_ldap rabbitmq_auth_mechanism_ssl rabbitmq_mqtt |
brokerservice.persistence.enabled |
If set to true, a PVC will be created. | false |
brokerservice.extraConfiguration |
The extra configuration for MQTT | `mqtt.vhost = dbrepo |
mqtt.exchange = dbrepo | ||
mqtt.prefetch = 10 | ||
` | ||
brokerservice.replicaCount |
The number of replicas. | 1 |
Analyse Service
Name | Description | Value |
---|---|---|
analyseservice.enabled |
Enable the Broker Service. | true |
analyseservice.podSecurityContext.enabled |
Enable pods' Security Context | true |
analyseservice.podSecurityContext.fsGroupChangePolicy |
Set filesystem group change policy | Always |
analyseservice.podSecurityContext.sysctls |
Set kernel settings using the sysctl interface | [] |
analyseservice.podSecurityContext.supplementalGroups |
Set filesystem extra groups | [] |
analyseservice.podSecurityContext.fsGroup |
Set RabbitMQ pod's Security Context fsGroup | 1001 |
analyseservice.containerSecurityContext.enabled |
Enabled containers' Security Context | true |
analyseservice.containerSecurityContext.seLinuxOptions |
Set SELinux options in container | {} |
analyseservice.containerSecurityContext.runAsUser |
Set RabbitMQ containers' Security Context runAsUser | 1001 |
analyseservice.containerSecurityContext.runAsGroup |
Set RabbitMQ containers' Security Context runAsGroup | 1001 |
analyseservice.containerSecurityContext.runAsNonRoot |
Set RabbitMQ container's Security Context runAsNonRoot | true |
analyseservice.containerSecurityContext.allowPrivilegeEscalation |
Set container's privilege escalation | false |
analyseservice.containerSecurityContext.readOnlyRootFilesystem |
Set container's Security Context readOnlyRootFilesystem | false |
analyseservice.containerSecurityContext.capabilities.drop |
Set container's Security Context runAsNonRoot | ["ALL"] |
analyseservice.containerSecurityContext.seccompProfile.type |
Set container's Security Context seccomp profile | RuntimeDefault |
analyseservice.resourcesPreset |
The container resource preset | micro |
analyseservice.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
analyseservice.endpoint |
The url of the endpoint. | http://analyse-service |
analyseservice.s3.proto |
The protocol of the storage service endpoint. | http |
analyseservice.s3.endpoint |
The hostname and port of the storage service endpoint. | storage-service-s3:8333 |
analyseservice.replicaCount |
The number of replicas. | 2 |
Metadata Service
Name | Description | Value |
---|---|---|
metadataservice.enabled |
Enable the Broker Service. | true |
metadataservice.podSecurityContext.enabled |
Enable pods' Security Context | true |
metadataservice.podSecurityContext.fsGroupChangePolicy |
Set filesystem group change policy | Always |
metadataservice.podSecurityContext.sysctls |
Set kernel settings using the sysctl interface | [] |
metadataservice.podSecurityContext.supplementalGroups |
Set filesystem extra groups | [] |
metadataservice.podSecurityContext.fsGroup |
Set RabbitMQ pod's Security Context fsGroup | 1001 |
metadataservice.containerSecurityContext.enabled |
Enable containers' Security Context | true |
metadataservice.containerSecurityContext.seLinuxOptions |
Set SELinux options in container | {} |
metadataservice.containerSecurityContext.runAsUser |
Set RabbitMQ containers' Security Context runAsUser | 1001 |
metadataservice.containerSecurityContext.runAsGroup |
Set RabbitMQ containers' Security Context runAsGroup | 1001 |
metadataservice.containerSecurityContext.runAsNonRoot |
Set RabbitMQ container's Security Context runAsNonRoot | true |
metadataservice.containerSecurityContext.allowPrivilegeEscalation |
Set container's privilege escalation | false |
metadataservice.containerSecurityContext.readOnlyRootFilesystem |
Set container's Security Context readOnlyRootFilesystem | false |
metadataservice.containerSecurityContext.capabilities.drop |
Set container's Security Context runAsNonRoot | ["ALL"] |
metadataservice.containerSecurityContext.seccompProfile.type |
Set container's Security Context seccomp profile | RuntimeDefault |
metadataservice.resourcesPreset |
The container resource preset | small |
metadataservice.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
metadataservice.endpoint |
The Metadata Service endpoint. | http://metadata-service |
metadataservice.crossref.endpoint |
The CrossRef endpoint. | http://data.crossref.org |
metadataservice.ror.endpoint |
The ROR endpoint. | https://api.ror.org |
metadataservice.admin.email |
The OAI-PMH exposed e-mail for contacting the metadata records responsible person. | noreply@example.com |
metadataservice.deletedRecord |
The OAI-PMH exposed delete policy. | permanent |
metadataservice.repositoryName |
The OAI-PMH exposed repository name. | Database Repository |
metadataservice.granularity |
The OAI-PMH exposed record granularity. | YYYY-MM-DDThh:mm:ssZ |
metadataservice.datacite.enabled |
If set to true, the service mints DOIs instead of local PIDs. | false |
metadataservice.datacite.url |
The DataCite api endpoint url. | https://api.datacite.org |
metadataservice.datacite.prefix |
The DataCite prefix. | "" |
metadataservice.datacite.username |
The DataCite api username. | "" |
metadataservice.datacite.password |
The DataCite api user password. | "" |
metadataservice.sparql.connectionTimeout |
The connection timeout for sparql queries fetching remote data in ms. | 10000 |
metadataservice.s3.endpoint |
The S3-capable endpoint the microservice connects to. | http://storage-service-s3:8333 |
metadataservice.s3.auth.username |
The S3-capable endpoint username (or access key id). | seaweedfsadmin |
metadataservice.s3.auth.password |
The S3-capable endpoint user password (or access key secret). | seaweedfsadmin |
metadataservice.replicaCount |
The number of replicas. | 2 |
Data Service
Name | Description | Value |
---|---|---|
dataservice.enabled |
Enable the Broker Service. | true |
dataservice.endpoint |
Absolute URL to the data service in the form of http://host:port | http://data-service |
dataservice.podSecurityContext.enabled |
Enable pods' Security Context | true |
dataservice.podSecurityContext.fsGroupChangePolicy |
Set filesystem group change policy | Always |
dataservice.podSecurityContext.sysctls |
Set kernel settings using the sysctl interface | [] |
dataservice.podSecurityContext.supplementalGroups |
Set filesystem extra groups | [] |
dataservice.podSecurityContext.fsGroup |
Set RabbitMQ pod's Security Context fsGroup | 1001 |
dataservice.containerSecurityContext.enabled |
Enabled containers' Security Context | true |
dataservice.containerSecurityContext.seLinuxOptions |
Set SELinux options in container | {} |
dataservice.containerSecurityContext.runAsUser |
Set RabbitMQ containers' Security Context runAsUser | 1001 |
dataservice.containerSecurityContext.runAsGroup |
Set RabbitMQ containers' Security Context runAsGroup | 1001 |
dataservice.containerSecurityContext.runAsNonRoot |
Set RabbitMQ container's Security Context runAsNonRoot | true |
dataservice.containerSecurityContext.allowPrivilegeEscalation |
Set container's privilege escalation | false |
dataservice.containerSecurityContext.readOnlyRootFilesystem |
Set container's Security Context readOnlyRootFilesystem | false |
dataservice.containerSecurityContext.capabilities.drop |
Set container's Security Context runAsNonRoot | ["ALL"] |
dataservice.containerSecurityContext.seccompProfile.type |
Set container's Security Context seccomp profile | RuntimeDefault |
dataservice.resourcesPreset |
The container resource preset | large |
dataservice.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
dataservice.grant.read |
The default database permissions for users with read access. | SELECT |
dataservice.grant.write |
The default database permissions for users with write access. | SELECT, CREATE, CREATE VIEW, CREATE ROUTINE, CREATE TEMPORARY TABLES, LOCK TABLES, INDEX, TRIGGER, INSERT, UPDATE, DELETE |
dataservice.rabbitmq.consumerConcurrentMin |
The minimal number of RabbitMQ consumers. | 2 |
dataservice.rabbitmq.consumerConcurrentMax |
The maximal number of RabbitMQ consumers. | 6 |
dataservice.rabbitmq.requeueRejected |
If set to true, rejected tuples will be re-queued. | false |
dataservice.rabbitmq.consumer.username |
The username for the consumer to read tuples from the broker service. In many cases this value is equal to identityservice.users . |
admin |
dataservice.rabbitmq.consumer.password |
The user password for the consumer to read tuples from the broker service. In many cases this value is equal to identityservice.userPasswords . |
admin |
dataservice.s3.endpoint |
The S3-capable endpoint the microservice connects to. | http://storage-service-s3:8333 |
dataservice.s3.bucket |
The S3 bucket name. | dbrepo |
dataservice.s3.auth.accessKeyId |
The S3-capable endpoint username (or access key id). | seaweedfsadmin |
dataservice.s3.auth.secretAccessKey |
The S3-capable endpoint user password (or access key secret). | seaweedfsadmin |
dataservice.s3.filePath |
The local location to download/upload files from/to S3-capable endpoint. | /s3 |
dataservice.replicaCount |
The number of replicas. | 2 |
Search Service
Name | Description | Value |
---|---|---|
searchservice.enabled |
Enable the Broker Service. | true |
searchservice.endpoint |
Absolute URL to the search service in the form of http://host:port | http://search-service |
searchservice.podSecurityContext.enabled |
Enable pods' Security Context | true |
searchservice.podSecurityContext.fsGroupChangePolicy |
Set filesystem group change policy | Always |
searchservice.podSecurityContext.sysctls |
Set kernel settings using the sysctl interface | [] |
searchservice.podSecurityContext.supplementalGroups |
Set filesystem extra groups | [] |
searchservice.podSecurityContext.fsGroup |
Set RabbitMQ pod's Security Context fsGroup | 1001 |
searchservice.containerSecurityContext.enabled |
Enabled containers' Security Context | true |
searchservice.containerSecurityContext.seLinuxOptions |
Set SELinux options in container | {} |
searchservice.containerSecurityContext.runAsUser |
Set RabbitMQ containers' Security Context runAsUser | 1001 |
searchservice.containerSecurityContext.runAsGroup |
Set RabbitMQ containers' Security Context runAsGroup | 1001 |
searchservice.containerSecurityContext.runAsNonRoot |
Set RabbitMQ container's Security Context runAsNonRoot | true |
searchservice.containerSecurityContext.allowPrivilegeEscalation |
Set container's privilege escalation | false |
searchservice.containerSecurityContext.readOnlyRootFilesystem |
Set container's Security Context readOnlyRootFilesystem | true |
searchservice.containerSecurityContext.capabilities.drop |
Set container's Security Context runAsNonRoot | ["ALL"] |
searchservice.containerSecurityContext.seccompProfile.type |
Set container's Security Context seccomp profile | RuntimeDefault |
searchservice.resourcesPreset |
The container resource preset | micro |
searchservice.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
searchservice.init.resourcesPreset |
The container resource preset | nano |
searchservice.init.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
searchservice.replicaCount |
The number of replicas. | 2 |
Storage Service
Name | Description | Value |
---|---|---|
storageservice.enabled |
Enable the Storage Service. | true |
storageservice.mariadb.enabled |
Enables the MariaDB database needed for the filer. | true |
storageservice.mariadb.auth.rootPassword |
The password for the root user. | seaweedfsfiler |
storageservice.filer.enabled |
Cannot use the filer in the standard component since it's incompatible with OpenShift | true |
storageservice.s3.bucket |
The S3-bucket name. | dbrepo |
storageservice.s3.auth.enabled |
Enable the S3 service. | true |
storageservice.s3.auth.adminAccessKeyId |
The S3 access key id for the admin user. In some systems this is named username . |
seaweedfsadmin |
storageservice.s3.auth.adminSecretAccessKey |
The S3 secret access key for the admin user. In some systems this is named password . |
seaweedfsadmin |
storageservice.s3.auth.readAccessKeyId |
The S3 access key id for the read only user. | seaweedfsuser |
storageservice.s3.auth.readSecretAccessKey |
The S3 secret access key for the read only user. | seaweedfsuser |
storageservice.init.s3.endpoint |
The S3-capable endpoint the microservice connects to. | http://storage-service-s3:8333 |
storageservice.init.resourcesPreset |
The container resource preset | nano |
storageservice.init.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
Identity Service
Name | Description | Value |
---|---|---|
identityservice.enabled |
Enable the Identity Service. | true |
identityservice.global.ldapDomain |
The LDAP domain name in domain "dbrepo.at" form or explicit in "dc=dbrepo,dc=at" form. | dc=dbrepo,dc=at |
identityservice.global.adminUser |
The admin username that is used to bind. | admin |
identityservice.global.adminPassword |
The admin user password that is used to bind. | admin |
identityservice.podSecurityContext.enabled |
Enable pods' Security Context | true |
identityservice.podSecurityContext.fsGroupChangePolicy |
Set filesystem group change policy | Always |
identityservice.podSecurityContext.sysctls |
Set kernel settings using the sysctl interface | [] |
identityservice.podSecurityContext.supplementalGroups |
Set filesystem extra groups | [] |
identityservice.podSecurityContext.fsGroup |
Set RabbitMQ pod's Security Context fsGroup | 1001 |
identityservice.containerSecurityContext.enabled |
Enabled containers' Security Context | true |
identityservice.containerSecurityContext.seLinuxOptions |
Set SELinux options in container | {} |
identityservice.containerSecurityContext.runAsUser |
Set RabbitMQ containers' Security Context runAsUser | 1001 |
identityservice.containerSecurityContext.runAsGroup |
Set RabbitMQ containers' Security Context runAsGroup | 0 |
identityservice.containerSecurityContext.runAsNonRoot |
Set RabbitMQ container's Security Context runAsNonRoot | true |
identityservice.containerSecurityContext.allowPrivilegeEscalation |
Set container's privilege escalation | false |
identityservice.containerSecurityContext.readOnlyRootFilesystem |
Set container's Security Context readOnlyRootFilesystem | false |
identityservice.containerSecurityContext.capabilities.drop |
Set container's Security Context runAsNonRoot | ["ALL"] |
identityservice.containerSecurityContext.capabilities.add |
Set container's Security Context runAsNonRoot | ["NET_BIND_SERVICE"] |
identityservice.containerSecurityContext.seccompProfile.type |
Set container's Security Context seccomp profile | RuntimeDefault |
identityservice.resourcesPreset |
The container resource preset | nano |
identityservice.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
identityservice.users |
The admin username for internal authentication. | admin |
identityservice.userPasswords |
The admin user password for internal authentication. | admin |
identityservice.group |
The group that contains the administrators for the broker service. | system |
identityservice.persistence.enabled |
If set to true, a PVC will be created. | true |
User Interface
Name | Description | Value |
---|---|---|
ui.enabled |
Enable the Broker Service. | true |
ui.podSecurityContext.enabled |
Enable pods' Security Context | true |
ui.podSecurityContext.fsGroupChangePolicy |
Set filesystem group change policy | Always |
ui.podSecurityContext.sysctls |
Set kernel settings using the sysctl interface | [] |
ui.podSecurityContext.supplementalGroups |
Set filesystem extra groups | [] |
ui.podSecurityContext.fsGroup |
Set RabbitMQ pod's Security Context fsGroup | 1001 |
ui.containerSecurityContext.enabled |
Enabled containers' Security Context | true |
ui.containerSecurityContext.seLinuxOptions |
Set SELinux options in container | {} |
ui.containerSecurityContext.runAsUser |
Set RabbitMQ containers' Security Context runAsUser | 1001 |
ui.containerSecurityContext.runAsGroup |
Set RabbitMQ containers' Security Context runAsGroup | 1001 |
ui.containerSecurityContext.runAsNonRoot |
Set RabbitMQ container's Security Context runAsNonRoot | true |
ui.containerSecurityContext.allowPrivilegeEscalation |
Set container's privilege escalation | false |
ui.containerSecurityContext.readOnlyRootFilesystem |
Set container's Security Context readOnlyRootFilesystem | false |
ui.containerSecurityContext.capabilities.drop |
Set container's Security Context runAsNonRoot | ["ALL"] |
ui.containerSecurityContext.seccompProfile.type |
Set container's Security Context seccomp profile | RuntimeDefault |
ui.resourcesPreset |
The container resource preset | micro |
ui.resources |
Set container requests and limits for different resources like CPU or memory (essential for production workloads) | {} |
ui.public.api.client |
The endpoint for the client api. Defaults to the value of gateway . |
"" |
ui.public.api.server |
The endpoint for the server api. Defaults to the value of gateway . |
"" |
ui.public.upload.client |
The endpoint for the upload client. Defaults to the value of gateway and path /api/upload/files . |
"" |
ui.public.title |
The user interface title. | Database Repository |
ui.public.logo |
The user interface logo. | /logo.svg |
ui.public.icon |
The user interface icon. | /favicon.ico |
ui.public.touch |
The user interface apple touch icon. | /apple-touch-icon.png |
ui.public.broker.host |
The displayed broker hostname. | example.com |
ui.public.broker.extra |
Extra metadata displayed. | "" |
ui.public.database.extra |
Extra metadata displayed. | "" |
ui.public.pid.default.publisher |
The default dataset publisher for persisted identifiers. | Example University |
ui.public.doi.enabled |
Enable the display that DOIs are minted. | false |
ui.public.doi.endpoint |
The DOI proxy. | https://doi.org |
ui.replicaCount |
The number of replicas. | 1 |
Dashboard Service
Name | Description | Value |
---|---|---|
dashboardservice.enabled |
Enable the Dashboard Service. | true |
dashboardservice.metrics.enabled |
Enable the metrics sidecar. | true |
dashboardservice.dashboardsProvider.enabled |
Enable the default dashboard provisioning provider to routinely import dashboards from /opt/bitnami/grafana/dashboards | true |
Metric Service
Name | Description | Value |
---|---|---|
metricdb.enabled |
Enable the Metric Service. | true |
Gateway Service
Name | Description | Value |
---|---|---|
gatewayservice.enabled |
Enable the Gateway Service. | true |
gatewayservice.service.type |
The service type. | ClusterIP |
gatewayservice.metrics.enabled |
Enable the Prometheus metrics sidecar. | false |
gatewayservice.existingServerBlockConfigmap |
The extra configuration for the reverse proxy | gateway-service-setup |
gatewayservice.replicaCount |
The number of replicas. | 3 |
Analytics Service
Name | Description | Value |
---|---|---|
computeservice.endpoint |
Configure the number of parallel workers with local[n] | local[2] |
Ingress
Name | Description | Value |
---|---|---|
ingress.enabled |
Enable the ingress. | false |
ingress.className |
The ingress class name. | nginx |
ingress.tls.enabled |
Enable the ingress. | true |
ingress.tls.secretName |
The secret holding the SSL/TLS certificate. Needs to have keys tls.crt and tls.key and optionally ca.crt . |
ingress-cert |