You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| admin-backend.env.ADMIN_ROLES_CLAIM | string |`"environment-specific"`| Claim used to identify user roles |
107
-
| admin-backend.env.ADMIN_ROLES_VALUES | string |`"environment-specific"`| Values within the role claim that signify admin access |
108
-
| admin-backend.env.ADMIN_SCOPE_CLAIM_VALIDATION_ENABLED | string |`"environment-specific"`| If "true", the admin portal will check for scopes in the OIDC token, otherwise this check will be skipped |
106
+
| admin-backend.env.ADMIN_ROLES_CLAIM | string |`"environment-specific"`| Claim used to identify user roles (required if OIDC_AUTH_ENABLED="true") |
107
+
| admin-backend.env.ADMIN_ROLES_VALUES | string |`"environment-specific"`| Values within the role claim that signify admin access (required if OIDC_AUTH_ENABLED="true") |
108
+
| admin-backend.env.ADMIN_SCOPE_CLAIM | string |`"environment-specific"`| Name of the access token field (required if OIDC_AUTH_ENABLED="true" and ADMIN_SCOPE_CLAIM_VALIDATION_ENABLED="true") |
109
+
| admin-backend.env.ADMIN_SCOPE_CLAIM_VALIDATION_ENABLED | string |`"true"`| If "true", the admin portal will check for scopes in the OIDC token, otherwise this check will be skipped |
110
+
| admin-backend.env.ADMIN_SCOPE_VALUE | string |`"environment-specific"`| Scope claim value (required if OIDC_AUTH_ENABLED="true" and ADMIN_SCOPE_CLAIM_VALIDATION_ENABLED="true") |
109
111
| admin-backend.env.DIAL_URL | string |`"environment-specific"`| URL for DIAL application |
110
112
| admin-backend.env.ELASTIC_CONNECTION_STRING | string |`"environment-specific"`| Connection string for Elasticsearch |
111
113
| admin-backend.env.ELASTIC_INDICATORS_INDEX | string |`"environment-specific"`| Index for Elasticsearch indicators |
112
114
| admin-backend.env.ELASTIC_MATCHING_INDEX | string |`"environment-specific"`| Index for Elasticsearch matching |
| admin-backend.env.OIDC_USERNAME_CLAIM | string |`"environment-specific"`| Specify claim used for the username extraction (required if OIDC_AUTH_ENABLED="true") |
118
120
| admin-backend.env.PGVECTOR_DATABASE | string |`"environment-specific"`| Database name for PGVector |
119
121
| admin-backend.env.PGVECTOR_HOST | string |`"environment-specific"`| Host for PGVector database |
120
122
| admin-backend.env.PGVECTOR_PORT | string |`"environment-specific"`| Port for PGVector database |
| admin-backend.image.repository | string |`"epam/statgpt-admin-backend"`| Image repository name |
125
127
| admin-backend.image.tag | string |`"0.1.0"`| Image tag or version |
128
+
| admin-backend.ingress | object |`{"annotations":{"nginx.ingress.kubernetes.io/proxy-connect-timeout":"600","nginx.ingress.kubernetes.io/proxy-read-timeout":"600","nginx.ingress.kubernetes.io/proxy-send-timeout":"600"},"enabled":false,"ingressClassName":"nginx","path":"/admin/api"}`| Example for data related variables DATA_PORTAL_API_KEY: "example" ## Ingress Configuration ### ref: https://kubernetes.io/docs/concepts/services-networking/ingress/|
| elasticsearch.metrics.image.repository | string |`"bitnamilegacy/elasticsearch-exporter"`| Fix: override deprecated repository with the updated one |
229
-
| elasticsearch.security.enabled | bool |`false`| Enable security features |
235
+
| elasticsearch.security.enabled | bool |`true`| Enable security features |
Generated from chart metadata using [helm-docs](https://github.com/norwoodj/helm-docs): `docker run --rm --volume "$(pwd):/helm-docs" -u $(id -u) jnorwood/helm-docs:latest`
0 commit comments