Configu­ring JUDGE Helm Deploy­ments

Customizing with Helm Charts

JUDGE offers flexibility in customizing deployments through Helm charts. You can tailor your deployment according to your specific requirements by overriding default values using Helm.

Using Helm cli args

You can customize the JUDGE umbrella values.yaml file when installing our Helm charts from our registry. Helm allows you to override default values specified in the values.yaml file of the chart during installation. Here's how you can do it:

# JAR (JUDGE Artifact Registry)
helm install judge us-east4-docker.pkg.dev/judge-395516/judge-image-registry/judge-chart --set key1=value1,key2=value2

# aws marketplace ecr
helm install judge oci://709825985650.dkr.ecr.us-east-1.amazonaws.com/testifysec/judge-chart --version 0.2.0 \
    -f values.yaml \
    --set global.registry="709825985650.dkr.ecr.us-east-1.amazonaws.com" \
    --set global.repository="testifysec" \
    --set kratos.kratos.dsn="postgres://${PGUSER}:${PGPASSWORD//,/\\,}@${PGHOST}:${PGPORT}/kratos?max_conns=20&max_idle_conns=4" \
    --set kratos.kratos.config.selfservice.methods.oidc.config.providers[0].client_id="${GITLAB_OIDC_CLIENT_ID}" \
    --set kratos.kratos.config.selfservice.methods.oidc.config.providers[0].client_secret="${GITLAB_OIDC_CLIENT_SECRET}" \
    --set kratos.kratos.config.selfservice.methods.oidc.config.providers[1].client_id="${GITHUB_OIDC_CLIENT_ID}" \
    --set kratos.kratos.config.selfservice.methods.oidc.config.providers[1].client_secret="${GITHUB_OIDC_CLIENT_SECRET}" \
    --set dex.config.connectors[0].config.clientID="${GITLAB_OIDC_CLIENT_ID}" \
    --set dex.config.connectors[0].config.clientSecret="${GITLAB_OIDC_CLIENT_SECRET}" \
    --set judge-api.sqlStore.connectionString="postgres://${PGUSER}:${PGPASSWORD//,/\\,}@${PGHOST}:${PGPORT}/judge" \
    --set archivista.sqlStore.connectionString="postgres://${PGUSER}:${PGPASSWORD//,/\\,}@${PGHOST}:${PGPORT}/archivista" \
    --set judge-api.workflows.signer.kmsUri="awskms:///${WORKFLOWKEYARN}" \
    --set judge-api.workflows.slackIntegration.channelId="${SLACK_CHANNEL_ID}" \
    --set judge-api.workflows.slackIntegration.token="${SLACK_TOKEN}" \
    --set judge-api.dapr.pubsub.sqsQueueNameOverride="${QUEUE_NAME}" \
    --set judge-api.deployment.env[0].value="${TOPIC_NAME}" \
    --set archivista.deployment.env[0].value="${TOPIC_NAME}" \
    --wait

In this command:

  • judge is the name you're giving to the release.
  • us-east4-docker.pkg.dev/judge-395516/judge-image-registry/judge-chart is the location of the chart in the registry.
  • --set allows you to override specific values defined in the values.yaml file. You can specify multiple key-value pairs separated by commas.

Using a Separate YAML File

Alternatively, you can also use a separate YAML file to specify the custom values:

helm install judge us-east4-docker.pkg.dev/judge-395516/judge-image-registry/judge-chart -f values.yaml

In this case, values.yaml contains the custom values you want to override from the default values.yaml file of the chart. This can be very useful when you need to reconfigure many parts of JUDGE.

Configuration Knobs

Below is a table of all the configuration knobs available in JUDGE that you can override to customize your deployment:

ParameterDescriptionDefault
global.registryThe domain of a judge oci image registryus-east4-docker.pkg.dev
global.repositoryThe path of the oci image registryjudge-395516/judge-image-registry
web.replicaCountNumber of replicas1
web.image.registryThe domain of a judge oci image registryus-east4-docker.pkg.dev
web.image.repositoryjudge-web image repositoryjudge-395516/judge-image-registry
web.image.tagtag of the image[release or digest]
web.image.pullPolicyPull policy of the imageIfNotPresent
web.nameOverrideOverride name of app""
web.fullnameOverrideOverride full name of app""
web.serviceAccount.createSpecifies whether a service account should be createdtrue
web.serviceAccount.automountAutomatically mount a ServiceAccount's API credentials?true
web.serviceAccount.annotationsAnnotations to add to the service account{}
web.serviceAccount.nameThe name of the service account to use""
web.podAnnotationsPod annotations{}
web.podLabelsPod labels{}
web.podSecurityContextPod security context{}
web.securityContextSecurity context{}
web.service.typeThe type of service to createClusterIP
web.service.portPort of the service8077
web.ingress.enabledEnable or disable ingresstrue
web.ingress.classNameIngress class namenginx
web.ingress.annotationsIngress annotations{cert-manager.io/cluster-issuer: "tls-ca-issuer", kubernetes.io/ssl-redirect: "true", nginx.ingress.kubernetes.io/rewrite-target: "/"}
web.redirectIngress.enabledEnable or disable redirect ingresstrue
web.redirectIngress.classNameRedirect ingress class namenginx
web.redirectIngress.annotationsredirectIngress annotations{cert-manager.io/cluster-issuer: "tls-ca-issuer", kubernetes.io/ssl-redirect: "true", nginx.ingress.kubernetes.io/use-regex: "true", nginx.ingress.kubernetes.io/rewrite-target: "/$2"}
web.resourcesPod resource requests & limits{}
web.autoscaling.enabledEnables Kubernetes autoscalingfalse
web.autoscaling.minReplicasMinimum number of replicas1
web.autoscaling.maxReplicasMaximum number of replicas100
web.autoscaling.targetCPUUtilizationPercentageTarget CPU utilization percentage80
web.volumesAdditional volumes on the output Deployment definition[]
web.volumeMountsAdditional volumeMounts on the output Deployment definition[]
web.nodeSelectorNode labels for pod assignment{}
web.tolerationsTolerations for pod assignment[]
web.affinityMap of node/pod affinities{}
judge-api.replicaCountNumber of replicas1
judge-api.image.registryThe domain of a judge oci image registryus-east4-docker.pkg.dev
judge-api.image.repositoryJUDGE-API image repositoryjudge-395516/judge-image-registry
judge-api.image.pullPolicyPull policy of the imageIfNotPresent
judge-api.image.tagJUDGE-API image tag"[release or digest]"
judge-api.image.pullSecretsImage pull secrets- name: gcr-secret
judge-api.nameOverrideOverride name of app""
judge-api.fullnameOverrideOverride full name of app""
judge-api.serviceAccount.createSpecifies whether a service account should be createdfalse
judge-api.serviceAccount.annotationsAnnotations to add to the service account{}
judge-api.serviceAccount.nameThe name of the service account to use""
judge-api.podAnnotationsPod annotations{}
judge-api.podSecurityContextPod security context{}
judge-api.securityContextSecurity context{}
judge-api.deployment.envEnvironment variables for the deploymentKRATOS_PUBLIC_URL="kratos-public.default.svc.cluster.local", KRATOS_ADMIN_URL="kratos-admin.default.svc.cluster.local"
judge-api.dapr.pubsub.sqsQueueNameOverrideSQS queue name override""
judge-api.service.typeThe type of service to createClusterIP
judge-api.service.portPort of the service8080
judge-api.ingress.enabledEnable or disable ingresstrue
judge-api.ingress.classNameIngress class name"nginx"
judge-api.ingress.annotationsIngress annotations{}
judge-api.workflows.slackIntegration.channelIdSlack channel ID for workflows""
judge-api.workflows.slackIntegration.tokenSlack token for workflows""
judge-api.resourcesPod resource requests & limits{}
judge-api.autoscaling.enabledEnables autoscaling for Kubernetesfalse
judge-api.autoscaling.minReplicasMinimum number of replicas1
judge-api.autoscaling.maxReplicasMaximum number of replicas10
judge-api.autoscaling.targetCPUUtilizationPercentageTarget CPU utilization for autoscaling80
judge-api.nodeSelectorNode labels for pod assignment{}
judge-api.tolerationsTolerations for pod assignment[]
judge-api.affinityMap of node/pod affinities{}
archivista.replicaCountNumber of replicas for archivista1
archivista.image.registryThe domain of a judge oci image registryus-east4-docker.pkg.dev
archivista.image.repositoryArchivista image repositoryjudge-395516/judge-image-registry
archivista.image.tagArchivista image tag[release or digest]
archivista.image.pullPolicyPull policy for the imageIfNotPresent
archivista.nameOverrideOverride name of archivista app""
archivista.fullnameOverrideOverride full name of archivista app""
archivista.deployment.env.ARCHIVISTA_ENABLE_SPIFFESPIFFE enablement"False"
archivista.deployment.env.ARCHIVISTA_LISTEN_ONArchivista service listener addresstcp://0.0.0.0:8082
archivista.deployment.env.ARCHIVISTA_STORAGE_BACKENDSpecifies the storage backend used by ArchivistaBLOB
archivista.deployment.env.ARCHIVISTA_BLOB_STORE_USE_TLSIndicates if TLS is used for blob store access"False"
archivista.deployment.env.ARCHIVISTA_BLOB_STORE_ACCESS_KEY_IDAccess key ID for blob store"minio-user"
archivista.deployment.env.ARCHIVISTA_BLOB_STORE_SECRET_ACCESS_KEY_IDSecret key ID for blob store access"minio-password"
archivista.deployment.env.ARCHIVISTA_BLOB_STORE_BUCKET_NAMEBucket name in blob store"archivista"
archivista.deployment.env.ARCHIVISTA_BLOB_STORE_ENDPOINTBlob store endpointjudge-minio.default.svc.cluster.local:9000
archivista.deployment.env.ARCHIVISTA_ENABLE_GRAPHQLGraphQL enablement"true"
archivista.deployment.env.ARCHIVISTA_GRAPHQL_WEB_CLIENT_ENABLEGraphQL WebClient enablement"true"
archivista.deployment.env.ARCHIVISTA_CORS_ALLOW_ORIGINSAllowed CORS origins"*"
archivista.deployment.env.MYSQLPASSMySQL password"root"
archivista.deployment.env.ARCHIVISTA_SQL_STORE_CONNECTION_STRINGSQL store connection stringroot:root@tcp(judge-mysql.default.svc.cluster.local:3306)/archivista
archivista.serviceAccount.createSpecifies whether a service account should be createdfalse
archivista.serviceAccount.annotationsAnnotations to add to the service account{}
archivista.serviceAccount.nameThe name of the service account to use""
archivista.podAnnotationsPod annotations for archivista{}
archivista.podSecurityContextPod security context for archivista{}
archivista.securityContextSecurity context for archivista{}
archivista.deployment.envEnvironment variables for the deploymentSpecified list of environment variables
archivista.service.typeThe type of service for archivistaClusterIP
archivista.service.portPort of the service for archivista8082
archivista.ingress.enabledEnable or disable ingress for archivistatrue
archivista.ingress.classNameIngress class name for archivista""
archivista.ingress.annotationsIngress annotations for archivista{}
archivista.resourcesPod resource requests & limits for archivista{}
archivista.autoscaling.enabledEnables Kubernetes autoscaling for archivistafalse
archivista.autoscaling.minReplicasMinimum number of replicas for archivista1
archivista.autoscaling.maxReplicasMaximum number of replicas for archivista10
archivista.autoscaling.targetCPUUtilizationPercentageTarget CPU utilization for autoscaling80
archivista.nodeSelectorNode labels for pod assignment in archivista{}
archivista.tolerationsTolerations for pod assignment in archivista[]
archivista.affinityMap of node/pod affinities in archivista{}
dex.namespace.createSpecifies whether to create a namespace for Dexfalse
dex.namespace.nameName of the Dex namespacetsa-system
dex.replicaCountNumber of Dex server replicas1
dex.image.repositoryRepository for Dex server imageghcr.io/dexidp/dex
dex.image.pullPolicyPull policy for Dex server imageIfNotPresent
dex.image.tagTag of the Dex image""
dex.imagePullSecretsSecrets to pull the Dex image[]
dex.nameOverrideName override for Dex""
dex.fullnameOverrideFull name override for Dex""
dex.hostAliasesHost aliases for Dex pods[]
dex.https.enabledEnable HTTPS endpoint for Dexfalse
dex.grpc.enabledEnable gRPC endpoint for Dexfalse
dex.configSecret.createEnable creating a secret from values passed to configtrue
dex.configSecret.nameName of the secret to mount as configuration""
dex.configApplication configuration for Dex{}
dex.volumesAdditional volumes for Dex pods[]
dex.volumeMountsAdditional volume mounts for Dex pods[]
dex.envFromAdditional environment variables from secrets or config maps[]
dex.envAdditional environment variables for Dex containers{}
dex.envVarsAdditional environment variables with support for all possible configurations[]
dex.serviceAccount.createEnable service account creation for Dextrue
dex.serviceAccount.annotationsAnnotations to be added to the service account{}
dex.serviceAccount.nameName of the service account to use""
dex.rbac.createEnable RBAC resources creation for Dextrue
dex.rbac.createClusterScopedEnable creation of cluster-scoped RBAC resources for Dextrue
dex.deploymentAnnotationsAnnotations to be added to deployment{}
dex.deploymentLabelsLabels to be added to deployment{}
dex.podAnnotationsAnnotations to be added to pods{}
dex.podLabelsLabels to be added to pods{}
dex.podDisruptionBudget.enabledEnable pod disruption budget for Dexfalse
dex.podDisruptionBudget.minAvailableMinimum number of available pods for pod disruption budget{}
dex.podDisruptionBudget.maxUnavailableMaximum number of unavailable pods for pod disruption budget{}
dex.priorityClassNamePod priority class name for Dex""
dex.podSecurityContextPod security context for Dex{}
dex.revisionHistoryLimitNumber of deployment revisions to be kept for Dex10
dex.securityContextContainer security context for Dex containers{}
dex.service.annotationsAnnotations to be added to the service{}
dex.service.typeService type for DexClusterIP
dex.service.clusterIPInternal cluster service IP for Dex""
dex.service.ports.http.portHTTP service port for Dex5556
dex.service.ports.http.nodePortHTTP node port for Dex (if applicable)""
dex.service.ports.https.portHTTPS service port for Dex5554
dex.service.ports.https.nodePortHTTPS node port for Dex (if applicable)""
dex.service.ports.grpc.portgRPC service port for Dex5557
dex.service.ports.grpc.nodePortgRPC node port for Dex (if applicable)""
dex.ingress.enabledEnable ingress for Dexfalse
dex.ingress.classNameIngress class name for Dex""
dex.ingress.annotationsAnnotations to be added to the ingress{}
dex.ingress.hostsIngress host configuration for Dex[{ host: chart-example.local, paths: [{ path: /, pathType: ImplementationSpecific }] }]
dex.ingress.tlsIngress TLS configuration for Dex[]
dex.serviceMonitor.enabledEnable Prometheus ServiceMonitor for Dexfalse
dex.serviceMonitor.namespaceNamespace for ServiceMonitor resource""
dex.serviceMonitor.intervalPrometheus scrape interval for ServiceMonitor""
dex.serviceMonitor.scrapeTimeoutPrometheus scrape timeout for ServiceMonitor""
dex.serviceMonitor.labelsLabels to be added to ServiceMonitor{}
dex.serviceMonitor.annotationsAnnotations to be added to ServiceMonitor{}
dex.serviceMonitor.schemeHTTP scheme to use for scraping in ServiceMonitor""
fulcio.namespace.createWhether to create the Fulcio namespacefalse
fulcio.namespace.nameName of the Fulcio namespace if createdfulcio-system
fulcio.imagePullSecretsSecrets to pull the Fulcio image[]
fulcio.config.contentsContents of Fulcio configuration{}
fulcio.server.replicaCountNumber of replicas for Fulcio server1
fulcio.server.nameName of the Fulcio serverserver
fulcio.server.svcPortService port for Fulcio server80
fulcio.server.grpcSvcPortgRPC service port for Fulcio server5554
fulcio.server.secretSecret for Fulcio serverfulcio-server-secret
fulcio.server.logging.productionWhether production logging is enabled for Fulciofalse
fulcio.server.image.registryRegistry for Fulcio server imagegcr.io
fulcio.server.image.repositoryRepository for Fulcio server imageprojectsigstore/fulcio
fulcio.server.image.pullPolicyPull policy for Fulcio server imageIfNotPresent
fulcio.server.image.versionVersion/tag for Fulcio server imagesha256:d4e075bfaf0539a5220f3a76b80454261ecda443248fce283fd185d27e9910d4
fulcio.server.args.portPort for Fulcio server5555
fulcio.server.args.grpcPortgRPC port for Fulcio server5554
fulcio.server.args.certificateAuthorityCertificate authority for Fulcio serverfileca
fulcio.server.args.hsm_caroot_idHSM CA root ID for Fulcio server
fulcio.server.args.aws_hsm_root_ca_pathAWS HSM root CA path for Fulcio server
fulcio.server.args.gcp_private_ca_parentGCP private CA parent for Fulcio serverprojects/test/locations/us-east1/caPools/test
fulcio.server.args.ct_log_urlURL for CT log for Fulcio server
fulcio.server.args.disable_ct_logWhether CT log is disabled for Fulcio serverfalse
fulcio.server.serviceAccount.createWhether to create a service account for Fulcio servertrue
fulcio.server.serviceAccount.nameName of the service account for Fulcio server
fulcio.server.serviceAccount.annotationsAnnotations for the Fulcio server service account{}
fulcio.server.serviceAccount.mountTokenWhether to mount token for Fulcio server service accounttrue
fulcio.server.service.typeService type for Fulcio serverClusterIP
fulcio.server.service.portsPorts for Fulcio server servicehttp: 80, grpc: 5554, 2112-tcp: 2112
fulcio.server.ingress.http.enabledWhether HTTP ingress is enabled for Fulcio servertrue
fulcio.server.ingress.http.classNameIngress class for HTTP for Fulcio server"nginx"
fulcio.server.ingress.http.annotationsAnnotations for HTTP ingress for Fulcio server{}
fulcio.server.ingress.http.hostsHosts for HTTP ingress for Fulcio server[{path: "/", host: "fulcio.localhost"}]
fulcio.server.ingress.http.tlsTLS configuration for HTTP ingress for Fulcio server[]
fulcio.server.ingress.grpc.enabledWhether gRPC ingress is enabled for Fulcio serverfalse
fulcio.server.ingress.grpc.classNameIngress class for gRPC for Fulcio server
fulcio.server.ingress.grpc.annotationsAnnotations for gRPC ingress for Fulcio server{nginx.ingress.kubernetes.io/backend-protocol: "GRPC"}
fulcio.server.ingress.grpc.hostsHosts for gRPC ingress for Fulcio server[{host: fulcio.localhost, path: /dev.sigstore.fulcio.v2.CA}]
fulcio.server.ingress.grpc.tlsTLS configuration for gRPC ingress for Fulcio server[{secretName: fulcio-grpc-ingress-tls, hosts: [fulcio.localhost]}]
fulcio.server.ingressesList of additional ingresses for Fulcio server[{enabled: false, grpc: true, http: true, name: "gce-ingress", className: "gce", ...}]
fulcio.server.securityContext.runAsNonRootWhether to run Fulcio server as non-roottrue
fulcio.server.securityContext.runAsUserUser ID for running Fulcio server65533
fulcio.createcerts.enabledWhether to enable creation of certificatestrue
fulcio.createcerts.replicaCountNumber of replicas for certificate creation1
fulcio.createcerts.nameName of the certificate creation componentcreatecerts
fulcio.createcerts.image.registryRegistry for certificate creation imageghcr.io
fulcio.createcerts.image.repositoryRepository for certificate creation imagesigstore/scaffolding/createcerts
fulcio.createcerts.image.pullPolicyPull policy for certificate creation imageIfNotPresent
fulcio.createcerts.image.versionVersion/tag for certificate creation imagesha256:2aaea38198d25ee53fb1f6da79eaa75c24bcc4ef81792a68687ba2ae0dc8ccf6
fulcio.createcerts.ttlSecondsAfterFinishedTime to live for the job after completion
kratos.replicaCountNumber of replicas in deployment1
kratos.strategy.typeDeployment update strategy typeRollingUpdate
kratos.strategy.rollingUpdate.maxSurgeThe max surge for rolling update25%
kratos.strategy.rollingUpdate.maxUnavailableThe max unavailable for rolling update25%
kratos.image.repositoryORY KRATOS image repositoryghcr.io/testifysec/kratos
kratos.image.tagORY KRATOS version tagv1.0.0-token-update
kratos.image.pullPolicyImage pull policyIfNotPresent
kratos.imagePullSecretsSpecify docker-registry secret names as an array[]
kratos.nameOverrideString to partially override kratos.fullname template with a string``
kratos.fullnameOverrideString to fully override kratos.fullname template with a string"kratos"
kratos.service.admin.enabledEnable admin servicetrue
kratos.service.admin.typeAdmin service typeClusterIP
kratos.service.admin.portAdmin service port80
kratos.service.admin.nameAdmin service port namehttp
kratos.service.admin.metricsPathPath to the admin metrics endpoint/admin/metrics/prometheus
kratos.service.public.enabledEnable public servicetrue
kratos.service.public.typePublic service typeClusterIP
kratos.service.public.portPublic service port80
kratos.service.public.namePublic service port namehttp
kratos.ingress.public.enabledEnable public ingresstrue
kratos.ingress.public.classNamePublic ingress class namenginx
kratos.ingress.public.hosts[0].hostHost for public ingresskratos.testifysec.localhost
kratos.ingress.public.hosts[0].paths[0].pathPath for public ingress/
kratos.ingress.public.tls[0].secretNameTLS secret name for public ingresskratos-tls-secret
kratos.kratos.developmentEnable development mode for Kratosfalse
kratos.kratos.dsnDSN for connecting to the databasemysql://root:root@tcp(judge-mysql.default.svc.cluster.local:3306)/kratos
kratos.kratos.config.serve.admin.portPort for Kratos admin service4433
kratos.kratos.config.serve.public.portPort for Kratos public service4434
kratos.kratos.config.serve.public.base_urlBase URL for the public servicehttps://kratos.testifysec.localhost
kratos.kratos.config.log.levelLog leveldebug
kratos.kratos.config.selfservice.flows.login.ui_urlUI URL for the login flowhttps://login.testifysec.localhost/login
kratos.kratos.config.methods.password.enabledEnable password method for authenticationfalse
kratos.kratos.config.methods.oidc.enabledEnable OpenID Connect method for authenticationtrue
kratos.kratos.secretsSecrets used by Kratos{}
kratos.kratos.config.serve.admin.portThe port for the Kratos admin service4433
kratos.kratos.config.serve.public.portThe port for the Kratos public service4434
kratos.kratos.config.serve.public.base_urlThe base URL to access the public servicehttps://kratos.testifysec.localhost
kratos.kratos.config.serve.public.cors.enabledEnable CORS supporttrue
kratos.kratos.config.serve.public.cors.allowed_originsOrigins allowed to perform CORS requests[ "https://*.testifysec.localhost:8077" ]
kratos.kratos.config.serve.public.cors.allowed_methodsHTTP methods allowed for CORS requests[ "POST", "GET", "PUT", "PATCH", "DELETE" ]
kratos.kratos.config.serve.public.cors.allowed_headersHeaders that can be used when making a request[ "Authorization", "Cookie", "Content-Type" ]
kratos.kratos.config.serve.public.cors.exposed_headersHeaders that are safe to expose to the API of a CORS API specification[ "Content-Type", "Set-Cookie" ]
kratos.kratos.config.log.levelThe log level (e.g., info, warn, debug)debug
kratos.kratos.config.log.formatThe log format (e.g., json)json
kratos.kratos.config.log.leak_sensitive_valuesOption to leak sensitive values in the logstrue
kratos.kratos.config.selfservice.flows.login.ui_urlThe user interface URL for the login pagehttps://login.testifysec.localhost/login
kratos.kratos.config.selfservice.flows.error.ui_urlThe user interface URL for the error pagehttps://login.testifysec.localhost/error
kratos.kratos.config.selfservice.flows.settings.ui_urlThe user interface URL for the settings pagehttp://login.testifysec.localhost/settings
kratos.kratos.config.selfservice.flows.recovery.enabledEnable the recovery flowtrue
kratos.kratos.config.selfservice.flows.recovery.ui_urlThe user interface URL for the recovery pagehttps://login.testifysec.localhost/recovery
kratos.kratos.config.selfservice.flows.verification.enabledEnable the verification flowtrue
kratos.kratos.config.selfservice.flows.verification.ui_urlThe user interface URL for the verification pagehttps://login.testifysec.localhost/verification
kratos.kratos.config.selfservice.flows.registration.ui_urlThe user interface URL for the registration pagehttps://login.testifysec.localhost/registration
kratos.kratos.config.selfservice.flows.logout.after.default_browser_return_urlDefault return URL after logouthttps://login.testifysec.localhost/login
kratos.kratos.config.selfservice.methods.password.enabledEnable password authentication methodfalse
kratos.kratos.config.selfservice.methods.oidc.enabledEnable OIDC authentication methodtrue
kratos.kratos.config.identity.default_schema_idThe default identity schema IDdefault
kratos.kratos.config.courier.smtp.connection_uriSMTP connection URI for sending emailssmtps://dummy
kratos.kratos.config.cookies.domainThe domain scope for cookiestestifysec.localhost
kratos.kratos.config.cookies.pathThe path scope for cookies/
kratos.kratos.config.cookies.same_siteSameSite attribute for cookiesLax
kratos.kratos.config.selfservice.methods.oidc.config.providers[].idIdentifier for the authentication providergitlab
kratos.kratos.config.selfservice.methods.oidc.config.providers[].providerThe name of the identity providergitlab
kratos.kratos.config.selfservice.methods.oidc.config.providers[].client_idThe client ID obtained from GitLab for OIDC authenticationYOUR_GITLAB_CLIENT_ID
kratos.kratos.config.selfservice.methods.oidc.config.providers[].client_secretThe client secret obtained from GitLabYOUR_GITLAB_CLIENT_SECRET
kratos.kratos.config.selfservice.methods.oidc.config.providers[].issuer_urlThe issuer URL for GitLab's OIDC endpointhttps://gitlab.com
kratos.kratos.config.selfservice.methods.oidc.config.providers[].scopeScopes requested from GitLab during authentication[ "openid", "profile", "email" ]
kratos.kratos.config.selfservice.methods.oidc.config.providers[].mapper_urlURL to the Jsonnet file for mapping GitLab user info to Kratos identitiesfile:///etc/config/kratos/gitlab.jsonnet
minio.replicaCountNumber of Minio replicas1
minio.image.registryThe domain of the Minio OCI image registryquay.io
minio.image.repositoryMinio image repositoryminio/minio
minio.image.tagTag of the Minio imagelatest
minio.initMinioBucket.enabledSpecifies if Minio bucket initialization is enabledtrue
minio.mc.nameOverrideSpecified the mc image name override""
minio.service.typeService type for MinioClusterIP
minio.service.portPort for Minio service9000
minio.ingress.enabledSpecifies if Ingress is enabled for Miniofalse
minio.ingress.hosts[0].hostHostname for Minio Ingressminio.testifysec.local
minio.resourcesResources for Minio Deployment{} (unspecified, user-defined)
minio.autoscaling.enabledSpecifies if autoscaling is enabled for Miniofalse
minio.autoscaling.minReplicasMinimum replicas for autoscaling1
minio.autoscaling.maxReplicasMaximum replicas for autoscaling100
minio.autoscaling.targetCPUUtilizationPercentageTarget CPU utilization percentage for autoscaling80
minio.volumesAdditional volumes for Minio Deployment- name: archivista emptyDir: {} (unspecified, user-defined)
minio.volumeMountsAdditional volume mounts for Minio Deployment- name: archivista mountPath: "/data" readOnly: false (unspecified, user-defined)
minio.nodeSelectorNode selector for Minio pods{} (unspecified, user-defined)
minio.tolerationsTolerations for Minio pods[] (unspecified, user-defined)
minio.affinityAffinity settings for Minio pods{} (unspecified, user-defined)
minio.selectorLabels.appSelector labels for Minio podsapp: minio (unspecified, user-defined)
mysql.mysqlRootPasswordRoot password for MySQL"root"
mysql.image.tagTag of the MySQL imagelatest
mysql.imagePullSecretsSecrets to pull the MySQL image[]
tsa.namespace.createSpecifies whether to create a namespace for TSAfalse
tsa.namespace.nameName of the TSA namespacetsa-system
tsa.server.replicaCountNumber of TSA server replicas1
tsa.server.nameName of the TSA serverserver
tsa.server.svcPortService port for TSA80
tsa.server.grpcSvcPortgRPC service port for TSA5554
tsa.server.secretSecret for TSA servertsa-server-secret
tsa.server.logging.productionSpecifies production logging for TSA serverfalse
tsa.server.env.GOOGLE_APPLICATION_CREDENTIALSGoogle Application Credentials for TSA server/etc/tsa-config/cloud_credentials
tsa.server.image.registryRegistry for TSA server imageghcr.io
tsa.server.image.repositoryRepository for TSA server imagesigstore/timestamp-server
tsa.server.image.pullPolicyPull policy for TSA server imageIfNotPresent
tsa.server.image.versionVersion of TSA server imagesha256:f4dcc96092a1b1fb5ca36d776f92a7cc62cdb1a8866c5120340f919141a3cd58
tsa.server.args.portPort for TSA server5555
tsa.server.args.signerSigner type for TSA servertink
tsa.server.args.cert_chainPEM encoded cert chain for TSA serverchain
tsa.server.args.tink_enc_keysetTink encryption keyset for TSA serverkeyset
tsa.server.args.tink_key_resourceTink key resource for TSA serverresource
tsa.server.args.tink_hcvault_tokenTink Hashicorp Vault token for TSA servertoken
tsa.server.args.kms_key_resourceKMS key resource for TSA serverresource
tsa.server.serviceAccount.createSpecifies whether to create a service account for TSA servertrue
tsa.server.serviceAccount.nameName of the service account for TSA server"" (empty, unspecified)
tsa.server.serviceAccount.annotationsAnnotations for the service account for TSA server{}
tsa.server.serviceAccount.mountTokenSpecifies whether to mount a token for TSA servertrue
tsa.server.service.typeService type for TSA serverClusterIP
tsa.server.service.portsPorts for TSA server serviceSee below
tsa.server.ingress.http.enabledSpecifies whether HTTP ingress is enabled for TSA servertrue
tsa.server.ingress.http.classNameIngress class for HTTP ingress of TSA server"nginx"
tsa.server.ingress.http.annotationsAnnotations for HTTP ingress of TSA server{}
tsa.server.ingress.http.hostsHosts for HTTP ingress of TSA serverSee below
tsa.server.ingress.http.tlsTLS configuration for HTTP ingress of TSA server[]
tsa.server.securityContext.runAsNonRootSpecifies whether to run TSA server as non-roottrue
tsa.server.securityContext.runAsUserUser ID to run TSA server as65533
tsa.forceNamespaceForce namespace for namespaced resources"" (empty, unspecified)

You can override these values either directly using --set during installation or by specifying them in a separate YAML file with -f. Adjust these values according to your deployment requirements to optimize the behavior of JUDGE as per your needs.