PhariaAI Helm Chart

Version: 1.251100.1

This document provides an overview of the chart dependencies and configurable Helm chart values for PhariaAI. It covers global configurations, detailed dependency settings, image pull credentials, PostgreSQL settings, and resource management options, offering a comprehensive guide for deploying and customizing PhariaAI.

Requirements

Repository Name Version
oci://alephalpha.jfrog.io/helm/assistant pharia-assistant 0.28.3
oci://alephalpha.jfrog.io/helm/assistant pharia-assistant-api 0.43.0
oci://alephalpha.jfrog.io/helm/assistant pharia-chat 0.42.6
oci://alephalpha.jfrog.io/helm/assistant pharia-translation-service 0.23.3
oci://alephalpha.jfrog.io/helm creance 0.1.41
oci://alephalpha.jfrog.io/helm document-index 0.28.11
oci://alephalpha.jfrog.io/helm pharia-document-index-mcp(document-index-mcp) 0.8.12
oci://alephalpha.jfrog.io/helm inference-api 0.15.111
oci://alephalpha.jfrog.io/helm inference-api-proxy 0.5.38
oci://alephalpha.jfrog.io/helm inference-worker 0.22.18
oci://alephalpha.jfrog.io/helm mcp-code-sandbox 0.9.5
oci://alephalpha.jfrog.io/helm mcp-firecrawl 0.11.7
oci://alephalpha.jfrog.io/helm/pharia-catch pharia-catch-api 0.0.118
oci://alephalpha.jfrog.io/helm/pharia-catch pharia-catch-ui 0.0.71
oci://alephalpha.jfrog.io/helm pharia-common 0.2.50
oci://alephalpha.jfrog.io/helm pharia-conductor 0.7.12
oci://alephalpha.jfrog.io/helm pharia-data-api 0.67.2
oci://alephalpha.jfrog.io/helm pharia-finetuning 0.7.33
oci://alephalpha.jfrog.io/helm pharia-iam 0.14.110
oci://alephalpha.jfrog.io/helm pharia-kernel 0.3.21
oci://alephalpha.jfrog.io/helm pharia-numinous 0.52.0
oci://alephalpha.jfrog.io/helm pharia-oauth-gateway 1.4.2
oci://alephalpha.jfrog.io/helm pharia-reloader 0.1.6
oci://alephalpha.jfrog.io/helm/pharia-studio pharia-studio-api 0.17.61
oci://alephalpha.jfrog.io/helm/pharia-studio pharia-studio-ui 0.15.79
oci://alephalpha.jfrog.io/helm pharia-temporal 0.1.7
oci://alephalpha.jfrog.io/helm pharia-transcribe 0.3.5
oci://alephalpha.jfrog.io/helm pharia-translate 0.5.5
oci://alephalpha.jfrog.io/helm/phariaos feature-flags 0.10.1
oci://alephalpha.jfrog.io/helm/phariaos phariaos-manager 0.55.8
oci://alephalpha.jfrog.io/helm/phariaos phariaos-ui 0.64.19

Values

Global

Key Type Default Description
global.imagePullOpaqueSecretName string `"aleph-alpha-oci-registry-opaque"` Default PhariaAI Secret name as an Opaque secret. Override name for existing image pull secret if required
global.imagePullSecretName string `"aleph-alpha-oci-registry"` Default PhariaAI Secret name to pull images from Aleph Alpha artifactory. Override name for existing image pull secret if required
global.inference.enabled bool `true` Activate deployment of Pharia AA inference stack (inference-api, inference-worker)
global.inferenceApiServicesSecretRef string `"inference-api-services"` Secret to be used to authenticate inference api services. See `inferenceApiServices` for more info.
global.ingress object `{"additionalAnnotations":{},"ingressClassName":"nginx","ingressDomain":"pharia-ai.local"}` Global config for all ingress resources
global.ingress.ingressClassName string `"nginx"` The ingressClassName globally defined for all ingress resources ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#the-ingress-resource Override possible on sub-chart level: .ingress.ingressClassName overrides global.ingress.ingressClassName
global.ingress.ingressDomain string `"pharia-ai.local"` Domain for external access / ingress to services via . Override possible on sub-chart level: .ingress.ingressDomain overrides global.ingress.ingressDomain
global.openTelemetry object `{"enabled":false,"environment":"","grpcEndpoint":"http://opentelemetry-collector.tracing:4317","httpEndpoint":"http://opentelemetry-collector.tracing:4318","sampler":"always_on","samplingRatio":"1.0"}` Global OpenTelemetry configuration that applies to all services
global.openTelemetry.enabled bool `false` Enable OpenTelemetry tracing for all services
global.openTelemetry.environment string `""` Deployment environment for service identification and tracing This field is REQUIRED - deployment will fail if not specified Used for service.environment resource attribute and as default for X-Scope-OrgID header
global.openTelemetry.grpcEndpoint string `"http://opentelemetry-collector.tracing:4317"` OpenTelemetry collector endpoint for gRPC (OTLP/gRPC) Example: "http://opentelemetry-collector.tracing:4317" Services that use gRPC: inference-api, inference-worker, most backend services
global.openTelemetry.httpEndpoint string `"http://opentelemetry-collector.tracing:4318"` OpenTelemetry collector endpoint for HTTP (OTLP/HTTP) Example: "http://opentelemetry-collector.tracing:4318" Services that use HTTP: frontend applications, some lightweight services
global.openTelemetry.sampler string `"always_on"` OpenTelemetry sampler type Options: "always_on", "always_off", "traceidratio", "parentbased_traceidratio" - always_on: Sample all traces (100%) - always_off: Sample no traces (0%) - traceidratio: Sample based on samplingRatio (consistent across services)
global.openTelemetry.samplingRatio string `"1.0"` OpenTelemetry sampling ratio (0.0 to 1.0) Only used when sampler is "traceidratio" or "parentbased_traceidratio" 0.0 = no sampling, 1.0 = sample all traces
global.permissionModel object `{"AssistantUser":[{"permission":"ExecuteJobs"},{"permission":"ExecuteTextJobs"},{"permission":"KernelAccess"},{"model":null,"permission":"AccessModel"},{"namespace":"Assistant","permission":"AccessNamespace"},{"permission":"AccessDataPlatform"},{"permission":"AccessAssistant"},{"permission":"OsReadUsecase"},{"permission":"AccessSearchStore"},{"permission":"ReadUser"},{"permission":"ReadGroup"}],"CatchAdminUser":[{"permission":"CatchAccess"},{"permission":"CatchAdminAccess"},{"permission":"ReadUser"}],"CatchUser":[{"permission":"CatchAccess"},{"permission":"ReadUser"}],"ChatServiceUser":[{"permission":"ExecuteJobs"},{"permission":"ExecuteTextJobs"},{"permission":"KernelAccess"},{"model":null,"permission":"AccessModel"},{"namespace":"Assistant","permission":"AccessNamespace"},{"permission":"AccessDataPlatform"},{"permission":"AccessAssistant"},{"permission":"OsReadUsecase"},{"permission":"OsReadConfigurations"}],"Client":[{"permission":"ExecuteJobs"},{"model":null,"permission":"AccessModel"}],"DocumentIndexServiceUser":[{"permission":"OwnsResource","resource":"document_index_namespace"}],"EtlServiceUser":[{"namespace":"Studio","permission":"AccessNamespace"},{"namespace":"Assistant","permission":"AccessNamespace"},{"permission":"AccessDataPlatform"},{"permission":"ImportProjectRepositoryRelation"},{"permission":"OwnsResource","resource":"stage"},{"permission":"OwnsResource","resource":"file"},{"permission":"OwnsResource","resource":"search_store"},{"permission":"AccessSearchStore"}],"FinetuningServiceUser":[{"permission":"ImportProjectRepositoryRelation"}],"InferenceAdminUser":[{"permission":"AdministrateSystem"},{"permission":"ExecuteJobs"},{"permission":"ExecuteTextJobs"},{"permission":"CreateSteeringConcepts"},{"permission":"ReadSteeringConcepts"},{"permission":"DeleteSteeringConcepts"},{"model":null,"permission":"AccessModel"}],"InferenceServiceUser":[{"permission":"ExecuteJobs"},{"permission":"ExecuteTextJobs"},{"permission":"CreateSteeringConcepts"},{"permission":"ReadSteeringConcepts"},{"permission":"DeleteSteeringConcepts"},{"model":null,"permission":"AccessModel"}],"OAuthGatewayConnectionsServiceUser":[{"permission":"OAuthGatewayConnectionAdmin"}],"OAuthGatewayIntegrationsServiceUser":[{"permission":"OAuthGatewayIntegrationWrite"}],"OsServiceUser":[{"permission":"OwnsResource","resource":"application"},{"permission":"OwnsResource","resource":"project"},{"permission":"OwnsResource","resource":"stage"},{"permission":"ProjectAccess"}],"OsUser":[{"permission":"OsReadUsecase"},{"permission":"OsWriteUsecase"},{"permission":"OsReadHardware"},{"permission":"OsReadModels"},{"permission":"OsWriteModels"},{"permission":"ReadGroup"},{"permission":"KernelAccess"}],"StudioServiceUser":[{"permission":"ExecuteJobs"},{"permission":"KernelAccess"},{"model":null,"permission":"AccessModel"},{"namespace":"Studio","permission":"AccessNamespace"},{"permission":"AccessDataPlatform"},{"permission":"AccessStudio"},{"permission":"AccessFinetuning"},{"permission":"OsReadUsecase"},{"permission":"OsWriteUsecase"},{"permission":"ProjectAccess"},{"permission":"ReadUser"},{"permission":"ReadGroup"},{"permission":"OwnsResource","resource":"project"},{"permission":"OwnsResource","resource":"application"}],"StudioUser":[{"permission":"ExecuteJobs"},{"permission":"KernelAccess"},{"model":null,"permission":"AccessModel"},{"namespace":"Studio","permission":"AccessNamespace"},{"permission":"AccessDataPlatform"},{"permission":"AccessStudio"},{"permission":"AccessFinetuning"},{"permission":"OsReadUsecase"},{"permission":"OsWriteUsecase"},{"permission":"OsReadModels"},{"permission":"OsWriteModels"},{"permission":"ProjectAccess"},{"permission":"ReadUser"},{"permission":"ReadGroup"},{"permission":"AccessSearchStore"}],"UseCaseServiceUser":[{"permission":"ExecuteJobs"},{"model":null,"permission":"AccessModel"},{"namespace":"Studio","permission":"AccessNamespace"},{"namespace":"Assistant","permission":"AccessNamespace"},{"permission":"KernelAccess"}]}` Permission model (Roles to Permissions) used in the PhariaAI stack
global.permissionSchemaConfigMapName string `"pharia-ai-permissions"` Default PhariaAI Config Map for setting permission model
global.phariaAIConfigMap string `"pharia-ai-config"` Default PhariaAI ConfigMap for setting environment variables
global.phariaAiEdition string `""` Default PhariaAI edition <-- Will be dropped soon once we have coordinated with all customers @schema type: string minLength: 1 @schema
global.phariaAiEnvironment string `"on-premise"` Default PhariaAI environment
global.phariaAiFeatureSet string `"251100"` Default PhariaAI feature set
global.phariaAiInfraId string `"pharia-01"` PhariaAI infrastructure ID. This is used to identify the infrastructure in the PhariaAI system.
global.phariaAiInfraName string `"pharia-ai"` PhariaAI infrastructure name. This is used to identify the infrastructure in the PhariaAI system.
global.searchStoresEnabled bool `true` Enable search stores functionality

General

Key Type Default Description
apiGateway object `{"ingress":{"annotations":{},"enabled":true,"hostname":"api","tls":{"enabled":true,"secretName":"pharia-api-gateway-tls"}}}` Ingress configuration for API Gateway
apiGateway.ingress.annotations object `{}` Annotations for the ingress-resource. This can be used to add ingress controller specific annotations.
apiGateway.ingress.enabled bool `true` Enabled ingress creation
apiGateway.ingress.hostname string `"api"` Hostname for the Ingress (without domain). The domain is read from `global.ingressDomain`. This needs to be changed, if multiple instances are deployed to the same cluster using the same domain
apiGateway.ingress.tls object `{"enabled":true,"secretName":"pharia-api-gateway-tls"}` Configure TLS for this Ingress
apiGateway.ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
apiGateway.ingress.tls.secretName string `"pharia-api-gateway-tls"` The name of the secret containing the TLS certificate. See also: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
imagePullCredentials.password string `""` Password to login into artifactory registry
imagePullCredentials.registry string `"alephalpha.jfrog.io"` Aleph Alpha artifactory registry
imagePullCredentials.username string `""` Username to login into artifactory registry
pharia-document-index-mcp.enabled bool `true`
pharia-document-index-mcp.fullnameOverride string `"pharia-document-index-mcp"`
pharia-document-index-mcp.ingress.enabled bool `false`

Sub charts

pharia-assistant

Key Type Default Description
pharia-assistant-api.databaseConfig.external object `{"existingSecret":""}` Provide an existing database if you want to use an external database
pharia-assistant-api.databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
pharia-assistant-api.databaseConfig.secretKeys.databaseNameKey string `"databaseName"` The key in the secret that contains the database name
pharia-assistant-api.databaseConfig.secretKeys.hostKey string `"host"` The key in the secret that contains the host of the database
pharia-assistant-api.databaseConfig.secretKeys.passwordKey string `"password"` The key in the secret that contains the password of the database
pharia-assistant-api.databaseConfig.secretKeys.portKey string `"port"` The key in the secret that contains the port of the database
pharia-assistant-api.databaseConfig.secretKeys.userKey string `"user"` The key in the secret that contains the user of the database
pharia-assistant-api.enabled bool `true` Set this to true to install the pharia-assistant-api subchart as a dependency
pharia-assistant-api.env.APPLICATION_NAME string `"PhariaAssistant"` Name of the application to be displayed in the frontend's top bar @schema deprecated: true type: string minLength: 1 @schema
pharia-assistant-api.env.DOCUMENT_INDEX_FILE_UPLOAD_NAMESPACE string `"Assistant"` DEPRECATED: Use pharia-chat.env.values.PHARIA_CHAT_DOCUMENT_INDEX_FILE_UPLOAD_NAMESPACE instead @schema deprecated: true type: string minLength: 1 @schema
pharia-assistant-api.env.GENERATE_MODEL_NAME string `"llama-3.3-70b-instruct"` Model name for generate feature @schema enum: ["llama-3.1-8b-instruct", "llama-3.1-70b-instruct", "llama-3.3-70b-instruct"] @schema
pharia-assistant-api.env.MAX_FILE_UPLOAD_SIZE_MB float `20` Frontend maximum file upload size in MB @schema type: number exclusiveMinimum: 0 @schema
pharia-assistant-api.env.PERSIST_TRACES bool `true` Enable/disable persisting traces in the Assistant's database @schema type: boolean @schema
pharia-assistant-api.env.QA_MODEL_NAME string `"llama-3.3-70b-instruct"` Model used for generating Agents @schema deprecated: true enum: ["llama-3.1-8b-instruct", "llama-3.1-70b-instruct", "llama-3.3-70b-instruct"] @schema
pharia-assistant-api.env.REQUEST_TIMEOUT_IN_SECONDS int `180` Frontend request timeout in seconds @schema type: integer minimum: 1 @schema
pharia-assistant-api.env.SUMMARY_MODEL_NAME string `"llama-3.3-70b-instruct"` Model name for summarization subtasks in chat and NLS features @schema enum: ["llama-3.1-8b-instruct", "llama-3.1-70b-instruct", "llama-3.3-70b-instruct"] @schema
pharia-assistant-api.env.TRANSLATE_MODEL_NAME string `"pharia-1-mt-translation"` Model name for translation feature @schema enum: ["pharia-1-mt-translation"] @schema
pharia-assistant-api.env.TRANSLATION_CACHE_MAX_SIZE int `10000` Maximum size for the translation cache @schema type: integer minimum: 1 @schema
pharia-assistant-api.env.TRANSLATION_CACHE_TTL int `3600` Time-to-live for the translation cache in seconds @schema type: integer minimum: 1 @schema
pharia-assistant-api.favicon object `{"png":"","svg":"PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIGhlaWdodD0iNzgiIHdpZHRoPSI3OCIgdmlld0JveD0iMjQgMjQgMTAyIDEwMiI+CiAgPHJlY3Qgd2lkdGg9IjIwMCIgaGVpZ2h0PSIyMDAiIGZpbGw9IndoaXRlIiAvPgogIDxwYXRoIGQ9Im0zNC42NyAxMDYuNDMtNS41NS0xMy41NUExOS4xNCAxOS4xNCAwIDAgMCAyOSA1Ny40Mmw1LjQ3LTEzLjU5YTMzLjc4IDMzLjc4IDAgMCAxIC4yIDYyLjZabTIyLjkzIDE3LjEyLTguNjgtMTEuOGE0NS4yOCA0NS4yOCAwIDAgMCA4LjYxLTguMjdMNjkgMTEyLjYyYTU5LjgyIDU5LjgyIDAgMCAxLTExLjQgMTAuOTNaIiAvPgogIDxwYXRoIGQ9Ik04Mi4yMyA3NS4xN2E2MC4zNyA2MC4zNyAwIDAgMC0yNC42NC00OC4zOWwtOC42OCAxMS44MWE0NS42MyA0NS42MyAwIDAgMSAxOC42OCAzNi41OCA2MC4yOCA2MC4yOCAwIDAgMCAyNC40OCA0OC4zOGw4LjY4LTExLjhhNDUuNiA0NS42IDAgMCAxLTE4LjUyLTM2LjU4Wm05Ljg1LTI4LjIzLTExLjQ3LTkuMTJhNjAuMTQgNjAuMTQgMCAwIDEgMTEuOTQtMTEuMzdsOC41NiAxMS44OGE0NS41IDQ1LjUgMCAwIDAtOS4wMyA4LjYxWk0xMTUgMTA2LjUyYTM0LjMyIDM0LjMyIDAgMCAxLS4yOS02Mi41Mmw2LjEgMTMuMzJhMTkuNjggMTkuNjggMCAwIDAgLjE5IDM1LjgzWiIgLz4KPC9zdmc+Cg=="}` The favicon used in the Assistant frontend can be customized by providing the contents of a logo.svg or logo.png file as a base64 encoded string. This can be created by executing `cat favicon.svg \| base64` in a terminal. The svg value takes precedence over the png value. @schema deprecated: true type: object anyOf: - required: - svg properties: svg: type: string minLength: 1 - required: - png properties: png: type: string minLength: 1 @schema
pharia-assistant-api.favicon.png string `""` The base64 encoded favicon.png
pharia-assistant-api.favicon.svg string `"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"` The base64 encoded favicon.svg
pharia-assistant-api.featureFlags object `{"enableAutoSidebarResize":false,"enableChat":true,"enableCollections":true,"enableExtensibleGenerate":true,"enableExtensibleSummarize":true,"enableHomepage":true,"enableNls":true,"enablePersonalAgents":true,"enableTranslate":true}` Feature flags for pharia-assistant-api
pharia-assistant-api.featureFlags.enableAutoSidebarResize bool `false` Enable automatic sidebar resizing @schema type: boolean @schema
pharia-assistant-api.featureFlags.enableChat bool `true` Enable inbuilt chat feature @schema type: boolean @schema
pharia-assistant-api.featureFlags.enableCollections bool `true` Enable collections @schema type: boolean @schema
pharia-assistant-api.featureFlags.enableExtensibleGenerate bool `true` Enable extensible generate feature @schema type: boolean @schema
pharia-assistant-api.featureFlags.enableExtensibleSummarize bool `true` Enable extensible summarize feature @schema type: boolean @schema
pharia-assistant-api.featureFlags.enableHomepage bool `true` Enable homepage @schema type: boolean @schema
pharia-assistant-api.featureFlags.enableNls bool `true` Enable NLS feature @schema type: boolean @schema
pharia-assistant-api.featureFlags.enablePersonalAgents bool `true` Enable personal agents @schema type: boolean @schema
pharia-assistant-api.featureFlags.enableTranslate bool `true` Enable inbuilt translate feature @schema type: boolean @schema
pharia-assistant-api.fullnameOverride string `"pharia-assistant-api"` Override for the full name of pharia-assistant-api
pharia-assistant-api.logo object `{"png":"","svg":"PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIGhlaWdodD0iNzgiIHdpZHRoPSI3OCIgdmlld0JveD0iMjQgMjQgMTAyIDEwMiI+CiAgPHJlY3Qgd2lkdGg9IjIwMCIgaGVpZ2h0PSIyMDAiIGZpbGw9IndoaXRlIiAvPgogIDxwYXRoIGQ9Im0zNC42NyAxMDYuNDMtNS41NS0xMy41NUExOS4xNCAxOS4xNCAwIDAgMCAyOSA1Ny40Mmw1LjQ3LTEzLjU5YTMzLjc4IDMzLjc4IDAgMCAxIC4yIDYyLjZabTIyLjkzIDE3LjEyLTguNjgtMTEuOGE0NS4yOCA0NS4yOCAwIDAgMCA4LjYxLTguMjdMNjkgMTEyLjYyYTU5LjgyIDU5LjgyIDAgMCAxLTExLjQgMTAuOTNaIiAvPgogIDxwYXRoIGQ9Ik04Mi4yMyA3NS4xN2E2MC4zNyA2MC4zNyAwIDAgMC0yNC42NC00OC4zOWwtOC42OCAxMS44MWE0NS42MyA0NS42MyAwIDAgMSAxOC42OCAzNi41OCA2MC4yOCA2MC4yOCAwIDAgMCAyNC40OCA0OC4zOGw4LjY4LTExLjhhNDUuNiA0NS42IDAgMCAxLTE4LjUyLTM2LjU4Wm05Ljg1LTI4LjIzLTExLjQ3LTkuMTJhNjAuMTQgNjAuMTQgMCAwIDEgMTEuOTQtMTEuMzdsOC41NiAxMS44OGE0NS41IDQ1LjUgMCAwIDAtOS4wMyA4LjYxWk0xMTUgMTA2LjUyYTM0LjMyIDM0LjMyIDAgMCAxLS4yOS02Mi41Mmw2LjEgMTMuMzJhMTkuNjggMTkuNjggMCAwIDAgLjE5IDM1LjgzWiIgLz4KPC9zdmc+Cg=="}` The logo used in the Assistant frontend can be customized by providing the contents of a logo.svg or logo.png file as a base64 encoded string. This can be created by executing `cat logo.svg \| base64` in a terminal. The svg value takes precedence over the png value. @schema deprecated: true type: object anyOf: - required: - svg properties: svg: type: string minLength: 1 - required: - png properties: png: type: string minLength: 1 @schema
pharia-assistant-api.logo.png string `""` The base64 encoded logo.png
pharia-assistant-api.logo.svg string `"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"` The base64 encoded logo.svg
pharia-assistant-api.postgresql.auth.existingSecret string `""`
pharia-assistant-api.postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
pharia-assistant-api.postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
pharia-assistant-api.privacyPolicyNotice list `[{"link_title":"Privacy Policy","link_url":"https://docs.aleph-alpha.com/docs/privacy-policy-de/","locale":"en","text":"Please do not enter any personal, sensitive or classified data in this tool, as it is a test system. You can find more information on how we process personal data in our"},{"link_title":"Datenschutzrichtlinie","link_url":"https://docs.aleph-alpha.com/docs/privacy-policy-de/","locale":"de","text":"Bitte geben Sie keine persönlichen, sensiblen oder geheimen Daten in dieses Tool ein, da es sich um ein Testsystem handelt. Weitere Informationen darüber, wie wir personenbezogene Daten verarbeiten, finden Sie in unserer"}]` If a locale is missing or no customization is provided at all, the frontend has an inbuilt default with the same values as those below. @schema deprecated: true type: array items: type: object properties: locale: enum: ["en", "de"] minLength: 1 text: type: string minLength: 1 link_url: type: string minLength: 1 link_title: type: string minLength: 1 required: - locale - text - link_url - link_title @schema
pharia-assistant-api.redis.auth.password string `""` If internal Redis is used, a dedicated password has to be provided for setup of application authentication
pharia-assistant-api.redis.enabled bool `true` This is used to indicate whether the internal Redis should be used or not.
pharia-assistant-api.redisConfig.databases.centralCache int `0` The database to be used as central cache for pharia-assistant-api
pharia-assistant-api.redisConfig.external.existingSecret string `""` Provide connection details if you want to use an existing external Redis instance
pharia-assistant-api.redisConfig.secretKeys.hostKey string `"host"` The key in the secret that contains the Redis host
pharia-assistant-api.redisConfig.secretKeys.passwordKey string `"password"` The key in the secret that contains the Redis password
pharia-assistant-api.redisConfig.secretKeys.portKey string `"port"` The key in the secret that contains the Redis port
pharia-assistant-api.redisConfig.secretKeys.usernameKey string `"username"` The key in the secret that contains the Redis user
pharia-assistant-api.redisConfig.tls.enabled bool `false` Indicates whether TLS is enabled for the Redis connection (only for external Redis)
pharia-assistant-api.resources.limits.cpu string `"1"`
pharia-assistant-api.resources.limits.memory string `"4Gi"`
pharia-assistant-api.resources.requests.cpu string `"100m"`
pharia-assistant-api.resources.requests.memory string `"4Gi"`
pharia-assistant-api.secret object `{"serviceUserToken":""}` Allows to populate the secret identified by 'pharia-assistant-api.serviceUserSecret' through this helm-chart. The secret must contain the field apiToken. See 'pharia-assistant-api.serviceUserSecret' for more information.
pharia-assistant-api.serviceUserSecret string `"pharia-iam-service-user-pharia-assistant-api"` The name of a secret containing the service user token used by the pharia-assistant-api for sending requests to the inference. This allows to connect the pharia-assistant-api to an externally running inference. The secret must contain the field apiToken. It can either be pre-existing or the chart creates it for you with the value defined in 'pharia-assistant-api.secret'.
defaultRoute string `"/apps"` Set the default route when visiting Assistant
enabled bool `true` Set this to true to install the pharia-assistant subchart as a dependency
faroPublicApiKey string `""` Set the public API Key for Faro.
faroTelemetryFallbackUrl string `""` Set the fallback Faro endpoint to send telemetry.
faroTelemetryUrl string `""` Set the Faro endpoint to send telemetry. Empty value disables the Faro plugin altogether.
fullnameOverride string `"pharia-assistant"` Override for the full name of pharia-assistant
ingress.enabled bool `true` Enabled ingress creation
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
posthogApiHost string `""` Set the PostHog API host.
posthogToken string `""` Set the PostHog token. empty value disables PostHog integration
posthogUiHost string `""` Set the PostHog UI host.
resources.limits.cpu string `"500m"`
resources.limits.memory string `"256Mi"`
resources.requests.cpu string `"100m"`
resources.requests.memory string `"256Mi"`

pharia-assistant-api

Key Type Default Description
databaseConfig.external object `{"existingSecret":""}` Provide an existing database if you want to use an external database
databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
databaseConfig.secretKeys.databaseNameKey string `"databaseName"` The key in the secret that contains the database name
databaseConfig.secretKeys.hostKey string `"host"` The key in the secret that contains the host of the database
databaseConfig.secretKeys.passwordKey string `"password"` The key in the secret that contains the password of the database
databaseConfig.secretKeys.portKey string `"port"` The key in the secret that contains the port of the database
databaseConfig.secretKeys.userKey string `"user"` The key in the secret that contains the user of the database
enabled bool `true` Set this to true to install the pharia-assistant-api subchart as a dependency
env.APPLICATION_NAME string `"PhariaAssistant"` Name of the application to be displayed in the frontend's top bar @schema deprecated: true type: string minLength: 1 @schema
env.DOCUMENT_INDEX_FILE_UPLOAD_NAMESPACE string `"Assistant"` DEPRECATED: Use pharia-chat.env.values.PHARIA_CHAT_DOCUMENT_INDEX_FILE_UPLOAD_NAMESPACE instead @schema deprecated: true type: string minLength: 1 @schema
env.GENERATE_MODEL_NAME string `"llama-3.3-70b-instruct"` Model name for generate feature @schema enum: ["llama-3.1-8b-instruct", "llama-3.1-70b-instruct", "llama-3.3-70b-instruct"] @schema
env.MAX_FILE_UPLOAD_SIZE_MB float `20` Frontend maximum file upload size in MB @schema type: number exclusiveMinimum: 0 @schema
env.PERSIST_TRACES bool `true` Enable/disable persisting traces in the Assistant's database @schema type: boolean @schema
env.QA_MODEL_NAME string `"llama-3.3-70b-instruct"` Model used for generating Agents @schema deprecated: true enum: ["llama-3.1-8b-instruct", "llama-3.1-70b-instruct", "llama-3.3-70b-instruct"] @schema
env.REQUEST_TIMEOUT_IN_SECONDS int `180` Frontend request timeout in seconds @schema type: integer minimum: 1 @schema
env.SUMMARY_MODEL_NAME string `"llama-3.3-70b-instruct"` Model name for summarization subtasks in chat and NLS features @schema enum: ["llama-3.1-8b-instruct", "llama-3.1-70b-instruct", "llama-3.3-70b-instruct"] @schema
env.TRANSLATE_MODEL_NAME string `"pharia-1-mt-translation"` Model name for translation feature @schema enum: ["pharia-1-mt-translation"] @schema
env.TRANSLATION_CACHE_MAX_SIZE int `10000` Maximum size for the translation cache @schema type: integer minimum: 1 @schema
env.TRANSLATION_CACHE_TTL int `3600` Time-to-live for the translation cache in seconds @schema type: integer minimum: 1 @schema
favicon object `{"png":"","svg":"PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIGhlaWdodD0iNzgiIHdpZHRoPSI3OCIgdmlld0JveD0iMjQgMjQgMTAyIDEwMiI+CiAgPHJlY3Qgd2lkdGg9IjIwMCIgaGVpZ2h0PSIyMDAiIGZpbGw9IndoaXRlIiAvPgogIDxwYXRoIGQ9Im0zNC42NyAxMDYuNDMtNS41NS0xMy41NUExOS4xNCAxOS4xNCAwIDAgMCAyOSA1Ny40Mmw1LjQ3LTEzLjU5YTMzLjc4IDMzLjc4IDAgMCAxIC4yIDYyLjZabTIyLjkzIDE3LjEyLTguNjgtMTEuOGE0NS4yOCA0NS4yOCAwIDAgMCA4LjYxLTguMjdMNjkgMTEyLjYyYTU5LjgyIDU5LjgyIDAgMCAxLTExLjQgMTAuOTNaIiAvPgogIDxwYXRoIGQ9Ik04Mi4yMyA3NS4xN2E2MC4zNyA2MC4zNyAwIDAgMC0yNC42NC00OC4zOWwtOC42OCAxMS44MWE0NS42MyA0NS42MyAwIDAgMSAxOC42OCAzNi41OCA2MC4yOCA2MC4yOCAwIDAgMCAyNC40OCA0OC4zOGw4LjY4LTExLjhhNDUuNiA0NS42IDAgMCAxLTE4LjUyLTM2LjU4Wm05Ljg1LTI4LjIzLTExLjQ3LTkuMTJhNjAuMTQgNjAuMTQgMCAwIDEgMTEuOTQtMTEuMzdsOC41NiAxMS44OGE0NS41IDQ1LjUgMCAwIDAtOS4wMyA4LjYxWk0xMTUgMTA2LjUyYTM0LjMyIDM0LjMyIDAgMCAxLS4yOS02Mi41Mmw2LjEgMTMuMzJhMTkuNjggMTkuNjggMCAwIDAgLjE5IDM1LjgzWiIgLz4KPC9zdmc+Cg=="}` The favicon used in the Assistant frontend can be customized by providing the contents of a logo.svg or logo.png file as a base64 encoded string. This can be created by executing `cat favicon.svg \| base64` in a terminal. The svg value takes precedence over the png value. @schema deprecated: true type: object anyOf: - required: - svg properties: svg: type: string minLength: 1 - required: - png properties: png: type: string minLength: 1 @schema
favicon.png string `""` The base64 encoded favicon.png
favicon.svg string `"PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIGhlaWdodD0iNzgiIHdpZHRoPSI3OCIgdmlld0JveD0iMjQgMjQgMTAyIDEwMiI+CiAgPHJlY3Qgd2lkdGg9IjIwMCIgaGVpZ2h0PSIyMDAiIGZpbGw9IndoaXRlIiAvPgogIDxwYXRoIGQ9Im0zNC42NyAxMDYuNDMtNS41NS0xMy41NUExOS4xNCAxOS4xNCAwIDAgMCAyOSA1Ny40Mmw1LjQ3LTEzLjU5YTMzLjc4IDMzLjc4IDAgMCAxIC4yIDYyLjZabTIyLjkzIDE3LjEyLTguNjgtMTEuOGE0NS4yOCA0NS4yOCAwIDAgMCA4LjYxLTguMjdMNjkgMTEyLjYyYTU5LjgyIDU5LjgyIDAgMCAxLTExLjQgMTAuOTNaIiAvPgogIDxwYXRoIGQ9Ik04Mi4yMyA3NS4xN2E2MC4zNyA2MC4zNyAwIDAgMC0yNC42NC00OC4zOWwtOC42OCAxMS44MWE0NS42MyA0NS42MyAwIDAgMSAxOC42OCAzNi41OCA2MC4yOCA2MC4yOCAwIDAgMCAyNC40OCA0OC4zOGw4LjY4LTExLjhhNDUuNiA0NS42IDAgMCAxLTE4LjUyLTM2LjU4Wm05Ljg1LTI4LjIzLTExLjQ3LTkuMTJhNjAuMTQgNjAuMTQgMCAwIDEgMTEuOTQtMTEuMzdsOC41NiAxMS44OGE0NS41IDQ1LjUgMCAwIDAtOS4wMyA4LjYxWk0xMTUgMTA2LjUyYTM0LjMyIDM0LjMyIDAgMCAxLS4yOS02Mi41Mmw2LjEgMTMuMzJhMTkuNjggMTkuNjggMCAwIDAgLjE5IDM1LjgzWiIgLz4KPC9zdmc+Cg=="` The base64 encoded favicon.svg
featureFlags object `{"enableAutoSidebarResize":false,"enableChat":true,"enableCollections":true,"enableExtensibleGenerate":true,"enableExtensibleSummarize":true,"enableHomepage":true,"enableNls":true,"enablePersonalAgents":true,"enableTranslate":true}` Feature flags for pharia-assistant-api
featureFlags.enableAutoSidebarResize bool `false` Enable automatic sidebar resizing @schema type: boolean @schema
featureFlags.enableChat bool `true` Enable inbuilt chat feature @schema type: boolean @schema
featureFlags.enableCollections bool `true` Enable collections @schema type: boolean @schema
featureFlags.enableExtensibleGenerate bool `true` Enable extensible generate feature @schema type: boolean @schema
featureFlags.enableExtensibleSummarize bool `true` Enable extensible summarize feature @schema type: boolean @schema
featureFlags.enableHomepage bool `true` Enable homepage @schema type: boolean @schema
featureFlags.enableNls bool `true` Enable NLS feature @schema type: boolean @schema
featureFlags.enablePersonalAgents bool `true` Enable personal agents @schema type: boolean @schema
featureFlags.enableTranslate bool `true` Enable inbuilt translate feature @schema type: boolean @schema
fullnameOverride string `"pharia-assistant-api"` Override for the full name of pharia-assistant-api
logo object `{"png":"","svg":"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"}` The logo used in the Assistant frontend can be customized by providing the contents of a logo.svg or logo.png file as a base64 encoded string. This can be created by executing `cat logo.svg \| base64` in a terminal. The svg value takes precedence over the png value. @schema deprecated: true type: object anyOf: - required: - svg properties: svg: type: string minLength: 1 - required: - png properties: png: type: string minLength: 1 @schema
logo.png string `""` The base64 encoded logo.png
logo.svg string `"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"` The base64 encoded logo.svg
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
privacyPolicyNotice list `[{"link_title":"Privacy Policy","link_url":"https://docs.aleph-alpha.com/docs/privacy-policy-de/","locale":"en","text":"Please do not enter any personal, sensitive or classified data in this tool, as it is a test system. You can find more information on how we process personal data in our"},{"link_title":"Datenschutzrichtlinie","link_url":"https://docs.aleph-alpha.com/docs/privacy-policy-de/","locale":"de","text":"Bitte geben Sie keine persönlichen, sensiblen oder geheimen Daten in dieses Tool ein, da es sich um ein Testsystem handelt. Weitere Informationen darüber, wie wir personenbezogene Daten verarbeiten, finden Sie in unserer"}]` If a locale is missing or no customization is provided at all, the frontend has an inbuilt default with the same values as those below. @schema deprecated: true type: array items: type: object properties: locale: enum: ["en", "de"] minLength: 1 text: type: string minLength: 1 link_url: type: string minLength: 1 link_title: type: string minLength: 1 required: - locale - text - link_url - link_title @schema
redis.auth.password string `""` If internal Redis is used, a dedicated password has to be provided for setup of application authentication
redis.enabled bool `true` This is used to indicate whether the internal Redis should be used or not.
redisConfig.databases.centralCache int `0` The database to be used as central cache for pharia-assistant-api
redisConfig.external.existingSecret string `""` Provide connection details if you want to use an existing external Redis instance
redisConfig.secretKeys.hostKey string `"host"` The key in the secret that contains the Redis host
redisConfig.secretKeys.passwordKey string `"password"` The key in the secret that contains the Redis password
redisConfig.secretKeys.portKey string `"port"` The key in the secret that contains the Redis port
redisConfig.secretKeys.usernameKey string `"username"` The key in the secret that contains the Redis user
redisConfig.tls.enabled bool `false` Indicates whether TLS is enabled for the Redis connection (only for external Redis)
resources.limits.cpu string `"1"`
resources.limits.memory string `"4Gi"`
resources.requests.cpu string `"100m"`
resources.requests.memory string `"4Gi"`
secret object `{"serviceUserToken":""}` Allows to populate the secret identified by 'pharia-assistant-api.serviceUserSecret' through this helm-chart. The secret must contain the field apiToken. See 'pharia-assistant-api.serviceUserSecret' for more information.
serviceUserSecret string `"pharia-iam-service-user-pharia-assistant-api"` The name of a secret containing the service user token used by the pharia-assistant-api for sending requests to the inference. This allows to connect the pharia-assistant-api to an externally running inference. The secret must contain the field apiToken. It can either be pre-existing or the chart creates it for you with the value defined in 'pharia-assistant-api.secret'.

pharia-chat

Key Type Default Description
databaseConfig.pool.hasPgBouncer bool `false`
databaseConfig.pool.recycleSec int `300`
databaseConfig.pool.size int `30`
databaseConfig.pool.timeoutSec int `5`
enabled bool `true` Set this to true to install the `pharia-chat` subchart as a dependency.
env.values.PHARIA_CHAT_DEFAULT_MODEL string `"llama-3.3-70b-instruct"` DEPRECATED @schema enum: ["llama-3.1-8b-instruct", "llama-3.1-70b-instruct", "llama-3.3-70b-instruct"] @schema
env.values.PHARIA_CHAT_DOCUMENT_INDEX_FILE_UPLOAD_NAMESPACE string `"Assistant"` Document-Index namespace for file uploads in the default chat @schema type: string minLength: 1 @schema
env.values.PHARIA_CHAT_PERSIST_DEFAULT_CHAT_TRACES bool `true` Enable/disable persisting traces in the pharia-chat database for the default chat @schema type: boolean @schema
env.values.PHARIA_CHAT_REASONING_MODEL string `"llama-3.3-70b-instruct"` Model name for agentic chat @schema type: string @schema
env.values.PHARIA_CHAT_RETRIEVER_QA_INDEX_NAME string `"Assistant-Index"` Document-Index index name for the collections used in the default chat @schema type: string minLength: 1 @schema
fullnameOverride string `"pharia-chat"` Set this to override the fully qualified name for Pharia Chat
ingress.enabled bool `false`
ingress.tls.enabled bool `true`
jobInitMcpRegistry.enabled bool `true`
jobInitMcpRegistry.env.configmap.MCP_CODE_SANDBOX_URL.key string `"MCP_CODE_SANDBOX_URL"`
jobInitMcpRegistry.env.configmap.MCP_CODE_SANDBOX_URL.name string `"{{ .Values.global.phariaAIConfigMap }}"`
jobInitMcpRegistry.env.configmap.MCP_CODE_SANDBOX_URL.optional bool `true`
jobInitMcpRegistry.env.configmap.MCP_FIRECRAWL_URL.key string `"MCP_FIRECRAWL_URL"`
jobInitMcpRegistry.env.configmap.MCP_FIRECRAWL_URL.name string `"{{ .Values.global.phariaAIConfigMap }}"`
jobInitMcpRegistry.env.configmap.MCP_FIRECRAWL_URL.optional bool `true`
jobInitMcpRegistry.env.configmap.PHARIA_CONDUCTOR_URL.key string `"PHARIA_CONDUCTOR_URL"`
jobInitMcpRegistry.env.configmap.PHARIA_CONDUCTOR_URL.name string `"{{ .Values.global.phariaAIConfigMap }}"`
jobInitMcpRegistry.env.configmap.PHARIA_CONDUCTOR_URL.optional bool `true`
jobInitMcpRegistry.env.configmap.PHARIA_DOCUMENT_INDEX_MCP_URL.key string `"PHARIA_DOCUMENT_INDEX_MCP_URL"`
jobInitMcpRegistry.env.configmap.PHARIA_DOCUMENT_INDEX_MCP_URL.name string `"{{ .Values.global.phariaAIConfigMap }}"`
jobInitMcpRegistry.env.configmap.PHARIA_DOCUMENT_INDEX_MCP_URL.optional bool `true`
jobInitMcpRegistry.env.configmap.PHARIA_TRANSLATION_SERVICE_HOST.key string `"PHARIA_TRANSLATION_SERVICE_HOST"`
jobInitMcpRegistry.env.configmap.PHARIA_TRANSLATION_SERVICE_HOST.name string `"{{ .Values.global.phariaAIConfigMap }}"`
jobInitMcpRegistry.env.configmap.PHARIA_TRANSLATION_SERVICE_HOST.optional bool `true`
jobInitMcpRegistry.extraVolumes[0].configMap.defaultMode int `493`
jobInitMcpRegistry.extraVolumes[0].configMap.name string `"{{ include \"pharia-common.names.fullname.root\" . }}-scripts"`
jobInitMcpRegistry.extraVolumes[0].name string `"mcp-server-registration-script-volume"`
jobInitMcpRegistry.mcpServers object `{"document-index-mcp":{"base_url":"${PHARIA_DOCUMENT_INDEX_MCP_URL}","description":"Document Index MCP server","enabled":true,"icon":"i-material-symbols-database-search","path":"/api/v1/mcp","scope":"system","transport":"streamable-http"},"mcp-agent-builder":{"base_url":"${PHARIA_CONDUCTOR_URL}","description":"Agent Builder MCP server","enabled":true,"icon":"i-material-symbols-robot-2-outline-rounded","path":"/mcp","scope":"selectable","transport":"streamable-http"},"mcp-code-sandbox":{"base_url":"${MCP_CODE_SANDBOX_URL}","description":"Code Sandbox MCP server","enabled":true,"icon":"i-material-symbols-code","path":"/mcp","scope":"system","transport":"streamable-http"},"mcp-firecrawl":{"base_url":"${MCP_FIRECRAWL_URL}","description":"Firecrawl MCP server","enabled":false,"icon":"i-material-symbols-language","path":"/mcp","scope":"selectable","transport":"streamable-http"},"mcp-translation":{"base_url":"${PHARIA_TRANSLATION_SERVICE_HOST}","description":"Translation MCP server","enabled":false,"icon":"i-material-symbols-translate","path":"/mcp","scope":"selectable","transport":"streamable-http"}}` MCP servers configuration @schema type: object additionalProperties: type: object properties: enabled: type: boolean description: type: string base_url: type: string path: type: string minLength: 1 scope: type: string enum: - system - selectable transport: type: string enum: - streamable-http - sse icon: type: string required: - path - description - scope - transport @schema
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
secret object `{"serviceUserToken":""}` Allows to populate the secret identified by 'pharia-chat.serviceUserSecret' through this helm-chart. The secret must contain the field apiToken. See 'pharia-chat.serviceUserSecret' for more information.
serviceUserSecret string `"pharia-iam-service-user-pharia-chat"` The name of a secret containing the service user token used by the pharia-chat for sending embedding requests to the inference. This allows to connect the pharia-chat to an externally running inference. The secret must contain the field token. It can either be pre-existing or the chart creates it for you with the value defined in 'pharia-chat.secret.serviceUserToken'. This can be left undefined if the pharia-chat is connected to the internal inference (deployed through this helm-chart). In that case use this auto-generated secret.

pharia-translation-service

Key Type Default Description
enabled bool `false` Set this to true to install the pharia-translation-service subchart as a dependency
env.values.TRANSLATE_MODEL_NAME string `"pharia-1-mt-translation"` Model name for translation feature @schema enum: ["pharia-1-mt-translation"] @schema
fullnameOverride string `"pharia-translation-service"` Override for the full name of pharia-translation-service
resources.limits.cpu string `"1"`
resources.limits.memory string `"4Gi"`
resources.requests.cpu string `"100m"`
resources.requests.memory string `"4Gi"`

creance

Key Type Default Description
databaseConfig object `{"external":{"existingSecretName":""},"secretKeys":{"databaseNameKey":"databaseName","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}}` "app user"
databaseConfig.external object `{"existingSecretName":""}` "os.pharia.ai/allowed-usecases": '["Creance"]'
databaseConfig.secretKeys.databaseNameKey string `"databaseName"` The key in the secret that contains the database name
databaseConfig.secretKeys.hostKey string `"host"` The key in the secret that contains the host of the database
databaseConfig.secretKeys.passwordKey string `"password"` The key in the secret that contains the password of the database
databaseConfig.secretKeys.portKey string `"port"` The key in the secret that contains the port of the database
databaseConfig.secretKeys.userKey string `"user"` The key in the secret that contains the user of the database
enabled bool `false` available in the assistant
fullnameOverride string `"creance"`
inference.secretKeys.baseUrl string `""` The base URL of the inference API
inference.secretKeys.token string `""` The inference token
inference.secretName string `""` "os.pharia.ai/allowed-usecases": '["Creance"]'
storageConfig.external object `{"existingSecret":""}` "os.pharia.ai/allowed-usecases": '["Creance"]'
storageConfig.secretKeys.bucketNameKey string `""` The name of the storage bucket
storageConfig.secretKeys.bucketPasswordKey string `""` The Secret Access Key for the object storage
storageConfig.secretKeys.bucketUserKey string `""` The Access Key ID
storageUrl string `""` The host of the S3 compatible object storage
unleash.secretKeys.token string `""` The API token for Unleash
unleash.secretName string `""` with default values

document-index

Key Type Default Description
databaseConfig object `{"external":{"existingSecret":""},"secretKeys":{"databaseNameKey":"databaseName","databaseUrlKey":"databaseUrl","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}}` Config for database access; not required if postgresql dependency deployment is used
databaseConfig.external object `{"existingSecret":""}` Config for external database access provided via Helm values
databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
databaseConfig.secretKeys object `{"databaseNameKey":"databaseName","databaseUrlKey":"databaseUrl","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}` Keys in K8s Secret for database config values
enabled bool `true` Set this to true to install the document-index subchart as a dependency
fullnameOverride string `"document-index"`
ingress.enabled bool `true` Enabled ingress creation
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
postgresql.persistence.size string `"128Gi"`
postgresql.resources.limits.cpu string `"4"`
postgresql.resources.limits.memory string `"2Gi"`
postgresql.resources.requests.cpu string `"2"`
postgresql.resources.requests.memory string `"1Gi"`
qdrant.requests.cpu string `"2"`
qdrant.requests.memory string `"32Gi"`
qdrant.resources.limits.cpu string `"4"`
qdrant.resources.limits.memory string `"32Gi"`
resources.limits.cpu string `"4"`
resources.limits.memory string `"2Gi"`
resources.requests.cpu string `"4"`
resources.requests.memory string `"2Gi"`
secret object `{"serviceUserToken":""}` Allows to populate the secret identified by 'document-index.serviceUserSecret' through this helm-chart. The secret must contain the field apiToken. See 'document-index.serviceUserSecret' for more information.
serviceUserSecret string `"pharia-iam-service-user-document-index"` The name of a secret containing the service user token used by the document-index for sending embedding requests to the inference. This allows to connect the document-index to an externally running inference. The secret must contain the field token. It can either be pre-existing or the chart creates it for you with the value defined in 'document-index.secret.serviceUserToken'. This can be left undefined if the document-index is connected to the internal inference (deployed through this helm-chart). In that case use this auto-generated secret.
sparse-embedding-service.defaultLanguage string `"english"` The language to default to if language detection fails.
sparse-embedding-service.languageDetectors string `"english,german"` The language detectors to load. Set this to the languages you want to support. Supported values: "arabic,basque,catalan,danish,dutch,english,finnish,french,german, greek,hungarian,indonesian,italian,norwegian,portuguese,romanian,russian,spanish, swedish,turkish"
sparse-embedding-service.resources.limits.cpu string `"1"`
sparse-embedding-service.resources.limits.memory string `"512Mi"`
sparse-embedding-service.resources.requests.cpu string `"1"`
sparse-embedding-service.resources.requests.memory string `"512Mi"`

document-index-mcp

Key Type Default Description

inference-api

Key Type Default Description
inference-api-proxy.enabled bool `false`
inference-api-proxy.fullnameOverride string `"inference-api-proxy"`
inference-api-proxy.ingress.enabled bool `true` Enabled ingress creation
inference-api-proxy.ingress.ingressSubdomain string `"inference-api"`
inference-api-proxy.ingress.tls.enabled bool `true`
inference-api-proxy.ingress.tls.secretName string `"inference-api-proxy-tls"`
admin.email string `"tools@aleph-alpha.com"` Email of the admin user to create on startup
admin.emailKey string `"email"` The email key in the secret
admin.existingSecret string `""` Existing secret to use instead of email/password.
admin.password string `""` Initial password of the admin user. If no existing external secret is provided via admin.existingSecret, a password value has to be applied during installation
admin.passwordKey string `"password"` The password key in the secret
databaseConfig object `{"external":{"existingSecret":""},"secretKeys":{"databaseNameKey":"databaseName","databaseUrlKey":"databaseUrl","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}}` Config for database access; not required if postgresql dependency deployment is used
databaseConfig.external object `{"existingSecret":""}` Config for external database access provided via Helm values
databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
databaseConfig.secretKeys object `{"databaseNameKey":"databaseName","databaseUrlKey":"databaseUrl","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}` Keys in K8s Secret for database config values
enableUnauthenticatedAccess bool `false` Set this to true to disable all token validation in the inference api
fullnameOverride string `"inference-api"`
inferenceApiServices.existingSecret string `""` Name of an existing inferenceApiServices secret. If you want to provide your own secret, set this to the name of your secret. Keep in mind to set global.inferenceApiServicesSecretRef to the same name if an existing secret is used. The secret is expected to have a key-value-pair with key `secret`.
inferenceApiServices.secret string `""` Manually added services secret If no existing external secret is provided via inferenceApiServices.existingSecret, a secret value has to be applied during installation
ingress.enabled bool `true` Enabled ingress creation
ingress.ingressSubdomain string `"inference-api"`
ingress.tls.enabled bool `true`
ingress.tls.secretName string `"inference-api-tls"`
jwt.existingSecret string `""` Name of an existing jwt secret to use The secret is expected to have a key-value-pair with key `secret`.
jwt.secret string `""` Manually added jwt secret If no existing external secret is provided via jwt.existingSecret, a secret value has to be applied during installation
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
resources.limits.cpu string `"1"`
resources.limits.memory string `"8Gi"`
resources.requests.cpu string `"1"`
resources.requests.memory string `"1Gi"`

inference-api-proxy

Key Type Default Description
enabled bool `false`
fullnameOverride string `"inference-api-proxy"`
ingress.enabled bool `true` Enabled ingress creation
ingress.ingressSubdomain string `"inference-api"`
ingress.tls.enabled bool `true`
ingress.tls.secretName string `"inference-api-proxy-tls"`

inference-worker

Key Type Default Description
checkpoints[0].generator.pipeline_parallel_size int `1`
checkpoints[0].generator.tensor_parallel_size int `1`
checkpoints[0].generator.tokenizer_path string `"luminous-base-2022-04/alpha-001-128k.json"`
checkpoints[0].generator.type string `"luminous"`
checkpoints[0].generator.weight_set_directories[0] string `"luminous-base-2022-04"`
checkpoints[0].modelVolumeClaim string `"models-luminous-base"`
checkpoints[0].models.luminous-base.adapter_name string `nil`
checkpoints[0].models.luminous-base.aligned bool `false`
checkpoints[0].models.luminous-base.bias_name string `nil`
checkpoints[0].models.luminous-base.chat_template string `nil`
checkpoints[0].models.luminous-base.completion_type string `"full"`
checkpoints[0].models.luminous-base.description string `"Multilingual model trained on English, German, French, Spanish and Italian"`
checkpoints[0].models.luminous-base.embedding_type string `"semantic"`
checkpoints[0].models.luminous-base.experimental bool `false`
checkpoints[0].models.luminous-base.maximum_completion_tokens int `8192`
checkpoints[0].models.luminous-base.multimodal_enabled bool `true`
checkpoints[0].models.luminous-base.prompt_template string `"{% promptrange instruction %}{{instruction}}{% endpromptrange %}\n{% if input %}\n{% promptrange input %}{{input}}{% endpromptrange %}\n{% endif %}"`
checkpoints[0].models.luminous-base.semantic_embedding_enabled bool `true`
checkpoints[0].models.luminous-base.softprompt_name string `nil`
checkpoints[0].models.luminous-base.worker_type string `"luminous"`
checkpoints[0].queue string `"luminous-base"`
checkpoints[0].replicas int `1`
checkpoints[0].version int `0`
checkpoints[1].generator.pipeline_parallel_size int `1`
checkpoints[1].generator.steering.default_in_context_vectors_strength float `0.062`
checkpoints[1].generator.tensor_parallel_size int `1`
checkpoints[1].generator.tokenizer_path string `"llama-3.1-8b-instruct/tokenizer.json"`
checkpoints[1].generator.type string `"luminous"`
checkpoints[1].generator.weight_set_directories[0] string `"llama-3.1-8b-instruct"`
checkpoints[1].modelVolumeClaim string `"models-llama-3.1-8b-instruct"`
checkpoints[1].models."llama-3.1-8b-instruct".adapter_name string `nil`
checkpoints[1].models."llama-3.1-8b-instruct".aligned bool `true`
checkpoints[1].models."llama-3.1-8b-instruct".bias_name string `nil`
checkpoints[1].models."llama-3.1-8b-instruct".chat_template.bos_token string `"<\|begin_of_text\|>"`
checkpoints[1].models."llama-3.1-8b-instruct".chat_template.eos_token string `"<\|end_of_text\|>"`
checkpoints[1].models."llama-3.1-8b-instruct".chat_template.template string `"{% set loop_messages = messages %}{% for message in loop_messages %}{% set content = '<\|start_header_id\|>' + message['role'] + '<\|end_header_id\|>\n\n'+ message['content'] \| trim + '<\|eot_id\|>' %}{% if loop.index0 == 0 %}{% set content = bos_token + content %}{% endif %}{{ content }}{% endfor %}{{ '<\|start_header_id\|>assistant<\|end_header_id\|>\n\n' }}"`
checkpoints[1].models."llama-3.1-8b-instruct".completion_type string `"full"`
checkpoints[1].models."llama-3.1-8b-instruct".description string `"🦙 Llama 3.1 8B instruct version. The maximum number of completion tokens is limited to 8192 tokens."`
checkpoints[1].models."llama-3.1-8b-instruct".embedding_type string `"raw"`
checkpoints[1].models."llama-3.1-8b-instruct".experimental bool `false`
checkpoints[1].models."llama-3.1-8b-instruct".maximum_completion_tokens int `8192`
checkpoints[1].models."llama-3.1-8b-instruct".multimodal_enabled bool `false`
checkpoints[1].models."llama-3.1-8b-instruct".prompt_template string `"<\|begin_of_text\|>{% for message in messages %}<\|start_header_id\|>{{message.role}}<\|end_header_id\|>\n\n{% promptrange instruction %}{{message.content}}{% endpromptrange %}<\|eot_id\|>{% endfor %}<\|start_header_id\|>assistant<\|end_header_id\|>\n\n{% if response_prefix %}{{response_prefix}}{% endif %}"`
checkpoints[1].models."llama-3.1-8b-instruct".softprompt_name string `nil`
checkpoints[1].models."llama-3.1-8b-instruct".worker_type string `"luminous"`
checkpoints[1].queue string `"llama-3.1-8b-instruct"`
checkpoints[1].replicas int `1`
checkpoints[1].version int `1`
checkpoints[2].generator.pipeline_parallel_size int `1`
checkpoints[2].generator.tensor_parallel_size int `4`
checkpoints[2].generator.tokenizer_path string `"llama-3.3-70b-instruct/tokenizer.json"`
checkpoints[2].generator.type string `"luminous"`
checkpoints[2].generator.weight_set_directories[0] string `"llama-3.3-70b-instruct"`
checkpoints[2].modelVolumeClaim string `"models-llama-3.3-70b-instruct"`
checkpoints[2].models."llama-3.3-70b-instruct".adapter_name string `nil`
checkpoints[2].models."llama-3.3-70b-instruct".aligned bool `true`
checkpoints[2].models."llama-3.3-70b-instruct".bias_name string `nil`
checkpoints[2].models."llama-3.3-70b-instruct".chat_template.bos_token string `"<\|begin_of_text\|>"`
checkpoints[2].models."llama-3.3-70b-instruct".chat_template.eos_token string `"<\|end_of_text\|>"`
checkpoints[2].models."llama-3.3-70b-instruct".chat_template.template string `"{% set loop_messages = messages %}{% for message in loop_messages %}{% set content = '<\|start_header_id\|>' + message['role'] + '<\|end_header_id\|>\n\n'+ message['content'] \| trim + '<\|eot_id\|>' %}{% if loop.index0 == 0 %}{% set content = bos_token + content %}{% endif %}{{ content }}{% endfor %}{{ '<\|start_header_id\|>assistant<\|end_header_id\|>\n\n' }}"`
checkpoints[2].models."llama-3.3-70b-instruct".completion_type string `"full"`
checkpoints[2].models."llama-3.3-70b-instruct".description string `"🦙 Llama 3.3 70B instruct version. The maximum number of completion tokens is limited to 8192 tokens."`
checkpoints[2].models."llama-3.3-70b-instruct".embedding_type string `"raw"`
checkpoints[2].models."llama-3.3-70b-instruct".experimental bool `false`
checkpoints[2].models."llama-3.3-70b-instruct".maximum_completion_tokens int `8192`
checkpoints[2].models."llama-3.3-70b-instruct".multimodal_enabled bool `false`
checkpoints[2].models."llama-3.3-70b-instruct".prompt_template string `"<\|begin_of_text\|>{% for message in messages %}<\|start_header_id\|>{{message.role}}<\|end_header_id\|>\n\n{% promptrange instruction %}{{message.content}}{% endpromptrange %}<\|eot_id\|>{% endfor %}<\|start_header_id\|>assistant<\|end_header_id\|>\n\n{% if response_prefix %}{{response_prefix}}{% endif %}"`
checkpoints[2].models."llama-3.3-70b-instruct".softprompt_name string `nil`
checkpoints[2].models."llama-3.3-70b-instruct".worker_type string `"luminous"`
checkpoints[2].queue string `"llama-3.3-70b-instruct"`
checkpoints[2].replicas int `1`
checkpoints[2].resources.limits.memory string `"256Gi"`
checkpoints[2].resources.requests.memory string `"128Gi"`
checkpoints[2].startupProbe.failureThreshold int `720`
checkpoints[2].startupProbe.periodSeconds int `10`
checkpoints[2].version int `0`
checkpoints[3].generator.pipeline_parallel_size int `1`
checkpoints[3].generator.tensor_parallel_size int `1`
checkpoints[3].generator.tokenizer_path string `"llama-guard-3-8b/tokenizer.json"`
checkpoints[3].generator.type string `"luminous"`
checkpoints[3].generator.weight_set_directories[0] string `"llama-guard-3-8b"`
checkpoints[3].modelVolumeClaim string `"models-llama-guard-3-8b"`
checkpoints[3].models.llama-guard-3-8b.adapter_name string `nil`
checkpoints[3].models.llama-guard-3-8b.aligned bool `true`
checkpoints[3].models.llama-guard-3-8b.bias_name string `nil`
checkpoints[3].models.llama-guard-3-8b.chat_template.bos_token string `"<\|begin_of_text\|>"`
checkpoints[3].models.llama-guard-3-8b.chat_template.eos_token string `"<\|end_of_text\|>"`
checkpoints[3].models.llama-guard-3-8b.chat_template.template string `"{% set loop_messages = messages %}{% for message in loop_messages %}{% set content = '<\|start_header_id\|>' + message['role'] + '<\|end_header_id\|>\n\n'+ message['content'] \| trim + '<\|eot_id\|>' %}{% if loop.index0 == 0 %}{% set content = bos_token + content %}{% endif %}{{ content }}{% endfor %}{{ '<\|start_header_id\|>assistant<\|end_header_id\|>\n\n' }}"`
checkpoints[3].models.llama-guard-3-8b.completion_type string `"full"`
checkpoints[3].models.llama-guard-3-8b.description string `"🦙 Llama-Guard-3-8B. The maximum number of completion tokens is limited to 8192 tokens."`
checkpoints[3].models.llama-guard-3-8b.embedding_type string `"raw"`
checkpoints[3].models.llama-guard-3-8b.experimental bool `false`
checkpoints[3].models.llama-guard-3-8b.maximum_completion_tokens int `8192`
checkpoints[3].models.llama-guard-3-8b.multimodal_enabled bool `false`
checkpoints[3].models.llama-guard-3-8b.prompt_template string `"<\|begin_of_text\|>{% for message in messages %}<\|start_header_id\|>{{message.role}}<\|end_header_id\|>\n\n{% promptrange instruction %}{{message.content}}{% endpromptrange %}<\|eot_id\|>{% endfor %}<\|start_header_id\|>assistant<\|end_header_id\|>\n\n{% if response_prefix %}{{response_prefix}}{% endif %}"`
checkpoints[3].models.llama-guard-3-8b.softprompt_name string `nil`
checkpoints[3].models.llama-guard-3-8b.worker_type string `"luminous"`
checkpoints[3].queue string `"llama-guard-3-8b"`
checkpoints[3].replicas int `1`
checkpoints[3].version int `0`
fullnameOverride string `"inference-worker"`
resources.limits.cpu string `"4"`
resources.limits.memory string `"8Gi"`
resources.requests.cpu string `"1"`
resources.requests.memory string `"4Gi"`
tolerations list `[]`

mcp-code-sandbox

Key Type Default Description
enabled bool `true` Set this to true to install the mcp-code-sandbox subchart as a dependency providing code execution capabilities
fullnameOverride string `"mcp-code-sandbox"`

mcp-firecrawl

Key Type Default Description
enabled bool `false` Requires an environment variable called FIRECRAWL_API_KEY
fullnameOverride string `"mcp-firecrawl"`

pharia-catch-api

Key Type Default Description
enabled bool `true` Set this to true to install the `pharia-catch-api` subchart as a dependency.
fullnameOverride string `"pharia-catch-api"` Set this to override the fully qualified name for Pharia Catch API
ingress.enabled bool `false`
ingress.tls.enabled bool `true`
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
secret object `{"serviceUserToken":""}` Allows to populate the secret identified by 'pharia-catch-api.serviceUserSecret' through this helm-chart. The secret must contain the field apiToken. See 'pharia-catch.serviceUserSecret' for more information.
serviceUserSecret string `"pharia-iam-service-user-pharia-catch-api"` The name of a secret containing the service user token used by the pharia-chat for sending embedding requests to the inference. This allows to connect the pharia-chat to an externally running inference. The secret must contain the field token. It can either be pre-existing or the chart creates it for you with the value defined in 'pharia-catch-api.secret.serviceUserToken'. This can be left undefined if the pharia-catch-api is connected to the internal inference (deployed through this helm-chart). In that case use this auto-generated secret.

pharia-catch-ui

Key Type Default Description
enabled bool `true` Set this to true to install the `pharia-catch-ui` subchart as a dependency.
fullnameOverride string `"pharia-catch-ui"` Set this to override the fully qualified name for Pharia Catch UI
ingress.enabled bool `true`
ingress.ingressSubdomain string `"pharia-catch"`
ingress.tls.enabled bool `true`
secret object `{"serviceUserToken":""}` Allows to populate the secret identified by 'pharia-catch-ui.serviceUserSecret' through this helm-chart. The secret must contain the field apiToken. See 'pharia-catch-ui.serviceUserSecret' for more information.
serviceUserSecret string `"pharia-iam-service-user-pharia-catch-ui"` The name of a secret containing the service user token used by the pharia-chat for sending embedding requests to the inference. This allows to connect the pharia-catch-ui to an externally running inference. The secret must contain the field token. It can either be pre-existing or the chart creates it for you with the value defined in 'pharia-catch-ui.secret.serviceUserToken'. This can be left undefined if the pharia-catch-ui is connected to the internal inference (deployed through this helm-chart). In that case use this auto-generated secret.

pharia-common

Key Type Default Description

pharia-conductor

Key Type Default Description
agentUrlPrefix string `""` Set this to provide the agent URL prefix that will be used to compose the messages from the MCP server.
enabled bool `true` Set this to true to install the `pharia-conductor` subchart as a dependency.
env.configmap.PHARIA_CONDUCTOR_AGENT_URL_PREFIX.key string `"PHARIA_ASSISTANT_AGENTS_URL"`
env.configmap.PHARIA_CONDUCTOR_AGENT_URL_PREFIX.name string `"{{ .Values.global.phariaAIConfigMap }}"`
env.configmap.PHARIA_CONDUCTOR_AGENT_URL_PREFIX.optional bool `true`
fullnameOverride string `"pharia-conductor"` Set this to override the fully qualified name for PhariaConductor
ingress.enabled bool `false`
ingress.tls.enabled bool `true`
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.

pharia-data-api

Key Type Default Description
cronJob.enabled bool `true`
databaseConfig object `{"external":{"existingSecret":""},"secretKeys":{"databaseNameKey":"databaseName","databaseUrlKey":"databaseUrl","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}}` Config for database access; not required if postgresql dependency deployment is used
databaseConfig.external object `{"existingSecret":""}` Config for external database access provided via Helm values
databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
databaseConfig.secretKeys object `{"databaseNameKey":"databaseName","databaseUrlKey":"databaseUrl","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}` Keys in K8s Secret for database config values
enabled bool `true` Set this to true to install the pharia-data-api subchart as a dependency
etl.enabled bool `true`
etlSelector string `"v1"`
externalTemporalConfig.accountId string `""`
externalTemporalConfig.apiKeySecretKey string `""`
externalTemporalConfig.apiKeySecretName string `""`
externalTemporalConfig.host string `""`
externalTemporalConfig.namespace string `""`
externalTemporalConfig.port string `""`
externalTemporalConfig.sslEnable string `""`
fullnameOverride string `"pharia-data-api"`
inbox.enabled bool `true`
ingress.enabled bool `true` Enabled ingress creation locally
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
minio.enabled bool `true`
phariadataorchestrator.enabled bool `false`
phariadataorchestrator.server.config.persistence.default.sql.existingSecret string `""` When using a secret, set the password to "" and use the following fields
phariadataorchestrator.server.config.persistence.default.sql.password string `""` If internal PostgreSQL is used, either password or existingSecret and secretName, has to be provided for setup of orchestrator database authentication
phariadataorchestrator.server.config.persistence.default.sql.secretName string `""`
phariadataorchestrator.server.config.persistence.visibility.sql.existingSecret string `""` When using a secret, set the password to "" and use the following fields
phariadataorchestrator.server.config.persistence.visibility.sql.password string `""` If internal PostgreSQL is used, either password or existingSecret and secretName, has to be provided for setup of orchestrator database authentication
phariadataorchestrator.server.config.persistence.visibility.sql.secretName string `""`
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
rabbitmq.auth.password string `""`
rabbitmq.auth.username string `"user"`
rabbitmq.enabled bool `true`
rabbitmq.loadDefinition.enabled bool `false`
rabbitmq.loadDefinition.existingSecret string `"pharia-data-api-rabbitmq-load-definitions-secret"`
rabbitmqConfig.defaultLoadDefinitionsSecret string `"pharia-data-api-rabbitmq-load-definitions-secret"` The load definitions secret must hold the RabbitMQ topology configuration.
rabbitmqConfig.defaultSecret string `"pharia-data-api-rabbitmq-secret"` Default secret name is used to create a secret if `external.existingSecret` is not provided.
rabbitmqConfig.external.existingSecret string `""` Set this value if a k8s Secret with RabbitMQ values already exists. Make sure that the all the keys exists in the secret with a valid value.
rabbitmqConfig.external.loadDefinitionsSecret string `""` The load definitions secret name
rabbitmqConfig.external.rabbitmqUser string `""` The user of the RabbitMQ
rabbitmqConfig.external.rabbitmqUserPassword string `""` The password of the user of RabbitMQ
rabbitmqConfig.secretKeys.hostKey string `"rabbitmq-host"` The key in the secret that contains the host of the RabbitMQ
rabbitmqConfig.secretKeys.portKey string `"rabbitmq-port"` The key in the secret that contains the port of the RabbitMQ
rabbitmqConfig.secretKeys.userKey string `"rabbitmq-username"` The key in the secret that contains the user of the RabbitMQ
rabbitmqConfig.secretKeys.userPasswordKey string `"rabbitmq-password"` The key in the secret that contains the password of the RabbitMQ
secret.serviceUserToken string `""`
serviceUserSecret string `"pharia-iam-service-user-pharia-data-etl"`
serviceUserSecretKey string `""`
storageConfig.externalBucket.defaultSecret string `"pharia-data-api-external-storage-secret"` Default secret name is used to create a secret if `external.existingSecret` is not provided.
storageConfig.externalBucket.external.existingSecret string `"pharia-data-api-internal-storage-secret"`
storageConfig.externalBucket.external.existingSecret string `""` Set this value if a k8s Secret with storage values already exists. Make sure that all the keys exist in the secret with a valid value.
storageConfig.externalBucket.secretKeys.bucketNameKey string `"bucketName"`
storageConfig.externalBucket.secretKeys.bucketNameKey string `"bucketName"` The key in the secret that contains the bucket name
storageConfig.externalBucket.secretKeys.bucketPasswordKey string `"bucketPassword"` The key in the secret that contains the bucket password
storageConfig.externalBucket.secretKeys.bucketPasswordKey string `"bucketPassword"`
storageConfig.externalBucket.secretKeys.bucketUserKey string `"bucketUser"`
storageConfig.externalBucket.secretKeys.bucketUserKey string `"bucketUser"` The key in the secret that contains the bucket user
storageConfig.internalBucket.defaultSecret string `"pharia-data-api-internal-storage-secret"` Default secret name is used to create a secret if `external.existingSecret` is not provided.
storageConfig.internalBucket.external.existingSecret string `"pharia-data-api-external-storage-secret"`
storageConfig.internalBucket.external.existingSecret string `""` Set this value if a k8s Secret with storage values already exists. Make sure that all the keys exist in the secret with a valid value.
storageConfig.internalBucket.secretKeys.bucketNameKey string `"bucketName"` The key in the secret that contains the bucket name
storageConfig.internalBucket.secretKeys.bucketNameKey string `"bucketName"`
storageConfig.internalBucket.secretKeys.bucketPasswordKey string `"bucketPassword"`
storageConfig.internalBucket.secretKeys.bucketPasswordKey string `"bucketPassword"` The key in the secret that contains the bucket password
storageConfig.internalBucket.secretKeys.bucketUserKey string `"bucketUser"` The key in the secret that contains the bucket user
storageConfig.internalBucket.secretKeys.bucketUserKey string `"bucketUser"`
storageUrl string `""` The storageUrl is used to configure the internal and external storages. If the storageUrl is not provided, the internal storage will be used.
storageUrl string `""`

pharia-finetuning

Key Type Default Description
enabled bool `true` Set this to true to install the `pharia-finetuning` subchart as a dependency.
fullnameOverride string `"pharia-finetuning"` Set this to override the fully qualified name for Pharia Finetuning
ingress object `{"annotations":{},"enabled":true,"ingressSubdomain":"pharia-finetuning-api","tls":{"enabled":true,"existingSecret":"pharia-finetuning-api-tls"}}` Configure external access to Pharia finetuning API
ingress.annotations object `{}` Annotations for the Ingress resource. This can be used to add ingress controller specific annotations
ingress.enabled bool `true` Set this to true to set up an Ingress for Pharia finetuning API
ingress.ingressSubdomain string `"pharia-finetuning-api"` Hostname for the Ingress (without domain). The domain is read from `global.ingressDomain`. This needs to be changed, if multiple instances are deployed to the same cluster using the same domain
ingress.tls object `{"enabled":true,"existingSecret":"pharia-finetuning-api-tls"}` Configure TLS for this Ingress
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
ingress.tls.existingSecret string `"pharia-finetuning-api-tls"` The name of the secret containing the TLS certificate. See also: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
kuberay-operator object `{}` Configuration of kuberay operator. See https://github.com/ray-project/kuberay/blob/master/helm-chart/kuberay-operator/values.yaml for available values.
minio object `{"enabled":true,"fullnameOverride":"pharia-finetuning-minio","nameOverride":"pharia-finetuning-minio","persistence":{"size":"1Ti"}}` Configuration of built-in S3 storage. It is recommended to disable the built-in storage for production installations and connect to an external S3 storage instead.
minio.enabled bool `true` Set to false to disable built-in storage
minio.persistence.size string `"1Ti"` Disk space allocated to storage
mlflow object `{"externalDatabase":{"database":"mlflow","dialectDriver":"postgresql","existingSecret":"","existingSecretPasswordKey":"db-password","host":"","port":5432,"user":"postgres"},"externalS3":{"bucket":"pharia-finetuning","existingSecret":"pharia-finetuning-internal-storage-secret","existingSecretAccessKeyIDKey":"bucketUser","existingSecretKeySecretKey":"bucketPassword","host":"pharia-finetuning-minio","port":9000,"protocol":"https"},"minio":{"enabled":false},"postgresql":{"enabled":true}}` Configuration of the MLFlow server used for experiment tracking.
mlflow.externalDatabase object `{"database":"mlflow","dialectDriver":"postgresql","existingSecret":"","existingSecretPasswordKey":"db-password","host":"","port":5432,"user":"postgres"}` Configuration of external database
mlflow.externalDatabase.database string `"mlflow"` Database name
mlflow.externalDatabase.dialectDriver string `"postgresql"` Database Dialect(+Driver)
mlflow.externalDatabase.existingSecret string `""` Name of an existing secret resource containing the database credentials.
mlflow.externalDatabase.existingSecretPasswordKey string `"db-password"` Name of an existing secret key containing the database credentials
mlflow.externalDatabase.host string `""` Database host
mlflow.externalDatabase.port int `5432` Database port
mlflow.externalDatabase.user string `"postgres"` Database user
mlflow.externalS3 object `{"bucket":"pharia-finetuning","existingSecret":"pharia-finetuning-internal-storage-secret","existingSecretAccessKeyIDKey":"bucketUser","existingSecretKeySecretKey":"bucketPassword","host":"pharia-finetuning-minio","port":9000,"protocol":"https"}` Configuration of external object store
mlflow.externalS3.bucket string `"pharia-finetuning"` S3 bucket
mlflow.externalS3.existingSecret string `"pharia-finetuning-internal-storage-secret"` Name of an existing secret resource containing the S3 credentials
mlflow.externalS3.existingSecretAccessKeyIDKey string `"bucketUser"` Name of an existing secret key containing the S3 access key ID
mlflow.externalS3.existingSecretKeySecretKey string `"bucketPassword"` Name of an existing secret key containing the S3 access key secret
mlflow.externalS3.host string `"pharia-finetuning-minio"` S3 host
mlflow.externalS3.port int `9000` S3 port
mlflow.externalS3.protocol string `"https"` S3 protocol
mlflow.minio object `{"enabled":false}` Configuration of sandbox object store. Not recommended for production environments.
mlflow.minio.enabled bool `false` Set to false for production environments and configure externalS3 instead
mlflow.postgresql object `{"enabled":true}` Configuration of sandbox postgres database. Not recommended for production environments.
mlflow.postgresql.enabled bool `true` Set to false for production environments and configure externalDatabase instead
rayCluster object `{"workerGroups":{"cpu-group":{"maxReplicas":4,"nodeSelector":{},"tolerations":[]},"gpu-group":{"maxReplicas":4,"nodeSelector":{},"tolerations":[]}}}` Configuration of the distributed training framework
storageConfig object `{"fromSecret":{"secretKeys":{"bucketNameKey":"bucketName","endpointUrlKey":"endpointUrl","passwordKey":"bucketPassword","userKey":"bucketUser"},"secretName":""},"fromValues":{"bucketName":"","endpointUrl":"","password":"","region":"","user":""}}` Configuration of S3 storage used to store base model weights and finetuning artifacts like checkpoints. When using the built-in storage, this configuration can stay untouched.
storageConfig.fromSecret object `{"secretKeys":{"bucketNameKey":"bucketName","endpointUrlKey":"endpointUrl","passwordKey":"bucketPassword","userKey":"bucketUser"},"secretName":""}` Provide credentials as a k8s secret for access to external S3 storage. When providing credentails in plaintext, this section can stay untouched and `fromValues` should be adjusted.
storageConfig.fromSecret.secretKeys object `{"bucketNameKey":"bucketName","endpointUrlKey":"endpointUrl","passwordKey":"bucketPassword","userKey":"bucketUser"}` Provide the keys within the k8s secret under which to find bucket name, username, password, endoint URL and region
storageConfig.fromSecret.secretName string `""` Name of the k8s secret that holds the S3 credentials. This secret is expected to exist when this helm chart is installed.
storageConfig.fromValues object `{"bucketName":"","endpointUrl":"","password":"","region":"","user":""}` Provide credentials to external S3 storage in plaintext. When providing credentials via a k8s secret, this section can stay untouched and `fromSecret` should be adjusted.

pharia-iam

Key Type Default Description
api object `{"ingress":{"annotations":{},"enabled":true,"tls":{"enabled":true,"secretName":"pharia-iam-api-tls"}}}` Internal API configuration
api.ingress.annotations object `{}` Annotations for the ingress-resource. This can be used to add ingress controller specific annotations.
api.ingress.enabled bool `true` Enabled ingress creation
api.ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
api.ingress.tls.secretName string `"pharia-iam-api-tls"` The name of the secret containing the TLS certificate. See also: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
config object `{"adminEmail":"admin@localhost","adminEnableDirectUserManagement":false,"adminEnableZitadelManagement":false,"adminPassword":null,"adminUserName":"admin","defaultRolesForLogin":["AssistantUser"],"serviceUsers":{"document-index":{"description":"Initial service user for the Document Index","name":"Document Index","roles":["DocumentIndexServiceUser","InferenceServiceUser"]},"pharia-assistant-api":{"description":"Initial service user for the Pharia Assistant API","name":"Pharia Assistant API","roles":["AssistantUser","OsUser"]},"pharia-catch-api":{"description":"Service user for the Catch API","name":"Pharia Catch API","roles":["CatchUser","EtlServiceUser"]},"pharia-chat":{"description":"Initial service user for Pharia Chat","name":"Pharia Chat","roles":["ChatServiceUser"]},"pharia-data-etl":{"description":"Initial service user for the Pharia Data ETL","name":"Pharia Data ETL","roles":["EtlServiceUser","InferenceServiceUser","OAuthGatewayConnectionsServiceUser"]},"pharia-finetuning":{"description":"Initial service user for Pharia Finetuning","name":"Pharia Finetuning","roles":["FinetuningServiceUser"]},"pharia-numinous":{"description":"Initial service user for Pharia Numinous","name":"Pharia Numinous","roles":["AssistantUser"]},"pharia-oauth-gateway":{"description":"Service user for the OAuth Gateway","name":"Pharia OAuth Gateway","roles":["OAuthGatewayConnectionsServiceUser","OAuthGatewayIntegrationsServiceUser"]},"pharia-os-manager":{"description":"Initial service user for Pharia OS Manager","name":"Pharia OS Manager","roles":["OsServiceUser","InferenceServiceUser"],"useKubernetesOnly":true},"pharia-studio":{"description":"Service user for studio to upload relations and check privileges","name":"Pharia Studio","roles":["StudioServiceUser"]},"use-cases":{"description":"One service user for all use cases as intermediate solution until authentication can be dynamically generated.","name":"Use Case Service User","roles":["UseCaseServiceUser"]}}}` IAM configuration
config.adminEmail string `"admin@localhost"` Email of initial user
config.adminEnableDirectUserManagement bool `false` Enable direct access to user management console for initial admin account. Enable if PhariaOs console is not used, but user management is needed.
config.adminEnableZitadelManagement bool `false` Enable direct access to internal identity provider - only needed to configure advanced features such as self-signup or user federation
config.adminPassword string `nil` Init password of initial user. To be valid it requires to have 10-70 characters, including at least one uppercase letter, one lowercase letter, and one digit. User will need to change this password on the first login. @schema type: - string - null @schema
config.adminUserName string `"admin"` initial user name
config.defaultRolesForLogin list `["AssistantUser"]` Configure the default roles for a user that registers via SSO or self sign up
enabled bool `true` Set this to true to install the pharia-iam subchart as a dependency
externallyManagedGroups list `[]` Example: [ "group1", "group2" ]
image object `{"repository":"alephalpha.jfrog.io/pharia-iam/pharia-iam","tag":""}` Image of API and configuration job
ingress object `{"annotations":{},"enabled":true,"tls":{"enabled":true,"secretName":"pharia-iam-tls"}}` Ingress configuration for Zitadel (including login endpoints)
ingress.annotations object `{}` Annotations for the ingress-resource. This can be used to add ingress controller specific annotations.
ingress.enabled bool `true` Enabled ingress creation
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
ingress.tls.secretName string `"pharia-iam-tls"` The name of the secret containing the TLS certificate. See also: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
openFgaDatabaseConfig.defaultSecret string `"pharia-iam-openfga-postgres-secret"`
openFgaDatabaseConfig.external.existingSecret string `""` A postgres connection URI for the secret to create. This overwrites all other values, if set. Otherwise, the uri is build from the above values.
openFgaDatabaseConfig.external.uri string `""`
openFgaDatabaseConfig.secretKeys.passwordKey string `"password"`
openFgaDatabaseConfig.secretKeys.uriKey string `"uri"`
openFgaPostgresql.auth.password string `""` If internal PostgreSQL is used a dedicated password has to be provided for setup of application authentication
openFgaPostgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
openfga object `{"datastore":{"migrations":{"resources":{}},"uriSecret":"pharia-iam-openfga-postgres-secret"},"resources":{}}` OpenFGA Service Configuration
openfga.datastore.migrations.resources object `{}` Specify resources for the migration job
openfga.datastore.uriSecret string `"pharia-iam-openfga-postgres-secret"` Secret with key "uri" containing the connection string to the database connection string for OpenFGA. Format: `postgres://user:password@host:port/database?flags`. This name must be overwritten if an existing secret is used!
openfga.resources object `{}` Specify resources for the openfga service
zitadelDatabaseConfig.external object `{"databaseName":"","databaseUrl":"","existingSecret":"","host":"","password":"","port":"","user":""}` Provide an existing database if you want to use an external database
zitadelDatabaseConfig.external.databaseName string `""` The name of the database
zitadelDatabaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
zitadelDatabaseConfig.external.host string `""` The host of the database
zitadelDatabaseConfig.external.password string `""` The password of the database
zitadelDatabaseConfig.external.port string `""` The port of the database
zitadelDatabaseConfig.external.user string `""` The user of the database
zitadelDatabaseConfig.secretKeys.databaseNameKey string `"databaseName"` The key in the secret that contains the database name
zitadelDatabaseConfig.secretKeys.hostKey string `"host"` The key in the secret that contains the host of the database
zitadelDatabaseConfig.secretKeys.passwordKey string `"password"` The key in the secret that contains the password of the database
zitadelDatabaseConfig.secretKeys.portKey string `"port"` The key in the secret that contains the port of the database
zitadelDatabaseConfig.secretKeys.userKey string `"user"` The key in the secret that contains the user of the database
zitadelPostgresql.auth.password string `""` If internal PostgreSQL is used a dedicated password has to be provided for setup of application authentication
zitadelPostgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.

pharia-kernel

Key Type Default Description
enabled bool `true` Set this to true to install the `pharia-kernel` subchart as a dependency.
envVars object `{"configmap":{"NAMESPACES__ASSISTANT__CONFIG_URL":{"key":"NAMESPACES__ASSISTANT__CONFIG_URL","name":"{{ .Values.global.phariaAIConfigMap }}"}},"secret":{"NAMESPACES__ASSISTANT__REGISTRY_PASSWORD":{"key":"registryPassword","name":"{{ .Values.global.imagePullOpaqueSecretName }}"},"NAMESPACES__ASSISTANT__REGISTRY_USER":{"key":"registryUser","name":"{{ .Values.global.imagePullOpaqueSecretName }}"}},"values":{"NAMESPACES__ASSISTANT__BASE_REPOSITORY":"assistant-kernel-skills","NAMESPACES__ASSISTANT__REGISTRY":"alephalpha.jfrog.io"}}` Define additional environment variables. Use `env` for additional environment variables, which has higher precedence over `envVars`. While they follow the same schema, `envVars` is intended for default values only. The default namespace `assistant` is configured via the environment variables to ensure higher precedence over the namespaces defined in `pharia-kernel.namespaces`.
fullnameOverride string `"pharia-kernel"` Set this to override the fully qualified name for PhariaKernel
ingress object `{"annotations":{},"enabled":true,"ingressSubdomain":"pharia-kernel","tls":{"enabled":true,"existingSecret":"pharia-kernel-tls"}}` Configure external access to PhariaKernel
ingress.annotations object `{}` Annotations for the Ingress resource. This can be used to add ingress controller specific annotations
ingress.enabled bool `true` Set this to true to set up an Ingress for PhariaKernel
ingress.ingressSubdomain string `"pharia-kernel"` Hostname for the Ingress (without domain). The domain is read from `global.ingressDomain`. This needs to be changed, if multiple instances are deployed to the same cluster using the same domain
ingress.tls object `{"enabled":true,"existingSecret":"pharia-kernel-tls"}` Configure TLS for this Ingress
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
ingress.tls.existingSecret string `"pharia-kernel-tls"` The name of the secret containing the TLS certificate. See also: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
logLevel string `"info"` Set the log level for PhariaKernel. This does not affect other targets, where errors are always logged. The options are: - error - warn - info - debug - trace - off
namespaces object `{}` Configure the namespaces for PhariaKernel. Each namespace needs to be explicitly defined. The name of each namespace can be specified in camelCase, and is converted to kebab-case when deployed. Example:
# The Namespace name
playground:
  # The URL to the corresponding namespace configuration TOML file
  configUrl: "https://gitlab.aleph-alpha.de/api/v4/projects/123/repository/files/namespace.toml/raw?ref=main"
  # The Container Registry that backs the skill registry for this namespace
  registry: "registry.gitlab.aleph-alpha.de"
  # The base repository in `registry` that backs the skill registry for this namespace
  # This composes the final repository for each skill e.g. ${baseRepository}/${skillName}
  baseRepository: "engineering/pharia-kernel-playground/skills"
Each of the value can alternatively be provided as environment variables, which is highly encouraged for providing the credentials:
  # The access token for `configUrl`
  NAMESPACES__PLAYGROUND__CONFIG_ACCESS_TOKEN
  # The user name for accessing `registry`
  NAMESPACES__PLAYGROUND__REGISTRY_USER
  # The password or access token for accessing `registry`
  NAMESPACES__PLAYGROUND__REGISTRY_PASSWORD
openTelemetryEndpoint string `""` OpenTelemetry endpoint for sending traces. This field provides fallback support for backward compatibility. When global.openTelemetry.endpoint is not set, this value will be used instead. For new deployments, use global.openTelemetry.endpoint instead.
openTelemetrySamplingRatio string `""` OpenTelemetry sampling ratio for trace collection. This field provides fallback support for backward compatibility. When global.openTelemetry.samplingRatio is not set, this value will be used instead. For new deployments, use global.openTelemetry.samplingRatio instead.
resources object `{"limits":{"cpu":"4","ephemeral-storage":"8Gi","memory":"8Gi"},"requests":{"cpu":"2","ephemeral-storage":"4Gi","memory":"4Gi"}}` Specify how much of each resource PhariaKernel needs. The recommended resources are set as the default. As the requirements are highly usage-dependent, adjust them as necessary. Schema: https://github.com/yannh/kubernetes-json-schema/blob/master/master-standalone-strict/resourcerequirements.json See also: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
serviceMonitor object `{"enabled":false}` Enable the ServiceMonitor that targets PhariaKernel

pharia-numinous

Key Type Default Description
enabled bool `false` Set this to true to install the `pharia-numinous` subchart as a dependency.
fullnameOverride string `"pharia-numinous"` Set this to override the fully qualified name for Pharia Catch API
ingress.enabled bool `false`
ingress.tls.enabled bool `true`
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
secret object `{"serviceUserToken":""}` Allows to populate the secret identified by 'pharia-numinous.serviceUserSecret' through this helm-chart. The secret must contain the field apiToken. See 'pharia-numinous.serviceUserSecret' for more information.
serviceUserSecret string `"pharia-iam-service-user-pharia-numinous"` The name of a secret containing the service user token used by the pharia-numinous for sending embedding requests to the inference. This allows to connect the pharia-numinous to an externally running inference. The secret must contain the field token. It can either be pre-existing or the chart creates it for you with the value defined in 'pharia-numinous.secret.serviceUserToken'. This can be left undefined if the pharia-numinous is connected to the internal inference (deployed through this helm-chart). In that case use this auto-generated secret.

pharia-oauth-gateway

Key Type Default Description
databaseConfig object `{"external":{"existingSecret":""},"secretKeys":{"databaseNameKey":"databaseName","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}}` Default database configuration for the pharia-oauth-gaetway service access postgres database
databaseConfig.external object `{"existingSecret":""}` Provide an existing database if you want to use an external database
databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
enabled bool `true` Set this to true to install the pharia-oauth-gateway subchart as a dependency
fullnameOverride string `"pharia-oauth-gateway"` Default nameOverride of the application
ingress.enabled bool `true` Enabled ingress creation
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
resources.limits.cpu string `"500m"`
resources.limits.memory string `"512Mi"`
resources.requests.cpu string `"100m"`
resources.requests.memory string `"512Mi"`

pharia-reloader

Key Type Default Description
pharia-reloader object `{"enabled":true}` Set this to true to install the `pharia-reloader` subchart as a dependency. This is used to watch for changes in the configmap and restart the pods if necessary. It uses stakater/reloader to this end. If you already have reloader deployed in your cluster, you can set this to false and rely on your existing reloader deployment.

pharia-studio-api

Key Type Default Description
databaseConfig object `{"external":{"existingSecret":""},"secretKeys":{"databaseNameKey":"databaseName","hostKey":"host","passwordKey":"password","portKey":"port","userKey":"user"}}` Default database configuration for the pharia-studio-api service access postgres database
databaseConfig.external object `{"existingSecret":""}` Provide an existing database if you want to use an external database
databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
enabled bool `true` Set this to true to install the pharia-studio-api subchart as a dependency
fullnameOverride string `"pharia-studio-api"` Default nameOverride of the application
ingress.enabled bool `true` Enabled ingress creation
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
resources.limits.cpu string `"1"`
resources.limits.memory string `"1Gi"`
resources.requests.cpu string `"500m"`
resources.requests.memory string `"1Gi"`
serviceUserSecret string `"pharia-iam-service-user-pharia-studio"` Needed for creation of relations in IAM

pharia-studio-ui

Key Type Default Description
enabled bool `true`
fullnameOverride string `"pharia-studio"`
ingress.annotations object `{}` Annotations for the ingress-resource. This can be used to add ingress controller specific annotations.
ingress.enabled bool `true` Enabled ingress creation
ingress.hostname string `"pharia-studio"` Hostname for the ingress (without domain). The domain is read from global.ingress.ingressDomain. This needs to be changed, if multiple instances are deployed to the same cluster using the same domain.
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
ingress.tls.secretName string `"pharia-studio-tls"` The name of the secret containing the TLS certificate. See also: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
phariaStudioAPISchema string `"http"` Internal cluster communication with pharia-studio-api. This is the default value. https can be set if the internal communication is over https.
resources.limits.cpu string `"100m"`
resources.limits.memory string `"256Mi"`
resources.requests.cpu string `"50m"`
resources.requests.memory string `"256Mi"`

pharia-temporal

Key Type Default Description
pharia-temporal object `{"enabled":false,"temporal":{"fullnameOverride":"pharia-temporal","ingress":{"enabled":false},"server":{"config":{"namespaces":{"create":true,"namespace":[{"name":"pharia-data","retention":"90d"},{"name":"pharia-numinous","retention":"90d"},{"name":"pharia-oauth-gateway","retention":"90d"}]},"numHistoryShards":1024,"persistence":{"default":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"user":""}},"visibility":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"secretName":"","user":""}}}}},"web":{"ingress":{"enabled":false}}}}` Temporal is a workflow orchestration platform that manages long-running business processes. It provides durable execution, fault tolerance, and observability for distributed systems.
enabled bool `false` Set this to true to install the `pharia-temporal` subchart as a dependency.
temporal object `{"fullnameOverride":"pharia-temporal","ingress":{"enabled":false},"server":{"config":{"namespaces":{"create":true,"namespace":[{"name":"pharia-data","retention":"90d"},{"name":"pharia-numinous","retention":"90d"},{"name":"pharia-oauth-gateway","retention":"90d"}]},"numHistoryShards":1024,"persistence":{"default":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"user":""}},"visibility":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"secretName":"","user":""}}}}},"web":{"ingress":{"enabled":false}}}` Set this to override the fully qualified name for Pharia Temporal UI
temporal.ingress object `{"enabled":false}` Ingress configuration for the Temporal server
temporal.ingress.enabled bool `false` Enable ingress creation for the Temporal server API This exposes the Temporal gRPC and HTTP APIs externally
temporal.server object `{"config":{"namespaces":{"create":true,"namespace":[{"name":"pharia-data","retention":"90d"},{"name":"pharia-numinous","retention":"90d"},{"name":"pharia-oauth-gateway","retention":"90d"}]},"numHistoryShards":1024,"persistence":{"default":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"user":""}},"visibility":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"secretName":"","user":""}}}}}` Temporal server configuration
temporal.server.config.namespaces object `{"create":true,"namespace":[{"name":"pharia-data","retention":"90d"},{"name":"pharia-numinous","retention":"90d"},{"name":"pharia-oauth-gateway","retention":"90d"}]}` Temporal namespace configuration
temporal.server.config.namespaces.create bool `true` Whether to create namespaces automatically
temporal.server.config.namespaces.namespace list `[{"name":"pharia-data","retention":"90d"},{"name":"pharia-numinous","retention":"90d"},{"name":"pharia-oauth-gateway","retention":"90d"}]` List of namespaces to create
temporal.server.config.namespaces.namespace[0] object `{"name":"pharia-data","retention":"90d"}` Pharia Data namespace for ETL workflows
temporal.server.config.namespaces.namespace[0].retention string `"90d"` Data retention period for this namespace After this period, completed workflows are automatically deleted
temporal.server.config.namespaces.namespace[1] object `{"name":"pharia-numinous","retention":"90d"}` Pharia Numinous namespace for AI workflows
temporal.server.config.namespaces.namespace[1].retention string `"90d"` Data retention period for this namespace
temporal.server.config.namespaces.namespace[2] object `{"name":"pharia-oauth-gateway","retention":"90d"}` Pharia OAuth Gateway namespace for authentication workflows
temporal.server.config.namespaces.namespace[2].retention string `"90d"` Data retention period for this namespace
temporal.server.config.numHistoryShards int `1024` Number of history shards for Temporal This determines the parallelism for history operations. Higher values provide better performance but require more resources. Must be a power of 2. Default is 1024 for production workloads.
temporal.server.config.persistence object `{"default":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"user":""}},"visibility":{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"secretName":"","user":""}}}` Persistence configuration for Temporal data storage
temporal.server.config.persistence.default object `{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"user":""}}` Default store configuration for Temporal's main data
temporal.server.config.persistence.default.driver string `"sql"` Storage driver type (sql, cassandra, etc.)
temporal.server.config.persistence.default.sql.database string `""` Database name for Temporal's main data
temporal.server.config.persistence.default.sql.driver string `"postgres12"` PostgreSQL driver version
temporal.server.config.persistence.default.sql.existingSecret string `""` Existing secret containing database credentials If provided, the secret should contain keys: username, password
temporal.server.config.persistence.default.sql.host string `""` Database host
temporal.server.config.persistence.default.sql.maxConnLifetime string `"1h"` Maximum lifetime of a database connection
temporal.server.config.persistence.default.sql.maxConns int `20` Maximum number of database connections in the pool
temporal.server.config.persistence.default.sql.maxIdleConns int `20` Maximum number of idle connections in the pool
temporal.server.config.persistence.default.sql.password string `""` Database password Leave empty to use the existingSecret password
temporal.server.config.persistence.default.sql.port int `5432` Database port
temporal.server.config.persistence.default.sql.user string `""` Database username Leave empty to use the existingSecret username
temporal.server.config.persistence.visibility object `{"driver":"sql","sql":{"database":"","driver":"postgres12","existingSecret":"","host":"","maxConnLifetime":"1h","maxConns":20,"maxIdleConns":20,"password":"","port":5432,"secretName":"","user":""}}` Visibility store configuration for Temporal's visibility data This store is used for workflow and execution visibility queries
temporal.server.config.persistence.visibility.driver string `"sql"` Storage driver type (sql, cassandra, etc.)
temporal.server.config.persistence.visibility.sql.database string `""` Database name for Temporal's visibility data
temporal.server.config.persistence.visibility.sql.driver string `"postgres12"` PostgreSQL driver version
temporal.server.config.persistence.visibility.sql.existingSecret string `""` Existing secret containing database credentials If provided, the secret should contain keys: username, password
temporal.server.config.persistence.visibility.sql.host string `""` Database host
temporal.server.config.persistence.visibility.sql.maxConnLifetime string `"1h"` Maximum lifetime of a database connection
temporal.server.config.persistence.visibility.sql.maxConns int `20` Maximum number of database connections in the pool
temporal.server.config.persistence.visibility.sql.maxIdleConns int `20` Maximum number of idle connections in the pool
temporal.server.config.persistence.visibility.sql.password string `""` Database password Leave empty to use the existingSecret password
temporal.server.config.persistence.visibility.sql.port int `5432` Database port
temporal.server.config.persistence.visibility.sql.secretName string `""` Alternative secret name for visibility store Use this if you need different credentials for the visibility store
temporal.server.config.persistence.visibility.sql.user string `""` Database username Leave empty to use the existingSecret username
temporal.web object `{"ingress":{"enabled":false}}` Web UI configuration for Temporal
temporal.web.ingress.enabled bool `false` Enable ingress creation for the Temporal Web UI This provides a web interface to monitor and manage workflows

pharia-transcribe

Key Type Default Description
enabled bool `false` Set this to true to install the pharia-transcribe subchart as a dependency
fullnameOverride string `"pharia-transcribe"`

pharia-translate

Key Type Default Description
enabled bool `true` Set this to true to install the pharia-translate subchart as a dependency
fullnameOverride string `"pharia-translate"`
resources.limits.cpu string `"1"`
resources.limits.memory string `"1Gi"`
resources.requests.cpu string `"100m"`
resources.requests.memory string `"1Gi"`
server.resources.limits."nvidia.com/gpu" int `1`
server.resources.limits.cpu string `"1"`
server.resources.limits.memory string `"64Gi"`
server.resources.requests.cpu string `"100m"`
server.resources.requests.memory string `"64Gi"`
server.tolerations list `[]`
tolerations list `[]`

feature-flags

Key Type Default Description
enabled bool `true` Set this to true to install the feature-flags subchart as a dependency
fullnameOverride string `"feature-flags"`
provider.local.existingConfigMap string `""` Provide an existing ConfigMap with the key "feature-flags.json".

phariaos-manager

Key Type Default Description
applicationsProxy.additionalAllowedOrigins list `[]` Environment variables for the applications proxy.
applicationsProxy.enabled bool `true` Enable usecases (applications) proxy server. It is responsible for redirecting requests into the targeted usecases.
applicationsProxy.ingress.annotations object `{}` Annotations for the ingress-resource. This can be used to add ingress controller specific annotations. Some ingress classes limits body size allowed in requests. Therefore, override the annotations value if the application requires large files to be uploaded. Example for nginx ingress class: `nginx.ingress.kubernetes.io/proxy-body-size: 20m` Some ingress classes limit the timeout for proxy read requests. Therefore, override the annotations value if long-lived requests are required. Example for nginx ingress class: `nginx.ingress.kubernetes.io/proxy-read-timeout: "300"`
applicationsProxy.ingress.enabled bool `true` Enable ingress creation
applicationsProxy.ingress.ingressSubdomain string `"pharia-os-applications"` Hostname for the ingress (without domain). The domain is read from global.ingress.ingressDomain. This needs to be changed, if multiple instances are deployed to the same cluster using the same domain.
applicationsProxy.ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
clusterRole.enabled bool `true` Enable cluster role creation for phariaos-manager. When enabled, the chart will create the necessary ClusterRole and ClusterRoleBinding for hardware discovery and model management. Set to false if you want to use your own cluster role(s). Note: The cluster role(s) must be bound to the phariaos-manager and kserve-controller-manager ServiceAccounts to grant cluster-wide permissions.
clusterRole.enabled bool `true` Enable cluster role creation for phariaos-manager. When enabled, the chart will create the necessary ClusterRole and ClusterRoleBinding for hardware discovery and model management. Set to false if you want to use your own cluster role(s). Note: The cluster role(s) must be bound to the phariaos-manager and kserve-controller-manager ServiceAccounts to grant cluster-wide permissions. See cluster role binding files in charts/phariaos-manager/templates/ and charts/phariaos-manager/charts/kserve/templates/ for required permissions.
databaseConfig.external object `{"existingSecret":""}` Provide an existing database if you want to use an external database
databaseConfig.external.existingSecret string `""` Set this value if a k8s Secret with PostgreSQL values already exists. Make sure that the all the databaseConfig.secretKeys exists in the secret with a valid value.
databaseConfig.secretKeys.databaseNameKey string `"databaseName"` The key in the secret that contains the database name
databaseConfig.secretKeys.hostKey string `"host"` The key in the secret that contains the host of the database
databaseConfig.secretKeys.passwordKey string `"password"` The key in the secret that contains the password of the database
databaseConfig.secretKeys.portKey string `"port"` The key in the secret that contains the port of the database
databaseConfig.secretKeys.userKey string `"user"` The key in the secret that contains the user of the database
enabled bool `true` Set this to true to install the phariaos-manager subchart as a dependency
fullnameOverride string `"pharia-os-manager"` Set this to override the full name of the phariaos-manager
ingress.annotations object `{}` Annotations for the ingress-resource. This can be used to add ingress controller specific annotations.
ingress.enabled bool `true` Enabled ingress creation
ingress.ingressSubdomain string `"pharia-os-manager"` Hostname for the ingress (without domain). The domain is read from global.ingress.ingressDomain. This needs to be changed, if multiple instances are deployed to the same cluster using the same domain.
kserve.clusterRole object `{"enabled":true}` Cluster role configuration for KServe (references phariaos-manager.clusterRole).
kserve.clusterRole.enabled bool `true` Enable cluster role creation for phariaos-manager. When enabled, the chart will create the necessary ClusterRole and ClusterRoleBinding for hardware discovery and model management. Set to false if you want to use your own cluster role(s). Note: The cluster role(s) must be bound to the phariaos-manager and kserve-controller-manager ServiceAccounts to grant cluster-wide permissions. See cluster role binding files in charts/phariaos-manager/templates/ and charts/phariaos-manager/charts/kserve/templates/ for required permissions.
kserve.controller.serviceAccount.create bool `true` Specifies whether a service account should be created
kserve.controller.serviceAccount.name string `""` The name of the service account to use. If not set and create is true, a name is generated using the fullname template
kserve.enabled bool `true` Enable Dynamic Model Management. Model deployment is done using KServe.
kserve.storage object `{"http":{"existingSecret":"","secretKeys":{"httpToken":"http-token"},"token":""},"huggingFace":{"enabled":false,"existingSecret":"","secretKeys":{"huggingFaceToken":"huggingface-token"},"token":""},"s3":{"accessKeyId":"","enabled":false,"endpoint":"","existingSecret":"","region":"","secretAccessKey":"","secretKeys":{"accessKeyId":"access-key-id","endpoint":"endpoint","region":"region","secretAccessKey":"secret-access-key"}}}` Model weights downloading configuration for model deployment.
kserve.storage.http object `{"existingSecret":"","secretKeys":{"httpToken":"http-token"},"token":""}` HTTP storage configuration to download Aleph Alpha model weights from Aleph Alpha artifactory.
kserve.storage.http.existingSecret string `""` Existing secret to use for HTTP storage.
kserve.storage.http.secretKeys object `{"httpToken":"http-token"}` Secret keys for HTTP storage.
kserve.storage.http.token string `""` If not using existing secret, provide token for HTTP storage.
kserve.storage.huggingFace object `{"enabled":false,"existingSecret":"","secretKeys":{"huggingFaceToken":"huggingface-token"},"token":""}` HuggingFace storage configuration for model weights downloading.
kserve.storage.huggingFace.enabled bool `false` Enable HuggingFace storage configuration for model weights downloading.
kserve.storage.huggingFace.existingSecret string `""` Existing secret to use for HuggingFace storage.
kserve.storage.huggingFace.secretKeys object `{"huggingFaceToken":"huggingface-token"}` Secret keys for HuggingFace storage.
kserve.storage.huggingFace.token string `""` If not using existing secret, provide token for HuggingFace storage.
kserve.storage.s3.accessKeyId string `""` If not using existing secret, provide access key id for S3 storage.
kserve.storage.s3.enabled bool `false` Enable S3 storage configuration for model weights downloading.
kserve.storage.s3.endpoint string `""` If not using existing secret, provide endpoint for S3 storage.
kserve.storage.s3.existingSecret string `""` Existing secret to use for S3 storage.
kserve.storage.s3.region string `""` If not using existing secret, provide region for S3 storage.
kserve.storage.s3.secretAccessKey string `""` If not using existing secret, provide secret access key for S3 storage.
kserve.storage.s3.secretKeys object `{"accessKeyId":"access-key-id","endpoint":"endpoint","region":"region","secretAccessKey":"secret-access-key"}` Secret keys for S3 storage.
kserve.storage.s3.secretKeys.accessKeyId string `"access-key-id"` The secret key for access key id of the S3 storage.
kserve.storage.s3.secretKeys.endpoint string `"endpoint"` The secret key for endpoint of the S3 storage.
kserve.storage.s3.secretKeys.region string `"region"` The secret key for region of the S3 storage.
kserve.storage.s3.secretKeys.secretAccessKey string `"secret-access-key"` The secret key for secret access key of the S3 storage.
postgresql.auth.existingSecret string `""`
postgresql.auth.password string `""` If internal PostgreSQL is used, either password or existingSecret, has to be provided for setup of application authentication
postgresql.enabled bool `true` This is used to indicate whether the internal PostgreSQL should be used or not.
serviceAccount.create bool `true` Specifies whether a service account should be created
serviceAccount.name string `""` The name of the service account to use. If not set and create is true, a name is generated using the fullname template
serviceMonitor.enabled bool `false` Enable Prometheus service monitor for phariaos-manager
usecase.annotations object `{}` Annotations for the Deployment resource.
usecase.container object `{"securityContext":{"readOnlyRootFilesystem":false},"volumeMounts":[]}` Security context for the usecase container.
usecase.container.volumeMounts list `[]` Custom volume mounts for usecase container
usecase.enabled bool `true` Enable usecases creation and deployment in phariaos-manager API.
usecase.imagePullSecretName string `""` DEPRECATED: Use `imagePullSecrets` instead. This will be removed in a future release.
usecase.imagePullSecrets list `[]` Secrets to authenticate container registry to pull/verify usecase images. Make sure the secrets are in the Release namespace!
usecase.pod object `{"securityContext":{"runAsGroup":2024,"runAsUser":2024},"volumes":[]}` Security context for the usecase pod.
usecase.pod.securityContext.runAsGroup int `2024` Run as group with provided gid
usecase.pod.securityContext.runAsUser int `2024` Run as user with provided uid
usecase.pod.volumes list `[]` Custom volumes for usecase pods
usecase.serviceMonitor.enabled bool `false` Enable Prometheus service monitor for usecases deployed by phariaos-manager

phariaos-ui

Key Type Default Description
app.enableCredentialManagement bool `true` Set this to enable API Credential Management
enabled bool `true` Set this to true to install the phariaos-ui subchart as a dependency
fullnameOverride string `"pharia-os"` Set this to override the full name of the phariaos-ui
ingress.annotations object `{}` Annotations for the ingress-resource. This can be used to add ingress controller specific annotations.
ingress.enabled bool `true` Enabled ingress creation
ingress.ingressSubdomain string `"pharia-os"` Hostname for the ingress (without domain). The domain is read from global.ingress.ingressDomain. This needs to be changed, if multiple instances are deployed to the same cluster using the same domain.
ingress.tls.enabled bool `true` Enable TLS configuration for this Ingress
ingress.tls.secretName string `"pharia-os-tls"` The name of the secret containing the TLS certificate. See also: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls

Maintainers

Name Email Url
PhariaAI phariaai@aleph-alpha.com