No introduction found. Create it?
Install with:
helm repo add bjw-s https://bjw-s.github.io/helm-charts/
helm install vaultwarden bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vaultwarden | auricom/home-ops | 125 | 2.3.0 | 2 days ago |
vaultwarden | Diaoul/home-ops | 55 | 2.3.0 | 8 days ago |
vaultwarden | toboshii/home-ops | 241 | 0.2.2 | 10 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
boolean | |
ingress.main.hosts[].host (16) vault.${SECRET_DOMAIN} | string |
string | |
string, number | |
string | |
ingress.main.hosts[].paths[].pathType (12) Prefix | string |
number | |
ingress.main.tls[].hosts[] (16) - vault.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (7) vaultwarden-tls | string |
string | |
string | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (5) letsencrypt-production | string |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (3) dyn.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.main.annotations."gethomepage.dev/description" (1) Open Source Password Manager. | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.main.anotations."external-dns.alpha.kubernetes.io/target" (1) services.${SECRET_DOMAIN}. | string |
string | |
boolean | |
ingress.admin.hosts[].host (4) vault.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.admin.tls[].hosts[] (4) - vault.${SECRET_DOMAIN} | string |
ingress.admin.tls[].secretName (3) vaultwarden-tls | string |
string | |
ingress.admin.annotations."nginx.ingress.kubernetes.io/whitelist-source-range" (2) 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16 | string |
string | |
ingress.admin.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
ingress.admin.annotations."nginx.ingress.kubernetes.io/custom-http-errors" (1) 403,404,500,501,502,503 | string |
string | |
number | |
boolean | |
number | |
boolean | |
persistence.config.existingClaim (10) vaultwarden-config-v1 | string |
string | |
string | |
persistence.config.path (1) /mnt/raid/nfs/vaultwarden | string |
boolean | |
persistence.config.server (1) ${NFS_HOST} | string |
string | |
string | |
boolean | |
persistence.data.existingClaim (2) vaultwarden-data | string |
persistence.data.accessMode (1) ReadWriteOnce | string |
string | |
string | |
string | |
image.repository (10) vaultwarden/server | string |
image.tag (10) 1.30.1 | string |
image.pullPolicy (2) IfNotPresent | string |
controllers.main.containers.main.env.DOMAIN (8) https://vaultwarden.${DOMAIN} | string |
boolean, string | |
string | |
number | |
controllers.main.containers.main.env.TZ (7) ${TIMEZONE} | string |
string | |
boolean, string | |
string | |
string | |
string | |
controllers.main.containers.main.env.ATTACHMENTS_FOLDER (4) data/attachments | string |
controllers.main.containers.main.env.ICON_CACHE_FOLDER (4) data/icon_cache | string |
string | |
string | |
controllers.main.containers.main.env.SMTP_FROM (4) admin@${DOMAIN} | string |
string | |
number | |
boolean | |
boolean | |
boolean | |
boolean | |
boolean | |
number | |
boolean | |
string | |
string | |
string | |
string | |
string, boolean | |
controllers.main.containers.main.env.ADMIN_TOKEN (1) ${VAULTWARDEN_ADMIN_TOKEN} | string |
number | |
string | |
string | |
string | |
controllers.main.containers.main.env.IP_HEADER (1) X-Envoy-External-Address | string |
string | |
string | |
string | |
controllers.main.containers.main.env.SIGNUPS_DOMAINS_WHITELIST.valueFrom.secretKeyRef.key (1) SIGNUPS_DOMAINS_WHITELIST | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.main.containers.main.env.YUBICO_CLIENT_ID (1) ${VAULTWARDEN_YUBICO_CLIENT_ID} | string |
string | |
string | |
controllers.main.containers.main.env.YUBICO_SECRET_KEY (1) ${VAULTWARDEN_YUBICO_SECRET_KEY} | string |
controllers.main.containers.main.image.repository (8) ghcr.io/dani-garcia/vaultwarden | string |
string | |
controllers.main.containers.main.envFrom[].secretRef.name (7) vaultwarden-secret | string |
string | |
string | |
string | |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
controllers.main.annotations."secret.reloader.stakater.com/reload" (1) vaultwarden-secret | string |
controllers.main.type (3) statefulset | string |
controllers.main.initContainers.init-db.envFrom[].secretRef.name (2) vaultwarden-secret | string |
controllers.main.initContainers.init-db.image.repository (2) ghcr.io/auricom/postgres-init | string |
controllers.main.initContainers.init-db.image.tag (2) 15.5@sha256:9b1b80d8101d3f1c73ef13b90dff2ab3bc855bd79ebcd334cba57db391ce6db0 | string |
string | |
number | |
string | |
number | |
number | |
number | |
string | |
string | |
string | |
string | |
string | |
number | |
controllers.main.strategy (1) Recreate | string |
env.DATA_FOLDER (7) config | string |
env.DOMAIN (7) https://vault.${SECRET_DOMAIN} | string |
boolean, string | |
env.WEBSOCKET_ADDRESS (6) 0.0.0.0 | string |
boolean | |
env.SMTP_FROM_NAME (5) Vaultwarden | string |
number | |
env.SMTP_SSL (5) true | string, boolean |
env.TZ (5) ${TIMEZONE} | string |
number | |
env.SMTP_HOST (4) smtp-relay.network.svc.cluster.local | string |
env.DATABASE_URL.valueFrom.secretKeyRef.key (3) POSTGRES_URL | string |
string | |
env.DATABASE_URL (1) postgres://$(A_DATABASE_USERNAME):$(A_DATABASE_PASSWORD)@pg-vaultwarden-rw:5432/vaultwarden | string |
env.SMTP_FROM (3) vault@${EXTERNAL_DOMAIN} | string |
env.ATTACHMENTS_FOLDER (2) config/attachments | string |
env.ICON_CACHE_FOLDER (2) config/icon_cache | string |
string | |
env.A_DATABASE_PASSWORD.valueFrom.secretKeyRef.name (1) pg-vaultwarden-app | string |
string | |
env.A_DATABASE_USERNAME.valueFrom.secretKeyRef.name (1) pg-vaultwarden-app | string |
string | |
string | |
env.ADMIN_TOKEN (1) ${SECRET_VAULTWARDEN_ADMIN_TOKEN} | string |
boolean | |
boolean | |
boolean | |
boolean | |
boolean | |
number | |
boolean | |
env.SENDS_FOLDER (1) config/sends | string |
string | |
string | |
env.SMTP_PASSWORD (1) ${SECRET_SENDGRID_API_KEY} | string |
string | |
env.SMTP_USERNAME (1) apikey | string |
envFrom[].secretRef.name (5) vaultwarden-secret | string |
string | |
string | |
string | |
string | |
controller.type (3) statefulset | string |
number | |
string | |
number | |
number | |
number | |
podSecurityContext.fsGroupChangePolicy (3) OnRootMismatch | string |
number | |
number | |
number | |
initContainers.01-init-db.image (2) ghcr.io/onedr0p/postgres-initdb:14.8@sha256:0141cf427c47f2d534711a3f9e8c5f9008bc6b585463ccd9288cf0f027e20deb | string |
initContainers.01-init-db.env[].name (1) POSTGRES_HOST | string |
initContainers.01-init-db.env[].value (1) ${POSTGRES_RW_URL} | string |
initContainers.01-init-db.env[].valueFrom.secretKeyRef.key (1) password | string |
initContainers.01-init-db.env[].valueFrom.secretKeyRef.name (1) postgres-superuser | string |
initContainers.01-init-db.envFrom[].secretRef.name (1) vaultwarden-secret | string |
initContainers.01-init-db.imagePullPolicy (1) IfNotPresent | string |
initContainers.init-db.envFrom[].secretRef.name (1) vaultwarden-secret | string |
initContainers.init-db.image (1) ghcr.io/onedr0p/postgres-init:16.1 | string |
strategy.type (2) Recreate | string |
volumeClaimTemplates[].accessMode (2) ReadWriteOnce | string |
string | |
string | |
string | |
volumeClaimTemplates[].storageClass (2) ceph-block | string |
global.nameOverride (1) vaultwarden | string |
string | |
upgradeStrategy (1) recreate | string |