No introduction found. Create it?
vaultwarden from bjw-s-labs is more popular with 12 repositories.
Install with:
helm repo add app-template oci://ghcr.io/bjw-s-labs/helm/app-template
helm install vaultwarden app-template/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vaultwarden | auricom/home-ops | 191 | 3.7.3 | a month ago |
vaultwarden | drag0n141/home-ops | 37 | 3.7.3 | 2 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
controllers.vaultwarden.containers.app.env.DOMAIN (8) https://bitwarden.${SECRET_DOMAIN} | string |
boolean, string | |
string | |
controllers.vaultwarden.containers.app.env.SMTP_FROM (5) ${SECRET_SMTP_SENDER} | string |
string | |
controllers.vaultwarden.containers.app.env.SMTP_HOST (5) smtp-relay.default.svc.cluster.local | string |
number, string | |
string | |
string | |
string | |
string | |
string, boolean | |
boolean, string | |
string | |
number | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.env.DATABASE_URL (1) postgresql://vaultwarden@vaultwarden-postgres-17-rw.security.svc:5432/vaultwarden?sslrootcert=/certs/postgres/serving/ca.crt&sslcert=/certs/postgres/user/tls.crt&sslkey=/certs/postgres/user/tls.key&sslmode=verify-full | string |
boolean | |
string | |
string | |
controllers.vaultwarden.containers.app.env.EXPERIMENTAL_CLIENT_FEATURE_FLAGS (1) ssh-key-vault-item,ssh-agent | string |
controllers.vaultwarden.containers.app.env.IP_HEADER (1) X-Forwarded-For | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.PUSH_INSTALLATION_ID (1) ${push_installation_id} | string |
controllers.vaultwarden.containers.app.env.PUSH_INSTALLATION_KEY (1) ${push_installation_key} | string |
string | |
boolean | |
boolean | |
string | |
number | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.image.repository (8) ghcr.io/dani-garcia/vaultwarden | string |
controllers.vaultwarden.containers.app.image.tag (8) 1.33.2@sha256:87edb99945da91bd7504ac1435495595af2e89ad2c7adc151ae5bf091ec8baf2 | string |
controllers.vaultwarden.containers.app.envFrom[].secretRef.name (7) vaultwarden-secret | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
boolean | |
string | |
boolean | |
string | |
boolean | |
number | |
number | |
number | |
string | |
string | |
controllers.vaultwarden.annotations."secret.reloader.stakater.com/reload" (1) vaultwarden-db-secret | string |
number | |
string | |
number | |
boolean | |
number | |
string | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.pod.priorityClassName (1) system-cluster-critical | string |
string | |
number | |
controllers.vaultwarden.pod.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
string | |
string | |
controllers.vaultwarden.initContainers.init-db.image.repository (2) ghcr.io/home-operations/postgres-init | string |
number | |
number | |
string | |
string | |
controllers.${APP}.containers.app.env.TZ (1) ${TIMEZONE} | string |
string | |
controllers.${APP}.containers.app.image.repository (1) ghcr.io/dani-garcia/vaultwarden | string |
controllers.${APP}.containers.app.image.tag (1) 1.33.2@sha256:87edb99945da91bd7504ac1435495595af2e89ad2c7adc151ae5bf091ec8baf2 | string |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
string | |
string | |
number | |
string | |
number | |
boolean | |
number | |
string | |
number | |
string | |
string | |
controllers.${APP}.containers.backup.env.PING_URL.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_PING_URL | string |
string | |
controllers.${APP}.containers.backup.env.RCLONE_CONFIG (1) /data/rclone.conf | string |
controllers.${APP}.containers.backup.env.RCLONE_REMOTE_DIR (1) /Vaultwarden-k3s/ | string |
string | |
string | |
string | |
boolean | |
controllers.${APP}.containers.backup.env.ZIP_PASSWORD.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_ZIP_PASSWORD | string |
string | |
string | |
controllers.${APP}.containers.backup.image.repository (1) ghcr.io/ttionya/vaultwarden-backup | string |
controllers.${APP}.containers.backup.image.tag (1) 1.24.2@sha256:72cb08f34bdd866104839cb92c37262f7066cbaa79868547b045966d23270a23 | string |
string | |
string | |
string | |
string | |
number | |
boolean | |
boolean | |
number | |
controllers.${APP}.type (1) deployment | string |
service.app.controller (8) vaultwarden | string |
number | |
boolean | |
number | |
service.app.sessionAffinity (1) ClientIP | string |
number | |
service.vaultwarden.controller (1) vaultwarden | string |
number | |
ingress.app.hosts[].host (5) bitwarden.${SECRET_DOMAIN} | string |
string | |
string | |
string, number | |
string | |
ingress.app.className (4) external | string |
ingress.app.tls[].hosts[] (4) - bitwarden.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (2) ${SECRET_DOMAIN/./-}-production-tls | string |
boolean | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (2) internal.${SECRET_DOMAIN_INTERNAL} | string |
ingress.app.annotations."gethomepage.dev/description" (2) Open-source password manager compatible with Bitwarden clients. | string |
string | |
string | |
ingress.app.annotations."gethomepage.dev/icon" (2) vaultwarden.png | string |
string | |
ingress.app.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2) networking-traefik-middleware-chain-no-auth@kubernetescrd | string |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.app.annotations."gethomepage.dev/pod-selector" (1) app in (
vaultwarden
) | string |
string | |
string | |
ingress.admin.hosts[].host (3) ${app_url} | string |
string | |
string | |
string | |
ingress.admin.tls[].hosts[] (3) - ${app_url} | string |
ingress.admin.tls[].secretName (3) ${certificate_name} | string |
ingress.admin.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2) networking-traefik-middleware-chain-authelia@kubernetescrd | string |
string | |
ingress.admin.annotations."external-dns.alpha.kubernetes.io/target" (1) internal.${SECRET_DOMAIN_INTERNAL} | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://$host/outpost.goauthentik.io/start?rd=$scheme://$http_host$escaped_request_uri | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host;
| string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://ak-outpost-gabernetes.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
string | |
boolean | |
ingress.admin.className (1) traefik-internal | string |
boolean | |
ingress.vaultwarden.hosts[].host (1) ${app_url} | string |
string | |
string | |
string | |
ingress.vaultwarden.tls[].hosts[] (1) - ${app_url} | string |
ingress.vaultwarden.tls[].secretName (1) ${certificate_name} | string |
persistence.config.existingClaim (5) vaultwarden | string |
string | |
boolean | |
persistence.data.accessMode (3) ReadWriteOnce | string |
string | |
persistence.data.storageClass (3) longhorn-ssd | string |
boolean | |
boolean | |
persistence.data.type (2) persistentVolumeClaim | string |
string | |
persistence.data.existingClaim (1) vaultwarden | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
persistence.env.name (1) vaultwarden-secret | string |
persistence.env.type (1) secret | string |
persistence.postgres-serving-cert.advancedMounts.vaultwarden.app[].path (1) /certs/postgres/serving | string |
number | |
string | |
string | |
persistence.postgres-serving-cert.name (1) vaultwarden-postgres-17-serving-cert | string |
string | |
persistence.postgres-user-cert.advancedMounts.vaultwarden.app[].path (1) /certs/postgres/user | string |
number | |
persistence.postgres-user-cert.items[].key (1) tls.crt | string |
persistence.postgres-user-cert.items[].path (1) tls.crt | string |
persistence.postgres-user-cert.name (1) vaultwarden-postgres-vaultwarden-user | string |
string | |
number | |
boolean | |
number | |
number | |
string | |
route.app.hostnames[] (2) - passwords.${SECRET_DOMAIN} | string |
route.app.parentRefs[].name (2) external | string |
string | |
string | |
number | |
string | |
route.app.rules[].backendRefs[].name (1) vaultwarden | string |