No introduction found. Create it?
vaultwarden from bjw-s-labs is more popular with 14 repositories.
Install with:
helm repo add app-template oci://ghcr.io/bjw-s-labs/helm/app-template
helm install vaultwarden app-template/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vaultwarden | drag0n141/home-ops | 41 | 4.2.0 | 7 days ago |
vaultwarden | ishioni/homelab-ops | 135 | 4.2.0 | 21 days ago |
vaultwarden | auricom/home-ops | 194 | 3.7.3 | a month ago |
See the most popular values for this chart:
Key | Types |
---|---|
controllers.vaultwarden.containers.app.env.DOMAIN (11) https://vault.${SECRET_DOMAIN} | string |
string, boolean | |
string | |
string | |
controllers.vaultwarden.containers.app.env.SMTP_FROM (7) vaultwarden@${SECRET_DOMAIN} | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.SMTP_HOST (6) docker-postfix-mail.email.svc.cluster.local | string |
string, number | |
string | |
string | |
string, boolean | |
string, boolean | |
boolean, string | |
string | |
number | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.env.DATABASE_URL (1) postgresql://vaultwarden@vaultwarden-postgres-17-rw.security.svc:5432/vaultwarden?sslrootcert=/certs/postgres/serving/ca.crt&sslcert=/certs/postgres/user/tls.crt&sslkey=/certs/postgres/user/tls.key&sslmode=verify-full | string |
boolean | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.env.EXPERIMENTAL_CLIENT_FEATURE_FLAGS (1) ssh-key-vault-item,ssh-agent | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.IP_HEADER (1) X-Forwarded-For | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.PUSH_INSTALLATION_ID (1) ${push_installation_id} | string |
controllers.vaultwarden.containers.app.env.PUSH_INSTALLATION_KEY (1) ${push_installation_key} | string |
string | |
boolean | |
string | |
string | |
string | |
number | |
controllers.vaultwarden.containers.app.env.SSO_AUTHORITY (1) https://auth.${PUBLIC_DOMAIN}/application/o/vaultwarden/ | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.SSO_SCOPES (1) email profile offline_access | string |
string | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.image.repository (11) vaultwarden/server | string |
controllers.vaultwarden.containers.app.image.tag (11) 1.34.3@sha256:84fd8a47f58d79a1ad824c27be0a9492750c0fa5216b35c749863093bfa3c3d7 | string |
controllers.vaultwarden.containers.app.envFrom[].secretRef.name (10) vaultwarden-secret | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
boolean | |
number | |
number | |
number | |
string | |
controllers.vaultwarden.containers.vaultwarden.env.ADMIN_TOKEN (1) ${VAULTWARDEN_ADMIN_TOKEN_HASHED} | string |
controllers.vaultwarden.containers.vaultwarden.env.DOMAIN (1) https://vaultwarden.${SECRET_DOMAIN} | string |
string | |
boolean | |
string | |
string | |
string | |
controllers.vaultwarden.containers.vaultwarden.env.SMTP_HOST (1) ${SMTP_MAIL_SERVER} | string |
string | |
number | |
string | |
string | |
number | |
string | |
string | |
string | |
number | |
string | |
controllers.vaultwarden.containers.vaultwarden.image.repository (1) vaultwarden/server | string |
string | |
boolean | |
boolean | |
boolean | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.annotations."secret.reloader.stakater.com/reload" (2) vaultwarden-db-secret | string |
string | |
controllers.vaultwarden.initContainers.init-db.image.repository (5) ghcr.io/home-operations/postgres-init | string |
number, string | |
string | |
controllers.vaultwarden.initContainers.01-init-branding.args[] (1) - mkdir -p /data/templates; mc alias set s3 https://s3.t0m.co '' '' --api S3v4; mc cp --recursive s3/t0m-public/vaultwarden/templates/ /data/templates/ | string |
string | |
string | |
controllers.vaultwarden.initContainers.01-init-branding.image.tag (1) RELEASE.2025-05-21T01-59-54Z@sha256:09f93f534cde415d192bb6084dd0e0ddd1715fb602f8a922ad121fd2bf0f8b44 | string |
string | |
string | |
controllers.vaultwarden.initContainers.01-init-db.image.repository (1) ghcr.io/home-operations/postgres-init | string |
number | |
number | |
string | |
number | |
number | |
boolean | |
string | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.pod.priorityClassName (1) system-cluster-critical | string |
string | |
number | |
controllers.vaultwarden.pod.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
string | |
number | |
string | |
string | |
string | |
controllers.${APP}.containers.app.env.TZ (1) ${TIMEZONE} | string |
string | |
controllers.${APP}.containers.app.image.repository (1) ghcr.io/dani-garcia/vaultwarden | string |
controllers.${APP}.containers.app.image.tag (1) 1.34.3@sha256:84fd8a47f58d79a1ad824c27be0a9492750c0fa5216b35c749863093bfa3c3d7 | string |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
string | |
string | |
number | |
string | |
number | |
boolean | |
number | |
string | |
number | |
string | |
string | |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_FAILURE_CURL_OPTIONS (1) -H 'Content-Type: application/json' -d '{"content":"❌ Vaultwarden backup failed!"}'
| string |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_FAILURE.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_PING_URL | string |
string | |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_SUCCESS_CURL_OPTIONS (1) -H 'Content-Type: application/json' -d '{"content":"✅ Vaultwarden backup completed successfully."}'
| string |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_SUCCESS.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_PING_URL | string |
string | |
controllers.${APP}.containers.backup.env.RCLONE_CONFIG (1) /data/rclone.conf | string |
controllers.${APP}.containers.backup.env.RCLONE_REMOTE_DIR (1) /Vaultwarden-k3s/ | string |
string | |
string | |
string | |
boolean | |
controllers.${APP}.containers.backup.env.ZIP_PASSWORD.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_ZIP_PASSWORD | string |
string | |
string | |
controllers.${APP}.containers.backup.image.repository (1) ghcr.io/ttionya/vaultwarden-backup | string |
controllers.${APP}.containers.backup.image.tag (1) 1.25.0@sha256:ad20dbdc342a334c08bf31d0d036daabdc76d00d8d593d0faf25817318275649 | string |
string | |
string | |
string | |
string | |
number | |
boolean | |
boolean | |
number | |
controllers.${APP}.type (1) deployment | string |
number | |
boolean | |
number | |
service.app.controller (9) vaultwarden | string |
service.app.sessionAffinity (1) ClientIP | string |
number | |
service.vaultwarden.controller (2) vaultwarden | string |
number | |
ingress.app.hosts[].host (8) vault.${SECRET_DOMAIN} | string |
string | |
string | |
number, string | |
string | |
ingress.app.className (7) external | string |
ingress.app.tls[].hosts[] (5) - {{ .Release.Name }}.${SECRET_EXTERNAL_DOMAIN} | string |
ingress.app.tls[].secretName (3) ${SECRET_DOMAIN/./-}-tls | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (4) external.${SECRET_DOMAIN} | string |
string | |
string | |
ingress.app.annotations."gethomepage.dev/icon" (3) vaultwarden.png | string |
string | |
ingress.app.annotations."gethomepage.dev/description" (2) Open-source password manager compatible with Bitwarden clients. | string |
ingress.app.annotations."gethomepage.dev/pod-selector" (2) app in (
vaultwarden
) | string |
ingress.app.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2) networking-traefik-middleware-chain-no-auth@kubernetescrd | string |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.app.annotations."gethomepage.dev/siteMonitor" (1) http://${APP}.security.svc.cluster.local:80 | string |
string | |
boolean | |
ingress.admin.hosts[].host (3) ${app_url} | string |
string | |
string | |
string | |
ingress.admin.hosts[].paths[].pathType (1) ImplementationSpecific | string |
ingress.admin.tls[].hosts[] (3) - ${app_url} | string |
ingress.admin.tls[].secretName (3) ${certificate_name} | string |
ingress.admin.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2) networking-traefik-middleware-chain-tinyauth@kubernetescrd | string |
string | |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://$host/outpost.goauthentik.io/start?rd=$scheme://$http_host$escaped_request_uri | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host;
| string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://ak-outpost-gabernetes.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
string | |
boolean | |
ingress.admin.className (1) traefik-internal | string |
boolean | |
ingress.vaultwarden.hosts[].host (1) ${app_url} | string |
string | |
string | |
string | |
ingress.vaultwarden.tls[].hosts[] (1) - ${app_url} | string |
ingress.vaultwarden.tls[].secretName (1) ${certificate_name} | string |
persistence.config.existingClaim (6) vaultwarden | string |
string | |
boolean | |
persistence.data.accessMode (3) ReadWriteOnce | string |
persistence.data.existingClaim (3) vaultwarden | string |
string | |
persistence.data.storageClass (3) longhorn-ssd | string |
boolean | |
string | |
boolean | |
persistence.data.type (2) persistentVolumeClaim | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
persistence.env.name (1) vaultwarden-secret | string |
persistence.env.type (1) secret | string |
persistence.postgres-serving-cert.advancedMounts.vaultwarden.app[].path (1) /certs/postgres/serving | string |
number | |
string | |
string | |
persistence.postgres-serving-cert.name (1) vaultwarden-postgres-17-serving-cert | string |
string | |
persistence.postgres-user-cert.advancedMounts.vaultwarden.app[].path (1) /certs/postgres/user | string |
number | |
persistence.postgres-user-cert.items[].key (1) tls.crt | string |
persistence.postgres-user-cert.items[].path (1) tls.crt | string |
persistence.postgres-user-cert.name (1) vaultwarden-postgres-vaultwarden-user | string |
string | |
number | |
boolean | |
number | |
number | |
string | |
route.app.hostnames[] (2) - passwords.${SECRET_DOMAIN} | string |
route.app.parentRefs[].name (2) external | string |
string | |
string | |
route.app.rules[].backendRefs[].name (1) vaultwarden | string |
number | |
boolean | |
route.main.hostnames[] (1) - vaultwarden.${SECRET_DOMAIN} | string |
route.main.kind (1) HTTPRoute | string |
string | |
route.main.parentRefs[].name (1) internal | string |
string | |
string | |
route.main.rules[].backendRefs[].name (1) vaultwarden | string |
number | |
string | |
string |