No introduction found. Create it?
vaultwarden from bjw-s-labs is more popular with 13 repositories.
Install with:
helm repo add app-template oci://ghcr.io/bjw-s-labs/helm/app-template
helm install vaultwarden app-template/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vaultwarden | drag0n141/home-ops | 40 | 4.1.2 | 6 days ago |
vaultwarden | auricom/home-ops | 193 | 3.7.3 | 22 days ago |
vaultwarden | ishioni/homelab-ops | 135 | 4.1.2 | a month ago |
See the most popular values for this chart:
Key | Types |
---|---|
controllers.vaultwarden.containers.app.env.DOMAIN (11) https://vault.${SECRET_DOMAIN} | string |
boolean, string | |
string | |
string | |
controllers.vaultwarden.containers.app.env.SMTP_FROM (7) vaultwarden@${SECRET_DOMAIN} | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.SMTP_HOST (6) smtp-relay.network.svc.cluster.local | string |
number, string | |
string | |
string | |
boolean, string | |
string, boolean | |
boolean, string | |
string | |
number | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.env.DATABASE_URL (1) postgresql://vaultwarden@vaultwarden-postgres-17-rw.security.svc:5432/vaultwarden?sslrootcert=/certs/postgres/serving/ca.crt&sslcert=/certs/postgres/user/tls.crt&sslkey=/certs/postgres/user/tls.key&sslmode=verify-full | string |
boolean | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.env.EXPERIMENTAL_CLIENT_FEATURE_FLAGS (1) ssh-key-vault-item,ssh-agent | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.IP_HEADER (1) X-Forwarded-For | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.PUSH_INSTALLATION_ID (1) ${push_installation_id} | string |
controllers.vaultwarden.containers.app.env.PUSH_INSTALLATION_KEY (1) ${push_installation_key} | string |
string | |
boolean | |
string | |
string | |
string | |
number | |
controllers.vaultwarden.containers.app.env.SSO_AUTHORITY (1) https://auth.${PUBLIC_DOMAIN}/application/o/vaultwarden/ | string |
string | |
string | |
controllers.vaultwarden.containers.app.env.SSO_SCOPES (1) email profile offline_access | string |
string | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.image.repository (11) vaultwarden/server | string |
controllers.vaultwarden.containers.app.image.tag (11) 1.34.1@sha256:48267ea14d8649b2e553a5fe290c40b5dd94d54e9a24b26ae7134a75a659695f | string |
controllers.vaultwarden.containers.app.envFrom[].secretRef.name (10) vaultwarden-secret | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
boolean | |
number | |
number | |
number | |
string | |
string | |
controllers.vaultwarden.annotations."secret.reloader.stakater.com/reload" (2) vaultwarden-db-secret | string |
number | |
string | |
number | |
number | |
boolean | |
string | |
string | |
string | |
string | |
string | |
controllers.vaultwarden.pod.priorityClassName (1) system-cluster-critical | string |
string | |
number | |
controllers.vaultwarden.pod.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
string | |
string | |
controllers.vaultwarden.initContainers.init-db.image.repository (4) ghcr.io/home-operations/postgres-init | string |
string, number | |
controllers.vaultwarden.initContainers.01-init-branding.args[] (1) - mkdir -p /data/templates; mc alias set s3 https://s3.t0m.co '' '' --api S3v4; mc cp --recursive s3/t0m-public/vaultwarden/templates/ /data/templates/ | string |
string | |
string | |
controllers.vaultwarden.initContainers.01-init-branding.image.tag (1) RELEASE.2025-05-21T01-59-54Z@sha256:09f93f534cde415d192bb6084dd0e0ddd1715fb602f8a922ad121fd2bf0f8b44 | string |
string | |
string | |
controllers.vaultwarden.initContainers.01-init-db.image.repository (1) ghcr.io/home-operations/postgres-init | string |
number | |
string | |
string | |
number | |
string | |
controllers.${APP}.containers.app.env.TZ (1) ${TIMEZONE} | string |
string | |
controllers.${APP}.containers.app.image.repository (1) ghcr.io/dani-garcia/vaultwarden | string |
controllers.${APP}.containers.app.image.tag (1) 1.34.1@sha256:48267ea14d8649b2e553a5fe290c40b5dd94d54e9a24b26ae7134a75a659695f | string |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
string | |
string | |
number | |
string | |
number | |
boolean | |
number | |
string | |
number | |
string | |
string | |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_FAILURE_CURL_OPTIONS (1) -H 'Content-Type: application/json' -d '{"content":"❌ Vaultwarden backup failed!"}'
| string |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_FAILURE.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_PING_URL | string |
string | |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_SUCCESS_CURL_OPTIONS (1) -H 'Content-Type: application/json' -d '{"content":"✅ Vaultwarden backup completed successfully."}'
| string |
controllers.${APP}.containers.backup.env.PING_URL_WHEN_SUCCESS.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_PING_URL | string |
string | |
controllers.${APP}.containers.backup.env.RCLONE_CONFIG (1) /data/rclone.conf | string |
controllers.${APP}.containers.backup.env.RCLONE_REMOTE_DIR (1) /Vaultwarden-k3s/ | string |
string | |
string | |
string | |
boolean | |
controllers.${APP}.containers.backup.env.ZIP_PASSWORD.valueFrom.secretKeyRef.key (1) VAULTWARDEN_BACKUP_ZIP_PASSWORD | string |
string | |
string | |
controllers.${APP}.containers.backup.image.repository (1) ghcr.io/ttionya/vaultwarden-backup | string |
controllers.${APP}.containers.backup.image.tag (1) 1.24.4@sha256:cc3f7136bf55a85449c2e429c5cc899c6f955222a002303fef68f8916665b89b | string |
string | |
string | |
string | |
string | |
number | |
boolean | |
boolean | |
number | |
controllers.${APP}.type (1) deployment | string |
number | |
boolean | |
number | |
service.app.controller (9) vaultwarden | string |
service.app.sessionAffinity (1) ClientIP | string |
number | |
service.vaultwarden.controller (1) vaultwarden | string |
number | |
ingress.app.hosts[].host (8) vault.${SECRET_DOMAIN} | string |
string | |
string | |
number, string | |
string | |
ingress.app.className (7) external | string |
ingress.app.tls[].hosts[] (5) - vault.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (3) ${SECRET_DOMAIN/./-}-tls | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (4) external.${SECRET_DOMAIN} | string |
string | |
string | |
ingress.app.annotations."gethomepage.dev/icon" (3) vaultwarden.png | string |
string | |
ingress.app.annotations."gethomepage.dev/description" (2) Open-source password manager compatible with Bitwarden clients. | string |
ingress.app.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2) networking-traefik-middleware-chain-no-auth@kubernetescrd | string |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.app.annotations."gethomepage.dev/pod-selector" (1) app in (
vaultwarden
) | string |
string | |
boolean | |
ingress.admin.hosts[].host (3) ${app_url} | string |
string | |
string | |
string | |
ingress.admin.hosts[].paths[].pathType (1) ImplementationSpecific | string |
ingress.admin.tls[].hosts[] (3) - ${app_url} | string |
ingress.admin.tls[].secretName (3) ${certificate_name} | string |
ingress.admin.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2) networking-traefik-middleware-chain-tinyauth@kubernetescrd | string |
string | |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://$host/outpost.goauthentik.io/start?rd=$scheme://$http_host$escaped_request_uri | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host;
| string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://ak-outpost-gabernetes.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
string | |
boolean | |
ingress.admin.className (1) traefik-internal | string |
boolean | |
ingress.vaultwarden.hosts[].host (1) ${app_url} | string |
string | |
string | |
string | |
ingress.vaultwarden.tls[].hosts[] (1) - ${app_url} | string |
ingress.vaultwarden.tls[].secretName (1) ${certificate_name} | string |
persistence.config.existingClaim (6) vaultwarden | string |
string | |
boolean | |
persistence.data.accessMode (3) ReadWriteOnce | string |
persistence.data.existingClaim (3) vaultwarden | string |
string | |
persistence.data.storageClass (3) longhorn-ssd | string |
boolean | |
string | |
boolean | |
persistence.data.type (2) persistentVolumeClaim | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
persistence.env.name (1) vaultwarden-secret | string |
persistence.env.type (1) secret | string |
persistence.postgres-serving-cert.advancedMounts.vaultwarden.app[].path (1) /certs/postgres/serving | string |
number | |
string | |
string | |
persistence.postgres-serving-cert.name (1) vaultwarden-postgres-17-serving-cert | string |
string | |
persistence.postgres-user-cert.advancedMounts.vaultwarden.app[].path (1) /certs/postgres/user | string |
number | |
persistence.postgres-user-cert.items[].key (1) tls.crt | string |
persistence.postgres-user-cert.items[].path (1) tls.crt | string |
persistence.postgres-user-cert.name (1) vaultwarden-postgres-vaultwarden-user | string |
string | |
number | |
boolean | |
number | |
number | |
string | |
route.app.hostnames[] (2) - passwords.${SECRET_DOMAIN} | string |
route.app.parentRefs[].name (2) external | string |
string | |
string | |
route.app.rules[].backendRefs[].name (1) vaultwarden | string |
number |