No introduction found. Create it?
vaultwarden from bjw-s is more popular with 27 repositories.
Install with:
helm repo add k8s-at-home-charts https://k8s-at-home.com/charts/
helm install vaultwarden k8s-at-home-charts/vaultwarden -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vaultwarden | pascaliske/infrastructure | 58 | 5.3.2 | 8 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
image.tag (3) v1.25.2 | string |
image.repository (2) ghcr.io/k8s-at-home/vaultwarden | string |
env.DOMAIN (2) https://vault.${SECRET_DOMAIN} | string |
env.TZ (2) Europe/Amsterdam | string |
env.DATA_FOLDER (1) config | string |
string | |
env.SMTP_FROM_NAME (1) Vaultwarden | string |
env.SMTP_HOST (1) smtp.gmail.com | string |
number | |
env.SMTP_SSL (1) true | string |
env.WEBSOCKET_ADDRESS (1) 0.0.0.0 | string |
boolean | |
number | |
string | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
string | |
string | |
boolean | |
ingress.main.hosts[].host (2) vault.${SECRET_DOMAIN} | string |
ingress.main.hosts[].paths[].path (2) / | string |
ingress.main.hosts[].paths[].pathType (2) Prefix | string |
number | |
string | |
ingress.main.tls[].hosts[] (2) - vault.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (2) vault-tls | string |
string | |
ingress.admin.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-rfc1918@kubernetescrd | string |
boolean | |
ingress.admin.hosts[].host (1) vault.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.admin.tls[].hosts[] (1) - vault.${SECRET_DOMAIN} | string |
ingress.admin.tls[].secretName (1) vault-tls | string |
boolean | |
persistence.config.existingClaim (1) vaultwarden | string |
persistence.data.accessMode (1) ReadWriteOnce | string |
boolean | |
string | |
persistence.data.storageClass (1) local-path | string |
string | |
env[].name (1) TZ | string |
env[].value (1) ${TIMEZONE} | string |
env[].valueFrom.secretKeyRef.key (1) username | string |
env[].valueFrom.secretKeyRef.name (1) postgresql-user | string |
envFrom[].secretRef.name (1) vaultwarden | string |
string | |
string | |
string | |
string |