values.yaml 1.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
  1. ---
  2. global:
  3. image:
  4. repository: "ghcr.io/goauthentik/server"
  5. tag: "2025.6.2"
  6. pullPolicy: IfNotPresent
  7. authentik:
  8. # (Required) To generate a secret key run the following command:
  9. # echo $(openssl rand -base64 32)
  10. secret_key: ""
  11. postgresql:
  12. host: ""
  13. name: ""
  14. user: ""
  15. password: ""
  16. port: 5432
  17. email:
  18. # (Optional) Enable Email Sending
  19. # Highly recommended to notify you about alerts and configuration issues.
  20. host: ""
  21. port: 587
  22. username: ""
  23. password: ""
  24. use_tls: true
  25. from: ""
  26. error_reporting:
  27. enabled: true
  28. log_level: error
  29. server:
  30. ingress:
  31. # (Optional) If you want to securely expose Authentik in Traefik you can enable the
  32. # Ingress settings, alternatively, you can use the template in the
  33. # `authentik/ingressroute.yaml` file to create an IngressRoute.
  34. ingressClassName: traefik
  35. enabled: true
  36. hosts:
  37. - your-authentik-fqdn
  38. tls:
  39. - hosts:
  40. - your-authentik-fqdn
  41. # (Optional) If you want to use a custom TLS secret you can specify it here.
  42. secretName: your-authentik-tls-secret
  43. postgresql:
  44. enabled: false
  45. redis:
  46. enabled: true