Compare commits

..

24 Commits

Author SHA1 Message Date
James W.
b9686a849e Merge pull request #209 from Xeroxxx/runtimeClassName
feat: Added runtimeClassName to open-webui deployment.
2025-03-31 21:15:37 -06:00
James W.
736f71d5c0 Merge branch 'main' into runtimeClassName 2025-03-31 21:10:50 -06:00
James W.
1647c29b02 Merge pull request #208 from blib/main
Add support for SSO/OIDC
2025-03-31 21:09:20 -06:00
James W.
5969b767ab Merge pull request #212 from okamototk/ollama-1.12.0
Update ollama chart to 1.12.0(ollama 0.6.3)
2025-03-31 18:39:42 -06:00
Takashi Okamoto
83a613694b Update ollama chart to 1.12.0(ollama 0.6.3) 2025-03-30 15:27:50 +00:00
James W.
adfd8e81fd Merge pull request #211 from okamototk/ollama-0.6.2
Update ollama chart to 1.11.0(ollama 0.6.2)
2025-03-28 10:44:37 -06:00
Takashi Okamoto
8ba420dab7 Update ollama chart to 1.11.0(ollama 0.6.2) 2025-03-28 09:39:37 +00:00
173680e8e4 feat: Added runtimeClassName to open-webui deployment. 2025-03-22 16:25:21 +01:00
Boris Bliznioukov
57fd1bd513 feat: add SSO and OAuth configuration options to README and values.yaml
Signed-off-by: Boris Bliznioukov <blib@mail.com>
2025-03-20 14:41:36 +01:00
Boris Bliznioukov
8916b426ec feat: add SSO configuration options in values.yaml and workload-manager.yaml
Signed-off-by: Boris Bliznioukov <blib@mail.com>
2025-03-20 14:14:53 +01:00
James W.
da259c7471 Merge pull request #207 from vinicinbgs/main 2025-03-19 07:41:11 -06:00
Vinicius Dutra
69be5561db fix: redis pod annotation nindent 4 to 8 2025-03-19 08:31:32 -03:00
James W.
7ea5d902f8 Merge pull request #206 from yushao2/main 2025-03-18 21:29:11 -06:00
yushao2
7b349d2f08 update docs / chart 2025-03-18 23:54:58 +08:00
yushao2
c64a6d983c add ability to customize redis container security context 2025-03-18 19:06:45 +08:00
James W.
9751a36aef Merge pull request #204 from jyje/v0.5.20 2025-03-13 07:41:37 -06:00
jyje
2af1c1243a chore: Update open-webui to v0.5.20 (chart 5.24.0)
- update open-webui
    - app: from v0.5.16 to v0.5.20
    - chart: from 5.23.0 to 5.24.0
- updated subchart
    - ollama (from 1.8.0 to 1.9.0): upgrade app version from v0.5.13 to v0.6.0
2025-03-13 21:45:17 +09:00
jyje
b897d0a764 chore: Remove an unused example values 2025-03-13 21:38:36 +09:00
James W.
c42b2b658d Merge pull request #203 from open-webui/revert-milvus
Revert Milvus
2025-03-12 19:34:01 -06:00
0xThresh.eth
a36cc91584 Update dependencies 2025-03-12 19:30:05 -06:00
0xThresh.eth
3ccf0425aa Update docs 2025-03-12 19:28:18 -06:00
0xThresh.eth
9d2e8a03d2 Revert Milvus PR due to size issues 2025-03-12 19:27:45 -06:00
James W.
949e81c1ae Merge pull request #202 from open-webui/revert-196-issue-184/add-milvus
Revert "fix(ci/release): Fix helm dependency for milvus"
2025-03-12 19:07:16 -06:00
James W.
e344883342 Revert "fix(ci/release): Fix helm dependency for milvus" 2025-03-12 18:07:03 -07:00
15 changed files with 272 additions and 146 deletions

View File

@@ -65,7 +65,6 @@ jobs:
helm repo add open-webui https://helm.openwebui.com/
helm repo add tika https://apache.jfrog.io/artifactory/tika/
helm repo add redis https://charts.bitnami.com/bitnami
helm repo add milvus https://zilliztech.github.io/milvus-helm
- name: Run chart-releaser
uses: helm/chart-releaser-action@v1.7.0

View File

@@ -30,7 +30,6 @@ jobs:
helm repo add open-webui https://helm.openwebui.com/
helm repo add tika https://apache.jfrog.io/artifactory/tika/
helm repo add redis https://charts.bitnami.com/bitnami
helm repo add milvus https://zilliztech.github.io/milvus-helm
- name: Build open-webui Helm dependencies
run: |
helm dependency build ./charts/open-webui

View File

@@ -1,18 +1,15 @@
dependencies:
- name: ollama
repository: https://otwld.github.io/ollama-helm/
version: 1.7.0
version: 1.12.0
- name: pipelines
repository: https://helm.openwebui.com
version: 0.4.0
version: 0.5.0
- name: tika
repository: https://apache.jfrog.io/artifactory/tika
version: 2.9.0
- name: redis
repository: https://charts.bitnami.com/bitnami
version: 20.10.0
- name: milvus
repository: https://zilliztech.github.io/milvus-helm
version: 4.2.40
digest: sha256:b9597e9cf5f89874a3c345562085ac3ba972b98ccf1b5e64425de0c17ec359f5
generated: "2025-02-28T22:43:15.040921+09:00"
version: 20.11.4
digest: sha256:05f1cd5e4bfc7ca7f293e13b8ce12b7edf5ba33ba55ec151eccf86cfb30b180a
generated: "2025-03-30T15:26:22.6382Z"

View File

@@ -1,7 +1,7 @@
apiVersion: v2
name: open-webui
version: 5.22.0
appVersion: 0.5.16
version: 5.26.0
appVersion: 0.5.20
home: https://www.openwebui.com/
icon: >-
https://raw.githubusercontent.com/open-webui/open-webui/main/static/favicon.png
@@ -43,7 +43,3 @@ dependencies:
version: '>=20.6.2'
alias: redis-cluster
condition: redis-cluster.enabled
- name: milvus
repository: https://zilliztech.github.io/milvus-helm
version: '>=4.2.40'
condition: milvus.enabled

View File

@@ -1,6 +1,6 @@
# open-webui
![Version: 5.22.0](https://img.shields.io/badge/Version-5.22.0-informational?style=flat-square) ![AppVersion: 0.5.16](https://img.shields.io/badge/AppVersion-0.5.16-informational?style=flat-square)
![Version: 5.26.0](https://img.shields.io/badge/Version-5.26.0-informational?style=flat-square) ![AppVersion: 0.5.20](https://img.shields.io/badge/AppVersion-0.5.20-informational?style=flat-square)
Open WebUI: A User-Friendly Web Interface for Chat Interactions 👋
@@ -37,10 +37,74 @@ helm upgrade --install open-webui open-webui/open-webui
| https://charts.bitnami.com/bitnami | redis-cluster(redis) | >=20.6.2 |
| https://helm.openwebui.com | pipelines | >=0.0.1 |
| https://otwld.github.io/ollama-helm/ | ollama | >=0.24.0 |
| https://zilliztech.github.io/milvus-helm | milvus | >=4.2.40 |
## Values
### SSO Configuration
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| sso.enableGroupManagement | bool | `false` | Enable OAuth group management through access token groups claim |
| sso.enableRoleManagement | bool | `false` | Enable OAuth role management through access token roles claim |
| sso.enableSignup | bool | `false` | Enable account creation when logging in with OAuth (distinct from regular signup) |
| sso.enabled | bool | `false` | **Enable SSO authentication globally** must enable to use SSO authentication |
| sso.groupManagement.groupsClaim | string | `"groups"` | The claim that contains the groups (can be nested, e.g., user.memberOf) |
| sso.mergeAccountsByEmail | bool | `false` | Allow logging into accounts that match email from OAuth provider (considered insecure) |
### GitHub OAuth configuration
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| sso.github.clientId | string | `""` | GitHub OAuth client ID |
| sso.github.clientSecret | string | `""` | GitHub OAuth client secret |
| sso.github.enabled | bool | `false` | Enable GitHub OAuth |
### Google OAuth configuration
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| sso.google.clientId | string | `""` | Google OAuth client ID |
| sso.google.clientSecret | string | `""` | Google OAuth client secret |
| sso.google.enabled | bool | `false` | Enable Google OAuth |
### Microsoft OAuth configuration
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| sso.microsoft.clientId | string | `""` | Microsoft OAuth client ID |
| sso.microsoft.clientSecret | string | `""` | Microsoft OAuth client secret |
| sso.microsoft.enabled | bool | `false` | Enable Microsoft OAuth |
| sso.microsoft.tenantId | string | `""` | Microsoft tenant ID - use 9188040d-6c67-4c5b-b112-36a304b66dad for personal accounts |
### OIDC configuration
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| sso.oidc.clientId | string | `""` | OIDC client ID |
| sso.oidc.clientSecret | string | `""` | OIDC client secret |
| sso.oidc.enabled | bool | `false` | Enable OIDC authentication |
| sso.oidc.providerName | string | `"SSO"` | Name of the provider to show on the UI |
| sso.oidc.providerUrl | string | `""` | OIDC provider well known URL |
| sso.oidc.scopes | string | `"openid email profile"` | Scopes to request (space-separated). |
### Role management configuration
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| sso.roleManagement.adminRoles | string | `""` | Comma-separated list of roles allowed to log in as admin (receive open webui role admin) |
| sso.roleManagement.allowedRoles | string | `""` | Comma-separated list of roles allowed to log in (receive open webui role user) |
| sso.roleManagement.rolesClaim | string | `"roles"` | The claim that contains the roles (can be nested, e.g., user.roles) |
### SSO trusted header authentication
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| sso.trustedHeader.emailHeader | string | `""` | Header containing the user's email address |
| sso.trustedHeader.enabled | bool | `false` | Enable trusted header authentication |
| sso.trustedHeader.nameHeader | string | `""` | Header containing the user's name (optional, used for new user creation) |
### Other Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| affinity | object | `{}` | Affinity for pod assignment |
@@ -57,7 +121,7 @@ helm upgrade --install open-webui open-webui/open-webui
| image | object | `{"pullPolicy":"IfNotPresent","repository":"ghcr.io/open-webui/open-webui","tag":""}` | Open WebUI image tags can be found here: https://github.com/open-webui/open-webui |
| imagePullSecrets | list | `[]` | Configure imagePullSecrets to use private registry ref: <https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry> |
| ingress.additionalHosts | list | `[]` | |
| ingress.annotations | object | `{}` | Use appropriate annotations for your Ingress controller, e.g., for NGINX: |
| ingress.annotations | object | `{}` | Use appropriate annotations for your Ingress controller, e.g., for NGINX: |
| ingress.class | string | `""` | |
| ingress.enabled | bool | `false` | |
| ingress.existingSecret | string | `""` | |
@@ -67,11 +131,6 @@ helm upgrade --install open-webui open-webui/open-webui
| managedCertificate.domains[0] | string | `"chat.example.com"` | |
| managedCertificate.enabled | bool | `false` | |
| managedCertificate.name | string | `"mydomain-chat-cert"` | |
| milvus.db | string | `"default"` | Active Milvus database for RAG with env `MILVUS_DB` ref: https://docs.openwebui.com/getting-started/env-configuration#milvus_db |
| milvus.enabled | bool | `false` | Enable Milvus installation. Deploys a Milvus cluster/standalone with subchart 'milvus' from zilliztech ref: https://github.com/zilliztech/milvus-helm/tree/master/charts/milvus |
| milvus.fullnameOverride | string | `"open-webui-milvus"` | Milvus fullname override (recommended to be 'open-webui-milvus') - In this case, the Milvus uri will be 'http://[username:password@]open-webui-milvus:19530' |
| milvus.token | object | `{}` | Active Milvus token for RAG with env `MILVUS_TOKEN` ref: https://docs.openwebui.com/getting-started/env-configuration#milvus_token |
| milvus.uri | string | `"http://open-webui-milvus:19530"` | Active Milvus URI for RAG with env `MILVUS_URI`. If there is credentials in the uri, it will be used to connect to the Milvus server. ref: https://docs.openwebui.com/getting-started/env-configuration#milvus_uri |
| nameOverride | string | `""` | |
| namespaceOverride | string | `""` | |
| nodeSelector | object | `{}` | Node labels for pod assignment. |
@@ -93,11 +152,7 @@ helm upgrade --install open-webui open-webui/open-webui
| pipelines.extraEnvVars | list | `[]` | This section can be used to pass required environment variables to your pipelines (e.g. Langfuse hostname) |
| podAnnotations | object | `{}` | |
| podLabels | object | `{}` | |
| podSecurityContext | object | `{}` | Configure pod security context ref: <https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-containe> |
| rag.embeddingEngine | string | `""` | Embedding engine to use for RAG with env `RAG_EMBEDDING_ENGINE`: ""(empty), "ollama", "openai" ref: https://docs.openwebui.com/getting-started/env-configuration#rag_embedding_engine |
| rag.embeddingModel | string | `""` | Embedding model to use for RAG with env `RAG_EMBEDDING_MODEL` ref: https://docs.openwebui.com/getting-started/env-configuration#rag_embedding_model |
| rag.enabled | bool | `false` | Enable RAG ref: https://docs.openwebui.com/getting-started/env-configuration#retrieval-augmented-generation-rag |
| rag.vectorDB | string | `""` | Vector database configuration ref: https://docs.openwebui.com/getting-started/env-configuration#vector_db |
| podSecurityContext | object | `{}` | Configure pod security context ref: <https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container> |
| readinessProbe | object | `{}` | Probe for readiness of the Open WebUI container ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes> |
| redis-cluster | object | `{"auth":{"enabled":false},"enabled":false,"fullnameOverride":"open-webui-redis","replica":{"replicaCount":3}}` | Deploys a Redis cluster with subchart 'redis' from bitnami |
| redis-cluster.auth | object | `{"enabled":false}` | Redis Authentication |
@@ -108,6 +163,7 @@ helm upgrade --install open-webui open-webui/open-webui
| redis-cluster.replica.replicaCount | int | `3` | Number of Redis replica instances |
| replicaCount | int | `1` | |
| resources | object | `{}` | |
| runtimeClassName | string | `""` | Allows changing the Runtime Class. For ex. to "nvidia" if nvidia container runtime is installed but not default. |
| service | object | `{"annotations":{},"containerPort":8080,"labels":{},"loadBalancerClass":"","nodePort":"","port":80,"type":"ClusterIP"}` | Service values to expose Open WebUI pods to cluster |
| serviceAccount.annotations | object | `{}` | |
| serviceAccount.automountServiceAccountToken | bool | `false` | |
@@ -122,7 +178,7 @@ helm upgrade --install open-webui open-webui/open-webui
| volumes | list | `[]` | Configure pod volumes ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-volume-storage/> |
| websocket.enabled | bool | `false` | Enables websocket support in Open WebUI with env `ENABLE_WEBSOCKET_SUPPORT` |
| websocket.manager | string | `"redis"` | Specifies the websocket manager to use with env `WEBSOCKET_MANAGER`: redis (default) |
| websocket.redis | object | `{"affinity":{},"annotations":{},"args":[],"command":[],"enabled":true,"image":{"pullPolicy":"IfNotPresent","repository":"redis","tag":"7.4.2-alpine3.21"},"labels":{},"name":"open-webui-redis","pods":{"annotations":{}},"resources":{},"service":{"annotations":{},"containerPort":6379,"labels":{},"nodePort":"","port":6379,"type":"ClusterIP"},"tolerations":[]}` | Deploys a redis |
| websocket.redis | object | `{"affinity":{},"annotations":{},"args":[],"command":[],"enabled":true,"image":{"pullPolicy":"IfNotPresent","repository":"redis","tag":"7.4.2-alpine3.21"},"labels":{},"name":"open-webui-redis","pods":{"annotations":{}},"resources":{},"securityContext":{},"service":{"annotations":{},"containerPort":6379,"labels":{},"nodePort":"","port":6379,"type":"ClusterIP"},"tolerations":[]}` | Deploys a redis |
| websocket.redis.affinity | object | `{}` | Redis affinity for pod assignment |
| websocket.redis.annotations | object | `{}` | Redis annotations |
| websocket.redis.args | list | `[]` | Redis arguments (overrides default) |
@@ -134,6 +190,7 @@ helm upgrade --install open-webui open-webui/open-webui
| websocket.redis.pods | object | `{"annotations":{}}` | Redis pod |
| websocket.redis.pods.annotations | object | `{}` | Redis pod annotations |
| websocket.redis.resources | object | `{}` | Redis resources |
| websocket.redis.securityContext | object | `{}` | Redis security context |
| websocket.redis.service | object | `{"annotations":{},"containerPort":6379,"labels":{},"nodePort":"","port":6379,"type":"ClusterIP"}` | Redis service |
| websocket.redis.service.annotations | object | `{}` | Redis service annotations |
| websocket.redis.service.containerPort | int | `6379` | Redis container/target port |

Binary file not shown.

Binary file not shown.

View File

@@ -23,7 +23,7 @@ spec:
{{- include "websocket.redis.labels" . | nindent 8 }}
annotations:
{{- with .Values.websocket.redis.pods.annotations }}
{{- toYaml . | nindent 4 }}
{{- toYaml . | nindent 8 }}
{{- end }}
spec:
{{- if .Values.websocket.redis.image.pullSecretName }}
@@ -57,6 +57,10 @@ spec:
affinity:
{{- toYaml . | nindent 8 }}
{{- end }}
{{- with .Values.websocket.redis.securityContext }}
securityContext:
{{- toYaml . | nindent 8 }}
{{- end }}
---
apiVersion: v1
kind: Service

View File

@@ -74,6 +74,9 @@ spec:
{{- end }}
enableServiceLinks: false
automountServiceAccountToken: {{ .Values.serviceAccount.automountServiceAccountToken }}
{{- if .Values.runtimeClassName }}
runtimeClassName: {{ .Values.runtimeClassName | quote }}
{{- end }}
{{- if .Values.serviceAccount.enable }}
serviceAccountName: {{ .Values.serviceAccount.name | default (include "open-webui.name" .) }}
{{- end }}
@@ -144,28 +147,6 @@ spec:
- name: "ENABLE_OPENAI_API"
value: "False"
{{- end }}
{{- if .Values.rag.enabled }}
- name: "VECTOR_DB"
value: {{ .Values.rag.vectorDB | default "croma" | quote }}
{{- if and .Values.rag.enabled .Values.rag.embeddingEngine }}
- name: "RAG_EMBEDDING_ENGINE"
value: {{ .Values.rag.embeddingEngine | quote }}
{{- end }}
{{- if and .Values.rag.enabled .Values.rag.embeddingModel }}
- name: "RAG_EMBEDDING_MODEL"
value: {{ .Values.rag.embeddingModel | quote }}
{{- end }}
{{- end }}
{{- if .Values.milvus.enabled }}
- name: "MILVUS_URI"
value: {{ .Values.milvus.uri | default "${DATA_DIR}/vector_db/milvus.db" | quote }}
- name: "MILVUS_DB"
value: {{ .Values.milvus.db | default "default" | quote }}
{{- if and .Values.milvus.enabled .Values.milvus.token }}
- name: "MILVUS_TOKEN"
value: {{ .Values.milvus.token | quote }}
{{- end }}
{{- end }}
{{- if .Values.extraEnvVars }}
{{- toYaml .Values.extraEnvVars | nindent 8 }}
{{- end }}
@@ -183,6 +164,76 @@ spec:
- name: "WEBSOCKET_REDIS_URL"
value: {{ .Values.websocket.url | quote }}
{{- end }}
{{- if .Values.sso.enabled }}
{{- if .Values.sso.enableSignup }}
- name: "ENABLE_OAUTH_SIGNUP"
value: "True"
{{- end }}
{{- if .Values.sso.mergeAccountsByEmail }}
- name: "OAUTH_MERGE_ACCOUNTS_BY_EMAIL"
value: "True"
{{- end }}
{{- if .Values.sso.google.enabled }}
- name: "GOOGLE_CLIENT_ID"
value: {{ .Values.sso.google.clientId | quote }}
- name: "GOOGLE_CLIENT_SECRET"
value: {{ .Values.sso.google.clientSecret | quote }}
{{- end }}
{{- if .Values.sso.microsoft.enabled }}
- name: "MICROSOFT_CLIENT_ID"
value: {{ .Values.sso.microsoft.clientId | quote }}
- name: "MICROSOFT_CLIENT_SECRET"
value: {{ .Values.sso.microsoft.clientSecret | quote }}
- name: "MICROSOFT_CLIENT_TENANT_ID"
value: {{ .Values.sso.microsoft.tenantId | quote }}
{{- end }}
{{- if .Values.sso.github.enabled }}
- name: "GITHUB_CLIENT_ID"
value: {{ .Values.sso.github.clientId | quote }}
- name: "GITHUB_CLIENT_SECRET"
value: {{ .Values.sso.github.clientSecret | quote }}
{{- end }}
{{- if .Values.sso.oidc.enabled }}
- name: "OAUTH_CLIENT_ID"
value: {{ .Values.sso.oidc.clientId | quote }}
- name: "OAUTH_CLIENT_SECRET"
value: {{ .Values.sso.oidc.clientSecret | quote }}
- name: "OPENID_PROVIDER_URL"
value: {{ .Values.sso.oidc.providerUrl | quote }}
- name: "OAUTH_PROVIDER_NAME"
value: {{ .Values.sso.oidc.providerName | quote }}
- name: "OAUTH_SCOPES"
value: {{ .Values.sso.oidc.scopes | quote }}
{{- end }}
{{- if .Values.sso.enableRoleManagement }}
- name: "ENABLE_OAUTH_ROLE_MANAGEMENT"
value: "True"
- name: "OAUTH_ROLES_CLAIM"
value: {{ .Values.sso.roleManagement.rolesClaim | quote }}
{{- if .Values.sso.roleManagement.allowedRoles }}
- name: "OAUTH_ALLOWED_ROLES"
value: {{ .Values.sso.roleManagement.allowedRoles | quote }}
{{- end }}
{{- if .Values.sso.roleManagement.adminRoles }}
- name: "OAUTH_ADMIN_ROLES"
value: {{ .Values.sso.roleManagement.adminRoles | quote }}
{{- end }}
{{- end }}
{{- if .Values.sso.enableGroupManagement }}
- name: "ENABLE_OAUTH_GROUP_MANAGEMENT"
value: "True"
- name: "OAUTH_GROUP_CLAIM"
value: {{ .Values.sso.groupManagement.groupsClaim | quote }}
{{- end }}
{{- if .Values.sso.trustedHeader.enabled }}
- name: "WEBUI_AUTH_TRUSTED_EMAIL_HEADER"
value: {{ .Values.sso.trustedHeader.emailHeader | quote }}
{{- if .Values.sso.trustedHeader.nameHeader }}
- name: "WEBUI_AUTH_TRUSTED_NAME_HEADER"
value: {{ .Values.sso.trustedHeader.nameHeader | quote }}
{{- end }}
{{- end }}
{{- end }}
tty: true
{{- with .Values.nodeSelector }}
nodeSelector:

View File

@@ -1,53 +0,0 @@
rag:
# -- Enable RAG
# ref: https://docs.openwebui.com/getting-started/env-configuration#retrieval-augmented-generation-rag
enabled: true
vectorDB: milvus
embeddingEngine: ""
embeddingModel: ""
milvus:
# -- Enable Milvus installation. Deploys a Milvus cluster/standalone with subchart 'milvus' from zilliztech
# ref: https://github.com/zilliztech/milvus-helm/tree/master/charts/milvus
enabled: true
uri: "http://open-webui-milvus:19530"
db: default
token: {}
cluster:
enabled: false # This means that the Milvus runs with standalone mode
minio:
enabled: true
resources:
requests:
memory: 50Mi
persistence:
enabled: true
size: 1Gi
etcd:
enabled: true
pulsar:
enabled: false
pulsarv3:
enabled: false
kafka:
enabled: false
externalS3:
enabled: false
externalEtcd:
enabled: false
livenessProbe:
httpGet:
path: /health
port: http
readinessProbe:
httpGet:
path: /health/db
port: http
startupProbe:
httpGet:
path: /health
port: http
initialDelaySeconds: 30 # Adjust this value according to the startup time of the application
periodSeconds: 10 # Adjust this value according to the startup time of the application
failureThreshold: 20 # Adjust this value according to the startup time of the application

View File

@@ -1,6 +1,5 @@
nameOverride: ""
namespaceOverride: ""
ollama:
# -- Automatically install Ollama Helm chart from https://otwld.github.io/ollama-helm/. Use [Helm Values](https://github.com/otwld/ollama-helm/#helm-values) to configure
enabled: true
@@ -90,6 +89,12 @@ websocket:
# -- Redis affinity for pod assignment
affinity: {}
# -- Redis security context
securityContext:
{}
# runAsUser: 999
# runAsGroup: 1000
# -- Deploys a Redis cluster with subchart 'redis' from bitnami
redis-cluster:
# -- Enable Redis installation
@@ -106,39 +111,6 @@ redis-cluster:
# -- Number of Redis replica instances
replicaCount: 3
rag:
# -- Enable RAG
# ref: https://docs.openwebui.com/getting-started/env-configuration#retrieval-augmented-generation-rag
enabled: false
# -- Vector database configuration
# ref: https://docs.openwebui.com/getting-started/env-configuration#vector_db
vectorDB: ""
# -- Embedding engine to use for RAG with env `RAG_EMBEDDING_ENGINE`: ""(empty), "ollama", "openai"
# ref: https://docs.openwebui.com/getting-started/env-configuration#rag_embedding_engine
embeddingEngine: ""
# -- Embedding model to use for RAG with env `RAG_EMBEDDING_MODEL`
# ref: https://docs.openwebui.com/getting-started/env-configuration#rag_embedding_model
embeddingModel: ""
milvus:
# -- Enable Milvus installation. Deploys a Milvus cluster/standalone with subchart 'milvus' from zilliztech
# ref: https://github.com/zilliztech/milvus-helm/tree/master/charts/milvus
enabled: false
# -- Milvus fullname override (recommended to be 'open-webui-milvus')
# - In this case, the Milvus uri will be 'http://[username:password@]open-webui-milvus:19530'
fullnameOverride: open-webui-milvus
# -- Active Milvus URI for RAG with env `MILVUS_URI`. If there is credentials in the uri, it will be used to connect to the Milvus server.
# ref: https://docs.openwebui.com/getting-started/env-configuration#milvus_uri
uri: "http://open-webui-milvus:19530"
# -- Example `milvus.uri` with credentials (Not recommended for production. Use `env` with `secretKeyRef` instead)
# uri: "http://username:password@open-webui-milvus:19530"
# -- Active Milvus database for RAG with env `MILVUS_DB`
# ref: https://docs.openwebui.com/getting-started/env-configuration#milvus_db
db: default
# -- Active Milvus token for RAG with env `MILVUS_TOKEN`
# ref: https://docs.openwebui.com/getting-started/env-configuration#milvus_token
token: {}
# -- Value of cluster domain
clusterDomain: cluster.local
@@ -204,14 +176,14 @@ copyAppData:
managedCertificate:
enabled: false
name: "mydomain-chat-cert" # You can override this name if needed
name: "mydomain-chat-cert" # You can override this name if needed
domains:
- chat.example.com # update to your real domain
ingress:
enabled: false
class: ""
# -- Use appropriate annotations for your Ingress controller, e.g., for NGINX:
# -- Use appropriate annotations for your Ingress controller, e.g., for NGINX:
annotations: {}
# # Example for GKE Ingress
# kubernetes.io/ingress.class: "gce"
@@ -221,8 +193,8 @@ ingress:
# nginx.ingress.kubernetes.io/ssl-redirect: "true"
# nginx.ingress.kubernetes.io/permanent-redirect: "https://chat.example.com"
# networking.gke.io/managed-certificates: "mydomain-chat-cert"
# # nginx.ingress.kubernetes.io/rewrite-target: /
host: "chat.example.com" # update to your real domain
# # nginx.ingress.kubernetes.io/rewrite-target: /
host: "chat.example.com" # update to your real domain
additionalHosts: []
tls: false
existingSecret: ""
@@ -272,7 +244,8 @@ enableOpenaiApi: true
openaiBaseApiUrl: "https://api.openai.com/v1"
# -- OpenAI base API URLs to use. Overwrites the value in openaiBaseApiUrl if set
openaiBaseApiUrls: []
openaiBaseApiUrls:
[]
# - "https://api.openai.com/v1"
# - "https://api.company.openai.com/v1"
@@ -293,6 +266,10 @@ extraEnvVars:
# - name: OLLAMA_DEBUG
# value: "1"
# -- Configure runtime class
# ref: <https://kubernetes.io/docs/concepts/containers/runtime-class/>
runtimeClassName: ""
# -- Configure container volume mounts
# ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-volume-storage/>
volumeMounts:
@@ -331,7 +308,6 @@ podSecurityContext:
# supplementalGroups: []
# fsGroup: 1001
# -- Configure container security context
# ref: <https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-containe>
containerSecurityContext:
@@ -348,6 +324,106 @@ containerSecurityContext:
# seccompProfile:
# type: "RuntimeDefault"
sso:
# -- **Enable SSO authentication globally** must enable to use SSO authentication
# @section -- SSO Configuration
enabled: false
# -- Enable account creation when logging in with OAuth (distinct from regular signup)
# @section -- SSO Configuration
enableSignup: false
# -- Allow logging into accounts that match email from OAuth provider (considered insecure)
# @section -- SSO Configuration
mergeAccountsByEmail: false
# -- Enable OAuth role management through access token roles claim
# @section -- SSO Configuration
enableRoleManagement: false
# -- Enable OAuth group management through access token groups claim
# @section -- SSO Configuration
enableGroupManagement: false
google:
# -- Enable Google OAuth
# @section -- Google OAuth configuration
enabled: false
# -- Google OAuth client ID
# @section -- Google OAuth configuration
clientId: ""
# -- Google OAuth client secret
# @section -- Google OAuth configuration
clientSecret: ""
microsoft:
# -- Enable Microsoft OAuth
# @section -- Microsoft OAuth configuration
enabled: false
# -- Microsoft OAuth client ID
# @section -- Microsoft OAuth configuration
clientId: ""
# -- Microsoft OAuth client secret
# @section -- Microsoft OAuth configuration
clientSecret: ""
# -- Microsoft tenant ID - use 9188040d-6c67-4c5b-b112-36a304b66dad for personal accounts
# @section -- Microsoft OAuth configuration
tenantId: ""
github:
# -- Enable GitHub OAuth
# @section -- GitHub OAuth configuration
enabled: false
# -- GitHub OAuth client ID
# @section -- GitHub OAuth configuration
clientId: ""
# -- GitHub OAuth client secret
# @section -- GitHub OAuth configuration
clientSecret: ""
oidc:
# -- Enable OIDC authentication
# @section -- OIDC configuration
enabled: false
# -- OIDC client ID
# @section -- OIDC configuration
clientId: ""
# -- OIDC client secret
# @section -- OIDC configuration
clientSecret: ""
# -- OIDC provider well known URL
# @section -- OIDC configuration
providerUrl: ""
# -- Name of the provider to show on the UI
# @section -- OIDC configuration
providerName: "SSO"
# -- Scopes to request (space-separated).
# @section -- OIDC configuration
scopes: "openid email profile"
roleManagement:
# -- The claim that contains the roles (can be nested, e.g., user.roles)
# @section -- Role management configuration
rolesClaim: "roles"
# -- Comma-separated list of roles allowed to log in (receive open webui role user)
# @section -- Role management configuration
allowedRoles: ""
# -- Comma-separated list of roles allowed to log in as admin (receive open webui role admin)
# @section -- Role management configuration
adminRoles: ""
groupManagement:
# -- The claim that contains the groups (can be nested, e.g., user.memberOf)
# @section -- SSO Configuration
groupsClaim: "groups"
trustedHeader:
# -- Enable trusted header authentication
# @section -- SSO trusted header authentication
enabled: false
# -- Header containing the user's email address
# @section -- SSO trusted header authentication
emailHeader: ""
# -- Header containing the user's name (optional, used for new user creation)
# @section -- SSO trusted header authentication
nameHeader: ""
# -- Extra resources to deploy with Open WebUI
extraResources:
[]