mirror of
				https://github.com/open-webui/helm-charts
				synced 2025-06-26 18:16:14 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			616 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			YAML
		
	
	
	
	
	
			
		
		
	
	
			616 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			YAML
		
	
	
	
	
	
| nameOverride: ""
 | |
| namespaceOverride: ""
 | |
| ollama:
 | |
|   # -- Automatically install Ollama Helm chart from https://otwld.github.io/ollama-helm/. Use [Helm Values](https://github.com/otwld/ollama-helm/#helm-values) to configure
 | |
|   enabled: true
 | |
|   # -- If enabling embedded Ollama, update fullnameOverride to your desired Ollama name value, or else it will use the default ollama.name value from the Ollama chart
 | |
|   fullnameOverride: "open-webui-ollama"
 | |
|   # -- Example Ollama configuration with nvidia GPU enabled, automatically downloading a model, and deploying a PVC for model persistence
 | |
|   # ollama:
 | |
|   #   gpu:
 | |
|   #     enabled: true
 | |
|   #     type: 'nvidia'
 | |
|   #     number: 1
 | |
|   #   models:
 | |
|   #     pull:
 | |
|   #       - llama3
 | |
|   #     run:
 | |
|   #       - llama3
 | |
|   # runtimeClassName: nvidia
 | |
|   # persistentVolume:
 | |
|   #   enabled: true
 | |
|   #   volumeName: "example-pre-existing-pv-created-by-smb-csi"
 | |
| 
 | |
| pipelines:
 | |
|   # -- Automatically install Pipelines chart to extend Open WebUI functionality using Pipelines: https://github.com/open-webui/pipelines
 | |
|   enabled: true
 | |
|   # -- This section can be used to pass required environment variables to your pipelines (e.g. Langfuse hostname)
 | |
|   extraEnvVars: []
 | |
| 
 | |
| tika:
 | |
|   # -- Automatically install Apache Tika to extend Open WebUI
 | |
|   enabled: false
 | |
| 
 | |
| # -- A list of Ollama API endpoints. These can be added in lieu of automatically installing the Ollama Helm chart, or in addition to it.
 | |
| ollamaUrls: []
 | |
| 
 | |
| # -- Disables taking Ollama Urls from `ollamaUrls`  list
 | |
| ollamaUrlsFromExtraEnv: false
 | |
| 
 | |
| websocket:
 | |
|   # -- Enables websocket support in Open WebUI with env `ENABLE_WEBSOCKET_SUPPORT`
 | |
|   enabled: false
 | |
|   # -- Specifies the websocket manager to use with env `WEBSOCKET_MANAGER`: redis (default)
 | |
|   manager: redis
 | |
|   # -- Specifies the URL of the Redis instance for websocket communication. Template with `redis://[:<password>@]<hostname>:<port>/<db>`
 | |
|   url: redis://open-webui-redis:6379/0
 | |
|   # -- Node selector for websocket pods
 | |
|   nodeSelector: {}
 | |
|   # -- Deploys a redis
 | |
|   redis:
 | |
|     # -- Enable redis installation
 | |
|     enabled: true
 | |
|     # -- Redis name
 | |
|     name: open-webui-redis
 | |
|     # -- Redis labels
 | |
|     labels: {}
 | |
|     # -- Redis annotations
 | |
|     annotations: {}
 | |
|     # -- Redis pod
 | |
|     pods:
 | |
|       # -- Redis pod labels
 | |
|       labels: {}
 | |
|       # -- Redis pod annotations
 | |
|       annotations: {}
 | |
|     # -- Redis image
 | |
|     image:
 | |
|       repository: redis
 | |
|       tag: 7.4.2-alpine3.21
 | |
|       pullPolicy: IfNotPresent
 | |
|     # -- Redis command (overrides default)
 | |
|     command: []
 | |
|     # -- Redis arguments (overrides default)
 | |
|     args: []
 | |
|     # -- Redis resources
 | |
|     resources: {}
 | |
|     # -- Redis service
 | |
|     service:
 | |
|       # -- Redis container/target port
 | |
|       containerPort: 6379
 | |
|       # -- Redis service type
 | |
|       type: ClusterIP
 | |
|       # -- Redis service labels
 | |
|       labels: {}
 | |
|       # -- Redis service annotations
 | |
|       annotations: {}
 | |
|       # -- Redis service port
 | |
|       port: 6379
 | |
|       # -- Redis service node port. Valid only when type is `NodePort`
 | |
|       nodePort: ""
 | |
|     # -- Redis tolerations for pod assignment
 | |
|     tolerations: []
 | |
| 
 | |
|     # -- Redis affinity for pod assignment
 | |
|     affinity: {}
 | |
| 
 | |
|     # -- Redis security context
 | |
|     securityContext:
 | |
|       {}
 | |
|       # runAsUser: 999
 | |
|       # runAsGroup: 1000
 | |
| 
 | |
| # -- Deploys a Redis cluster with subchart 'redis' from bitnami
 | |
| redis-cluster:
 | |
|   # -- Enable Redis installation
 | |
|   enabled: false
 | |
|   # -- Redis cluster name (recommended to be 'open-webui-redis')
 | |
|   # - In this case, redis url will be 'redis://open-webui-redis-master:6379/0' or 'redis://[:<password>@]open-webui-redis-master:6379/0'
 | |
|   fullnameOverride: open-webui-redis
 | |
|   # -- Redis Authentication
 | |
|   auth:
 | |
|     # -- Enable Redis authentication (disabled by default). For your security, we strongly suggest that you switch to 'auth.enabled=true'
 | |
|     enabled: false
 | |
|   # -- Replica configuration for the Redis cluster
 | |
|   replica:
 | |
|     # -- Number of Redis replica instances
 | |
|     replicaCount: 3
 | |
| 
 | |
| # -- Value of cluster domain
 | |
| clusterDomain: cluster.local
 | |
| 
 | |
| annotations: {}
 | |
| podAnnotations: {}
 | |
| podLabels: {}
 | |
| replicaCount: 1
 | |
| # -- Strategy for updating the workload manager: deployment or statefulset
 | |
| strategy: {}
 | |
| # -- Open WebUI image tags can be found here: https://github.com/open-webui/open-webui
 | |
| image:
 | |
|   repository: ghcr.io/open-webui/open-webui
 | |
|   tag: ""
 | |
|   pullPolicy: "IfNotPresent"
 | |
| 
 | |
| # -- Open WebUI container command (overrides default entrypoint)
 | |
| command: []
 | |
| # -- Open WebUI container arguments (overrides default)
 | |
| args: []
 | |
| 
 | |
| serviceAccount:
 | |
|   enable: true
 | |
|   name: ""
 | |
|   annotations: {}
 | |
|   automountServiceAccountToken: false
 | |
| 
 | |
| # -- Configure imagePullSecrets to use private registry
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry>
 | |
| imagePullSecrets: []
 | |
| # imagePullSecrets:
 | |
| # - name: myRegistryKeySecretName
 | |
| 
 | |
| # -- Probe for liveness of the Open WebUI container
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes>
 | |
| livenessProbe: {}
 | |
| # livenessProbe:
 | |
| #   httpGet:
 | |
| #     path: /health
 | |
| #     port: http
 | |
| #   failureThreshold: 1
 | |
| #   periodSeconds: 10
 | |
| 
 | |
| # -- Probe for readiness of the Open WebUI container
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes>
 | |
| readinessProbe: {}
 | |
| # readinessProbe:
 | |
| #   httpGet:
 | |
| #     path: /health/db
 | |
| #     port: http
 | |
| #   failureThreshold: 1
 | |
| #   periodSeconds: 10
 | |
| 
 | |
| # -- Probe for startup of the Open WebUI container
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes>
 | |
| startupProbe: {}
 | |
| # startupProbe:
 | |
| #   httpGet:
 | |
| #     path: /health
 | |
| #     port: http
 | |
| #   initialDelaySeconds: 30
 | |
| #   periodSeconds: 5
 | |
| #   failureThreshold: 20
 | |
| 
 | |
| resources: {}
 | |
| 
 | |
| copyAppData:
 | |
|   # -- Open WebUI copy-app-data init container command (overrides default)
 | |
|   command: []
 | |
|   # -- Open WebUI copy-app-data init container arguments (overrides default)
 | |
|   args: []
 | |
| 
 | |
|   resources: {}
 | |
| 
 | |
| managedCertificate:
 | |
|   enabled: false
 | |
|   name: "mydomain-chat-cert" # You can override this name if needed
 | |
|   domains:
 | |
|     - chat.example.com # update to your real domain
 | |
| 
 | |
| ingress:
 | |
|   enabled: false
 | |
|   class: ""
 | |
|   # -- Use appropriate annotations for your Ingress controller, e.g., for NGINX:
 | |
|   annotations: {}
 | |
|   #   # Example for GKE Ingress
 | |
|   #   kubernetes.io/ingress.class: "gce"
 | |
|   #   kubernetes.io/ingress.global-static-ip-name: "open-webui-external-ip"   #  you need to create this address in GCP console
 | |
|   #   # Force HTTP to redirect to HTTPS
 | |
|   #   nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
 | |
|   #   nginx.ingress.kubernetes.io/ssl-redirect: "true"
 | |
|   #   nginx.ingress.kubernetes.io/permanent-redirect: "https://chat.example.com"
 | |
|   #   networking.gke.io/managed-certificates: "mydomain-chat-cert"
 | |
|   #   # nginx.ingress.kubernetes.io/rewrite-target: /
 | |
|   host: "chat.example.com" # update to your real domain
 | |
|   additionalHosts: []
 | |
|   tls: false
 | |
|   existingSecret: ""
 | |
| 
 | |
|   # -- Additional custom labels to add to the Ingress metadata
 | |
|   # Useful for tagging, selecting, or applying policies to the Ingress via labels.
 | |
|   extraLabels: {}
 | |
|   # extraLabels:
 | |
|   #   app.kubernetes.io/environment: "staging"
 | |
| 
 | |
| persistence:
 | |
|   enabled: true
 | |
|   size: 2Gi
 | |
|   # -- Use existingClaim if you want to re-use an existing Open WebUI PVC instead of creating a new one
 | |
|   existingClaim: ""
 | |
|   # -- Subdirectory of Open WebUI PVC to mount. Useful if root directory is not empty.
 | |
|   subPath: ""
 | |
|   # -- If using multiple replicas, you must update accessModes to ReadWriteMany
 | |
|   accessModes:
 | |
|     - ReadWriteOnce
 | |
|   storageClass: ""
 | |
|   selector: {}
 | |
|   annotations: {}
 | |
|   # -- Sets the storage provider, availables values are `local`, `s3`, `gcs` or `azure`
 | |
|   provider: local
 | |
|   s3:
 | |
|     # -- Sets the access key ID for S3 storage
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     accessKey: ""
 | |
|     # -- Sets the secret access key for S3 storage (ignored if secretKeyExistingSecret is set)
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     secretKey: ""
 | |
|     # -- Set the secret access key for S3 storage from existing k8s secret
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     secretKeyExistingSecret: ""
 | |
|     # -- Set the secret access key for S3 storage from existing k8s secret key
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     secretKeyExistingSecretKey: ""
 | |
|     # -- Sets the endpoint url for S3 storage
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     endpointUrl: ""
 | |
|     # -- Sets the region name for S3 storage
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     region: ""
 | |
|     # -- Sets the bucket name for S3 storage
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     bucket: ""
 | |
|     # -- Sets the key prefix for a S3 object
 | |
|     # @section -- Amazon S3 Storage configuration
 | |
|     keyPrefix: ""
 | |
|   gcs:
 | |
|     # -- Contents of Google Application Credentials JSON file (ignored if appCredentialsJsonExistingSecret is set). Optional - if not provided, credentials will be taken from the environment. User credentials if run locally and Google Metadata server if run on a Google Compute Engine. File can be generated for a service account following this guide: https://developers.google.com/workspace/guides/create-credentials#service-account
 | |
|     # @section -- Google Cloud Storage configuration
 | |
|     appCredentialsJson: ""
 | |
|     # -- Set the Google Application Credentials JSON file for Google Cloud Storage from existing secret
 | |
|     # @section -- Google Cloud Storage configuration
 | |
|     appCredentialsJsonExistingSecret: ""
 | |
|     # -- Set the Google Application Credentials JSON file for Google Cloud Storage from existing secret key
 | |
|     # @section -- Google Cloud Storage configuration
 | |
|     appCredentialsJsonExistingSecretKey: ""
 | |
|     # -- Sets the bucket name for Google Cloud Storage. Bucket must already exist
 | |
|     # @section -- Google Cloud Storage configuration
 | |
|     bucket: ""
 | |
|   azure:
 | |
|     # -- Sets the endpoint URL for Azure Storage
 | |
|     # @section -- Azure Storage configuration
 | |
|     endpointUrl: ""
 | |
|     # -- Sets the container name for Azure Storage
 | |
|     # @section -- Azure Storage configuration
 | |
|     container: ""
 | |
|     # -- Set the access key for Azure Storage (ignored if keyExistingSecret is set). Optional - if not provided, credentials will be taken from the environment. User credentials if run locally and Managed Identity if run in Azure services
 | |
|     # @section -- Azure Storage configuration
 | |
|     key: ""
 | |
|     # -- Set the access key for Azure Storage from existing secret
 | |
|     # @section -- Azure Storage configuration
 | |
|     keyExistingSecret: ""
 | |
|     # -- Set the access key for Azure Storage from existing secret key
 | |
|     # @section -- Azure Storage configuration
 | |
|     keyExistingSecretKey: ""
 | |
| 
 | |
| # -- Node labels for pod assignment.
 | |
| nodeSelector: {}
 | |
| 
 | |
| # -- Tolerations for pod assignment
 | |
| tolerations: []
 | |
| 
 | |
| # -- Affinity for pod assignment
 | |
| affinity: {}
 | |
| 
 | |
| # -- Topology Spread Constraints for pod assignment
 | |
| topologySpreadConstraints: []
 | |
| 
 | |
| # -- HostAliases to be added to hosts-file of each container
 | |
| hostAliases: []
 | |
| 
 | |
| # -- Service values to expose Open WebUI pods to cluster
 | |
| service:
 | |
|   type: ClusterIP
 | |
|   annotations: {}
 | |
|   port: 80
 | |
|   containerPort: 8080
 | |
|   nodePort: ""
 | |
|   labels: {}
 | |
|   loadBalancerClass: ""
 | |
| 
 | |
| # -- Enables the use of OpenAI APIs
 | |
| enableOpenaiApi: true
 | |
| 
 | |
| # -- OpenAI base API URL to use. Defaults to the Pipelines service endpoint when Pipelines are enabled, and "https://api.openai.com/v1" if Pipelines are not enabled and this value is blank
 | |
| openaiBaseApiUrl: "https://api.openai.com/v1"
 | |
| 
 | |
| # -- OpenAI base API URLs to use. Overwrites the value in openaiBaseApiUrl if set
 | |
| openaiBaseApiUrls:
 | |
|   []
 | |
|   # - "https://api.openai.com/v1"
 | |
|   # - "https://api.company.openai.com/v1"
 | |
| 
 | |
| # -- Env vars added to the Open WebUI deployment. Most up-to-date environment variables can be found here: https://docs.openwebui.com/getting-started/env-configuration/
 | |
| extraEnvVars:
 | |
|   # -- Default API key value for Pipelines. Should be updated in a production deployment, or be changed to the required API key if not using Pipelines
 | |
|   - name: OPENAI_API_KEY
 | |
|     value: "0p3n-w3bu!"
 | |
|   # valueFrom:
 | |
|   #   secretKeyRef:
 | |
|   #     name: pipelines-api-key
 | |
|   #     key: api-key
 | |
|   # - name: OPENAI_API_KEY
 | |
|   #   valueFrom:
 | |
|   #     secretKeyRef:
 | |
|   #       name: openai-api-key
 | |
|   #       key: api-key
 | |
|   # - name: OLLAMA_DEBUG
 | |
|   #   value: "1"
 | |
| 
 | |
| # -- Env vars added to the Open WebUI deployment, common across environments. Most up-to-date environment variables can be found here: https://docs.openwebui.com/getting-started/env-configuration/ (caution: environment variables defined in both `extraEnvVars` and `commonEnvVars` will result in a conflict. Avoid duplicates)
 | |
| commonEnvVars: []
 | |
|   # - name: RAG_EMBEDDING_ENGINE
 | |
|   #   value: "openai"
 | |
| 
 | |
| # -- Env vars added from configmap or secret to the Open WebUI deployment. Most up-to-date environment variables can be found here: https://docs.openwebui.com/getting-started/env-configuration/ (caution: `extraEnvVars` will take precedence over the value from `extraEnvFrom`)
 | |
| extraEnvFrom: []
 | |
|   # - configMapRef:
 | |
|   #     name: my-config
 | |
|   # - secretRef:
 | |
|   #     name: my-secret
 | |
| 
 | |
| # -- Configure runtime class
 | |
| # ref: <https://kubernetes.io/docs/concepts/containers/runtime-class/>
 | |
| runtimeClassName: ""
 | |
| 
 | |
| # -- Configure container volume mounts
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-volume-storage/>
 | |
| volumeMounts:
 | |
|   initContainer: []
 | |
|   # - name: ""
 | |
|   #   mountPath: ""
 | |
|   container: []
 | |
|   # - name: ""
 | |
|   #   mountPath: ""
 | |
| 
 | |
| # -- Additional init containers to add to the deployment/statefulset
 | |
| # ref: <https://kubernetes.io/docs/concepts/workloads/pods/init-containers/>
 | |
| extraInitContainers: []
 | |
| # - name: custom-init
 | |
| #   image: busybox:latest
 | |
| #   command: ['sh', '-c', 'echo "Custom init container running"']
 | |
| #   volumeMounts:
 | |
| #   - name: data
 | |
| #     mountPath: /data
 | |
| 
 | |
| # -- Configure pod volumes
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/configure-volume-storage/>
 | |
| volumes: []
 | |
| # - name: ""
 | |
| #   configMap:
 | |
| #     name: ""
 | |
| # - name: ""
 | |
| #   emptyDir: {}
 | |
| 
 | |
| # -- Configure pod security context
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container>
 | |
| podSecurityContext:
 | |
|   {}
 | |
|   # fsGroupChangePolicy: Always
 | |
|   # sysctls: []
 | |
|   # supplementalGroups: []
 | |
|   # fsGroup: 1001
 | |
| 
 | |
| # -- Configure container security context
 | |
| # ref: <https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-containe>
 | |
| containerSecurityContext:
 | |
|   {}
 | |
|   # runAsUser: 1001
 | |
|   # runAsGroup: 1001
 | |
|   # runAsNonRoot: true
 | |
|   # privileged: false
 | |
|   # allowPrivilegeEscalation: false
 | |
|   # readOnlyRootFilesystem: false
 | |
|   # capabilities:
 | |
|   #   drop:
 | |
|   #     - ALL
 | |
|   # seccompProfile:
 | |
|   #   type: "RuntimeDefault"
 | |
| 
 | |
| sso:
 | |
|   # -- **Enable SSO authentication globally** must enable to use SSO authentication
 | |
|   # @section -- SSO Configuration
 | |
|   enabled: false
 | |
|   # -- Enable account creation when logging in with OAuth (distinct from regular signup)
 | |
|   # @section -- SSO Configuration
 | |
|   enableSignup: false
 | |
|   # -- Allow logging into accounts that match email from OAuth provider (considered insecure)
 | |
|   # @section -- SSO Configuration
 | |
|   mergeAccountsByEmail: false
 | |
|   # -- Enable OAuth role management through access token roles claim
 | |
|   # @section -- SSO Configuration
 | |
|   enableRoleManagement: false
 | |
|   # -- Enable OAuth group management through access token groups claim
 | |
|   # @section -- SSO Configuration
 | |
|   enableGroupManagement: false
 | |
| 
 | |
|   google:
 | |
|     # -- Enable Google OAuth
 | |
|     # @section -- Google OAuth configuration
 | |
|     enabled: false
 | |
|     # -- Google OAuth client ID
 | |
|     # @section -- Google OAuth configuration
 | |
|     clientId: ""
 | |
|     # -- Google OAuth client secret (ignored if clientExistingSecret is set)
 | |
|     # @section -- Google OAuth configuration
 | |
|     clientSecret: ""
 | |
|     # -- Google OAuth client secret from existing secret
 | |
|     # @section -- Google OAuth configuration
 | |
|     clientExistingSecret: ""
 | |
|     # -- Google OAuth client secret key from existing secret
 | |
|     # @section -- Google OAuth configuration
 | |
|     clientExistingSecretKey: ""
 | |
| 
 | |
|   microsoft:
 | |
|     # -- Enable Microsoft OAuth
 | |
|     # @section -- Microsoft OAuth configuration
 | |
|     enabled: false
 | |
|     # -- Microsoft OAuth client ID
 | |
|     # @section -- Microsoft OAuth configuration
 | |
|     clientId: ""
 | |
|     # -- Microsoft OAuth client secret (ignored if clientExistingSecret is set)
 | |
|     # @section -- Microsoft OAuth configuration
 | |
|     clientSecret: ""
 | |
|     # -- Microsoft OAuth client secret from existing secret
 | |
|     # @section -- Microsoft OAuth configuration
 | |
|     clientExistingSecret: ""
 | |
|     # -- Microsoft OAuth client secret key from existing secret
 | |
|     # @section -- Microsoft OAuth configuration
 | |
|     clientExistingSecretKey: ""
 | |
|     # -- Microsoft tenant ID - use 9188040d-6c67-4c5b-b112-36a304b66dad for personal accounts
 | |
|     # @section -- Microsoft OAuth configuration
 | |
|     tenantId: ""
 | |
| 
 | |
|   github:
 | |
|     # -- Enable GitHub OAuth
 | |
|     # @section -- GitHub OAuth configuration
 | |
|     enabled: false
 | |
|     # -- GitHub OAuth client ID
 | |
|     # @section -- GitHub OAuth configuration
 | |
|     clientId: ""
 | |
|     # -- GitHub OAuth client secret (ignored if clientExistingSecret is set)
 | |
|     # @section -- GitHub OAuth configuration
 | |
|     clientSecret: ""
 | |
|     # -- GitHub OAuth client secret from existing secret
 | |
|     # @section -- GitHub OAuth configuration
 | |
|     clientExistingSecret: ""
 | |
|     # -- GitHub OAuth client secret key from existing secret
 | |
|     # @section -- GitHub OAuth configuration
 | |
|     clientExistingSecretKey: ""
 | |
| 
 | |
|   oidc:
 | |
|     # -- Enable OIDC authentication
 | |
|     # @section -- OIDC configuration
 | |
|     enabled: false
 | |
|     # -- OIDC client ID
 | |
|     # @section -- OIDC configuration
 | |
|     clientId: ""
 | |
|     # -- OIDC client secret (ignored if clientExistingSecret is set)
 | |
|     # @section -- OIDC configuration
 | |
|     clientSecret: ""
 | |
|     # -- OICD client secret from existing secret
 | |
|     # @section -- OIDC configuration
 | |
|     clientExistingSecret: ""
 | |
|     # -- OIDC client secret key from existing secret
 | |
|     # @section -- OIDC configuration
 | |
|     clientExistingSecretKey: ""
 | |
|     # -- OIDC provider well known URL
 | |
|     # @section -- OIDC configuration
 | |
|     providerUrl: ""
 | |
|     # -- Name of the provider to show on the UI
 | |
|     # @section -- OIDC configuration
 | |
|     providerName: "SSO"
 | |
|     # -- Scopes to request (space-separated).
 | |
|     # @section -- OIDC configuration
 | |
|     scopes: "openid email profile"
 | |
| 
 | |
|   roleManagement:
 | |
|     # -- The claim that contains the roles (can be nested, e.g., user.roles)
 | |
|     # @section -- Role management configuration
 | |
|     rolesClaim: "roles"
 | |
|     # -- Comma-separated list of roles allowed to log in (receive open webui role user)
 | |
|     # @section -- Role management configuration
 | |
|     allowedRoles: ""
 | |
|     # -- Comma-separated list of roles allowed to log in as admin (receive open webui role admin)
 | |
|     # @section -- Role management configuration
 | |
|     adminRoles: ""
 | |
| 
 | |
|   groupManagement:
 | |
|     # -- The claim that contains the groups (can be nested, e.g., user.memberOf)
 | |
|     # @section -- SSO Configuration
 | |
|     groupsClaim: "groups"
 | |
| 
 | |
|   trustedHeader:
 | |
|     # -- Enable trusted header authentication
 | |
|     # @section -- SSO trusted header authentication
 | |
|     enabled: false
 | |
|     # -- Header containing the user's email address
 | |
|     # @section -- SSO trusted header authentication
 | |
|     emailHeader: ""
 | |
|     # -- Header containing the user's name (optional, used for new user creation)
 | |
|     # @section -- SSO trusted header authentication
 | |
|     nameHeader: ""
 | |
| 
 | |
| # -- Extra resources to deploy with Open WebUI
 | |
| extraResources:
 | |
|   []
 | |
|   # - apiVersion: v1
 | |
|   #   kind: ConfigMap
 | |
|   #   metadata:
 | |
|   #     name: example-configmap
 | |
|   #   data:
 | |
|   #     example-key: example-value
 | |
| 
 | |
| # -- Configure database URL, needed to work with Postgres (example: `postgresql://<user>:<password>@<service>:<port>/<database>`), leave empty to use the default sqlite database
 | |
| databaseUrl: ""
 | |
| 
 | |
| # -- Postgresql configuration (see. https://artifacthub.io/packages/helm/bitnami/postgresql)
 | |
| postgresql:
 | |
|   enabled: false
 | |
|   fullnameOverride: open-webui-postgres
 | |
|   architecture: standalone
 | |
|   auth:
 | |
|     database: open-webui
 | |
|     postgresPassword: 0p3n-w3bu!
 | |
|     username: open-webui
 | |
|     password: 0p3n-w3bu!
 | |
|   primary:
 | |
|     persistence:
 | |
|       size: 1Gi
 | |
|     resources:
 | |
|       requests:
 | |
|         memory: 256Mi
 | |
|         cpu: 250m
 | |
|       limits:
 | |
|         memory: 512Mi
 | |
|         cpu: 500m
 | |
| 
 | |
| # Configure Application logging levels (see. https://docs.openwebui.com/getting-started/advanced-topics/logging#-logging-levels-explained)
 | |
| logging:
 | |
|   # -- Set the global log level ["notset", "debug", "info" (default), "warning", "error", "critical"]
 | |
|   # @section -- Logging configuration
 | |
|   level: ""
 | |
| 
 | |
|   # Optional granularity: override log levels per subsystem/component
 | |
|   # if not set, it will use the global level (see. https://docs.openwebui.com/getting-started/advanced-topics/logging#%EF%B8%8F-appbackend-specific-logging-levels)
 | |
|   components:
 | |
|     # -- Set the log level for the Audio processing component
 | |
|     # @section -- Logging configuration
 | |
|     audio: ""
 | |
|     # -- Set the log level for the ComfyUI Integration component
 | |
|     # @section -- Logging configuration
 | |
|     comfyui: ""
 | |
|     # -- Set the log level for the Configuration Management component
 | |
|     # @section -- Logging configuration
 | |
|     config: ""
 | |
|     # -- Set the log level for the Database Operations (Peewee) component
 | |
|     # @section -- Logging configuration
 | |
|     db: ""
 | |
|     # -- Set the log level for the Image Generation component
 | |
|     # @section -- Logging configuration
 | |
|     images: ""
 | |
|     # -- Set the log level for the Main Application Execution component
 | |
|     # @section -- Logging configuration
 | |
|     main: ""
 | |
|     # -- Set the log level for the Model Management component
 | |
|     # @section -- Logging configuration
 | |
|     models: ""
 | |
|     # -- Set the log level for the Ollama Backend Integration component
 | |
|     # @section -- Logging configuration
 | |
|     ollama: ""
 | |
|     # -- Set the log level for the OpenAI API Integration component
 | |
|     # @section -- Logging configuration
 | |
|     openai: ""
 | |
|     # -- Set the log level for the Retrieval-Augmented Generation (RAG) component
 | |
|     # @section -- Logging configuration
 | |
|     rag: ""
 | |
|     # -- Set the log level for the Authentication Webhook component
 | |
|     # @section -- Logging configuration
 | |
|     webhook: ""
 |