DirectorySecurity AdvisoriesPricing
Sign in
Directory
akhq logoHELM

akhq

Helm chart
Last changed
Request a free trial

Contact our team to test out this Helm chart and related images for free. Please also indicate any other images you would like to evaluate.

Overview
Chart versions
Default values
Chart metadata
Images

Tag:

1
# imagePullSecrets:
2
# - name: my-repository-secret
3
image:
4
repository: cgr.dev/chainguard-private/akhq
5
tag: latest@sha256:03de876c75acb07f72722261975cf138d34bc90d75434965bb688650cabaa34a
6
# Number of old deployment ReplicaSets to retain. The rest will be garbage collected.
7
revisionHistoryLimit: 10
8
# custom annotations (example: for prometheus)
9
annotations: {}
10
#prometheus.io/scrape: 'true'
11
#prometheus.io/port: '8080'
12
#prometheus.io/path: '/prometheus'
13
14
podAnnotations: {}
15
configmapAnnotations: {}
16
# vault.security.banzaicloud.io/vault-role: akhq
17
# vault.security.banzaicloud.io/vault-serviceaccount: akhq
18
19
secretAnnotations: {}
20
# same as configmapAnnotations
21
22
# custom labels
23
labels: {}
24
# custom.label: 'true'
25
26
podLabels: {}
27
## You can put directly your configuration here... or add java opts or any other env vars
28
extraEnv: []
29
# - name: AKHQ_CONFIGURATION
30
# value: |
31
# akhq:
32
# secrets:
33
# docker-kafka-server:
34
# properties:
35
# bootstrap.servers: "kafka:9092"
36
# - name: JAVA_OPTS
37
# value: "-Djavax.net.ssl.trustStore=/opt/java/openjdk/lib/security/cacerts -Djavax.net.ssl.trustStorePassword=password"
38
# - name: CLASSPATH
39
# value: "/any/additional/jars/desired.jar:/go/here.jar"
40
41
## Or you can also use configmap for the configuration...
42
configuration: {}
43
# akhq:
44
# server:
45
# access-log:
46
# enabled: false
47
# name: org.akhq.log.access
48
49
##... and secret for connection information
50
existingSecrets: ""
51
# name of the existingSecret
52
secrets: {}
53
# akhq:
54
# connections:
55
# my-cluster-plain-text:
56
# properties:
57
# bootstrap.servers: "kafka:9092"
58
# schema-registry:
59
# url: "http://schema-registry:8085"
60
# type: "confluent"
61
# basic-auth-username: basic-auth-user
62
# basic-auth-password: basic-auth-pass
63
# connect:
64
# - name: "my-connect"
65
# url: "http://connect:8083"
66
# basic-auth-username: basic-auth-user
67
# basic-auth-password: basic-auth-pass
68
69
#Provide extra base64 encoded kubernetes secrets (keystore/truststore)
70
kafkaSecrets: {}
71
# truststore.jks: MIIIE...
72
# keystore.jks: MIIIE...
73
74
# Any extra volumes to define for the pod (like keystore/truststore)
75
extraVolumes: []
76
# - name: certstore-secret
77
# secret:
78
# secretName: akhq-secrets
79
# items:
80
# - key: "truststore.jks"
81
# path: "truststore.jks"
82
# - key: "keystore.jks"
83
# path: "keystore.jks"
84
85
# Any extra volume mounts to define for the akhq container
86
extraVolumeMounts: []
87
# - name: certstore-secret
88
# mountPath: "/secrets"
89
# readOnly: true
90
91
# Specify ServiceAccount for pod
92
serviceAccountName: null
93
serviceAccount:
94
create: false
95
#annotations:
96
# eks.amazonaws.com/role-arn: arn:aws:iam::123456789000:role/iam-role-name-here
97
# Add your own init container or uncomment and modify the example.
98
initContainers: {}
99
# create-keystore:
100
# image: "eclipse-temurin:11-jre"
101
# command: ['sh', '-c', 'keytool']
102
# volumeMounts:
103
# - mountPath: /tmp
104
# name: certs
105
106
# Configure the Pod Security Context
107
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
108
securityContext: {}
109
# runAsNonRoot: true
110
# runAsUser: 1000
111
112
# Configure the Container Security Context
113
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
114
containerSecurityContext: {}
115
# allowPrivilegeEscalation: false
116
# privileged: false
117
# capabilities:
118
# drop:
119
# - ALL
120
# runAsNonRoot: true
121
# runAsUser: 1001
122
# readOnlyRootFilesystem: true
123
124
service:
125
enabled: true
126
type: ClusterIP
127
port: 80
128
managementPort: 28081
129
#httpNodePort: 32551
130
#managementNodePort: 32552
131
labels: {}
132
loadBalancerIP: ""
133
annotations:
134
# cloud.google.com/load-balancer-type: "Internal"
135
ingress:
136
enabled: false
137
ingressClassName: ""
138
annotations: {}
139
# kubernetes.io/ingress.class: nginx
140
# kubernetes.io/tls-acme: "true"
141
labels: {}
142
paths:
143
- /
144
pathType: "ImplementationSpecific"
145
hosts:
146
- akhq.demo.com
147
tls: []
148
# - secretName: akhq-tls
149
# hosts:
150
# - akhq.demo.com
151
### Readiness / Liveness probe config.
152
### ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
153
readinessProbe:
154
enabled: true
155
prefix: "" # set same as `micronaut.server.context-path`
156
path: /health
157
port: management
158
initialDelaySeconds: 5
159
periodSeconds: 10
160
timeoutSeconds: 5
161
successThreshold: 1
162
failureThreshold: 3
163
httpGetExtra: {}
164
livenessProbe:
165
enabled: true
166
prefix: "" # set same as `micronaut.server.context-path`
167
path: /health
168
port: management
169
initialDelaySeconds: 5
170
periodSeconds: 10
171
timeoutSeconds: 5
172
successThreshold: 1
173
failureThreshold: 3
174
httpGetExtra: {}
175
resources: {}
176
# limits:
177
# cpu: 100m
178
# memory: 128Mi
179
# requests:
180
# cpu: 100m
181
# memory: 128Mi
182
183
nodeSelector: {}
184
tolerations: []
185
affinity: {}
186
networkPolicy:
187
enabled: true
188
labels: {}
189

The trusted source for open source

Talk to an expert
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsChainguard OS PackagesChainguard ActionsChainguard Agent SkillsIntegrationsPricing
© 2026 Chainguard, Inc. All Rights Reserved.
Chainguard® and the Chainguard logo are registered trademarks of Chainguard, Inc. in the United States and/or other countries.
The other respective trademarks mentioned on this page are owned by the respective companies and use of them does not imply any affiliation or endorsement.