Authentik Helm woes - tchncs

I’m currently in the long process of rebuilding my declarative homelab using k3s, ArgoCD and NixOS. I had previously used Keycloak but that always seemed massively overqualified and way too complex for my purposes. With this rebuild I saw my chance to try out Authentik which appears to be in good standing with the homelab community. They have tons of documentation for pretty much anything which was encouraging to me. Well except for the documentation for their Helm Charts maybe… Started off with version 2025.12.x, am now onto 2026.02.x and have spent most weekends in between that on getting Authentik to even just deploy to the cluster. It’s partially my fault for attempting to use Secrets initially but even now with hardcoded keys in my git repo the default example chart doesn’t work: ::: spoiler values.yaml yaml authentik: existingSecret: secretName: authentik-secret postgresql: # None of this gets applied at all so I do it manually below... password: "somepasswd" server: replicas: 1 env: # Manually apply all the configuration values. Why am I using Helm charts again? - name: AUTHENTIK_POSTGRESQL__HOST value: authentik-postgresql - name: AUTHENTIK_POSTGRESQL__USER value: authentik - name: AUTHENTIK_POSTGRESQL__PASSWORD value: "somepasswd" - name: AUTHENTIK_POSTGRESQL__NAME value: authentik route: main: # ... postgresql: enabled: true auth: # And set everything here once again username: authentik password: "somepasswd" postgresPassword: "somepasswd" usePasswordFiles: false database: authentik primary: persistence: size: 4Gi ::: I started off with the official example [https://github.com/goauthentik/helm/blob/main/charts/authentik/README.md] and after all these undocumented changes it only deploys-ish: With the defaults authentik-server would always try to reach the DB under localhost which doesn’t work in the context of this chart/k8s. So after a while I figured out that the authentik: configuration block doesn’t actually do anything and I set all the values the chart should set by hand. Now the DB connects but the liveliness probe on the authentik-server pod fails. It logs the incoming probe requests but apparently doesn’t answer them (correctly) leading to k8s killing the pod. Sorry for the ramble but I’ve hit my motivational breaking point with Authentik. Since the community seems to like it a bit I am left wondering what I’m doing wrong to have this many issues with it. Did you people have this much trouble with Authentik and what have you switched to instead?

@kenji oh neue gute Lektüre! Vor dem lesen tippe ich mal Richtung „alles wo USA drin ist, ist nicht sicher“ (#cloudact ) und wenn man es nicht selbst hosten kann( #selfhosted ), dann doch bitte eher etwas Richtung #hetzner .

Traefik + TinyAuth + PocketID issues

https://lemmy.ml/post/45327843

Traefik + TinyAuth + PocketID issues - Lemmy

I’m using TinyAuth for forwardauth but the service I’m trying to use consistently is saying the headers are not set (and I can verify, they’re not there.) Traefik: in static config entryPoints: web: address: ':80' transport: respondingTimeouts: readTimeout: 600s idleTimeout: 600s writeTimeout: 600s http: redirections: entryPoint: to: websecure scheme: https websecure: address: ':443' http: tls: certResolver: letsencrypt domains: - main: domain.tld sans: - '*.domain.tld' forwardedHeaders: trustedIPs: - [TinyAuth IP] in dynamic config: tinyauth-auth: forwardAuth: address: "http://[TinyAuth IP]:3000/api/auth/traefik" trustForwardHeader: true authResponseHeaders: - Remote-User - Remote-Groups - Remote-Name - Remote-Email This is set as a middleware in the app I’m trying to use. in tinyauth: TINYAUTH_APPURL=https://tinyapp.domain.tld/ TINYAUTH_AUTH_TRUSTEDPROXIES=[Traefik IP] TINYAUTH_APPS_APP_CONFIG_DOMAIN='app.domain.tld' TINYAUTH_APPS_APP_RESPONSE_HEADERS='Remote-User,Remote-Email,Remote-Group,Remote-Name,X-Remote-Name,X-Remote-User,X-Remote-Group,X-Remote-Email,Forwarded-Host,Forwarded-URI' (I kept adding response headers hoping something would change) PocketID is set as an OAuth provider and seems to be working fine, but I can provide further detail if needed. Curiously, I tried changing the address in the traefik config to “https://tinyauth.domain.tld/ [https://tinyauth.domain.tld/]” and the headers came through properly, but the redirect went to https://tinyauth.domain.tld/api/auth/traefik [https://tinyauth.domain.tld/api/auth/traefik]. I think this [https://github.com/steveiliop56/tinyauth/issues/271]is actually my issue but they never posted their solution.

Docmost v0.71.0 is packed: PDF embeds, audio player, login session management, viewer comments, and important security fixes. Upgrade recommended! #selfhosted #homelab

https://github.com/docmost/docmost/releases/tag/v0.71.0

Release v0.71.0 · docmost/docmost

Highlight Page update notifications PDF embed Audio player User login session management Allow viewers to comment (EE) Other fixes and improvements Security This release contains security fixes a...

GitHub

How to Run Self-Hosted Link-in-Bio Tool with #LinkStack on #AlmaLinux #VPS

This article provides a guide for how to run self-hosted Link-in-Bio tool with LinkStack on AlmaLinux VPS.
How to Run Self-Hosted Link-in-Bio Tool with LinkStack on AlmaLinux VPS
This guide walks you through installing and running LinkStack, a free and open-source alternative to Linktree, on an ...
Continued 👉 https://blog.radwebhosting.com/self-hosted-link-in-bio-tool-with-linkstack-on-almalinux-vps/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.raddemo.host #opensource #selfhosting #laravel #composr #python #selfhosted #letsencrypt

How to Run Self-Hosted Link-in-Bio Tool with #LinkStack on #AlmaLinux #VPS

This article provides a guide for how to run self-hosted Link-in-Bio tool with LinkStack on AlmaLinux VPS.
How to Run Self-Hosted Link-in-Bio Tool with LinkStack on AlmaLinux VPS
This guide walks you through installing and running LinkStack, a free and open-source alternative to Linktree, on an ...
Continued 👉 https://blog.radwebhosting.com/self-hosted-link-in-bio-tool-with-linkstack-on-almalinux-vps/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #selfhosting #python #composr #opensource #letsencrypt #selfhosted #laravel

🚀 How to Deploy #Directus on #Ubuntu #VPS

This guide details the steps required to deploy Directus on Ubuntu VPS server. Our guide walks through deploying Directus on a fresh Ubuntu VPS with PostgreSQL, PM2, and Nginx.
What is Directus?
Directus is an open-source headless CMS and data platform that sits on top of a SQL database (like PostgreSQL or MySQL) and ...
Continued 👉 https://blog.radwebhosting.com/deploy-directus-on-ubuntu-vps/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #selfhosting #cmsapps #opensource #selfhosted #nodejs #headlesscms #contentmanagement

Moje ulubione aplikacje self-hosted (część 1)

Już od co najmniej kilku lat polegam na zestawie aplikacji do samodzielnego hostowania. W tym wpisie chciałbym podzielić się moimi doświa...

Michał Narecki - blog

Norri is written in Go, which we picked over Python and Rust.

Goroutines handle scanning, metadata fetching, and API serving concurrently with low overhead. That's what you want in a media server.

Python's GIL gets in the way on CPU-bound work. Rust was tempting but the dev speed trade-off wasn't worth it for this. Single binary, small Docker image, fast startup.

Not the most exciting language. Gets the job done though.

#Norri #golang #selfhosted #mediaserver

This week, I'm taking a break from #OpenClaw and getting to grips with #HermesAgent

Early days, but it feels less fluid and flexible than OpenClaw. That may turn out to be a benefit for scaling, but I've found myself muttering "Oh, I could do that in OpenClaw but not here?" more than a few times.

How I think about my preferred workflow will have to change.

#AgenticAI #LLMs #SelfHosted