1. Get the application URL by running these commands: {{- if .Values.ingress.enabled }} {{- range $host := .Values.ingress.hosts }} {{- range .paths }} http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }} {{- end }} {{- end }} {{- else if contains "NodePort" .Values.service.type }} export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "mealie.fullname" . }}) export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") echo http://$NODE_IP:$NODE_PORT {{- else if contains "LoadBalancer" .Values.service.type }} NOTE: It may take a few minutes for the LoadBalancer IP to be available. You can watch the status of by running 'kubectl get --namespace {{ .Release.Namespace }} svc -w {{ include "mealie.fullname" . }}' export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "mealie.fullname" . }} --template "{{"{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}"}}") echo http://$SERVICE_IP:{{ .Values.service.port }} {{- else if contains "ClusterIP" .Values.service.type }} export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app.kubernetes.io/name={{ include "mealie.name" . }},app.kubernetes.io/instance={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}") export CONTAINER_PORT=$(kubectl get pod --namespace {{ .Release.Namespace }} $POD_NAME -o jsonpath="{.spec.containers[0].ports[0].containerPort}") echo "Visit http://127.0.0.1:8080 to use your application" kubectl --namespace {{ .Release.Namespace }} port-forward $POD_NAME 8080:$CONTAINER_PORT {{- end }} 2. Mealie application is configured with: - Database: {{ .Values.env.DB_ENGINE }} - User signup: {{ if eq .Values.env.ALLOW_SIGNUP "true" }}enabled{{ else }}disabled{{ end }} - API port: {{ .Values.env.API_PORT }} {{- if .Values.persistence.enabled }} 3. Data is persisted using PVC: {{ include "mealie.fullname" . }}-data {{- else }} 3. WARNING: No persistence enabled. Data will be lost when pods are restarted. {{- end }} {{- if .Values.postgresql.external.enabled }} 4. Using external PostgreSQL database: - Host: {{ .Values.postgresql.external.host }} - Database: {{ .Values.postgresql.external.database }} {{- end }} {{- if or .Values.email.enabled .Values.ldap.enabled .Values.oidc.enabled .Values.openai.enabled }} 5. Additional features enabled: {{- if .Values.email.enabled }} - SMTP Email notifications configured {{- end }} {{- if .Values.ldap.enabled }} - LDAP authentication enabled {{- end }} {{- if .Values.oidc.enabled }} - OpenID Connect (OIDC) authentication enabled {{- end }} {{- if .Values.openai.enabled }} - OpenAI integration enabled for AI features {{- end }} {{- end }} {{- if or .Values.postgresql.external.existingSecret .Values.email.existingSecret .Values.ldap.existingSecret .Values.oidc.existingSecret .Values.openai.existingSecret .Values.tls.existingSecret }} 6. Using external secrets for sensitive information: {{- if .Values.postgresql.external.existingSecret }} - Database credentials from: {{ .Values.postgresql.external.existingSecret }} {{- end }} {{- if .Values.email.existingSecret }} - SMTP credentials from: {{ .Values.email.existingSecret }} {{- end }} {{- if .Values.ldap.existingSecret }} - LDAP credentials from: {{ .Values.ldap.existingSecret }} {{- end }} {{- if .Values.oidc.existingSecret }} - OIDC credentials from: {{ .Values.oidc.existingSecret }} {{- end }} {{- if .Values.openai.existingSecret }} - OpenAI API key from: {{ .Values.openai.existingSecret }} {{- end }} {{- if .Values.tls.existingSecret }} - TLS certificates from: {{ .Values.tls.existingSecret }} {{- end }} {{- else }} 6. SECURITY NOTE: For production use, it's recommended to store sensitive data in Kubernetes Secrets. Consider using existingSecret options for database, email, LDAP, OIDC, and OpenAI configurations. {{- end }} For more information about using this Helm chart, please refer to the readme.md file.