Skip to main content
Version: 8.8 (unreleased)

Install Bitnami enterprise images

This page explains how to configure the Camunda Helm chart to use Bitnami enterprise images for production environments, including guidance on security, CVE reporting, and installation steps.

Overview

By default, the Camunda Helm chart uses Bitnami open-source images. However, for production environments that require enhanced security and vendor support, enterprise images are available.

Important change since Camunda 8.8

In earlier versions, some users relied on Bitnami subcharts in production. Starting with 8.8, Bitnami subcharts are intended primarily for development and testing, unless your operational teams have expertise with Bitnami charts production deployments.

For existing users: If you used Bitnami subcharts in production before 8.8, review the implications for your current setup. See Changes to Camunda Helm Sub-Charts for more details.

Recommended approach: For production environments, Camunda recommends deploying infrastructure services separately from the Camunda Helm charts. This approach lets you:

  • Use your preferred deployment method
  • Leverage managed services (for example, AWS OpenSearch or Azure Database)
  • Manage infrastructure lifecycle independently of Camunda
  • Gain greater operational control and flexibility

If you use Bitnami-based subcharts in production, Camunda strongly recommend using vendor-supported enterprise images. This guide explains how to configure and install Camunda with these enterprise images.

Understanding Bitnami image offerings

Due to Bitnami chart security policy changes, Camunda transitioned from open-source Bitnami images to enterprise-grade alternatives. These enterprise images require an additional values file, described below.

Available image types

Image TypeRegistry PathBase OSSupport LevelTarget Use
Open-sourcebitnamilegacy/*DebianCommunity-maintainedDevelopment and testing
Premiumbitnamipremium/*
(Camunda proxied through vendor-ee)
DebianEnterprise support with security patchesProduction
Securebitnamisecure/*VMware PhotonOSMinimal attack surfaceHigh-security environments

Why Camunda uses Premium images

Camunda currently provides Premium images only.

  • Available: Debian-based Premium images in the vendor-ee registry (Camunda provides only these for consistency)
  • Not available: PhotonOS-based Secure images are not provided by Camunda

Benefits of enterprise images

Enterprise images provide key advantages over open-source alternatives:

Benefit CategoryKey Features
Security
  • Critical CVE (Common Vulnerabilities and Exposures) patches
  • Security hardening
  • Regular vulnerability assessments
Support
  • SLA guarantees
  • Professional maintenance
Enterprise
  • Private registry (registry.camunda.cloud)
  • Customer-exclusive access
  • Integrated support

Environment-specific recommendations

Choose your approach based on security requirements and operational constraints:

Environment TypeInfrastructure ApproachCVE Management Strategy
Development/TestingBitnami subcharts with open-source imagesFocus on functionality over security hardening
Production (Moderate Security)Bitnami Premium images with vendor supportAccept CVE scanner findings from OS layers. Prioritize critical/high-severity vulnerabilities with available fixes
Production (Strict Compliance)Managed services (AWS RDS, Azure Database, Google Cloud SQL) or separately deployed infrastructure with security-hardened imagesEngage vendors for enterprise support and SLA-backed security patching
High-Security/Near-Zero CVEsMinimal base images (Alpine, Distroless) with custom infrastructure deployment. Alternative: PhotonOS-based Secure imagesAlternative secure image distributions or custom-built containers

Installation process

Step 1: Create a Kubernetes registry secret

To access the private registry, create a Kubernetes docker-registry secret using your Camunda Enterprise credentials:

kubectl create secret docker-registry registry-camunda-cloud \
--docker-server=registry.camunda.cloud \
--docker-username=<your-username> \
--docker-password=<your-password> \
--docker-email=unused@example.com

Configuration notes:

  • Replace <your-username> and <your-password> with your LDAP credentials
  • The email field is unused but required by Kubernetes
  • For more details, see Specifying imagePullSecrets on a Pod

Step 2: Install the Helm chart with enterprise images

Camunda provides a values-enterprise.yaml file that configures the chart to use enterprise images.

About vendor pull secrets

The values-enterprise.yaml file references the commonVendorPullSecrets parameter, which defines the secret required to access the private registry.

This is required because global.image.pullSecrets does not apply to vendor charts.

Default configuration: The secret name defaults to registry-camunda-cloud. You can override this using:

Installation command:

helm install camunda camunda/camunda-platform --version $HELM_CHART_VERSION \
--values https://raw.githubusercontent.com/camunda/camunda-platform-helm/main/charts/camunda-platform-8.8/values.yaml \
--values https://raw.githubusercontent.com/camunda/camunda-platform-helm/main/charts/camunda-platform-8.8/values-enterprise.yaml

This command deploys Camunda with vendor-supported enterprise images, recommended for secure and stable production environments.

Understanding CVEs in Bitnami images

Working with Bitnami images requires understanding CVE (Common Vulnerabilities and Exposures) reporting and expectations.

CVE responsibility matrix

Security responsibility differs across components:

Component TypeExamplesSecurity ResponsibilityCVE Handling
Camunda componentsZeebe, Operate, Tasklist, Optimize, Connectors, IdentityCamunda directlyRegular updates and patches in Camunda releases. See Security notices
Vendor componentsBitnami PostgreSQL, Elasticsearch, KeycloakRespective vendor (Bitnami/VMware)Camunda mitigates by upgrading to latest vendor versions

If vendors assess that a vulnerability has no practical impact, Camunda may accept this assessment or migrate to alternative solutions.

Expected behavior: high CVE counts

Bitnami images typically show high CVE counts in security scans. This is expected because they include multiple layers:

  • Application layer: PostgreSQL, Elasticsearch, Keycloak
  • Complete operating system: Debian with system libraries
  • Runtime dependencies: JVM, Python, system utilities
  • Supporting libraries: SSL, compression, networking components

Vulnerability scanners report CVEs across all layers, which inflates counts even when images are secure and up-to-date.

tip

To reduce CVE exposure, Camunda recommends using managed services (AWS RDS, Azure Database, Google Cloud SQL) instead of Bitnami subcharts in production.

Bitnami's CVE management approach

Bitnami's Open CVE Policy defines their security approach:

  • Fixable CVEs are addressed when upstream patches become available
  • Open or unfixable CVEs remain until resolved by OS or application maintainers
  • Critical vulnerabilities receive priority with expedited security updates

Even enterprise Bitnami Premium images will continue to show CVE counts, despite being patched against critical vulnerabilities.

Important limitations

When working with Bitnami images, be aware of these constraints:

  • CVE persistence: Enterprise Bitnami images may still show CVEs due to OS-level vulnerabilities
  • Compliance gaps: If your requirements mandate near-zero CVEs, these images may not be sufficient
  • Alternative needed: Consider managed services or custom-built minimal images for high-security environments