Skip to main content
Version: 8.8

Install Bitnami enterprise images

This guide explains how to configure the Camunda Helm chart to use Bitnami Premium images designed for production environments. These images are referred to as Enterprise images, indicating that they are intended for Camunda Enterprise customers. The guide also covers configuration steps, security considerations, CVE reporting, and best practices.

Overview

By default, the Camunda Helm chart deploys Bitnami open-source images. For production environments that require enhanced security and vendor support, Camunda enables access to Bitnami Premium images through a vendor-proxied registry for licensed enterprise customers.

Important update since Camunda 8.8

Previously, some users deployed Bitnami subcharts in production. Starting with Camunda 8.8, Bitnami subcharts are primarily intended for development and testing purposes unless your teams have specific expertise with Bitnami charts in production.

For existing users: You may continue using Bitnami subcharts in your environments. If you have production deployments using these subcharts prior to 8.8, review the implications for your setup. See Changes to Camunda Helm Sub-Charts for details.

Recommended approach: For production, Camunda advises deploying infrastructure services independently of the Camunda Helm charts. This approach allows you to:

  • Use your preferred deployment method
  • Utilize managed services (e.g., AWS OpenSearch, Azure Database)
  • Manage infrastructure lifecycle separately from Camunda charts
  • Achieve greater operational control and flexibility
Alternative: Vendor-supported Infrastructure

For production environments, consider using vendor-supported deployment methods instead of Bitnami subcharts. This approach leverages official Kubernetes operators (CloudNativePG, ECK, Keycloak Operator) that provide enterprise-grade features and vendor support.
See Deploy infrastructure with vendor-supported methods for detailed instructions.

If you use Bitnami-based subcharts in production, Camunda strongly recommends using Bitnami Premium images licensed by Camunda and maintained by Bitnami (Broadcom). This guide explains how to configure and install Camunda with these images.

Understanding Bitnami image offerings

Following Bitnami chart security policy changes, Camunda transitioned from open-source Bitnami images to Bitnami Premium images licensed by Broadcom. These images require an additional values file for configuration, detailed below.While Bitnami also provides a repository of Secure images, Camunda continues to mirror the Premium versions in its subcharts.

Available image types

Image TypeRegistry PathBase OSSupport LevelIntended Use
Open-sourcebitnamilegacy/*DebianCommunity-supportedDevelopment and testing
Premiumbitnamipremium/*
(Camunda proxied through vendor-ee repository)
DebianVendor-supportedProduction

Why Camunda uses Bitnami Premium images

  • Availability: Debian-based Premium images accessible via a vendor-proxied registry (Camunda facilitates access for licensed customers)
  • Support: Vendor-maintained with SLAs and security patches
  • Exclusions: PhotonOS-based Premium images are not distributed or supported by Camunda

For more information, see Bitnami and Bitnami Documentation.

Benefits of Bitnami Premium images

Bitnami Premium images offer key advantages over open-source variants:

Benefit CategoryKey Features
Security
  • Timely CVE patches
  • Security hardening
  • Regular vulnerability assessments
Support
  • SLA-backed maintenance
  • Professional vendor support
Enterprise
  • Access via private registry (registry.camunda.cloud)
  • Customer-exclusive availability
  • Integrated vendor support

Environment-specific recommendations

Select your deployment approach based on security requirements and operational needs:

Environment TypeInfrastructure ApproachCVE Management Strategy
Development/TestingBitnami subcharts with open-source imagesPrioritize functionality; security hardening less critical
Production (Moderate Security)Bitnami Premium images with vendor supportAccept OS-layer CVE reports; prioritize critical/high severity vulnerabilities with available fixes
Production (Strict Compliance)Managed services (AWS RDS, Azure Database, Google Cloud SQL) or separately deployed hardened imagesEngage vendors for enterprise support and SLA-backed security patching
High-Security/Near-Zero CVEsMinimal base images (Alpine, Distroless) with custom infrastructure or alternative secure image distributionsUse alternative secure image distributions or custom-built containers to meet strict CVE requirements

Installation process

Step 1: Create a Kubernetes registry secret

To access the private registry, create a Kubernetes docker-registry secret with your Camunda Enterprise credentials:

kubectl create secret docker-registry registry-camunda-cloud \
--docker-server=registry.camunda.cloud \
--docker-username=<your-username> \
--docker-password=<your-password> \
--docker-email=unused@example.com

Notes:

  • Replace <your-username> and <your-password> with your LDAP credentials
  • The email field is required by Kubernetes but not used
  • See Specifying imagePullSecrets on a Pod for details

Step 2: Install the Helm chart with enterprise images

Camunda provides a values-enterprise.yaml file to configure the chart to use Premium images.

About vendor pull secrets

The values-enterprise.yaml references commonVendorPullSecrets to specify the secret for accessing the private registry.

This is necessary because global.image.pullSecrets does not apply to vendor charts.

Default secret name: registry-camunda-cloud. You can override this via:

  • The --set flag
  • A custom values-enterprise.yaml
  • Other Helm value override methods (Helm values files)

Installation command:

helm install camunda camunda/camunda-platform --version $HELM_CHART_VERSION \
--values https://raw.githubusercontent.com/camunda/camunda-platform-helm/main/charts/camunda-platform-8.8/values.yaml \
--values https://raw.githubusercontent.com/camunda/camunda-platform-helm/main/charts/camunda-platform-8.8/values-enterprise.yaml

This deploys Camunda with vendor-supported Premium images, recommended for secure, stable production environments.

Keycloak Helm chart fork

Camunda uses a forked Keycloak Helm chart based on Bitnami’s chart. The Keycloak image has been upgraded to the latest public release, and environment variable names have been adjusted for compatibility with both enterprise and open-source deployments.

The fork ensures ease of distribution and backward compatibility.

See the implementation in the Camunda Helm repository: Keycloak Helm chart.

Understanding CVEs in Bitnami images

Working with Bitnami images requires understanding CVE (Common Vulnerabilities and Exposures) reporting and how to interpret scan results.

CVE responsibility matrix

Security responsibilities differ by component:

Component TypeExamplesSecurity ResponsibilityCVE Handling
Camunda componentsZeebe, Operate, Tasklist, Optimize, Connectors, IdentityCamundaRegular updates and patches in Camunda releases. See Security notices
Vendor componentsBitnami PostgreSQL, Elasticsearch, KeycloakBitnami (Broadcom)Camunda facilitates upgrades to latest vendor versions

If a vendor determines a vulnerability has no practical impact, Camunda may accept that assessment or migrate to alternatives.

Expected behavior: high CVE counts

Bitnami images often report many CVEs in vulnerability scans. This occurs because these images include multiple layers:

  • Application layer: PostgreSQL, Elasticsearch, Keycloak
  • Operating system: Debian with system libraries
  • Runtime dependencies: JVM, Python, system utilities
  • Supporting libraries: SSL, compression, networking components

Scanners report CVEs across all layers, inflating counts even when images are secure and up-to-date.

tip

To reduce CVE exposure, Camunda recommends using managed services (AWS RDS, Azure Database, Google Cloud SQL) rather than Bitnami subcharts in production.

Bitnami’s CVE management approach

Bitnami’s Open CVE Policy outlines their security process:

  • Fixable CVEs are patched promptly when upstream fixes are available
  • Open or unfixable CVEs remain until resolved by OS or application maintainers
  • Critical vulnerabilities receive priority with expedited security updates

Even enterprise Bitnami Premium images will show CVE counts due to OS-level vulnerabilities despite patches for critical issues.

Important limitations

When using Bitnami images, consider these constraints:

  • CVE persistence: OS-level CVEs may remain visible in scans
  • Compliance requirements: Near-zero CVE policies may not be achievable with these images
  • Alternatives: For strict security, consider managed services or custom minimal images

Compatibility note

This configuration follows Bitnami’s official image and chart usage guidelines. For licensing, support levels, and CVE management, refer to Bitnami Documentation and Bitnami Enterprise.