No introduction found. Create it?
sonarr from bjw-s/helm/ is more popular with 64 repositories.
Install with:
helm repo add bjw-s https://bjw-s-labs.github.io/helm-charts/
helm install sonarr bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
sonarr | samip5/k8s-cluster | 133 | 3.7.3 | 8 days ago |
sonarr | h3mmy/bloopySphere | 62 | 2.6.0 | a month ago |
sonarr | rafaribe/home-ops | 68 | 3.7.3 | 2 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
string | |
boolean | |
string | |
persistence.config.accessMode (3) ReadWriteOnce | string |
string | |
persistence.config.storageClass (2) ceph-block-internal | string |
persistence.config.type (2) persistentVolumeClaim | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
persistence.media.path (5) /mnt/user/Media | string |
persistence.media.server (5) 192.168.0.130 | string |
string | |
persistence.media.advancedMounts.sonarr.sonarr[].subPath (1) plex/media/TV | string |
string | |
persistence.media.volumeSpec.nfs.path (1) /volume3/Data | string |
persistence.media.volumeSpec.nfs.server (1) ${NAS_ADDRESS} | string |
persistence.tmp.type (4) emptyDir | string |
string | |
string | |
persistence.downloads.path (2) /volume1/downloads | string |
persistence.downloads.server (2) ${NAS0_IP} | string |
string | |
boolean | |
persistence.downloads.existingClaim (1) nas-media-downloads | string |
persistence.downloads.globalMounts[].path (1) /var/mnt/merged/Downloads/ | string |
persistence.downloads.hostPath (1) /var/mnt/merged/Downloads/ | string |
string | |
persistence.backups.advancedMounts.sonarr.sonarr[].path (1) /config/Backups | string |
boolean | |
persistence.backups.globalMounts[].path (1) /config/Backups | string |
persistence.backups.path (1) /mnt/user/backups/sonarr | string |
persistence.backups.server (1) ${CORE_NFS_SERVER:=nas0} | string |
persistence.backups.volumeSpec.nfs.path (1) /volume1/backups/sonarr | string |
persistence.backups.volumeSpec.nfs.server (1) ${SYNOLOGY_ADDR} | string |
persistence.tv.path (2) /volume1/TV-Series | string |
persistence.tv.server (2) ${NAS0_IP} | string |
string | |
string | |
string | |
boolean | |
persistence.backup.globalMounts[].path (1) /config/Backups | string |
boolean | |
string | |
persistence.backup.volumeSpec.nfs.path (1) /volume3/Data/Backups/app/sonarr | string |
persistence.backup.volumeSpec.nfs.server (1) ${NAS_ADDRESS} | string |
boolean | |
string | |
boolean | |
string | |
persistence.media-2.volumeSpec.nfs.path (1) /volume1/Data2 | string |
persistence.media-2.volumeSpec.nfs.server (1) ${NAS_ADDRESS} | string |
persistence.media-anime.globalMounts[].path (1) /merge/anime | string |
persistence.media-anime.hostPath (1) /var/mnt/merged/library/Anime/ | string |
persistence.media-anime.type (1) hostPath | string |
persistence.media-ceph.existingClaim (1) ceph-media | string |
string | |
string | |
persistence.media-tv.hostPath (1) /var/mnt/merged/library/TV Shows/ | string |
persistence.media-tv.type (1) hostPath | string |
string | |
persistence.nas.hostPath (1) /mnt/nas | string |
persistence.nas.type (1) hostPath | string |
number | |
persistence.pushover-notify.globalMounts[].path (1) /scripts/pushover-notify.sh | string |
boolean | |
persistence.pushover-notify.globalMounts[].subPath (1) pushover-notify.sh | string |
persistence.pushover-notify.name (1) sonarr-configmap | string |
persistence.pushover-notify.type (1) configMap | string |
number | |
string | |
number | |
number | |
boolean | |
string | |
number | |
boolean | |
boolean | |
string | |
string | |
ingress.main.hosts[].host (7) sonarr.${cluster_ext_domain} | string |
string | |
string, number | |
string | |
string | |
string | |
ingress.main.annotations."hajimari.io/icon" (5) mdi:television-classic | string |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (3) networking-bloopnet-xyz-auth@kubernetescrd | string |
ingress.main.annotations."cert-manager.io/cluster-issuer" (2) letsencrypt-prod | string |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (1) ipv4.${SECRET_PUBLIC_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://sso.${SECRET_DOMAIN}/outpost.goauthentik.io/start?rd=$escaped_request_uri | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host;
| string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authentik.security.svc.cluster.local/outpost.goauthentik.io/auth/nginx | string |
string | |
boolean | |
string | |
ingress.main.tls[].hosts[] (4) - sonarr.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (3) sonarr-web-tls | string |
string | |
ingress.app.className (5) internal | string |
ingress.app.hosts[].host (5) {{ .Release.Name }}.${DOMAIN_NAME} | string |
string | |
string | |
string | |
string | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (2) internal.rafaribe.com | string |
string | |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
ingress.app.annotations."hajimari.io/icon" (1) mdi:television-classic | string |
string | |
ingress.app.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) network-system-authelia-auth@kubernetescrd | string |
ingress.app.tls[].hosts[] (2) - sonarr.buvis.net | string |
ingress.app.tls[].secretName (1) sonarr-crt | string |
boolean | |
ingress.sonarr.hosts[].host (3) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
number, string | |
string | |
string | |
string | |
ingress.sonarr.annotations."external-dns.alpha.kubernetes.io/target" (2) ipv4.${SECRET_DOMAIN} | string |
ingress.sonarr.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.sonarr.annotations."gethomepage.dev/description" (1) Series Request Management | string |
string | |
ingress.sonarr.annotations."gethomepage.dev/group" (1) {{ title .Release.Namespace }} | string |
ingress.sonarr.annotations."gethomepage.dev/icon" (1) {{ .Release.Name }} | string |
ingress.sonarr.annotations."gethomepage.dev/name" (1) {{ title .Release.Name }} | string |
ingress.sonarr.annotations."gethomepage.dev/siteMonitor" (1) http://{{ .Release.Name }}.{{ .Release.Namespace }}.svc.cluster.local:{{ index .Values "service" .Release.Name "ports" "http" "port" }} | string |
string | |
ingress.sonarr.annotations."gethomepage.dev/widget.key" (1) {{`{{HOMEPAGE_VAR_SONARR_TOKEN}}`}} | string |
ingress.sonarr.annotations."gethomepage.dev/widget.type" (1) {{ .Release.Name }} | string |
ingress.sonarr.annotations."gethomepage.dev/widget.url" (1) http://{{ .Release.Name }}.{{ .Release.Namespace }}.svc.cluster.local:{{ index .Values "service" .Release.Name "ports" "http" "port" }} | string |
ingress.sonarr.annotations."haproxy.org/allow-list" (1) ${HAPROXY_WHITELIST} | string |
ingress.sonarr.annotations."haproxy.org/response-set-header" (1) Strict-Transport-Security "max-age=31536000"
X-Frame-Options "DENY"
X-Content-Type-Options "nosniff"
Referrer-Policy "strict-origin-when-cross-origin"
| string |
string | |
ingress.sonarr.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-entitlements,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.sonarr.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN}/outpost.goauthentik.io/start?rd=$scheme://$http_host$escaped_request_uri | string |
ingress.sonarr.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host;
| string |
ingress.sonarr.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://ak-outpost-authentik-embedded-outpost.networking.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
string | |
boolean | |
ingress.sonarr.tls[].hosts[] (2) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
ingress.sonarr.tls[].secretName (1) {{ .Release.Name }}-${SECRET_DOMAIN/./-}-production-tls | string |
string | |
boolean | |
ingress.api.hosts[].host (1) sonarr.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.api.tls[].hosts[] (1) - sonarr.${SECRET_DOMAIN} | string |
string | |
number | |
boolean | |
number | |
string | |
string | |
number | |
boolean | |
number | |
string | |
number | |
string | |
string | |
number | |
controllers.sonarr.containers.app.image.repository (6) ghcr.io/home-operations/sonarr | string |
controllers.sonarr.containers.app.image.tag (6) 4.0.14.2938@sha256:95c3d63b46c2ff242a0b646086da557a13ef1376f415bb755b9d87c0d94d0330 | string |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.sonarr.containers.app.env.SONARR__AUTH__REQUIRED (5) DisabledForLocalAddresses | string |
number | |
string | |
controllers.sonarr.containers.app.env.TZ (5) ${TIMEZONE} | string |
string | |
string | |
controllers.sonarr.containers.app.env.SONARR__API_KEY (1) ${SECRET_SONARR_API_KEY} | string |
controllers.sonarr.containers.app.env.SONARR__APPLICATION_URL (1) https://sonarr.buvis.net | string |
string | |
string | |
string | |
string | |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
number | |
number | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
controllers.sonarr.containers.sonarr.env.SONARR__AUTH__REQUIRED (2) DisabledForLocalAddresses | string |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.sonarr.containers.sonarr.env.SONARR__APPLICATION_URL (1) https://sonarr.${INTERNAL_DOMAIN} | string |
controllers.sonarr.containers.sonarr.env.SONARR__AUTH__APIKEY (1) ${SECRET_SONARR_API_KEY} | string |
string | |
string | |
number | |
controllers.sonarr.containers.sonarr.env.SONARR__POSTGRES__HOST (1) media-postgres-v17-rw.media.svc.cluster.local | string |
string | |
string | |
string | |
number | |
string | |
controllers.sonarr.containers.sonarr.image.repository (4) ghcr.io/home-operations/sonarr | string |
controllers.sonarr.containers.sonarr.image.tag (4) 4.0.14.2938@sha256:95c3d63b46c2ff242a0b646086da557a13ef1376f415bb755b9d87c0d94d0330 | string |
string | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
number | |
number | |
controllers.sonarr.containers.exporter.args[] (3) - sonarr | string |
controllers.sonarr.containers.exporter.image.repository (3) ghcr.io/onedr0p/exportarr | string |
string | |
string | |
string | |
string | |
string | |
controllers.sonarr.containers.exporter.env[].value (2) http://localhost | string, number |
boolean | |
string | |
boolean | |
controllers.sonarr.containers.exporter.env.APIKEY (1) ${SECRET_SONARR_API_KEY} | string |
string | |
string | |
string | |
controllers.sonarr.containers.exporter.env.URL (1) http://sonarr.media.svc.cluster.local:8989 | string |
string | |
string | |
string | |
string | |
boolean | |
string | |
number | |
controllers.sonarr.containers.metrics.env.URL (1) http://{{ .Release.Name }}.{{ .Release.Namespace }}.svc.cluster.local:{{ .Values.service.app.ports.http.port }} | string |
controllers.sonarr.containers.metrics.image.repository (1) ghcr.io/onedr0p/exportarr | string |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.sonarr.initContainers.init-db.image.repository (3) ghcr.io/home-operations/postgres-init | string |
number, string | |
string | |
controllers.sonarr.type (2) statefulset | string |
string | |
string | |
string | |
number | |
string | |
number | |
boolean | |
number | |
number | |
number | |
controllers.main.containers.main.env.TZ (4) Europe/Dublin | string |
controllers.main.containers.main.env.SONARR__APPLICATION_URL (2) https://sonarr.${XYZ_DOMAIN} | string |
number | |
controllers.main.containers.main.env.PGID (1) ${MEDIA_GID} | string |
controllers.main.containers.main.env.PUID (1) ${SONARR_PUID} | string |
controllers.main.containers.main.env.SONARR__API_KEY (1) ${SONARR_API_KEY} | string |
controllers.main.containers.main.env.SONARR__AUTH__APIKEY (1) ${SONARR_APIKEY} | string |
string | |
string | |
string | |
controllers.main.containers.main.image.repository (4) ghcr.io/onedr0p/sonarr | string |
string | |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
string | |
string | |
string | |
number | |
number | |
number | |
number | |
controllers.main.containers.app.env.TZ (1) ${TIMEZONE} | string |
controllers.main.containers.app.image.repository (1) lscr.io/linuxserver/sonarr | string |
string | |
number | |
number | |
number | |
controllers.main.pod.securityContext.fsGroup (2) ${MEDIA_GID} | string, number |
string | |
controllers.main.pod.securityContext.supplementalGroups[] (2) - "568" | number |
number | |
number | |
string | |
string | |
string | |
controllers.main.type (1) statefulset | string |
boolean | |
string | |
string | |
string | |
string | |
string | |
string | |
boolean | |
string | |
string | |
string | |
string | |
string | |
serviceMonitor.main.serviceName (1) sonarr-exporter | string |
image.repository (2) ghcr.io/onedr0p/sonarr-develop | string |
image.tag (2) 4.0.0.733 | string |
number | |
podSecurityContext.fsGroupChangePolicy (2) OnRootMismatch | string |
number | |
number | |
number | |
config.existingSecret (1) sonarr-oauth2-proxy | string |
string | |
controller.strategy (1) Recreate | string |
string | |
string | |
envFrom[].secretRef.name (1) sonarr-apikey | string |
extraArgs.cookie-expire (1) 168h0m0s | string |
extraArgs.github-org (1) ${blog_name} | string |
extraArgs.github-team (1) super-admins,sonarr | string |
extraArgs.provider (1) github | string |
fullnameOverride (1) sonarr | string |
number | |
string | |
string | |
route.app.hostnames[] (1) - sonarr.media.skylab.fi | string |
route.app.parentRefs[].name (1) envoy-internal | string |
route.app.parentRefs[].namespace (1) networking | string |
route.app.parentRefs[].sectionName (1) https-media | string |
string | |
number | |
string | |
route.sonarr.annotations."hajimari.io/icon" (1) mdi:television-classic | string |
boolean | |
route.sonarr.hostnames[] (1) - sonarr.${INTERNAL_DOMAIN} | string |
route.sonarr.kind (1) HTTPRoute | string |
string | |
route.sonarr.parentRefs[].name (1) private-gateway | string |
string | |
string | |
string | |
number | |
string | |
string |