No introduction found. Create it?
Install with:
helm repo add crowdsec https://crowdsecurity.github.io/helm-charts/
helm install crowdsec crowdsec/crowdsec -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
crowdsec | pascaliske/infrastructure | 66 | 0.19.5 | 7 days ago |
crowdsec | xunholy/k8s-gitops | 572 | 0.19.5 | 22 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
boolean | |
boolean | |
agent.acquisition[].namespace (5) network | string |
agent.acquisition[].podName (5) external-ingress-nginx-controller-* | string |
string | |
boolean | |
agent.env[].name (4) DISABLE_crONLINE_API | string |
agent.env[].value (4) false | string |
boolean | |
agent.persistentVolume.config.accessModes[] (1) - ReadWriteMany | string |
agent.persistentVolume.config.existingClaim (1) crowdsec-agent-config-pvc | string |
string | |
string | |
string | |
string | |
string | |
agent.additionalAcquisition[].filenames[] (1) - /nextcloud.log | string |
string | |
string | |
agent.extraVolumeMounts[].mountPath (1) /nextcloud.log | string |
agent.extraVolumeMounts[].name (1) nextcloud-log | string |
boolean | |
agent.extraVolumes[].hostPath.path (1) /mnt/sdc1/nextcloud/data/nextcloud.log | string |
agent.extraVolumes[].name (1) nextcloud-log | string |
agent.tolerations[].effect (1) NoSchedule | string |
agent.tolerations[].key (1) node-role.kubernetes.io/control-plane | string |
agent.tolerations[].operator (1) Exists | string |
string | |
container_runtime (6) containerd | string |
boolean | |
boolean | |
lapi.dashboard.ingress.host (3) crowdsec.${SECRET_DOMAIN} | string |
string | |
lapi.dashboard.ingress.tls[].hosts[] (2) - crowdsec.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
lapi.dashboard.ingress.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) traefik-chain-basic@kubernetescrd,traefik-bouncer@kubernetescrd,traefik-local@kubernetescrd | string |
string | |
string | |
lapi.dashboard.ingress.labels.type (1) lapi-dashboard | string |
string | |
lapi.dashboard.image.repository (1) metabase/metabase | string |
lapi.dashboard.image.tag (1) v0.55.10 | string |
boolean | |
boolean | |
lapi.env[].name (5) TZ | string |
lapi.env[].value (5) ${SECRET_TIMEZONE} | string |
string | |
lapi.env[].valueFrom.secretKeyRef.name (2) crowdsec-secret | string |
boolean | |
lapi.persistentVolume.config.accessModes[] (3) - ReadWriteOnce | string |
string | |
string | |
lapi.persistentVolume.config.existingClaim (1) crowdsec-config-pvc | string |
boolean | |
lapi.persistentVolume.data.accessModes[] (3) - ReadWriteOnce | string |
string | |
string | |
lapi.persistentVolume.data.existingClaim (1) crowdsec-db-pvc | string |
lapi.extraVolumeMounts[].mountPath (2) /etc/crowdsec_data/notifications/http.yaml | string |
lapi.extraVolumeMounts[].name (2) http-config | string |
boolean | |
lapi.extraVolumeMounts[].subPath (1) http.yaml | string |
lapi.extraVolumes[].name (2) http-config | string |
lapi.extraVolumes[].hostPath.path (1) /home/elraro/home-ops/volumes/crowdsec/http.yaml | string |
string | |
string | |
lapi.extraVolumes[].secret.secretName (1) crowdsec-secret | string |
boolean | |
lapi.ingress.host (2) crowdsec.${SECRET_DOMAIN} | string |
string | |
lapi.ingress.tls[].hosts[] (2) - crowdsec.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
string | |
lapi.strategy.type (1) Recreate | string |
image.repository (3) ghcr.io/crowdsecurity/crowdsec | string |
image.tag (3) v1.6.11 | string |
image.pullPolicy (2) IfNotPresent | string |
tls.enabled (3) false | boolean |
string | |
config."profiles.yaml" (2) notifications:
- http_default
| string |
string | |
boolean | |
reflector.env[].name (1) OPNSENSE_URL | string |
reflector.env[].value (1) https://opnsense.${SECRET_DOMAIN} | string |
reflector.env[].valueFrom.secretKeyRef.key (1) opnsense-api-key | string |
reflector.env[].valueFrom.secretKeyRef.name (1) crowdsec-secret | string |