No introduction found. Create it?
Install with:
helm repo add crowdsec https://crowdsecurity.github.io/helm-charts/
helm install crowdsec crowdsec/crowdsec -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
crowdsec | pascaliske/infrastructure | 64 | 0.19.2 | 8 days ago |
crowdsec | xunholy/k8s-gitops | 552 | 0.19.2 | a month ago |
See the most popular values for this chart:
Key | Types |
---|---|
boolean | |
boolean | |
string | |
agent.acquisition[].podName (4) nginx-external-controller-* | string |
string | |
boolean | |
agent.env[].name (4) DISABLE_crONLINE_API | string |
agent.env[].value (4) false | string |
boolean | |
agent.persistentVolume.config.accessModes[] (1) - ReadWriteMany | string |
agent.persistentVolume.config.existingClaim (1) crowdsec-agent-config-pvc | string |
string | |
string | |
agent.additionalAcquisition[].filenames[] (1) - /nextcloud.log | string |
string | |
string | |
agent.extraVolumeMounts[].mountPath (1) /nextcloud.log | string |
agent.extraVolumeMounts[].name (1) nextcloud-log | string |
boolean | |
agent.extraVolumes[].hostPath.path (1) /mnt/sdc1/nextcloud/data/nextcloud.log | string |
agent.extraVolumes[].name (1) nextcloud-log | string |
string | |
string | |
string | |
agent.tolerations[].effect (1) NoSchedule | string |
agent.tolerations[].key (1) node-role.kubernetes.io/control-plane | string |
agent.tolerations[].operator (1) Exists | string |
string | |
container_runtime (5) containerd | string |
boolean | |
boolean | |
lapi.dashboard.ingress.host (3) crowdsec.${SECRET_DOMAIN} | string |
string | |
lapi.dashboard.ingress.tls[].hosts[] (2) - crowdsec.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
lapi.dashboard.ingress.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) traefik-chain-basic@kubernetescrd,traefik-bouncer@kubernetescrd,traefik-local@kubernetescrd | string |
string | |
string | |
lapi.dashboard.ingress.labels.type (1) lapi-dashboard | string |
string | |
lapi.dashboard.image.repository (1) metabase/metabase | string |
lapi.dashboard.image.tag (1) v0.54.5 | string |
boolean | |
boolean | |
lapi.env[].name (4) DISABLE_AGENT | string |
lapi.env[].value (4) true | string |
string | |
lapi.env[].valueFrom.secretKeyRef.name (1) crowdsec-secret | string |
boolean | |
lapi.persistentVolume.config.accessModes[] (2) - ReadWriteOnce | string |
string | |
lapi.persistentVolume.config.existingClaim (1) crowdsec-config-pvc | string |
string | |
boolean | |
lapi.persistentVolume.data.accessModes[] (2) - ReadWriteOnce | string |
string | |
lapi.persistentVolume.data.existingClaim (1) crowdsec-db-pvc | string |
lapi.persistentVolume.data.storageClassName (1) standard-rwx | string |
lapi.extraVolumeMounts[].mountPath (2) /etc/crowdsec_data/notifications/http.yaml | string |
lapi.extraVolumeMounts[].name (2) http-config | string |
boolean | |
lapi.extraVolumeMounts[].subPath (1) http.yaml | string |
lapi.extraVolumes[].name (2) http-config | string |
lapi.extraVolumes[].hostPath.path (1) /home/elraro/home-ops/volumes/crowdsec/http.yaml | string |
string | |
string | |
lapi.extraVolumes[].secret.secretName (1) crowdsec-secret | string |
string | |
string | |
string | |
boolean | |
lapi.ingress.host (1) crowdsec.${SECRET_DOMAIN} | string |
string | |
lapi.ingress.tls[].hosts[] (1) - crowdsec.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
lapi.strategy.type (1) Recreate | string |
image.repository (3) ghcr.io/crowdsecurity/crowdsec | string |
image.tag (3) v1.6.8 | string |
image.pullPolicy (2) IfNotPresent | string |
tls.enabled (3) false | boolean |
string | |
config."profiles.yaml" (2) notifications:
- http_default
| string |
string |