crowdsec helm

No introduction found. Create it?

Install

Install with:

helm repo add crowdsec https://crowdsecurity.github.io/helm-charts/
helm install crowdsec crowdsec/crowdsec -f values.yaml

Examples

See examples from other people.

Top Repositories (2 out of 6)

NameRepoStarsVersionTimestamp
crowdsecxunholy/k8s-gitops6200.22.014 days ago
crowdsecpascaliske/infrastructure690.22.022 days ago

Values

See the most popular values for this chart:

KeyTypes
string
boolean
boolean
boolean
boolean
string
string
string
string
string
string
lapi.dashboard.ingress.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2)
traefik-chain-basic@kubernetescrd,traefik-bouncer@kubernetescrd,traefik-local@kubernetescrd
string
string
string
lapi.dashboard.ingress.tls[].hosts[] (1)
- crowdsec-dashboard.${SECRET_DOMAIN}
string
lapi.env[].name (5)
DISABLE_ONLINE_API
ENROLL_KEY
ENROLL_INSTANCE_NAME
string
lapi.env[].value (5)
false
${CSKEY}
cluster
string
string
string
boolean
string
string
string
string
boolean
string
string
string
string
boolean
lapi.ingress.host (1)
crowdsec.${SECRET_DOMAIN}
string
string
lapi.ingress.tls[].hosts[] (1)
- crowdsec.${SECRET_DOMAIN}
string
string
string
string
lapi.extraVolumeMounts[].mountPath (1)
/etc/crowdsec_data/notifications/http.yaml
string
string
boolean
lapi.extraVolumes[].hostPath.path (1)
/home/elraro/home-ops/volumes/crowdsec/http.yaml
string
string
string
string
string
string
string
string
boolean
boolean
agent.env[].name (4)
PARSERS
COLLECTIONS
DISABLE_PARSERS
string
agent.env[].value (4)
crowdsecurity/cri-logs
crowdsecurity/traefik
crowdsecurity/whitelists
string
string
string
string
boolean
boolean
agent.extraVolumeMounts[].mountPath (1)
/nextcloud.log
/var/log/containers
/var/log/pods
string
agent.extraVolumeMounts[].name (1)
nextcloud-log
var-log-containers
var-log-pods
string
boolean
agent.extraVolumes[].hostPath.path (1)
/mnt/sdc1/nextcloud/data/nextcloud.log
/var/log/containers
/var/log/pods
string
agent.extraVolumes[].name (1)
nextcloud-log
var-log-containers
var-log-pods
string
boolean
string
string
agent.tolerations[].key (1)
node-role.kubernetes.io/control-plane
string
string
boolean
string
string
image.repository (2)
ghcr.io/crowdsecurity/crowdsec
string
string
config."config.yaml.local" (1)
api: server: auto_registration: # Activate if not using TLS for authentication enabled: true token: "${REGISTRATION_TOKEN}" # /!\ Do not modify this variable (auto-generated and handled by the chart) allowed_ranges: # /!\ Make sure to adapt to the pod IP ranges used by your cluster - "127.0.0.1/32" - "10.42.0.0/16"
string
config."profiles.yaml" (1)
name: default_ip_remediation filters: - Alert.Remediation == true && Alert.GetScope() == "Ip" decisions: - type: ban duration: 4h notifications: - http_default on_success: break
string
boolean
reflector.env[].name (1)
OPNSENSE_URL
OPNSENSE_API_KEY
OPNSENSE_API_SECRET
string
reflector.env[].value (1)
https://opnsense.${SECRET_DOMAIN}
string
reflector.env[].valueFrom.secretKeyRef.key (1)
opnsense-api-key
opnsense-api-secret
string
string