No introduction found. Create it?
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install autoscan bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|
See the most popular values for this chart:
Key | Types |
---|---|
persistence.config.existingClaim (5) autoscan-data | string |
boolean | |
string | |
string | |
persistence.config-file.name (3) autoscan-config-secret | string |
string | |
persistence.config-file.globalMounts[].path (2) /config/config.yml | string |
boolean | |
string | |
persistence.config-file.advancedMounts.main.main[].path (1) /config/config.yml | string |
boolean | |
string | |
boolean | |
persistence.4kmovies.advancedMounts.autoscan.app[].path (1) /mnt/unionfs/Media/4KMovies/ | string |
boolean | |
persistence.4kmovies.existingClaim (1) ceph-filesystem-media-4kmovies | string |
persistence.4ktv.advancedMounts.autoscan.app[].path (1) /mnt/unionfs/Media/4KTV/ | string |
boolean | |
persistence.4ktv.existingClaim (1) ceph-filesystem-media-4ktv | string |
boolean | |
persistence.config-secret.mountPath (1) /config/config.yml | string |
persistence.config-secret.name (1) autoscan-secrets | string |
boolean | |
persistence.config-secret.subPath (1) config.yml | string |
string | |
string | |
boolean | |
number | |
boolean | |
persistence.configdata.items[].key (1) config.yml | string |
persistence.configdata.items[].path (1) config.yml | string |
persistence.configdata.name (1) autoscan-secret | string |
string | |
persistence.downloads.advancedMounts.autoscan.app[].path (1) /mnt/unionfs/downloads | string |
boolean | |
persistence.downloads.existingClaim (1) ceph-filesystem-media-downloads | string |
boolean | |
string | |
persistence.library.path (1) /volume1/media | string |
boolean | |
persistence.library.server (1) ${RACKNAS_ADDR} | string |
string | |
persistence.media.globalMounts[].path (1) /mnt/user/media | string |
boolean | |
persistence.media.path (1) /mnt/user/media | string |
persistence.media.server (1) ${SECRET_NFS_SERVER} | string |
string | |
persistence.movies.advancedMounts.autoscan.app[].path (1) /mnt/unionfs/Media/Movies/ | string |
boolean | |
persistence.movies.existingClaim (1) ceph-filesystem-media-movies | string |
persistence.music.advancedMounts.autoscan.app[].path (1) /mnt/unionfs/Media/Music/ | string |
boolean | |
persistence.music.existingClaim (1) ceph-filesystem-media-music | string |
persistence.tv.advancedMounts.autoscan.app[].path (1) /mnt/unionfs/Media/TV | string |
boolean | |
persistence.tv.existingClaim (1) ceph-filesystem-media-tv | string |
service.app.controller (4) autoscan | string |
number, string | |
number | |
string | |
string | |
controllers.autoscan.containers.app.image.repository (3) cloudb0x/autoscan | string |
string | |
string | |
string | |
string | |
string | |
string | |
number | |
number | |
number | |
boolean | |
boolean | |
controllers.autoscan.containers.app.probes.liveness.spec.exec.command[] (1) - /usr/bin/env | string |
number | |
number | |
number | |
number | |
number | |
boolean | |
string | |
boolean | |
number | |
string | |
number | |
boolean | |
number | |
number | |
controllers.autoscan.type (1) statefulset | string |
number | |
number | |
controllers.${APP}.containers.app.env.TZ (1) ${TIMEZONE} | string |
number | |
string | |
controllers.${APP}.containers.app.image.repository (1) ghcr.io/hotio/autoscan | string |
controllers.${APP}.containers.app.image.tag (1) release-1.4.0@sha256:0220a3de8f4781858f6a17ba27578168b7ff3884308b4cffa1468714108a19d4 | string |
string | |
boolean | |
boolean | |
boolean | |
number | |
number | |
string | |
string | |
boolean | |
number | |
controllers.${APP}.type (1) deployment | string |
string | |
number | |
number | |
controllers.main.containers.main.image.repository (1) cloudb0x/autoscan | string |
string | |
string | |
string | |
string | |
controllers.main.type (1) statefulset | string |
string | |
ingress.app.annotations."traefik.ingress.kubernetes.io/router.middlewares" (2) network-chain-external@kubernetescrd | string |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
string | |
string | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress.${INGRESS_DOMAIN} | string |
ingress.app.className (2) traefik | string |
ingress.app.hosts[].host (2) autoscan.${CLUSTER_NAME}.${INGRESS_DOMAIN} | string |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (2) - autoscan.${CLUSTER_NAME}.${INGRESS_DOMAIN} | string |
ingress.app.tls[].secretName (2) tls.autoscan | string |
boolean | |
boolean | |
string | |
controller.type (1) statefulset | string |
number | |
env.PGID (1) 100 | string |
env.PUID (1) 1024 | string |
env.TZ (1) ${TIMEZONE} | string |
global.fullnameOverride (1) autoscan | string |
global.nameOverride (1) autoscan | string |
image.repository (1) cloudb0x/autoscan | string |
image.tag (1) master@sha256:133c1f0db4c556139a8b9488bb1703b3cc5166523ff6bc26967e9c13cf81df6d | string |
string | |
string | |
string |