No introduction found. Create it?
frigate from bjw-s-labs/helm/app-template is more popular with 16 repositories.
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install frigate bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
frigate | Diaoul/home-ops | 74 | 3.7.3 | 2 months ago |
frigate | brettinternet/homeops | 246 | 3.5.1 | 8 months ago |
frigate | anthr76/infra | 103 | 1.5.1 | 8 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
string | |
persistence.cache.type (15) emptyDir | string |
string | |
string | |
boolean | |
persistence.cache.mountPath (1) /dev/shm | string |
persistence.config-file.globalMounts[].path (12) /config/config.yml | string |
string | |
boolean | |
persistence.config-file.name (11) frigate-configmap | string |
persistence.config-file.type (11) configMap | string |
boolean | |
persistence.config-file.existingClaim (1) frigate-pvc-temp | string |
persistence.usb.hostPath (12) /dev/bus/usb | string |
persistence.usb.type (12) hostPath | string |
persistence.usb.hostPathType (11) Directory | string |
persistence.usb.globalMounts[].path (10) /dev/bus/usb | string |
boolean | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
persistence.config.name (3) frigate-config | string |
persistence.config.path (3) /volume1/network-storage/frigate/data | string |
persistence.config.server (3) 192.168.1.2 | string |
persistence.config.accessMode (2) ReadWriteOnce | string |
string | |
persistence.config.mountPath (1) /config/config.yml | string |
boolean | |
string | |
persistence.config.subPath (1) config.yaml | string |
string | |
persistence.media.path (9) /volume1/network-storage/frigate/media | string |
persistence.media.server (9) 192.168.1.2 | string |
boolean | |
string | |
persistence.media.existingClaim (5) frigate-media-v2 | string |
string | |
persistence.media.volumeSpec.nfs.path (1) /warehouse/services/nvr | string |
persistence.media.volumeSpec.nfs.server (1) ${NFS_SERVER} | string |
boolean | |
string | |
string | |
string | |
string | |
persistence.data.path (1) /volume1/network-storage/frigate/data | string |
persistence.data.server (1) 192.168.1.2 | string |
string | |
boolean | |
persistence.coral.globalMounts[].path (1) /dev/apex_0 | string |
persistence.coral.hostPath (1) /dev/apex_0 | string |
persistence.coral.type (1) hostPath | string |
persistence.pci.hostPath (1) /dev/apex_0 | string |
persistence.pci.hostPathType (1) CharDevice | string |
persistence.pci.type (1) hostPath | string |
controllers.frigate.containers.app.image.repository (11) ghcr.io/blakeblackshear/frigate | string |
controllers.frigate.containers.app.image.tag (11) 0.15.1@sha256:c4e02d2c511847eebbda8e0e370b41c78e7b51247353de79340e06c3e95f11be | string |
number, string | |
string | |
string, number | |
number, string | |
string | |
boolean | |
controllers.frigate.containers.app.securityContext.capabilities.add[] (2) - NET_ADMIN | string |
string | |
string | |
controllers.frigate.containers.app.env.FRIGATE_MQTT_PASSWORD (3) ${SECRET_MQTT_PASSWORD} | string |
controllers.frigate.containers.app.env.FRIGATE_MQTT_USERNAME (3) ${SECRET_MQTT_USERNAME} | string |
controllers.frigate.containers.app.env.PLUS_API_KEY (3) ${SECRET_FRIGATE_PLUS_KEY} | string |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
number | |
controllers.frigate.type (2) statefulset | string |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.main.containers.main.env.TZ (3) ${TIMEZONE} | string |
controllers.main.containers.main.env.FRIGATE_HOUSE_DOORBELL_PASSWORD (1) ${FRIGATE_HOUSE_DOORBELL_PASSWORD} | string |
controllers.main.containers.main.env.FRIGATE_MQTT_PASSWORD (1) ${SECRET_MQTT_PASSWORD} | string |
controllers.main.containers.main.env.FRIGATE_MQTT_USERNAME (1) ${SECRET_MQTT_USERNAME} | string |
controllers.main.containers.main.env.FRIGATE_RTSP_PASSWORD (1) ${FRIGATE_RTSP_PASSWORD} | string |
controllers.main.containers.main.env.PLUS_API_KEY (1) ${SECRET_FRIGATE_PLUS} | string |
controllers.main.containers.main.image.repository (3) ghcr.io/blakeblackshear/frigate | string |
controllers.main.containers.main.image.tag (3) 0.15.1@sha256:c4e02d2c511847eebbda8e0e370b41c78e7b51247353de79340e06c3e95f11be | string |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
string | |
string | |
string | |
string | |
string | |
boolean | |
string | |
string | |
string | |
number | |
string | |
string | |
string | |
string | |
string | |
controllers.main.type (1) statefulset | string |
service.app.controller (11) frigate | string |
number | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
number | |
boolean | |
number | |
string | |
service.app.type (4) LoadBalancer | string |
string | |
string | |
string | |
service.app.loadBalancerIP (1) 192.168.2.205 | string |
number | |
number | |
number | |
service.main.loadBalancerIP (1) 192.168.0.210 | string |
service.main.type (1) LoadBalancer | string |
ingress.app.className (9) internal | string |
ingress.app.hosts[].host (9) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (6) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
boolean | |
string | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (3) external.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.app.annotations."gethomepage.dev/siteMonitor" (1) https://frigate.${SECRET_DOMAIN} | string |
string | |
ingress.app.annotations."gethomepage.dev/widget.url" (1) https://frigate.${SECRET_DOMAIN} | string |
string | |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Remote-User,Remote-Name,Remote-Groups,Remote-Email | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_EXTERNAL_DOMAIN}/?rm=$request_method | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Method $request_method; | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.auth.svc.cluster.local/api/verify | string |
boolean | |
ingress.main.hosts[].host (5) frigate.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (5) - frigate.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (2) frigate-tls | string |
ingress.main.className (4) internal | string |
ingress.main.annotations."cert-manager.io/cluster-issuer" (3) letsencrypt-production | string |
string | |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress.${SECRET_DOMAIN} | string |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Authorization, x-auth-request-email, x-auth-request-groups | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.kutara.io/oauth2/start | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) https://auth.kutara.io/oauth2/auth?allowed_groups=family | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/custom-http-errors" (1) 401,403,404,500,501,502,503 | string |
string | |
ingress.frigate.className (1) internal | string |
ingress.frigate.hosts[].host (1) {{ .Release.Name }}.unscfleet.com | string |
string | |
string | |
string | |
ingress.frigate.tls[].hosts[] (1) - {{ .Release.Name }}.unscfleet.com | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[].matchExpressions[].key (1) feature.node.kubernetes.io/custom-coral-tpu | string |
string | |
string | |
string | |
string | |
env.LIBVA_DRIVER_NAME (1) radeonsi | string |
image.repository (1) ghcr.io/blakeblackshear/frigate | string |
image.tag (1) 0.12.1 | string |
string | |
podAnnotations."secret.reloader.stakater.com/reload" (1) frigate-secrets | string |
boolean | |
boolean | |
number | |
probes.liveness.spec.httpGet.path (1) /api/version | string |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
probes.readiness.spec.httpGet.path (1) /api/version | string |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
probes.startup.spec.httpGet.path (1) /api/version | string |
number | |
number | |
number | |
string | |
string | |
number | |
string | |
string | |
boolean |