No introduction found. Create it?
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install komga bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
komga | joryirving/home-ops | 153 | 3.7.1 | 3 days ago |
komga | JJGadgets/Biohazard | 48 | 3.1.0 | 12 days ago |
komga | axeII/home-ops | 44 | 3.5.1 | 16 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
string | |
controllers.komga.containers.app.image.tag (11) 1.19.1@sha256:8d8dfdae3e3d9defce99b4fbbb658561787f240c03efc057275b76c0f3d932ab | string |
string | |
string | |
string | |
number | |
controllers.komga.containers.app.env.TZ (10) ${TIMEZONE} | string |
string | |
string | |
string | |
controllers.komga.containers.app.env.KOMGA_CORS_ALLOWED_ORIGINS (1) https://komf.${SECRET_DOMAIN} | string |
string | |
boolean | |
boolean | |
boolean | |
number | |
number | |
string | |
string | |
string | |
string | |
string | |
controllers.komga.containers.main.env.TZ (1) ${CONFIG_TZ} | string |
controllers.komga.containers.main.image.repository (1) ghcr.io/gotson/komga | string |
controllers.komga.containers.main.image.tag (1) 1.19.1@sha256:8d8dfdae3e3d9defce99b4fbbb658561787f240c03efc057275b76c0f3d932ab | string |
boolean | |
boolean | |
string | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
string | |
string | |
string | |
string | |
string | |
number | |
string | |
number | |
number | |
number | |
controllers.komga.type (1) deployment | string |
ingress.app.className (11) external | string |
ingress.app.hosts[].host (11) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (6) external.${SECRET_DOMAIN} | string |
ingress.app.annotations."gethomepage.dev/description" (5) Comic/Ebook Web Reader | string |
string | |
string | |
string | |
string | |
ingress.app.annotations."gethomepage.dev/widget.password" (2) {{ `{{HOMEPAGE_VAR_KOMGA_PASSWORD}}` }} | string |
string | |
ingress.app.annotations."gethomepage.dev/widget.url" (2) http://komga.media:8080 | string |
ingress.app.annotations."gethomepage.dev/widget.username" (2) {{ `{{HOMEPAGE_VAR_KOMGA_USERNAME}}` }} | string |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) ca-server-cluster-issuer | string |
ingress.app.annotations."cert-manager.io/common-name" (1) komga.home.internal | string |
string | |
ingress.app.annotations."gethomepage.dev/pod-selector" (1) app.kubernetes.io/name=komga | string |
ingress.app.annotations."hajimari.io/icon" (1) mdi:thought-bubble-outline | string |
string | |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Remote-User,Remote-Name,Remote-Groups,Remote-Email | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN}/?rm=$request_method | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Method $request_method; | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-url" (1) https://auth.${SECRET_DOMAIN}/api/verify | string |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (4) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (1) komga-ing-cert | string |
ingress.main.className (1) nginx-internal | string |
ingress.main.hosts[].host (1) ${APP_DNS_KOMGA:=komga} | string |
string | |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (1) - ${APP_DNS_KOMGA:=komga} | string |
string | |
number | |
string | |
string | |
number | |
string | |
string | |
persistence.config.globalMounts[].path (4) /config/application.yml | string |
persistence.config.globalMounts[].subPath (3) application.yml | string |
number | |
persistence.config.name (3) komga-secret | string |
string | |
string | |
boolean | |
string | |
boolean | |
string | |
persistence.media.path (7) ${NAS_BASE_URL}/media | string |
persistence.media.server (7) ${NAS_ADDRESS} | string |
string | |
persistence.media.existingClaim (2) media-data | string |
string | |
string | |
string | |
string | |
persistence.books.globalMounts[].path (1) /media/books | string |
boolean | |
persistence.books.path (1) /volume2/Media/Books/readarr | string |
persistence.books.server (1) funkstation.internal | string |
string | |
persistence.bulk.existingClaim (1) media-bulk | string |
string | |
boolean | |
string | |
persistence.comics.path (1) /mnt/Archive/Media/comics | string |
persistence.comics.server (1) nas.cleeb.net | string |
string | |
string | |
persistence.downloads.path (1) /mnt/Hellabooties/Downloads | string |
persistence.downloads.server (1) nas.cleeb.net | string |
string | |
string | |
persistence.manga.path (1) /mnt/tank/media/library/books | string |
persistence.manga.server (1) ${TRUENAS_IP} | string |
string | |
string | |
boolean | |
persistence.nfs.path (1) ${PATH_NAS_MEDIA:=/media} | string |
persistence.nfs.server (1) ${IP_TRUENAS:=127.0.0.1} | string |
string | |
boolean | |
string | |
string | |
string | |
string | |
number | |
boolean | |
string | |
string | |
string | |
boolean | |
defaultPodOptions.hostAliases[].hostnames[] (1) - ${APP_DNS_AUTHENTIK:=authentik} | string |
defaultPodOptions.hostAliases[].ip (1) ${APP_IP_AUTHENTIK:=127.0.0.1} | string |
string | |
number | |
defaultPodOptions.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
string |