No introduction found. Create it?
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install node-red bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|
See the most popular values for this chart:
Key | Types |
---|---|
string | |
string | |
boolean | |
string | |
persistence.config-file.globalMounts[].path (2) /data/settings.js | string |
boolean | |
string | |
persistence.config-file.name (2) node-red-configmap | string |
persistence.config-file.type (2) configMap | string |
boolean | |
persistence.config.existingClaim (2) nodered-config-v1 | string |
string | |
persistence.settings.globalMounts[].path (2) /data/settings.js | string |
boolean | |
string | |
persistence.settings.name (2) node-red-configmap | string |
persistence.settings.type (2) configMap | string |
number | |
persistence.sshkey.globalMounts[].path (1) /data/projects/.sshkeys/__default_NodeRedHomeOpsSSHKey | string |
boolean | |
persistence.sshkey.globalMounts[].subPath (1) NODERED-SSH-PRIVATE-KEY | string |
persistence.sshkey.name (1) node-red-secret | string |
string | |
persistence.tmp.type (1) emptyDir | string |
string | |
controllers.node-red.containers.app.image.repository (4) docker.io/nodered/node-red | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.node-red.containers.app.env.TZ (2) America/New_York | string |
string | |
controllers.node-red.containers.app.env.NODE_RED__APPLICATION_URL (1) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
number | |
string | |
number | |
string | |
number | |
number | |
string | |
controllers.main.containers.main.env.NODE_RED_OAUTH_AUTH_URL (1) https://auth.${SECRET_DOMAIN}/api/oidc/authorization | string |
controllers.main.containers.main.env.NODE_RED_OAUTH_CALLBACK_URL (1) https://nr.${SECRET_DOMAIN}/auth/strategy/callback | string |
controllers.main.containers.main.env.NODE_RED_OAUTH_ISSUER_URL (1) https://auth.${SECRET_DOMAIN} | string |
controllers.main.containers.main.env.NODE_RED_OAUTH_TOKEN_URL (1) http://authelia.security.svc.cluster.local:9091/api/oidc/token | string |
controllers.main.containers.main.env.NODE_RED_OAUTH_USER_URL (1) http://authelia.security.svc.cluster.local:9091/api/oidc/userinfo | string |
controllers.main.containers.main.env.TZ (1) ${TIMEZONE} | string |
string | |
controllers.main.containers.main.image.repository (1) docker.io/nodered/node-red | string |
controllers.main.containers.main.image.tag (1) 4.0.8@sha256:871225abb46d62e434c75c73ec264c406ae1d0ea09b365ed9ffa122fdc327879 | string |
string | |
string | |
boolean | |
string | |
boolean | |
number | |
string | |
number | |
boolean | |
number | |
boolean | |
ingress.main.hosts[].host (4) nodered.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (4) - nodered.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (3) nodered-tls | string |
ingress.main.annotations."hajimari.io/icon" (3) resistor-nodes | string |
string | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
ingress.main.annotations."hajimari.io/group" (1) home automation | string |
ingress.main.annotations."hajimari.io/url" (1) https://nr.${SECRET_DOMAIN} | string |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) traefik-default-middlewares-chain@kubernetescrd | string |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.tls.options" (1) traefik-secure-tlsoptions@kubernetescrd | string |
string | |
ingress.main."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.main.className (1) internal | string |
string | |
ingress.main."external-dns.alpha.kubernetes.io/target" (1) ipv4.${SECRET_DOMAIN} | string |
ingress.main."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN}/oauth2/start | string |
ingress.main."nginx.ingress.kubernetes.io/auth-url" (1) https://auth.${SECRET_DOMAIN}/oauth2/auth | string |
string | |
string | |
ingress.main."nginx.ingress.kubernetes.io/whitelist-source-range" (1) 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 | string |
ingress.app.className (3) internal | string |
ingress.app.hosts[].host (3) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (2) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (1) ${SECRET_DOMAIN/./-}-tls | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress-ext.greyrock.casa | string |
string | |
string | |
string | |
boolean | |
ingress.node-red.className (1) internal | string |
ingress.node-red.hosts[].host (1) {{ .Release.Name }}.unscfleet.com | string |
string | |
string | |
string | |
ingress.node-red.tls[].hosts[] (1) - {{ .Release.Name }}.unscfleet.com | string |
service.app.controller (4) node-red | string |
number | |
string | |
string | |
number | |
string | |
string | |
string | |
env.TZ (3) ${TIMEZONE} | string |
env.FLOWS (2) flows.json | string |
image.repository (3) docker.io/nodered/node-red | string |
image.tag (3) 4.0.5 | string |
number | |
podSecurityContext.fsGroupChangePolicy (3) OnRootMismatch | string |
number | |
number | |
number | |
string | |
string | |
string | |
controller.type (2) statefulset | string |
string | |
number | |
string | |
number | |
boolean | |
number | |
string | |
string |