No introduction found. Create it?
sabnzbd from bjw-s-labs/helm/app-template is more popular with 62 repositories.
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install sabnzbd bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
sabnzbd | coolguy1771/home-ops | 72 | 3.7.3 | 3 months ago |
sabnzbd | toboshii/home-ops | 364 | 0.2.2 | 9 months ago |
sabnzbd | brettinternet/homeops | 251 | 3.5.1 | 10 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
string | |
boolean | |
string | |
string | |
persistence.config.accessMode (3) ReadWriteOnce | string |
string | |
string | |
string | |
string | |
string | |
persistence.config.path (1) /volume1/network-storage/sabnzbd | string |
boolean | |
persistence.config.server (1) 192.168.1.2 | string |
persistence.tmp.type (13) emptyDir | string |
string | |
string | |
persistence.media.path (10) /volume1/media | string |
persistence.media.server (10) ${SECRET_NFS_SERVER} | string |
string | |
boolean | |
persistence.media.globalMounts[].subPath (1) Downloads/sabnzbd | string |
boolean | |
string | |
string | |
persistence.media.hostPath (1) /mnt/storage-2/plex | string |
persistence.media.volumeSpec.nfs.path (1) /volume1/Media | string |
string | |
string | |
string | |
persistence.downloads.path (5) /mnt/fast/downloads | string |
persistence.downloads.server (5) ${SECRET_NFS_SERVER} | string |
string | |
boolean | |
persistence.downloads.existingClaim (2) sabnzbd-downloads | string |
persistence.downloads.mountPath (1) /downloads | string |
persistence.incomplete.type (6) emptyDir | string |
boolean | |
string | |
persistence.incomplete.accessMode (1) ReadWriteOnce | string |
string | |
string | |
number | |
persistence.scripts.name (3) sabnzbd-scripts | string |
persistence.scripts.type (3) configMap | string |
boolean | |
persistence.scripts.globalMounts[].path (1) /config/scripts | string |
persistence.scripts.advancedMounts.sabnzbd.app[].path (1) /config/scripts | string |
persistence.logs.globalMounts[].path (2) /config/logs | string |
persistence.logs.type (2) emptyDir | string |
boolean | |
string | |
string | |
persistence.movies.path (1) /volume1/Video/Movies | string |
persistence.movies.server (1) 192.168.1.2 | string |
persistence.movies.volumeSpec.nfs.path (1) /warehouse/media/movies | string |
persistence.movies.volumeSpec.nfs.server (1) ${NFS_SERVER} | string |
boolean | |
string | |
persistence.tv.type (2) custom | string |
persistence.tv.path (1) /volume1/Video/TV | string |
persistence.tv.server (1) 192.168.1.2 | string |
persistence.tv.volumeSpec.nfs.path (1) /warehouse/media/tv | string |
persistence.tv.volumeSpec.nfs.server (1) ${NFS_SERVER} | string |
persistence.applications.existingClaim (1) cifs-applications | string |
persistence.applications.globalMounts[].path (1) /media/applications | string |
boolean | |
string | |
string | |
persistence.books.volumeSpec.nfs.path (1) /warehouse/media/books | string |
persistence.books.volumeSpec.nfs.server (1) ${NFS_SERVER} | string |
boolean | |
persistence.complete-downloads.globalMounts[].path (1) /mergerfs/storage | string |
string | |
persistence.complete-downloads.volumeSpec.nfs.path (1) /mergerfs/storage | string |
string | |
persistence.games.existingClaim (1) cifs-games | string |
persistence.games.globalMounts[].path (1) /media/games | string |
boolean | |
persistence.library.mountPath (1) /library/Temp | string |
persistence.library.path (1) /volume1/media/Temp | string |
persistence.library.server (1) ${RACKNAS_ADDR} | string |
string | |
string | |
persistence.media-1.hostPath (1) /mnt/storage-1/plex | string |
persistence.media-1.type (1) hostPath | string |
string | |
persistence.media-2.hostPath (1) /mnt/storage-2/plex | string |
persistence.media-2.type (1) hostPath | string |
persistence.misc.existingClaim (1) cifs-misc | string |
persistence.misc.globalMounts[].path (1) /media/misc | string |
boolean | |
string | |
string | |
persistence.music.volumeSpec.nfs.path (1) /warehouse/media/music | string |
persistence.music.volumeSpec.nfs.server (1) ${NFS_SERVER} | string |
service.app.controller (14) sabnzbd | string |
number | |
number | |
boolean | |
string | |
service.ext-proxy.loadBalancerIP (1) ${PROXY_LB} | string |
boolean | |
number | |
string | |
number | |
boolean | |
service.ext-proxy.type (1) LoadBalancer | string |
boolean | |
boolean | |
number | |
string | |
number | |
boolean | |
service.proxy.type (1) ClusterIP | string |
string | |
number | |
controllers.sabnzbd.containers.app.env.SABNZBD__HOST_WHITELIST_ENTRIES (13) sabnzbd, sabnzbd.default, sabnzbd.default.svc, sabnzbd.default.svc.cluster, sabnzbd.default.svc.cluster.local, sabnzbd.${SECRET_DOMAIN} | string |
number | |
string | |
controllers.sabnzbd.containers.app.env.XSEED_HOST (1) cross-seed.media.svc.cluster.local | string |
number | |
controllers.sabnzbd.containers.app.image.repository (13) ghcr.io/onedr0p/sabnzbd | string |
controllers.sabnzbd.containers.app.image.tag (13) 4.4.1@sha256:36674664a94760ae934c09b1d97546a3e79a0f110edda88085e74778c26d68e3 | string |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
number | |
number | |
string | |
string | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
number | |
number | |
boolean | |
number | |
controllers.sabnzbd.containers.sabnzbd.env.SABNZBD__HOST_WHITELIST_ENTRIES (1) sabnzbd, sabnzbd.default, sabnzbd.default.svc, sabnzbd.default.svc.cluster, sabnzbd.default.svc.cluster.local, "sabnzbd.${SECRET_DOMAIN}" | string |
number | |
controllers.sabnzbd.containers.sabnzbd.env.TZ (1) America/New_York | string |
controllers.sabnzbd.containers.sabnzbd.image.repository (1) ghcr.io/home-operations/sabnzbd | string |
controllers.sabnzbd.containers.sabnzbd.image.tag (1) 4.5.3@sha256:ecb57bd6257fbfbd9aee70d8ef3df8814b7270ae793fd1f44219ae73cacd519a | string |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
string | |
number | |
string | |
number | |
number | |
number | |
boolean | |
string | |
string | |
string | |
string | |
string | |
controllers.sabnzbd.type (1) statefulset | string |
controllers.main.containers.main.env.SABNZBD__HOST_WHITELIST_ENTRIES (5) sabnzbd, sabnzbd.default, sabnzbd.default.svc, sabnzbd.default.svc.cluster, sabnzbd.default.svc.cluster.local, sab.parsec.sh, sabnzbd.parsec.sh | string |
number | |
controllers.main.containers.main.env.TZ (4) America/New_York | string |
string | |
string | |
string | |
string | |
controllers.main.containers.main.image.repository (5) ghcr.io/onedr0p/sabnzbd | string |
controllers.main.containers.main.image.tag (5) 4.4.1@sha256:36674664a94760ae934c09b1d97546a3e79a0f110edda88085e74778c26d68e3 | string |
string | |
string | |
string | |
string | |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
string | |
boolean | |
controllers.main.containers.sabnzbd.env.SABNZBD__HOST_WHITELIST_ENTRIES (1) sabnzbd, sabnzbd.default, sabnzbd.default.svc, sabnzbd.default.svc.cluster, sabnzbd.default.svc.cluster.local, sabnzbd.${SECRET_DOMAIN} | string |
string | |
string | |
controllers.main.containers.sabnzbd.image.repository (1) ghcr.io/home-operations/sabnzbd | string |
controllers.main.containers.sabnzbd.image.tag (1) 4.5.2@sha256:e3f27e50ee51f950d89ce888cb3c3c4e74b46b42751333ee008f906906cbf05b | string |
number | |
string | |
number | |
number | |
boolean | |
number | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.main.statefulset.volumeClaimTemplates[].storageClass (1) synology-csi-retain | string |
controllers.main.type (1) statefulset | string |
ingress.app.className (11) internal | string |
ingress.app.hosts[].host (11) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.app.annotations."gethomepage.dev/widget.key" (4) {{`{{HOMEPAGE_VAR_SABNZBD_TOKEN}}`}} | string |
string | |
ingress.app.annotations."gethomepage.dev/widget.url" (4) https://sabnzbd.${SECRET_DOMAIN} | string |
ingress.app.annotations."gethomepage.dev/description" (3) Usenet Downloader | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (2) internal.${SECRET_DOMAIN} | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (2) ${THEME_PARK_SNIPPET} | string |
ingress.app.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.app.annotations."gethomepage.dev/href" (1) https://sabnzbd.${SECRET_DOMAIN} | string |
ingress.app.annotations."hajimari.io/icon" (1) mdi:download-circle | string |
string | |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (5) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (1) sabnzbd-tls | string |
boolean | |
boolean | |
ingress.main.hosts[].host (8) sabnzbd.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (8) - sabnzbd.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (2) sabnzbd-tls | string |
ingress.main.className (5) internal | string |
ingress.main.annotations."hajimari.io/icon" (4) mdi:download | string |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (2) proxy_set_header Accept-Encoding "";
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://theme-park.dev/css/base/sabnzbd/nord.css"></head>';
sub_filter_once on;
| string |
string | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (1) ingress.${SECRET_DOMAIN} | string |
string | |
string | |
ingress.main.annotations."hajimari.io/url" (1) https://sab.${SECRET_DOMAIN} | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) /outpost.goauthentik.io/start?rd=$escaped_request_uri | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) proxy_set_header X-Forwarded-Host $http_host; | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://ak-outpost-internal.auth.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx | string |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) traefik-default-middlewares-chain@kubernetescrd | string |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.tls.options" (1) traefik-secure-tlsoptions@kubernetescrd | string |
string | |
ingress.sabnzbd.className (2) internal | string |
ingress.sabnzbd.hosts[].host (2) sabnzbd.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.sabnzbd.tls[].hosts[] (2) - sabnzbd.${SECRET_DOMAIN} | string |
ingress.sabnzbd.tls[].secretName (1) sabnzbd-tls | string |
ingress.sabnzbd.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
string | |
ingress.sabnzbd.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-traefik-forward-auth@kubernetescrd | string |
string | |
string | |
boolean | |
ingress.api.hosts[].host (1) {{ .Release.Name }}.${SECRET_PUBLIC_DOMAIN} | string |
string | |
string | |
string | |
ingress.api.tls[].hosts[] (1) - {{ .Release.Name }}.${SECRET_PUBLIC_DOMAIN} | string |
number, string | |
number, string | |
number | |
string | |
boolean | |
number | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
env.SABNZBD__HOST_WHITELIST_ENTRIES (3) sabnzbd, sabnzbd.default, sabnzbd.default.svc, sabnzbd.default.svc.cluster, sabnzbd.default.svc.cluster.local, sabnzbd.media-downloaders, sabnzbd.${SECRET_DOMAIN} | string |
env.TZ (3) ${TIMEZONE} | string |
number | |
image.repository (3) ghcr.io/onedr0p/sabnzbd | string |
image.tag (3) 4.4.1 | string |
image.pullPolicy (1) IfNotPresent | string |
number | |
podSecurityContext.fsGroupChangePolicy (3) OnRootMismatch | string |
number | |
number | |
number | |
envFrom[].secretRef.name (2) sabnzbd-secrets | string |
string | |
string | |
string | |
string | |
controller.type (1) statefulset | string |
global.nameOverride (1) sabnzbd | string |
boolean | |
boolean | |
number | |
probes.liveness.spec.httpGet.path (1) /api?mode=version | string |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
probes.readiness.spec.httpGet.path (1) /api?mode=version | string |
number | |
number | |
number | |
number | |
boolean | |
route.app.hostnames[] (1) - {{ .Release.Name }}.lumu.au | string |
route.app.parentRefs[].name (1) internal | string |
route.app.parentRefs[].namespace (1) flux-system | string |
string | |
string | |
number | |
string | |
sidecars.vpn.env.DNS_ADDRESS (1) 10.96.0.10 | string |
string | |
string | |
sidecars.vpn.env.FIREWALL_OUTBOUND_SUBNETS (1) 10.96.0.0/12 | string |
string | |
string | |
string | |
string | |
string | |
sidecars.vpn.env.TZ (1) ${TIMEZONE} | string |
string | |
sidecars.vpn.env.VPN_TYPE (1) wireguard | string |
sidecars.vpn.envFrom[].secretRef.name (1) primary-conf106 | string |
sidecars.vpn.image (1) ghcr.io/qdm12/gluetun:v3.35.0@sha256:a98d1ec99e09a1b806aff7f0c3d8a133a8ede7d3d7a250b62029a39a61f01525 | string |
number | |
string | |
sidecars.vpn.securityContext.capabilities.add[] (1) - NET_ADMIN | string |
number | |
number | |
volumeClaimTemplates[].accessMode (1) ReadWriteOnce | string |
volumeClaimTemplates[].mountPath (1) /config | string |
volumeClaimTemplates[].name (1) config | string |
volumeClaimTemplates[].size (1) 2Gi | string |
volumeClaimTemplates[].storageClass (1) longhorn | string |