No introduction found. Create it?
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install tdarr bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
tdarr | auricom/home-ops | 191 | 3.7.3 | 17 hours ago |
tdarr | samip5/k8s-cluster | 130 | 3.7.3 | 7 days ago |
tdarr | h3mmy/bloopySphere | 62 | 3.0.4 | 7 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
string | |
boolean | |
string | |
string | |
string | |
string | |
persistence.config.advancedMounts.tdarr.tdarr[].path (1) /app/configs | string |
string | |
persistence.config.globalMounts[].path (3) /app/configs | string |
persistence.config.subPath[].mountPath (1) /app/configs | string |
persistence.config.subPath[].path (1) tdarr/config | string |
string | |
boolean | |
string | |
boolean | |
persistence.media.path (3) /volume1/Media | string |
persistence.media.server (3) 192.168.1.22 | string |
string | |
persistence.media.volumeSpec.nfs.path (2) /mnt/storage0/media/Library | string |
persistence.media.volumeSpec.nfs.server (2) citadel.internal | string |
persistence.media.hostPath (1) /mnt/merge/library/ | string |
string | |
boolean | |
persistence.cache.path (5) /volume1/Media/cache | string |
persistence.cache.server (5) 192.168.1.22 | string |
string | |
string | |
string | |
boolean | |
persistence.server.existingClaim (2) tdarr-data-v1 | string |
persistence.server.globalMounts[].path (2) /app/server | string |
boolean | |
persistence.media2.globalMounts[].path (1) /volume1/Data2 | string |
boolean | |
string | |
persistence.media2.volumeSpec.nfs.path (1) /volume1/Data2 | string |
persistence.media2.volumeSpec.nfs.server (1) ${NAS_ADDRESS} | string |
persistence.movies.globalMounts[].path (1) /mnt/storage/video/movies | string |
persistence.movies.path (1) /var/mnt/vol1/video/movies | string |
persistence.movies.server (1) 192.168.9.10 | string |
string | |
persistence.shared.globalMounts[].path (1) /mnt/storage/video/.tdarr | string |
persistence.shared.path (1) /var/mnt/vol1/video/.tdarr | string |
persistence.shared.server (1) 192.168.9.10 | string |
string | |
boolean | |
string | |
persistence.tdarr.globalMounts[].path (1) /app/server | string |
persistence.tdarr.globalMounts[].readOnly (1) false | boolean |
string | |
string | |
string | |
persistence.transcode.type (1) emptyDir | string |
persistence.tv.globalMounts[].path (1) /mnt/storage/video/tv | string |
persistence.tv.path (1) /var/mnt/vol1/video/tv | string |
persistence.tv.server (1) 192.168.9.10 | string |
string | |
controllers.tdarr.containers.app.image.repository (6) ghcr.io/haveagitgat/tdarr | string |
controllers.tdarr.containers.app.image.tag (6) 2.40.01@sha256:4a9a20b71752eb6f770aba30247b1403e4c9ed2602453ffdd073e9fae25b4dfd | string |
string | |
string | |
string | |
string | |
controllers.tdarr.containers.app.env.TZ (4) ${TIME_ZONE} | string |
number, string | |
number, string | |
controllers.tdarr.containers.app.env.ffmpegPath (2) /usr/local/bin/ffmpeg | string |
string | |
number | |
number | |
controllers.tdarr.containers.app.env.TDARR_APPLICATION_URL (2) tdarr.${SECRET_DOMAIN} | string |
string | |
number | |
boolean | |
string | |
number | |
string | |
controllers.tdarr.containers.node.env[].name (2) nodeID | string |
controllers.tdarr.containers.node.env[].value (2) localhost | string, number |
string | |
controllers.tdarr.containers.node.image.repository (2) ghcr.io/haveagitgat/tdarr_node | string |
string | |
string | |
string | |
number | |
number | |
string | |
string | |
number | |
number | |
string | |
string | |
string | |
controllers.tdarr.containers.tdarr.image.repository (1) ghcr.io/haveagitgat/tdarr | string |
string | |
string | |
string | |
string | |
boolean | |
boolean | |
string | |
controllers.tdarr.type (1) deployment | string |
controllers.main.containers.main.env.ffmpegPath (1) /usr/local/bin/ffmpeg | string |
number | |
string | |
number | |
number | |
controllers.main.containers.main.env.TDARR_APPLICATION_URL (1) tdarr.${XYZ_DOMAIN} | string |
string | |
string | |
number | |
string | |
controllers.main.containers.main.image.repository (1) ghcr.io/haveagitgat/tdarr_acc | string |
string | |
number | |
string | |
string | |
string | |
string | |
controllers.main.type (1) deployment | string |
number | |
string | |
number | |
number | |
number | |
string | |
boolean | |
boolean | |
boolean | |
string | |
ingress.app.className (6) internal | string |
ingress.app.hosts[].host (6) {{ .Release.Name }}.${SECRET_DOMAIN_MEDIA} | string |
string | |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (5) - {{ .Release.Name }}.${SECRET_DOMAIN_MEDIA} | string |
ingress.app.tls[].secretName (2) ${SECRET_DOMAIN_MEDIA/./-}-tls | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-signin" (3) https://tdarr.${SECRET_DOMAIN_MEDIA}/outpost.goauthentik.io/start?rd=$scheme://$http_host$escaped_request_uri | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (2) internal.${SECRET_DOMAIN_MEDIA} | string |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (2) Remote-User,Remote-Name,Remote-Groups,Remote-Email | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-snippet" (2) proxy_set_header X-Forwarded-Method $request_method; | string |
ingress.app.annotations."nginx.ingress.kubernetes.io/auth-url" (2) http://authelia.security.svc.cluster.local:9091/api/authz/auth-request | string |
string | |
ingress.app.annotations."gethomepage.dev/pod-selector" (1) app in (
tdarr
) | string |
ingress.app.annotations."hajimari.io/icon" (1) material-symbols:switch-video-outline | string |
boolean | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (2) letsencrypt-production | string |
string | |
string | |
ingress.main.annotations."hajimari.io/icon" (2) material-symbols:switch-video-outline | string |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (1) ipv4.${SECRET_DOMAIN} | string |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN}/oauth2/start | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) https://auth.${SECRET_DOMAIN}/oauth2/auth | string |
string | |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/whitelist-source-range" (1) 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 | string |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-bloopnet-xyz-auth-extra@kubernetescrd | string |
boolean | |
ingress.main.hosts[].host (2) {{ .Release.Name }}.lab.albatrossflavour.com | string |
string | |
string | |
string | |
number | |
ingress.main.tls[].hosts[] (2) - {{ .Release.Name }}.lab.albatrossflavour.com | string |
string | |
ingress.main.className (1) traefik | string |
string | |
ingress.tailscale.className (1) tailscale | string |
boolean | |
ingress.tailscale.hosts[].host (1) {{ .Release.Name }} | string |
string | |
string | |
string | |
ingress.tailscale.tls[].hosts[] (1) - {{ .Release.Name }} | string |
ingress.tdarr.annotations."haproxy.org/allow-list" (1) ${HAPROXY_WHITELIST} | string |
ingress.tdarr.annotations."haproxy.org/response-set-header" (1) Strict-Transport-Security "max-age=31536000"
X-Frame-Options "DENY"
X-Content-Type-Options "nosniff"
Referrer-Policy "strict-origin-when-cross-origin"
| string |
string | |
boolean | |
ingress.tdarr.hosts[].host (1) tdarr.${SECRET_DEFAULT_DOMAIN} | string |
string | |
string | |
string | |
ingress.tdarr.tls[].hosts[] (1) - tdarr.${SECRET_DEFAULT_DOMAIN} | string |
string | |
number | |
boolean | |
number | |
string | |
service.app.type (2) LoadBalancer | string |
number | |
boolean | |
number | |
string | |
string | |
string | |
string | |
boolean | |
number | |
string | |
service.server.type (2) LoadBalancer | string |
service.server.loadBalancerIP (1) ${CLUSTER_LB_TDARR} | string |
string | |
boolean | |
number | |
string | |
string | |
number | |
boolean | |
number | |
string | |
string | |
string | |
string | |
string | |
string | |
number | |
config.existingSecret (1) tdarr-oauth2-proxy | string |
string | |
number | |
number | |
env.serverIP (1) 0.0.0.0 | string |
env.serverPort (1) {{ .Values.service.main.ports.server.port }} | string |
env.TZ (1) ${TIMEZONE} | string |
env.webUIPort (1) {{ .Values.service.main.ports.http.port }} | string |
extraArgs.cookie-expire (1) 168h0m0s | string |
extraArgs.github-org (1) ${blog_name} | string |
extraArgs.github-team (1) super-admins,tdarr | string |
extraArgs.provider (1) github | string |
fullnameOverride (1) tdarr | string |
image.repository (1) docker.io/haveagitgat/tdarr | string |
image.tag (1) 2.17.01 | string |
number |