No introduction found. Create it?
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install unifi bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
unifi | auricom/home-ops | 186 | 3.7.3 | 13 days ago |
unifi | angelnu/k8s-gitops | 165 | 3.7.3 | 13 days ago |
unifi | tyriis/home-ops | 55 | 3.7.3 | 14 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
string | |
string, boolean | |
string | |
string, boolean | |
string, number | |
string, number | |
controllers.unifi.containers.app.env.TZ (7) ${CLUSTER_TIMEZONE} | string |
boolean | |
string | |
string | |
boolean | |
string | |
string | |
boolean | |
number | |
controllers.unifi.containers.app.image.repository (11) jacobalberty/unifi | string |
controllers.unifi.containers.app.image.tag (11) v9.0.114@sha256:d5c9f87e643854bec4d0c15f6cbeec75510a449a7ec46f1e223eded858add480 | string |
string | |
string | |
string | |
string | |
boolean | |
number | |
boolean | |
number | |
boolean | |
number | |
string | |
controllers.unifi.containers.app.ports[].containerPort (1) 8080 | number |
controllers.unifi.containers.app.ports[].name (1) controller | string |
controllers.unifi.containers.app.ports[].protocol (1) TCP | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.unifi.containers.unifi.image.repository (2) jacobalberty/unifi | string |
string | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
number | |
string | |
number | |
number | |
controllers.unifi.pod.annotations."k8s.v1.cni.cncf.io/networks" (1) [{
"name":"multus-mgt",
"namespace": "network",
"ips": ["192.168.0.241/24"],
"mac": "48:C3:71:81:39:77"
}]
| string |
controllers.unifi.type (2) statefulset | string |
number | |
string | |
controllers.unifi.statefulset.volumeClaimTemplates[].globalMounts[].path (1) /usr/lib/unifi/data | string |
string | |
string | |
string | |
controllers.unifi.strategy (1) Recreate | string |
string | |
string, boolean | |
controllers.main.containers.main.env.TZ (4) ${TIMEZONE} | string |
string, number | |
string, number | |
string | |
controllers.main.containers.main.image.repository (4) docker.io/jacobalberty/unifi | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.main.containers.app.image.repository (1) docker.io/jacobalberty/unifi | string |
string | |
number | |
string | |
number | |
number | |
controllers.main.pod.annotations."k8s.v1.cni.cncf.io/networks" (1) [{
"name":"macvlan-static",
"namespace": "kube-system",
"ips": ["${CLUSTER_EXTERNAL_SUBNET_PREFIX}.${CLUSTER_MACVLAN_UNIFI}"]
}]
| string |
string | |
string | |
string | |
string | |
string | |
controllers.app.containers.app.env.MONGO_HOST (1) unifi-mongo-0.unifi-mongo-svc.mongo.svc.cluster.local | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
controllers.app.containers.app.image.repository (1) ghcr.io/linuxserver/unifi-network-application | string |
controllers.app.containers.app.image.tag (1) 9.0.114@sha256:d673e01c837337d982bf52ff25b11a3fd61e573fd3f355f998d869549d5948b6 | string |
boolean | |
boolean | |
boolean | |
boolean | |
boolean | |
boolean | |
string | |
string | |
string | |
boolean | |
boolean | |
boolean | |
number | |
number | |
number | |
controllers.app.strategy (1) RollingUpdate | string |
controllers.app.type (1) deployment | string |
ingress.main.hosts[].host (7) unifi-new.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.main.hosts[].paths[].pathType (1) Prefix | string |
string | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (3) letsencrypt-production | string |
string | |
ingress.main.annotations."gethomepage.dev/description" (2) Ubiqiti UniFi Network Controller | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (1) ${home_domain_ddns} | string |
string | |
ingress.main.annotations."hajimari.io/info" (1) Manage Unifi Devices | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN}/oauth2/auth/oauth2/start?rd=$scheme://$host$request_uri | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-snippet" (1) if ($remote_addr = "192.168.50.2") {
return 200;
}
| string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://oauth2-proxy.security.svc.cluster.local:4180/oauth2/auth | string |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-rfc1918-ips@kubernetescrd | string |
ingress.main.tls[].hosts[] (6) - unifi-new.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (4) unifi-controller-tls | string |
ingress.main.className (6) internal | string |
boolean | |
string | |
ingress.app.className (9) internal | string |
ingress.app.hosts[].host (9) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
ingress.app.annotations."cert-manager.io/cluster-issuer" (3) letsencrypt-production | string |
string | |
ingress.app.annotations."gethomepage.dev/group" (3) Infrastructure | string |
string | |
string | |
ingress.app.annotations."hajimari.io/icon" (3) simple-icons:ubiquiti | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (2) internal.${SECRET_DOMAIN} | string |
ingress.app.annotations."gethomepage.dev/description" (2) Centralized enterprise-grade networking for home and business. | string |
ingress.app.annotations."gethomepage.dev/pod-selector" (2) app in (
unifi
) | string |
string | |
string | |
string | |
string | |
ingress.app.tls[].hosts[] (8) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (2) ${SECRET_DOMAIN/./-}-tls | string |
boolean | |
string | |
string | |
string | |
ingress.internal.hosts[].host (1) unifi.home.arpa | string |
string | |
string | |
ingress.internal.tls[].hosts[] (1) - *.home.arpa | string |
ingress.internal.tls[].secretName (1) internal-wildcard-tls | string |
ingress.unifi.annotations."haproxy.org/allow-list" (1) ${HAPROXY_WHITELIST} | string |
ingress.unifi.annotations."haproxy.org/response-set-header" (1) Strict-Transport-Security "max-age=31536000"
X-Frame-Options "DENY"
X-Content-Type-Options "nosniff"
Referrer-Policy "no-referrer-when-downgrade"
| string |
string | |
string | |
boolean | |
ingress.unifi.hosts[].host (1) unifi.${SECRET_DEFAULT_DOMAIN} | string |
string | |
string | |
string | |
ingress.unifi.tls[].hosts[] (1) - unifi.${SECRET_DEFAULT_DOMAIN} | string |
string | |
number | |
string | |
boolean | |
boolean | |
number | |
string | |
boolean | |
boolean | |
number | |
string | |
boolean | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
boolean | |
string | |
number | |
boolean | |
string | |
number | |
boolean | |
string | |
number | |
boolean | |
string | |
service.app.type (10) LoadBalancer | string |
string | |
service.app.loadBalancerIP (5) ${CLUSTER_LB_UNIFI} | string |
service.app.annotations."io.cilium/lb-ipam-ips" (4) ${CLUSTER_LB_UNIFI} | string |
service.app.annotations."lbipam.cilium.io/ips" (3) ${UNIFI_VIP_GATEWAY} | string |
service.app.annotations."external-dns.alpha.kubernetes.io/hostname" (2) unifi-controller.18b.haus | string |
string | |
string | |
string | |
string | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
string | |
service.main.type (3) LoadBalancer | string |
string | |
string | |
string | |
service.main.loadBalancerIP (1) ${UNIFI_ADDR:=1.1.1.1} | string |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
boolean | |
number | |
string | |
service.unifi.type (2) LoadBalancer | string |
service.unifi.annotations."external-dns.alpha.kubernetes.io/hostname" (1) {{ .Release.Name }}.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
service.unifi.loadBalancerIP (1) 10.0.1.39 | string |
string | |
service.tcp.loadBalancerIP (1) 192.168.2.3 | string |
number | |
number | |
number | |
service.tcp.type (1) LoadBalancer | string |
string | |
service.udp.loadBalancerIP (1) 192.168.2.3 | string |
number | |
string | |
number | |
string | |
service.udp.type (1) LoadBalancer | string |
string | |
boolean | |
string | |
string | |
persistence.data.existingClaim (4) unifi-data | string |
boolean | |
string | |
persistence.data.accessMode (1) ReadWriteOnce | string |
string | |
persistence.data.storageClass (1) openebs-hostpath | string |
string | |
string | |
boolean | |
persistence.cert.globalMounts[].path (2) /unifi/cert | string |
boolean | |
persistence.cert.globalMounts[].subPath (1) keystore.jks | string |
persistence.cert.name (2) 18b-haus-production-tls | string |
string | |
persistence.backup.globalMounts[].path (1) /usr/lib/unifi/data/backup | string |
persistence.backup.path (1) /tank/backup/kubernetes/apps/unifi | string |
persistence.backup.server (1) 10.0.2.4 | string |
string | |
persistence.backups.globalMounts[].path (1) /unifi/data/backup | string |
persistence.backups.path (1) /mnt/user/backups/unifi | string |
persistence.backups.server (1) ${CORE_NFS_SERVER:=nas0} | string |
string | |
string | |
persistence.log.type (1) emptyDir | string |
persistence.logs.globalMounts[].path (1) /config/logs | string |
persistence.logs.type (1) emptyDir | string |
persistence.storage.existingClaim (1) unifi-storage | string |
string | |
string | |
persistence.unifi-cert.name (1) unifi.${home_domain} | string |
string | |
persistence.unifi-config.advancedMounts.unifi.unifi[].path (1) /unifi/data | string |
string | |
persistence.unifi-config.existingClaim (1) unifi-config | string |
number, string | |
string | |
number, string | |
boolean | |
number, string | |
string | |
boolean | |
fullnameOverride (1) unifi | string |
route.app.hostnames[] (1) - {{ .Release.Name }}.${SECRET_DOMAIN} | string |
route.app.kind (1) TLSRoute | string |
route.app.parentRefs[].name (1) internal | string |
route.app.parentRefs[].namespace (1) kube-system | string |
string | |
string | |
number |