No introduction found. Create it?
external-dns-unifi from kubernetes-sigs is more popular with 10 repositories.
Install with:
helm repo add external-dns-unifi oci://ghcr.io/home-operations/charts-mirror/external-dns
helm install external-dns-unifi external-dns-unifi/external-dns-unifi -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| external-dns-unifi | ishioni/homelab-ops | 157 | 1.20.0 | 7 days ago |
| external-dns-unifi | xunholy/k8s-gitops | 629 | 1.20.0 | 16 days ago |
| external-dns-unifi | drag0n141/home-ops | 54 | 1.20.0 | 2 months ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
domainFilters[] (7) - dcunha.io | string |
podAnnotations."secret.reloader.stakater.com/reload" (7) external-dns-unifi-secret | string |
policy (7) sync | string |
provider.name (7) webhook | string |
provider.webhook.env[].name (7) UNIFI_HOST | string |
provider.webhook.env[].value (7) https://192.168.1.1 | string |
| string | |
provider.webhook.env[].valueFrom.secretKeyRef.name (7) external-dns-unifi-secret | string |
provider.webhook.image.repository (7) ghcr.io/kashalls/external-dns-unifi-webhook | string |
provider.webhook.image.tag (7) v0.8.2@sha256:7f0ddbbc83a36a2a9d762e25eef9cafcb3adf0493068a27d72ae71087eafe6f0 | string |
provider.webhook.image.pullPolicy (1) IfNotPresent | string |
| string | |
provider.webhook.livenessProbe.httpGet.port (7) http-webhook | string |
| number | |
| number | |
| string | |
provider.webhook.readinessProbe.httpGet.port (7) http-webhook | string |
| number | |
| number | |
| boolean | |
sources[] (7) - gateway-httproute | string |
txtOwnerId (7) main | string |
txtPrefix (7) k8s. | string |
fullnameOverride (6) external-dns-unifi | string |
| boolean | |
extraArgs[] (4) - --webhook-provider-url=http://localhost:8888 | string |
logLevel (4) info | string |
| string | |
| string | |
| string | |
annotationFilter (1) unifi.external-dns.alpha.kubernetes.io/exclude notin (true) | string |
excludeDomains[] (1) - ipv4.${SECRET_DOMAIN} | string |
managedRecordTypes[] (1) - A | string |