No introduction found. Create it?
Install with:
helm repo add influxdata-charts https://helm.influxdata.com/
helm install influxdb influxdata-charts/influxdb2 -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|
See the most popular values for this chart:
Key | Types |
---|---|
adminUser.organization (8) homelab | string |
adminUser.bucket (7) default | string |
string | |
adminUser.user (7) admin | string |
adminUser.existingSecret (4) influxdb-admin-secret | string |
boolean | |
adminUser.password (2) password | string |
adminUser.token (2) UmvIsrrQYP1LeNgliYY6sdOClSJOLAeIp2QEuLtT_7slOtBVavFP8n8XT7eKCq2tnPIiJ5vEKe4pswpBSHFAYA== | string |
image.repository (8) influxdb | string |
image.tag (8) 2.7.4 | string |
image.pullPolicy (2) IfNotPresent | string |
boolean | |
ingress.hostname (7) influxdb.${SECRET_DOMAIN} | string |
ingress.tls (6) true | boolean |
string | |
string | |
string | |
ingress.annotations."cert-manager.io/cluster-issuer" (2) letsencrypt-production | string |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.annotations."nginx.ingress.kubernetes.io/whitelist-source-range" (1) 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 | string |
string | |
ingress.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) network-chain-external@kubernetescrd | string |
ingress.secretName (3) tls.influxdb | string |
string | |
boolean | |
persistence.name (6) influxdb-data | string |
boolean | |
string | |
persistence.storageClass (2) longhorn | string |
string | |
string | |
string | |
string | |
pdb.create (4) false | boolean |
string | |
env[].value (2) ${TIMEZONE} | string |
service.type (2) LoadBalancer | string |
service.annotations."io.cilium/lb-ipam-ips" (1) ${SVC_INFLUXDB_ADDR} | string |
string | |
service.loadBalancerIP (1) ${SVC_INFLUXDB} | string |
fullnameOverride (1) influxdb | string |
string | |
nodeSelector.node_locality (1) internal | string |
securityContext.fsGroup (1) ${SECURITY_CONTEXT_RUN_AS_GROUP} | string |
securityContext.runAsGroup (1) ${SECURITY_CONTEXT_RUN_AS_GROUP} | string |
securityContext.runAsUser (1) ${SECURITY_CONTEXT_RUN_AS_USER} | string |