No introduction found. Create it?
Install with:
helm repo add bjw-s https://bjw-s.github.io/helm-charts/
helm install n8n bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|
See the most popular values for this chart:
Key | Types |
---|---|
env.GENERIC_TIMEZONE (4) ${TIMEZONE} | string |
env.N8N_HOST (4) n8n.${SECRET_DOMAIN} | string |
number | |
string | |
env.N8N_LOG_OUTPUT (3) console | string |
env.N8N_PROTOCOL (3) https | string |
env.DB_TYPE (2) postgresdb | string |
boolean | |
env.TZ (2) ${TIMEZONE} | string |
env.WEBHOOK_URL (2) https://n8n.${SECRET_DOMAIN}/ | string |
string | |
env.DB_MYSQL_HOST (1) mariadb.core.svc.cluster.local | string |
string | |
string | |
string | |
env.DB_POSTGRESDB_DATABASE (1) ${N8N_DB_NAME} | string |
string | |
string | |
env.DB_POSTGRESDB_HOST (1) n8n-postgres | string |
string | |
string | |
env.DB_POSTGRESDB_PASSWORD (1) ${N8N_DB_PASSWORD} | string |
string | |
string | |
number | |
string | |
string | |
env.DB_POSTGRESDB_USER (1) ${N8N_DB_USER} | string |
string | |
string | |
boolean | |
env.N8N_EDITOR_BASE_URL (1) https://n8n.${SECRET_DOMAIN}/ | string |
string | |
env.N8N_ENCRYPTION_KEY.valueFrom.secretKeyRef.key (1) N8N_ENCRYPTION_KEY | string |
string | |
boolean | |
boolean | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
env.N8N_SMTP_SSL (1) false | string |
string | |
string | |
env.N8N_USER_FOLDER (1) /config | string |
boolean | |
boolean | |
env.QUEUE_BULL_REDIS_HOST (1) n8n-redis.default.svc.cluster.local | string |
image.repository (4) ghcr.io/n8n-io/n8n | string |
image.tag (4) 0.231.0 | string |
boolean | |
ingress.main.hosts[].host (4) n8n.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.main.tls[].hosts[] (4) - n8n.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (2) letsencrypt-n8n | string |
ingress.main.annotations."hajimari.io/icon" (3) mdi:workflow | string |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (2) ipv4.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-response-headers" (1) x-auth-request-email, x-auth-request-groups | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.greyrock.casa/oauth2/start?rd=$scheme://$best_http_host$request_uri | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) https://auth.greyrock.casa/oauth2/auth?allowed_groups=admins | string |
string | |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-bloopnet-xyz-auth@kubernetescrd | string |
string | |
string | |
string | |
number | |
command[] (3) - n8n | string |
boolean | |
persistence.config.existingClaim (3) n8n-config | string |
persistence.config.mountPath (3) /home/node/.n8n | string |
boolean | |
persistence.data.hostPath (1) /home/simo/Media | string |
string | |
persistence.data.type (1) hostPath | string |
number | |
number | |
number | |
podSecurityContext.fsGroupChangePolicy (2) OnRootMismatch | string |
string | |
controller.type (2) statefulset | string |
args[] (1) - -c | string |
string | |
string | |
envFrom[].secretRef.name (1) n8n-secrets | string |
string | |
volumeClaimTemplates[].accessMode (1) ReadWriteOnce | string |
volumeClaimTemplates[].mountPath (1) /home/node/.n8n | string |
string | |
string | |
volumeClaimTemplates[].storageClass (1) ceph-block | string |