No introduction found. Create it?
lidarr from bjw-s is more popular with 52 repositories.
Install with:
helm repo add k8s-at-home-charts https://k8s-at-home.com/charts/
helm install lidarr k8s-at-home-charts/lidarr -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
lidarr | dfroberg/cluster | 57 | 14.2.2 | a year ago |
See the most popular values for this chart:
Key | Types |
---|---|
image.repository (4) ghcr.io/k8s-at-home/lidarr | string |
image.tag (4) v1.0.2.2592 | string |
env.TZ (3) ${TIMEZONE} | string |
boolean | |
string | |
persistence.config.existingClaim (1) lidarr-config-v1 | string |
string | |
persistence.config.storageClass (1) cstor-csi-disk | string |
boolean | |
string | |
string | |
persistence.media.volumeSpec.nfs.path (2) ${NAS_BASE_PATH}/ | string |
persistence.media.volumeSpec.nfs.server (2) ${NAS_ADDR} | string |
persistence.media.accessMode (1) ReadWriteMany | string |
persistence.media.existingClaim (1) nfs-media-pvc | string |
boolean | |
ingress.main.hosts[].host (2) lidarr.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (1) ipv4.${SECRET_DOMAIN} | string |
string | |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://login.${SECRET_DOMAIN} | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.security.svc.cluster.local/api/verify | string |
ingress.main.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) proxy_set_header Accept-Encoding "";
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://theme-park.dev/css/base/lidarr/nord.css"></head>';
sub_filter_once on;
| string |
string | |
ingress.main.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-internal-only@kubernetescrd | string |
ingress.main.tls[].hosts[] (1) - lidarr.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (1) ${SECRET_DOMAIN//./-}-tls | string |
string | |
ingress.api.annotations."external-dns.alpha.kubernetes.io/target" (1) ipv4.${SECRET_DOMAIN} | string |
string | |
boolean | |
ingress.api.hosts[].host (1) lidarr.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.api.tls[].hosts[] (1) - lidarr.${SECRET_DOMAIN} | string |
ingress.api.tls[].secretName (1) ${SECRET_DOMAIN//./-}-tls | string |
string | |
ingress.dashboard.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-traefik-forward-auth@kubernetescrd | string |
boolean | |
ingress.dashboard.hosts[].host (1) lidarr.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.dashboard.tls[].hosts[] (1) - lidarr.${SECRET_DOMAIN} | string |
ingress.dashboard.tls[].secretName (1) lidarr-${SECRET_DOMAIN/./-}-tls | string |
boolean | |
boolean | |
number | |
boolean | |
metrics.exporter.image.repository (2) ghcr.io/onedr0p/exportarr | string |
string | |
boolean | |
string | |
string | |
string | |
string | |
string | |
string | |
additionalContainers.fsfreeze.command[] (1) - /bin/bash | string |
additionalContainers.fsfreeze.image (1) ubuntu:focal-20210827 | string |
string | |
string | |
boolean | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
podAnnotations."post.hook.backup.velero.io/command" (1) ["/sbin/fsfreeze", "--unfreeze", "/config"] | string |
string | |
podAnnotations."pre.hook.backup.velero.io/command" (1) ["/sbin/fsfreeze", "--freeze", "/config"] | string |
string | |
number | |
podSecurityContext.fsGroupChangePolicy (1) OnRootMismatch | string |
number | |
number | |
number | |
securityContext.runAsGroup (1) ${NFS_GROUP_ID} | string |
securityContext.runAsUser (1) ${NFS_USER_ID} | string |
updateStrategy (1) Recreate | string |