Skip to content

Commit 3474db4

Browse files
Merge pull request #428 from homarr-labs/docs/update-helm-docs
Update Helm chart documentation
2 parents 3079f75 + e6376f2 commit 3474db4

File tree

1 file changed

+20
-29
lines changed
  • docs/getting-started/installation

1 file changed

+20
-29
lines changed

docs/getting-started/installation/helm.md

Lines changed: 20 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
<img src="https://raw.githubusercontent.com/homarr-labs/charts/refs/heads/main/charts/homarr/icon.svg" align="right" width="92" alt="homarr logo">
44

5-
![Version: 6.0.0](https://img.shields.io/badge/Version-6.0.0-informational?style=flat)
5+
![Version: 7.0.0](https://img.shields.io/badge/Version-7.0.0-informational?style=flat)
66
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat)
77
![AppVersion: v1.39.0](https://img.shields.io/badge/AppVersion-v1.39.0-informational?style=flat)
88

@@ -20,9 +20,7 @@ Kubernetes: `>=1.24.0-0`
2020

2121
## Dependencies
2222

23-
| Repository | Name | Version |
24-
|------------|------|---------|
25-
| <https://charts.bitnami.com/bitnami> | mysql | 14.0.3 |
23+
This chart has no dependencies.
2624

2725
## Installing the Chart
2826

@@ -81,10 +79,10 @@ Below is an exhaustive list of all secrets:
8179
<center>
8280

8381
| FEATURE | SECRET NAME | SECRET KEYS | Required |
84-
|-----------|-------------------------|----------------------------------------------------------------------|-----------------------------------------------------------------------|
85-
| OIDC | auth-oidc-secret | oidc-client-id<br>oidc-client-secret | No |
86-
| LDAP | auth-ldap-secret | bind-password | No |
87-
| DATABASE | db-secret | db-encryption-key<br>db-url<br>mysql-root-password<br>mysql-password | Depends (see Database section) at least db-encryption-key is required |
82+
|-----------|-------------------------|-----------------------------------------|-----------------------------------------------------------------------|
83+
| OIDC | auth-oidc-secret | oidc-client-id<br>oidc-client-secret | No |
84+
| LDAP | auth-ldap-secret | bind-password | No |
85+
| DATABASE | db-secret | db-encryption-key<br>db-url | Depends (see Database section) at least db-encryption-key is required |
8886

8987
</center>
9088

@@ -97,9 +95,9 @@ You have multiple options for configuring the database:
9795
| DRIVER TYPE | Persistence mode |
9896
|----------------|---------------------------------|
9997
| better-sqlite3 | Pod disk |
100-
| better-sqlite3 | `homarr-database` PVC |
101-
| mysql2 | MySql database chart dependency |
98+
| better-sqlite3 | homarr-database PVC |
10299
| mysql2 | External MySql database |
100+
| node-postgres | External Postgresql database |
103101

104102
</center>
105103

@@ -152,9 +150,7 @@ persistence:
152150

153151
</details>
154152

155-
#### MySql database chart dependency
156-
157-
We are using [mysql bitnami](https://artifacthub.io/packages/helm/bitnami/mysql) chart as a dependency for data persistence. For additional configuration options, refer to the [Mysql chart documentation](https://github.com/bitnami/charts/tree/main/bitnami/mysql)
153+
#### External MySql database
158154

159155
To create the necessary database secrets, execute the following command:
160156

@@ -164,29 +160,23 @@ To create the necessary database secrets, execute the following command:
164160
````yaml
165161
kubectl create secret generic db-secret \
166162
--from-literal=db-encryption-key='<SECRET_ENCRYPTION_KEY_SECRET_TO_CHANGE>' \
167-
--from-literal=db-url='mysql://homarr:your-db-password1@homarr-mysql:3306/homarrdb' \
168-
--from-literal=mysql-root-password='your-db-password1' \
169-
--from-literal=mysql-password='your-db-password2' \
163+
--from-literal=db-url='mysql://user:password@host:port/homarrdb' \
170164
--namespace homarr
171165
````
172166
</details>
173167

174-
if the key `mysql.auth.usersame` has been modified, please update the `db-url` accordingly. The database host and port should remain unchanged.
175-
176168
Below is an example of the override values file:
177169

178170
<details>
179171
<summary>values.yaml</summary>
180172

181173
````yaml
182-
mysql:
183-
internal: true
174+
database:
175+
type: mysql
184176
````
185177
</details>
186178

187-
#### External MySql database
188-
189-
The chart offer the possibility to use an external database.
179+
#### External Postgresql database
190180

191181
To create the necessary database secrets, execute the following command:
192182

@@ -196,7 +186,7 @@ To create the necessary database secrets, execute the following command:
196186
````yaml
197187
kubectl create secret generic db-secret \
198188
--from-literal=db-encryption-key='<SECRET_ENCRYPTION_KEY_SECRET_TO_CHANGE>' \
199-
--from-literal=db-url='mysql://user:password@host:port/homarrdb' \
189+
--from-literal=db-url='postgresql://user:password@host:port/homarrdb' \
200190
--namespace homarr
201191
````
202192
</details>
@@ -208,7 +198,7 @@ Below is an example of the override values file:
208198

209199
````yaml
210200
database:
211-
externalDatabaseEnabled: true
201+
type: postgresql
212202
````
213203
</details>
214204

@@ -387,8 +377,8 @@ All available values are listed on the [artifacthub](https://artifacthub.io/pack
387377
| autoscaling.minReplicas | int | `1` | Minimum replicas |
388378
| autoscaling.targetCPUUtilizationPercentage | int | `80` | Target CPU utilization for autoscaling |
389379
| containerPorts | object | `{"http":{"port":7575,"protocol":"TCP"}}` | containerPorts defines the ports to open on the container. It is a map where each entry specifies: - `port` (int) (required): The port number to expose inside the container. - `protocol` (string) (required): The network protocol (TCP or UDP) used for the port. - `disabled` (bool) : Optional flag to disable this port (defaults to false). Can be overridden via Helm values. By default, this configuration exposes TCP port 7575 with the name `http`. |
390-
| database.externalDatabaseEnabled | bool | `false` | Enable external database |
391380
| database.migrationEnabled | bool | `true` | Database migration configuration. DB_MIGRATIONS_DISABLED Set to `true` to disable database migrations. Migrations are enabled by default (`false`). |
381+
| database.type | string | `"sqlite"` | Database type: sqlite | mysql | postgresql |
392382
| env.AUTH_LDAP_BASE | string | `nil` | Base dn of your LDAP server |
393383
| env.AUTH_LDAP_BIND_DN | string | `nil` | User used for finding users and groups |
394384
| env.AUTH_LDAP_GROUP_CLASS | string | `"groupOfUniqueNames"` | Class used for querying groups |
@@ -409,16 +399,17 @@ All available values are listed on the [artifacthub](https://artifacthub.io/pack
409399
| env.AUTH_OIDC_SCOPE_OVERWRITE | string | `"openid email profile groups"` | Override the OIDC scopes |
410400
| env.AUTH_PROVIDERS | string | `"credentials"` | Enabled authentication methods. Multiple providers can be enabled with by separating them with , (ex. AUTH_PROVIDERS=credentials,oidc, it is highly recommended to just enable one provider). |
411401
| env.AUTH_SESSION_EXPIRY_TIME | string | `"30d"` | Time for the session to time out. Can be set as pure number, which will automatically be used in seconds, or followed by s, m, h or d for seconds, minutes, hours or days. (ex: "30m") |
402+
| env.ENABLE_DNS_CACHING | string | `"false"` | Enables dns caching. This is not yet working for all users. See #4006 |
403+
| env.LOG_LEVEL | string | `"info"` | Log level to use. Possible values: debug/info/warn/error |
404+
| env.NO_EXTERNAL_CONNECTION | string | `"false"` | Disables some requests that need internet connection |
412405
| env.TZ | string | `"Europe/Paris"` | Your local time zone |
413406
| envSecrets.authLdapCredentials.existingSecret | string | `"auth-ldap-secret"` | Name of existing secret containing LDAP credentials |
414407
| envSecrets.authLdapCredentials.ldapBindingPassword | string | `"bind-password"` | Password for bind user secret key |
415408
| envSecrets.authOidcCredentials.existingSecret | string | `"auth-oidc-secret"` | Name of existing secret containing OIDC credentials |
416409
| envSecrets.authOidcCredentials.oidcClientId | string | `"oidc-client-id"` | ID of OIDC client (application) secret key |
417410
| envSecrets.authOidcCredentials.oidcClientSecret | string | `"oidc-client-secret"` | Secret of OIDC client (application) secret key |
418411
| envSecrets.dbCredentials.dbEncryptionKey | string | `"db-encryption-key"` | Secret key for SECRET_ENCRYPTION_KEY can be generated with `openssl rand -hex 32` |
419-
| envSecrets.dbCredentials.dbPasswordKey | string | `"mysql-root-password"` | Secret key for DB_PASSWORD |
420-
| envSecrets.dbCredentials.dbUrlKey | string | `"db-url"` | Secret key for DB_URL Example for internal database: `mysql://username:password@homarr-mysql:3306/homarrdb` |
421-
| envSecrets.dbCredentials.dbUserPasswordKey | string | `"mysql-password"` | Secret key for database user |
412+
| envSecrets.dbCredentials.dbUrlKey | string | `"db-url"` | Secret key for DB_URL Example for external database: `mysql://username:password@host:port/homarrdb` or `postgresql://username:password@host:port/homarrdb` |
422413
| envSecrets.dbCredentials.existingSecret | string | `"db-secret"` | Name of existing secret containing DB credentials |
423414
| fullnameOverride | string | `""` | Overrides chart's fullname |
424415
| hostAliases | list | `[]` | Add static entries to /etc/hosts in the Pod. This is useful in the following cases: - You are running in a dual-stack cluster (IPv4 + IPv6) and want to force usage of IPv4 for specific hostnames - Your application is having DNS resolution issues or IPv6 preference issues - You need to override or simulate DNS entries without changing global DNS - You are running in an air-gapped or isolated environment without external DNS Example: hostAliases: - ip: "192.168.1.10" hostnames: - "example.com" - "example.internal" |

0 commit comments

Comments
 (0)