KubeZero/charts/kubezero-cert-manager/README.md

61 lines
2.9 KiB
Markdown
Raw Normal View History

# kubezero-cert-manager
2024-07-19 14:14:43 +00:00
![Version: 0.9.8](https://img.shields.io/badge/Version-0.9.8-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
2020-05-19 12:44:01 +00:00
KubeZero Umbrella Chart for cert-manager
**Homepage:** <https://kubezero.com>
2021-12-09 13:04:43 +00:00
## Maintainers
| Name | Email | Url |
| ---- | ------ | --- |
| Stefan Reimer | <stefan@zero-downtime.net> | |
2021-12-09 13:04:43 +00:00
## Requirements
2020-05-19 12:44:01 +00:00
2023-08-21 11:56:56 +00:00
Kubernetes: `>= 1.26.0`
2020-05-19 12:44:01 +00:00
| Repository | Name | Version |
|------------|------|---------|
| https://cdn.zero-downtime.net/charts/ | kubezero-lib | >= 0.1.6 |
2024-07-19 14:14:43 +00:00
| https://charts.jetstack.io | cert-manager | v1.15.1 |
2020-05-19 12:44:01 +00:00
2021-12-09 13:04:43 +00:00
## AWS - OIDC IAM roles
## Resolver Secrets
If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.
2021-12-09 13:04:43 +00:00
## Resources
- [Backup & Restore](https://cert-manager.io/docs/tutorials/backup/)
## Values
2020-05-19 12:44:01 +00:00
| Key | Type | Default | Description |
|-----|------|---------|-------------|
2023-08-21 11:56:56 +00:00
| cert-manager.cainjector.extraArgs[0] | string | `"--logging-format=json"` | |
| cert-manager.cainjector.extraArgs[1] | string | `"--leader-elect=false"` | |
2021-12-09 13:04:43 +00:00
| cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" | string | `""` | |
2020-05-19 12:44:01 +00:00
| cert-manager.cainjector.tolerations[0].effect | string | `"NoSchedule"` | |
2023-07-04 15:28:05 +00:00
| cert-manager.cainjector.tolerations[0].key | string | `"node-role.kubernetes.io/control-plane"` | |
2024-07-19 14:14:43 +00:00
| cert-manager.crds.enabled | bool | `true` | |
| cert-manager.enableCertificateOwnerRef | bool | `true` | |
| cert-manager.enabled | bool | `true` | |
2023-08-21 11:56:56 +00:00
| cert-manager.extraArgs[0] | string | `"--logging-format=json"` | |
| cert-manager.extraArgs[1] | string | `"--leader-elect=false"` | |
| cert-manager.extraArgs[2] | string | `"--dns01-recursive-nameservers-only"` | |
2020-11-24 14:44:57 +00:00
| cert-manager.global.leaderElection.namespace | string | `"cert-manager"` | |
2020-05-19 12:44:01 +00:00
| cert-manager.ingressShim.defaultIssuerKind | string | `"ClusterIssuer"` | |
| cert-manager.ingressShim.defaultIssuerName | string | `"letsencrypt-dns-prod"` | |
2021-12-09 13:04:43 +00:00
| cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" | string | `""` | |
2020-05-19 12:44:01 +00:00
| cert-manager.prometheus.servicemonitor.enabled | bool | `false` | |
| cert-manager.startupapicheck.enabled | bool | `false` | |
2020-05-19 12:44:01 +00:00
| cert-manager.tolerations[0].effect | string | `"NoSchedule"` | |
2023-07-04 15:28:05 +00:00
| cert-manager.tolerations[0].key | string | `"node-role.kubernetes.io/control-plane"` | |
2023-08-21 11:56:56 +00:00
| cert-manager.webhook.extraArgs[0] | string | `"--logging-format=json"` | |
2021-12-09 13:04:43 +00:00
| cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" | string | `""` | |
2020-05-19 12:44:01 +00:00
| cert-manager.webhook.tolerations[0].effect | string | `"NoSchedule"` | |
2023-07-04 15:28:05 +00:00
| cert-manager.webhook.tolerations[0].key | string | `"node-role.kubernetes.io/control-plane"` | |
2020-05-19 12:44:01 +00:00
| clusterIssuer | object | `{}` | |
| localCA.enabled | bool | `false` | |
2020-05-19 12:44:01 +00:00
| localCA.selfsigning | bool | `true` | |