Initial metrics chart

This commit is contained in:
Stefan Reimer 2020-07-30 17:19:48 +01:00
parent 62013253f8
commit 8f5ba87b9a
2 changed files with 27 additions and 34 deletions

View File

@ -2,7 +2,7 @@ kubezero-argo-cd
================ ================
KubeZero ArgoCD Helm chart to install ArgoCD itself and the KubeZero ArgoCD Application KubeZero ArgoCD Helm chart to install ArgoCD itself and the KubeZero ArgoCD Application
Current chart version is `0.3.5` Current chart version is `0.3.6`
Source code can be found [here](https://kubezero.com) Source code can be found [here](https://kubezero.com)

View File

@ -1,8 +1,8 @@
kubezero-cert-manager kubezero-metrics
===================== ================
KubeZero Umbrella Chart for cert-manager KubeZero Umbrella Chart for prometheus-operator
Current chart version is `0.3.5` Current chart version is `0.0.1`
Source code can be found [here](https://kubezero.com) Source code can be found [here](https://kubezero.com)
@ -10,38 +10,31 @@ Source code can be found [here](https://kubezero.com)
| Repository | Name | Version | | Repository | Name | Version |
|------------|------|---------| |------------|------|---------|
| https://charts.jetstack.io | cert-manager | 0.15.1 | | https://kubernetes-charts.storage.googleapis.com/ | prometheus-operator | 9.3.0 |
| https://zero-down-time.github.io/kubezero/ | kubezero-lib | >= 0.1.1 | | https://zero-down-time.github.io/kubezero/ | kubezero-lib | >= 0.1.1 |
## AWS - IAM Role
If you use kiam or kube2iam and restrict access on nodes running cert-manager please adjust:
```
cert-manager.podAnnotations:
iam.amazonaws.com/role: <ROLE>
```
## Resolver Secrets
If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.
## Chart Values ## Chart Values
| Key | Type | Default | Description | | Key | Type | Default | Description |
|-----|------|---------|-------------| |-----|------|---------|-------------|
| cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/master" | string | `""` | | | prometheus-operator.alertmanager.enabled | bool | `false` | |
| cert-manager.cainjector.tolerations[0].effect | string | `"NoSchedule"` | | | prometheus-operator.coreDns.enabled | bool | `false` | |
| cert-manager.cainjector.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | | | prometheus-operator.defaultRules.create | bool | `false` | |
| cert-manager.extraArgs[0] | string | `"--dns01-recursive-nameservers-only"` | | | prometheus-operator.grafana.enabled | bool | `false` | |
| cert-manager.ingressShim.defaultIssuerKind | string | `"ClusterIssuer"` | | | prometheus-operator.kubeApiServer.enabled | bool | `false` | |
| cert-manager.ingressShim.defaultIssuerName | string | `"letsencrypt-dns-prod"` | | | prometheus-operator.kubeControllerManager.enabled | bool | `false` | |
| cert-manager.installCRDs | bool | `true` | | | prometheus-operator.kubeDns.enabled | bool | `false` | |
| cert-manager.nodeSelector."node-role.kubernetes.io/master" | string | `""` | | | prometheus-operator.kubeEtcd.enabled | bool | `false` | |
| cert-manager.podAnnotations | object | `{}` | "iam.amazonaws.com/roleIAM:" role ARN the cert-manager might use via kiam eg."arn:aws:iam::123456789012:role/certManagerRoleArn" | | prometheus-operator.kubeProxy.enabled | bool | `false` | |
| cert-manager.prometheus.servicemonitor.enabled | bool | `false` | | | prometheus-operator.kubeScheduler.enabled | bool | `false` | |
| cert-manager.tolerations[0].effect | string | `"NoSchedule"` | | | prometheus-operator.kubeStateMetrics.enabled | bool | `false` | |
| cert-manager.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | | | prometheus-operator.kubelet.enabled | bool | `false` | |
| cert-manager.webhook.nodeSelector."node-role.kubernetes.io/master" | string | `""` | | | prometheus-operator.nodeExporter.enabled | bool | `false` | |
| cert-manager.webhook.tolerations[0].effect | string | `"NoSchedule"` | | | prometheus-operator.prometheus.enabled | bool | `false` | |
| cert-manager.webhook.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | | | prometheus-operator.prometheusOperator.admissionWebhooks.enabled | bool | `false` | |
| clusterIssuer | object | `{}` | | | prometheus-operator.prometheusOperator.createCustomResource | bool | `false` | |
| localCA.enabled | bool | `true` | | | prometheus-operator.prometheusOperator.enabled | bool | `true` | |
| localCA.selfsigning | bool | `true` | | | prometheus-operator.prometheusOperator.namespaces.additional[0] | string | `"kube-system"` | |
| prometheus-operator.prometheusOperator.namespaces.releaseNamespace | bool | `true` | |
| prometheus-operator.prometheusOperator.serviceMonitor.selfMonitor | bool | `false` | |
| prometheus-operator.prometheusOperator.tlsProxy.enabled | bool | `false` | |