KubeZero/charts/kubezero-cert-manager
2023-11-30 21:07:42 +00:00
..
rules cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
templates cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
.gitignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
.helmignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
backup-all.sh Add cert-manager backup support in bootstrap, enable schedule and controller metrics 2020-08-05 15:42:15 +01:00
cert-manager-rules.yaml Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
Chart.yaml chore(deps): update helm release cert-manager to v1.13.2 2023-11-22 18:38:15 +00:00
dashboards.yaml fix: shorten kubezero-lib names, tweaks 2022-12-15 21:51:31 +00:00
jsonnetfile.json cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
jsonnetfile.lock.json More minor fixes and doc updates 2023-11-30 21:07:42 +00:00
README.md cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
README.md.gotmpl feat: cert-manager version bump 2021-12-09 14:03:34 +01:00
rules.jsonnet cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
update.sh cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
values.yaml Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00

kubezero-cert-manager

Version: 0.9.6 Type: application

KubeZero Umbrella Chart for cert-manager

Homepage: https://kubezero.com

Maintainers

Name Email Url
Stefan Reimer stefan@zero-downtime.net

Requirements

Kubernetes: >= 1.26.0

Repository Name Version
https://cdn.zero-downtime.net/charts/ kubezero-lib >= 0.1.6
https://charts.jetstack.io cert-manager v1.13.2

AWS - OIDC IAM roles

Resolver Secrets

If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.

Resources

Values

Key Type Default Description
cert-manager.cainjector.extraArgs[0] string "--logging-format=json"
cert-manager.cainjector.extraArgs[1] string "--leader-elect=false"
cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.cainjector.tolerations[0].effect string "NoSchedule"
cert-manager.cainjector.tolerations[0].key string "node-role.kubernetes.io/control-plane"
cert-manager.enabled bool true
cert-manager.extraArgs[0] string "--logging-format=json"
cert-manager.extraArgs[1] string "--leader-elect=false"
cert-manager.extraArgs[2] string "--dns01-recursive-nameservers-only"
cert-manager.global.leaderElection.namespace string "cert-manager"
cert-manager.ingressShim.defaultIssuerKind string "ClusterIssuer"
cert-manager.ingressShim.defaultIssuerName string "letsencrypt-dns-prod"
cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.prometheus.servicemonitor.enabled bool false
cert-manager.startupapicheck.enabled bool false
cert-manager.tolerations[0].effect string "NoSchedule"
cert-manager.tolerations[0].key string "node-role.kubernetes.io/control-plane"
cert-manager.webhook.extraArgs[0] string "--logging-format=json"
cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.webhook.tolerations[0].effect string "NoSchedule"
cert-manager.webhook.tolerations[0].key string "node-role.kubernetes.io/control-plane"
clusterIssuer object {}
localCA.enabled bool false
localCA.selfsigning bool true