KubeZero/charts/kubezero-cert-manager
2022-05-16 10:14:32 +02:00
..
rules feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
templates fix: allow cert-manager without metrics module 2022-05-16 10:14:32 +02:00
.gitignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
.helmignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
backup-all.sh Add cert-manager backup support in bootstrap, enable schedule and controller metrics 2020-08-05 15:42:15 +01:00
cert-manager-rules.yaml feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
Chart.yaml fix: allow cert-manager without metrics module 2022-05-16 10:14:32 +02:00
dashboards.yaml feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
jsonnetfile.json feat: cert-manager version bump for 1.22 2022-04-20 13:15:42 +02:00
jsonnetfile.lock.json feat: cert-manager version bump for 1.22 2022-04-20 13:15:42 +02:00
README.md fix: allow cert-manager without metrics module 2022-05-16 10:14:32 +02:00
README.md.gotmpl feat: cert-manager version bump 2021-12-09 14:03:34 +01:00
rules.jsonnet feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
update.sh feat: cert-manager version bump for 1.22 2022-04-20 13:15:42 +02:00
values.yaml chore: migrate all nodelabel selectors from master to control-plane 2021-12-08 17:29:53 +01:00

kubezero-cert-manager

Version: 0.9.1 Type: application

KubeZero Umbrella Chart for cert-manager

Homepage: https://kubezero.com

Maintainers

Name Email Url
Stefan Reimer stefan@zero-downtime.net

Requirements

Kubernetes: >= 1.20.0

Repository Name Version
https://cdn.zero-downtime.net/charts/ kubezero-lib >= 0.1.4
https://charts.jetstack.io cert-manager 1.8.0

AWS - OIDC IAM roles

Resolver Secrets

If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.

Resources

Values

Key Type Default Description
cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.cainjector.tolerations[0].effect string "NoSchedule"
cert-manager.cainjector.tolerations[0].key string "node-role.kubernetes.io/master"
cert-manager.enabled bool true
cert-manager.extraArgs[0] string "--dns01-recursive-nameservers-only"
cert-manager.global.leaderElection.namespace string "cert-manager"
cert-manager.ingressShim.defaultIssuerKind string "ClusterIssuer"
cert-manager.ingressShim.defaultIssuerName string "letsencrypt-dns-prod"
cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.prometheus.servicemonitor.enabled bool false
cert-manager.startupapicheck.enabled bool false
cert-manager.tolerations[0].effect string "NoSchedule"
cert-manager.tolerations[0].key string "node-role.kubernetes.io/master"
cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.webhook.tolerations[0].effect string "NoSchedule"
cert-manager.webhook.tolerations[0].key string "node-role.kubernetes.io/master"
clusterIssuer object {}
localCA.enabled bool false
localCA.selfsigning bool true