.. | ||
rules | ||
templates | ||
.gitignore | ||
.helmignore | ||
backup-all.sh | ||
cert-manager-rules.yaml | ||
Chart.yaml | ||
dashboards.yaml | ||
jsonnetfile.json | ||
jsonnetfile.lock.json | ||
README.md | ||
README.md.gotmpl | ||
rules.jsonnet | ||
update.sh | ||
values.yaml |
kubezero-cert-manager
KubeZero Umbrella Chart for cert-manager
Homepage: https://kubezero.com
Maintainers
Name | Url | |
---|---|---|
Stefan Reimer | stefan@zero-downtime.net |
Requirements
Kubernetes: >= 1.26.0
Repository | Name | Version |
---|---|---|
https://cdn.zero-downtime.net/charts/ | kubezero-lib | >= 0.1.6 |
https://charts.jetstack.io | cert-manager | v1.12.3 |
AWS - OIDC IAM roles
Resolver Secrets
If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.
Resources
Values
Key | Type | Default | Description |
---|---|---|---|
cert-manager.cainjector.extraArgs[0] | string | "--logging-format=json" |
|
cert-manager.cainjector.extraArgs[1] | string | "--leader-elect=false" |
|
cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" | string | "" |
|
cert-manager.cainjector.tolerations[0].effect | string | "NoSchedule" |
|
cert-manager.cainjector.tolerations[0].key | string | "node-role.kubernetes.io/control-plane" |
|
cert-manager.enabled | bool | true |
|
cert-manager.extraArgs[0] | string | "--logging-format=json" |
|
cert-manager.extraArgs[1] | string | "--leader-elect=false" |
|
cert-manager.extraArgs[2] | string | "--dns01-recursive-nameservers-only" |
|
cert-manager.global.leaderElection.namespace | string | "cert-manager" |
|
cert-manager.ingressShim.defaultIssuerKind | string | "ClusterIssuer" |
|
cert-manager.ingressShim.defaultIssuerName | string | "letsencrypt-dns-prod" |
|
cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" | string | "" |
|
cert-manager.prometheus.servicemonitor.enabled | bool | false |
|
cert-manager.startupapicheck.enabled | bool | false |
|
cert-manager.tolerations[0].effect | string | "NoSchedule" |
|
cert-manager.tolerations[0].key | string | "node-role.kubernetes.io/control-plane" |
|
cert-manager.webhook.extraArgs[0] | string | "--logging-format=json" |
|
cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" | string | "" |
|
cert-manager.webhook.tolerations[0].effect | string | "NoSchedule" |
|
cert-manager.webhook.tolerations[0].key | string | "node-role.kubernetes.io/control-plane" |
|
clusterIssuer | object | {} |
|
localCA.enabled | bool | false |
|
localCA.selfsigning | bool | true |