KubeZero/charts/kubezero-cert-manager
2022-04-08 17:11:34 +02:00
..
rules feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
templates feat: various fixes and version bumps for >= 1.22.8 2022-04-08 17:11:34 +02:00
.gitignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
.helmignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
backup-all.sh Add cert-manager backup support in bootstrap, enable schedule and controller metrics 2020-08-05 15:42:15 +01:00
cert-manager-rules.yaml feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
Chart.yaml feat: various fixes and version bumps for >= 1.22.8 2022-04-08 17:11:34 +02:00
dashboards.yaml feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
jsonnetfile.json feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
jsonnetfile.lock.json feat: cert-manager version bump 2021-12-09 14:03:34 +01:00
README.md feat: various fixes and version bumps for >= 1.22.8 2022-04-08 17:11:34 +02:00
README.md.gotmpl feat: cert-manager version bump 2021-12-09 14:03:34 +01:00
rules.jsonnet feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
update.sh feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
values.yaml chore: migrate all nodelabel selectors from master to control-plane 2021-12-08 17:29:53 +01:00

kubezero-cert-manager

Version: 0.8.1 Type: application AppVersion: 1.6.1

KubeZero Umbrella Chart for cert-manager

Homepage: https://kubezero.com

Maintainers

Name Email Url
Stefan Reimer stefan@zero-downtime.net

Requirements

Kubernetes: >= 1.20.0

Repository Name Version
https://cdn.zero-downtime.net/charts/ kubezero-lib >= 0.1.4
https://charts.jetstack.io cert-manager 1.6.1

AWS - OIDC IAM roles

Resolver Secrets

If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.

Resources

Values

Key Type Default Description
cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.cainjector.tolerations[0].effect string "NoSchedule"
cert-manager.cainjector.tolerations[0].key string "node-role.kubernetes.io/master"
cert-manager.enabled bool true
cert-manager.extraArgs[0] string "--dns01-recursive-nameservers-only"
cert-manager.global.leaderElection.namespace string "cert-manager"
cert-manager.ingressShim.defaultIssuerKind string "ClusterIssuer"
cert-manager.ingressShim.defaultIssuerName string "letsencrypt-dns-prod"
cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.prometheus.servicemonitor.enabled bool false
cert-manager.startupapicheck.enabled bool false
cert-manager.tolerations[0].effect string "NoSchedule"
cert-manager.tolerations[0].key string "node-role.kubernetes.io/master"
cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.webhook.tolerations[0].effect string "NoSchedule"
cert-manager.webhook.tolerations[0].key string "node-role.kubernetes.io/master"
clusterIssuer object {}
localCA.enabled bool false
localCA.selfsigning bool true