kubezero/charts/kubezero-cert-manager/README.md

57 lines
2.4 KiB
Markdown
Raw Normal View History

# kubezero-cert-manager
2021-03-25 15:32:49 +00:00
![Version: 0.5.0](https://img.shields.io/badge/Version-0.5.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
2020-05-19 12:44:01 +00:00
KubeZero Umbrella Chart for cert-manager
**Homepage:** <https://kubezero.com>
## Maintainers
| Name | Email | Url |
| ---- | ------ | --- |
| Quarky9 | | |
2020-05-19 12:44:01 +00:00
## Requirements
2020-05-19 12:44:01 +00:00
2021-03-25 15:32:49 +00:00
Kubernetes: `>= 1.18.0`
2020-05-19 12:44:01 +00:00
| Repository | Name | Version |
|------------|------|---------|
2021-03-25 15:32:49 +00:00
| https://charts.jetstack.io | cert-manager | 1.2.0 |
| https://zero-down-time.github.io/kubezero/ | kubezero-lib | >= 0.1.3 |
2020-05-19 12:44:01 +00:00
## AWS - IAM Role
If you use kiam or kube2iam and restrict access on nodes running cert-manager please adjust:
```
cert-manager.podAnnotations:
iam.amazonaws.com/role: <ROLE>
```
## Resolver Secrets
If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.
## Values
2020-05-19 12:44:01 +00:00
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/master" | string | `""` | |
| cert-manager.cainjector.tolerations[0].effect | string | `"NoSchedule"` | |
| cert-manager.cainjector.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | |
| cert-manager.enabled | bool | `true` | |
2020-05-19 12:44:01 +00:00
| cert-manager.extraArgs[0] | string | `"--dns01-recursive-nameservers-only"` | |
2020-11-24 14:44:57 +00:00
| cert-manager.global.leaderElection.namespace | string | `"cert-manager"` | |
2020-05-19 12:44:01 +00:00
| cert-manager.ingressShim.defaultIssuerKind | string | `"ClusterIssuer"` | |
| cert-manager.ingressShim.defaultIssuerName | string | `"letsencrypt-dns-prod"` | |
| cert-manager.nodeSelector."node-role.kubernetes.io/master" | string | `""` | |
2020-11-24 14:44:57 +00:00
| cert-manager.podAnnotations | object | `{}` | |
2020-05-19 12:44:01 +00:00
| cert-manager.prometheus.servicemonitor.enabled | bool | `false` | |
| cert-manager.tolerations[0].effect | string | `"NoSchedule"` | |
| cert-manager.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | |
| cert-manager.webhook.nodeSelector."node-role.kubernetes.io/master" | string | `""` | |
| cert-manager.webhook.tolerations[0].effect | string | `"NoSchedule"` | |
| cert-manager.webhook.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | |
| clusterIssuer | object | `{}` | |
| localCA.enabled | bool | `false` | |
2020-05-19 12:44:01 +00:00
| localCA.selfsigning | bool | `true` | |