kubezero/charts/kubezero-cert-manager/README.md

60 lines
2.9 KiB
Markdown
Raw Normal View History

# kubezero-cert-manager
2022-10-27 12:27:42 +00:00
![Version: 0.9.3](https://img.shields.io/badge/Version-0.9.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
2020-05-19 12:44:01 +00:00
KubeZero Umbrella Chart for cert-manager
**Homepage:** <https://kubezero.com>
2021-12-09 13:04:43 +00:00
## Maintainers
| Name | Email | Url |
| ---- | ------ | --- |
| Stefan Reimer | <stefan@zero-downtime.net> | |
2021-12-09 13:04:43 +00:00
## Requirements
2020-05-19 12:44:01 +00:00
2022-10-27 12:27:42 +00:00
Kubernetes: `>= 1.24.0`
2020-05-19 12:44:01 +00:00
| Repository | Name | Version |
|------------|------|---------|
| https://cdn.zero-downtime.net/charts/ | kubezero-lib | >= 0.1.6 |
2022-08-24 15:13:39 +00:00
| https://charts.jetstack.io | cert-manager | 1.9.1 |
2020-05-19 12:44:01 +00:00
2021-12-09 13:04:43 +00:00
## AWS - OIDC IAM roles
## Resolver Secrets
If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.
2021-12-09 13:04:43 +00:00
## Resources
- [Backup & Restore](https://cert-manager.io/docs/tutorials/backup/)
## Values
2020-05-19 12:44:01 +00:00
| Key | Type | Default | Description |
|-----|------|---------|-------------|
2021-12-09 13:04:43 +00:00
| cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" | string | `""` | |
2020-05-19 12:44:01 +00:00
| cert-manager.cainjector.tolerations[0].effect | string | `"NoSchedule"` | |
| cert-manager.cainjector.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | |
2022-10-27 12:27:42 +00:00
| cert-manager.cainjector.tolerations[1].effect | string | `"NoSchedule"` | |
| cert-manager.cainjector.tolerations[1].key | string | `"node-role.kubernetes.io/control-plane"` | |
| cert-manager.enabled | bool | `true` | |
2020-05-19 12:44:01 +00:00
| cert-manager.extraArgs[0] | string | `"--dns01-recursive-nameservers-only"` | |
2020-11-24 14:44:57 +00:00
| cert-manager.global.leaderElection.namespace | string | `"cert-manager"` | |
2020-05-19 12:44:01 +00:00
| cert-manager.ingressShim.defaultIssuerKind | string | `"ClusterIssuer"` | |
| cert-manager.ingressShim.defaultIssuerName | string | `"letsencrypt-dns-prod"` | |
2021-12-09 13:04:43 +00:00
| cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" | string | `""` | |
2020-05-19 12:44:01 +00:00
| cert-manager.prometheus.servicemonitor.enabled | bool | `false` | |
| cert-manager.startupapicheck.enabled | bool | `false` | |
2020-05-19 12:44:01 +00:00
| cert-manager.tolerations[0].effect | string | `"NoSchedule"` | |
| cert-manager.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | |
2022-10-27 12:27:42 +00:00
| cert-manager.tolerations[1].effect | string | `"NoSchedule"` | |
| cert-manager.tolerations[1].key | string | `"node-role.kubernetes.io/control-plane"` | |
2021-12-09 13:04:43 +00:00
| cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" | string | `""` | |
2020-05-19 12:44:01 +00:00
| cert-manager.webhook.tolerations[0].effect | string | `"NoSchedule"` | |
| cert-manager.webhook.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | |
2022-10-27 12:27:42 +00:00
| cert-manager.webhook.tolerations[1].effect | string | `"NoSchedule"` | |
| cert-manager.webhook.tolerations[1].key | string | `"node-role.kubernetes.io/control-plane"` | |
2020-05-19 12:44:01 +00:00
| clusterIssuer | object | `{}` | |
| localCA.enabled | bool | `false` | |
2020-05-19 12:44:01 +00:00
| localCA.selfsigning | bool | `true` | |