kubezero/charts/kubezero-cert-manager
Stefan Reimer 78639b623a feat: version bump cert-manager, gitea and Jenkins 2024-03-24 18:49:08 +00:00
..
rules cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
templates cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
.gitignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
.helmignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
Chart.yaml chore(deps): update helm release cert-manager to v1.14.4 2024-03-09 03:24:29 +00:00
README.md feat: version bump cert-manager, gitea and Jenkins 2024-03-24 18:49:08 +00:00
README.md.gotmpl feat: cert-manager version bump 2021-12-09 14:03:34 +01:00
backup-all.sh Add cert-manager backup support in bootstrap, enable schedule and controller metrics 2020-08-05 15:42:15 +01:00
cert-manager-rules.yaml Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
dashboards.yaml fix: shorten kubezero-lib names, tweaks 2022-12-15 21:51:31 +00:00
jsonnetfile.json cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
jsonnetfile.lock.json feat: version bump cert-manager, gitea and Jenkins 2024-03-24 18:49:08 +00:00
rules.jsonnet cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
update.sh cert-manager version bump, updated dashboards 2023-11-27 12:24:10 +00:00
values.yaml Feat: KubeZero-Telemetry module incl. Jaeger Collector/UI and OpenSearch 2024-02-09 16:24:37 +00:00

README.md

kubezero-cert-manager

Version: 0.9.7 Type: application

KubeZero Umbrella Chart for cert-manager

Homepage: https://kubezero.com

Maintainers

Name Email Url
Stefan Reimer stefan@zero-downtime.net

Requirements

Kubernetes: >= 1.26.0

Repository Name Version
https://cdn.zero-downtime.net/charts/ kubezero-lib >= 0.1.6
https://charts.jetstack.io cert-manager v1.14.4

AWS - OIDC IAM roles

Resolver Secrets

If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.

Resources

Values

Key Type Default Description
cert-manager.cainjector.extraArgs[0] string "--logging-format=json"
cert-manager.cainjector.extraArgs[1] string "--leader-elect=false"
cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.cainjector.tolerations[0].effect string "NoSchedule"
cert-manager.cainjector.tolerations[0].key string "node-role.kubernetes.io/control-plane"
cert-manager.enableCertificateOwnerRef bool true
cert-manager.enabled bool true
cert-manager.extraArgs[0] string "--logging-format=json"
cert-manager.extraArgs[1] string "--leader-elect=false"
cert-manager.extraArgs[2] string "--dns01-recursive-nameservers-only"
cert-manager.global.leaderElection.namespace string "cert-manager"
cert-manager.ingressShim.defaultIssuerKind string "ClusterIssuer"
cert-manager.ingressShim.defaultIssuerName string "letsencrypt-dns-prod"
cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.prometheus.servicemonitor.enabled bool false
cert-manager.startupapicheck.enabled bool false
cert-manager.tolerations[0].effect string "NoSchedule"
cert-manager.tolerations[0].key string "node-role.kubernetes.io/control-plane"
cert-manager.webhook.extraArgs[0] string "--logging-format=json"
cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.webhook.tolerations[0].effect string "NoSchedule"
cert-manager.webhook.tolerations[0].key string "node-role.kubernetes.io/control-plane"
clusterIssuer object {}
localCA.enabled bool false
localCA.selfsigning bool true