kubezero/charts/kubezero-cert-manager
Stefan Reimer 17ad966742 Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
..
rules feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
templates Minor bugfixes 2023-05-03 13:26:54 +00:00
.gitignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
.helmignore feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
Chart.yaml Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
README.md Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
README.md.gotmpl feat: cert-manager version bump 2021-12-09 14:03:34 +01:00
backup-all.sh Add cert-manager backup support in bootstrap, enable schedule and controller metrics 2020-08-05 15:42:15 +01:00
cert-manager-rules.yaml Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
dashboards.yaml fix: shorten kubezero-lib names, tweaks 2022-12-15 21:51:31 +00:00
jsonnetfile.json Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
jsonnetfile.lock.json Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
rules.jsonnet feat(cert-manager): Version bump, add support for Prometheus mixin 2021-09-29 16:30:37 +02:00
update.sh Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00
values.yaml Update cert-manager for 1.26 2023-08-21 11:56:56 +00:00

README.md

kubezero-cert-manager

Version: 0.9.5 Type: application

KubeZero Umbrella Chart for cert-manager

Homepage: https://kubezero.com

Maintainers

Name Email Url
Stefan Reimer stefan@zero-downtime.net

Requirements

Kubernetes: >= 1.26.0

Repository Name Version
https://cdn.zero-downtime.net/charts/ kubezero-lib >= 0.1.6
https://charts.jetstack.io cert-manager v1.12.3

AWS - OIDC IAM roles

Resolver Secrets

If your resolvers need additional sercrets like CloudFlare API tokens etc. make sure to provide these secrets separatly matching your defined issuers.

Resources

Values

Key Type Default Description
cert-manager.cainjector.extraArgs[0] string "--logging-format=json"
cert-manager.cainjector.extraArgs[1] string "--leader-elect=false"
cert-manager.cainjector.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.cainjector.tolerations[0].effect string "NoSchedule"
cert-manager.cainjector.tolerations[0].key string "node-role.kubernetes.io/control-plane"
cert-manager.enabled bool true
cert-manager.extraArgs[0] string "--logging-format=json"
cert-manager.extraArgs[1] string "--leader-elect=false"
cert-manager.extraArgs[2] string "--dns01-recursive-nameservers-only"
cert-manager.global.leaderElection.namespace string "cert-manager"
cert-manager.ingressShim.defaultIssuerKind string "ClusterIssuer"
cert-manager.ingressShim.defaultIssuerName string "letsencrypt-dns-prod"
cert-manager.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.prometheus.servicemonitor.enabled bool false
cert-manager.startupapicheck.enabled bool false
cert-manager.tolerations[0].effect string "NoSchedule"
cert-manager.tolerations[0].key string "node-role.kubernetes.io/control-plane"
cert-manager.webhook.extraArgs[0] string "--logging-format=json"
cert-manager.webhook.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cert-manager.webhook.tolerations[0].effect string "NoSchedule"
cert-manager.webhook.tolerations[0].key string "node-role.kubernetes.io/control-plane"
clusterIssuer object {}
localCA.enabled bool false
localCA.selfsigning bool true