default-values.yml 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516
  1. # Default values for cert-manager.
  2. # This is a YAML-formatted file.
  3. # Declare variables to be passed into your templates.
  4. global:
  5. ## Reference to one or more secrets to be used when pulling images
  6. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
  7. ##
  8. imagePullSecrets: []
  9. # - name: "image-pull-secret"
  10. # Optional priority class to be used for the cert-manager pods
  11. priorityClassName: ""
  12. rbac:
  13. create: true
  14. podSecurityPolicy:
  15. enabled: false
  16. useAppArmor: true
  17. # Set the verbosity of cert-manager. Range of 0 - 6 with 6 being the most verbose.
  18. logLevel: 2
  19. leaderElection:
  20. # Override the namespace used to store the ConfigMap for leader election
  21. namespace: "kube-system"
  22. # The duration that non-leader candidates will wait after observing a
  23. # leadership renewal until attempting to acquire leadership of a led but
  24. # unrenewed leader slot. This is effectively the maximum duration that a
  25. # leader can be stopped before it is replaced by another candidate.
  26. # leaseDuration: 60s
  27. # The interval between attempts by the acting master to renew a leadership
  28. # slot before it stops leading. This must be less than or equal to the
  29. # lease duration.
  30. # renewDeadline: 40s
  31. # The duration the clients should wait between attempting acquisition and
  32. # renewal of a leadership.
  33. # retryPeriod: 15s
  34. installCRDs: false
  35. replicaCount: 1
  36. strategy: {}
  37. # type: RollingUpdate
  38. # rollingUpdate:
  39. # maxSurge: 0
  40. # maxUnavailable: 1
  41. # Comma separated list of feature gates that should be enabled on the
  42. # controller pod.
  43. featureGates: ""
  44. image:
  45. repository: quay.io/jetstack/cert-manager-controller
  46. # You can manage a registry with
  47. # registry: quay.io
  48. # repository: jetstack/cert-manager-controller
  49. # Override the image tag to deploy by setting this variable.
  50. # If no value is set, the chart's appVersion will be used.
  51. # tag: canary
  52. # Setting a digest will override any tag
  53. # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
  54. pullPolicy: IfNotPresent
  55. # Override the namespace used to store DNS provider credentials etc. for ClusterIssuer
  56. # resources. By default, the same namespace as cert-manager is deployed within is
  57. # used. This namespace will not be automatically created by the Helm chart.
  58. clusterResourceNamespace: ""
  59. serviceAccount:
  60. # Specifies whether a service account should be created
  61. create: true
  62. # The name of the service account to use.
  63. # If not set and create is true, a name is generated using the fullname template
  64. # name: ""
  65. # Optional additional annotations to add to the controller's ServiceAccount
  66. # annotations: {}
  67. # Automount API credentials for a Service Account.
  68. automountServiceAccountToken: true
  69. # Additional command line flags to pass to cert-manager controller binary.
  70. # To see all available flags run docker run quay.io/jetstack/cert-manager-controller:<version> --help
  71. extraArgs: []
  72. # When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted
  73. # - --enable-certificate-owner-ref=true
  74. # Use this flag to enabled or disable arbitrary controllers, for example, disable the CertificiateRequests approver
  75. # - --controllers=*,-certificaterequests-approver
  76. extraEnv: []
  77. # - name: SOME_VAR
  78. # value: 'some value'
  79. resources: {}
  80. # requests:
  81. # cpu: 10m
  82. # memory: 32Mi
  83. # Pod Security Context
  84. # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
  85. securityContext:
  86. runAsNonRoot: true
  87. # legacy securityContext parameter format: if enabled is set to true, only fsGroup and runAsUser are supported
  88. # securityContext:
  89. # enabled: false
  90. # fsGroup: 1001
  91. # runAsUser: 1001
  92. # to support additional securityContext parameters, omit the `enabled` parameter and simply specify the parameters
  93. # you want to set, e.g.
  94. # securityContext:
  95. # fsGroup: 1000
  96. # runAsUser: 1000
  97. # runAsNonRoot: true
  98. # Container Security Context to be set on the controller component container
  99. # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
  100. containerSecurityContext: {}
  101. # capabilities:
  102. # drop:
  103. # - ALL
  104. # readOnlyRootFilesystem: true
  105. # runAsNonRoot: true
  106. volumes: []
  107. volumeMounts: []
  108. # Optional additional annotations to add to the controller Deployment
  109. # deploymentAnnotations: {}
  110. # Optional additional annotations to add to the controller Pods
  111. # podAnnotations: {}
  112. podLabels: {}
  113. # Optional annotations to add to the controller Service
  114. # serviceAnnotations: {}
  115. # Optional additional labels to add to the controller Service
  116. # serviceLabels: {}
  117. # Optional DNS settings, useful if you have a public and private DNS zone for
  118. # the same domain on Route 53. What follows is an example of ensuring
  119. # cert-manager can access an ingress or DNS TXT records at all times.
  120. # NOTE: This requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for
  121. # the cluster to work.
  122. # podDnsPolicy: "None"
  123. # podDnsConfig:
  124. # nameservers:
  125. # - "1.1.1.1"
  126. # - "8.8.8.8"
  127. nodeSelector: {}
  128. ingressShim: {}
  129. # defaultIssuerName: ""
  130. # defaultIssuerKind: ""
  131. # defaultIssuerGroup: ""
  132. prometheus:
  133. enabled: true
  134. servicemonitor:
  135. enabled: false
  136. prometheusInstance: default
  137. targetPort: 9402
  138. path: /metrics
  139. interval: 60s
  140. scrapeTimeout: 30s
  141. labels: {}
  142. honorLabels: false
  143. # Use these variables to configure the HTTP_PROXY environment variables
  144. # http_proxy: "http://proxy:8080"
  145. # https_proxy: "https://proxy:8080"
  146. # no_proxy: 127.0.0.1,localhost
  147. # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#affinity-v1-core
  148. # for example:
  149. # affinity:
  150. # nodeAffinity:
  151. # requiredDuringSchedulingIgnoredDuringExecution:
  152. # nodeSelectorTerms:
  153. # - matchExpressions:
  154. # - key: foo.bar.com/role
  155. # operator: In
  156. # values:
  157. # - master
  158. affinity: {}
  159. # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#toleration-v1-core
  160. # for example:
  161. # tolerations:
  162. # - key: foo.bar.com/role
  163. # operator: Equal
  164. # value: master
  165. # effect: NoSchedule
  166. tolerations: []
  167. webhook:
  168. replicaCount: 1
  169. timeoutSeconds: 10
  170. # Used to configure options for the webhook pod.
  171. # This allows setting options that'd usually be provided via flags.
  172. # An APIVersion and Kind must be specified in your values.yaml file.
  173. # Flags will override options that are set here.
  174. config:
  175. # apiVersion: webhook.config.cert-manager.io/v1alpha1
  176. # kind: WebhookConfiguration
  177. # The port that the webhook should listen on for requests.
  178. # In GKE private clusters, by default kubernetes apiservers are allowed to
  179. # talk to the cluster nodes only on 443 and 10250. so configuring
  180. # securePort: 10250, will work out of the box without needing to add firewall
  181. # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000.
  182. # This should be uncommented and set as a default by the chart once we graduate
  183. # the apiVersion of WebhookConfiguration past v1alpha1.
  184. # securePort: 10250
  185. strategy: {}
  186. # type: RollingUpdate
  187. # rollingUpdate:
  188. # maxSurge: 0
  189. # maxUnavailable: 1
  190. # Pod Security Context to be set on the webhook component Pod
  191. # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
  192. securityContext:
  193. runAsNonRoot: true
  194. # Container Security Context to be set on the webhook component container
  195. # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
  196. containerSecurityContext: {}
  197. # capabilities:
  198. # drop:
  199. # - ALL
  200. # readOnlyRootFilesystem: true
  201. # runAsNonRoot: true
  202. # Optional additional annotations to add to the webhook Deployment
  203. # deploymentAnnotations: {}
  204. # Optional additional annotations to add to the webhook Pods
  205. # podAnnotations: {}
  206. # Optional additional annotations to add to the webhook Service
  207. # serviceAnnotations: {}
  208. # Optional additional annotations to add to the webhook MutatingWebhookConfiguration
  209. # mutatingWebhookConfigurationAnnotations: {}
  210. # Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
  211. # validatingWebhookConfigurationAnnotations: {}
  212. # Additional command line flags to pass to cert-manager webhook binary.
  213. # To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:<version> --help
  214. extraArgs: []
  215. # Path to a file containing a WebhookConfiguration object used to configure the webhook
  216. # - --config=<path-to-config-file>
  217. resources: {}
  218. # requests:
  219. # cpu: 10m
  220. # memory: 32Mi
  221. ## Liveness and readiness probe values
  222. ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
  223. ##
  224. livenessProbe:
  225. failureThreshold: 3
  226. initialDelaySeconds: 60
  227. periodSeconds: 10
  228. successThreshold: 1
  229. timeoutSeconds: 1
  230. readinessProbe:
  231. failureThreshold: 3
  232. initialDelaySeconds: 5
  233. periodSeconds: 5
  234. successThreshold: 1
  235. timeoutSeconds: 1
  236. nodeSelector: {}
  237. affinity: {}
  238. tolerations: []
  239. # Optional additional labels to add to the Webhook Pods
  240. podLabels: {}
  241. # Optional additional labels to add to the Webhook Service
  242. serviceLabels: {}
  243. image:
  244. repository: quay.io/jetstack/cert-manager-webhook
  245. # You can manage a registry with
  246. # registry: quay.io
  247. # repository: jetstack/cert-manager-webhook
  248. # Override the image tag to deploy by setting this variable.
  249. # If no value is set, the chart's appVersion will be used.
  250. # tag: canary
  251. # Setting a digest will override any tag
  252. # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
  253. pullPolicy: IfNotPresent
  254. serviceAccount:
  255. # Specifies whether a service account should be created
  256. create: true
  257. # The name of the service account to use.
  258. # If not set and create is true, a name is generated using the fullname template
  259. # name: ""
  260. # Optional additional annotations to add to the controller's ServiceAccount
  261. # annotations: {}
  262. # Automount API credentials for a Service Account.
  263. automountServiceAccountToken: true
  264. # The port that the webhook should listen on for requests.
  265. # In GKE private clusters, by default kubernetes apiservers are allowed to
  266. # talk to the cluster nodes only on 443 and 10250. so configuring
  267. # securePort: 10250, will work out of the box without needing to add firewall
  268. # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
  269. securePort: 10250
  270. # Specifies if the webhook should be started in hostNetwork mode.
  271. #
  272. # Required for use in some managed kubernetes clusters (such as AWS EKS) with custom
  273. # CNI (such as calico), because control-plane managed by AWS cannot communicate
  274. # with pods' IP CIDR and admission webhooks are not working
  275. #
  276. # Since the default port for the webhook conflicts with kubelet on the host
  277. # network, `webhook.securePort` should be changed to an available port if
  278. # running in hostNetwork mode.
  279. hostNetwork: false
  280. # Specifies how the service should be handled. Useful if you want to expose the
  281. # webhook to outside of the cluster. In some cases, the control plane cannot
  282. # reach internal services.
  283. serviceType: ClusterIP
  284. # loadBalancerIP:
  285. # Overrides the mutating webhook and validating webhook so they reach the webhook
  286. # service using the `url` field instead of a service.
  287. url: {}
  288. # host:
  289. cainjector:
  290. enabled: true
  291. replicaCount: 1
  292. strategy: {}
  293. # type: RollingUpdate
  294. # rollingUpdate:
  295. # maxSurge: 0
  296. # maxUnavailable: 1
  297. # Pod Security Context to be set on the cainjector component Pod
  298. # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
  299. securityContext:
  300. runAsNonRoot: true
  301. # Container Security Context to be set on the cainjector component container
  302. # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
  303. containerSecurityContext: {}
  304. # capabilities:
  305. # drop:
  306. # - ALL
  307. # readOnlyRootFilesystem: true
  308. # runAsNonRoot: true
  309. # Optional additional annotations to add to the cainjector Deployment
  310. # deploymentAnnotations: {}
  311. # Optional additional annotations to add to the cainjector Pods
  312. # podAnnotations: {}
  313. # Additional command line flags to pass to cert-manager cainjector binary.
  314. # To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:<version> --help
  315. extraArgs: []
  316. # Enable profiling for cainjector
  317. # - --enable-profiling=true
  318. resources: {}
  319. # requests:
  320. # cpu: 10m
  321. # memory: 32Mi
  322. nodeSelector: {}
  323. affinity: {}
  324. tolerations: []
  325. # Optional additional labels to add to the CA Injector Pods
  326. podLabels: {}
  327. image:
  328. repository: quay.io/jetstack/cert-manager-cainjector
  329. # You can manage a registry with
  330. # registry: quay.io
  331. # repository: jetstack/cert-manager-cainjector
  332. # Override the image tag to deploy by setting this variable.
  333. # If no value is set, the chart's appVersion will be used.
  334. # tag: canary
  335. # Setting a digest will override any tag
  336. # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
  337. pullPolicy: IfNotPresent
  338. serviceAccount:
  339. # Specifies whether a service account should be created
  340. create: true
  341. # The name of the service account to use.
  342. # If not set and create is true, a name is generated using the fullname template
  343. # name: ""
  344. # Optional additional annotations to add to the controller's ServiceAccount
  345. # annotations: {}
  346. # Automount API credentials for a Service Account.
  347. automountServiceAccountToken: true
  348. # This startupapicheck is a Helm post-install hook that waits for the webhook
  349. # endpoints to become available.
  350. # The check is implemented using a Kubernetes Job- if you are injecting mesh
  351. # sidecar proxies into cert-manager pods, you probably want to ensure that they
  352. # are not injected into this Job's pod. Otherwise the installation may time out
  353. # due to the Job never being completed because the sidecar proxy does not exit.
  354. # See https://github.com/jetstack/cert-manager/pull/4414 for context.
  355. startupapicheck:
  356. enabled: true
  357. # Pod Security Context to be set on the startupapicheck component Pod
  358. # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
  359. securityContext:
  360. runAsNonRoot: true
  361. # Timeout for 'kubectl check api' command
  362. timeout: 1m
  363. # Job backoffLimit
  364. backoffLimit: 4
  365. # Optional additional annotations to add to the startupapicheck Job
  366. jobAnnotations:
  367. helm.sh/hook: post-install
  368. helm.sh/hook-weight: "1"
  369. helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
  370. # Optional additional annotations to add to the startupapicheck Pods
  371. # podAnnotations: {}
  372. # Additional command line flags to pass to startupapicheck binary.
  373. # To see all available flags run docker run quay.io/jetstack/cert-manager-ctl:<version> --help
  374. extraArgs: []
  375. resources: {}
  376. # requests:
  377. # cpu: 10m
  378. # memory: 32Mi
  379. nodeSelector: {}
  380. affinity: {}
  381. tolerations: []
  382. # Optional additional labels to add to the startupapicheck Pods
  383. podLabels: {}
  384. image:
  385. repository: quay.io/jetstack/cert-manager-ctl
  386. # You can manage a registry with
  387. # registry: quay.io
  388. # repository: jetstack/cert-manager-ctl
  389. # Override the image tag to deploy by setting this variable.
  390. # If no value is set, the chart's appVersion will be used.
  391. # tag: canary
  392. # Setting a digest will override any tag
  393. # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
  394. pullPolicy: IfNotPresent
  395. rbac:
  396. # annotations for the startup API Check job RBAC and PSP resources
  397. annotations:
  398. helm.sh/hook: post-install
  399. helm.sh/hook-weight: "-5"
  400. helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
  401. serviceAccount:
  402. # Specifies whether a service account should be created
  403. create: true
  404. # The name of the service account to use.
  405. # If not set and create is true, a name is generated using the fullname template
  406. # name: ""
  407. # Optional additional annotations to add to the Job's ServiceAccount
  408. annotations:
  409. helm.sh/hook: post-install
  410. helm.sh/hook-weight: "-5"
  411. helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
  412. # Automount API credentials for a Service Account.
  413. automountServiceAccountToken: true