| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516 |
- # Default values for cert-manager.
- # This is a YAML-formatted file.
- # Declare variables to be passed into your templates.
- global:
- ## Reference to one or more secrets to be used when pulling images
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
- ##
- imagePullSecrets: []
- # - name: "image-pull-secret"
- # Optional priority class to be used for the cert-manager pods
- priorityClassName: ""
- rbac:
- create: true
- podSecurityPolicy:
- enabled: false
- useAppArmor: true
- # Set the verbosity of cert-manager. Range of 0 - 6 with 6 being the most verbose.
- logLevel: 2
- leaderElection:
- # Override the namespace used to store the ConfigMap for leader election
- namespace: "kube-system"
- # The duration that non-leader candidates will wait after observing a
- # leadership renewal until attempting to acquire leadership of a led but
- # unrenewed leader slot. This is effectively the maximum duration that a
- # leader can be stopped before it is replaced by another candidate.
- # leaseDuration: 60s
- # The interval between attempts by the acting master to renew a leadership
- # slot before it stops leading. This must be less than or equal to the
- # lease duration.
- # renewDeadline: 40s
- # The duration the clients should wait between attempting acquisition and
- # renewal of a leadership.
- # retryPeriod: 15s
- installCRDs: false
- replicaCount: 1
- strategy: {}
- # type: RollingUpdate
- # rollingUpdate:
- # maxSurge: 0
- # maxUnavailable: 1
- # Comma separated list of feature gates that should be enabled on the
- # controller pod.
- featureGates: ""
- image:
- repository: quay.io/jetstack/cert-manager-controller
- # You can manage a registry with
- # registry: quay.io
- # repository: jetstack/cert-manager-controller
- # Override the image tag to deploy by setting this variable.
- # If no value is set, the chart's appVersion will be used.
- # tag: canary
- # Setting a digest will override any tag
- # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
- pullPolicy: IfNotPresent
- # Override the namespace used to store DNS provider credentials etc. for ClusterIssuer
- # resources. By default, the same namespace as cert-manager is deployed within is
- # used. This namespace will not be automatically created by the Helm chart.
- clusterResourceNamespace: ""
- serviceAccount:
- # Specifies whether a service account should be created
- create: true
- # The name of the service account to use.
- # If not set and create is true, a name is generated using the fullname template
- # name: ""
- # Optional additional annotations to add to the controller's ServiceAccount
- # annotations: {}
- # Automount API credentials for a Service Account.
- automountServiceAccountToken: true
- # Additional command line flags to pass to cert-manager controller binary.
- # To see all available flags run docker run quay.io/jetstack/cert-manager-controller:<version> --help
- extraArgs: []
- # When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted
- # - --enable-certificate-owner-ref=true
- # Use this flag to enabled or disable arbitrary controllers, for example, disable the CertificiateRequests approver
- # - --controllers=*,-certificaterequests-approver
- extraEnv: []
- # - name: SOME_VAR
- # value: 'some value'
- resources: {}
- # requests:
- # cpu: 10m
- # memory: 32Mi
- # Pod Security Context
- # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- securityContext:
- runAsNonRoot: true
- # legacy securityContext parameter format: if enabled is set to true, only fsGroup and runAsUser are supported
- # securityContext:
- # enabled: false
- # fsGroup: 1001
- # runAsUser: 1001
- # to support additional securityContext parameters, omit the `enabled` parameter and simply specify the parameters
- # you want to set, e.g.
- # securityContext:
- # fsGroup: 1000
- # runAsUser: 1000
- # runAsNonRoot: true
- # Container Security Context to be set on the controller component container
- # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- containerSecurityContext: {}
- # capabilities:
- # drop:
- # - ALL
- # readOnlyRootFilesystem: true
- # runAsNonRoot: true
- volumes: []
- volumeMounts: []
- # Optional additional annotations to add to the controller Deployment
- # deploymentAnnotations: {}
- # Optional additional annotations to add to the controller Pods
- # podAnnotations: {}
- podLabels: {}
- # Optional annotations to add to the controller Service
- # serviceAnnotations: {}
- # Optional additional labels to add to the controller Service
- # serviceLabels: {}
- # Optional DNS settings, useful if you have a public and private DNS zone for
- # the same domain on Route 53. What follows is an example of ensuring
- # cert-manager can access an ingress or DNS TXT records at all times.
- # NOTE: This requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for
- # the cluster to work.
- # podDnsPolicy: "None"
- # podDnsConfig:
- # nameservers:
- # - "1.1.1.1"
- # - "8.8.8.8"
- nodeSelector: {}
- ingressShim: {}
- # defaultIssuerName: ""
- # defaultIssuerKind: ""
- # defaultIssuerGroup: ""
- prometheus:
- enabled: true
- servicemonitor:
- enabled: false
- prometheusInstance: default
- targetPort: 9402
- path: /metrics
- interval: 60s
- scrapeTimeout: 30s
- labels: {}
- honorLabels: false
- # Use these variables to configure the HTTP_PROXY environment variables
- # http_proxy: "http://proxy:8080"
- # https_proxy: "https://proxy:8080"
- # no_proxy: 127.0.0.1,localhost
- # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#affinity-v1-core
- # for example:
- # affinity:
- # nodeAffinity:
- # requiredDuringSchedulingIgnoredDuringExecution:
- # nodeSelectorTerms:
- # - matchExpressions:
- # - key: foo.bar.com/role
- # operator: In
- # values:
- # - master
- affinity: {}
- # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#toleration-v1-core
- # for example:
- # tolerations:
- # - key: foo.bar.com/role
- # operator: Equal
- # value: master
- # effect: NoSchedule
- tolerations: []
- webhook:
- replicaCount: 1
- timeoutSeconds: 10
- # Used to configure options for the webhook pod.
- # This allows setting options that'd usually be provided via flags.
- # An APIVersion and Kind must be specified in your values.yaml file.
- # Flags will override options that are set here.
- config:
- # apiVersion: webhook.config.cert-manager.io/v1alpha1
- # kind: WebhookConfiguration
- # The port that the webhook should listen on for requests.
- # In GKE private clusters, by default kubernetes apiservers are allowed to
- # talk to the cluster nodes only on 443 and 10250. so configuring
- # securePort: 10250, will work out of the box without needing to add firewall
- # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000.
- # This should be uncommented and set as a default by the chart once we graduate
- # the apiVersion of WebhookConfiguration past v1alpha1.
- # securePort: 10250
- strategy: {}
- # type: RollingUpdate
- # rollingUpdate:
- # maxSurge: 0
- # maxUnavailable: 1
- # Pod Security Context to be set on the webhook component Pod
- # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- securityContext:
- runAsNonRoot: true
- # Container Security Context to be set on the webhook component container
- # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- containerSecurityContext: {}
- # capabilities:
- # drop:
- # - ALL
- # readOnlyRootFilesystem: true
- # runAsNonRoot: true
- # Optional additional annotations to add to the webhook Deployment
- # deploymentAnnotations: {}
- # Optional additional annotations to add to the webhook Pods
- # podAnnotations: {}
- # Optional additional annotations to add to the webhook Service
- # serviceAnnotations: {}
- # Optional additional annotations to add to the webhook MutatingWebhookConfiguration
- # mutatingWebhookConfigurationAnnotations: {}
- # Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
- # validatingWebhookConfigurationAnnotations: {}
- # Additional command line flags to pass to cert-manager webhook binary.
- # To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:<version> --help
- extraArgs: []
- # Path to a file containing a WebhookConfiguration object used to configure the webhook
- # - --config=<path-to-config-file>
- resources: {}
- # requests:
- # cpu: 10m
- # memory: 32Mi
- ## Liveness and readiness probe values
- ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
- ##
- livenessProbe:
- failureThreshold: 3
- initialDelaySeconds: 60
- periodSeconds: 10
- successThreshold: 1
- timeoutSeconds: 1
- readinessProbe:
- failureThreshold: 3
- initialDelaySeconds: 5
- periodSeconds: 5
- successThreshold: 1
- timeoutSeconds: 1
- nodeSelector: {}
- affinity: {}
- tolerations: []
- # Optional additional labels to add to the Webhook Pods
- podLabels: {}
- # Optional additional labels to add to the Webhook Service
- serviceLabels: {}
- image:
- repository: quay.io/jetstack/cert-manager-webhook
- # You can manage a registry with
- # registry: quay.io
- # repository: jetstack/cert-manager-webhook
- # Override the image tag to deploy by setting this variable.
- # If no value is set, the chart's appVersion will be used.
- # tag: canary
- # Setting a digest will override any tag
- # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
- pullPolicy: IfNotPresent
- serviceAccount:
- # Specifies whether a service account should be created
- create: true
- # The name of the service account to use.
- # If not set and create is true, a name is generated using the fullname template
- # name: ""
- # Optional additional annotations to add to the controller's ServiceAccount
- # annotations: {}
- # Automount API credentials for a Service Account.
- automountServiceAccountToken: true
- # The port that the webhook should listen on for requests.
- # In GKE private clusters, by default kubernetes apiservers are allowed to
- # talk to the cluster nodes only on 443 and 10250. so configuring
- # securePort: 10250, will work out of the box without needing to add firewall
- # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
- securePort: 10250
- # Specifies if the webhook should be started in hostNetwork mode.
- #
- # Required for use in some managed kubernetes clusters (such as AWS EKS) with custom
- # CNI (such as calico), because control-plane managed by AWS cannot communicate
- # with pods' IP CIDR and admission webhooks are not working
- #
- # Since the default port for the webhook conflicts with kubelet on the host
- # network, `webhook.securePort` should be changed to an available port if
- # running in hostNetwork mode.
- hostNetwork: false
- # Specifies how the service should be handled. Useful if you want to expose the
- # webhook to outside of the cluster. In some cases, the control plane cannot
- # reach internal services.
- serviceType: ClusterIP
- # loadBalancerIP:
- # Overrides the mutating webhook and validating webhook so they reach the webhook
- # service using the `url` field instead of a service.
- url: {}
- # host:
- cainjector:
- enabled: true
- replicaCount: 1
- strategy: {}
- # type: RollingUpdate
- # rollingUpdate:
- # maxSurge: 0
- # maxUnavailable: 1
- # Pod Security Context to be set on the cainjector component Pod
- # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- securityContext:
- runAsNonRoot: true
- # Container Security Context to be set on the cainjector component container
- # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- containerSecurityContext: {}
- # capabilities:
- # drop:
- # - ALL
- # readOnlyRootFilesystem: true
- # runAsNonRoot: true
- # Optional additional annotations to add to the cainjector Deployment
- # deploymentAnnotations: {}
- # Optional additional annotations to add to the cainjector Pods
- # podAnnotations: {}
- # Additional command line flags to pass to cert-manager cainjector binary.
- # To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:<version> --help
- extraArgs: []
- # Enable profiling for cainjector
- # - --enable-profiling=true
- resources: {}
- # requests:
- # cpu: 10m
- # memory: 32Mi
- nodeSelector: {}
- affinity: {}
- tolerations: []
- # Optional additional labels to add to the CA Injector Pods
- podLabels: {}
- image:
- repository: quay.io/jetstack/cert-manager-cainjector
- # You can manage a registry with
- # registry: quay.io
- # repository: jetstack/cert-manager-cainjector
- # Override the image tag to deploy by setting this variable.
- # If no value is set, the chart's appVersion will be used.
- # tag: canary
- # Setting a digest will override any tag
- # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
- pullPolicy: IfNotPresent
- serviceAccount:
- # Specifies whether a service account should be created
- create: true
- # The name of the service account to use.
- # If not set and create is true, a name is generated using the fullname template
- # name: ""
- # Optional additional annotations to add to the controller's ServiceAccount
- # annotations: {}
- # Automount API credentials for a Service Account.
- automountServiceAccountToken: true
- # This startupapicheck is a Helm post-install hook that waits for the webhook
- # endpoints to become available.
- # The check is implemented using a Kubernetes Job- if you are injecting mesh
- # sidecar proxies into cert-manager pods, you probably want to ensure that they
- # are not injected into this Job's pod. Otherwise the installation may time out
- # due to the Job never being completed because the sidecar proxy does not exit.
- # See https://github.com/jetstack/cert-manager/pull/4414 for context.
- startupapicheck:
- enabled: true
- # Pod Security Context to be set on the startupapicheck component Pod
- # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- securityContext:
- runAsNonRoot: true
- # Timeout for 'kubectl check api' command
- timeout: 1m
- # Job backoffLimit
- backoffLimit: 4
- # Optional additional annotations to add to the startupapicheck Job
- jobAnnotations:
- helm.sh/hook: post-install
- helm.sh/hook-weight: "1"
- helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
- # Optional additional annotations to add to the startupapicheck Pods
- # podAnnotations: {}
- # Additional command line flags to pass to startupapicheck binary.
- # To see all available flags run docker run quay.io/jetstack/cert-manager-ctl:<version> --help
- extraArgs: []
- resources: {}
- # requests:
- # cpu: 10m
- # memory: 32Mi
- nodeSelector: {}
- affinity: {}
- tolerations: []
- # Optional additional labels to add to the startupapicheck Pods
- podLabels: {}
- image:
- repository: quay.io/jetstack/cert-manager-ctl
- # You can manage a registry with
- # registry: quay.io
- # repository: jetstack/cert-manager-ctl
- # Override the image tag to deploy by setting this variable.
- # If no value is set, the chart's appVersion will be used.
- # tag: canary
- # Setting a digest will override any tag
- # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
- pullPolicy: IfNotPresent
- rbac:
- # annotations for the startup API Check job RBAC and PSP resources
- annotations:
- helm.sh/hook: post-install
- helm.sh/hook-weight: "-5"
- helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
- serviceAccount:
- # Specifies whether a service account should be created
- create: true
- # The name of the service account to use.
- # If not set and create is true, a name is generated using the fullname template
- # name: ""
- # Optional additional annotations to add to the Job's ServiceAccount
- annotations:
- helm.sh/hook: post-install
- helm.sh/hook-weight: "-5"
- helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
- # Automount API credentials for a Service Account.
- automountServiceAccountToken: true
|