0a74378cf4
``` Updated: bitnami/cassandra: - 10.5.4 bitnami/postgresql: - 12.12.10 bitnami/wordpress: - 17.1.12 cert-manager/cert-manager: - v1.13.1 f5/nginx-ingress: - 1.0.0 intel/intel-device-plugins-operator: - 0.28.0 intel/intel-device-plugins-qat: - 0.28.0 intel/intel-device-plugins-sgx: - 0.28.0 jenkins/jenkins: - 4.6.5 kong/kong: - 2.28.0 linkerd/linkerd-control-plane: - 1.16.2 yugabyte/yugabyte: - 2.14.13 yugabyte/yugaware: - 2.14.13 ``` |
||
---|---|---|
.. | ||
templates | ||
Chart.yaml | ||
README.md | ||
values.yaml |
README.md
cert-manager
cert-manager is a Kubernetes addon to automate the management and issuance of TLS certificates from various issuing sources.
It will ensure certificates are valid and up to date periodically, and attempt to renew certificates at an appropriate time before expiry.
Prerequisites
- Kubernetes 1.20+
Installing the Chart
Full installation instructions, including details on how to configure extra functionality in cert-manager can be found in the installation docs.
Before installing the chart, you must first install the cert-manager CustomResourceDefinition resources. This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources.
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.1/cert-manager.crds.yaml
To install the chart with the release name my-release
:
## Add the Jetstack Helm repository
$ helm repo add jetstack https://charts.jetstack.io
## Install the cert-manager helm chart
$ helm install my-release --namespace cert-manager --version v1.13.1 jetstack/cert-manager
In order to begin issuing certificates, you will need to set up a ClusterIssuer or Issuer resource (for example, by creating a 'letsencrypt-staging' issuer).
More information on the different types of issuers and how to configure them can be found in our documentation.
For information on how to configure cert-manager to automatically provision Certificates for Ingress resources, take a look at the Securing Ingresses documentation.
Tip: List all releases using
helm list
Upgrading the Chart
Special considerations may be required when upgrading the Helm chart, and these are documented in our full upgrading guide.
Please check here before performing upgrades!
Uninstalling the Chart
To uninstall/delete the my-release
deployment:
$ helm delete my-release
The command removes all the Kubernetes components associated with the chart and deletes the release.
If you want to completely uninstall cert-manager from your cluster, you will also need to delete the previously installed CustomResourceDefinition resources:
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.1/cert-manager.crds.yaml
Configuration
The following table lists the configurable parameters of the cert-manager chart and their default values.
Parameter | Description | Default |
---|---|---|
global.imagePullSecrets |
Reference to one or more secrets to be used when pulling images | [] |
global.commonLabels |
Labels to apply to all resources | {} |
global.rbac.create |
If true , create and use RBAC resources (includes sub-charts) |
true |
global.priorityClassName |
Priority class name for cert-manager and webhook pods | "" |
global.podSecurityPolicy.enabled |
If true , create and use PodSecurityPolicy (includes sub-charts) |
false |
global.podSecurityPolicy.useAppArmor |
If true , use Apparmor seccomp profile in PSP |
true |
global.leaderElection.namespace |
Override the namespace used to store the ConfigMap for leader election | kube-system |
global.leaderElection.leaseDuration |
The duration that non-leader candidates will wait after observing a leadership renewal until attempting to acquire leadership of a led but unrenewed leader slot. This is effectively the maximum duration that a leader can be stopped before it is replaced by another candidate | |
global.leaderElection.renewDeadline |
The interval between attempts by the acting master to renew a leadership slot before it stops leading. This must be less than or equal to the lease duration | |
global.leaderElection.retryPeriod |
The duration the clients should wait between attempting acquisition and renewal of a leadership | |
installCRDs |
If true, CRD resources will be installed as part of the Helm chart. If enabled, when uninstalling CRD resources will be deleted causing all installed custom resources to be DELETED | false |
image.repository |
Image repository | quay.io/jetstack/cert-manager-controller |
image.tag |
Image tag | v1.13.1 |
image.pullPolicy |
Image pull policy | IfNotPresent |
replicaCount |
Number of cert-manager replicas | 1 |
clusterResourceNamespace |
Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod |
featureGates |
Set of comma-separated key=value pairs that describe feature gates on the controller. Some feature gates may also have to be enabled on other components, and can be set supplying the feature-gate flag to <component>.extraArgs |
`` |
extraArgs |
Optional flags for cert-manager | [] |
extraEnv |
Optional environment variables for cert-manager | [] |
serviceAccount.create |
If true , create a new service account |
true |
serviceAccount.name |
Service account to be used. If not set and serviceAccount.create is true , a name is generated using the fullname template |
|
serviceAccount.annotations |
Annotations to add to the service account | |
serviceAccount.automountServiceAccountToken |
Automount API credentials for the Service Account | true |
volumes |
Optional volumes for cert-manager | [] |
volumeMounts |
Optional volume mounts for cert-manager | [] |
resources |
CPU/memory resource requests/limits | {} |
securityContext |
Security context for the controller pod assignment | refer to Default Security Contexts |
containerSecurityContext |
Security context to be set on the controller component container | refer to Default Security Contexts |
nodeSelector |
Node labels for pod assignment | {} |
affinity |
Node affinity for pod assignment | {} |
tolerations |
Node tolerations for pod assignment | [] |
topologySpreadConstraints |
Topology spread constraints for pod assignment | [] |
livenessProbe.enabled |
Enable or disable the liveness probe for the controller container in the controller Pod. See https://cert-manager.io/docs/installation/best-practice/ to learn about when you might want to enable this livenss probe. | false |
livenessProbe.initialDelaySeconds |
The liveness probe initial delay (in seconds) | 10 |
livenessProbe.periodSeconds |
The liveness probe period (in seconds) | 10 |
livenessProbe.timeoutSeconds |
The liveness probe timeout (in seconds) | 10 |
livenessProbe.periodSeconds |
The liveness probe period (in seconds) | 10 |
livenessProbe.successThreshold |
The liveness probe success threshold | 1 |
livenessProbe.failureThreshold |
The liveness probe failure threshold | 8 |
ingressShim.defaultIssuerName |
Optional default issuer to use for ingress resources | |
ingressShim.defaultIssuerKind |
Optional default issuer kind to use for ingress resources | |
ingressShim.defaultIssuerGroup |
Optional default issuer group to use for ingress resources | |
prometheus.enabled |
Enable Prometheus monitoring | true |
prometheus.servicemonitor.enabled |
Enable Prometheus Operator ServiceMonitor monitoring | false |
prometheus.servicemonitor.namespace |
Define namespace where to deploy the ServiceMonitor resource | (namespace where you are deploying) |
prometheus.servicemonitor.prometheusInstance |
Prometheus Instance definition | default |
prometheus.servicemonitor.targetPort |
Prometheus scrape port | 9402 |
prometheus.servicemonitor.path |
Prometheus scrape path | /metrics |
prometheus.servicemonitor.interval |
Prometheus scrape interval | 60s |
prometheus.servicemonitor.labels |
Add custom labels to ServiceMonitor | |
prometheus.servicemonitor.scrapeTimeout |
Prometheus scrape timeout | 30s |
prometheus.servicemonitor.honorLabels |
Enable label honoring for metrics scraped by Prometheus (see Prometheus scrape config docs for details). By setting honorLabels to true , Prometheus will prefer label contents given by cert-manager on conflicts. Can be used to remove the "exported_namespace" label for example. |
false |
podAnnotations |
Annotations to add to the cert-manager pod | {} |
deploymentAnnotations |
Annotations to add to the cert-manager deployment | {} |
podDisruptionBudget.enabled |
Adds a PodDisruptionBudget for the cert-manager deployment | false |
podDisruptionBudget.minAvailable |
Configures the minimum available pods for voluntary disruptions. Cannot used if maxUnavailable is set. |
1 |
podDisruptionBudget.maxUnavailable |
Configures the maximum unavailable pods for voluntary disruptions. Cannot used if minAvailable is set. |
|
podDnsPolicy |
Optional cert-manager pod DNS policy | |
podDnsConfig |
Optional cert-manager pod DNS configurations | |
podLabels |
Labels to add to the cert-manager pod | {} |
serviceLabels |
Labels to add to the cert-manager controller service | {} |
serviceAnnotations |
Annotations to add to the cert-manager service | {} |
http_proxy |
Value of the HTTP_PROXY environment variable in the cert-manager pod |
|
https_proxy |
Value of the HTTPS_PROXY environment variable in the cert-manager pod |
|
no_proxy |
Value of the NO_PROXY environment variable in the cert-manager pod |
|
dns01RecursiveNameservers |
Comma separated string with host and port of the recursive nameservers cert-manager should query | `` |
dns01RecursiveNameserversOnly |
Forces cert-manager to only use the recursive nameservers for verification. | false |
enableCertificateOwnerRef |
When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted | false |
config |
ControllerConfiguration YAML used to configure flags for the controller. Generates a ConfigMap containing contents of the field. See values.yaml for example. |
{} |
enableServiceLinks |
Indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. | false |
webhook.replicaCount |
Number of cert-manager webhook replicas | 1 |
webhook.timeoutSeconds |
Seconds the API server should wait the webhook to respond before treating the call as a failure. | 10 |
webhook.podAnnotations |
Annotations to add to the webhook pods | {} |
webhook.podLabels |
Labels to add to the cert-manager webhook pod | {} |
webhook.serviceLabels |
Labels to add to the cert-manager webhook service | {} |
webhook.deploymentAnnotations |
Annotations to add to the webhook deployment | {} |
webhook.podDisruptionBudget.enabled |
Adds a PodDisruptionBudget for the cert-manager deployment | false |
webhook.podDisruptionBudget.minAvailable |
Configures the minimum available pods for voluntary disruptions. Cannot used if maxUnavailable is set. |
1 |
webhook.podDisruptionBudget.maxUnavailable |
Configures the maximum unavailable pods for voluntary disruptions. Cannot used if minAvailable is set. |
|
webhook.mutatingWebhookConfigurationAnnotations |
Annotations to add to the mutating webhook configuration | {} |
webhook.validatingWebhookConfigurationAnnotations |
Annotations to add to the validating webhook configuration | {} |
webhook.serviceAnnotations |
Annotations to add to the webhook service | {} |
webhook.config |
WebhookConfiguration YAML used to configure flags for the webhook. Generates a ConfigMap containing contents of the field. See values.yaml for example. |
{} |
webhook.extraArgs |
Optional flags for cert-manager webhook component | [] |
webhook.serviceAccount.create |
If true , create a new service account for the webhook component |
true |
webhook.serviceAccount.name |
Service account for the webhook component to be used. If not set and webhook.serviceAccount.create is true , a name is generated using the fullname template |
|
webhook.serviceAccount.annotations |
Annotations to add to the service account for the webhook component | |
webhook.serviceAccount.automountServiceAccountToken |
Automount API credentials for the webhook Service Account | |
webhook.resources |
CPU/memory resource requests/limits for the webhook pods | {} |
webhook.nodeSelector |
Node labels for webhook pod assignment | {} |
webhook.networkPolicy.enabled |
Enable default network policies for webhooks egress and ingress traffic | false |
webhook.networkPolicy.ingress |
Sets ingress policy block. See NetworkPolicy documentation. See values.yaml for example. |
{} |
webhook.networkPolicy.egress |
Sets ingress policy block. See NetworkPolicy documentation. See values.yaml for example. |
{} |
webhook.affinity |
Node affinity for webhook pod assignment | {} |
webhook.tolerations |
Node tolerations for webhook pod assignment | [] |
webhook.topologySpreadConstraints |
Topology spread constraints for webhook pod assignment | [] |
webhook.image.repository |
Webhook image repository | quay.io/jetstack/cert-manager-webhook |
webhook.image.tag |
Webhook image tag | v1.13.1 |
webhook.image.pullPolicy |
Webhook image pull policy | IfNotPresent |
webhook.securePort |
The port that the webhook should listen on for requests. | 10250 |
webhook.securityContext |
Security context for webhook pod assignment | refer to Default Security Contexts |
webhook.containerSecurityContext |
Security context to be set on the webhook component container | refer to Default Security Contexts |
webhook.hostNetwork |
If true , run the Webhook on the host network. |
false |
webhook.serviceType |
The type of the Service . |
ClusterIP |
webhook.loadBalancerIP |
The specific load balancer IP to use (when serviceType is LoadBalancer ). |
|
webhook.url.host |
The host to use to reach the webhook, instead of using internal cluster DNS for the service. | |
webhook.livenessProbe.failureThreshold |
The liveness probe failure threshold | 3 |
webhook.livenessProbe.initialDelaySeconds |
The liveness probe initial delay (in seconds) | 60 |
webhook.livenessProbe.periodSeconds |
The liveness probe period (in seconds) | 10 |
webhook.livenessProbe.successThreshold |
The liveness probe success threshold | 1 |
webhook.livenessProbe.timeoutSeconds |
The liveness probe timeout (in seconds) | 1 |
webhook.readinessProbe.failureThreshold |
The readiness probe failure threshold | 3 |
webhook.readinessProbe.initialDelaySeconds |
The readiness probe initial delay (in seconds) | 5 |
webhook.readinessProbe.periodSeconds |
The readiness probe period (in seconds) | 5 |
webhook.readinessProbe.successThreshold |
The readiness probe success threshold | 1 |
webhook.readinessProbe.timeoutSeconds |
The readiness probe timeout (in seconds) | 1 |
webhook.enableServiceLinks |
Indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. | false |
cainjector.enabled |
Toggles whether the cainjector component should be installed (required for the webhook component to work) | true |
cainjector.replicaCount |
Number of cert-manager cainjector replicas | 1 |
cainjector.podAnnotations |
Annotations to add to the cainjector pods | {} |
cainjector.podLabels |
Labels to add to the cert-manager cainjector pod | {} |
cainjector.deploymentAnnotations |
Annotations to add to the cainjector deployment | {} |
cainjector.podDisruptionBudget.enabled |
Adds a PodDisruptionBudget for the cert-manager deployment | false |
cainjector.podDisruptionBudget.minAvailable |
Configures the minimum available pods for voluntary disruptions. Cannot used if maxUnavailable is set. |
1 |
cainjector.podDisruptionBudget.maxUnavailable |
Configures the maximum unavailable pods for voluntary disruptions. Cannot used if minAvailable is set. |
|
cainjector.extraArgs |
Optional flags for cert-manager cainjector component | [] |
cainjector.serviceAccount.create |
If true , create a new service account for the cainjector component |
true |
cainjector.serviceAccount.name |
Service account for the cainjector component to be used. If not set and cainjector.serviceAccount.create is true , a name is generated using the fullname template |
|
cainjector.serviceAccount.annotations |
Annotations to add to the service account for the cainjector component | |
cainjector.serviceAccount.automountServiceAccountToken |
Automount API credentials for the cainjector Service Account | true |
cainjector.resources |
CPU/memory resource requests/limits for the cainjector pods | {} |
cainjector.nodeSelector |
Node labels for cainjector pod assignment | {} |
cainjector.affinity |
Node affinity for cainjector pod assignment | {} |
cainjector.tolerations |
Node tolerations for cainjector pod assignment | [] |
cainjector.topologySpreadConstraints |
Topology spread constraints for cainjector pod assignment | [] |
cainjector.image.repository |
cainjector image repository | quay.io/jetstack/cert-manager-cainjector |
cainjector.image.tag |
cainjector image tag | v1.13.1 |
cainjector.image.pullPolicy |
cainjector image pull policy | IfNotPresent |
cainjector.securityContext |
Security context for cainjector pod assignment | refer to Default Security Contexts |
cainjector.containerSecurityContext |
Security context to be set on cainjector component container | refer to Default Security Contexts |
cainjector.enableServiceLinks |
Indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. | false |
acmesolver.image.repository |
acmesolver image repository | quay.io/jetstack/cert-manager-acmesolver |
acmesolver.image.tag |
acmesolver image tag | v1.13.1 |
acmesolver.image.pullPolicy |
acmesolver image pull policy | IfNotPresent |
startupapicheck.enabled |
Toggles whether the startupapicheck Job should be installed | true |
startupapicheck.securityContext |
Security context for startupapicheck pod assignment | refer to Default Security Contexts |
startupapicheck.containerSecurityContext |
Security context to be set on startupapicheck component container | refer to Default Security Contexts |
startupapicheck.timeout |
Timeout for 'kubectl check api' command | 1m |
startupapicheck.backoffLimit |
Job backoffLimit | 4 |
startupapicheck.jobAnnotations |
Optional additional annotations to add to the startupapicheck Job | {} |
startupapicheck.podAnnotations |
Optional additional annotations to add to the startupapicheck Pods | {} |
startupapicheck.extraArgs |
Optional additional arguments for startupapicheck | [] |
startupapicheck.resources |
CPU/memory resource requests/limits for the startupapicheck pod | {} |
startupapicheck.nodeSelector |
Node labels for startupapicheck pod assignment | {} |
startupapicheck.affinity |
Node affinity for startupapicheck pod assignment | {} |
startupapicheck.tolerations |
Node tolerations for startupapicheck pod assignment | [] |
startupapicheck.podLabels |
Optional additional labels to add to the startupapicheck Pods | {} |
startupapicheck.image.repository |
startupapicheck image repository | quay.io/jetstack/cert-manager-ctl |
startupapicheck.image.tag |
startupapicheck image tag | v1.13.1 |
startupapicheck.image.pullPolicy |
startupapicheck image pull policy | IfNotPresent |
startupapicheck.serviceAccount.create |
If true , create a new service account for the startupapicheck component |
true |
startupapicheck.serviceAccount.name |
Service account for the startupapicheck component to be used. If not set and startupapicheck.serviceAccount.create is true , a name is generated using the fullname template |
|
startupapicheck.serviceAccount.annotations |
Annotations to add to the service account for the startupapicheck component | |
startupapicheck.serviceAccount.automountServiceAccountToken |
Automount API credentials for the startupapicheck Service Account | true |
startupapicheck.enableServiceLinks |
Indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. | false |
maxConcurrentChallenges |
The maximum number of challenges that can be scheduled as 'processing' at once | 60 |
Default Security Contexts
The default pod-level and container-level security contexts, below, adhere to the restricted Pod Security Standards policies.
Default pod-level securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
Default containerSecurityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
Assigning Values
Specify each parameter using the --set key=value[,key=value]
argument to helm install
.
Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. For example,
$ helm install my-release -f values.yaml .
Tip: You can use the default values.yaml
Contributing
This chart is maintained at github.com/cert-manager/cert-manager.