You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -122,6 +122,13 @@ Create required ClusterRoles and ClusterRoleBindings for cert-manager.
122
122
> ```
123
123
124
124
Aggregate ClusterRoles to Kubernetes default user-facing roles. For more information, see [User-facing roles](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles)
To use HTTP-01 ACME challenges, cert-manager needs extra permissions to create pods. If you want to avoid this added permission and disable HTTP-01 set this value.
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%). it cannot be used if `minAvailable` is set.
246
+
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%). it cannot be used if `minAvailable` is set.
240
247
241
248
242
249
#### **featureGates** ~ `string`
@@ -300,7 +307,7 @@ Override the "cert-manager.fullname" value. This value is used as part of most o
300
307
301
308
#### **nameOverride** ~ `string`
302
309
303
-
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use eg. "cainjector.name" which resolves to the value "cainjector").
310
+
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use, e.g., "cainjector.name" which resolves to the value "cainjector").
304
311
305
312
#### **serviceAccount.create** ~ `bool`
306
313
> Default value:
@@ -371,10 +378,10 @@ config:
371
378
kubernetesAPIBurst: 9000
372
379
numberOfConcurrentWorkers: 200
373
380
enableGatewayAPI: true
374
-
# Feature gates as of v1.17.0. Listed with their default values.
381
+
# Feature gates as of v1.18.0. Listed with their default values.
375
382
# See https://cert-manager.io/docs/cli/controller/
UseDomainQualifiedFinalizer: true # GA - default=true
390
397
ValidateCAA: false # ALPHA - default=false
391
398
# Configure the metrics server for TLS
392
399
# See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
@@ -425,7 +432,7 @@ Option to disable cert-manager's build-in auto-approver. The auto-approver appro
425
432
> - clusterissuers.cert-manager.io/*
426
433
> ```
427
434
428
-
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because eg. you are using approver-policy, you can enable 'disableAutoApproval'.
435
+
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
@@ -684,7 +691,7 @@ enableServiceLinks indicates whether information about services should be inject
684
691
685
692
Enable Prometheus monitoring for the cert-manager controller and webhook. If you use the Prometheus Operator, set prometheus.podmonitor.enabled or prometheus.servicemonitor.enabled, to create a PodMonitor or a
686
693
ServiceMonitor resource.
687
-
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you can not enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
694
+
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
@@ -703,13 +710,14 @@ The namespace that the service monitor should live in, defaults to the cert-mana
703
710
> ```
704
711
705
712
Specifies the `prometheus` label on the created ServiceMonitor. This is used when different Prometheus instances have label selectors matching different ServiceMonitors.
0 commit comments