You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> ☢️ This will remove all `Issuer`,`ClusterIssuer`,`Certificate`,`CertificateRequest`,`Order` and `Challenge` resources from the cluster:
66
+
>
67
+
> ```console
68
+
> kubectl delete crd \
69
+
> issuers.cert-manager.io \
70
+
> clusterissuers.cert-manager.io \
71
+
> certificates.cert-manager.io \
72
+
> certificaterequests.cert-manager.io \
73
+
> orders.acme.cert-manager.io \
74
+
> challenges.acme.cert-manager.io
75
+
> ```
70
76
71
77
## Configuration
72
78
<!-- AUTO-GENERATED -->
@@ -87,6 +93,18 @@ For example:
87
93
imagePullSecrets:
88
94
- name: "image-pull-secret"
89
95
```
96
+
#### **global.nodeSelector** ~ `object`
97
+
> Default value:
98
+
> ```yaml
99
+
> {}
100
+
> ```
101
+
102
+
Global node selector
103
+
104
+
The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. For more information, see [Assigning Pods to Nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
105
+
106
+
If a component-specific nodeSelector is also set, it will take precedence.
107
+
90
108
#### **global.commonLabels** ~ `object`
91
109
> Default value:
92
110
> ```yaml
@@ -108,6 +126,18 @@ The number of old ReplicaSets to retain to allow rollback (if not set, the defau
108
126
> ```
109
127
110
128
The optional priority class to be used for the cert-manager pods.
129
+
#### **global.hostUsers** ~ `bool`
130
+
131
+
Set all pods to run in a user namespace without host access. Experimental: may be removed once the Kubernetes User Namespaces feature is GA.
132
+
133
+
Requirements:
134
+
- Kubernetes ≥ 1.33, or
135
+
- Kubernetes 1.27–1.32 with UserNamespacesSupport feature gate enabled.
136
+
137
+
Set to false to run pods in a user namespace without host access.
138
+
139
+
See [limitations](https://kubernetes.io/docs/concepts/workloads/pods/user-namespaces/#limitations) for details.
140
+
111
141
#### **global.rbac.create** ~ `bool`
112
142
> Default value:
113
143
> ```yaml
@@ -230,13 +260,13 @@ This prevents downtime during voluntary disruptions such as during a Node upgrad
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%). it cannot be used if `minAvailable` is set.
269
+
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%). it cannot be used if `minAvailable` is set.
240
270
241
271
242
272
#### **featureGates** ~ `string`
@@ -300,7 +330,7 @@ Override the "cert-manager.fullname" value. This value is used as part of most o
300
330
301
331
#### **nameOverride** ~ `string`
302
332
303
-
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use eg. "cainjector.name" which resolves to the value "cainjector").
333
+
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use, e.g., "cainjector.name" which resolves to the value "cainjector").
304
334
305
335
#### **serviceAccount.create** ~ `bool`
306
336
> Default value:
@@ -316,7 +346,13 @@ If not set and create is true, a name is generated using the fullname template.
316
346
317
347
#### **serviceAccount.annotations** ~ `object`
318
348
319
-
Optional additional annotations to add to the controller's Service Account.
349
+
Optional additional annotations to add to the controller's Service Account. Templates are allowed for both keys and values.
# See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
380
425
metricsTLSConfig:
@@ -412,7 +457,7 @@ Option to disable cert-manager's build-in auto-approver. The auto-approver appro
412
457
> - clusterissuers.cert-manager.io/*
413
458
> ```
414
459
415
-
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because eg. you are using approver-policy, you can enable 'disableAutoApproval'.
460
+
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
@@ -671,7 +716,7 @@ enableServiceLinks indicates whether information about services should be inject
671
716
672
717
Enable Prometheus monitoring for the cert-manager controller and webhook. If you use the Prometheus Operator, set prometheus.podmonitor.enabled or prometheus.servicemonitor.enabled, to create a PodMonitor or a
673
718
ServiceMonitor resource.
674
-
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you can not enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
719
+
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
@@ -690,13 +735,14 @@ The namespace that the service monitor should live in, defaults to the cert-mana
690
735
> ```
691
736
692
737
Specifies the `prometheus` label on the created ServiceMonitor. This is used when different Prometheus instances have label selectors matching different ServiceMonitors.
0 commit comments