Skip to content

Latest commit

 

History

History
44 lines (39 loc) · 3.65 KB

File metadata and controls

44 lines (39 loc) · 3.65 KB

stackit-cert-manager-webhook

Version: 0.4.1 AppVersion: v0.4.1

A Helm chart for stackitcloud/stackit-cert-manager-webhook

Values

Key Type Default Description
additionalVolumeMounts list []
additionalVolumes list []
affinity object {}
certManager object {"namespace":"cert-manager","serviceAccountName":"cert-manager"} Meta information of the cert-manager itself.
certManager.namespace string "cert-manager" namespace where the webhook should be installed. Cert-Manager and the webhook should be in the same namespace.
certManager.serviceAccountName string "cert-manager" service account name for the cert-manager.
extraEnv list [] delete the next line and add your variables as in the commented example below.
fullnameOverride string "" Fullname override of the webhook.
groupName string "acme.stackit.de" The GroupName here is used to identify your company or business unit that created this webhook. Therefore, it should be acme.stackit.de.
image object {"pullPolicy":"IfNotPresent","repository":"ghcr.io/stackitcloud/stackit-cert-manager-webhook","tag":""} Image information for the webhook.
image.pullPolicy string "IfNotPresent" pull policy of the image.
image.repository string "ghcr.io/stackitcloud/stackit-cert-manager-webhook" repository of the image.
imagePullSecrets list []
nameOverride string "" Webhook configuration.
nodeSelector object {} Node selector for the webhook.
podSecurityContext.runAsGroup int 1000
podSecurityContext.runAsNonRoot bool true
podSecurityContext.runAsUser int 1000
podSecurityContext.seccompProfile.type string "RuntimeDefault"
replicaCount int 1 Replicas for the webhook. Since it is a stateless application server that sends requests you can increase the number as you want. Most of the time however, 1 replica is enough.
resources object {} Kubernetes resources for the webhook. Usually limits.cpu=100m, limits.memory=128Mi, requests.cpu=100m, requests.memory=128Mi is enough for the webhook.
securityContext.allowPrivilegeEscalation bool false
securityContext.capabilities.drop[0] string "ALL"
securityContext.seccompProfile.type string "RuntimeDefault"
service object {"port":443,"type":"ClusterIP"} Configuration for the webhook service.
service.port int 443 port of the service.
service.type string "ClusterIP" type of the service.
stackitSaAuthentication object {"enabled":false,"fileName":"sa.json","mountPath":"/var/run/secrets/stackit","secretName":"stackit-sa-authentication"} Configuration for the stackit service account keys.
stackitSaAuthentication.enabled bool false enabled flag for the stackit service account keys.
stackitSaAuthentication.fileName string "sa.json" key of the service account key in the secret. Which will be later be used to load in keys in the pod as well.
stackitSaAuthentication.mountPath string "/var/run/secrets/stackit" Path where the secret will be mounted in the pod.
stackitSaAuthentication.secretName string "stackit-sa-authentication" secret where the service account key is stored. Should be in the same namespace as the webhook since it will be mounted into the pod.
tolerations list [] Tolerations for the webhook.