You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After deploying External Secrets Operator to one staging cluster, it was
verified that the two supported API versions, v1beta1 and v1, are present
on the cluster which avoids endless reconciliation by ArgoCD.
| certController.log | object |`{"level":"info","timeEncoding":"epoch"}`| Specifices Log Params to the Webhook|
53
+
| certController.log | object |`{"level":"info","timeEncoding":"epoch"}`| Specifices Log Params to the Certificate Controller|
54
54
| certController.metrics.listen.port | int |`8080`||
55
55
| certController.metrics.service.annotations | object |`{}`| Additional service annotations |
56
56
| certController.metrics.service.enabled | bool |`false`| Enable if you use another monitoring tool than Prometheus to scrape the metrics |
@@ -87,9 +87,10 @@ The command removes all the Kubernetes components associated with the chart and
87
87
| concurrent | int |`1`| Specifies the number of concurrent ExternalSecret Reconciles external-secret executes at a time. |
88
88
| controllerClass | string |`""`| If set external secrets will filter matching Secret Stores with the appropriate controller values. |
89
89
| crds.annotations | object |`{}`||
90
-
| crds.conversion.enabled | bool |`true`|If webhook is set to false this also needs to be set to false otherwise the kubeapi will be hammered because the conversion is looking for a webhook endpoint. |
90
+
| crds.conversion.enabled | bool |`false`|Conversion is disabled by default as we stopped supporting v1alpha1. |
91
91
| crds.createClusterExternalSecret | bool |`true`| If true, create CRDs for Cluster External Secret. |
92
92
| crds.createClusterGenerator | bool |`true`| If true, create CRDs for Cluster Generator. |
93
+
| crds.createClusterPushSecret | bool |`true`| If true, create CRDs for Cluster Push Secret. |
93
94
| crds.createClusterSecretStore | bool |`true`| If true, create CRDs for Cluster Secret Store. |
94
95
| crds.createPushSecret | bool |`true`| If true, create CRDs for Push Secret. |
95
96
| createOperator | bool |`true`| Specifies whether an external secret operator deployment be created. |
@@ -109,6 +110,10 @@ The command removes all the Kubernetes components associated with the chart and
109
110
| global.nodeSelector | object |`{}`||
110
111
| global.tolerations | list |`[]`||
111
112
| global.topologySpreadConstraints | list |`[]`||
113
+
| grafanaDashboard.annotations | object |`{}`| Annotations that ConfigMaps can have to get configured in Grafana, See: sidecar.dashboards.folderAnnotation for specifying the dashboard folder. https://github.com/grafana/helm-charts/tree/main/charts/grafana|
114
+
| grafanaDashboard.enabled | bool |`false`| If true creates a Grafana dashboard. |
115
+
| grafanaDashboard.sidecarLabel | string |`"grafana_dashboard"`| Label that ConfigMaps should have to be loaded as dashboards. |
116
+
| grafanaDashboard.sidecarLabelValue | string |`"1"`| Label value that ConfigMaps should have to be loaded as dashboards. |
112
117
| hostNetwork | bool |`false`| Run the controller on the host network |
113
118
| image.flavour | string |`""`| The flavour of tag you want to use There are different image flavours available, like distroless and ubi. Please see GitHub release notes for image tags for these flavors. By default, the distroless image is used. |
114
119
| image.pullPolicy | string |`"IfNotPresent"`||
@@ -117,23 +122,27 @@ The command removes all the Kubernetes components associated with the chart and
117
122
| imagePullSecrets | list |`[]`||
118
123
| installCRDs | bool |`true`| If set, install and upgrade CRDs through helm chart. |
119
124
| leaderElect | bool |`false`| If true, external-secrets will perform leader election between instances to ensure no more than one instance of external-secrets operates at a time. |
120
-
| log | object |`{"level":"info","timeEncoding":"epoch"}`| Specifices Log Params to the Webhook|
125
+
| log | object |`{"level":"info","timeEncoding":"epoch"}`| Specifices Log Params to the External Secrets Operator|
121
126
| metrics.listen.port | int |`8080`||
122
127
| metrics.service.annotations | object |`{}`| Additional service annotations |
123
128
| metrics.service.enabled | bool |`false`| Enable if you use another monitoring tool than Prometheus to scrape the metrics |
124
129
| metrics.service.port | int |`8080`| Metrics service port to scrape |
125
130
| nameOverride | string |`""`||
126
131
| namespaceOverride | string |`""`||
127
132
| nodeSelector | object |`{}`||
133
+
| openshiftFinalizers | bool |`true`| If true the OpenShift finalizer permissions will be added to RBAC |
128
134
| podAnnotations | object |`{}`| Annotations to add to Pod |
129
135
| podDisruptionBudget | object |`{"enabled":false,"minAvailable":1}`| Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/|
130
136
| podLabels | object |`{}`||
131
137
| podSecurityContext.enabled | bool |`true`||
132
138
| podSpecExtra | object |`{}`| Any extra pod spec on the deployment |
133
139
| priorityClassName | string |`""`| Pod priority class name. |
134
140
| processClusterExternalSecret | bool |`true`| if true, the operator will process cluster external secret. Else, it will ignore them. |
141
+
| processClusterPushSecret | bool |`true`| if true, the operator will process cluster push secret. Else, it will ignore them. |
135
142
| processClusterStore | bool |`true`| if true, the operator will process cluster store. Else, it will ignore them. |
136
143
| processPushSecret | bool |`true`| if true, the operator will process push secret. Else, it will ignore them. |
144
+
| rbac.aggregateToEdit | bool |`true`| Specifies whether permissions are aggregated to the edit ClusterRole |
145
+
| rbac.aggregateToView | bool |`true`| Specifies whether permissions are aggregated to the view ClusterRole |
137
146
| rbac.create | bool |`true`| Specifies whether role and rolebinding resources should be created. |
138
147
| rbac.servicebindings.create | bool |`true`| Specifies whether a clusterrole to give servicebindings read access should be created. |
139
148
| replicaCount | int |`1`||
@@ -166,6 +175,7 @@ The command removes all the Kubernetes components associated with the chart and
166
175
| tolerations | list |`[]`||
167
176
| topologySpreadConstraints | list |`[]`||
168
177
| webhook.affinity | object |`{}`||
178
+
| webhook.annotations | object |`{}`| Annotations to place on validating webhook configuration. |
169
179
| webhook.certCheckInterval | string |`"5m"`| Specifices the time to check if the cert is valid |
170
180
| webhook.certDir | string |`"/tmp/certs"`||
171
181
| webhook.certManager.addInjectorAnnotations | bool |`true`| Automatically add the cert-manager.io/inject-ca-from annotation to the webhooks and CRDs. As long as you have the cert-manager CA Injector enabled, this will automatically setup your webhook's CA to the one used by cert-manager. See https://cert-manager.io/docs/concepts/ca-injector|
@@ -174,8 +184,9 @@ The command removes all the Kubernetes components associated with the chart and
174
184
| webhook.certManager.cert.duration | string |`"8760h"`| Set the requested duration (i.e. lifetime) of the Certificate. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec One year by default. |
175
185
| webhook.certManager.cert.issuerRef | object |`{"group":"cert-manager.io","kind":"Issuer","name":"my-issuer"}`| For the Certificate created by this chart, setup the issuer. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.IssuerSpec|
176
186
| webhook.certManager.cert.renewBefore | string |`""`| How long before the currently issued certificate’s expiry cert-manager should renew the certificate. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec Note that renewBefore should be greater than .webhook.lookaheadInterval since the webhook will check this far in advance that the certificate is valid. |
187
+
| webhook.certManager.cert.revisionHistoryLimit | int |`0`| Set the revisionHistoryLimit on the Certificate. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec Defaults to 0 (ignored). |
177
188
| webhook.certManager.enabled | bool |`false`| Enabling cert-manager support will disable the built in secret and switch to using cert-manager (installed separately) to automatically issue and renew the webhook certificate. This chart does not install cert-manager for you, See https://cert-manager.io/docs/|
178
-
| webhook.create | bool |`true`| Specifies whether a webhook deployment be created. |
189
+
| webhook.create | bool |`true`| Specifies whether a webhook deployment be created. If set to false, crds.conversion.enabled should also be set to false otherwise the kubeapi will be hammered because the conversion is looking for a webhook endpoint. |
179
190
| webhook.deploymentAnnotations | object |`{}`| Annotations to add to Deployment |
180
191
| webhook.extraArgs | object |`{}`||
181
192
| webhook.extraEnv | list |`[]`||
@@ -217,6 +228,12 @@ The command removes all the Kubernetes components associated with the chart and
| webhook.service | object |`{"annotations":{},"enabled":true,"labels":{},"loadBalancerIP":"","type":"ClusterIP"}`| Manage the service through which the webhook is reached. |
232
+
| webhook.service.annotations | object |`{}`| Custom annotations for the webhook service. |
233
+
| webhook.service.enabled | bool |`true`| Whether the service object should be enabled or not (it is expected to exist). |
234
+
| webhook.service.labels | object |`{}`| Custom labels for the webhook service. |
235
+
| webhook.service.loadBalancerIP | string |`""`| If the webhook service type is LoadBalancer, you can assign a specific load balancer IP here. Check the documentation of your load balancer provider to see if/how this should be used. |
236
+
| webhook.service.type | string |`"ClusterIP"`| The service type of the webhook service. |
220
237
| webhook.serviceAccount.annotations | object |`{}`| Annotations to add to the service account. |
221
238
| webhook.serviceAccount.automount | bool |`true`| Automounts the service account token in all containers of the pod |
222
239
| webhook.serviceAccount.create | bool |`true`| Specifies whether a service account should be created. |
Copy file name to clipboardExpand all lines: components/external-secrets-operator/base/external-secrets/templates/cert-controller-service.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
-
{{- if and .Values.certController.create .Values.certController.metrics.service.enabled (not .Values.webhook.certManager.enabled) }}
1
+
{{- if and .Values.certController.create ( or .Values.certController.metrics.service.enabled ( and ( .Capabilities.APIVersions.Has "monitoring.coreos.com/v1" ) .Values.serviceMonitor.enabled )) (not .Values.webhook.certManager.enabled) }}
2
2
apiVersion: v1
3
3
kind: Service
4
4
metadata:
5
5
name: {{ include "external-secrets.fullname" . }}-cert-controller-metrics
0 commit comments