You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: apps.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -22,8 +22,8 @@ appsInfo:
22
22
about: Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes.
23
23
integration: Argo CD is configured by APL to use the SSO provided by keycloak, and maps APL groups to Argo CD roles. The otomi-admin role is made super admin within Argo CD. The team-admin role has access to Argo CD and is admin of all team projects. Members of team roles are only allowed to administer their own projects. All Teams will automatically get access to a Git repo, and Argo CD is configured to listen to this repo. All a team has to do is to fill their repo with intended state, commit, and automation takes care of the rest.
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%). it cannot be used if `minAvailable` is set.
239
+
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%). it cannot be used if `minAvailable` is set.
240
240
241
241
242
242
#### **featureGates** ~ `string`
@@ -300,7 +300,7 @@ Override the "cert-manager.fullname" value. This value is used as part of most o
300
300
301
301
#### **nameOverride** ~ `string`
302
302
303
-
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use eg. "cainjector.name" which resolves to the value "cainjector").
303
+
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use, e.g., "cainjector.name" which resolves to the value "cainjector").
304
304
305
305
#### **serviceAccount.create** ~ `bool`
306
306
> Default value:
@@ -371,10 +371,10 @@ config:
371
371
kubernetesAPIBurst: 9000
372
372
numberOfConcurrentWorkers: 200
373
373
enableGatewayAPI: true
374
-
# Feature gates as of v1.17.0. Listed with their default values.
374
+
# Feature gates as of v1.18.1. Listed with their default values.
375
375
# See https://cert-manager.io/docs/cli/controller/
# See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
393
395
metricsTLSConfig:
@@ -425,7 +427,7 @@ Option to disable cert-manager's build-in auto-approver. The auto-approver appro
425
427
> - clusterissuers.cert-manager.io/*
426
428
> ```
427
429
428
-
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because eg. you are using approver-policy, you can enable 'disableAutoApproval'.
430
+
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
@@ -684,7 +686,7 @@ enableServiceLinks indicates whether information about services should be inject
684
686
685
687
Enable Prometheus monitoring for the cert-manager controller and webhook. If you use the Prometheus Operator, set prometheus.podmonitor.enabled or prometheus.servicemonitor.enabled, to create a PodMonitor or a
686
688
ServiceMonitor resource.
687
-
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you can not enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
689
+
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
@@ -703,13 +705,14 @@ The namespace that the service monitor should live in, defaults to the cert-mana
703
705
> ```
704
706
705
707
Specifies the `prometheus` label on the created ServiceMonitor. This is used when different Prometheus instances have label selectors matching different ServiceMonitors.
0 commit comments