You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: charts/scalardb-cluster/README.md
+14-3
Original file line number
Diff line number
Diff line change
@@ -65,9 +65,20 @@ Current chart version is `2.0.0-SNAPSHOT`
65
65
| scalardbCluster.strategy.rollingUpdate.maxSurge | string |`"25%"`| The number of pods that can be created above the desired amount of pods during an update |
66
66
| scalardbCluster.strategy.rollingUpdate.maxUnavailable | string |`"25%"`| The number of pods that can be unavailable during the update process |
67
67
| scalardbCluster.strategy.type | string |`"RollingUpdate"`| New pods are added gradually, and old pods are terminated gradually, e.g: Recreate or RollingUpdate |
68
-
| scalardbCluster.tls.caRootCertSecret | string |`""`| Name of the Secret containing the custom CA root certificate for TLS communication. |
69
-
| scalardbCluster.tls.certChainSecret | string |`""`| Name of the Secret containing the certificate chain file used for TLS communication. |
68
+
| scalardbCluster.tls.caRootCertSecret | string |`""`| Name of the Secret containing the custom CA root certificate for TLS communication. |
69
+
| scalardbCluster.tls.certChainSecret | string |`""`| Name of the Secret containing the certificate chain file used for TLS communication. |
70
+
| scalardbCluster.tls.certManager.dnsNames | list |`["localhost"]`| Subject Alternative Name (SAN) of a certificate. |
71
+
| scalardbCluster.tls.certManager.duration | string |`"8760h0m0s"`| Duration of a certificate. |
72
+
| scalardbCluster.tls.certManager.enabled | bool |`false`| Use cert-manager to manage private key and certificate files. |
73
+
| scalardbCluster.tls.certManager.issuerRef | object |`{}`| Issuer references of cert-manager. |
74
+
| scalardbCluster.tls.certManager.privateKey | object |`{"algorithm":"ECDSA","encoding":"PKCS1","size":256}`| Configuration of a private key. |
75
+
| scalardbCluster.tls.certManager.renewBefore | string |`"360h0m0s"`| How long before expiry a certificate should be renewed. |
76
+
| scalardbCluster.tls.certManager.selfSigned | object |`{"caRootCert":{"duration":"8760h0m0s","renewBefore":"360h0m0s"},"enabled":false}`| Configuration of a certificate for self-signed CA. |
77
+
| scalardbCluster.tls.certManager.selfSigned.caRootCert.duration | string |`"8760h0m0s"`| Duration of a self-signed CA certificate. |
78
+
| scalardbCluster.tls.certManager.selfSigned.caRootCert.renewBefore | string |`"360h0m0s"`| How long before expiry a self-signed CA certificate should be renewed. |
79
+
| scalardbCluster.tls.certManager.selfSigned.enabled | bool |`false`| Use self-signed CA. |
80
+
| scalardbCluster.tls.certManager.usages | list |`["server auth","key encipherment","signing"]`| List of key usages. |
70
81
| scalardbCluster.tls.enabled | bool |`false`| Enable TLS. You need to enable TLS when you use wire encryption feature of ScalarDB Cluster. |
71
82
| scalardbCluster.tls.overrideAuthority | string |`""`| The custom authority for TLS communication. This doesn't change what host is actually connected. This is intended for testing, but may safely be used outside of tests as an alternative to DNS overrides. For example, you can specify the hostname presented in the certificate chain file that you set by using `scalardbCluster.tls.certChainSecret`. This chart uses this value for startupProbe and livenessProbe. |
72
-
| scalardbCluster.tls.privateKeySecret | string |`""`| Name of the Secret containing the private key file used for TLS communication. |
83
+
| scalardbCluster.tls.privateKeySecret | string |`""`| Name of the Secret containing the private key file used for TLS communication. |
73
84
| scalardbCluster.tolerations | list |`[]`| Tolerations are applied to pods, and allow (but do not require) the pods to schedule onto nodes with matching taints. |
Copy file name to clipboardexpand all lines: charts/scalardb-cluster/values.yaml
+34-3
Original file line number
Diff line number
Diff line change
@@ -278,9 +278,40 @@ scalardbCluster:
278
278
enabled: false
279
279
# -- The custom authority for TLS communication. This doesn't change what host is actually connected. This is intended for testing, but may safely be used outside of tests as an alternative to DNS overrides. For example, you can specify the hostname presented in the certificate chain file that you set by using `scalardbCluster.tls.certChainSecret`. This chart uses this value for startupProbe and livenessProbe.
280
280
overrideAuthority: ""
281
-
# -- Name of the Secret containing the custom CA root certificate for TLS communication.
281
+
# -- Name of the Secret containing the custom CA root certificate for TLS communication.
282
282
caRootCertSecret: ""
283
-
# -- Name of the Secret containing the certificate chain file used for TLS communication.
283
+
# -- Name of the Secret containing the certificate chain file used for TLS communication.
284
284
certChainSecret: ""
285
-
# -- Name of the Secret containing the private key file used for TLS communication.
285
+
# -- Name of the Secret containing the private key file used for TLS communication.
286
286
privateKeySecret: ""
287
+
certManager:
288
+
# -- Use cert-manager to manage private key and certificate files.
289
+
enabled: false
290
+
# -- Configuration of a certificate for self-signed CA.
291
+
selfSigned:
292
+
# -- Use self-signed CA.
293
+
enabled: false
294
+
caRootCert:
295
+
# -- Duration of a self-signed CA certificate.
296
+
duration: "8760h0m0s"
297
+
# -- How long before expiry a self-signed CA certificate should be renewed.
298
+
renewBefore: "360h0m0s"
299
+
# -- Duration of a certificate.
300
+
duration: "8760h0m0s"
301
+
# -- How long before expiry a certificate should be renewed.
302
+
renewBefore: "360h0m0s"
303
+
# -- Configuration of a private key.
304
+
privateKey:
305
+
algorithm: ECDSA
306
+
encoding: PKCS1
307
+
size: 256
308
+
# -- List of key usages.
309
+
usages:
310
+
- server auth
311
+
- key encipherment
312
+
- signing
313
+
# -- Subject Alternative Name (SAN) of a certificate.
0 commit comments