You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -165,7 +165,7 @@ Create the runtime-configuration ConfigMap.
165
165
166
166
Name of a ConfigMap in the installation namespace to watch, providing runtime configuration of an issuer to use.
167
167
168
-
If create is set to true then this name is used to create the ConfigMap, otherwise the ConfigMap must exist and the "issuer-name", "issuer-kind" and "issuer-group" keys must be present in it.
168
+
If create is set to true, then this name is used to create the ConfigMap, otherwise the ConfigMap must exist, and the "issuer-name", "issuer-kind" and "issuer-group" keys must be present in it.
@@ -193,14 +193,14 @@ Issuer group name set on created CertificateRequests for both istio-csr's servin
193
193
> 6060
194
194
> ```
195
195
196
-
Container port to expose istio-csr HTTP readiness probe on default network interface.
196
+
Container port to expose the istio-csr HTTP readiness probe on the default network interface.
197
197
#### **app.readinessProbe.path** ~ `string`
198
198
> Default value:
199
199
> ```yaml
200
200
> /readyz
201
201
> ```
202
202
203
-
Path to expose istio-csr HTTP readiness probe on default network interface.
203
+
Path to expose the istio-csr HTTP readiness probe on the default network interface.
204
204
#### **app.certmanager.namespace** ~ `string`
205
205
> Default value:
206
206
> ```yaml
@@ -214,7 +214,7 @@ Namespace to create CertificateRequests for both istio-csr's serving certificate
214
214
> false
215
215
> ```
216
216
217
-
Don't delete created CertificateRequests once they have been signed. WARNING: do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.
217
+
Don't delete created CertificateRequests once they have been signed. WARNING: Do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.
Enable the default issuer, this is the issuer used when no runtime configuration is provided.
239
239
240
-
When enabled the istio-csr Pod will not be "Ready" until the issuer has been used to issue the istio-csr GRPC certificate.
240
+
When enabled, the istio-csr Pod will not be "Ready" until the issuer has been used to issue the istio-csr GRPC certificate.
241
241
242
-
For istio-csr to function either this or runtime configuration must be enabled.
242
+
For istio-csr to function, either this or runtime configuration must be enabled.
243
243
#### **app.certmanager.issuer.name** ~ `string`
244
244
> Default value:
245
245
> ```yaml
@@ -286,7 +286,7 @@ An optional file location to a PEM encoded root CA that the root CA. ConfigMap i
286
286
> 1h
287
287
> ```
288
288
289
-
Requested duration of gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).
289
+
Requested duration of the gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).
@@ -323,7 +323,7 @@ Private key algorithm to use. For backwards compatibility, defaults to the same
323
323
> 2048
324
324
> ```
325
325
326
-
Parameter for istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
326
+
Parameter for the istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
Parameter for serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
375
+
Parameter for the serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports
419
+
Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example, in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts of Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter, and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports
420
420
[API Priority and Fairness](https://kubernetes.io/docs/concepts/cluster-administration/flow-control/),
Copy file name to clipboardExpand all lines: deploy/charts/istio-csr/values.schema.json
+20-20Lines changed: 20 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -157,7 +157,7 @@
157
157
},
158
158
"helm-values.app.certmanager.issuer.enabled": {
159
159
"default": true,
160
-
"description": "Enable the default issuer, this is the issuer used when no runtime configuration is provided.\n\nWhen enabled the istio-csr Pod will not be \"Ready\" until the issuer has been used to issue the istio-csr GRPC certificate.\n\nFor istio-csr to function either this or runtime configuration must be enabled.",
160
+
"description": "Enable the default issuer, this is the issuer used when no runtime configuration is provided.\n\nWhen enabled, the istio-csr Pod will not be \"Ready\" until the issuer has been used to issue the istio-csr GRPC certificate.\n\nFor istio-csr to function, either this or runtime configuration must be enabled.",
"description": "Don't delete created CertificateRequests once they have been signed. WARNING: do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.",
185
+
"description": "Don't delete created CertificateRequests once they have been signed. WARNING: Do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.",
"description": "If set, limit where istio-csr creates configmaps with root ca certificates. If unset, configmap created in ALL namespaces.\nExample: maistra.io/member-of=istio-system",
204
+
"description": "If set, limit where istio-csr creates configmaps with root CA certificates. If unset, configmap created in ALL namespaces.\nExample: maistra.io/member-of=istio-system",
"description": "Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports\n[API Priority and Fairness](https://kubernetes.io/docs/concepts/cluster-administration/flow-control/),\nto avoid overloading the server.",
209
+
"description": "Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example, in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts of Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter, and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports\n[API Priority and Fairness](https://kubernetes.io/docs/concepts/cluster-administration/flow-control/),\nto avoid overloading the server.",
"description": "Path to expose istio-csr HTTP readiness probe on default network interface.",
355
+
"description": "Path to expose the istio-csr HTTP readiness probe on the default network interface.",
356
356
"type": "string"
357
357
},
358
358
"helm-values.app.readinessProbe.port": {
359
359
"default": 6060,
360
-
"description": "Container port to expose istio-csr HTTP readiness probe on default network interface.",
360
+
"description": "Container port to expose the istio-csr HTTP readiness probe on the default network interface.",
361
361
"type": "number"
362
362
},
363
363
"helm-values.app.runtimeConfiguration": {
@@ -412,7 +412,7 @@
412
412
},
413
413
"helm-values.app.runtimeConfiguration.name": {
414
414
"default": "",
415
-
"description": "Name of a ConfigMap in the installation namespace to watch, providing runtime configuration of an issuer to use.\n\nIf create is set to true then this name is used to create the ConfigMap, otherwise the ConfigMap must exist and the \"issuer-name\", \"issuer-kind\" and \"issuer-group\" keys must be present in it.",
415
+
"description": "Name of a ConfigMap in the installation namespace to watch, providing runtime configuration of an issuer to use.\n\nIf create is set to true, then this name is used to create the ConfigMap, otherwise the ConfigMap must exist, and the \"issuer-name\", \"issuer-kind\" and \"issuer-group\" keys must be present in it.",
416
416
"type": "string"
417
417
},
418
418
"helm-values.app.runtimeIssuanceConfigMap": {
@@ -457,7 +457,7 @@
457
457
},
458
458
"helm-values.app.server.caTrustedNodeAccounts": {
459
459
"default": "",
460
-
"description": "A comma-separated list of service accounts that are allowed to use node authentication for CSRs, eg. \"istio-system/ztunnel\".",
460
+
"description": "A comma-separated list of service accounts that are allowed to use node authentication for CSRs, e.g. \"istio-system/ztunnel\".",
461
461
"type": "string"
462
462
},
463
463
"helm-values.app.server.clusterID": {
@@ -490,17 +490,17 @@
490
490
},
491
491
"helm-values.app.server.serving.address": {
492
492
"default": "0.0.0.0",
493
-
"description": "Container address to serve istio-csr gRPC service.",
493
+
"description": "Container address to serve the istio-csr gRPC service.",
"description": "Parameter for serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
498
+
"description": "Parameter for the serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
499
499
"type": "number"
500
500
},
501
501
"helm-values.app.server.serving.port": {
502
502
"default": 6443,
503
-
"description": "Container port to serve istio-csr gRPC service.",
503
+
"description": "Container port to serve the istio-csr gRPC service.",
"description": "Requested duration of gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).",
559
+
"description": "Requested duration of the gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).",
560
560
"type": "string"
561
561
},
562
562
"helm-values.app.tls.istiodAdditionalDNSNames": {
@@ -586,7 +586,7 @@
586
586
},
587
587
"helm-values.app.tls.istiodPrivateKeySize": {
588
588
"default": 2048,
589
-
"description": "Parameter for istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
589
+
"description": "Parameter for the istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
590
590
"type": "number"
591
591
},
592
592
"helm-values.app.tls.rootCAFile": {
@@ -671,7 +671,7 @@
671
671
"type": "array"
672
672
},
673
673
"helm-values.nameOverride": {
674
-
"description": "nameOverride replaces the name of the chart in the Chart.yaml file, when this is used to construct Kubernetes object names.",
674
+
"description": "nameOverride replaces the name of the chart in the Chart.yaml file when this is used to construct Kubernetes object names.",
675
675
"type": "string"
676
676
},
677
677
"helm-values.nodeSelector": {
@@ -693,7 +693,7 @@
693
693
},
694
694
"helm-values.replicaCount": {
695
695
"default": 1,
696
-
"description": "Number of replicas of istio-csr to run.",
696
+
"description": "The number of replicas of istio-csr to run.",
697
697
"type": "number"
698
698
},
699
699
"helm-values.resources": {
@@ -766,17 +766,17 @@
766
766
"type": "object"
767
767
},
768
768
"helm-values.service.nodePort": {
769
-
"description": "Service nodePort to expose istio-csr gRPC service.",
769
+
"description": "Service nodePort to expose the istio-csr gRPC service.",
770
770
"type": "number"
771
771
},
772
772
"helm-values.service.port": {
773
773
"default": 443,
774
-
"description": "Service port to expose istio-csr gRPC service.",
774
+
"description": "Service port to expose the istio-csr gRPC service.",
775
775
"type": "number"
776
776
},
777
777
"helm-values.service.type": {
778
778
"default": "ClusterIP",
779
-
"description": "Service type to expose istio-csr gRPC service.",
779
+
"description": "Service type to expose the istio-csr gRPC service.",
0 commit comments