You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`oci://quay.io/jetstack/charts/venafi-kubernetes-agent`| Automatically built by the [release action](.github/workflows/release.yml) on Git tag pushes |
88
92
|`oci://quay.io/jetstack/charts/disco-agent`| Automatically built by the [release action](.github/workflows/release.yml) on Git tag pushes |
89
93
|`oci://registry.venafi.cloud/charts/venafi-kubernetes-agent`| Automatically mirrored by Harbor Replication rule |
Copy file name to clipboardExpand all lines: deploy/charts/venafi-kubernetes-agent/README.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,12 @@
1
1
# venafi-kubernetes-agent
2
2
3
-
The Venafi Kubernetes Agent connects your Kubernetes or OpenShift cluster to the Venafi Control Plane.
4
-
You will require a Venafi Control Plane account to connect your cluster.
3
+
The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager (formerly Venafi Control Plane).
4
+
You will require a CyberArk Certificate Manager account to connect your cluster.
5
5
If you do not have one, you can sign up for a free trial now at:
6
+
6
7
-https://venafi.com/try-venafi/tls-protect/
7
8
8
-
> 📖 Read the [Venafi Kubernetes Agent documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/),
9
+
> 📖 Read the [Discovery Agent documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/),
9
10
> to learn how install and configure this Helm chart.
10
11
11
12
## Values
@@ -104,7 +105,7 @@ default replicas, do not scale up
104
105
> registry.venafi.cloud/venafi-agent/venafi-agent
105
106
> ```
106
107
107
-
The container image for the Venafi Enhanced Issuer manager.
108
+
The container image for the Discovery Agent.
108
109
#### **image.pullPolicy** ~ `string`
109
110
> Default value:
110
111
> ```yaml
@@ -282,7 +283,7 @@ extraArgs:
282
283
> []
283
284
> ```
284
285
285
-
Additional volumes to add to the Venafi Kubernetes Agent container. This is useful for mounting a custom CA bundle. For example:
286
+
Additional volumes to add to the Discovery Agent container. This is useful for mounting a custom CA bundle. For example:
286
287
287
288
```yaml
288
289
volumes:
@@ -303,7 +304,7 @@ In order to create the ConfigMap, you can use the following command:
303
304
> []
304
305
> ```
305
306
306
-
Additional volume mounts to add to the Venafi Kubernetes Agent container. This is useful for mounting a custom CA bundle. Any PEM certificate mounted under /etc/ssl/certs will be loaded by the Venafi Kubernetes Agent. For
307
+
Additional volume mounts to add to the Discovery Agent container. This is useful for mounting a custom CA bundle. Any PEM certificate mounted under /etc/ssl/certs will be loaded by the Discovery Agent. For
When set to true, the Venafi Kubernetes Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
346
-
Venafi Kubernetes Agent Pod.
346
+
When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
@@ -364,7 +365,7 @@ The namespace of a VenafiConnection resource which contains the configuration fo
364
365
> https://api.venafi.cloud/
365
366
> ```
366
367
367
-
API URL of the Venafi Control Plane API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the
368
+
API URL of the CyberArk Certificate Manager API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the
The client-id to be used for authenticating with the Venafi Control. Plane. Only useful when using a Key Pair Service Account in the Venafi. Control Plane. You can obtain the cliend ID by creating a Key Pair Service
376
-
Account in the Venafi Control Plane.
377
+
Account in the CyberArk Certificate Manager.
377
378
#### **config.period** ~ `string`
378
379
> Default value:
379
380
> ```yaml
@@ -438,7 +439,7 @@ Control Plane.
438
439
> []
439
440
> ```
440
441
441
-
You can configure Venafi Kubernetes Agent to exclude some annotations or labels from being pushed to the Venafi Control Plane. All Kubernetes objects are affected. The objects are still pushed, but the specified annotations and labels are removed before being sent to the Venafi Control Plane.
442
+
You can configure Discovery Agent to exclude some annotations or labels from being pushed to the CyberArk Certificate Manager. All Kubernetes objects are affected. The objects are still pushed, but the specified annotations and labels are removed before being sent to the CyberArk Certificate Manager.
442
443
443
444
Dots is the only character that needs to be escaped in the regex. Use either double quotes with escaped single quotes or unquoted strings for the regex to avoid YAML parsing issues with `\.`.
444
445
@@ -501,4 +502,4 @@ This option makes it so that the "helm.sh/resource-policy": keep annotation is a
501
502
502
503
When set to false, the rendered output does not contain the. VenafiConnection CRDs and RBAC. This is useful for when the. Venafi Connection resources are already installed separately.
0 commit comments