Configure external cert-manager
Cert Manager Support
This page shows how you can a third party certificate authority solution like Cert Manager.
The page is intended for a batch administrator.
Before you begin
Make sure you the following conditions are set:
- A Kubernetes cluster is running.
- The kubectl command-line tool has communication with your cluster.
- Kueue is installed.
- Cert Manager is installed
Kueue supports either Kustomize or installation via a Helm chart.
Internal Certificate management
In all cases, Kueue’s internal certificate management must be turned off if one wants to use CertManager.
Kustomize Installation
- Set
internalCertManagement.enabletofalsein the kueue configuration. - Comment out the
internalcertfolder inconfig/default/kustomization.yaml. - Enable
cert-managerinconfig/default/kustomization.yamland uncomment all sections with ‘CERTMANAGER’.
Helm Installation
Kueue also supports Cert Manager integration through Helm values.
When enableCertManager is set to true, the chart automatically disables
Kueue’s internal certificate management in the generated configuration.
- Set
enableCertManagertotruein yourvalues.yamlfile. - By default, the chart creates a self-signed
Issuer. - To reuse an existing
IssuerorClusterIssuer, setcertManager.issuerRef. - If you reference a namespace-scoped
Issuer, it must already exist in the same namespace as the Helm release. - The referenced issuer must provide the CA data required by Kueue’s
cert-manager integration, including
ca.crtin the generated Secrets and the CA bundle used for webhook and visibility API injection.
For example, to use an existing ClusterIssuer:
enableCertManager: true
certManager:
issuerRef:
group: cert-manager.io
kind: ClusterIssuer
name: my-cluster-issuer
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.