Initialize/yaml/coordinator/coordinator_docker.yaml (75 lines of code) (raw):

apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: # "namespace" omitted since ClusterRoles are not namespaced name: root rules: - apiGroups: ["*"] # # at the HTTP level, the name of the resource for accessing Secret # objects is "secrets" resources: ["*"] verbs: ["*"] --- apiVersion: v1 kind: ServiceAccount metadata: name: coordinator-account --- apiVersion: rbac.authorization.k8s.io/v1 # This cluster role binding allows anyone in the "manager" group to read secrets in any namespace. kind: ClusterRoleBinding metadata: name: coordinator-role-binding subjects: - kind: ServiceAccount name: coordinator-account namespace: default roleRef: kind: ClusterRole name: root apiGroup: rbac.authorization.k8s.io --- apiVersion: apps/v1 # for versions before 1.9.0 use apps/v1beta2 kind: Deployment metadata: name: coordinator spec: selector: matchLabels: app: coordinator replicas: 1 template: metadata: labels: app: coordinator spec: serviceAccountName: coordinator-account nodeSelector: agentpool: captain containers: - name: coordinator image: IMAGE_PLACE_HOLDER resources: requests: cpu: 1000m memory: 1024Mi limits: cpu: 1000m memory: 1024Mi env: - name: kvUrl value: KVURL_PLACE_HOLDER - name: PodName valueFrom: fieldRef: fieldPath: metadata.name - name: redis value: redis-master - name: msiAppId value: MSI_PLACE_HOLDER - name: storage value: STORAGE_PLACE_HOLDER - name: domain value: DOMAIN_PLACE_HOLDER - name: image value: IMAGE_PLACE_HOLDER - name: internal value: INTERNAL_PLACE_HOLDER - name: location value: LOCATION_PLACE_HOLDER