-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathkube-ci.yaml
56 lines (56 loc) · 1.56 KB
/
kube-ci.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: kube-ci
spec:
replicas: 1
strategy:
rollingUpdate:
maxSurge: 2
template:
metadata:
labels:
app: kube-ci
spec:
containers:
- name: kube-ci
image: rctl/kube-ci:1.1.9-alpha
# Set read token to enable token based authentication on the HTTP API
# It is recommended, but not required, to set the token if you are exposing kube-ci on the web
# env:
# - name: KUBE_CI_READ_TOKEN
# value: "my-read-token"
readinessProbe:
httpGet:
path: /healthz
port: 8080
periodSeconds: 5
successThreshold: 2
failureThreshold: 2
ports:
- containerPort: 8080
# Use a custom service account to access Google Cloud Pub/Sub
# You can use this if your kubernetes cluster is not already authorized to access Pub/Sub
# Use kubectl create secret generic pubsub-service-account --from-file=google_service_account.json to create your secret.
# You cannot change the file name google_service_account.json, use this when creating your secret.
# volumeMounts:
# - name: serviceaccount
# mountPath: "/go/src/app"
# readOnly: true
# volumes:
# - name: serviceaccount
# secret:
# secretName: "pubsub-service-account"
---
apiVersion: v1
kind: Service
metadata:
name: kube-ci
spec:
ports:
- port: 80
name: kube-ci
targetPort: 8080
protocol: TCP
selector:
app: kube-ci