Container
Last updated
Was this helpful?
Last updated
Was this helpful?
The Kubernetes plugins can deploy container
deploy actions.
Garden will take the simplified container
deploy specification and convert it to Kubernetes manifests, i.e. Deployment, Service and (if applicable) Ingress resources.
For example:
To make sure Garden deploys the frontend with the right image version, we need to reference the output from the container build in the spec.image
field.
If you need to use advanced (or otherwise very specific) features of the underlying platform, you may need to use more platform-specific action types (e.g. kubernetes
or helm
). The container
action type is not intended to capture all those features.
Container services can specify environment variables, using the services[].env
field:
You can reference secrets in environment variables. For Kubernetes, this translates to valueFrom.secretKeyRef
fields in the Pod specs, which direct Kubernetes to mount values from Secret
resources that you have created in the application namespace, as environment variables in the Pod.
For example:
This will pull the some-key-in-secret
key from the my-secret
Secret resource in the application namespace, and make it available as an environment variable.
Note that you must create the Secret manually for the Pod to be able to reference it.
For Kubernetes, this is commonly done using kubectl
. For example, to create a basic generic secret you could use:
We also configure a health check, a couple of ingress endpoints, and specify that this deploy depends on the backend
deploy. There is a number of other options, which you can find in the container
action .
env
is a simple mapping of "name: value". can also be used to interpolate values.
Where <my-app-namespace>
is your project namespace (which is either set with namespace
in your provider config, or defaults to your project name). There are notably other, more secure ways to create secrets via kubectl
. Please refer to the official for details.
Also check out the for a working example.