Shawarma Sidecar Injection
For larger deployments, it's preferred to inject Shawarma automatically based on annotations. This simplies deployment pipelines by providing a standarized Shawarma configuration.
- Generate certificates for the webhook. Example.
- Update k8s-sidecar-injector.yaml with the Base64 encoded certificate, key, and CA certificate in their three respective locations.
kubectl apply -f .\k8s-sidecar-injector.yaml
rbac.yamlfor each namespace which will use Shawarma (it is setup for
default), and apply using
To use, simply include a
shawarma.centeredge.io/service-name annotation on a pod. This annotation should reference the service
which should be monitored to determine application state. See here for a full list of available annotations.
An example pod deployment can be found in (./test-pod.yaml).