# Generated file, DO NOT EDIT. Source: cloud/kubernetes/templates/cluster-init-secure.yaml apiVersion: batch/v1 kind: Job metadata: name: cluster-init-secure labels: app: cockroachdb spec: template: spec: serviceAccountName: cockroachdb initContainers: # The init-certs container sends a certificate signing request to the # kubernetes cluster. # You can see pending requests using: kubectl get csr # CSRs can be approved using: kubectl certificate approve # # In addition to the client certificate and key, the init-certs entrypoint will symlink # the cluster CA to the certs directory. - name: init-certs image: cockroachdb/cockroach-k8s-request-cert:0.4 imagePullPolicy: IfNotPresent command: - "/bin/ash" - "-ecx" - "/request-cert -namespace=${POD_NAMESPACE} -certs-dir=/cockroach-certs -type=client -user=root -symlink-ca-from=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt" env: - name: POD_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace volumeMounts: - name: client-certs mountPath: /cockroach-certs containers: - name: cluster-init image: cockroachdb/cockroach:v23.2.4 imagePullPolicy: IfNotPresent volumeMounts: - name: client-certs mountPath: /cockroach-certs command: - "/cockroach/cockroach" - "init" - "--certs-dir=/cockroach-certs" - "--host=cockroachdb-0.cockroachdb" restartPolicy: OnFailure volumes: - name: client-certs emptyDir: {}