Overview

While we generally recommend that users should leverage the connection interface to configure and abstract requesting and mounting configmaps. It is sometimes much easier to mount a configmap manually if the configmap will be used temporarily or for testing purposes.

Polyaxon supports similar secrets syntax and mechanisms as Kubernetes Pod specs, which allows access to configmaps as environment variables or volume mounts. For more information, please check the Kubernetes documentation.

Usage as environment variables

In this section, we will demonstrate how to mount configmaps manually as environment variables in a job, but the same steps can be followed to mount configmaps in services or distributed jobs.

kind: component
...
run:
  kind: job
  container:
    command: ..
    envFrom:
    - configMapRef:
      name: my-configmap1
    - configMapRef:
      name: my-configmap2
    env:
    - name: secret-name
      valueFrom:
        configMapKeyRef:
          name: my-configmap3
          key: secret-key

Usage as a volume

In this section, we will demonstrate how to mount a configmaps manually as volumes in a job, but the same steps can be followed to mount configmaps in services or distributed jobs.

kind: component
...
run:
  kind: job
  volumes:
  - name: config-vol-name
    configMap:
      name: config-name
      items:
      ...
  container:
    command: ..
    volumeMounts:
    - name: config-vol-name
      mountPath: "/config/path"
      readOnly: true

Moving secrets to connections

If you find yourself defining the same configmaps in all operations, or if you have non-Kubernetes experts using Polyaxon, we suggest that you define those configmaps as custom connections, by doing so, users of the cluster will just request those configmaps using a single line:

kind: component
...
run:
  kind: job
  connections: [config1, config2]

Polyaxon will take care of the mechanics of converting those connections to environment variables or volumes and mounts.