Patch or Add resources using Kustomize
ClusterRole
, ClusterRoleBinding
or non-namespace scoped resources like EnvoyFilter
and WasmPlugin
. You can create these resources only if you are cluster admin for the cluster, else the deployment will fail. This prevents the scenario where a user who has access to a certain workspace can create cluster level resources and impact other workloads in the cluster.kustomize
field in the service deployment form.
Application Spec
Tab and then selecting Applied K8s Manifest
Enable Prometheus to scrape metrics from the service
Patch
section:Enable Autoscaling on memory usage
Additional Manifest
section:Add an additional container to the deployment
Patch
section:Patch Security Context
Patch
section: