2019-01-11 13:55:28 +00:00
|
|
|
apiVersion: v1
|
|
|
|
kind: ServiceAccount
|
|
|
|
metadata:
|
|
|
|
name: nfd-master
|
|
|
|
namespace: default
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: nfd-master
|
|
|
|
rules:
|
|
|
|
- apiGroups:
|
|
|
|
- ""
|
|
|
|
resources:
|
|
|
|
- nodes
|
|
|
|
verbs:
|
|
|
|
- get
|
|
|
|
- patch
|
|
|
|
- update
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
metadata:
|
|
|
|
name: nfd-master
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: nfd-master
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: nfd-master
|
|
|
|
namespace: default
|
|
|
|
---
|
|
|
|
apiVersion: apps/v1
|
|
|
|
kind: DaemonSet
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
app: nfd-master
|
|
|
|
name: nfd-master
|
|
|
|
spec:
|
|
|
|
selector:
|
|
|
|
matchLabels:
|
|
|
|
app: nfd-master
|
|
|
|
template:
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
app: nfd-master
|
|
|
|
spec:
|
2019-01-23 08:15:47 +00:00
|
|
|
serviceAccount: nfd-master
|
2019-01-11 13:55:28 +00:00
|
|
|
nodeSelector:
|
|
|
|
node-role.kubernetes.io/master: ""
|
|
|
|
tolerations:
|
|
|
|
- key: "node-role.kubernetes.io/master"
|
|
|
|
operator: "Equal"
|
|
|
|
value: ""
|
|
|
|
effect: "NoSchedule"
|
|
|
|
containers:
|
|
|
|
- env:
|
|
|
|
- name: NODE_NAME
|
|
|
|
valueFrom:
|
|
|
|
fieldRef:
|
|
|
|
fieldPath: spec.nodeName
|
2019-05-08 11:28:11 +00:00
|
|
|
image: <IMAGE_REPO>:<IMAGE_TAG>
|
2019-01-11 13:55:28 +00:00
|
|
|
name: nfd-master
|
|
|
|
command:
|
|
|
|
- "nfd-master"
|
2019-02-01 12:04:59 +00:00
|
|
|
## Enable TLS authentication
|
|
|
|
## The example below assumes having the root certificate named ca.crt stored in
|
|
|
|
## a ConfigMap named nfd-ca-cert, and, the TLS authentication credentials stored
|
|
|
|
## in a TLS Secret named nfd-master-cert.
|
|
|
|
## Additional hardening can be enabled by specifying --verify-node-name in
|
|
|
|
## args, in which case every nfd-worker requires a individual node-specific
|
|
|
|
## TLS certificate.
|
|
|
|
# args:
|
|
|
|
# - "--ca-file=/etc/kubernetes/node-feature-discovery/trust/ca.crt"
|
|
|
|
# - "--key-file=/etc/kubernetes/node-feature-discovery/certs/tls.key"
|
|
|
|
# - "--cert-file=/etc/kubernetes/node-feature-discovery/certs/tls.crt"
|
|
|
|
# volumeMounts:
|
|
|
|
# - name: nfd-ca-cert
|
|
|
|
# mountPath: "/etc/kubernetes/node-feature-discovery/trust"
|
|
|
|
# readOnly: true
|
|
|
|
# - name: nfd-master-cert
|
|
|
|
# mountPath: "/etc/kubernetes/node-feature-discovery/certs"
|
|
|
|
# readOnly: true
|
|
|
|
# volumes:
|
|
|
|
# - name: nfd-ca-cert
|
|
|
|
# configMap:
|
|
|
|
# name: nfd-ca-cert
|
|
|
|
# - name: nfd-master-cert
|
|
|
|
# secret:
|
|
|
|
# secretName: nfd-master-cert
|
2019-01-11 13:55:28 +00:00
|
|
|
---
|
|
|
|
apiVersion: v1
|
|
|
|
kind: Service
|
|
|
|
metadata:
|
|
|
|
name: nfd-master
|
|
|
|
spec:
|
|
|
|
selector:
|
|
|
|
app: nfd-master
|
|
|
|
ports:
|
|
|
|
- protocol: TCP
|
|
|
|
port: 8080
|
|
|
|
type: ClusterIP
|