mirror of
https://github.com/kubernetes-sigs/node-feature-discovery.git
synced 2024-12-14 11:57:51 +00:00
docs: restructure docs
Introduce two main sections "Deployment" and "Usage" and move "Developer guide" to the top level, too. In particular, split the huge deployment-and-usage file into multiple parts under the new main sections. Move customization guide from "Advanced" to "Usage". This patch also renames "Advanced" to "Reference" as only that is left there is reference documentation.
This commit is contained in:
parent
34781af9e5
commit
6171c745a4
28 changed files with 888 additions and 767 deletions
|
@ -1,9 +0,0 @@
|
|||
---
|
||||
title: "Advanced"
|
||||
layout: default
|
||||
sort: 2
|
||||
---
|
||||
|
||||
# Advanced
|
||||
|
||||
Advanced topics and reference.
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Contributing"
|
||||
layout: default
|
||||
sort: 3
|
||||
sort: 6
|
||||
---
|
||||
|
||||
# Contributing
|
||||
|
|
165
docs/deployment/helm.md
Normal file
165
docs/deployment/helm.md
Normal file
|
@ -0,0 +1,165 @@
|
|||
---
|
||||
title: "Helm"
|
||||
layout: default
|
||||
sort: 3
|
||||
---
|
||||
|
||||
# Deployment with Helm
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
Node Feature Discovery Helm chart allow to easily deploy and manage NFD.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
[Helm package manager](https://helm.sh/) should be installed.
|
||||
|
||||
## Deployment
|
||||
|
||||
To install the latest stable version:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm repo add nfd https://kubernetes-sigs.github.io/node-feature-discovery/charts
|
||||
helm repo update
|
||||
helm install nfd/node-feature-discovery --namespace $NFD_NS --create-namespace --generate-name
|
||||
```
|
||||
|
||||
To install the latest development version you need to clone the NFD Git
|
||||
repository and install from there.
|
||||
|
||||
```bash
|
||||
git clone https://github.com/kubernetes-sigs/node-feature-discovery/
|
||||
cd node-feature-discovery/deployment/helm
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm install node-feature-discovery ./node-feature-discovery/ --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
See the [configuration](#configuration) section below for instructions how to
|
||||
alter the deployment parameters.
|
||||
|
||||
In order to deploy the [minimal](image-variants#minimal) image you need to
|
||||
override the image tag:
|
||||
|
||||
```bash
|
||||
helm install node-feature-discovery ./node-feature-discovery/ --set image.tag={{ site.release }}-minimal --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
||||
You can override values from `values.yaml` and provide a file with custom values:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm install nfd/node-feature-discovery -f <path/to/custom/values.yaml> --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
To specify each parameter separately you can provide them to helm install command:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm install nfd/node-feature-discovery --set nameOverride=NFDinstance --set master.replicaCount=2 --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
## Uninstalling the chart
|
||||
|
||||
To uninstall the `node-feature-discovery` deployment:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm uninstall node-feature-discovery --namespace $NFD_NS
|
||||
```
|
||||
|
||||
The command removes all the Kubernetes components associated with the chart and
|
||||
deletes the release.
|
||||
|
||||
## Chart parameters
|
||||
|
||||
In order to tailor the deployment of the Node Feature Discovery to your cluster needs
|
||||
We have introduced the following Chart parameters.
|
||||
|
||||
### General parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
| ---- | ---- | ------- | ----------- |
|
||||
| `image.repository` | string | `{{ site.container_image | split: ":" | first }}` | NFD image repository |
|
||||
| `image.tag` | string | `{{ site.release }}` | NFD image tag |
|
||||
| `image.pullPolicy` | string | `Always` | Image pull policy |
|
||||
| `imagePullSecrets` | list | [] | ImagePullSecrets is an optional list of references to secrets in the same namespace to use for pulling any of the images used by this PodSpec. If specified, these secrets will be passed to individual puller implementations for them to use. For example, in the case of docker, only DockerConfig type secrets are honored. [More info](https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod) |
|
||||
| `nameOverride` | string | | Override the name of the chart |
|
||||
| `fullnameOverride` | string | | Override a default fully qualified app name |
|
||||
| `nodeFeatureRule.createCRD` | bool | true | Specifies whether to create the NodeFeatureRule CRD |
|
||||
| `tls.enable` | bool | false | Specifies whether to use TLS for communications between components |
|
||||
| `tls.certManager` | bool | false | If enabled, requires [cert-manager](https://cert-manager.io/docs/) to be installed and will automatically create the required TLS certificates |
|
||||
|
||||
### Master pod parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
|-----------------------------|---------|-----------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| `master.*` | dict | | NFD master deployment configuration |
|
||||
| `master.instance` | string | | Instance name. Used to separate annotation namespaces for multiple parallel deployments |
|
||||
| `master.extraLabelNs` | array | [] | List of allowed extra label namespaces |
|
||||
| `master.resourceLabels` | array | [] | List of labels to be registered as extended resources |
|
||||
| `master.featureRulesController` | bool | null | Specifies whether the controller for processing of NodeFeatureRule objects is enabled. If not set, controller will be enabled if `master.instance` is empty. |
|
||||
| `master.replicaCount` | integer | 1 | Number of desired pods. This is a pointer to distinguish between explicit zero and not specified |
|
||||
| `master.podSecurityContext` | dict | {} | [PodSecurityContext](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) holds pod-level security attributes and common container settings |
|
||||
| `master.securityContext` | dict | {} | Container [security settings](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container)|
|
||||
| `master.serviceAccount.create` | bool | true | Specifies whether a service account should be created
|
||||
| `master.serviceAccount.annotations` | dict | {} | Annotations to add to the service account
|
||||
| `master.serviceAccount.name` | string | | The name of the service account to use. If not set and create is true, a name is generated using the fullname template
|
||||
| `master.rbac.create` | bool | true | Specifies whether to create [RBAC](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) configuration for nfd-master
|
||||
| `master.service.type` | string | ClusterIP | NFD master service type |
|
||||
| `master.service.port` | integer | 8080 | NFD master service port |
|
||||
| `master.resources` | dict | {} | NFD master pod [resources management](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
|
||||
| `master.nodeSelector` | dict | {} | NFD master pod [node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector) |
|
||||
| `master.tolerations` | dict | _Scheduling to master node is disabled_ | NFD master pod [tolerations](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
|
||||
| `master.annotations` | dict | {} | NFD master pod [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
| `master.affinity` | dict | | NFD master pod required [node affinity](https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
|
||||
| `master.deploymentAnnotations` | dict | {} | NFD master deployment [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
|
||||
### Worker pod parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
| ---- | ---- | ------- | ----------- |
|
||||
| `worker.*` | dict | | NFD worker daemonset configuration |
|
||||
| `worker.config` | dict | | NFD worker [configuration](../reference/worker-configuration-reference) |
|
||||
| `worker.podSecurityContext` | dict | {} | [PodSecurityContext](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) holds pod-level security attributes and common container settings |
|
||||
| `worker.securityContext` | dict | {} | Container [security settings](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
|
||||
| `worker.mountUsrSrc` | bool | false | Specifies whether to allow users to mount the hostpath /user/src. Does not work on systems without /usr/src AND a read-only /usr |
|
||||
| `worker.resources` | dict | {} | NFD worker pod [resources management](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
|
||||
| `worker.nodeSelector` | dict | {} | NFD worker pod [node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector) |
|
||||
| `worker.tolerations` | dict | {} | NFD worker pod [node tolerations](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
|
||||
| `worker.priorityClassName` | string | | NFD worker pod [priority class](https://kubernetes.io/docs/concepts/scheduling-eviction/pod-priority-preemption/) |
|
||||
| `worker.annotations` | dict | {} | NFD worker pod [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
| `worker.daemonsetAnnotations` | dict | {} | NFD worker daemonset [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
|
||||
### Topology updater parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
|-----------------------------------------------|--------|---------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| `topologyUpdater.*` | dict | | NFD Topology Updater configuration |
|
||||
| `topologyUpdater.enable` | bool | false | Specifies whether the NFD Topology Updater should be created |
|
||||
| `topologyUpdater.createCRDs` | bool | false | Specifies whether the NFD Topology Updater CRDs should be created |
|
||||
| `topologyUpdater.serviceAccount.create` | bool | true | Specifies whether the service account for topology updater should be created |
|
||||
| `topologyUpdater.serviceAccount.annotations` | dict | {} | Annotations to add to the service account for topology updater |
|
||||
| `topologyUpdater.serviceAccount.name` | string | | The name of the service account for topology updater to use. If not set and create is true, a name is generated using the fullname template and `-topology-updater` suffix |
|
||||
| `topologyUpdater.rbac` | dict | | RBAC [parameters](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) for the topology updater |
|
||||
| `topologyUpdater.rbac.create` | bool | false | Specifies whether the cluster role and binding for topology updater should be created |
|
||||
| `topologyUpdater.kubeletConfigPath` | string | "" | Specifies the kubelet config host path |
|
||||
| `topologyUpdater.kubeletPodResourcesSockPath` | string | "" | Specifies the kubelet sock path to read pod resources |
|
||||
| `topologyUpdater.updateInterval` | string | 60s | Time to sleep between CR updates. Non-positive value implies no CR update. |
|
||||
| `topologyUpdater.watchNamespace` | string | `*` | Namespace to watch pods, `*` for all namespaces |
|
||||
| `topologyUpdater.podSecurityContext` | dict | {} | [PodSecurityContext](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) holds pod-level security attributes and common container settings |
|
||||
| `topologyUpdater.securityContext` | dict | {} | Container [security settings](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
|
||||
| `topologyUpdater.resources` | dict | {} | Topology updater pod [resources management](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
|
||||
| `topologyUpdater.nodeSelector` | dict | {} | Topology updater pod [node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector) |
|
||||
| `topologyUpdater.tolerations` | dict | {} | Topology updater pod [node tolerations](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
|
||||
| `topologyUpdater.annotations` | dict | {} | Topology updater pod [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
| `topologyUpdater.affinity` | dict | {} | Topology updater pod [affinity](https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
|
35
docs/deployment/image-variants.md
Normal file
35
docs/deployment/image-variants.md
Normal file
|
@ -0,0 +1,35 @@
|
|||
---
|
||||
title: "Image variants"
|
||||
layout: default
|
||||
sort: 1
|
||||
---
|
||||
|
||||
# Image variants
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
NFD currently offers two variants of the container image. The "full" variant is
|
||||
currently deployed by default. Released container images are available for
|
||||
x86_64 and Arm64 architectures.
|
||||
|
||||
## Full
|
||||
|
||||
This image is based on [debian:bullseye-slim](https://hub.docker.com/_/debian)
|
||||
and contains a full Linux system for running shell-based nfd-worker hooks and
|
||||
doing live debugging and diagnosis of the NFD images.
|
||||
|
||||
## Minimal
|
||||
|
||||
This is a minimal image based on
|
||||
[gcr.io/distroless/base](https://github.com/GoogleContainerTools/distroless/blob/master/base/README.md)
|
||||
and only supports running statically linked binaries.
|
||||
|
||||
The container image tag has suffix `-minimal`
|
||||
(e.g. `{{ site.container_image }}-minimal`)
|
9
docs/deployment/index.md
Normal file
9
docs/deployment/index.md
Normal file
|
@ -0,0 +1,9 @@
|
|||
---
|
||||
title: "Deployment"
|
||||
layout: default
|
||||
sort: 2
|
||||
---
|
||||
|
||||
# Deployment
|
||||
|
||||
Deployment instructions.
|
159
docs/deployment/kustomize.md
Normal file
159
docs/deployment/kustomize.md
Normal file
|
@ -0,0 +1,159 @@
|
|||
---
|
||||
title: "Kustomize"
|
||||
layout: default
|
||||
sort: 2
|
||||
---
|
||||
|
||||
# Deploymenet with Kustomize
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
This deployment method requires
|
||||
[kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl) v1.21 or
|
||||
later. The kustomize overlays provided in the repo can be used directly:
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default?ref={{ site.release }}
|
||||
```
|
||||
|
||||
This will required RBAC rules and deploy nfd-master (as a deployment) and
|
||||
nfd-worker (as daemonset) in the `node-feature-discovery` namespace.
|
||||
|
||||
**NOTE:** nfd-topology-updater is not deployed as part of the `default` overlay.
|
||||
Please refer to the [Master Worker Topologyupdater](#master-worker-topologyupdater)
|
||||
and [Topologyupdater](#topologyupdater) below.
|
||||
|
||||
Alternatively you can clone the repository and customize the deployment by
|
||||
creating your own overlays. For example, to deploy the
|
||||
[minimal](image-variants#minimal) image. See [kustomize][kustomize] for more
|
||||
information about managing deployment configurations.
|
||||
|
||||
## Overlays
|
||||
|
||||
The NFD repository hosts a set of overlays for different usages and deployment
|
||||
scenarios under
|
||||
[`deployment/overlays`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays)
|
||||
|
||||
- [`default`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/default):
|
||||
default deployment of nfd-worker as a daemonset, described above
|
||||
- [`default-combined`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/default-combined)
|
||||
see [Master-worker pod](#master-worker-pod) below
|
||||
- [`default-job`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/default-job):
|
||||
see [Worker one-shot](#worker-one-shot) below
|
||||
- [`master-worker-topologyupdater`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/master-worker-topologyupdater):
|
||||
see [Master Worker Topologyupdater](#master-worker-topologyupdater) below
|
||||
- [`topologyupdater`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/topologyupdater):
|
||||
see [Topology Updater](#topologyupdater) below
|
||||
- [`prune`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/prune):
|
||||
clean up the cluster after uninstallation, see
|
||||
[Removing feature labels](uninstallation#removing-feature-labels)
|
||||
- [`samples/cert-manager`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/samples/cert-manager):
|
||||
an example for supplementing the default deployment with cert-manager for TLS
|
||||
authentication, see
|
||||
[Automated TLS certificate management using cert-manager](tls)
|
||||
for details
|
||||
- [`samples/custom-rules`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/samples/custom-rules):
|
||||
an example for spicing up the default deployment with a separately managed
|
||||
configmap of custom labeling rules, see
|
||||
[Custom feature source](../usage/features#custom) for more information about
|
||||
custom node labels
|
||||
|
||||
### Master-worker pod
|
||||
|
||||
You can also run nfd-master and nfd-worker inside the same pod
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default-combined?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
This creates a DaemonSet that runs nfd-worker and nfd-master in the same Pod.
|
||||
In this case no nfd-master is run on the master node(s), but, the worker nodes
|
||||
are able to label themselves which may be desirable e.g. in single-node setups.
|
||||
|
||||
**NOTE:** nfd-topology-updater is not deployed by the default-combined overlay.
|
||||
To enable nfd-topology-updater in this scenario,the users must customize the
|
||||
deployment themselves.
|
||||
|
||||
### Worker one-shot
|
||||
|
||||
Feature discovery can alternatively be configured as a one-shot job.
|
||||
The `default-job` overlay may be used to achieve this:
|
||||
|
||||
```bash
|
||||
NUM_NODES=$(kubectl get no -o jsonpath='{.items[*].metadata.name}' | wc -w)
|
||||
kubectl kustomize https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default-job?ref={{ site.release }} | \
|
||||
sed s"/NUM_NODES/$NUM_NODES/" | \
|
||||
kubectl apply -f -
|
||||
```
|
||||
|
||||
The example above launches as many jobs as there are non-master nodes. Note that
|
||||
this approach does not guarantee running once on every node. For example,
|
||||
tainted, non-ready nodes or some other reasons in Job scheduling may cause some
|
||||
node(s) will run extra job instance(s) to satisfy the request.
|
||||
|
||||
### Master Worker Topologyupdater
|
||||
|
||||
NFD Master, NFD worker and NFD Topologyupdater can be configured to be deployed
|
||||
as separate pods. The `master-worker-topologyupdater` overlay may be used to
|
||||
achieve this:
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/master-worker-topologyupdater?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
### Topologyupdater
|
||||
|
||||
In order to deploy just NFD master and NFD Topologyupdater (without nfd-worker)
|
||||
use the `topologyupdater` overlay:
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/topologyupdater?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
NFD Topologyupdater can be configured along with the `default` overlay
|
||||
(which deploys NFD worker and NFD master) where all the software components
|
||||
are deployed as separate pods. The `topologyupdater` overlay may be used
|
||||
along with `default` overlay to achieve this:
|
||||
|
||||
```bash
|
||||
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default?ref={{ site.release }}
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/topologyupdater?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
## Uninstallation
|
||||
|
||||
Simplest way is to invoke `kubectl delete` on the overlay that was used for
|
||||
deployment. Beware that this will also delete the namespace that NFD is
|
||||
running in. For example, in case the default overlay from the repo was used:
|
||||
|
||||
```bash
|
||||
kubectl delete -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default?ref={{ site.release }}
|
||||
```
|
||||
|
||||
Alternatively you can delete create objects one-by-one, depending on the type
|
||||
of deployment, for example:
|
||||
|
||||
```bash
|
||||
NFD_NS=node-feature-discovery
|
||||
kubectl -n $NFD_NS delete ds nfd-worker
|
||||
kubectl -n $NFD_NS delete deploy nfd-master
|
||||
kubectl -n $NFD_NS delete svc nfd-master
|
||||
kubectl -n $NFD_NS delete sa nfd-master
|
||||
kubectl delete clusterrole nfd-master
|
||||
kubectl delete clusterrolebinding nfd-master
|
||||
```
|
||||
|
||||
<!-- Links -->
|
||||
[kustomize]: https://github.com/kubernetes-sigs/kustomize
|
85
docs/deployment/operator.md
Normal file
85
docs/deployment/operator.md
Normal file
|
@ -0,0 +1,85 @@
|
|||
---
|
||||
title: "NFD Operator"
|
||||
layout: default
|
||||
sort: 4
|
||||
---
|
||||
|
||||
# Deployment with NFD Operator
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
## Deployment
|
||||
|
||||
Deployment using the
|
||||
[Node Feature Discovery Operator][nfd-operator]
|
||||
is recommended to be done via
|
||||
[operatorhub.io](https://operatorhub.io/operator/nfd-operator).
|
||||
|
||||
1. You need to have
|
||||
[OLM][OLM]
|
||||
installed. If you don't, take a look at the
|
||||
[latest release](https://github.com/operator-framework/operator-lifecycle-manager/releases/latest)
|
||||
for detailed instructions.
|
||||
1. Install the operator:
|
||||
|
||||
```bash
|
||||
kubectl create -f https://operatorhub.io/install/nfd-operator.yaml
|
||||
```
|
||||
|
||||
1. Create `NodeFeatureDiscovery` object (in `nfd` namespace here):
|
||||
|
||||
```bash
|
||||
cat << EOF | kubectl apply -f -
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: nfd
|
||||
---
|
||||
apiVersion: nfd.kubernetes.io/v1
|
||||
kind: NodeFeatureDiscovery
|
||||
metadata:
|
||||
name: my-nfd-deployment
|
||||
namespace: nfd
|
||||
spec:
|
||||
operand:
|
||||
image: {{ site.container_image }}
|
||||
imagePullPolicy: IfNotPresent
|
||||
EOF
|
||||
```
|
||||
|
||||
In order to deploy the [minimal](image-variants#minimal) image you need to use
|
||||
|
||||
```yaml
|
||||
image: {{ site.container_image }}-minimal
|
||||
```
|
||||
|
||||
in the `NodeFeatureDiscovery` object above.
|
||||
|
||||
## Uninstallation
|
||||
|
||||
If you followed the deployment instructions above you can simply do:
|
||||
|
||||
```bash
|
||||
kubectl -n nfd delete NodeFeatureDiscovery my-nfd-deployment
|
||||
```
|
||||
|
||||
Optionally, you can also remove the namespace:
|
||||
|
||||
```bash
|
||||
kubectl delete ns nfd
|
||||
```
|
||||
|
||||
See the [node-feature-discovery-operator][nfd-operator] and [OLM][OLM] project
|
||||
documentation for instructions for uninstalling the operator and operator
|
||||
lifecycle manager, respectively.
|
||||
|
||||
<!-- Links -->
|
||||
[nfd-operator]: https://github.com/kubernetes-sigs/node-feature-discovery-operator
|
||||
[OLM]: https://github.com/operator-framework/operator-lifecycle-manager
|
184
docs/deployment/tls.md
Normal file
184
docs/deployment/tls.md
Normal file
|
@ -0,0 +1,184 @@
|
|||
---
|
||||
title: "TLS authentication"
|
||||
layout: default
|
||||
sort: 5
|
||||
---
|
||||
|
||||
# Communication security with TLS
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
NFD supports mutual TLS authentication between the nfd-master and nfd-worker
|
||||
instances. That is, nfd-worker and nfd-master both verify that the other end
|
||||
presents a valid certificate.
|
||||
|
||||
TLS authentication is enabled by specifying `-ca-file`, `-key-file` and
|
||||
`-cert-file` args, on both the nfd-master and nfd-worker instances. The
|
||||
template specs provided with NFD contain (commented out) example configuration
|
||||
for enabling TLS authentication.
|
||||
|
||||
The Common Name (CN) of the nfd-master certificate must match the DNS name of
|
||||
the nfd-master Service of the cluster. By default, nfd-master only check that
|
||||
the nfd-worker has been signed by the specified root certificate (-ca-file).
|
||||
|
||||
Additional hardening can be enabled by specifying `-verify-node-name` in
|
||||
nfd-master args, in which case nfd-master verifies that the NodeName presented
|
||||
by nfd-worker matches the Common Name (CN) or a Subject Alternative Name (SAN)
|
||||
of its certificate. Note that `-verify-node-name` complicates certificate
|
||||
management and is not yet supported in the helm or kustomize deployment
|
||||
methods.
|
||||
|
||||
## Automated TLS certificate management using cert-manager
|
||||
|
||||
[cert-manager](https://cert-manager.io/) can be used to automate certificate
|
||||
management between nfd-master and the nfd-worker pods.
|
||||
|
||||
The NFD source code repository contains an example kustomize overlay and helm
|
||||
chart that can be used to deploy NFD with cert-manager supplied certificates
|
||||
enabled.
|
||||
|
||||
To install `cert-manager` itself can be done as easily as this, below, or you
|
||||
can refer to their documentation for other installation methods such as the
|
||||
helm chart they provide.
|
||||
|
||||
```bash
|
||||
kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.6.1/cert-manager.yaml
|
||||
```
|
||||
|
||||
To use the kustomize overlay to install node-feature-discovery with TLS enabled,
|
||||
you may use the following:
|
||||
|
||||
```bash
|
||||
kubectl apply -k deployment/overlays/samples/cert-manager
|
||||
```
|
||||
|
||||
To make use of the helm chart, override `values.yaml` to enable both the
|
||||
`tls.enabled` and `tls.certManager` options. Note that if you do not enable
|
||||
`tls.certManager`, helm will successfully install the application, but
|
||||
deployment will wait until certificates are manually created, as demonstrated
|
||||
below.
|
||||
|
||||
See the sample installation commands in the Helm [Deployment](helm#deployment)
|
||||
and [Configuration](helm#configuration) sections above for how to either override
|
||||
individual values, or provide a yaml file with which to override default
|
||||
values.
|
||||
|
||||
## Manual TLS certificate management
|
||||
|
||||
If you do not with to make use of cert-manager, the certificates can be
|
||||
manually created and stored as secrets within the NFD namespace.
|
||||
|
||||
Create a CA certificate
|
||||
|
||||
```bash
|
||||
openssl req -x509 -newkey rsa:4096 -keyout ca.key -nodes \
|
||||
-subj "/CN=nfd-ca" -days 10000 -out ca.crt
|
||||
```
|
||||
|
||||
Create a common openssl config file.
|
||||
|
||||
```bash
|
||||
cat <<EOF > nfd-common.conf
|
||||
[ req ]
|
||||
default_bits = 4096
|
||||
prompt = no
|
||||
default_md = sha256
|
||||
req_extensions = req_ext
|
||||
distinguished_name = dn
|
||||
|
||||
[ dn ]
|
||||
C = XX
|
||||
ST = some-state
|
||||
L = some-city
|
||||
O = some-company
|
||||
OU = node-feature-discovery
|
||||
|
||||
[ req_ext ]
|
||||
subjectAltName = @alt_names
|
||||
|
||||
[ v3_ext ]
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
basicConstraints=CA:FALSE
|
||||
keyUsage=keyEncipherment,dataEncipherment
|
||||
extendedKeyUsage=serverAuth,clientAuth
|
||||
subjectAltName=@alt_names
|
||||
EOF
|
||||
```
|
||||
|
||||
Now, create the nfd-master certificate.
|
||||
|
||||
```bash
|
||||
cat <<EOF > nfd-master.conf
|
||||
.include nfd-common.conf
|
||||
|
||||
[ dn ]
|
||||
CN = nfd-master
|
||||
|
||||
[ alt_names ]
|
||||
DNS.1 = nfd-master
|
||||
DNS.2 = nfd-master.node-feature-discovery.svc.cluster.local
|
||||
DNS.3 = localhost
|
||||
EOF
|
||||
|
||||
openssl req -new -newkey rsa:4096 -keyout nfd-master.key -nodes -out nfd-master.csr -config nfd-master.conf
|
||||
```
|
||||
|
||||
Create certificates for nfd-worker and nfd-topology-updater
|
||||
|
||||
```bash
|
||||
cat <<EOF > nfd-worker.conf
|
||||
.include nfd-common.conf
|
||||
|
||||
[ dn ]
|
||||
CN = nfd-worker
|
||||
|
||||
[ alt_names ]
|
||||
DNS.1 = nfd-worker
|
||||
DNS.2 = nfd-worker.node-feature-discovery.svc.cluster.local
|
||||
EOF
|
||||
|
||||
# Config for topology updater is identical except for the DN and alt_names
|
||||
sed -e 's/worker/topology-updater/g' < nfd-worker.conf > nfd-topology-updater.conf
|
||||
|
||||
openssl req -new -newkey rsa:4096 -keyout nfd-worker.key -nodes -out nfd-worker.csr -config nfd-worker.conf
|
||||
openssl req -new -newkey rsa:4096 -keyout nfd-topology-updater.key -nodes -out nfd-topology-updater.csr -config nfd-topology-updater.conf
|
||||
```
|
||||
|
||||
Now, sign the certificates with the CA created earlier.
|
||||
|
||||
```bash
|
||||
for cert in nfd-master nfd-worker nfd-topology-updater; do
|
||||
echo signing $cert
|
||||
openssl x509 -req -in $cert.csr -CA ca.crt -CAkey ca.key \
|
||||
-CAcreateserial -out $cert.crt -days 10000 \
|
||||
-extensions v3_ext -extfile $cert.conf
|
||||
done
|
||||
```
|
||||
|
||||
Finally, turn these certificates into secrets.
|
||||
|
||||
```bash
|
||||
for cert in nfd-master nfd-worker nfd-topology-updater; do
|
||||
echo creating secret for $cert in node-feature-discovery namespace
|
||||
cat <<EOF | kubectl create -n node-feature-discovery -f -
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
type: kubernetes.io/tls
|
||||
metadata:
|
||||
name: ${cert}-cert
|
||||
data:
|
||||
ca.crt: $( cat ca.crt | base64 -w 0 )
|
||||
tls.crt: $( cat $cert.crt | base64 -w 0 )
|
||||
tls.key: $( cat $cert.key | base64 -w 0 )
|
||||
EOF
|
||||
|
||||
done
|
||||
```
|
35
docs/deployment/uninstallation.md
Normal file
35
docs/deployment/uninstallation.md
Normal file
|
@ -0,0 +1,35 @@
|
|||
---
|
||||
title: "Uninstallation"
|
||||
layout: default
|
||||
sort: 6
|
||||
---
|
||||
|
||||
# Uninstallation
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
Follow the uninstallation instructions of the deployment method used
|
||||
([kustomize](kustomize#uninstallation),
|
||||
[helm](helm#uninstalling-the-chart) or
|
||||
[operator](operator#uninstallation)).
|
||||
|
||||
## Removing feature labels
|
||||
|
||||
NFD-Master has a special `-prune` command line flag for removing all
|
||||
nfd-related node labels, annotations and extended resources from the cluster.
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/prune?ref={{ site.release }}
|
||||
kubectl -n node-feature-discovery wait job.batch/nfd-master --for=condition=complete && \
|
||||
kubectl delete -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/prune?ref={{ site.release }}
|
||||
```
|
||||
|
||||
**NOTE:** You must run prune before removing the RBAC rules (serviceaccount,
|
||||
clusterrole and clusterrolebinding).
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Developer guide"
|
||||
layout: default
|
||||
sort: 1
|
||||
sort: 5
|
||||
---
|
||||
|
||||
# Developer guide
|
|
@ -1,718 +0,0 @@
|
|||
---
|
||||
title: "Deployment and usage"
|
||||
layout: default
|
||||
sort: 3
|
||||
---
|
||||
|
||||
# Deployment and usage
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
## Image variants
|
||||
|
||||
NFD currently offers two variants of the container image. The "full" variant is
|
||||
currently deployed by default. Released container images are available for
|
||||
x86_64 and Arm64 architectures.
|
||||
|
||||
### Full
|
||||
|
||||
This image is based on [debian:bullseye-slim](https://hub.docker.com/_/debian)
|
||||
and contains a full Linux system for running shell-based nfd-worker hooks and
|
||||
doing live debugging and diagnosis of the NFD images.
|
||||
|
||||
### Minimal
|
||||
|
||||
This is a minimal image based on
|
||||
[gcr.io/distroless/base](https://github.com/GoogleContainerTools/distroless/blob/master/base/README.md)
|
||||
and only supports running statically linked binaries.
|
||||
|
||||
The container image tag has suffix `-minimal`
|
||||
(e.g. `{{ site.container_image }}-minimal`)
|
||||
|
||||
## Deployment options
|
||||
|
||||
### Operator
|
||||
|
||||
Deployment using the
|
||||
[Node Feature Discovery Operator][nfd-operator]
|
||||
is recommended to be done via
|
||||
[operatorhub.io](https://operatorhub.io/operator/nfd-operator).
|
||||
|
||||
1. You need to have
|
||||
[OLM][OLM]
|
||||
installed. If you don't, take a look at the
|
||||
[latest release](https://github.com/operator-framework/operator-lifecycle-manager/releases/latest)
|
||||
for detailed instructions.
|
||||
1. Install the operator:
|
||||
|
||||
```bash
|
||||
kubectl create -f https://operatorhub.io/install/nfd-operator.yaml
|
||||
```
|
||||
|
||||
1. Create `NodeFeatureDiscovery` object (in `nfd` namespace here):
|
||||
|
||||
```bash
|
||||
cat << EOF | kubectl apply -f -
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: nfd
|
||||
---
|
||||
apiVersion: nfd.kubernetes.io/v1
|
||||
kind: NodeFeatureDiscovery
|
||||
metadata:
|
||||
name: my-nfd-deployment
|
||||
namespace: nfd
|
||||
spec:
|
||||
operand:
|
||||
image: {{ site.container_image }}
|
||||
imagePullPolicy: IfNotPresent
|
||||
EOF
|
||||
```
|
||||
|
||||
In order to deploy the [minimal](#minimal) image you need to use
|
||||
|
||||
```yaml
|
||||
image: {{ site.container_image }}-minimal
|
||||
```
|
||||
|
||||
in the `NodeFeatureDiscovery` object above.
|
||||
|
||||
### Deployment with kustomize
|
||||
|
||||
This requires [kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl)
|
||||
v1.21 or later. The kustomize overlays provided in the repo can be used
|
||||
directly:
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default?ref={{ site.release }}
|
||||
```
|
||||
|
||||
This will required RBAC rules and deploy nfd-master (as a deployment) and
|
||||
nfd-worker (as daemonset) in the `node-feature-discovery` namespace.
|
||||
|
||||
**NOTE:** nfd-topology-updater is not deployed as part of the `default` overlay.
|
||||
Please refer to the [Master Worker Topologyupdater](#master-worker-topologyupdater)
|
||||
and [Topologyupdater](#topology-updater) below.
|
||||
|
||||
Alternatively you can clone the repository and customize the deployment by
|
||||
creating your own overlays. For example, to deploy the [minimal](#minimal)
|
||||
image. See [kustomize][kustomize] for more information about managing
|
||||
deployment configurations.
|
||||
|
||||
#### Default overlays
|
||||
|
||||
The NFD repository hosts a set of overlays for different usages and deployment
|
||||
scenarios under
|
||||
[`deployment/overlays`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays)
|
||||
|
||||
- [`default`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/default):
|
||||
default deployment of nfd-worker as a daemonset, described above
|
||||
- [`default-combined`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/default-combined)
|
||||
see [Master-worker pod](#master-worker-pod) below
|
||||
- [`default-job`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/default-job):
|
||||
see [Worker one-shot](#worker-one-shot) below
|
||||
- [`master-worker-topologyupdater`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/master-worker-topologyupdater):
|
||||
see [Master Worker Topologyupdater](#master-worker-topologyupdater) below
|
||||
- [`topologyupdater`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/topologyupdater):
|
||||
see [Topology Updater](#topology-updater) below
|
||||
- [`prune`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/prune):
|
||||
clean up the cluster after uninstallation, see
|
||||
[Removing feature labels](#removing-feature-labels)
|
||||
- [`samples/cert-manager`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/samples/cert-manager):
|
||||
an example for supplementing the default deployment with cert-manager for TLS
|
||||
authentication, see
|
||||
[Automated TLS certificate management using cert-manager](#automated-tls-certificate-management-using-cert-manager)
|
||||
for details
|
||||
- [`samples/custom-rules`](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/overlays/samples/custom-rules):
|
||||
an example for spicing up the default deployment with a separately managed
|
||||
configmap of custom labeling rules, see
|
||||
[Custom feature source](#features.md#custom) for more information about
|
||||
custom node labels
|
||||
|
||||
#### Master-worker pod
|
||||
|
||||
You can also run nfd-master and nfd-worker inside the same pod
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default-combined?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
This creates a DaemonSet that runs nfd-worker and nfd-master in the same Pod.
|
||||
In this case no nfd-master is run on the master node(s), but, the worker nodes
|
||||
are able to label themselves which may be desirable e.g. in single-node setups.
|
||||
|
||||
**NOTE:** nfd-topology-updater is not deployed by the default-combined overlay.
|
||||
To enable nfd-topology-updater in this scenario,the users must customize the
|
||||
deployment themselves.
|
||||
|
||||
#### Worker one-shot
|
||||
|
||||
Feature discovery can alternatively be configured as a one-shot job.
|
||||
The `default-job` overlay may be used to achieve this:
|
||||
|
||||
```bash
|
||||
NUM_NODES=$(kubectl get no -o jsonpath='{.items[*].metadata.name}' | wc -w)
|
||||
kubectl kustomize https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default-job?ref={{ site.release }} | \
|
||||
sed s"/NUM_NODES/$NUM_NODES/" | \
|
||||
kubectl apply -f -
|
||||
```
|
||||
|
||||
The example above launches as many jobs as there are non-master nodes. Note that
|
||||
this approach does not guarantee running once on every node. For example,
|
||||
tainted, non-ready nodes or some other reasons in Job scheduling may cause some
|
||||
node(s) will run extra job instance(s) to satisfy the request.
|
||||
|
||||
#### Master Worker Topologyupdater
|
||||
|
||||
NFD Master, NFD worker and NFD Topologyupdater can be configured to be deployed
|
||||
as separate pods. The `master-worker-topologyupdater` overlay may be used to
|
||||
achieve this:
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/master-worker-topologyupdater?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
#### Topologyupdater
|
||||
|
||||
In order to deploy just NFD master and NFD Topologyupdater (without nfd-worker)
|
||||
use the `topologyupdater` overlay:
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/topologyupdater?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
NFD Topologyupdater can be configured along with the `default` overlay
|
||||
(which deploys NFD worker and NFD master) where all the software components
|
||||
are deployed as separate pods. The `topologyupdater` overlay may be used
|
||||
along with `default` overlay to achieve this:
|
||||
|
||||
```bash
|
||||
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default?ref={{ site.release }}
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/topologyupdater?ref={{ site.release }}
|
||||
|
||||
```
|
||||
|
||||
### Deployment with Helm
|
||||
|
||||
Node Feature Discovery Helm chart allow to easily deploy and manage NFD.
|
||||
|
||||
#### Prerequisites
|
||||
|
||||
[Helm package manager](https://helm.sh/) should be installed.
|
||||
|
||||
#### Deployment
|
||||
|
||||
To install the latest stable version:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm repo add nfd https://kubernetes-sigs.github.io/node-feature-discovery/charts
|
||||
helm repo update
|
||||
helm install nfd/node-feature-discovery --namespace $NFD_NS --create-namespace --generate-name
|
||||
```
|
||||
|
||||
To install the latest development version you need to clone the NFD Git
|
||||
repository and install from there.
|
||||
|
||||
```bash
|
||||
git clone https://github.com/kubernetes-sigs/node-feature-discovery/
|
||||
cd node-feature-discovery/deployment/helm
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm install node-feature-discovery ./node-feature-discovery/ --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
See the [configuration](#configuration) section below for instructions how to
|
||||
alter the deployment parameters.
|
||||
|
||||
In order to deploy the [minimal](#minimal) image you need to override the image
|
||||
tag:
|
||||
|
||||
```bash
|
||||
helm install node-feature-discovery ./node-feature-discovery/ --set image.tag={{ site.release }}-minimal --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
#### Configuration
|
||||
|
||||
You can override values from `values.yaml` and provide a file with custom values:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm install nfd/node-feature-discovery -f <path/to/custom/values.yaml> --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
To specify each parameter separately you can provide them to helm install command:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm install nfd/node-feature-discovery --set nameOverride=NFDinstance --set master.replicaCount=2 --namespace $NFD_NS --create-namespace
|
||||
```
|
||||
|
||||
#### Uninstalling the chart
|
||||
|
||||
To uninstall the `node-feature-discovery` deployment:
|
||||
|
||||
```bash
|
||||
export NFD_NS=node-feature-discovery
|
||||
helm uninstall node-feature-discovery --namespace $NFD_NS
|
||||
```
|
||||
|
||||
The command removes all the Kubernetes components associated with the chart and
|
||||
deletes the release.
|
||||
|
||||
#### Chart parameters
|
||||
|
||||
In order to tailor the deployment of the Node Feature Discovery to your cluster needs
|
||||
We have introduced the following Chart parameters.
|
||||
|
||||
##### General parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
| ---- | ---- | ------- | ----------- |
|
||||
| `image.repository` | string | `{{ site.container_image | split: ":" | first }}` | NFD image repository |
|
||||
| `image.tag` | string | `{{ site.release }}` | NFD image tag |
|
||||
| `image.pullPolicy` | string | `Always` | Image pull policy |
|
||||
| `imagePullSecrets` | list | [] | ImagePullSecrets is an optional list of references to secrets in the same namespace to use for pulling any of the images used by this PodSpec. If specified, these secrets will be passed to individual puller implementations for them to use. For example, in the case of docker, only DockerConfig type secrets are honored. [More info](https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod) |
|
||||
| `nameOverride` | string | | Override the name of the chart |
|
||||
| `fullnameOverride` | string | | Override a default fully qualified app name |
|
||||
| `nodeFeatureRule.createCRD` | bool | true | Specifies whether to create the NodeFeatureRule CRD |
|
||||
| `tls.enable` | bool | false | Specifies whether to use TLS for communications between components |
|
||||
| `tls.certManager` | bool | false | If enabled, requires [cert-manager](https://cert-manager.io/docs/) to be installed and will automatically create the required TLS certificates |
|
||||
|
||||
##### Master pod parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
|-----------------------------|---------|-----------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| `master.*` | dict | | NFD master deployment configuration |
|
||||
| `master.instance` | string | | Instance name. Used to separate annotation namespaces for multiple parallel deployments |
|
||||
| `master.extraLabelNs` | array | [] | List of allowed extra label namespaces |
|
||||
| `master.resourceLabels` | array | [] | List of labels to be registered as extended resources |
|
||||
| `master.featureRulesController` | bool | null | Specifies whether the controller for processing of NodeFeatureRule objects is enabled. If not set, controller will be enabled if `master.instance` is empty. |
|
||||
| `master.replicaCount` | integer | 1 | Number of desired pods. This is a pointer to distinguish between explicit zero and not specified |
|
||||
| `master.podSecurityContext` | dict | {} | [PodSecurityContext](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) holds pod-level security attributes and common container settings |
|
||||
| `master.securityContext` | dict | {} | Container [security settings](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container)|
|
||||
| `master.serviceAccount.create` | bool | true | Specifies whether a service account should be created
|
||||
| `master.serviceAccount.annotations` | dict | {} | Annotations to add to the service account
|
||||
| `master.serviceAccount.name` | string | | The name of the service account to use. If not set and create is true, a name is generated using the fullname template
|
||||
| `master.rbac.create` | bool | true | Specifies whether to create [RBAC](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) configuration for nfd-master
|
||||
| `master.service.type` | string | ClusterIP | NFD master service type |
|
||||
| `master.service.port` | integer | 8080 | NFD master service port |
|
||||
| `master.resources` | dict | {} | NFD master pod [resources management](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
|
||||
| `master.nodeSelector` | dict | {} | NFD master pod [node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector) |
|
||||
| `master.tolerations` | dict | _Scheduling to master node is disabled_ | NFD master pod [tolerations](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
|
||||
| `master.annotations` | dict | {} | NFD master pod [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
| `master.affinity` | dict | | NFD master pod required [node affinity](https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
|
||||
| `master.deploymentAnnotations` | dict | {} | NFD master deployment [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
|
||||
##### Worker pod parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
| ---- | ---- | ------- | ----------- |
|
||||
| `worker.*` | dict | | NFD worker daemonset configuration |
|
||||
| `worker.config` | dict | | NFD worker [configuration](../advanced/worker-configuration-reference.md) |
|
||||
| `worker.podSecurityContext` | dict | {} | [PodSecurityContext](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) holds pod-level security attributes and common container settings |
|
||||
| `worker.securityContext` | dict | {} | Container [security settings](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
|
||||
| `worker.mountUsrSrc` | bool | false | Specifies whether to allow users to mount the hostpath /user/src. Does not work on systems without /usr/src AND a read-only /usr |
|
||||
| `worker.resources` | dict | {} | NFD worker pod [resources management](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
|
||||
| `worker.nodeSelector` | dict | {} | NFD worker pod [node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector) |
|
||||
| `worker.tolerations` | dict | {} | NFD worker pod [node tolerations](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
|
||||
| `worker.priorityClassName` | string | | NFD worker pod [priority class](https://kubernetes.io/docs/concepts/scheduling-eviction/pod-priority-preemption/) |
|
||||
| `worker.annotations` | dict | {} | NFD worker pod [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
| `worker.daemonsetAnnotations` | dict | {} | NFD worker daemonset [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
|
||||
##### Topology updater parameters
|
||||
|
||||
| Name | Type | Default | description |
|
||||
|-----------------------------------------------|--------|---------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| `topologyUpdater.*` | dict | | NFD Topology Updater configuration |
|
||||
| `topologyUpdater.enable` | bool | false | Specifies whether the NFD Topology Updater should be created |
|
||||
| `topologyUpdater.createCRDs` | bool | false | Specifies whether the NFD Topology Updater CRDs should be created |
|
||||
| `topologyUpdater.serviceAccount.create` | bool | true | Specifies whether the service account for topology updater should be created |
|
||||
| `topologyUpdater.serviceAccount.annotations` | dict | {} | Annotations to add to the service account for topology updater |
|
||||
| `topologyUpdater.serviceAccount.name` | string | | The name of the service account for topology updater to use. If not set and create is true, a name is generated using the fullname template and `-topology-updater` suffix |
|
||||
| `topologyUpdater.rbac` | dict | | RBAC [parameters](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) for the topology updater |
|
||||
| `topologyUpdater.rbac.create` | bool | false | Specifies whether the cluster role and binding for topology updater should be created |
|
||||
| `topologyUpdater.kubeletConfigPath` | string | "" | Specifies the kubelet config host path |
|
||||
| `topologyUpdater.kubeletPodResourcesSockPath` | string | "" | Specifies the kubelet sock path to read pod resources |
|
||||
| `topologyUpdater.updateInterval` | string | 60s | Time to sleep between CR updates. Non-positive value implies no CR update. |
|
||||
| `topologyUpdater.watchNamespace` | string | `*` | Namespace to watch pods, `*` for all namespaces |
|
||||
| `topologyUpdater.podSecurityContext` | dict | {} | [PodSecurityContext](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) holds pod-level security attributes and common container settings |
|
||||
| `topologyUpdater.securityContext` | dict | {} | Container [security settings](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
|
||||
| `topologyUpdater.resources` | dict | {} | Topology updater pod [resources management](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
|
||||
| `topologyUpdater.nodeSelector` | dict | {} | Topology updater pod [node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector) |
|
||||
| `topologyUpdater.tolerations` | dict | {} | Topology updater pod [node tolerations](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
|
||||
| `topologyUpdater.annotations` | dict | {} | Topology updater pod [annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/) |
|
||||
| `topologyUpdater.affinity` | dict | {} | Topology updater pod [affinity](https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
|
||||
|
||||
### Build your own
|
||||
|
||||
If you want to use the latest development version (master branch) you need to
|
||||
build your own custom image.
|
||||
See the [Developer Guide](../advanced/developer-guide) for instructions how to
|
||||
build images and deploy them on your cluster.
|
||||
|
||||
## Usage
|
||||
|
||||
### NFD-Master
|
||||
|
||||
NFD-Master runs as a deployment (with a replica count of 1), by default
|
||||
it prefers running on the cluster's master nodes but will run on worker
|
||||
nodes if no master nodes are found.
|
||||
|
||||
For High Availability, you should simply increase the replica count of
|
||||
the deployment object. You should also look into adding
|
||||
[inter-pod](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity)
|
||||
affinity to prevent masters from running on the same node.
|
||||
However note that inter-pod affinity is costly and is not recommended
|
||||
in bigger clusters.
|
||||
|
||||
NFD-Master listens for connections from nfd-worker(s) and connects to the
|
||||
Kubernetes API server to add node labels advertised by them.
|
||||
|
||||
If you have RBAC authorization enabled (as is the default e.g. with clusters
|
||||
initialized with kubeadm) you need to configure the appropriate ClusterRoles,
|
||||
ClusterRoleBindings and a ServiceAccount in order for NFD to create node
|
||||
labels. The provided template will configure these for you.
|
||||
|
||||
### NFD-Worker
|
||||
|
||||
NFD-Worker is preferably run as a Kubernetes DaemonSet. This assures
|
||||
re-labeling on regular intervals capturing changes in the system configuration
|
||||
and makes sure that new nodes are labeled as they are added to the cluster.
|
||||
Worker connects to the nfd-master service to advertise hardware features.
|
||||
|
||||
When run as a daemonset, nodes are re-labeled at an default interval of 60s.
|
||||
This can be changed by using the
|
||||
[`core.sleepInterval`](../advanced/worker-configuration-reference.html#coresleepinterval)
|
||||
config option (or
|
||||
[`-sleep-interval`](../advanced/worker-commandline-reference.html#-sleep-interval)
|
||||
command line flag).
|
||||
|
||||
The worker configuration file is watched and re-read on every change which
|
||||
provides a simple mechanism of dynamic run-time reconfiguration. See
|
||||
[worker configuration](#worker-configuration) for more details.
|
||||
|
||||
### NFD-Topology-Updater
|
||||
|
||||
NFD-Topology-Updater is preferably run as a Kubernetes DaemonSet. This assures
|
||||
re-examination (and CR updates) on regular intervals capturing changes in
|
||||
the allocated resources and hence the allocatable resources on a per zone
|
||||
basis. It makes sure that more CR instances are created as new nodes get
|
||||
added to the cluster. Topology-Updater connects to the nfd-master service
|
||||
to create CR instances corresponding to nodes.
|
||||
|
||||
When run as a daemonset, nodes are re-examined for the allocated resources
|
||||
(to determine the information of the allocatable resources on a per zone basis
|
||||
where a zone can be a NUMA node) at an interval specified using the
|
||||
`-sleep-interval` option. The default sleep interval is set to 60s which is the
|
||||
the value when no -sleep-interval is specified.
|
||||
|
||||
### Communication security with TLS
|
||||
|
||||
NFD supports mutual TLS authentication between the nfd-master and nfd-worker
|
||||
instances. That is, nfd-worker and nfd-master both verify that the other end
|
||||
presents a valid certificate.
|
||||
|
||||
TLS authentication is enabled by specifying `-ca-file`, `-key-file` and
|
||||
`-cert-file` args, on both the nfd-master and nfd-worker instances. The
|
||||
template specs provided with NFD contain (commented out) example configuration
|
||||
for enabling TLS authentication.
|
||||
|
||||
The Common Name (CN) of the nfd-master certificate must match the DNS name of
|
||||
the nfd-master Service of the cluster. By default, nfd-master only check that
|
||||
the nfd-worker has been signed by the specified root certificate (-ca-file).
|
||||
|
||||
Additional hardening can be enabled by specifying `-verify-node-name` in
|
||||
nfd-master args, in which case nfd-master verifies that the NodeName presented
|
||||
by nfd-worker matches the Common Name (CN) or a Subject Alternative Name (SAN)
|
||||
of its certificate. Note that `-verify-node-name` complicates certificate
|
||||
management and is not yet supported in the helm or kustomize deployment
|
||||
methods.
|
||||
|
||||
#### Automated TLS certificate management using cert-manager
|
||||
|
||||
[cert-manager](https://cert-manager.io/) can be used to automate certificate
|
||||
management between nfd-master and the nfd-worker pods.
|
||||
|
||||
The NFD source code repository contains an example kustomize overlay and helm
|
||||
chart that can be used to deploy NFD with cert-manager supplied certificates
|
||||
enabled.
|
||||
|
||||
To install `cert-manager` itself can be done as easily as this, below, or you
|
||||
can refer to their documentation for other installation methods such as the
|
||||
helm chart they provide.
|
||||
|
||||
```bash
|
||||
kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.6.1/cert-manager.yaml
|
||||
```
|
||||
|
||||
To use the kustomize overlay to install node-feature-discovery with TLS enabled,
|
||||
you may use the following:
|
||||
|
||||
```bash
|
||||
kubectl apply -k deployment/overlays/samples/cert-manager
|
||||
```
|
||||
|
||||
To make use of the helm chart, override `values.yaml` to enable both the
|
||||
`tls.enabled` and `tls.certManager` options. Note that if you do not enable
|
||||
`tls.certManager`, helm will successfully install the application, but
|
||||
deployment will wait until certificates are manually created, as demonstrated
|
||||
below.
|
||||
|
||||
See the sample installation commands in the Helm [Deployment](#deployment)
|
||||
and [Configuration](#configuration) sections above for how to either override
|
||||
individual values, or provide a yaml file with which to override default
|
||||
values.
|
||||
|
||||
#### Manual TLS certificate management
|
||||
|
||||
If you do not with to make use of cert-manager, the certificates can be
|
||||
manually created and stored as secrets within the NFD namespace.
|
||||
|
||||
Create a CA certificate
|
||||
|
||||
```bash
|
||||
openssl req -x509 -newkey rsa:4096 -keyout ca.key -nodes \
|
||||
-subj "/CN=nfd-ca" -days 10000 -out ca.crt
|
||||
```
|
||||
|
||||
Create a common openssl config file.
|
||||
|
||||
```bash
|
||||
cat <<EOF > nfd-common.conf
|
||||
[ req ]
|
||||
default_bits = 4096
|
||||
prompt = no
|
||||
default_md = sha256
|
||||
req_extensions = req_ext
|
||||
distinguished_name = dn
|
||||
|
||||
[ dn ]
|
||||
C = XX
|
||||
ST = some-state
|
||||
L = some-city
|
||||
O = some-company
|
||||
OU = node-feature-discovery
|
||||
|
||||
[ req_ext ]
|
||||
subjectAltName = @alt_names
|
||||
|
||||
[ v3_ext ]
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
basicConstraints=CA:FALSE
|
||||
keyUsage=keyEncipherment,dataEncipherment
|
||||
extendedKeyUsage=serverAuth,clientAuth
|
||||
subjectAltName=@alt_names
|
||||
EOF
|
||||
```
|
||||
|
||||
Now, create the nfd-master certificate.
|
||||
|
||||
```bash
|
||||
cat <<EOF > nfd-master.conf
|
||||
.include nfd-common.conf
|
||||
|
||||
[ dn ]
|
||||
CN = nfd-master
|
||||
|
||||
[ alt_names ]
|
||||
DNS.1 = nfd-master
|
||||
DNS.2 = nfd-master.node-feature-discovery.svc.cluster.local
|
||||
DNS.3 = localhost
|
||||
EOF
|
||||
|
||||
openssl req -new -newkey rsa:4096 -keyout nfd-master.key -nodes -out nfd-master.csr -config nfd-master.conf
|
||||
```
|
||||
|
||||
Create certificates for nfd-worker and nfd-topology-updater
|
||||
|
||||
```bash
|
||||
cat <<EOF > nfd-worker.conf
|
||||
.include nfd-common.conf
|
||||
|
||||
[ dn ]
|
||||
CN = nfd-worker
|
||||
|
||||
[ alt_names ]
|
||||
DNS.1 = nfd-worker
|
||||
DNS.2 = nfd-worker.node-feature-discovery.svc.cluster.local
|
||||
EOF
|
||||
|
||||
# Config for topology updater is identical except for the DN and alt_names
|
||||
sed -e 's/worker/topology-updater/g' < nfd-worker.conf > nfd-topology-updater.conf
|
||||
|
||||
openssl req -new -newkey rsa:4096 -keyout nfd-worker.key -nodes -out nfd-worker.csr -config nfd-worker.conf
|
||||
openssl req -new -newkey rsa:4096 -keyout nfd-topology-updater.key -nodes -out nfd-topology-updater.csr -config nfd-topology-updater.conf
|
||||
```
|
||||
|
||||
Now, sign the certificates with the CA created earlier.
|
||||
|
||||
```bash
|
||||
for cert in nfd-master nfd-worker nfd-topology-updater; do
|
||||
echo signing $cert
|
||||
openssl x509 -req -in $cert.csr -CA ca.crt -CAkey ca.key \
|
||||
-CAcreateserial -out $cert.crt -days 10000 \
|
||||
-extensions v3_ext -extfile $cert.conf
|
||||
done
|
||||
```
|
||||
|
||||
Finally, turn these certificates into secrets.
|
||||
|
||||
```bash
|
||||
for cert in nfd-master nfd-worker nfd-topology-updater; do
|
||||
echo creating secret for $cert in node-feature-discovery namespace
|
||||
cat <<EOF | kubectl create -n node-feature-discovery -f -
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
type: kubernetes.io/tls
|
||||
metadata:
|
||||
name: ${cert}-cert
|
||||
data:
|
||||
ca.crt: $( cat ca.crt | base64 -w 0 )
|
||||
tls.crt: $( cat $cert.crt | base64 -w 0 )
|
||||
tls.key: $( cat $cert.key | base64 -w 0 )
|
||||
EOF
|
||||
|
||||
done
|
||||
```
|
||||
|
||||
## Worker configuration
|
||||
|
||||
NFD-Worker supports dynamic configuration through a configuration file. The
|
||||
default location is `/etc/kubernetes/node-feature-discovery/nfd-worker.conf`,
|
||||
but, this can be changed by specifying the`-config` command line flag.
|
||||
Configuration file is re-read whenever it is modified which makes run-time
|
||||
re-configuration of nfd-worker straightforward.
|
||||
|
||||
Worker configuration file is read inside the container, and thus, Volumes and
|
||||
VolumeMounts are needed to make your configuration available for NFD. The
|
||||
preferred method is to use a ConfigMap which provides easy deployment and
|
||||
re-configurability.
|
||||
|
||||
The provided nfd-worker deployment templates create an empty configmap and
|
||||
mount it inside the nfd-worker containers. In kustomize deployments,
|
||||
configuration can be edited with:
|
||||
|
||||
```bash
|
||||
kubectl -n ${NFD_NS} edit configmap nfd-worker-conf
|
||||
```
|
||||
|
||||
In Helm deployments, [Worker pod parameter](#worker-pod-parameters)
|
||||
`worker.config` can be used to edit the respective configuration.
|
||||
|
||||
See
|
||||
[nfd-worker configuration file reference](../advanced/worker-configuration-reference.md)
|
||||
for more details.
|
||||
The (empty-by-default)
|
||||
[example config](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/components/worker-config/nfd-worker.conf.example)
|
||||
contains all available configuration options and can be used as a reference
|
||||
for creating creating a configuration.
|
||||
|
||||
Configuration options can also be specified via the `-options` command line
|
||||
flag, in which case no mounts need to be used. The same format as in the config
|
||||
file must be used, i.e. JSON (or YAML). For example:
|
||||
|
||||
```bash
|
||||
-options='{"sources": { "pci": { "deviceClassWhitelist": ["12"] } } }'
|
||||
```
|
||||
|
||||
Configuration options specified from the command line will override those read
|
||||
from the config file.
|
||||
|
||||
## Using node labels
|
||||
|
||||
Nodes with specific features can be targeted using the `nodeSelector` field. The
|
||||
following example shows how to target nodes with Intel TurboBoost enabled.
|
||||
|
||||
```yaml
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
env: test
|
||||
name: golang-test
|
||||
spec:
|
||||
containers:
|
||||
- image: golang
|
||||
name: go1
|
||||
nodeSelector:
|
||||
feature.node.kubernetes.io/cpu-pstate.turbo: 'true'
|
||||
```
|
||||
|
||||
For more details on targeting nodes, see
|
||||
[node selection](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
|
||||
|
||||
## Uninstallation
|
||||
|
||||
### Operator was used for deployment
|
||||
|
||||
If you followed the deployment instructions above you can simply do:
|
||||
|
||||
```bash
|
||||
kubectl -n nfd delete NodeFeatureDiscovery my-nfd-deployment
|
||||
```
|
||||
|
||||
Optionally, you can also remove the namespace:
|
||||
|
||||
```bash
|
||||
kubectl delete ns nfd
|
||||
```
|
||||
|
||||
See the [node-feature-discovery-operator][nfd-operator] and [OLM][OLM] project
|
||||
documentation for instructions for uninstalling the operator and operator
|
||||
lifecycle manager, respectively.
|
||||
|
||||
### Manual
|
||||
|
||||
Simplest way is to invoke `kubectl delete` on the deployment files you used.
|
||||
Beware that this will also delete the namespace that NFD is running in. For
|
||||
example, in case the default deployment from the repo was used:
|
||||
|
||||
```bash
|
||||
|
||||
kubectl delete -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/default?ref={{ site.release }}
|
||||
```
|
||||
|
||||
Alternatively you can delete create objects one-by-one, depending on the type
|
||||
of deployment, for example:
|
||||
|
||||
```bash
|
||||
NFD_NS=node-feature-discovery
|
||||
kubectl -n $NFD_NS delete ds nfd-worker
|
||||
kubectl -n $NFD_NS delete deploy nfd-master
|
||||
kubectl -n $NFD_NS delete svc nfd-master
|
||||
kubectl -n $NFD_NS delete sa nfd-master
|
||||
kubectl delete clusterrole nfd-master
|
||||
kubectl delete clusterrolebinding nfd-master
|
||||
```
|
||||
|
||||
### Removing feature labels
|
||||
|
||||
NFD-Master has a special `-prune` command line flag for removing all
|
||||
nfd-related node labels, annotations and extended resources from the cluster.
|
||||
|
||||
```bash
|
||||
kubectl apply -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/prune?ref={{ site.release }}
|
||||
kubectl -n node-feature-discovery wait job.batch/nfd-master --for=condition=complete && \
|
||||
kubectl delete -k https://github.com/kubernetes-sigs/node-feature-discovery/deployment/overlays/prune?ref={{ site.release }}
|
||||
```
|
||||
|
||||
**NOTE:** You must run prune before removing the RBAC rules (serviceaccount,
|
||||
clusterrole and clusterrolebinding).
|
||||
|
||||
<!-- Links -->
|
||||
[kustomize]: https://github.com/kubernetes-sigs/kustomize
|
||||
[nfd-operator]: https://github.com/kubernetes-sigs/node-feature-discovery-operator
|
||||
[OLM]: https://github.com/operator-framework/operator-lifecycle-manager
|
|
@ -11,10 +11,10 @@ features and system configuration!
|
|||
|
||||
Continue to:
|
||||
|
||||
- **[Introduction](introduction.md)** for more details on the
|
||||
- **[Introduction](introduction)** for more details on the
|
||||
project.
|
||||
|
||||
- **[Quick start](quick-start.md)** for quick step-by-step
|
||||
- **[Quick start](quick-start)** for quick step-by-step
|
||||
instructions on how to get NFD running on your cluster.
|
||||
|
||||
## Quick-start -- the short-short version
|
||||
|
|
|
@ -96,7 +96,7 @@ NFD also annotates nodes it is running on:
|
|||
| [<instance>.]nfd.node.kubernetes.io/feature-labels | Comma-separated list of node labels managed by NFD. NFD uses this internally so must not be edited by users.
|
||||
| [<instance>.]nfd.node.kubernetes.io/extended-resources | Comma-separated list of node extended resources managed by NFD. NFD uses this internally so must not be edited by users.
|
||||
|
||||
NOTE: the [`-instance`](../advanced/master-commandline-reference.md#instance)
|
||||
NOTE: the [`-instance`](../reference/master-commandline-reference#instance)
|
||||
command line flag affects the annotation names
|
||||
|
||||
Unapplicable annotations are not created, i.e. for example master.version is
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "E2E-test config reference"
|
||||
layout: default
|
||||
sort: 7
|
||||
sort: 5
|
||||
published: false
|
||||
---
|
||||
|
9
docs/reference/index.md
Normal file
9
docs/reference/index.md
Normal file
|
@ -0,0 +1,9 @@
|
|||
---
|
||||
title: "Reference"
|
||||
layout: default
|
||||
sort: 4
|
||||
---
|
||||
|
||||
# Reference
|
||||
|
||||
Command line and configuration reference.
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Master cmdline reference"
|
||||
layout: default
|
||||
sort: 2
|
||||
sort: 1
|
||||
---
|
||||
|
||||
# Commandline flags of nfd-master
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Topology Updater Cmdline Reference"
|
||||
layout: default
|
||||
sort: 5
|
||||
sort: 4
|
||||
---
|
||||
|
||||
# NFD-Topology-Updater Commandline Flags
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Worker cmdline reference"
|
||||
layout: default
|
||||
sort: 3
|
||||
sort: 2
|
||||
---
|
||||
|
||||
# Commandline flags of nfd-worker
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Worker config reference"
|
||||
layout: default
|
||||
sort: 4
|
||||
sort: 3
|
||||
---
|
||||
|
||||
# Configuration file reference of nfd-worker
|
||||
|
@ -335,8 +335,8 @@ sources:
|
|||
|
||||
Configuration option to disable/enable hooks execution. Enabled by default.
|
||||
Hooks are DEPRECATED since v0.12.0 release and support will be removed in a
|
||||
future release. Use [feature files](./customization-guide.md#feature-files)
|
||||
instead.
|
||||
future release. Use
|
||||
[feature files](../usage//customization-guide#feature-files) instead.
|
||||
|
||||
Related tracking issues:
|
||||
|
||||
|
@ -431,7 +431,7 @@ With the example config above NFD would publish labels like:
|
|||
|
||||
List of rules to process in the custom feature source to create user-specific
|
||||
labels. Refer to the documentation of the
|
||||
[custom feature source](customization-guide.html#custom-feature-source) for
|
||||
[custom feature source](../usage/customization-guide#custom-feature-source) for
|
||||
details of the available rules and their configuration.
|
||||
|
||||
Default: *empty*
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Customization guide"
|
||||
layout: default
|
||||
sort: 5
|
||||
sort: 6
|
||||
---
|
||||
|
||||
# Customization guide
|
||||
|
@ -83,13 +83,13 @@ labels, accordingly.
|
|||
**NOTE** nfd-master is stateless and (re-)labelling only happens when a request
|
||||
is received from nfd-worker. That is, in practice rules are evaluated and
|
||||
labels for each node are created on intervals specified by the
|
||||
[`core.sleepInterval`](worker-configuration-reference#coresleepinterval)
|
||||
[`core.sleepInterval`](../reference/worker-configuration-reference#coresleepinterval)
|
||||
configuration option (or
|
||||
[`-sleep-interval`](worker-commandline-reference#-sleep-interval) command line
|
||||
flag) of nfd-worker instances. This means that modification or creation of
|
||||
`NodeFeatureRule` objects does not instantly cause the node labels to be updated.
|
||||
Instead, the changes only come visible in node labels as nfd-worker instances
|
||||
send their labelling requests.
|
||||
[`-sleep-interval`](../reference/worker-commandline-reference#-sleep-interval)
|
||||
command line flag) of nfd-worker instances. This means that modification or
|
||||
creation of `NodeFeatureRule` objects does not instantly cause the node labels
|
||||
to be updated. Instead, the changes only come visible in node labels as
|
||||
nfd-worker instances send their labelling requests.
|
||||
|
||||
## Local feature source
|
||||
|
||||
|
@ -167,7 +167,7 @@ sources:
|
|||
directory. It is the user's responsibility to review the hooks for e.g.
|
||||
possible security implications.
|
||||
|
||||
**NOTE:** The [minimal](../get-started/deployment-and-usage#minimal) image
|
||||
**NOTE:** The [minimal](../deployment/image-variants#minimal) image
|
||||
variant only supports running statically linked binaries.
|
||||
|
||||
### Feature files
|
||||
|
@ -217,7 +217,7 @@ label creation, similar to the
|
|||
that the rules are specified in the worker configuration instead of a
|
||||
Kubernetes API object.
|
||||
|
||||
See [worker configuration](../get-started/deployment-and-usage.md#worker-configuration)
|
||||
See [worker configuration](nfd-worker#worker-configuration)
|
||||
for instructions how to set-up and manage the worker configuration.
|
||||
|
||||
### An example custom feature source configuration
|
||||
|
@ -302,7 +302,7 @@ The namespace part (i.e. prefix) of the labels is controlled by nfd:
|
|||
sub-namespaces (e.g. `vendor.profile.node.kubernetes.io` and
|
||||
`sub.ns.profile.node.kubernetes.io`) by default
|
||||
- Additional namespaces may be enabled with the
|
||||
[`-extra-label-ns`](../advanced/master-commandline-reference#-extra-label-ns)
|
||||
[`-extra-label-ns`](../reference/master-commandline-reference#-extra-label-ns)
|
||||
command line flag of nfd-master
|
||||
|
||||
## Label rule format
|
||||
|
@ -497,7 +497,7 @@ The following features are available for matching:
|
|||
| | | **`turbo`** | bool | 'true' if turbo frequencies are enabled, otherwise 'false'
|
||||
| | | **`scaling`** | string | Active scaling_governor, possible values are 'powersave' or 'performance'.
|
||||
| **`cpu.rdt`** | flag | | | Intel RDT capabilities supported by the system
|
||||
| | | **`<rdt-flag>`** | | RDT capability is supported, see [RDT flags](../get-started/features#intel-rdt-flags) for details
|
||||
| | | **`<rdt-flag>`** | | RDT capability is supported, see [RDT flags](features#intel-rdt-flags) for details
|
||||
| **`cpu.security`** | attribute | | | Features related to security and trusted execution environments
|
||||
| | | **`sgx.enabled`** | bool | `true` if Intel SGX (Software Guard Extensions) has been enabled, otherwise does not exist
|
||||
| | | **`se.enabled`** | bool | `true` if IBM Secure Execution for Linux is available and has been enabled, otherwise does not exist
|
||||
|
@ -1036,5 +1036,3 @@ __In the example above:__
|
|||
`profile.node.kubernetes.io/my-datacenter=datacenter-1` if the node's name
|
||||
matches the `node-datacenter1-rack.*-server.*` pattern, e.g.
|
||||
`node-datacenter1-rack2-server42`
|
||||
|
||||
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Examples and demos"
|
||||
layout: default
|
||||
sort: 5
|
||||
sort: 7
|
||||
---
|
||||
|
||||
# Examples and demos
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: "Feature labels"
|
||||
layout: default
|
||||
sort: 4
|
||||
sort: 1
|
||||
---
|
||||
|
||||
# Feature labels
|
||||
|
@ -21,9 +21,9 @@ Features are advertised as labels in the Kubernetes Node object.
|
|||
|
||||
Label creation in nfd-worker is performed by a set of separate modules called
|
||||
label sources. The
|
||||
[`core.labelSources`](../advanced/worker-configuration-reference#corelabelsources)
|
||||
[`core.labelSources`](../reference/worker-configuration-reference#corelabelsources)
|
||||
configuration option (or
|
||||
[`-label-sources`](../advanced/worker-commandline-reference#-label-sources)
|
||||
[`-label-sources`](../reference/worker-commandline-reference#-label-sources)
|
||||
flag) of nfd-worker controls which sources to enable for label generation.
|
||||
|
||||
All built-in labels use the `feature.node.kubernetes.io` label namespace and
|
||||
|
@ -60,8 +60,8 @@ such as restricting discovered features with the -label-whitelist option.*
|
|||
| **`cpu-model.id`** | int | CPU model number.
|
||||
|
||||
The CPU label source is configurable, see
|
||||
[worker configuration](deployment-and-usage#worker-configuration) and
|
||||
[`sources.cpu`](../advanced/worker-configuration-reference#sourcescpu)
|
||||
[worker configuration](nfd-worker#worker-configuration) and
|
||||
[`sources.cpu`](../reference/worker-configuration-reference#sourcescpu)
|
||||
configuration options for details.
|
||||
|
||||
#### X86 CPUID flags (partial list)
|
||||
|
@ -101,7 +101,7 @@ configuration options for details.
|
|||
By default, the following CPUID flags have been blacklisted: BMI1, BMI2, CLMUL,
|
||||
CMOV, CX16, ERMS, F16C, HTT, LZCNT, MMX, MMXEXT, NX, POPCNT, RDRAND, RDSEED,
|
||||
RDTSCP, SGX, SSE, SSE2, SSE3, SSE4, SSE42 and SSSE3. See
|
||||
[`sources.cpu`](../advanced/worker-configuration-reference#sourcescpu)
|
||||
[`sources.cpu`](../reference/worker-configuration-reference#sourcescpu)
|
||||
configuration options to change the behavior.
|
||||
|
||||
See the full list in [github.com/klauspost/cpuid][klauspost-cpuid].
|
||||
|
@ -160,8 +160,8 @@ See the full list in [github.com/klauspost/cpuid][klauspost-cpuid].
|
|||
| **`kernel-version.revision`** | string | Third component of the kernel version (e.g. '6')
|
||||
|
||||
The kernel label source is configurable, see
|
||||
[worker configuration](deployment-and-usage#worker-configuration) and
|
||||
[`sources.kernel`](../advanced/worker-configuration-reference#sourceskernel)
|
||||
[worker configuration](nfd-worker#worker-configuration) and
|
||||
[`sources.kernel`](../reference/worker-configuration-reference#sourceskernel)
|
||||
configuration options for details.
|
||||
|
||||
### Memory
|
||||
|
@ -188,8 +188,8 @@ configuration options for details.
|
|||
|
||||
`<device label>` is format is configurable and set to `<class>_<vendor>` by
|
||||
default. For more more details about configuration of the pci labels, see
|
||||
[`sources.pci`](../advanced/worker-configuration-reference#sourcespci) options
|
||||
and [worker configuration](deployment-and-usage#worker-configuration)
|
||||
[`sources.pci`](../reference/worker-configuration-reference#sourcespci) options
|
||||
and [worker configuration](nfd-worker#worker-configuration)
|
||||
instructions.
|
||||
|
||||
### USB
|
||||
|
@ -201,8 +201,8 @@ instructions.
|
|||
`<device label>` is format is configurable and set to
|
||||
`<class>_<vendor>_<device>` by default. For more more details about
|
||||
configuration of the usb labels, see
|
||||
[`sources.usb`](../advanced/worker-configuration-reference#sourcesusb) options
|
||||
and [worker configuration](deployment-and-usage#worker-configuration)
|
||||
[`sources.usb`](../reference/worker-configuration-reference#sourcesusb) options
|
||||
and [worker configuration](nfd-worker#worker-configuration)
|
||||
instructions.
|
||||
|
||||
### Storage
|
||||
|
@ -234,7 +234,7 @@ defined built-in labels:
|
|||
## User defined labels
|
||||
|
||||
NFD has many extension points for creating vendor and application specific
|
||||
labels. See the [customization guide](../advanced/customization-guide.md) for
|
||||
labels. See the [customization guide](customization-guide) for
|
||||
detailed documentation.
|
||||
|
||||
## Extended resources
|
9
docs/usage/index.md
Normal file
9
docs/usage/index.md
Normal file
|
@ -0,0 +1,9 @@
|
|||
---
|
||||
title: "Usage"
|
||||
layout: default
|
||||
sort: 3
|
||||
---
|
||||
|
||||
# Usage
|
||||
|
||||
Usage instructions.
|
29
docs/usage/nfd-master.md
Normal file
29
docs/usage/nfd-master.md
Normal file
|
@ -0,0 +1,29 @@
|
|||
---
|
||||
title: "NFD-Master"
|
||||
layout: default
|
||||
sort: 3
|
||||
---
|
||||
|
||||
# NFD-Master
|
||||
{: .no_toc}
|
||||
|
||||
---
|
||||
|
||||
NFD-Master runs as a deployment (with a replica count of 1), by default
|
||||
it prefers running on the cluster's master nodes but will run on worker
|
||||
nodes if no master nodes are found.
|
||||
|
||||
For High Availability, you should simply increase the replica count of
|
||||
the deployment object. You should also look into adding
|
||||
[inter-pod](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity)
|
||||
affinity to prevent masters from running on the same node.
|
||||
However note that inter-pod affinity is costly and is not recommended
|
||||
in bigger clusters.
|
||||
|
||||
NFD-Master listens for connections from nfd-worker(s) and connects to the
|
||||
Kubernetes API server to add node labels advertised by them.
|
||||
|
||||
If you have RBAC authorization enabled (as is the default e.g. with clusters
|
||||
initialized with kubeadm) you need to configure the appropriate ClusterRoles,
|
||||
ClusterRoleBindings and a ServiceAccount in order for NFD to create node
|
||||
labels. The provided template will configure these for you.
|
24
docs/usage/nfd-topology-updater.md
Normal file
24
docs/usage/nfd-topology-updater.md
Normal file
|
@ -0,0 +1,24 @@
|
|||
---
|
||||
title: "NFD-Topology-Updater"
|
||||
layout: default
|
||||
sort: 5
|
||||
---
|
||||
|
||||
# NFD-Topology-Updater
|
||||
{: .no_toc}
|
||||
|
||||
---
|
||||
|
||||
NFD-Topology-Updater is preferably run as a Kubernetes DaemonSet. This assures
|
||||
re-examination (and CR updates) on regular intervals capturing changes in
|
||||
the allocated resources and hence the allocatable resources on a per zone
|
||||
basis. It makes sure that more CR instances are created as new nodes get
|
||||
added to the cluster. Topology-Updater connects to the nfd-master service
|
||||
to create CR instances corresponding to nodes.
|
||||
|
||||
When run as a daemonset, nodes are re-examined for the allocated resources
|
||||
(to determine the information of the allocatable resources on a per zone basis
|
||||
where a zone can be a NUMA node) at an interval specified using the
|
||||
[`-sleep-interval`](../reference/topology-updater-commandline-reference.html#-sleep-interval)
|
||||
option. The default sleep interval is set to 60s which is the the value when no
|
||||
-sleep-interval is specified.
|
76
docs/usage/nfd-worker.md
Normal file
76
docs/usage/nfd-worker.md
Normal file
|
@ -0,0 +1,76 @@
|
|||
---
|
||||
title: "NFD-Worker"
|
||||
layout: default
|
||||
sort: 4
|
||||
---
|
||||
|
||||
# NFD-Worker
|
||||
{: .no_toc}
|
||||
|
||||
## Table of contents
|
||||
{: .no_toc .text-delta}
|
||||
|
||||
1. TOC
|
||||
{:toc}
|
||||
|
||||
---
|
||||
|
||||
NFD-Worker is preferably run as a Kubernetes DaemonSet. This assures
|
||||
re-labeling on regular intervals capturing changes in the system configuration
|
||||
and makes sure that new nodes are labeled as they are added to the cluster.
|
||||
Worker connects to the nfd-master service to advertise hardware features.
|
||||
|
||||
When run as a daemonset, nodes are re-labeled at an default interval of 60s.
|
||||
This can be changed by using the
|
||||
[`core.sleepInterval`](../reference/worker-configuration-reference.html#coresleepinterval)
|
||||
config option (or
|
||||
[`-sleep-interval`](../reference/worker-commandline-reference.html#-sleep-interval)
|
||||
command line flag).
|
||||
|
||||
The worker configuration file is watched and re-read on every change which
|
||||
provides a simple mechanism of dynamic run-time reconfiguration. See
|
||||
[worker configuration](#worker-configuration) for more details.
|
||||
|
||||
## Worker configuration
|
||||
|
||||
NFD-Worker supports dynamic configuration through a configuration file. The
|
||||
default location is `/etc/kubernetes/node-feature-discovery/nfd-worker.conf`,
|
||||
but, this can be changed by specifying the`-config` command line flag.
|
||||
Configuration file is re-read whenever it is modified which makes run-time
|
||||
re-configuration of nfd-worker straightforward.
|
||||
|
||||
Worker configuration file is read inside the container, and thus, Volumes and
|
||||
VolumeMounts are needed to make your configuration available for NFD. The
|
||||
preferred method is to use a ConfigMap which provides easy deployment and
|
||||
re-configurability.
|
||||
|
||||
The provided nfd-worker deployment templates create an empty configmap and
|
||||
mount it inside the nfd-worker containers. In kustomize deployments,
|
||||
configuration can be edited with:
|
||||
|
||||
```bash
|
||||
kubectl -n ${NFD_NS} edit configmap nfd-worker-conf
|
||||
```
|
||||
|
||||
In Helm deployments,
|
||||
[Worker pod parameter](../deployment/helm#worker-pod-parameters)
|
||||
`worker.config` can be used to edit the respective configuration.
|
||||
|
||||
See
|
||||
[nfd-worker configuration file reference](../reference/worker-configuration-reference)
|
||||
for more details.
|
||||
The (empty-by-default)
|
||||
[example config](https://github.com/kubernetes-sigs/node-feature-discovery/blob/{{site.release}}/deployment/components/worker-config/nfd-worker.conf.example)
|
||||
contains all available configuration options and can be used as a reference
|
||||
for creating creating a configuration.
|
||||
|
||||
Configuration options can also be specified via the `-options` command line
|
||||
flag, in which case no mounts need to be used. The same format as in the config
|
||||
file must be used, i.e. JSON (or YAML). For example:
|
||||
|
||||
```bash
|
||||
-options='{"sources": { "pci": { "deviceClassWhitelist": ["12"] } } }'
|
||||
```
|
||||
|
||||
Configuration options specified from the command line will override those read
|
||||
from the config file.
|
31
docs/usage/using-labels.md
Normal file
31
docs/usage/using-labels.md
Normal file
|
@ -0,0 +1,31 @@
|
|||
---
|
||||
title: "Using node labels"
|
||||
layout: default
|
||||
sort: 2
|
||||
---
|
||||
|
||||
# Using node labels
|
||||
{: .no_toc}
|
||||
|
||||
---
|
||||
|
||||
Nodes with specific features can be targeted using the `nodeSelector` field. The
|
||||
following example shows how to target nodes with Intel TurboBoost enabled.
|
||||
|
||||
```yaml
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
env: test
|
||||
name: golang-test
|
||||
spec:
|
||||
containers:
|
||||
- image: golang
|
||||
name: go1
|
||||
nodeSelector:
|
||||
feature.node.kubernetes.io/cpu-pstate.turbo: 'true'
|
||||
```
|
||||
|
||||
For more details on targeting nodes, see
|
||||
[node selection](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
|
Loading…
Reference in a new issue