48e77cd8bb
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by: Bogdan Dobrelya <bogdando@mail.ru>
38 lines
1.1 KiB
YAML
38 lines
1.1 KiB
YAML
apiVersion: extensions/v1beta1
|
|
kind: DaemonSet
|
|
metadata:
|
|
labels:
|
|
app: netchecker-agent
|
|
name: netchecker-agent
|
|
namespace: {{ netcheck_namespace }}
|
|
spec:
|
|
template:
|
|
metadata:
|
|
name: netchecker-agent
|
|
labels:
|
|
app: netchecker-agent
|
|
spec:
|
|
containers:
|
|
- name: netchecker-agent
|
|
image: "{{ agent_img }}"
|
|
env:
|
|
- name: MY_POD_NAME
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.name
|
|
- name: REPORT_INTERVAL
|
|
value: '{{ agent_report_interval }}'
|
|
imagePullPolicy: {{ k8s_image_pull_policy }}
|
|
securityContext:
|
|
capabilities:
|
|
drop:
|
|
{% for c in apps_drop_cap %}
|
|
- {{ c.upper() }}
|
|
{% endfor %}
|
|
resources:
|
|
limits:
|
|
cpu: {{ netchecker_agent_cpu_limit }}
|
|
memory: {{ netchecker_agent_memory_limit }}
|
|
requests:
|
|
cpu: {{ netchecker_agent_cpu_requests }}
|
|
memory: {{ netchecker_agent_memory_requests }}
|