4 name: node-feature-discovery # NFD namespace
10 namespace: node-feature-discovery
12 apiVersion: rbac.authorization.k8s.io/v1
26 apiVersion: rbac.authorization.k8s.io/v1
27 kind: ClusterRoleBinding
31 apiGroup: rbac.authorization.k8s.io
35 - kind: ServiceAccount
37 namespace: node-feature-discovery
45 namespace: node-feature-discovery
55 serviceAccount: nfd-master
57 node-role.kubernetes.io/master: ""
59 - key: "node-role.kubernetes.io/master"
68 fieldPath: spec.nodeName
69 image: quay.io/kubernetes_incubator/node-feature-discovery:v0.4.0
73 ## Enable TLS authentication
74 ## The example below assumes having the root certificate named ca.crt stored in
75 ## a ConfigMap named nfd-ca-cert, and, the TLS authentication credentials stored
76 ## in a TLS Secret named nfd-master-cert.
77 ## Additional hardening can be enabled by specifying --verify-node-name in
78 ## args, in which case every nfd-worker requires a individual node-specific
81 # - "--ca-file=/etc/kubernetes/node-feature-discovery/trust/ca.crt"
82 # - "--key-file=/etc/kubernetes/node-feature-discovery/certs/tls.key"
83 # - "--cert-file=/etc/kubernetes/node-feature-discovery/certs/tls.crt"
86 # mountPath: "/etc/kubernetes/node-feature-discovery/trust"
88 # - name: nfd-master-cert
89 # mountPath: "/etc/kubernetes/node-feature-discovery/certs"
95 # - name: nfd-master-cert
97 # secretName: nfd-master-cert
103 namespace: node-feature-discovery