X-Git-Url: https://gerrit.akraino.org/r/gitweb?a=blobdiff_plain;f=ansible%2Froles%2Fflannel%2Ftemplates%2Fflannel-ds.yaml;h=901679c4d996dc53609c0548168c8cda64c6317e;hb=0ce09836dc2f68295a16e48753863bd6a1164879;hp=41e78a2f0da682965f64c0dafae78119975a0db5;hpb=85f2106bce174db4c77c5fe5daa13f17f5606dcd;p=ta%2Fcaas-danm.git diff --git a/ansible/roles/flannel/templates/flannel-ds.yaml b/ansible/roles/flannel/templates/flannel-ds.yaml index 41e78a2..901679c 100644 --- a/ansible/roles/flannel/templates/flannel-ds.yaml +++ b/ansible/roles/flannel/templates/flannel-ds.yaml @@ -14,7 +14,7 @@ See the License for the specific language governing permissions and limitations under the License. #} --- -apiVersion: apps/v1beta2 +apiVersion: apps/v1 kind: DaemonSet metadata: name: flannel-ds @@ -32,14 +32,14 @@ spec: tier: node {{ caas.kubernetes_component_label }}: flannel spec: + priorityClassName: "system-node-critical" hostNetwork: true dnsPolicy: ClusterFirstWithHostNet - # TODO: figure out why flannel needs to run with root to modify network settings on the host - # Some setcap calls might be missing on its binary? + # TODO: figure out why privileged mode is also not enough for flannel to modify network settings on the host (same problem as watcher) #securityContext: # runAsUser: {{ caas.uid.flannel }} tolerations: - - key: node-role.kubernetes.io/master + - key: node.kubernetes.io/master operator: Exists effect: NoSchedule containers: @@ -62,6 +62,9 @@ spec: valueFrom: fieldRef: fieldPath: metadata.namespace + resources: + requests: + cpu: "10m" volumeMounts: - name: time-mount mountPath: /etc/localtime