k3s/manifests/coredns.yaml

202 lines
4.3 KiB
YAML
Raw Normal View History

2019-01-22 21:14:58 +00:00
apiVersion: v1
kind: ServiceAccount
metadata:
name: coredns
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
2019-01-22 21:14:58 +00:00
kind: ClusterRole
metadata:
labels:
kubernetes.io/bootstrapping: rbac-defaults
name: system:coredns
rules:
- apiGroups:
- ""
resources:
- endpoints
- services
- pods
- namespaces
verbs:
- list
- watch
- apiGroups:
- discovery.k8s.io
2019-01-22 21:14:58 +00:00
resources:
- endpointslices
2019-01-22 21:14:58 +00:00
verbs:
- list
- watch
2019-01-22 21:14:58 +00:00
---
apiVersion: rbac.authorization.k8s.io/v1
2019-01-22 21:14:58 +00:00
kind: ClusterRoleBinding
metadata:
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
labels:
kubernetes.io/bootstrapping: rbac-defaults
name: system:coredns
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:coredns
subjects:
- kind: ServiceAccount
name: coredns
namespace: kube-system
---
apiVersion: v1
kind: ConfigMap
metadata:
name: coredns
namespace: kube-system
data:
Corefile: |
.:53 {
errors
health
2019-10-14 22:33:49 +00:00
ready
2019-04-12 06:06:35 +00:00
kubernetes %{CLUSTER_DOMAIN}% in-addr.arpa ip6.arpa {
2019-01-22 21:14:58 +00:00
pods insecure
fallthrough in-addr.arpa ip6.arpa
}
2019-04-16 23:42:23 +00:00
hosts /etc/coredns/NodeHosts {
ttl 60
reload 15s
2019-04-16 23:42:23 +00:00
fallthrough
}
2019-01-22 21:14:58 +00:00
prometheus :9153
2019-09-19 00:11:04 +00:00
forward . /etc/resolv.conf
2019-01-22 21:14:58 +00:00
cache 30
loop
reload
loadbalance
}
---
2019-09-20 01:45:28 +00:00
apiVersion: apps/v1
2019-01-22 21:14:58 +00:00
kind: Deployment
metadata:
name: coredns
namespace: kube-system
labels:
k8s-app: kube-dns
kubernetes.io/name: "CoreDNS"
spec:
#replicas: 1
strategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 1
selector:
matchLabels:
k8s-app: kube-dns
template:
metadata:
labels:
k8s-app: kube-dns
spec:
priorityClassName: "system-cluster-critical"
2019-01-22 21:14:58 +00:00
serviceAccountName: coredns
tolerations:
- key: "CriticalAddonsOnly"
operator: "Exists"
- key: "node-role.kubernetes.io/control-plane"
operator: "Exists"
effect: "NoSchedule"
- key: "node-role.kubernetes.io/master"
operator: "Exists"
effect: "NoSchedule"
2019-01-22 21:14:58 +00:00
nodeSelector:
beta.kubernetes.io/os: linux
containers:
- name: coredns
image: %{SYSTEM_DEFAULT_REGISTRY}%rancher/mirrored-coredns-coredns:1.8.4
2019-01-22 21:14:58 +00:00
imagePullPolicy: IfNotPresent
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
args: [ "-conf", "/etc/coredns/Corefile" ]
volumeMounts:
- name: config-volume
mountPath: /etc/coredns
readOnly: true
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
- containerPort: 9153
name: metrics
protocol: TCP
securityContext:
allowPrivilegeEscalation: false
capabilities:
add:
- NET_BIND_SERVICE
drop:
- all
readOnlyRootFilesystem: true
livenessProbe:
httpGet:
path: /health
port: 8080
scheme: HTTP
initialDelaySeconds: 60
periodSeconds: 10
timeoutSeconds: 1
2019-01-22 21:14:58 +00:00
successThreshold: 1
failureThreshold: 3
2019-10-14 22:33:49 +00:00
readinessProbe:
httpGet:
path: /ready
port: 8181
scheme: HTTP
initialDelaySeconds: 0
periodSeconds: 2
timeoutSeconds: 1
2019-10-14 22:33:49 +00:00
successThreshold: 1
failureThreshold: 3
2019-01-22 21:14:58 +00:00
dnsPolicy: Default
volumes:
- name: config-volume
configMap:
name: coredns
items:
- key: Corefile
path: Corefile
2019-04-16 23:42:23 +00:00
- key: NodeHosts
path: NodeHosts
2019-01-22 21:14:58 +00:00
---
apiVersion: v1
kind: Service
metadata:
name: kube-dns
namespace: kube-system
annotations:
prometheus.io/port: "9153"
prometheus.io/scrape: "true"
labels:
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: "CoreDNS"
spec:
selector:
k8s-app: kube-dns
clusterIP: %{CLUSTER_DNS}%
2019-01-22 21:14:58 +00:00
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
- name: metrics
port: 9153
protocol: TCP