--- apiVersion: apps/v1 kind: DaemonSet metadata: annotations: deprecated.daemonset.template.generation: "1" kubernetes.io/description: | This daemon set launches the Multus admisson controller component on each node. networkoperator.openshift.io/non-critical: "" release.openshift.io/version: 0.0.1-2020-05-26-050349 creationTimestamp: "2020-05-26T14:15:50Z" generation: 1 labels: app: multus-admission-controller managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deprecated.daemonset.template.generation: {} f:kubernetes.io/description: {} f:networkoperator.openshift.io/non-critical: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:ownerReferences: .: {} k:{"uid":"50031c94-522c-48d8-9c65-ba159c57d100"}: .: {} f:apiVersion: {} f:blockOwnerDeletion: {} f:controller: {} f:kind: {} f:name: {} f:uid: {} f:spec: f:revisionHistoryLimit: {} f:selector: f:matchLabels: .: {} f:app: {} f:namespace: {} f:template: f:metadata: f:labels: .: {} f:app: {} f:component: {} f:namespace: {} f:openshift.io/component: {} f:type: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/webhook"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"name":"multus-admission-controller"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":9091,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/webhook"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:nodeSelector: .: {} f:node-role.kubernetes.io/master: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"webhook-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} f:updateStrategy: f:rollingUpdate: .: {} f:maxUnavailable: {} f:type: {} f:status: f:currentNumberScheduled: {} f:desiredNumberScheduled: {} f:numberReady: {} manager: cluster-network-operator operation: Update time: "2020-05-26T16:29:50Z" name: multus-admission-controller namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 50031c94-522c-48d8-9c65-ba159c57d100 resourceVersion: "52743" selfLink: /apis/apps/v1/namespaces/openshift-multus/daemonsets/multus-admission-controller uid: 8d9e18f4-a5a9-45b4-a855-b19b27a46ae2 spec: revisionHistoryLimit: 10 selector: matchLabels: app: multus-admission-controller namespace: openshift-multus template: metadata: creationTimestamp: null labels: app: multus-admission-controller component: network namespace: openshift-multus openshift.io/component: network type: infra spec: containers: - args: - -bind-address=0.0.0.0 - -port=6443 - -tls-private-key-file=/etc/webhook/tls.key - -tls-cert-file=/etc/webhook/tls.crt - -alsologtostderr=true - -metrics-listen-address=127.0.0.1:9091 command: - /usr/bin/webhook image: registry.svc.ci.openshift.org/ci-ln-6vywnkk/stable@sha256:0d664435a745d502c0874504026c03f192ff683ec9dd664e63337e949bd1ee59 imagePullPolicy: IfNotPresent name: multus-admission-controller ports: - containerPort: 9091 name: metrics-port protocol: TCP resources: requests: cpu: 10m terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/webhook name: webhook-certs readOnly: true - args: - --logtostderr - --secure-listen-address=:8443 - --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - --upstream=http://127.0.0.1:9091/ - --tls-private-key-file=/etc/webhook/tls.key - --tls-cert-file=/etc/webhook/tls.crt image: registry.svc.ci.openshift.org/ci-ln-6vywnkk/stable@sha256:29f0d4919af5f9159b3bdc4deb8929b0e9320640dd4985546ca68b87d1cadf30 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: requests: cpu: 10m memory: 20Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/webhook name: webhook-certs readOnly: true dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: multus serviceAccountName: multus terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists volumes: - name: webhook-certs secret: defaultMode: 420 secretName: multus-admission-controller-secret updateStrategy: rollingUpdate: maxUnavailable: 1 type: RollingUpdate status: currentNumberScheduled: 3 desiredNumberScheduled: 3 numberAvailable: 3 numberMisscheduled: 0 numberReady: 3 observedGeneration: 1 updatedNumberScheduled: 3