You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/nw-sriov-configuring-operator.adoc
+12-15
Original file line number
Diff line number
Diff line change
@@ -15,21 +15,20 @@
15
15
apiVersion: sriovnetwork.openshift.io/v1
16
16
kind: SriovOperatorConfig
17
17
metadata:
18
-
name: default
18
+
name: default <1>
19
19
namespace: openshift-sriov-network-operator
20
20
spec:
21
21
disableDrain: false
22
-
enableInjector: true
23
-
enableOperatorWebhook: true
22
+
enableInjector: true <2>
23
+
enableOperatorWebhook: true <3>
24
24
logLevel: 2
25
25
featureGates:
26
26
metricsExporter: false
27
27
----
28
28
+
29
-
[NOTE]
30
-
====
31
-
The only valid name for the `SriovOperatorConfig` resource is `default` and it must be in the namespace where the Operator is deployed.
32
-
====
29
+
<1> The only valid name for the `SriovOperatorConfig` resource is `default` and it must be in the namespace where the Operator is deployed.
30
+
<2> The `enableInjector` field, if not specified in the CR or explicitly set to `true`, defaults to `false` or `<none>`, preventing any `network-resources-injector` pod from running in the namespace. The recommended setting is `true`.
31
+
<3> The `enableOperatorWebhook` field, if not specified in the CR or explicitly set to true, defaults to `false` or `<none>`, preventing any `operator-webhook` pod from running in the namespace. The recommended setting is `true`.
33
32
34
33
.. Create the resource by running the following command:
35
34
+
@@ -75,12 +74,11 @@ For single-node clusters, set this field to `true` after installing the Operator
75
74
|`spec.enableInjector`
76
75
|`boolean`
77
76
|Specifies whether to enable or disable the Network Resources Injector daemon set.
78
-
By default, this field is set to `true`.
79
77
80
78
|`spec.enableOperatorWebhook`
81
79
|`boolean`
82
80
|Specifies whether to enable or disable the Operator Admission Controller webhook daemon set.
83
-
By default, this field is set to `true`.
81
+
84
82
85
83
|`spec.logLevel`
86
84
|`integer`
@@ -113,7 +111,7 @@ The Network Resources Injector is a Kubernetes Dynamic Admission Controller appl
113
111
* Mutation of resource requests and limits in a pod specification to add an SR-IOV resource name according to an SR-IOV network attachment definition annotation.
114
112
* Mutation of a pod specification with a Downward API volume to expose pod annotations, labels, and huge pages requests and limits. Containers that run in the pod can access the exposed information as files under the `/etc/podnetinfo` path.
115
113
116
-
By default, the Network Resources Injector is enabled by the SR-IOV Network Operator and runs as a daemon set on all control plane nodes. The following is an example of Network Resources Injector pods running in a cluster with three control plane nodes:
114
+
The Network Resources Injector is enabled by the SR-IOV Network Operator when the `enableInjector` is set to `true` in the `SriovOperatorConfig` CR. The `network-resources-injector` pod runs as a daemon set on all control plane nodes. The following is an example of Network Resources Injector pods running in a cluster with three control plane nodes:
== About the SR-IOV Network Operator admission controller webhook
195
193
196
-
The SR-IOV Network Operator Admission Controller webhook is a Kubernetes Dynamic
197
-
Admission Controller application. It provides the following capabilities:
194
+
The SR-IOV Network Operator Admission Controller webhook is a Kubernetes Dynamic Admission Controller application. It provides the following capabilities:
198
195
199
196
* Validation of the `SriovNetworkNodePolicy` CR when it is created or updated.
200
197
* Mutation of the `SriovNetworkNodePolicy` CR by setting the default value for the `priority` and `deviceType` fields when the CR is created or updated.
201
198
202
-
By default the SR-IOV Network Operator Admission Controller webhook is enabled by the Operator and runs as a daemon set on all control plane nodes.
199
+
The SR-IOV Network Operator Admission Controller webhook is enabled by the Operator when the `enableOperatorWebhook` is set to `true` in the `SriovOperatorConfig` CR. The `operator-webhook` pod runs as a daemon set on all control plane nodes.
0 commit comments