Skip to content

Commit 7afae8d

Browse files
authored
Merge pull request #91315 from kquinn1204/OCPBUGS-54352
OCPBUGS-54352 Default value seems to be set to false for the parameter enableInjector and enableOperatorWebhook
2 parents 4518af4 + 3702dee commit 7afae8d

File tree

1 file changed

+12
-15
lines changed

1 file changed

+12
-15
lines changed

modules/nw-sriov-configuring-operator.adoc

+12-15
Original file line numberDiff line numberDiff line change
@@ -15,21 +15,20 @@
1515
apiVersion: sriovnetwork.openshift.io/v1
1616
kind: SriovOperatorConfig
1717
metadata:
18-
name: default
18+
name: default <1>
1919
namespace: openshift-sriov-network-operator
2020
spec:
2121
disableDrain: false
22-
enableInjector: true
23-
enableOperatorWebhook: true
22+
enableInjector: true <2>
23+
enableOperatorWebhook: true <3>
2424
logLevel: 2
2525
featureGates:
2626
metricsExporter: false
2727
----
2828
+
29-
[NOTE]
30-
====
31-
The only valid name for the `SriovOperatorConfig` resource is `default` and it must be in the namespace where the Operator is deployed.
32-
====
29+
<1> The only valid name for the `SriovOperatorConfig` resource is `default` and it must be in the namespace where the Operator is deployed.
30+
<2> The `enableInjector` field, if not specified in the CR or explicitly set to `true`, defaults to `false` or `<none>`, preventing any `network-resources-injector` pod from running in the namespace. The recommended setting is `true`.
31+
<3> The `enableOperatorWebhook` field, if not specified in the CR or explicitly set to true, defaults to `false` or `<none>`, preventing any `operator-webhook` pod from running in the namespace. The recommended setting is `true`.
3332

3433
.. Create the resource by running the following command:
3534
+
@@ -75,12 +74,11 @@ For single-node clusters, set this field to `true` after installing the Operator
7574
|`spec.enableInjector`
7675
|`boolean`
7776
|Specifies whether to enable or disable the Network Resources Injector daemon set.
78-
By default, this field is set to `true`.
7977

8078
|`spec.enableOperatorWebhook`
8179
|`boolean`
8280
|Specifies whether to enable or disable the Operator Admission Controller webhook daemon set.
83-
By default, this field is set to `true`.
81+
8482

8583
|`spec.logLevel`
8684
|`integer`
@@ -113,7 +111,7 @@ The Network Resources Injector is a Kubernetes Dynamic Admission Controller appl
113111
* Mutation of resource requests and limits in a pod specification to add an SR-IOV resource name according to an SR-IOV network attachment definition annotation.
114112
* Mutation of a pod specification with a Downward API volume to expose pod annotations, labels, and huge pages requests and limits. Containers that run in the pod can access the exposed information as files under the `/etc/podnetinfo` path.
115113

116-
By default, the Network Resources Injector is enabled by the SR-IOV Network Operator and runs as a daemon set on all control plane nodes. The following is an example of Network Resources Injector pods running in a cluster with three control plane nodes:
114+
The Network Resources Injector is enabled by the SR-IOV Network Operator when the `enableInjector` is set to `true` in the `SriovOperatorConfig` CR. The `network-resources-injector` pod runs as a daemon set on all control plane nodes. The following is an example of Network Resources Injector pods running in a cluster with three control plane nodes:
117115

118116
[source,terminal]
119117
----
@@ -155,7 +153,7 @@ spec:
155153
[id="disable-enable-network-resource-injector_{context}"]
156154
== Disabling or enabling the Network Resources Injector
157155

158-
To disable or enable the Network Resources Injector, which is enabled by default, complete the following procedure.
156+
To disable or enable the Network Resources Injector, complete the following procedure.
159157

160158
.Prerequisites
161159

@@ -193,13 +191,12 @@ spec:
193191
[id="about-sr-iov-operator-admission-control-webhook_{context}"]
194192
== About the SR-IOV Network Operator admission controller webhook
195193

196-
The SR-IOV Network Operator Admission Controller webhook is a Kubernetes Dynamic
197-
Admission Controller application. It provides the following capabilities:
194+
The SR-IOV Network Operator Admission Controller webhook is a Kubernetes Dynamic Admission Controller application. It provides the following capabilities:
198195

199196
* Validation of the `SriovNetworkNodePolicy` CR when it is created or updated.
200197
* Mutation of the `SriovNetworkNodePolicy` CR by setting the default value for the `priority` and `deviceType` fields when the CR is created or updated.
201198

202-
By default the SR-IOV Network Operator Admission Controller webhook is enabled by the Operator and runs as a daemon set on all control plane nodes.
199+
The SR-IOV Network Operator Admission Controller webhook is enabled by the Operator when the `enableOperatorWebhook` is set to `true` in the `SriovOperatorConfig` CR. The `operator-webhook` pod runs as a daemon set on all control plane nodes.
203200

204201
[NOTE]
205202
====
@@ -225,7 +222,7 @@ operator-webhook-rpfrl 1/1 Running 0 16m
225222
[id="disable-enable-sr-iov-operator-admission-control-webhook_{context}"]
226223
== Disabling or enabling the SR-IOV Network Operator admission controller webhook
227224

228-
To disable or enable the admission controller webhook, which is enabled by default, complete the following procedure.
225+
To disable or enable the admission controller webhook, complete the following procedure.
229226

230227
.Prerequisites
231228

0 commit comments

Comments
 (0)