
Automatic merge from submit-queue Bump exechealthz image With the new image at least if we observe an exec container taking more ram than it should (like the oom situation, which shouldn't happen today because of the increased limits), we can kubectl exec and check the pprof endpoints. Note that I'm not bumping the rc version, because I just did so with: https://github.com/kubernetes/kubernetes/pull/29693.
121 lines
3.9 KiB
Plaintext
121 lines
3.9 KiB
Plaintext
# Copyright 2016 The Kubernetes Authors.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
# This file should be kept in sync with cluster/images/hyperkube/dns-rc.yaml
|
|
|
|
# TODO - At some point, we need to rename all skydns-*.yaml.* files to kubedns-*.yaml.*
|
|
|
|
# __MACHINE_GENERATED_WARNING__
|
|
|
|
apiVersion: v1
|
|
kind: ReplicationController
|
|
metadata:
|
|
name: kube-dns-v19
|
|
namespace: kube-system
|
|
labels:
|
|
k8s-app: kube-dns
|
|
version: v19
|
|
kubernetes.io/cluster-service: "true"
|
|
spec:
|
|
replicas: __PILLAR__DNS__REPLICAS__
|
|
selector:
|
|
k8s-app: kube-dns
|
|
version: v19
|
|
template:
|
|
metadata:
|
|
labels:
|
|
k8s-app: kube-dns
|
|
version: v19
|
|
kubernetes.io/cluster-service: "true"
|
|
spec:
|
|
containers:
|
|
- name: kubedns
|
|
image: gcr.io/google_containers/kubedns-amd64:1.6
|
|
resources:
|
|
# TODO: Set memory limits when we've profiled the container for large
|
|
# clusters, then set request = limit to keep this container in
|
|
# guaranteed class. Currently, this container falls into the
|
|
# "burstable" category so the kubelet doesn't backoff from restarting it.
|
|
limits:
|
|
cpu: 100m
|
|
memory: 170Mi
|
|
requests:
|
|
cpu: 100m
|
|
memory: 70Mi
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /healthz
|
|
port: 8080
|
|
scheme: HTTP
|
|
initialDelaySeconds: 60
|
|
timeoutSeconds: 5
|
|
successThreshold: 1
|
|
failureThreshold: 5
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /readiness
|
|
port: 8081
|
|
scheme: HTTP
|
|
# we poll on pod startup for the Kubernetes master service and
|
|
# only setup the /readiness HTTP server once that's available.
|
|
initialDelaySeconds: 30
|
|
timeoutSeconds: 5
|
|
args:
|
|
# command = "/kube-dns"
|
|
- --domain=__PILLAR__DNS__DOMAIN__.
|
|
- --dns-port=10053
|
|
__PILLAR__FEDERATIONS__DOMAIN__MAP__
|
|
ports:
|
|
- containerPort: 10053
|
|
name: dns-local
|
|
protocol: UDP
|
|
- containerPort: 10053
|
|
name: dns-tcp-local
|
|
protocol: TCP
|
|
- name: dnsmasq
|
|
image: gcr.io/google_containers/kube-dnsmasq-amd64:1.3
|
|
args:
|
|
- --cache-size=1000
|
|
- --no-resolv
|
|
- --server=127.0.0.1#10053
|
|
ports:
|
|
- containerPort: 53
|
|
name: dns
|
|
protocol: UDP
|
|
- containerPort: 53
|
|
name: dns-tcp
|
|
protocol: TCP
|
|
- name: healthz
|
|
image: gcr.io/google_containers/exechealthz-amd64:1.1
|
|
resources:
|
|
# keep request = limit to keep this container in guaranteed class
|
|
limits:
|
|
cpu: 10m
|
|
memory: 50Mi
|
|
requests:
|
|
cpu: 10m
|
|
# Note that this container shouldn't really need 50Mi of memory. The
|
|
# limits are set higher than expected pending investigation on #29688.
|
|
# The extra memory was stolen from the kubedns container to keep the
|
|
# net memory requested by the pod constant.
|
|
memory: 50Mi
|
|
args:
|
|
- -cmd=nslookup kubernetes.default.svc.__PILLAR__DNS__DOMAIN__ 127.0.0.1 >/dev/null && nslookup kubernetes.default.svc.__PILLAR__DNS__DOMAIN__ 127.0.0.1:10053 >/dev/null
|
|
- -port=8080
|
|
- -quiet
|
|
ports:
|
|
- containerPort: 8080
|
|
protocol: TCP
|
|
dnsPolicy: Default # Don't use cluster DNS.
|