You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/nw-controlling-dns-pod-placement.adoc
+37-8Lines changed: 37 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,12 @@
8
8
9
9
The DNS Operator has two daemon sets: one for CoreDNS called `dns-default` and one for managing the `/etc/hosts` file called `node-resolver`.
10
10
11
-
You might find a need to control which nodes have CoreDNS pods assigned and running, although this is not a common operation. For example, if the cluster administrator has configured security policies that can prohibit communication between pairs of nodes, that would necessitate restricting the set of nodes on which the daemonset for CoreDNS runs. If DNS pods are running on some nodes in the cluster and the nodes where DNS pods are not running have network connectivity to nodes where DNS pods are running, DNS service will be available to all pods.
11
+
You can assign and run CoreDNS pods on specified nodes. For example, if the cluster administrator has configured security policies that prohibit communication between pairs of nodes, you can configure CoreDNS pods to run on a restricted set of nodes.
12
+
13
+
DNS service is available to all pods if the following circumstances are true:
14
+
15
+
* DNS pods are running on some nodes in the cluster.
16
+
* The nodes on which DNS pods are not running have network connectivity to nodes on which DNS pods are running,
12
17
13
18
The `node-resolver` daemon set must run on every node host because it adds an entry for the cluster image registry to support pulling images. The `node-resolver` pods have only one job: to look up the `image-registry.openshift-image-registry.svc` service's cluster IP address and add it to `/etc/hosts` on the node host so that the container runtime can resolve the service name.
14
19
@@ -23,25 +28,49 @@ As a cluster administrator, you can use a custom node selector to configure the
23
28
.Procedure
24
29
25
30
* To allow the daemon set for CoreDNS to run on certain nodes, configure a taint and toleration:
31
+
32
+
. Set a taint on the nodes that you want to control DNS pod placement by entering the following command:
0 commit comments