Files
homelab/k8s/infra/vpn/netbird/agent/daemon-set.yaml
renovate[bot] 1efb017ef0 chore(deps): renovate 2025-01-26
chore(deps): update helm release argo-cd to v7.7.17

chore(deps): update keycloak docker tag to v24.4.6

chore(deps): update helm release node-feature-discovery to v0.17.1

chore(deps): update sealed-secrets docker tag to v2.5.4

chore(deps): update proxmox-csi-plugin docker tag to v0.3.4

chore(deps): update dependency cert-manager/cert-manager to v1.16.3

chore(deps): update dependency siderolabs/talos to v1.9.2

chore(deps): update netbird

chore(deps): update netbirdio/relay docker tag to v0.36.3

chore(deps): update cilium to v1.16.6

chore(deps): update docker.io/adguard/adguardhome docker tag to v0.107.56

chore(deps): update media containers

chore(deps): update terraform talos to v0.7.1

chore(deps): update dependency crossplane-contrib/provider-keycloak to v1.10.1

chore(deps): update terraform proxmox to v0.70.0
2025-01-26 15:59:50 +01:00

51 lines
1.4 KiB
YAML

apiVersion: apps/v1
kind: DaemonSet
metadata:
name: agent
namespace: netbird
spec:
selector:
matchLabels:
app: agent
template:
metadata:
labels:
app: agent
spec:
securityContext:
seccompProfile:
type: RuntimeDefault
sysctls:
# Considered unsafe, need to enable with kubelet argument.
# see https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls
- name: net.ipv4.conf.all.src_valid_mark
value: "1"
containers:
- name: agent
image: docker.io/netbirdio/netbird:0.36.3 # renovate: docker=docker.io/netbirdio/netbird
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: false
runAsNonRoot: false
capabilities:
drop: [ ALL ]
add: [ NET_ADMIN, NET_RAW, PERFMON, BPF ]
envFrom:
- configMapRef:
name: agent-config
- secretRef:
name: agent-setup-key
volumeMounts:
- name: netbird
mountPath: /var/lib/netbird
resources:
requests:
memory: 128Mi
cpu: 100m
limits:
memory: 256Mi
cpu: 4000m
volumes:
- name: netbird
emptyDir: { }