This page shows how to perform a rolling update on a DaemonSet.
DaemonSet has two update strategy types :
OnDelete
update strategy, after you update a DaemonSet template, new
DaemonSet pods will only be created when you manually delete old DaemonSet
pods. This is the same behavior of DaemonSet in Kubernetes version 1.5 or
before.RollingUpdate
update strategy, after you update a
DaemonSet template, old DaemonSet pods will be killed, and new DaemonSet pods
will be created automatically, in a controlled fashion.If you try a rolling update on a DaemonSet that was created from Kubernetes
version 1.5 or before, a rollout will be triggered when you first change the
DaemonSet update strategy to RollingUpdate
, no matter if DaemonSet template is
modified or not. If the DaemonSet template is not changed, all existing DaemonSet
pods will be restarted (deleted and created).
Therefore, make sure you want to trigger a rollout before you first switch the
strategy to RollingUpdate
.
To enable the rolling update feature of a DaemonSet, you must set its
.spec.updateStrategy.type
to RollingUpdate
.
You may want to set .spec.updateStrategy.rollingUpdate.maxUnavailable
(default
to 1) and .spec.minReadySeconds
(default to 0) as well.
RollingUpdate
update strategyFirst, check the update strategy of your DaemonSet, and make sure it’s set to RollingUpdate:
kubectl get ds/<daemonset-name> -o go-template='{{.spec.updateStrategy.type}}{{"\n"}}'
If you haven’t created the DaemonSet in the system, check your DaemonSet manifest with the following command instead:
kubectl create -f ds.yaml --dry-run -o go-template='{{.spec.updateStrategy.type}}{{"\n"}}'
The output from both commands should be:
RollingUpdate
If the output isn’t RollingUpdate
, go back and modify the DaemonSet object or
manifest accordingly.
RollingUpdate
update strategyIf you have already created the DaemonSet, you may skip this step and jump to step 3.
After verifying the update strategy of the DaemonSet manifest, create the DaemonSet:
kubectl create -f ds.yaml
Alternatively, use kubectl apply
to create the same DaemonSet if you plan to
update the DaemonSet with kubectl apply
.
kubectl apply -f ds.yaml
Any updates to a RollingUpdate
DaemonSet .spec.template
will trigger a rolling
update. This can be done with several different kubectl
commands.
If you update DaemonSets using
configuration files,
use kubectl apply
:
kubectl apply -f ds-v2.yaml
If you update DaemonSets using
imperative commands,
use kubectl edit
or kubectl patch
:
kubectl edit ds/<daemonset-name>
kubectl patch ds/<daemonset-name> -p=<strategic-merge-patch>
If you just need to update the container image in the DaemonSet template, i.e.
.spec.template.spec.containers[*].image
, use kubectl set image
:
kubectl set image ds/<daemonset-name> <container-name>=<container-new-image>
Finally, watch the rollout status of the latest DaemonSet rolling update:
kubectl rollout status ds/<daemonset-name>
When the rollout is complete, the output is similar to this:
daemonset "<daemonset-name>" successfully rolled out
Sometimes, a DaemonSet rolling update may be stuck. Here are some possible causes:
The rollout is stuck because new DaemonSet pods can’t be scheduled on at least one node. This is possible when the node is running out of resources.
When this happens, find the nodes that don’t have the DaemonSet pods scheduled on
by comparing the output of kubectl get nodes
and the output of:
kubectl get pods -l <daemonset-selector-key>=<daemonset-selector-value> -o wide
Once you’ve found those nodes, delete some non-DaemonSet pods from the node to make room for new DaemonSet pods. Note that this will cause service disruption if the deleted pods are not controlled by any controllers, or if the pods aren’t replicated. This doesn’t respect PodDisruptionBudget either.
If the recent DaemonSet template update is broken, for example, the container is crash looping, or the container image doesn’t exist (often due to a typo), DaemonSet rollout won’t progress.
To fix this, just update the DaemonSet template again. New rollout won’t be blocked by previous unhealthy rollouts.
If .spec.minReadySeconds
is specified in the DaemonSet, clock skew between
master and nodes will make DaemonSet unable to detect the right rollout
progress.