Uploaded image for project: 'OpenShift Authentication'
  1. OpenShift Authentication
  2. AUTH-411

Exclude runtime zero namespaces from pod security

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Undefined Undefined
    • openshift-4.14
    • None
    • None
    • Auth - Sprint 240

      What

      Exclude runtime zero namespaces from pod security admission.

      Why

      After investigations on managed clusters with regards to the default and kube-system, we found out that the violating workloads are not belonging to OpenShift.

      On kube-system, cloud providers run their workloads: https://redhat-internal.slack.com/archives/CB48XQ4KZ/p1689699300541729?thread_ts=1689256615.032909&cid=CB48XQ4KZ.

      On default a lot of workloads are being created, when the customer forgot to set a dedicated target namespace.

      Adding those namespaces to the ocp namespaces isn't feasible as they are special namespaces (runtime level zero namespaces).

              slaznick@redhat.com Stanislav Láznička (Inactive)
              kostrows@redhat.com Krzysztof Ostrowski
              Giriyamma Karagere Ramaswamy Giriyamma Karagere Ramaswamy (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              10 Start watching this issue

                Created:
                Updated:
                Resolved: