Uploaded image for project: 'OpenShift Authentication'
  1. OpenShift Authentication
  2. AUTH-411

Exclude runtime zero namespaces from pod security

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Undefined Undefined
    • openshift-4.14
    • None
    • None
    • Auth - Sprint 240

      What

      Exclude runtime zero namespaces from pod security admission.

      Why

      After investigations on managed clusters with regards to the default and kube-system, we found out that the violating workloads are not belonging to OpenShift.

      On kube-system, cloud providers run their workloads: https://redhat-internal.slack.com/archives/CB48XQ4KZ/p1689699300541729?thread_ts=1689256615.032909&cid=CB48XQ4KZ.

      On default a lot of workloads are being created, when the customer forgot to set a dedicated target namespace.

      Adding those namespaces to the ocp namespaces isn't feasible as they are special namespaces (runtime level zero namespaces).

            slaznick@redhat.com Stanislav Láznička
            kostrows@redhat.com Krzysztof Ostrowski
            Giriyamma Karagere Ramaswamy Giriyamma Karagere Ramaswamy (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            10 Start watching this issue

              Created:
              Updated:
              Resolved: