Uploaded image for project: 'OpenShift Container Platform (OCP) Strategy'
  1. OpenShift Container Platform (OCP) Strategy
  2. OCPSTRAT-2397

DRA: Namespace Controlled Admin Access - GA 4.21

XMLWordPrintable

    • Product / Portfolio Work
    • OCPSTRAT-1692AI Workloads for OpenShift
    • 0% To Do, 100% In Progress, 0% Done
    • False
    • Hide

      None

      Show
      None
    • False
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      https://github.com/kubernetes/enhancements/issues/5018

      Feature Overview (aka. Goal Summary)  

      Give cluster admins read/limited-write access to in-use DRA ResourceClaims (and templates) so they can see device status, debug allocations, and, where safe, take admin actions without disrupting tenants. 

      User story

      As an OpenShift admin, I want admin-level access to DRA ResourceClaims and ResourceClaimTemplates so that I can monitor, troubleshoot, and (when allowed) intervene in device allocations used by workloads, without impersonating app owners or breaking isolation.

      Why this matters (problem → outcome)

      • Today: Once a workload holds a ResourceClaim, admins have limited visibility/controls, making GPU/FPGA issues hard to triage.
      • Outcome: A defined AdminAccess model exposes health/status and selected actions for claims in use, improving SRE workflows and MTTR for accelerator issues.
      •  

              gausingh@redhat.com Gaurav Singh
              gausingh@redhat.com Gaurav Singh
              None
              Ayato Tokubi
              Mrunal Patel Mrunal Patel
              Aruna Naik Aruna Naik
              Matthew Werner Matthew Werner
              Eric Rich Eric Rich
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated: