mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
MIG-1691: PSA labels should be called out explicitely in the docs
Signed-off-by: A.Arnold <anarnold@redhat.com>
This commit is contained in:
committed by
openshift-cherrypick-robot
parent
6c7e30e0f5
commit
019820c82e
@@ -48,7 +48,12 @@ include::modules/configuring-retries-for-rsync.adoc[leveloffset=+3]
|
||||
|
||||
include::modules/ocp-running-rsync-root-or-non-root.adoc[leveloffset=+3]
|
||||
|
||||
To learn more about Pod Security Admission and setting values for labels, see xref:../authentication/understanding-and-managing-pod-security-admission.adoc#security-context-constraints-psa-opting_understanding-and-managing-pod-security-admission[Controlling pod security admission synchronization].
|
||||
include::modules/security-context-constraints-psa-about.adoc[leveloffset=+4]
|
||||
|
||||
[role="_additional-resources"]
|
||||
.Additional resources
|
||||
|
||||
* xref:../authentication/understanding-and-managing-pod-security-admission.adoc#security-context-constraints-psa-opting_understanding-and-managing-pod-security-admission[Controlling pod security admission synchronization].
|
||||
|
||||
include::modules/migration-rsync-migration-controller-root-non-root.adoc[leveloffset=+3]
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@
|
||||
[id="ocp-running-rsync-root-or-non-root_{context}"]
|
||||
= Running Rsync as either root or non-root
|
||||
|
||||
{OCP} environments have the `PodSecurityAdmission` controller enabled by default. This controller requires cluster administrators to enforce Pod Security Standards by means of namespace labels. All workloads in the cluster are expected to run one of the following Pod Security Standard levels: `Privileged`, `Baseline` or `Restricted`. Every cluster has its own default policy set.
|
||||
{OCP} environments have the `PodSecurityAdmission` controller enabled by default. This controller requires cluster administrators to enforce Pod Security Standards by means of namespace labels. All workloads in the cluster are expected to run one of the following Pod Security Standard levels: `privileged`, `baseline` or `restricted`. Every cluster has its own default policy set.
|
||||
|
||||
To guarantee successful data transfer in all environments, {mtc-first} 1.7.5 introduced changes in Rsync pods, including running Rsync pods as non-root user by default. This ensures that data transfer is possible even for workloads that do not necessarily require higher privileges. This change was made because it is best to run workloads with the lowest level of privileges possible.
|
||||
|
||||
|
||||
@@ -71,3 +71,19 @@ The following system namespaces are always set to the `privileged` pod security
|
||||
* `kube-system`
|
||||
|
||||
You cannot change the pod security profile for these privileged namespaces.
|
||||
|
||||
.Example privileged namespace configuration
|
||||
|
||||
[source,yaml]
|
||||
----
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
labels:
|
||||
openshift.io/cluster-monitoring: "true"
|
||||
pod-security.kubernetes.io/enforce: privileged
|
||||
pod-security.kubernetes.io/audit: privileged
|
||||
pod-security.kubernetes.io/warn: privileged
|
||||
name: "<mig_namespace>"
|
||||
# ...
|
||||
----
|
||||
|
||||
Reference in New Issue
Block a user