1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 21:46:22 +01:00

OSDOCS#8139: Adding warning about default namespaces

This commit is contained in:
Andrea Hoffer
2023-10-11 16:41:06 -04:00
committed by openshift-cherrypick-robot
parent d6a7d2db67
commit 7b45ff92cf
12 changed files with 40 additions and 32 deletions

View File

@@ -14,10 +14,7 @@ isolation from other communities.
Projects starting with `openshift-` and `kube-` are xref:../../authentication/using-rbac.adoc#rbac-default-projects_using-rbac[default projects]. These projects host cluster components that run as pods and other infrastructure components. As such, {product-title} does not allow you to create projects starting with `openshift-` or `kube-` using the `oc new-project` command. Cluster administrators can create these projects using the `oc adm new-project` command.
====
[NOTE]
====
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
====
include::snippets/default-projects.adoc[]
include::modules/creating-a-project-using-the-web-console.adoc[leveloffset=+1]

View File

@@ -10,6 +10,8 @@ A multi-project quota, defined by a `ClusterResourceQuota` object, allows quotas
This guide describes how cluster administrators can set and manage resource quotas across multiple projects.
include::snippets/default-projects.adoc[]
include::modules/quotas-selecting-projects.adoc[leveloffset=+1]
include::modules/quotas-viewing-clusterresourcequotas.adoc[leveloffset=+1]
include::modules/quotas-selection-granularity.adoc[leveloffset=+1]

View File

@@ -6,7 +6,11 @@
= Default admission plugins
//Future xref - A set of default admission plugins is enabled in {product-title} {product-version}. These default plugins contribute to fundamental control plane functionality, such as ingress policy, xref:../nodes/clusters/nodes-cluster-overcommit.adoc#nodes-cluster-resource-override_nodes-cluster-overcommit[cluster resource limit override] and quota policy.
Default validating and admission plugins are enabled in {product-title} {product-version}. These default plugins contribute to fundamental control plane functionality, such as ingress policy, cluster resource limit override and quota policy. The following lists contain the default admission plugins:
Default validating and admission plugins are enabled in {product-title} {product-version}. These default plugins contribute to fundamental control plane functionality, such as ingress policy, cluster resource limit override and quota policy.
include::snippets/default-projects.adoc[]
The following lists contain the default admission plugins:
.Validating admission plugins
[%collapsible]

View File

@@ -13,11 +13,6 @@ If allowed by your cluster administrator, you can create a new project.
Projects starting with `openshift-` and `kube-` are considered critical by {product-title}. As such, {product-title} does not allow you to create Projects starting with `openshift-` or `kube-` using the `oc new-project` command. Cluster administrators can create these Projects using the `oc adm new-project` command.
====
[NOTE]
====
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
====
.Procedure
* Run:

View File

@@ -13,11 +13,6 @@ If allowed by your cluster administrator, you can create a new project.
Projects starting with `openshift-` and `kube-` are considered critical by {product-title}. As such, {product-title} does not allow you to create Projects starting with `openshift-` using the web console.
====
[NOTE]
====
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
====
.Procedure
. Navigate to *Home* -> *Projects*.

View File

@@ -9,10 +9,7 @@
When using image streams with Kubernetes resources, you can only reference image streams that reside in the same project as the resource. The image stream reference must consist of a single segment value, for example `ruby:2.5`, where `ruby` is the name of an image stream that has a tag named `2.5` and resides in the same project as the resource making the reference.
[NOTE]
====
This feature can not be used in the `default` namespace, nor in any `openshift-` or `kube-` namespace.
====
include::snippets/default-projects.adoc[]
There are two ways to enable image streams with Kubernetes resources:

View File

@@ -13,11 +13,6 @@ You can use the *Developer* perspective in the {product-title} web console to cr
Projects starting with `openshift-` and `kube-` are considered critical by {product-title}. As such, {product-title} does not allow you to create projects starting with `openshift-` or `kube-` using the *Developer* perspective. Cluster administrators can create these projects using the `oc adm new-project` command.
====
[NOTE]
====
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
====
.Prerequisites
* Ensure that you have the appropriate roles and permissions to create projects, applications, and other workloads in {product-title}.

View File

@@ -15,7 +15,4 @@ are considered critical, and the have guaranteed admission by kubelet.
Pods created for master components in these namespaces are already marked as
critical.
[NOTE]
====
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
====
include::snippets/default-projects.adoc[]

View File

@@ -13,6 +13,8 @@ Globally, the `privileged` profile is enforced, and the `restricted` profile is
You can also configure the pod security admission settings at the namespace level.
include::snippets/default-projects.adoc[]
[id="psa-modes_{context}"]
== Pod security admission modes

View File

@@ -10,10 +10,7 @@ you to scope access to your SCCs to a certain project or to the entire
cluster. Assigning users, groups, or service accounts directly to an
SCC retains cluster-wide scope.
[NOTE]
====
You cannot assign a SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, `openshift`. These namespaces should not be used for running pods or services.
====
include::snippets/default-projects.adoc[]
To include access to SCCs for your role, specify the `scc` resource
when creating a role.

View File

@@ -19,6 +19,8 @@ include::modules/images-imagestream-mapping.adoc[leveloffset=+1]
The following sections describe how to use image streams and image stream tags.
include::snippets/default-projects.adoc[]
include::modules/images-getting-info-about-imagestreams.adoc[leveloffset=+2]
include::modules/images-imagestream-adding-tags.adoc[leveloffset=+2]
include::modules/images-imagestream-external-image-tags.adoc[leveloffset=+2]

View File

@@ -0,0 +1,25 @@
// Text snippet included in the following assemblies:
//
// * applications/projects/working-with-projects.adoc
// * applications/quotas/quotas-setting-across-multiple-projects.adoc
// * openshift_images/image-streams-manage.adoc
//
// Text snippet included in the following modules:
//
// * modules/admission-plug-ins-about.adoc
// * modules/creating-a-project-using-the-CLI.adoc
// * modules/creating-a-project-using-the-web-console.adoc
// * modules/images-managing-images-enabling-imagestreams-kube.adoc
// * modules/odc-creating-projects-using-developer-perspective.adoc
// * modules/rbac-default-projects.adoc
// * modules/security-context-constraints-psa-about.adoc
// * modules/security-context-constraints-rbac.adoc
:_content-type: SNIPPET
[IMPORTANT]
====
Do not run workloads in or share access to default projects. Default projects are reserved for running core cluster components.
The following default projects are considered highly privileged: `default`, `kube-public`, `kube-system`, `openshift`, `openshift-infra`, `openshift-node`, and other system-created projects that have the `openshift.io/run-level` label set to `0` or `1`. Functionality that relies on admission plugins, such as pod security admission, security context constraints, cluster resource quotas, and image reference resolution, does not work in highly privileged projects.
====