:_mod-docs-content-type: CONCEPT //[id="sd-managed-resources"] [id="sd-redhat-managed-resources_{context}"] = Red{nbsp}Hat managed resources include::_attributes/attributes-openshift-dedicated.adoc[] :context: sd-managed-resources toc::[] [id="sd-managed-resources-overview_{context}"] == Overview The following covers all {product-title} resources that are managed or protected by the Service Reliability Engineering Platform (SRE-P) Team. Customers should not try to change these resources because doing so can lead to cluster instability. [id="sd-managed-resources-all_{context}"] == Managed resources The following list displays the {product-title} resources managed by OpenShift Hive, the centralized fleet configuration management system. These resources are in addition to the OpenShift/ROSA platform resources created during installation. OpenShift Hive continually reconciles consistency across all {product-title} clusters. Changes to {product-title} resources should be made through {cluster-manager} so that {cluster-manager} and Hive are synchronized. Contact ocm-feedback@redhat.com if {cluster-manager} does not support modifying the resources in question. .List of Red{nbsp}Hat managed resources (Note that the following may not be visible in your ROSA cluster) [%collapsible] ==== [source,yaml] ---- include::https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/managed/all-osd-resources.yaml[] ---- ==== [id="sd-core-namespaces_{context}"] == {product-title} core namespaces {product-title} core namespaces are installed by default during cluster installation. .List of core namespaces (Note that the following may not be visible in your ROSA cluster) [%collapsible] ==== [source,yaml] ---- include::https://raw.githubusercontent.com/openshift/managed-cluster-config/master/deploy/osd-managed-resources/ocp-namespaces.ConfigMap.yaml[] ---- ==== [id="sd-add-on-managed-namespaces_{context}"] == {product-title} add-on namespaces {product-title} add-ons are services available for installation after cluster installation. These additional services include {openshift-dev-spaces-productname}, Red{nbsp}Hat OpenShift API Management, and Cluster Logging Operator. Any changes to resources within the following namespaces can be overridden by the add-on during upgrades, which can lead to unsupported configurations for the add-on functionality. .List of add-on managed namespaces [%collapsible] ==== [source,yaml] ---- include::https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/addons-namespaces/main.yaml[] ---- ==== [id="sd-validating-webhooks_{context}"] == {product-title} validating webhooks {product-title} validating webhooks are a set of dynamic admission controls maintained by the OpenShift SRE team. These HTTP callbacks, also known as webhooks, are called for various types of requests to ensure cluster stability. The following list describes the various webhooks with rules containing the registered operations and resources that are controlled. Any attempt to circumvent these validating webhooks could affect the stability and supportability of the cluster. .List of validating webhooks [%collapsible] ==== [source,json] ---- include::https://raw.githubusercontent.com/openshift/managed-cluster-validating-webhooks/master/docs/webhooks.json[] ---- ====