Skip to content

Commit 91d48c2

Browse files
Merge pull request #298379 from anlandu/patch-11
Update general.md and policy-for-kubernetes.md
2 parents 786a6d8 + 56f4a92 commit 91d48c2

File tree

2 files changed

+10
-1
lines changed

2 files changed

+10
-1
lines changed

articles/governance/policy/concepts/policy-for-kubernetes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ Azure Policy for Kubernetes supports the following cluster environments:
2121
> [!IMPORTANT]
2222
> The Azure Policy Add-on Helm model and the add-on for AKS Engine have been _deprecated_. Follow the instructions to [remove the add-ons](#remove-the-add-on).
2323
24+
> [!IMPORTANT]
25+
> Installations of Gatekeeper outside of the Azure Policy Add-on aren't supported. Uninstall any components installed by a previous Gatekeeper installation before enabling the Azure Policy Add-on.
2426
## Overview
2527

2628
By installing Azure Policy's add-on or extension on your Kubernetes clusters, Azure Policy enacts the following functions:
@@ -785,7 +787,6 @@ aligns with how the add-on was installed:
785787
- Maximum number of pods supported by the Azure Policy Add-on per cluster: **10,000**
786788
- Maximum number of Non-compliant records per policy per cluster: **500**
787789
- Maximum number of Non-compliant records per subscription: **1 million**
788-
- Installations of Gatekeeper outside of the Azure Policy Add-on aren't supported. Uninstall any components installed by a previous Gatekeeper installation before enabling the Azure Policy Add-on.
789790
- [Reasons for non-compliance](../how-to/determine-non-compliance.md#compliance-reasons) aren't available for the Microsoft.Kubernetes.Data [Resource Provider mode](./definition-structure-basics.md#resource-provider-modes). Use [Component details](../how-to/determine-non-compliance.md#component-details-for-resource-provider-modes).
790791
- Component-level [exemptions](./exemption-structure.md) aren't supported for [Resource Provider modes](./definition-structure-basics.md#resource-provider-modes). Parameters support is available in Azure Policy definitions to exclude and include particular namespaces.
791792
- Using the `metadata.gatekeeper.sh/requires-sync-data` annotation in a constraint template to configure the [replication of data](https://open-policy-agent.github.io/gatekeeper/website/docs/sync) from your cluster into the OPA cache is currently only allowed for built-in policies. The reason is because it can dramatically increase the Gatekeeper pods resource usage if not used carefully.

articles/governance/policy/troubleshoot/general.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -366,6 +366,14 @@ The `regex.match` function in rego uses RE2, which is not the default flavor ser
366366

367367
You will need to select the RE2 or golang flavor of regex in your matcher. See [the rego docs](https://docs.styra.com/opa/rego-by-example/builtins/regex/match) for more details on the RE2 flavor and what online tooling is recommended to test your regex.
368368

369+
### Scenario: I'm seeing a large number of updates on constraint.gatekeeper.sh CRDs and other Gatekeeper resources
370+
371+
#### Cause
372+
This is caused by a standalone instance of Gatekeeper being installed alongside the addon's Gatekeeper instance.
373+
374+
#### Resolution
375+
Check for the existence of multiple Gatekeeper installations. Remove all Gatekeeper components not managed by AKS.
376+
369377
## Next steps
370378

371379
If your problem isn't listed in this article or you can't resolve it, get support by visiting one of the following channels:

0 commit comments

Comments
 (0)