Skip to content

Commit 2218985

Browse files
authored
Merge pull request #50310 from bergerhoffer/psa-clarifications
Clarifying the behavior of PSA sync
2 parents c624ea8 + f863a95 commit 2218985

File tree

2 files changed

+10
-23
lines changed

2 files changed

+10
-23
lines changed

modules/security-context-constraints-psa-opting.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,18 @@
88

99
You can enable or disable automatic pod security admission synchronization for most namespaces.
1010

11-
[NOTE]
11+
[IMPORTANT]
1212
====
13-
By default, user-created namespaces that have the prefix `openshift-` have pod security admission label synchronization disabled.
13+
Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. These namespaces include:
1414
15-
Namespaces that the installer creates have pod security admission label synchronization disabled permanently. These namespaces include:
16-
17-
* All namespaces that are prefixed with `openshift-`, except for `openshift-operators`
1815
* `default`
1916
* `kube-node-lease`
2017
* `kube-system`
2118
* `kube-public`
2219
* `openshift`
20+
* All system-created namespaces that are prefixed with `openshift-`, except for `openshift-operators`
21+
22+
By default, all namespaces that have an `openshift-` prefix are not synchronized. You can enable synchronization for any user-created [x-]`openshift-*` namespaces. You cannot enable synchronization for any system-created [x-]`openshift-*` namespaces, except for `openshift-operators`.
2323
====
2424

2525
.Procedure

modules/security-context-constraints-psa-synchronization.adoc

Lines changed: 5 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,26 +10,13 @@
1010

1111
In addition to the global pod security admission control configuration, a controller exists that applies pod security admission control `warn` and `audit` labels to namespaces according to the SCC permissions of the service accounts that are in a given namespace.
1212

13-
The controller examines `ServiceAccount` object permissions to use security context constraints in each namespace. Security context constraints (SCCs) are mapped to pod security profiles based on their field values; the controller uses these translated profiles. Pod security admission `warn` and `audit` labels are set to the most privileged pod security profile found in the namespace to prevent warnings and audit logging as pods are created.
14-
15-
Namespace labeling is based on consideration of namespace-local service account privileges.
16-
17-
Applying pods directly might use the SCC privileges of the user who runs the pod. However, user privileges are not considered during automatic labeling.
18-
1913
[IMPORTANT]
2014
====
21-
Namespaces that have an `openshift-` name prefix and were not created by the system during the installation are not synchronized by default.
22-
23-
Namespaces that have the `openshift-` prefix are typically system namespaces; by convention, a controller should exist to manage them.
15+
Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. You can enable pod security admission synchronization on other namespaces as necessary.
16+
====
2417

25-
You can enable SCC synchronization in namespaces that have the `openshift-` prefix by setting the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `true`.
18+
The controller examines `ServiceAccount` object permissions to use security context constraints in each namespace. Security context constraints (SCCs) are mapped to pod security profiles based on their field values; the controller uses these translated profiles. Pod security admission `warn` and `audit` labels are set to the most privileged pod security profile found in the namespace to prevent warnings and audit logging as pods are created.
2619

27-
Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. These namespaces include:
20+
Namespace labeling is based on consideration of namespace-local service account privileges.
2821

29-
* All namespaces that are prefixed with `openshift-`, except for `openshift-operators`
30-
* `default`
31-
* `kube-node-lease`
32-
* `kube-system`
33-
* `kube-public`
34-
* `openshift`
35-
====
22+
Applying pods directly might use the SCC privileges of the user who runs the pod. However, user privileges are not considered during automatic labeling.

0 commit comments

Comments
 (0)