Skip to content

Commit c04e92a

Browse files
authored
Merge pull request #66132 from bergerhoffer/OSDOCS-8139
OSDOCS#8139: Adding warning about default namespaces
2 parents 04ec573 + 8e515c9 commit c04e92a

12 files changed

+40
-32
lines changed

applications/projects/working-with-projects.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,7 @@ isolation from other communities.
1414
Projects starting with `openshift-` and `kube-` are xref:../../authentication/using-rbac.adoc#rbac-default-projects_using-rbac[default projects]. These projects host cluster components that run as pods and other infrastructure components. As such, {product-title} does not allow you to create projects starting with `openshift-` or `kube-` using the `oc new-project` command. Cluster administrators can create these projects using the `oc adm new-project` command.
1515
====
1616

17-
[NOTE]
18-
====
19-
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
20-
====
17+
include::snippets/default-projects.adoc[]
2118

2219
include::modules/creating-a-project-using-the-web-console.adoc[leveloffset=+1]
2320

applications/quotas/quotas-setting-across-multiple-projects.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ A multi-project quota, defined by a `ClusterResourceQuota` object, allows quotas
1010

1111
This guide describes how cluster administrators can set and manage resource quotas across multiple projects.
1212

13+
include::snippets/default-projects.adoc[]
14+
1315
include::modules/quotas-selecting-projects.adoc[leveloffset=+1]
1416
include::modules/quotas-viewing-clusterresourcequotas.adoc[leveloffset=+1]
1517
include::modules/quotas-selection-granularity.adoc[leveloffset=+1]

modules/admission-plug-ins-default.adoc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,11 @@
66
= Default admission plugins
77

88
//Future xref - A set of default admission plugins is enabled in {product-title} {product-version}. These default plugins contribute to fundamental control plane functionality, such as ingress policy, xref:../nodes/clusters/nodes-cluster-overcommit.adoc#nodes-cluster-resource-override_nodes-cluster-overcommit[cluster resource limit override] and quota policy.
9-
Default validating and admission plugins are enabled in {product-title} {product-version}. These default plugins contribute to fundamental control plane functionality, such as ingress policy, cluster resource limit override and quota policy. The following lists contain the default admission plugins:
9+
Default validating and admission plugins are enabled in {product-title} {product-version}. These default plugins contribute to fundamental control plane functionality, such as ingress policy, cluster resource limit override and quota policy.
10+
11+
include::snippets/default-projects.adoc[]
12+
13+
The following lists contain the default admission plugins:
1014

1115
.Validating admission plugins
1216
[%collapsible]

modules/creating-a-project-using-the-CLI.adoc

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,6 @@ If allowed by your cluster administrator, you can create a new project.
1313
Projects starting with `openshift-` and `kube-` are considered critical by {product-title}. As such, {product-title} does not allow you to create Projects starting with `openshift-` or `kube-` using the `oc new-project` command. Cluster administrators can create these Projects using the `oc adm new-project` command.
1414
====
1515

16-
[NOTE]
17-
====
18-
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
19-
====
20-
2116
.Procedure
2217

2318
* Run:

modules/creating-a-project-using-the-web-console.adoc

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,6 @@ If allowed by your cluster administrator, you can create a new project.
1313
Projects starting with `openshift-` and `kube-` are considered critical by {product-title}. As such, {product-title} does not allow you to create Projects starting with `openshift-` using the web console.
1414
====
1515

16-
[NOTE]
17-
====
18-
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
19-
====
20-
2116
.Procedure
2217

2318
. Navigate to *Home* -> *Projects*.

modules/images-managing-images-enabling-imagestreams-kube.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,7 @@
99

1010
When using image streams with Kubernetes resources, you can only reference image streams that reside in the same project as the resource. The image stream reference must consist of a single segment value, for example `ruby:2.5`, where `ruby` is the name of an image stream that has a tag named `2.5` and resides in the same project as the resource making the reference.
1111

12-
[NOTE]
13-
====
14-
This feature can not be used in the `default` namespace, nor in any `openshift-` or `kube-` namespace.
15-
====
12+
include::snippets/default-projects.adoc[]
1613

1714
There are two ways to enable image streams with Kubernetes resources:
1815

modules/odc-creating-projects-using-developer-perspective.adoc

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,6 @@ You can use the *Developer* perspective in the {product-title} web console to cr
1313
Projects starting with `openshift-` and `kube-` are considered critical by {product-title}. As such, {product-title} does not allow you to create projects starting with `openshift-` or `kube-` using the *Developer* perspective. Cluster administrators can create these projects using the `oc adm new-project` command.
1414
====
1515

16-
[NOTE]
17-
====
18-
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
19-
====
20-
2116
.Prerequisites
2217

2318
* Ensure that you have the appropriate roles and permissions to create projects, applications, and other workloads in {product-title}.

modules/rbac-default-projects.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,4 @@ are considered critical, and the have guaranteed admission by kubelet.
1515
Pods created for master components in these namespaces are already marked as
1616
critical.
1717

18-
[NOTE]
19-
====
20-
You cannot assign an SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, and `openshift`. You cannot use these namespaces for running pods or services.
21-
====
18+
include::snippets/default-projects.adoc[]

modules/security-context-constraints-psa-about.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ Globally, the `privileged` profile is enforced, and the `restricted` profile is
1313

1414
You can also configure the pod security admission settings at the namespace level.
1515

16+
include::snippets/default-projects.adoc[]
17+
1618
[id="psa-modes_{context}"]
1719
== Pod security admission modes
1820

modules/security-context-constraints-rbac.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,7 @@ you to scope access to your SCCs to a certain project or to the entire
1010
cluster. Assigning users, groups, or service accounts directly to an
1111
SCC retains cluster-wide scope.
1212

13-
[NOTE]
14-
====
15-
You cannot assign a SCC to pods created in one of the default namespaces: `default`, `kube-system`, `kube-public`, `openshift-node`, `openshift-infra`, `openshift`. These namespaces should not be used for running pods or services.
16-
====
13+
include::snippets/default-projects.adoc[]
1714

1815
To include access to SCCs for your role, specify the `scc` resource
1916
when creating a role.

0 commit comments

Comments
 (0)