|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * authentication/understanding-and-managing-pod-security-admission.adoc |
| 4 | +// * operators/operator_sdk/osdk-complying-with-psa.adoc |
| 5 | + |
| 6 | +:_content-type: CONCEPT |
| 7 | +[id="security-context-constraints-psa-sync-exclusions_{context}"] |
| 8 | += Pod security admission synchronization namespace exclusions |
| 9 | + |
| 10 | +Pod security admission synchronization is permanently disabled on most system-created namespaces. Synchronization is also initially disabled on user-created `openshift-*` prefixed namespaces, but you can enable synchronization on them later. |
| 11 | + |
| 12 | +[IMPORTANT] |
| 13 | +==== |
| 14 | +If a pod security admission label (`pod-security.kubernetes.io/<mode>`) is manually modified from the automatically labeled value on a label-synchronized namespace, synchronization is disabled for that label. |
| 15 | +
|
| 16 | +If necessary, you can enable synchronization again by using one of the following methods: |
| 17 | +
|
| 18 | +* By removing the modified pod security admission label from the namespace |
| 19 | +* By setting the `security.openshift.io/scc.podSecurityLabelSync` label to `true` |
| 20 | ++ |
| 21 | +If you force synchronization by adding this label, then any modified pod security admission labels will be overwritten. |
| 22 | +==== |
| 23 | + |
| 24 | +[discrete] |
| 25 | +== Permanently disabled namespaces |
| 26 | + |
| 27 | +Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. The following namespaces are permanently disabled: |
| 28 | + |
| 29 | +* `default` |
| 30 | +* `kube-node-lease` |
| 31 | +* `kube-system` |
| 32 | +* `kube-public` |
| 33 | +* `openshift` |
| 34 | +* All system-created namespaces that are prefixed with `openshift-`, except for `openshift-operators` |
| 35 | + |
| 36 | +[discrete] |
| 37 | +== Initially disabled namespaces |
| 38 | + |
| 39 | +By default, all namespaces that have an `openshift-` prefix have pod security admission synchronization disabled initially. You can enable synchronization for user-created [x-]`openshift-*` namespaces and for the `openshift-operators` namespace. |
| 40 | + |
| 41 | +[NOTE] |
| 42 | +==== |
| 43 | +You cannot enable synchronization for any system-created [x-]`openshift-*` namespaces, except for `openshift-operators`. |
| 44 | +==== |
| 45 | + |
| 46 | +If an Operator is installed in a user-created `openshift-*` namespace, synchronization is enabled automatically after a cluster service version (CSV) is created in the namespace. The synchronized label is derived from the permissions of the service accounts in the namespace. |
0 commit comments