You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{uri-oke}[Oracle Container Engine] (OKE) is {uri-oracle}[Oracle]'s managed {uri-kubernetes}[Kubernetes] service on {uri-oci}[Oracle Cloud Infrastructure (OCI)].
42
42
@@ -56,6 +56,8 @@ This {uri-repo}[Terraform OKE Installer] for {uri-oci}[Oracle Cloud Infrastructu
Copy file name to clipboardExpand all lines: docs/configuration.adoc
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,6 @@ Enter the values for the following parameters in the terraform.tfvars file:
78
78
79
79
* api_fingerprint
80
80
* api_private_key_path
81
-
* compartment_name
82
81
* compartment_id
83
82
* tenancy_id
84
83
* user_id
@@ -147,7 +146,7 @@ The bastion host parameters concern whether you want to enable the bastion.
147
146
148
147
=== Configure operator host parameters
149
148
150
-
The operator host parameters concern whether you want to enable the bastion. 1 parameter to keep in mind here is the operator_instance_principal. Be aware that if this is enabled, it gives API access to the operator host without authentication.
149
+
The operator host parameters concern whether you want to enable the operator host. 1 parameter to keep in mind here is the operator_instance_principal. Be aware that if this is enabled, it gives API access to the operator host without authentication.
151
150
152
151
Read {uri-instructions}#enabling-instance_principal-on-the-operator-host[more] about {uri-oci-instance-principal}[instance_principal].
. It is good and recommended practice to monitor and protect your application using WAF.
326
327
. WAF protection currently only works if you use a public load balancer as a front end to your services. This means that services deployed as NodePort services are currently *not protected* by WAF.
327
328
****
329
+
330
+
=== Enabling PodSecurityPolicy
331
+
332
+
If you would like to enable the PodSecurityPolicy Admission Controller, set
333
+
334
+
[source]
335
+
admission_controller_options = {
336
+
PodSecurityPolicy = true
337
+
}
338
+
339
+
Ensure you also read {uri-psp}[the documentation] before enabling it.
340
+
341
+
****
342
+
N.B. This field is updatable. You can set to `true` and `false` and run terraform apply again.
0 commit comments