Skip to content

Commit 24930fb

Browse files
committed
Update docs with namespace exclusions for admission controller
1 parent 1e15e07 commit 24930fb

File tree

1 file changed

+21
-3
lines changed

1 file changed

+21
-3
lines changed

modules/namespace-exclusions.adoc

Lines changed: 21 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,26 @@
66

77
:_mod-docs-content-type: CONCEPT
88
[id="namespace-exclusions_{context}"]
9-
= Namespace exclusions
9+
= Namespace exclusions from admission controller enforcement
1010

11-
By default, {product-title-short} excludes certain administrative namespaces, such as the `stackrox`, `kube-system`, and `istio-system` namespaces, from enforcement blocking. The reason for this is that some items in these namespaces must be deployed for {product-title-short} to work correctly.
11+
[role="_abstract"]
12+
By default, {product-title-short} excludes certain administrative namespaces, such as the `stackrox`, `kube-system`, and `istio-system` namespaces, from admission controller enforcement blocking. The reason for this is that some items in these namespaces must be deployed for {product-title-short} to work correctly.
1213

13-
In addition, the {product-title-short} admission controller bypasses requests that originate from a `service` account in a `system` namespace. Consider this factor when deploying the CI/CD tool of your choice.
14+
These exclusions mean that API calls for these namespaces are not passed to {product-title-short} for review. Instead of rejecting the `CREATE` verb, the deployment is created and then scaled down using Sensor.
15+
16+
There are two places where excluded namespaces are defined:
17+
18+
* The configuration of the `ValidatingWebhookConfiguration`
19+
* The {product-title-short} code that defines "system" namespaces
20+
21+
The following namespaces are excluded:
22+
23+
* `stackrox`
24+
* `kube.*`
25+
* `kube-system`
26+
* `kube-public`
27+
* `istio-system`
28+
* `openshift.*`
29+
* `redhat.*`
30+
31+
In addition to excluding namespaces, the {product-title-short} admission controller bypasses requests that originate from a `service` account in a `system` namespace. Consider this factor when deploying the CI/CD tool of your choice.

0 commit comments

Comments
 (0)