You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/operating/setup/installation.md
+20-22Lines changed: 20 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,16 +88,16 @@ Generally we recommend to use [matchconditions](https://kubernetes.io/docs/refer
88
88
89
89
#### Nodes
90
90
91
-
There is a webhook which catches interactions with the Node resource. This Webhook is mainly interesting, when you make use of [Node Metadata](/docs/tenants/enforcement/#nodes). In any other case it will just case you problems. By default the webhook is enabled, but you can disable it by setting the following value:
91
+
There is a webhook which catches interactions with the Node resource. This Webhook is mainly interesting, when you make use of [Node Metadata](/docs/tenants/enforcement/#nodes). In any other case it will just case you problems. By default the webhook is **disabled**, but you can enabled it by setting the following value:
92
92
93
93
```yaml
94
94
webhooks:
95
95
hooks:
96
96
nodes:
97
-
enabled: false
97
+
enabled: true
98
98
```
99
99
100
-
Or you could at least consider to set the failure policy to `Ignore`:
100
+
Or you could at least consider to set the failure policy to `Ignore`, if you don't want to disrupt critical nodes:
101
101
102
102
```yaml
103
103
webhooks:
@@ -132,10 +132,6 @@ webhooks:
132
132
expression: '!("system:serviceaccounts:kube-system" in request.userInfo.groups)'
133
133
```
134
134
135
-
## Compatibility
136
-
137
-
The Kubernetes compatibility is announced for each [Release](https://github.com/projectcapsule/capsule/releases). Generally we are up to date with the latest upstream Kubernetes Version. Note that the Capsule project offers support only for the latest minor version of Kubernetes. Backwards compatibility with older versions of Kubernetes and OpenShift is offered by [vendors](/support/).
138
-
139
135
## GitOps
140
136
141
137
There are no specific requirements for using Capsule with GitOps tools like ArgoCD or FluxCD. You can manage Capsule resources as you would with any other Kubernetes resource.
@@ -387,3 +381,7 @@ To inspect the SBOM of the docker image, run the following command. Replace `<re
387
381
To inspect the SBOM of the helm image, run the following command. Replace `<release_tag>` with an [available release tag](https://github.com/projectcapsule/capsule/pkgs/container/charts%2Fcapsule):
The Kubernetes compatibility is announced for each [Release](https://github.com/projectcapsule/capsule/releases). Generally we are up to date with the latest upstream Kubernetes Version. Note that the Capsule project offers support only for the latest minor version of Kubernetes. Backwards compatibility with older versions of Kubernetes and OpenShift is offered by [vendors](/support/).
Copy file name to clipboardExpand all lines: content/en/docs/tenants/permissions.md
+14-5Lines changed: 14 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -216,6 +216,10 @@ spec:
216
216
- capsule-namespace-deleter
217
217
kind: User
218
218
name: alice
219
+
labels:
220
+
projectcapsule.dev/sample: "true"
221
+
annotations:
222
+
projectcapsule.dev/sample: "true"
219
223
resourceQuotas:
220
224
scope: Tenant
221
225
status:
@@ -248,6 +252,9 @@ items:
248
252
labels:
249
253
capsule.clastix.io/role-binding: 8fb969aaa7a67b71
250
254
capsule.clastix.io/tenant: solar
255
+
projectcapsule.dev/sample: "true"
256
+
annotations:
257
+
projectcapsule.dev/sample: "true"
251
258
name: capsule-solar-0-admin
252
259
namespace: solar-production
253
260
ownerReferences:
@@ -274,6 +281,9 @@ items:
274
281
labels:
275
282
capsule.clastix.io/role-binding: b8822dde20953fb1
276
283
capsule.clastix.io/tenant: solar
284
+
projectcapsule.dev/sample: "true"
285
+
annotations:
286
+
projectcapsule.dev/sample: "true"
277
287
name: capsule-solar-1-capsule-namespace-deleter
278
288
namespace: solar-production
279
289
ownerReferences:
@@ -457,6 +467,10 @@ spec:
457
467
- apiGroup: rbac.authorization.k8s.io
458
468
kind: User
459
469
name: joe
470
+
labels:
471
+
projectcapsule.dev/sample: "true"
472
+
annotations:
473
+
projectcapsule.dev/sample: "true"
460
474
EOF
461
475
```
462
476
@@ -536,8 +550,3 @@ roleRef:
536
550
With the above example, Capsule is leaving the tenant owner to create namespaced custom resources.
537
551
538
552
> Take Note: a tenant owner having the admin scope on its namespaces only, does not have the permission to create Custom Resources Definitions (CRDs) because this requires a cluster admin permission level. Only Bill, the cluster admin, can create CRDs. This is a known limitation of any multi-tenancy environment based on a single shared control plane.
0 commit comments