-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ignore kube-system, openshift and other non-user namespaces #48
Comments
Thanks for opening this issue. I am not sure what is the best approach to take care of this, I was able to think on one that is to run on namespaces like I wasn't able to find a pre configured label on this namespaces kubectl get ns kube-system -o yaml
apiVersion: v1
kind: Namespace
metadata:
creationTimestamp: 2019-07-22T14:44:27Z
name: kube-system
resourceVersion: "9"
selfLink: /api/v1/namespaces/kube-system
uid: 34c2dc75-ac8f-11e9-ae51-525500d15501
spec:
finalizers:
- kubernetes
status:
phase: Active
|
Yeah, the missing label is a problem. And labelling those ourselves sounds little unclean. But maybe it's better than just blocking the whole system. Could you at least check openshift, does it have any labels on its kube-system? |
@phoracek on openshift we only have annotations
but again not labels. you think it's a good solution to add labels by the operator I am really not sure? |
Maybe we can follow the opposite way. Administrator has to create |
There are some namespaces we should ignore during the admission. Especially system namespaces should not rely on KubeMacPool stability.
The text was updated successfully, but these errors were encountered: