You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Admission controllers may be "validating", "mutating", or both. Mutating
@@ -148,6 +148,8 @@ enabling this admission controller.
148
148
This admission controller mitigates the problem where the API server gets flooded by
149
149
event requests. The cluster admin can specify event rate limits by:
150
150
151
+
* Ensuring that `eventratelimit.admission.k8s.io/v1alpha1=true` is included in the
152
+
`--runtime-config` flag for the API server;
151
153
* Enabling the `EventRateLimit` admission controller;
152
154
* Referencing an `EventRateLimit` configuration file from the file provided to the API
153
155
server's command line flag `--admission-control-config-file`:
@@ -229,8 +231,7 @@ plugins:
229
231
...
230
232
```
231
233
232
-
The ImagePolicyWebhook config file must reference a [kubeconfig](/docs/tasks/access-application-cluster/configure-access-multiple-clusters/)
233
-
formatted file which sets up the connection to the backend. It is required that the backend communicate over TLS.
234
+
The ImagePolicyWebhook config file must reference a [kubeconfig](/docs/concepts/cluster-administration/authenticate-across-clusters-kubeconfig/) formatted file which sets up the connection to the backend. It is required that the backend communicate over TLS.
234
235
235
236
The kubeconfig file's cluster field must point to the remote service, and the user field must contain the returned authorizer.
236
237
@@ -249,7 +250,7 @@ users:
249
250
client-certificate: /path/to/cert.pem # cert for the webhook admission controller to use
250
251
client-key: /path/to/key.pem # key matching the cert
251
252
```
252
-
For additional HTTP configuration, refer to the [kubeconfig](/docs/tasks/access-application-cluster/configure-access-multiple-clusters/) documentation.
253
+
For additional HTTP configuration, refer to the [kubeconfig](/docs/concepts/cluster-administration/authenticate-across-clusters-kubeconfig/) documentation.
253
254
254
255
#### Request Payloads
255
256
@@ -324,18 +325,7 @@ In any case, the annotations are provided by the user and are not validated by K
324
325
The admission controller determines the initializers of a resource based on the existing
325
326
`InitializerConfiguration`s. It sets the pending initializers by modifying the
326
327
metadata of the resource to be created.
327
-
For more information, please check [Dynamic Admission Control](/docs/admin/extensible-admission-controllers/).
@@ -350,7 +340,7 @@ your Kubernetes deployment, you MUST use this admission controller to enforce th
350
340
be used to apply default resource requests to Pods that don't specify any; currently, the default LimitRanger
351
341
applies a 0.1 CPU requirement to all Pods in the `default` namespace.
352
342
353
-
See the [limitRange design doc](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_limit_range.md) and the [example of Limit Range](/docs/tasks/administer-cluster/memory-default-namespace/) for more details.
343
+
See the [limitRange design doc](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_limit_range.md) and the [example of Limit Range](/docs/tasks/configure-pod-container/limit-range/) for more details.
354
344
355
345
### MutatingAdmissionWebhook (beta in 1.9) {#mutatingadmissionwebhook}
356
346
@@ -472,7 +462,6 @@ metadata:
472
462
473
463
#### Internal Behavior
474
464
This admission controller has the following behavior:
475
-
476
465
1. If the `Namespace` has an annotation with a key `scheduler.alpha.kubernetes.io/node-selector`, use its value as the
477
466
node selector.
478
467
1. If the namespace lacks such an annotation, use the `clusterDefaultNodeSelector` defined in the `PodNodeSelector`
@@ -568,14 +557,15 @@ See the [resourceQuota design doc](https://git.k8s.io/community/contributors/des
568
557
569
558
### SecurityContextDeny {#securitycontextdeny}
570
559
571
-
This admission controller will deny any pod that attempts to set certain escalating [SecurityContext](/docs/tasks/configure-pod-container/security-context/) fields. This should be enabled if a cluster doesn't utilize [pod security policies](/docs/concepts/policy/pod-security-policy/) to restrict the set of values a security context can take.
560
+
This admission controller will deny any pod that attempts to set certain escalating [SecurityContext](/docs/user-guide/security-context) fields. This should be enabled if a cluster doesn't utilize [pod security policies](/docs/user-guide/pod-security-policy) to restrict the set of values a security context can take.
572
561
573
562
### ServiceAccount {#serviceaccount}
574
563
575
-
This admission controller implements automation for [serviceAccounts](/docs/tasks/configure-pod-container/configure-service-account/).
564
+
This admission controller implements automation for [serviceAccounts](/docs/user-guide/service-accounts).
576
565
We strongly recommend using this admission controller if you intend to make use of Kubernetes `ServiceAccount` objects.
577
566
578
567
### Storage Object in Use Protection
568
+
579
569
The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection` or `kubernetes.io/pv-protection` finalizers to newly created Persistent Volume Claims (PVCs) or Persistent Volumes (PV). In case a user deletes a PVC or PV the PVC or PV is not removed until the finalizer is removed from the PVC or PV by PVC or PV Protection Controller. Refer to the [Storage Object in Use Protection](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection) for more detailed information.
580
570
581
571
### ValidatingAdmissionWebhook (alpha in 1.8; beta in 1.9) {#validatingadmissionwebhook}
0 commit comments