[k8s] Fix default admission controller
The default admission controller list of k8s is being updated in this patch by removing the SecurityContextDeny controller, which will fix the k8s dashboard and metrics/prometheus creating issue. Story: 2008426 Change-Id: I2cd53bc9c59a60b90f708b1434381f120ace8c49
This commit is contained in:
parent
1af0cd0a97
commit
fade245170
@ -222,7 +222,7 @@ parameters:
|
||||
type: string
|
||||
description: >
|
||||
List of admission control plugins to activate
|
||||
default: "NamespaceLifecycle,LimitRanger,SecurityContextDeny,ServiceAccount,ResourceQuota,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,PersistentVolumeClaimResize,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,RuntimeClass"
|
||||
default: "PodSecurityPolicy,NamespaceLifecycle,LimitRanger,ServiceAccount,ResourceQuota,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,PersistentVolumeClaimResize,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,RuntimeClass"
|
||||
|
||||
kube_allow_priv:
|
||||
type: string
|
||||
|
@ -0,0 +1,5 @@
|
||||
---
|
||||
upgrade:
|
||||
- |
|
||||
Now the default admission controller list is updated by as
|
||||
"NodeRestriction, PodSecurityPolicy, NamespaceLifecycle, LimitRanger, ServiceAccount, ResourceQuota, TaintNodesByCondition, Priority, DefaultTolerationSeconds, DefaultStorageClass, StorageObjectInUseProtection, PersistentVolumeClaimResize, MutatingAdmissionWebhook, ValidatingAdmissionWebhook, RuntimeClass"
|
Loading…
Reference in New Issue
Block a user