admission controllers: document types
Signed-off-by: Marek Skrobacki <skrobul@skrobul.com>
This commit is contained in:
parent
7813cdb86b
commit
fce6bfc32f
|
|
@ -121,12 +121,16 @@ the `admissionregistration.k8s.io/v1alpha1` API.
|
||||||
This admission controller allows all pods into the cluster. It is **deprecated** because
|
This admission controller allows all pods into the cluster. It is **deprecated** because
|
||||||
its behavior is the same as if there were no admission controller at all.
|
its behavior is the same as if there were no admission controller at all.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### AlwaysDeny {#alwaysdeny}
|
### AlwaysDeny {#alwaysdeny}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
|
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
|
||||||
|
|
||||||
Rejects all requests. AlwaysDeny is **deprecated** as it has no real meaning.
|
Rejects all requests. AlwaysDeny is **deprecated** as it has no real meaning.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### AlwaysPullImages {#alwayspullimages}
|
### AlwaysPullImages {#alwayspullimages}
|
||||||
|
|
||||||
This admission controller modifies every new Pod to force the image pull policy to `Always`. This is useful in a
|
This admission controller modifies every new Pod to force the image pull policy to `Always`. This is useful in a
|
||||||
|
|
@ -137,6 +141,8 @@ scheduled onto the right node), without any authorization check against the imag
|
||||||
is enabled, images are always pulled prior to starting containers, which means valid credentials are
|
is enabled, images are always pulled prior to starting containers, which means valid credentials are
|
||||||
required.
|
required.
|
||||||
|
|
||||||
|
**Type**: Mutating and Validating.
|
||||||
|
|
||||||
### CertificateApproval {#certificateapproval}
|
### CertificateApproval {#certificateapproval}
|
||||||
|
|
||||||
This admission controller observes requests to approve CertificateSigningRequest resources and performs additional
|
This admission controller observes requests to approve CertificateSigningRequest resources and performs additional
|
||||||
|
|
@ -146,6 +152,8 @@ authorization checks to ensure the approving user has permission to **approve**
|
||||||
See [Certificate Signing Requests](/docs/reference/access-authn-authz/certificate-signing-requests/) for more
|
See [Certificate Signing Requests](/docs/reference/access-authn-authz/certificate-signing-requests/) for more
|
||||||
information on the permissions required to perform different actions on CertificateSigningRequest resources.
|
information on the permissions required to perform different actions on CertificateSigningRequest resources.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### CertificateSigning {#certificatesigning}
|
### CertificateSigning {#certificatesigning}
|
||||||
|
|
||||||
This admission controller observes updates to the `status.certificate` field of CertificateSigningRequest resources
|
This admission controller observes updates to the `status.certificate` field of CertificateSigningRequest resources
|
||||||
|
|
@ -155,12 +163,16 @@ requests with the `spec.signerName` requested on the CertificateSigningRequest r
|
||||||
See [Certificate Signing Requests](/docs/reference/access-authn-authz/certificate-signing-requests/) for more
|
See [Certificate Signing Requests](/docs/reference/access-authn-authz/certificate-signing-requests/) for more
|
||||||
information on the permissions required to perform different actions on CertificateSigningRequest resources.
|
information on the permissions required to perform different actions on CertificateSigningRequest resources.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### CertificateSubjectRestriction {#certificatesubjectrestriction}
|
### CertificateSubjectRestriction {#certificatesubjectrestriction}
|
||||||
|
|
||||||
This admission controller observes creation of CertificateSigningRequest resources that have a `spec.signerName`
|
This admission controller observes creation of CertificateSigningRequest resources that have a `spec.signerName`
|
||||||
of `kubernetes.io/kube-apiserver-client`. It rejects any request that specifies a 'group' (or 'organization attribute')
|
of `kubernetes.io/kube-apiserver-client`. It rejects any request that specifies a 'group' (or 'organization attribute')
|
||||||
of `system:masters`.
|
of `system:masters`.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### DefaultIngressClass {#defaultingressclass}
|
### DefaultIngressClass {#defaultingressclass}
|
||||||
|
|
||||||
This admission controller observes creation of `Ingress` objects that do not request any specific
|
This admission controller observes creation of `Ingress` objects that do not request any specific
|
||||||
|
|
@ -177,6 +189,8 @@ updates; it acts only on creation.
|
||||||
See the [Ingress](/docs/concepts/services-networking/ingress/) documentation for more about ingress
|
See the [Ingress](/docs/concepts/services-networking/ingress/) documentation for more about ingress
|
||||||
classes and how to mark one as default.
|
classes and how to mark one as default.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### DefaultStorageClass {#defaultstorageclass}
|
### DefaultStorageClass {#defaultstorageclass}
|
||||||
|
|
||||||
This admission controller observes creation of `PersistentVolumeClaim` objects that do not request any specific storage class
|
This admission controller observes creation of `PersistentVolumeClaim` objects that do not request any specific storage class
|
||||||
|
|
@ -192,6 +206,8 @@ This admission controller ignores any `PersistentVolumeClaim` updates; it acts o
|
||||||
See [persistent volume](/docs/concepts/storage/persistent-volumes/) documentation about persistent volume claims and
|
See [persistent volume](/docs/concepts/storage/persistent-volumes/) documentation about persistent volume claims and
|
||||||
storage classes and how to mark a storage class as default.
|
storage classes and how to mark a storage class as default.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### DefaultTolerationSeconds {#defaulttolerationseconds}
|
### DefaultTolerationSeconds {#defaulttolerationseconds}
|
||||||
|
|
||||||
This admission controller sets the default forgiveness toleration for pods to tolerate
|
This admission controller sets the default forgiveness toleration for pods to tolerate
|
||||||
|
|
@ -201,6 +217,8 @@ have toleration for taints `node.kubernetes.io/not-ready:NoExecute` or
|
||||||
`node.kubernetes.io/unreachable:NoExecute`.
|
`node.kubernetes.io/unreachable:NoExecute`.
|
||||||
The default value for `default-not-ready-toleration-seconds` and `default-unreachable-toleration-seconds` is 5 minutes.
|
The default value for `default-not-ready-toleration-seconds` and `default-unreachable-toleration-seconds` is 5 minutes.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### DenyServiceExternalIPs
|
### DenyServiceExternalIPs
|
||||||
|
|
||||||
This admission controller rejects all net-new usage of the `Service` field `externalIPs`. This
|
This admission controller rejects all net-new usage of the `Service` field `externalIPs`. This
|
||||||
|
|
@ -216,6 +234,8 @@ of it.
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### EventRateLimit {#eventratelimit}
|
### EventRateLimit {#eventratelimit}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.13" state="alpha" >}}
|
{{< feature-state for_k8s_version="v1.13" state="alpha" >}}
|
||||||
|
|
@ -264,6 +284,8 @@ for more details.
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### ExtendedResourceToleration {#extendedresourcetoleration}
|
### ExtendedResourceToleration {#extendedresourcetoleration}
|
||||||
|
|
||||||
This plug-in facilitates creation of dedicated nodes with extended resources.
|
This plug-in facilitates creation of dedicated nodes with extended resources.
|
||||||
|
|
@ -275,12 +297,16 @@ add these tolerations.
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### ImagePolicyWebhook {#imagepolicywebhook}
|
### ImagePolicyWebhook {#imagepolicywebhook}
|
||||||
|
|
||||||
The ImagePolicyWebhook admission controller allows a backend webhook to make admission decisions.
|
The ImagePolicyWebhook admission controller allows a backend webhook to make admission decisions.
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
#### Configuration file format {#imagereview-config-file-format}
|
#### Configuration file format {#imagereview-config-file-format}
|
||||||
|
|
||||||
ImagePolicyWebhook uses a configuration file to set options for the behavior of the backend.
|
ImagePolicyWebhook uses a configuration file to set options for the behavior of the backend.
|
||||||
|
|
@ -444,6 +470,8 @@ This admission controller denies any pod that defines `AntiAffinity` topology ke
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### LimitRanger {#limitranger}
|
### LimitRanger {#limitranger}
|
||||||
|
|
||||||
This admission controller will observe the incoming request and ensure that it does not violate
|
This admission controller will observe the incoming request and ensure that it does not violate
|
||||||
|
|
@ -457,6 +485,8 @@ See the [LimitRange API reference](/docs/reference/kubernetes-api/policy-resourc
|
||||||
and the [example of LimitRange](/docs/tasks/administer-cluster/manage-resources/memory-default-namespace/)
|
and the [example of LimitRange](/docs/tasks/administer-cluster/manage-resources/memory-default-namespace/)
|
||||||
for more details.
|
for more details.
|
||||||
|
|
||||||
|
**Type**: Mutating and Validating.
|
||||||
|
|
||||||
### MutatingAdmissionWebhook {#mutatingadmissionwebhook}
|
### MutatingAdmissionWebhook {#mutatingadmissionwebhook}
|
||||||
|
|
||||||
This admission controller calls any mutating webhooks which match the request. Matching
|
This admission controller calls any mutating webhooks which match the request. Matching
|
||||||
|
|
@ -472,6 +502,8 @@ If you disable the MutatingAdmissionWebhook, you must also disable the
|
||||||
`MutatingWebhookConfiguration` object in the `admissionregistration.k8s.io/v1`
|
`MutatingWebhookConfiguration` object in the `admissionregistration.k8s.io/v1`
|
||||||
group/version via the `--runtime-config` flag, both are on by default.
|
group/version via the `--runtime-config` flag, both are on by default.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
#### Use caution when authoring and installing mutating webhooks
|
#### Use caution when authoring and installing mutating webhooks
|
||||||
|
|
||||||
* Users may be confused when the objects they try to create are different from
|
* Users may be confused when the objects they try to create are different from
|
||||||
|
|
@ -493,11 +525,15 @@ It creates a namespace if it cannot be found.
|
||||||
This admission controller is useful in deployments that do not want to restrict creation of
|
This admission controller is useful in deployments that do not want to restrict creation of
|
||||||
a namespace prior to its usage.
|
a namespace prior to its usage.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### NamespaceExists {#namespaceexists}
|
### NamespaceExists {#namespaceexists}
|
||||||
|
|
||||||
This admission controller checks all requests on namespaced resources other than `Namespace` itself.
|
This admission controller checks all requests on namespaced resources other than `Namespace` itself.
|
||||||
If the namespace referenced from a request doesn't exist, the request is rejected.
|
If the namespace referenced from a request doesn't exist, the request is rejected.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### NamespaceLifecycle {#namespacelifecycle}
|
### NamespaceLifecycle {#namespacelifecycle}
|
||||||
|
|
||||||
This admission controller enforces that a `Namespace` that is undergoing termination cannot have
|
This admission controller enforces that a `Namespace` that is undergoing termination cannot have
|
||||||
|
|
@ -509,6 +545,8 @@ A `Namespace` deletion kicks off a sequence of operations that remove all object
|
||||||
etc.) in that namespace. In order to enforce integrity of that process, we strongly recommend
|
etc.) in that namespace. In order to enforce integrity of that process, we strongly recommend
|
||||||
running this admission controller.
|
running this admission controller.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### NodeRestriction {#noderestriction}
|
### NodeRestriction {#noderestriction}
|
||||||
|
|
||||||
This admission controller limits the `Node` and `Pod` objects a kubelet can modify. In order to be limited by this admission controller,
|
This admission controller limits the `Node` and `Pod` objects a kubelet can modify. In order to be limited by this admission controller,
|
||||||
|
|
@ -541,6 +579,8 @@ and may be disallowed or allowed by the `NodeRestriction` admission plugin in th
|
||||||
Future versions may add additional restrictions to ensure kubelets have the minimal set of
|
Future versions may add additional restrictions to ensure kubelets have the minimal set of
|
||||||
permissions required to operate correctly.
|
permissions required to operate correctly.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### OwnerReferencesPermissionEnforcement {#ownerreferencespermissionenforcement}
|
### OwnerReferencesPermissionEnforcement {#ownerreferencespermissionenforcement}
|
||||||
|
|
||||||
This admission controller protects the access to the `metadata.ownerReferences` of an object
|
This admission controller protects the access to the `metadata.ownerReferences` of an object
|
||||||
|
|
@ -549,6 +589,8 @@ This admission controller also protects the access to `metadata.ownerReferences[
|
||||||
of an object, so that only users with **update** permission to the `finalizers`
|
of an object, so that only users with **update** permission to the `finalizers`
|
||||||
subresource of the referenced *owner* can change it.
|
subresource of the referenced *owner* can change it.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### PersistentVolumeClaimResize {#persistentvolumeclaimresize}
|
### PersistentVolumeClaimResize {#persistentvolumeclaimresize}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.24" state="stable" >}}
|
{{< feature-state for_k8s_version="v1.24" state="stable" >}}
|
||||||
|
|
@ -578,6 +620,8 @@ allowVolumeExpansion: true
|
||||||
|
|
||||||
For more information about persistent volume claims, see [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims).
|
For more information about persistent volume claims, see [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims).
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### PersistentVolumeLabel {#persistentvolumelabel}
|
### PersistentVolumeLabel {#persistentvolumelabel}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
|
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
|
||||||
|
|
@ -593,6 +637,8 @@ the {{< glossary_tooltip text="cloud-controller-manager" term_id="cloud-controll
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### PodNodeSelector {#podnodeselector}
|
### PodNodeSelector {#podnodeselector}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.5" state="alpha" >}}
|
{{< feature-state for_k8s_version="v1.5" state="alpha" >}}
|
||||||
|
|
@ -602,6 +648,8 @@ by reading a namespace annotation and a global configuration.
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
#### Configuration file format
|
#### Configuration file format
|
||||||
|
|
||||||
`PodNodeSelector` uses a configuration file to set options for the behavior of the backend.
|
`PodNodeSelector` uses a configuration file to set options for the behavior of the backend.
|
||||||
|
|
@ -673,6 +721,8 @@ documentation for more information.
|
||||||
|
|
||||||
PodSecurity replaced an older admission controller named PodSecurityPolicy.
|
PodSecurity replaced an older admission controller named PodSecurityPolicy.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### PodTolerationRestriction {#podtolerationrestriction}
|
### PodTolerationRestriction {#podtolerationrestriction}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.7" state="alpha" >}}
|
{{< feature-state for_k8s_version="v1.7" state="alpha" >}}
|
||||||
|
|
@ -705,12 +755,16 @@ metadata:
|
||||||
|
|
||||||
This admission controller is disabled by default.
|
This admission controller is disabled by default.
|
||||||
|
|
||||||
|
**Type**: Mutating and Validating.
|
||||||
|
|
||||||
### Priority {#priority}
|
### Priority {#priority}
|
||||||
|
|
||||||
The priority admission controller uses the `priorityClassName` field and populates the integer
|
The priority admission controller uses the `priorityClassName` field and populates the integer
|
||||||
value of the priority.
|
value of the priority.
|
||||||
If the priority class is not found, the Pod is rejected.
|
If the priority class is not found, the Pod is rejected.
|
||||||
|
|
||||||
|
**Type**: Mutating and Validating.
|
||||||
|
|
||||||
### ResourceQuota {#resourcequota}
|
### ResourceQuota {#resourcequota}
|
||||||
|
|
||||||
This admission controller will observe the incoming request and ensure that it does not violate
|
This admission controller will observe the incoming request and ensure that it does not violate
|
||||||
|
|
@ -721,6 +775,8 @@ controller to enforce quota constraints.
|
||||||
See the [ResourceQuota API reference](/docs/reference/kubernetes-api/policy-resources/resource-quota-v1/)
|
See the [ResourceQuota API reference](/docs/reference/kubernetes-api/policy-resources/resource-quota-v1/)
|
||||||
and the [example of Resource Quota](/docs/concepts/policy/resource-quotas/) for more details.
|
and the [example of Resource Quota](/docs/concepts/policy/resource-quotas/) for more details.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### RuntimeClass {#runtimeclass}
|
### RuntimeClass {#runtimeclass}
|
||||||
|
|
||||||
If you define a RuntimeClass with [Pod overhead](/docs/concepts/scheduling-eviction/pod-overhead/)
|
If you define a RuntimeClass with [Pod overhead](/docs/concepts/scheduling-eviction/pod-overhead/)
|
||||||
|
|
@ -734,6 +790,8 @@ defined in the corresponding RuntimeClass.
|
||||||
See also [Pod Overhead](/docs/concepts/scheduling-eviction/pod-overhead/)
|
See also [Pod Overhead](/docs/concepts/scheduling-eviction/pod-overhead/)
|
||||||
for more information.
|
for more information.
|
||||||
|
|
||||||
|
**Type**: Mutating and Validating.
|
||||||
|
|
||||||
### SecurityContextDeny {#securitycontextdeny}
|
### SecurityContextDeny {#securitycontextdeny}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.27" state="deprecated" >}}
|
{{< feature-state for_k8s_version="v1.27" state="deprecated" >}}
|
||||||
|
|
@ -775,6 +833,8 @@ from the Kubernetes blog article about PodSecurityPolicy and its removal. The
|
||||||
article details the PodSecurityPolicy historical context and the birth of the
|
article details the PodSecurityPolicy historical context and the birth of the
|
||||||
`securityContext` field for Pods.
|
`securityContext` field for Pods.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### ServiceAccount {#serviceaccount}
|
### ServiceAccount {#serviceaccount}
|
||||||
|
|
||||||
This admission controller implements automation for
|
This admission controller implements automation for
|
||||||
|
|
@ -783,6 +843,8 @@ The Kubernetes project strongly recommends enabling this admission controller.
|
||||||
You should enable this admission controller if you intend to make any use of Kubernetes
|
You should enable this admission controller if you intend to make any use of Kubernetes
|
||||||
`ServiceAccount` objects.
|
`ServiceAccount` objects.
|
||||||
|
|
||||||
|
**Type**: Mutating and Validating.
|
||||||
|
|
||||||
### StorageObjectInUseProtection
|
### StorageObjectInUseProtection
|
||||||
|
|
||||||
The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection` or `kubernetes.io/pv-protection`
|
The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection` or `kubernetes.io/pv-protection`
|
||||||
|
|
@ -793,6 +855,8 @@ Refer to the
|
||||||
[Storage Object in Use Protection](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection)
|
[Storage Object in Use Protection](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection)
|
||||||
for more detailed information.
|
for more detailed information.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### TaintNodesByCondition {#taintnodesbycondition}
|
### TaintNodesByCondition {#taintnodesbycondition}
|
||||||
|
|
||||||
This admission controller {{< glossary_tooltip text="taints" term_id="taint" >}} newly created
|
This admission controller {{< glossary_tooltip text="taints" term_id="taint" >}} newly created
|
||||||
|
|
@ -800,12 +864,16 @@ Nodes as `NotReady` and `NoSchedule`. That tainting avoids a race condition that
|
||||||
to be scheduled on new Nodes before their taints were updated to accurately reflect their reported
|
to be scheduled on new Nodes before their taints were updated to accurately reflect their reported
|
||||||
conditions.
|
conditions.
|
||||||
|
|
||||||
|
**Type**: Mutating.
|
||||||
|
|
||||||
### ValidatingAdmissionPolicy {#validatingadmissionpolicy}
|
### ValidatingAdmissionPolicy {#validatingadmissionpolicy}
|
||||||
|
|
||||||
[This admission controller](/docs/reference/access-authn-authz/validating-admission-policy/) implements the CEL validation for incoming matched requests.
|
[This admission controller](/docs/reference/access-authn-authz/validating-admission-policy/) implements the CEL validation for incoming matched requests.
|
||||||
It is enabled when both feature gate `validatingadmissionpolicy` and `admissionregistration.k8s.io/v1alpha1` group/version are enabled.
|
It is enabled when both feature gate `validatingadmissionpolicy` and `admissionregistration.k8s.io/v1alpha1` group/version are enabled.
|
||||||
If any of the ValidatingAdmissionPolicy fails, the request fails.
|
If any of the ValidatingAdmissionPolicy fails, the request fails.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
### ValidatingAdmissionWebhook {#validatingadmissionwebhook}
|
### ValidatingAdmissionWebhook {#validatingadmissionwebhook}
|
||||||
|
|
||||||
This admission controller calls any validating webhooks which match the request. Matching
|
This admission controller calls any validating webhooks which match the request. Matching
|
||||||
|
|
@ -821,6 +889,8 @@ If you disable the ValidatingAdmissionWebhook, you must also disable the
|
||||||
`ValidatingWebhookConfiguration` object in the `admissionregistration.k8s.io/v1`
|
`ValidatingWebhookConfiguration` object in the `admissionregistration.k8s.io/v1`
|
||||||
group/version via the `--runtime-config` flag.
|
group/version via the `--runtime-config` flag.
|
||||||
|
|
||||||
|
**Type**: Validating.
|
||||||
|
|
||||||
## Is there a recommended set of admission controllers to use?
|
## Is there a recommended set of admission controllers to use?
|
||||||
|
|
||||||
Yes. The recommended admission controllers are enabled by default
|
Yes. The recommended admission controllers are enabled by default
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue