|
| 1 | +:_mod-docs-content-type: CONCEPT |
| 2 | +//[id="sd-managed-resources"] |
| 3 | +[id="sd-redhat-managed-resources_{context}"] |
| 4 | += Red{nbsp}Hat managed resources |
| 5 | +include::_attributes/attributes-openshift-dedicated.adoc[] |
| 6 | +:context: sd-managed-resources |
| 7 | + |
| 8 | +toc::[] |
| 9 | + |
| 10 | +[id="sd-managed-resources-overview_{context}"] |
| 11 | +== Overview |
| 12 | + |
| 13 | +The following covers all {product-title} resources that are managed or protected by the Service Reliability Engineering Platform (SRE-P) Team. Customers should not try to change these resources because doing so can lead to cluster instability. |
| 14 | + |
| 15 | +[id="sd-managed-resources-all_{context}"] |
| 16 | +== Managed resources |
| 17 | + |
| 18 | +The following list displays the {product-title} resources managed by OpenShift Hive, the centralized fleet configuration management system. These resources are in addition to the OpenShift Container Platform resources created during installation. OpenShift Hive continually attempts to maintain consistency across all {product-title} clusters. Changes to {product-title} resources should be made through {cluster-manager} so that {cluster-manager} and Hive are synchronized. Contact ocm-feedback@redhat.com if {cluster-manager} does not support modifying the resources in question. |
| 19 | + |
| 20 | +.List of Red{nbsp}Hat managed resources |
| 21 | +[%collapsible] |
| 22 | +==== |
| 23 | +[source,yaml] |
| 24 | +---- |
| 25 | +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/managed/all-osd-resources.yaml[] |
| 26 | +---- |
| 27 | +==== |
| 28 | + |
| 29 | +[id="sd-core-namespaces_{context}"] |
| 30 | +== {product-title} core namespaces |
| 31 | + |
| 32 | +{product-title} core namespaces are installed by default during cluster installation. |
| 33 | + |
| 34 | +.List of core namespaces |
| 35 | +[%collapsible] |
| 36 | +==== |
| 37 | +[source,yaml] |
| 38 | +---- |
| 39 | +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/master/deploy/osd-managed-resources/ocp-namespaces.ConfigMap.yaml[] |
| 40 | +---- |
| 41 | +==== |
| 42 | + |
| 43 | +[id="sd-add-on-managed-namespaces_{context}"] |
| 44 | +== {product-title} add-on namespaces |
| 45 | + |
| 46 | +{product-title} add-ons are services available for installation after cluster installation. These additional services include {openshift-dev-spaces-productname}, Red{nbsp}Hat OpenShift API Management, and Cluster Logging Operator. Any changes to resources within the following namespaces can be overridden by the add-on during upgrades, which can lead to unsupported configurations for the add-on functionality. |
| 47 | + |
| 48 | +.List of add-on managed namespaces |
| 49 | +[%collapsible] |
| 50 | +==== |
| 51 | +[source,yaml] |
| 52 | +---- |
| 53 | +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/addons-namespaces/main.yaml[] |
| 54 | +---- |
| 55 | +==== |
| 56 | + |
| 57 | +[id="sd-validating-webhooks_{context}"] |
| 58 | +== {product-title} validating webhooks |
| 59 | + |
| 60 | +{product-title} validating webhooks are a set of dynamic admission controls maintained by the OpenShift SRE team. These HTTP callbacks, also known as webhooks, are called for various types of requests to ensure cluster stability. The following list describes the various webhooks with rules containing the registered operations and resources that are controlled. Any attempt to circumvent these validating webhooks could affect the stability and supportability of the cluster. |
| 61 | + |
| 62 | +.List of validating webhooks |
| 63 | +[%collapsible] |
| 64 | +==== |
| 65 | +[source,json] |
| 66 | +---- |
| 67 | +include::https://raw.githubusercontent.com/openshift/managed-cluster-validating-webhooks/master/docs/webhooks.json[] |
| 68 | +---- |
| 69 | +==== |
| 70 | + |
0 commit comments