Skip to content

Commit 870013f

Browse files
Merge pull request #93463 from kcarmichael08/ROX-29306-rhacs-updates
ROX-29306: Updates for admission controller docs
2 parents f31a0bd + e6ff084 commit 870013f

File tree

2 files changed

+5
-1
lines changed

2 files changed

+5
-1
lines changed

modules/policy-enforcement-deploy.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,17 @@ If you make changes to settings in the *Static Configuration* setting, you must
3939

4040
Soft enforcement is performed by {product-title-short} Sensor. This enforcement prevents an operation from being initiated. With soft enforcement, Sensor scales the replicas to 0, and prevents pods from being scheduled. In this enforcement, a non-ready deployment is available in the cluster.
4141

42+
By design, Sensor only performs this soft enforcement once, to prevent trapping of update requests to scale the deployment back down again.
43+
4244
If soft enforcement is configured, and Sensor is down, then {product-title-short} cannot perform enforcement.
4345

4446
[id="namespace-exclusions_{context}"]
4547
== Namespace exclusions
4648

4749
By default, {product-title-short} excludes certain administrative namespaces, such as the `stackrox`, `kube-system`, and `istio-system` namespaces, from enforcement blocking. The reason for this is that some items in these namespaces must be deployed for {product-title-short} to work correctly.
4850

51+
In addition, the {product-title-short} admission controller bypasses requests that originate from a `service` account in a `system` namespace. Consider this factor when deploying the CI/CD tool of your choice.
52+
4953
[id="enforcement-existing-deployments_{context}"]
5054
== Enforcement on existing deployments
5155

modules/understand-admission-controller-enforcement.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ If you intend to use admission controller enforcement, consider the following:
99

1010
* *API latency*: Using admission controller enforcement increases Kubernetes or {ocp} API latency because it involves additional API validation requests.
1111
Many standard Kubernetes libraries, such as fabric8, have short Kubernetes or {ocp} API timeouts by default.
12-
Also, consider API timeouts in any custom automation you might be using.
12+
Also, consider API timeouts in any custom automation you might be using. If a request does time out due to latency issues, the admission controller will _fail open_, or allow the request to reach the API server.
1313
* *Image scanning*: You can choose whether the admission controller scans images while reviewing requests by setting the *Contact Image Scanners* option in the cluster configuration panel.
1414
** If you enable this setting, {product-title} contacts the image scanners if the scan or image signature verification results are not already available, which adds considerable latency.
1515
** If you disable this setting, the enforcement decision only considers image scan criteria if cached scan and signature verification results are available.

0 commit comments

Comments
 (0)