diff --git a/docs/content/general/tenant-crd.md b/docs/content/general/tenant-crd.md index 13d8cb3f..f1c5bc82 100644 --- a/docs/content/general/tenant-crd.md +++ b/docs/content/general/tenant-crd.md @@ -20,6 +20,7 @@ Packages: - [capsule.clastix.io/v1alpha1](#capsuleclastixiov1alpha1) +- [capsule.clastix.io/v1beta2](#capsuleclastixiov1beta2) - [capsule.clastix.io/v1beta1](#capsuleclastixiov1beta1) # capsule.clastix.io/v1alpha1 @@ -1579,6 +1580,2171 @@ TenantStatus defines the observed state of Tenant. +# capsule.clastix.io/v1beta2 + +Resource Types: + +- [CapsuleConfiguration](#capsuleconfiguration) + +- [Tenant](#tenant) + + + + +## CapsuleConfiguration + + + + + + +CapsuleConfiguration is the Schema for the Capsule configuration API. + +
Name | +Type | +Description | +Required | +
---|---|---|---|
apiVersion | +string | +capsule.clastix.io/v1beta2 | +true | +
kind | +string | +CapsuleConfiguration | +true | +
metadata | +object | +Refer to the Kubernetes API documentation for the fields of the `metadata` field. | +true | +
spec | +object | +
+ CapsuleConfigurationSpec defines the Capsule configuration. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
enableTLSReconciler | +boolean | +
+ Toggles the TLS reconciler, the controller that is able to generate CA and certificates for the webhooks when not using an already provided CA and certificate, or when these are managed externally with Vault, or cert-manager. + + Default: true + |
+ true | +
nodeMetadata | +object | +
+ Allows to set the forbidden metadata for the worker nodes that could be patched by a Tenant. This applies only if the Tenant has an active NodeSelector, and the Owner have right to patch their nodes. + |
+ true | +
overrides | +object | +
+ Allows to set different name rather than the canonical one for the Capsule configuration objects, such as webhook secret or configurations. + |
+ true | +
forceTenantPrefix | +boolean | +
+ Enforces the Tenant owner, during Namespace creation, to name it using the selected Tenant name as prefix, separated by a dash. This is useful to avoid Namespace name collision in a public CaaS environment. + + Default: false + |
+ false | +
protectedNamespaceRegex | +string | +
+ Disallow creation of namespaces, whose name matches this regexp + |
+ false | +
userGroups | +[]string | +
+ Names of the groups for Capsule users. + + Default: [capsule.clastix.io] + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
forbiddenAnnotations | +object | +
+ Define the annotations that a Tenant Owner cannot set for their nodes. + |
+ true | +
forbiddenLabels | +object | +
+ Define the labels that a Tenant Owner cannot set for their nodes. + |
+ true | +
Name | +Type | +Description | +Required | +
---|---|---|---|
denied | +[]string | +
+ + |
+ false | +
deniedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
denied | +[]string | +
+ + |
+ false | +
deniedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
TLSSecretName | +string | +
+ Defines the Secret name used for the webhook server. Must be in the same Namespace where the Capsule Deployment is deployed. + + Default: capsule-tls + |
+ true | +
mutatingWebhookConfigurationName | +string | +
+ Name of the MutatingWebhookConfiguration which contains the dynamic admission controller paths and resources. + + Default: capsule-mutating-webhook-configuration + |
+ true | +
validatingWebhookConfigurationName | +string | +
+ Name of the ValidatingWebhookConfiguration which contains the dynamic admission controller paths and resources. + + Default: capsule-validating-webhook-configuration + |
+ true | +
Name | +Type | +Description | +Required | +
---|---|---|---|
apiVersion | +string | +capsule.clastix.io/v1beta2 | +true | +
kind | +string | +Tenant | +true | +
metadata | +object | +Refer to the Kubernetes API documentation for the fields of the `metadata` field. | +true | +
spec | +object | +
+ TenantSpec defines the desired state of Tenant. + |
+ false | +
status | +object | +
+ Returns the observed state of the Tenant. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
owners | +[]object | +
+ Specifies the owners of the Tenant. Mandatory. + |
+ true | +
additionalRoleBindings | +[]object | +
+ Specifies additional RoleBindings assigned to the Tenant. Capsule will ensure that all namespaces in the Tenant always contain the RoleBinding for the given ClusterRole. Optional. + |
+ false | +
containerRegistries | +object | +
+ Specifies the trusted Image Registries assigned to the Tenant. Capsule assures that all Pods resources created in the Tenant can use only one of the allowed trusted registries. Optional. + |
+ false | +
cordoned | +boolean | +
+ Toggling the Tenant resources cordoning, when enable resources cannot be deleted. + |
+ false | +
imagePullPolicies | +[]enum | +
+ Specify the allowed values for the imagePullPolicies option in Pod resources. Capsule assures that all Pod resources created in the Tenant can use only one of the allowed policy. Optional. + |
+ false | +
ingressOptions | +object | +
+ Specifies options for the Ingress resources, such as allowed hostnames and IngressClass. Optional. + |
+ false | +
limitRanges | +object | +
+ Specifies the resource min/max usage restrictions to the Tenant. The assigned values are inherited by any namespace created in the Tenant. Optional. + |
+ false | +
namespaceOptions | +object | +
+ Specifies options for the Namespaces, such as additional metadata or maximum number of namespaces allowed for that Tenant. Once the namespace quota assigned to the Tenant has been reached, the Tenant owner cannot create further namespaces. Optional. + |
+ false | +
networkPolicies | +object | +
+ Specifies the NetworkPolicies assigned to the Tenant. The assigned NetworkPolicies are inherited by any namespace created in the Tenant. Optional. + |
+ false | +
nodeSelector | +map[string]string | +
+ Specifies the label to control the placement of pods on a given pool of worker nodes. All namespaces created within the Tenant will have the node selector annotation. This annotation tells the Kubernetes scheduler to place pods on the nodes having the selector label. Optional. + |
+ false | +
preventDeletion | +boolean | +
+ Prevent accidental deletion of the Tenant. When enabled, the deletion request will be declined. + |
+ false | +
priorityClasses | +object | +
+ Specifies the allowed priorityClasses assigned to the Tenant. Capsule assures that all Pods resources created in the Tenant can use only one of the allowed PriorityClasses. Optional. + |
+ false | +
resourceQuotas | +object | +
+ Specifies a list of ResourceQuota resources assigned to the Tenant. The assigned values are inherited by any namespace created in the Tenant. The Capsule operator aggregates ResourceQuota at Tenant level, so that the hard quota is never crossed for the given Tenant. This permits the Tenant owner to consume resources in the Tenant regardless of the namespace. Optional. + |
+ false | +
serviceOptions | +object | +
+ Specifies options for the Service, such as additional metadata or block of certain type of Services. Optional. + |
+ false | +
storageClasses | +object | +
+ Specifies the allowed StorageClasses assigned to the Tenant. Capsule assures that all PersistentVolumeClaim resources created in the Tenant can use only one of the allowed StorageClasses. Optional. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
clusterRoles | +[]string | +
+ Defines additional cluster-roles for the specific Owner. + |
+ true | +
kind | +enum | +
+ Kind of tenant owner. Possible values are "User", "Group", and "ServiceAccount" + + Enum: User, Group, ServiceAccount + |
+ true | +
name | +string | +
+ Name of tenant owner. + |
+ true | +
proxySettings | +[]object | +
+ Proxy settings for tenant owner. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
kind | +enum | +
+ + + Enum: Nodes, StorageClasses, IngressClasses, PriorityClasses + |
+ true | +
operations | +[]enum | +
+ + |
+ true | +
Name | +Type | +Description | +Required | +
---|---|---|---|
clusterRoleName | +string | +
+ + |
+ true | +
subjects | +[]object | +
+ kubebuilder:validation:Minimum=1 + |
+ true | +
Name | +Type | +Description | +Required | +
---|---|---|---|
kind | +string | +
+ Kind of object being referenced. Values defined by this API group are "User", "Group", and "ServiceAccount". If the Authorizer does not recognized the kind value, the Authorizer should report an error. + |
+ true | +
name | +string | +
+ Name of the object being referenced. + |
+ true | +
apiGroup | +string | +
+ APIGroup holds the API group of the referenced subject. Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" for User and Group subjects. + |
+ false | +
namespace | +string | +
+ Namespace of the referenced object. If the object kind is non-namespace, such as "User" or "Group", and this value is not empty the Authorizer should report an error. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
allowed | +[]string | +
+ + |
+ false | +
allowedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
allowWildcardHostnames | +boolean | +
+ Toggles the ability for Ingress resources created in a Tenant to have a hostname wildcard. + |
+ true | +
allowedClasses | +object | +
+ Specifies the allowed IngressClasses assigned to the Tenant. Capsule assures that all Ingress resources created in the Tenant can use only one of the allowed IngressClasses. Optional. + |
+ false | +
allowedHostnames | +object | +
+ Specifies the allowed hostnames in Ingresses for the given Tenant. Capsule assures that all Ingress resources created in the Tenant can use only one of the allowed hostnames. Optional. + |
+ false | +
hostnameCollisionScope | +enum | +
+ Defines the scope of hostname collision check performed when Tenant Owners create Ingress with allowed hostnames.
+ - Cluster: disallow the creation of an Ingress if the pair hostname and path is already used across the Namespaces managed by Capsule.
+ - Tenant: disallow the creation of an Ingress if the pair hostname and path is already used across the Namespaces of the Tenant.
+ - Namespace: disallow the creation of an Ingress if the pair hostname and path is already used in the Ingress Namespace.
+ Optional. + + Enum: Cluster, Tenant, Namespace, Disabled + Default: Disabled + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
allowed | +[]string | +
+ + |
+ false | +
allowedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
allowed | +[]string | +
+ + |
+ false | +
allowedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
items | +[]object | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
limits | +[]object | +
+ Limits is the list of LimitRangeItem objects that are enforced. + |
+ true | +
Name | +Type | +Description | +Required | +
---|---|---|---|
type | +string | +
+ Type of resource that this limit applies to. + |
+ true | +
default | +map[string]int or string | +
+ Default resource requirement limit value by resource name if resource limit is omitted. + |
+ false | +
defaultRequest | +map[string]int or string | +
+ DefaultRequest is the default resource requirement request value by resource name if resource request is omitted. + |
+ false | +
max | +map[string]int or string | +
+ Max usage constraints on this kind by resource name. + |
+ false | +
maxLimitRequestRatio | +map[string]int or string | +
+ MaxLimitRequestRatio if specified, the named resource must have a request and limit that are both non-zero where limit divided by request is less than or equal to the enumerated value; this represents the max burst for the named resource. + |
+ false | +
min | +map[string]int or string | +
+ Min usage constraints on this kind by resource name. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
forbiddenAnnotations | +object | +
+ Define the annotations that a Tenant Owner cannot set for their Namespace resources. + |
+ true | +
forbiddenLabels | +object | +
+ Define the labels that a Tenant Owner cannot set for their Namespace resources. + |
+ true | +
additionalMetadata | +object | +
+ Specifies additional labels and annotations the Capsule operator places on any Namespace resource in the Tenant. Optional. + |
+ false | +
quota | +integer | +
+ Specifies the maximum number of namespaces allowed for that Tenant. Once the namespace quota assigned to the Tenant has been reached, the Tenant owner cannot create further namespaces. Optional. + + Format: int32 + Minimum: 1 + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
denied | +[]string | +
+ + |
+ false | +
deniedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
denied | +[]string | +
+ + |
+ false | +
deniedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
annotations | +map[string]string | +
+ + |
+ false | +
labels | +map[string]string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
items | +[]object | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
podSelector | +object | +
+ Selects the pods to which this NetworkPolicy object applies. The array of ingress rules is applied to any pods selected by this field. Multiple network policies can select the same set of pods. In this case, the ingress rules for each are combined additively. This field is NOT optional and follows standard label selector semantics. An empty podSelector matches all pods in this namespace. + |
+ true | +
egress | +[]object | +
+ List of egress rules to be applied to the selected pods. Outgoing traffic is allowed if there are no NetworkPolicies selecting the pod (and cluster policy otherwise allows the traffic), OR if the traffic matches at least one egress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy limits all outgoing traffic (and serves solely to ensure that the pods it selects are isolated by default). This field is beta-level in 1.8 + |
+ false | +
ingress | +[]object | +
+ List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod (and cluster policy otherwise allows the traffic), OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not allow any traffic (and serves solely to ensure that the pods it selects are isolated by default) + |
+ false | +
policyTypes | +[]string | +
+ List of rule types that the NetworkPolicy relates to. Valid options are ["Ingress"], ["Egress"], or ["Ingress", "Egress"]. If this field is not specified, it will default based on the existence of Ingress or Egress rules; policies that contain an Egress section are assumed to affect Egress, and all policies (whether or not they contain an Ingress section) are assumed to affect Ingress. If you want to write an egress-only policy, you must explicitly specify policyTypes [ "Egress" ]. Likewise, if you want to write a policy that specifies that no egress is allowed, you must specify a policyTypes value that include "Egress" (since such a policy would not include an Egress section and would otherwise default to just [ "Ingress" ]). This field is beta-level in 1.8 + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
matchExpressions | +[]object | +
+ matchExpressions is a list of label selector requirements. The requirements are ANDed. + |
+ false | +
matchLabels | +map[string]string | +
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
key | +string | +
+ key is the label key that the selector applies to. + |
+ true | +
operator | +string | +
+ operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. + |
+ true | +
values | +[]string | +
+ values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
ports | +[]object | +
+ List of destination ports for outgoing traffic. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list. + |
+ false | +
to | +[]object | +
+ List of destinations for outgoing traffic of pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all destinations (traffic not restricted by destination). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the to list. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
endPort | +integer | +
+ If set, indicates that the range of ports from port to endPort, inclusive, should be allowed by the policy. This field cannot be defined if the port field is not defined or if the port field is defined as a named (string) port. The endPort must be equal or greater than port. This feature is in Beta state and is enabled by default. It can be disabled using the Feature Gate "NetworkPolicyEndPort". + + Format: int32 + |
+ false | +
port | +int or string | +
+ The port on the given protocol. This can either be a numerical or named port on a pod. If this field is not provided, this matches all port names and numbers. If present, only traffic on the specified protocol AND port will be matched. + |
+ false | +
protocol | +string | +
+ The protocol (TCP, UDP, or SCTP) which traffic must match. If not specified, this field defaults to TCP. + + Default: TCP + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
ipBlock | +object | +
+ IPBlock defines policy on a particular IPBlock. If this field is set then neither of the other fields can be. + |
+ false | +
namespaceSelector | +object | +
+ Selects Namespaces using cluster-scoped labels. This field follows standard label selector semantics; if present but empty, it selects all namespaces.
+ If PodSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects all Pods in the Namespaces selected by NamespaceSelector. + |
+ false | +
podSelector | +object | +
+ This is a label selector which selects Pods. This field follows standard label selector semantics; if present but empty, it selects all pods.
+ If NamespaceSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects the Pods matching PodSelector in the policy's own Namespace. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
cidr | +string | +
+ CIDR is a string representing the IP Block Valid examples are "192.168.1.1/24" or "2001:db9::/64" + |
+ true | +
except | +[]string | +
+ Except is a slice of CIDRs that should not be included within an IP Block Valid examples are "192.168.1.1/24" or "2001:db9::/64" Except values will be rejected if they are outside the CIDR range + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
matchExpressions | +[]object | +
+ matchExpressions is a list of label selector requirements. The requirements are ANDed. + |
+ false | +
matchLabels | +map[string]string | +
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
key | +string | +
+ key is the label key that the selector applies to. + |
+ true | +
operator | +string | +
+ operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. + |
+ true | +
values | +[]string | +
+ values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
matchExpressions | +[]object | +
+ matchExpressions is a list of label selector requirements. The requirements are ANDed. + |
+ false | +
matchLabels | +map[string]string | +
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
key | +string | +
+ key is the label key that the selector applies to. + |
+ true | +
operator | +string | +
+ operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. + |
+ true | +
values | +[]string | +
+ values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
from | +[]object | +
+ List of sources which should be able to access the pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all sources (traffic not restricted by source). If this field is present and contains at least one item, this rule allows traffic only if the traffic matches at least one item in the from list. + |
+ false | +
ports | +[]object | +
+ List of ports which should be made accessible on the pods selected for this rule. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
ipBlock | +object | +
+ IPBlock defines policy on a particular IPBlock. If this field is set then neither of the other fields can be. + |
+ false | +
namespaceSelector | +object | +
+ Selects Namespaces using cluster-scoped labels. This field follows standard label selector semantics; if present but empty, it selects all namespaces.
+ If PodSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects all Pods in the Namespaces selected by NamespaceSelector. + |
+ false | +
podSelector | +object | +
+ This is a label selector which selects Pods. This field follows standard label selector semantics; if present but empty, it selects all pods.
+ If NamespaceSelector is also set, then the NetworkPolicyPeer as a whole selects the Pods matching PodSelector in the Namespaces selected by NamespaceSelector. Otherwise it selects the Pods matching PodSelector in the policy's own Namespace. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
cidr | +string | +
+ CIDR is a string representing the IP Block Valid examples are "192.168.1.1/24" or "2001:db9::/64" + |
+ true | +
except | +[]string | +
+ Except is a slice of CIDRs that should not be included within an IP Block Valid examples are "192.168.1.1/24" or "2001:db9::/64" Except values will be rejected if they are outside the CIDR range + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
matchExpressions | +[]object | +
+ matchExpressions is a list of label selector requirements. The requirements are ANDed. + |
+ false | +
matchLabels | +map[string]string | +
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
key | +string | +
+ key is the label key that the selector applies to. + |
+ true | +
operator | +string | +
+ operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. + |
+ true | +
values | +[]string | +
+ values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
matchExpressions | +[]object | +
+ matchExpressions is a list of label selector requirements. The requirements are ANDed. + |
+ false | +
matchLabels | +map[string]string | +
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
key | +string | +
+ key is the label key that the selector applies to. + |
+ true | +
operator | +string | +
+ operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. + |
+ true | +
values | +[]string | +
+ values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
endPort | +integer | +
+ If set, indicates that the range of ports from port to endPort, inclusive, should be allowed by the policy. This field cannot be defined if the port field is not defined or if the port field is defined as a named (string) port. The endPort must be equal or greater than port. This feature is in Beta state and is enabled by default. It can be disabled using the Feature Gate "NetworkPolicyEndPort". + + Format: int32 + |
+ false | +
port | +int or string | +
+ The port on the given protocol. This can either be a numerical or named port on a pod. If this field is not provided, this matches all port names and numbers. If present, only traffic on the specified protocol AND port will be matched. + |
+ false | +
protocol | +string | +
+ The protocol (TCP, UDP, or SCTP) which traffic must match. If not specified, this field defaults to TCP. + + Default: TCP + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
allowed | +[]string | +
+ + |
+ false | +
allowedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
items | +[]object | +
+ + |
+ false | +
scope | +enum | +
+ Define if the Resource Budget should compute resource across all Namespaces in the Tenant or individually per cluster. Default is Tenant + + Enum: Tenant, Namespace + Default: Tenant + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
hard | +map[string]int or string | +
+ hard is the set of desired hard limits for each named resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/ + |
+ false | +
scopeSelector | +object | +
+ scopeSelector is also a collection of filters like scopes that must match each object tracked by a quota but expressed using ScopeSelectorOperator in combination with possible values. For a resource to match, both scopes AND scopeSelector (if specified in spec), must be matched. + |
+ false | +
scopes | +[]string | +
+ A collection of filters that must match each object tracked by a quota. If not specified, the quota matches all objects. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
matchExpressions | +[]object | +
+ A list of scope selector requirements by scope of the resources. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
operator | +string | +
+ Represents a scope's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. + |
+ true | +
scopeName | +string | +
+ The name of the scope that the selector applies to. + |
+ true | +
values | +[]string | +
+ An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
additionalMetadata | +object | +
+ Specifies additional labels and annotations the Capsule operator places on any Service resource in the Tenant. Optional. + |
+ false | +
allowedServices | +object | +
+ Block or deny certain type of Services. Optional. + |
+ false | +
externalIPs | +object | +
+ Specifies the external IPs that can be used in Services with type ClusterIP. An empty list means no IPs are allowed. Optional. + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
annotations | +map[string]string | +
+ + |
+ false | +
labels | +map[string]string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
externalName | +boolean | +
+ Specifies if ExternalName service type resources are allowed for the Tenant. Default is true. Optional. + + Default: true + |
+ false | +
loadBalancer | +boolean | +
+ Specifies if LoadBalancer service type resources are allowed for the Tenant. Default is true. Optional. + + Default: true + |
+ false | +
nodePort | +boolean | +
+ Specifies if NodePort service type resources are allowed for the Tenant. Default is true. Optional. + + Default: true + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
allowed | +[]string | +
+ + |
+ true | +
Name | +Type | +Description | +Required | +
---|---|---|---|
allowed | +[]string | +
+ + |
+ false | +
allowedRegex | +string | +
+ + |
+ false | +
Name | +Type | +Description | +Required | +
---|---|---|---|
size | +integer | +
+ How many namespaces are assigned to the Tenant. + |
+ true | +
state | +enum | +
+ The operational state of the Tenant. Possible values are "Active", "Cordoned". + + Enum: Cordoned, Active + Default: Active + |
+ true | +
namespaces | +[]string | +
+ List of namespaces assigned to the Tenant. + |
+ false | +