New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support deployment in namespaces with stricted Pod Security Admission #741
Labels
bug
Something isn't working
Comments
gaohoward
pushed a commit
to gaohoward/activemq-artemis-operator-1
that referenced
this issue
Nov 22, 2023
…evel Pod Security Admission
gaohoward
pushed a commit
to gaohoward/activemq-artemis-operator-1
that referenced
this issue
Nov 27, 2023
…evel Pod Security Admission
brusdev
pushed a commit
to brusdev/activemq-artemis-operator
that referenced
this issue
Feb 21, 2024
…evel Pod Security Admission
brusdev
pushed a commit
that referenced
this issue
Feb 21, 2024
The changes to support the deployment in namespaces with the restricted policy will be included in 1.1.0 |
brusdev
added a commit
that referenced
this issue
Feb 27, 2024
brusdev
added a commit
that referenced
this issue
Mar 1, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the bug
The Pod Security Admission will be enforced upon Openshift and the operator should make sure it conforms to the restricted security level.
The text was updated successfully, but these errors were encountered: