Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-4950

RFE - Allow only to install supported features in OKE - Do not install unsupported features

    XMLWordPrintable

Details

    • False
    • None
    • False
    • Not Selected
    • 0
    • 0% 0%

    Description

      When proceeding to install OCP have a distinct process doing OKE, which will ONLY install supported feature of OKE

      It is very difficult for our cloud partners to keep reseller solutions installations of OKE in compliance.

      CU own comments

       

      We are in a middle of a POC project where we want to offer the Openshfit Kubernetes Engine (OKE) solution to some of our customers.
      We know that OKE deployment is similar to OCP deployment, the major difference being the number of components that are supported , OKE being a more stripped version of OCP.
      We have the following issue though:
      The criteria on which those non-supported components shouldn't be used on OKE is based on trust, meaning that installing an operator that is not permitted or using a cluster functionality that is not permitted will be violation of the Red Hat Subscription Agreement.
      We offer our clusters internally to multiple teams, we don't really use them ourselves.
      Most of those teams already have admin rights enabled for their ArgoCD deployments, which means a wrong copy/paste from a source or some accidental code could do something on the cluster that will 'break the trust' and we will be in the violation of the agreement.
      We'd like to know if there is a possibility to enforce some rules to prevent those accidental deployments via RBAC or something else.
      If not, is it possible to create a future request for the developer teams to implement such a thing ?
       
      

       

      Attachments

        Issue Links

          Activity

            People

              mak.redhat.com Marcos Entenza Garcia
              rhn-support-vmedina1 Victor Medina
              Votes:
              2 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: