您已以临时管理用户身份登录。更新集群 OAuth 配置以允许其他人登录。
API Explorer
描述 | ||||
---|---|---|---|---|
Binding | - | v1 | 真 | Binding ties one object to another; for example, a pod is bound to a node by a scheduler. Deprecated in 1.7, please use the bindings subresource of pods instead. |
组件状态 | - | v1 | 假 | ComponentStatus (and ComponentStatusList) holds the cluster validation info. Deprecated: This API is deprecated in v1.19+ |
配置映射 | - | v1 | 真 | ConfigMap holds configuration data for pods to consume. |
Endpoints | - | v1 | 真 | Endpoints is a collection of endpoints that implement the actual service. Example:
Name: "mysvc",
Subsets: [
{
Addresses: [{"ip": "10.10.1.1"}, {"ip": "10.10.2.2"}],
Ports: [{"name": "a", "port": 8675}, {"name": "b", "port": 309}]
},
{
Addresses: [{"ip": "10.10.3.3"}],
Ports: [{"name": "a", "port": 93}, {"name": "b", "port": 76}]
},
] |
事件 | - | v1 | 真 | Event is a report of an event somewhere in the cluster. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data. |
限制范围 | - | v1 | 真 | LimitRange sets resource usage limits for each kind of resource in a Namespace. |
命名空间 | - | v1 | 假 | Namespace provides a scope for Names. Use of multiple namespaces is optional. |
节点 | - | v1 | 假 | Node is a worker node in Kubernetes. Each node will have a unique identifier in the cache (i.e. in etcd). |
持久性卷 | - | v1 | 假 | PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes |
持久性卷声明 | - | v1 | 真 | PersistentVolumeClaim is a user's request for and claim to a persistent volume |
Pod | - | v1 | 真 | Pod is a collection of containers that can run on a host. This resource is created by clients and scheduled onto hosts. |
PodTemplate | - | v1 | 真 | PodTemplate describes a template for creating copies of a predefined pod. |
复制控制器 | - | v1 | 真 | ReplicationController represents the configuration of a replication controller. |
资源配额 | - | v1 | 真 | ResourceQuota sets aggregate quota restrictions enforced per namespace |
Secret | - | v1 | 真 | Secret holds secret data of a certain type. The total bytes of the values in the Data field must be less than MaxSecretSize bytes. |
服务 | - | v1 | 真 | Service is a named abstraction of software service (for example, mysql) consisting of local port (for example 3306) that the proxy listens on, and the selector that determines which pods will answer requests sent through the proxy. |
服务帐户 | - | v1 | 真 | ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets |
MutatingWebhookConfiguration | admissionregistration.k8s.io | v1 | 假 | MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object. |
ValidatingWebhookConfiguration | admissionregistration.k8s.io | v1 | 假 | ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it. |
自定义资源定义 | apiextensions.k8s.io | v1 | 假 | CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format <.spec.name>.<.spec.group>. |
API 服务 | apiregistration.k8s.io | v1 | 假 | APIService represents a server for a particular GroupVersion. Name must be "version.group". |
APIRequestCount | apiserver.openshift.io | v1 | 假 | APIRequestCount tracks requests made to an API. The instance name must be of the form `resource.version.group`, matching the resource.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ControllerRevision | apps | v1 | 真 | ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers. |
守护进程集 | apps | v1 | 真 | DaemonSet represents the configuration of a daemon set. |
部署 | apps | v1 | 真 | Deployment enables declarative updates for Pods and ReplicaSets. |
副本集 | apps | v1 | 真 | ReplicaSet ensures that a specified number of pod replicas are running at any given time. |
StatefulSet | apps | v1 | 真 | StatefulSet represents a set of pods with consistent identities. Identities are defined as:
- Network: A single stable DNS and hostname.
- Storage: As many VolumeClaims as requested.
The StatefulSet guarantees that a given network identity will always map to the same storage identity. |
APIManager | apps.3scale.net | v1alpha1 | 真 | APIManager is the Schema for the apimanagers API |
APIManagerBackup | apps.3scale.net | v1alpha1 | 真 | APIManagerBackup represents an APIManager backup |
APIManagerRestore | apps.3scale.net | v1alpha1 | 真 | APIManagerRestore represents an APIManager restore |
部署配置 | apps.openshift.io | v1 | 真 | Deployment Configs define the template for a pod and manages deploying new images or configuration changes. A single deployment configuration is usually analogous to a single micro-service. Can support many different deployment patterns, including full restart, customizable rolling updates, and fully custom behaviors, as well as pre- and post- deployment hooks. Each individual deployment is represented as a replication controller.
A deployment is "triggered" when its configuration is changed or a tag in an Image Stream is changed. Triggers can be disabled to allow manual control over a deployment. The "strategy" determines how the deployment is carried out and may be changed at any time. The `latestVersion` field is updated when a new deployment is triggered by any means.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
TokenReview | authentication.k8s.io | v1 | 假 | TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver. |
LocalSubjectAccessReview | authorization.k8s.io | v1 | 真 | LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking. |
SelfSubjectAccessReview | authorization.k8s.io | v1 | 真 | SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action |
SelfSubjectRulesReview | authorization.k8s.io | v1 | 假 | SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server. |
SubjectAccessReview | authorization.k8s.io | v1 | 假 | SubjectAccessReview checks whether or not a user or group can perform an action. |
ClusterRole | authorization.openshift.io | v1 | 假 | ClusterRole is a logical grouping of PolicyRules that can be referenced as a unit by ClusterRoleBindings.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ClusterRoleBinding | authorization.openshift.io | v1 | 假 | ClusterRoleBinding references a ClusterRole, but not contain it. It can reference any ClusterRole in the same namespace or in the global namespace. It adds who information via (Users and Groups) OR Subjects and namespace information by which namespace it exists in. ClusterRoleBindings in a given namespace only have effect in that namespace (excepting the master namespace which has power in all namespaces).
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
LocalResourceAccessReview | authorization.openshift.io | v1 | 真 | LocalResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec in a particular namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
LocalSubjectAccessReview | authorization.openshift.io | v1 | 真 | LocalSubjectAccessReview is an object for requesting information about whether a user or group can perform an action in a particular namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ResourceAccessReview | authorization.openshift.io | v1 | 假 | ResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Role | authorization.openshift.io | v1 | 真 | Role is a logical grouping of PolicyRules that can be referenced as a unit by RoleBindings.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
RoleBinding | authorization.openshift.io | v1 | 真 | RoleBinding references a Role, but not contain it. It can reference any Role in the same namespace or in the global namespace. It adds who information via (Users and Groups) OR Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace (excepting the master namespace which has power in all namespaces).
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
RoleBindingRestriction | authorization.openshift.io | v1 | 真 | RoleBindingRestriction is an object that can be matched against a subject (user, group, or service account) to determine whether rolebindings on that subject are allowed in the namespace to which the RoleBindingRestriction belongs. If any one of those RoleBindingRestriction objects matches a subject, rolebindings on that subject in the namespace are allowed.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
SelfSubjectRulesReview | authorization.openshift.io | v1 | 真 | SelfSubjectRulesReview is a resource you can create to determine which actions you can perform in a namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
SubjectAccessReview | authorization.openshift.io | v1 | 假 | SubjectAccessReview is an object for requesting information about whether a user or group can perform an action
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
SubjectRulesReview | authorization.openshift.io | v1 | 真 | SubjectRulesReview is a resource you can create to determine which actions another user can perform in a namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
AutomationController | automationcontroller.ansible.com | v1beta1 | 真 | Schema validation for the AWX CRD |
AutomationControllerBackup | automationcontroller.ansible.com | v1beta1 | 真 | |
AutomationControllerRestore | automationcontroller.ansible.com | v1beta1 | 真 | |
AutomationHub | automationhub.ansible.com | v1beta1 | 真 | |
AutomationHubBackup | automationhub.ansible.com | v1beta1 | 真 | |
AutomationHubRestore | automationhub.ansible.com | v1beta1 | 真 | |
HorizontalPodAutoscaler | autoscaling | v1 | 真 | configuration of a horizontal pod autoscaler. |
HorizontalPodAutoscaler | autoscaling | v2 | 真 | HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified. |
HorizontalPodAutoscaler | autoscaling | v2beta1 | 真 | HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified. |
HorizontalPodAutoscaler | autoscaling | v2beta2 | 真 | HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified. |
ClusterAutoscaler | autoscaling.openshift.io | v1 | 假 | ClusterAutoscaler is the Schema for the clusterautoscalers API |
MachineAutoscaler | autoscaling.openshift.io | v1beta1 | 真 | MachineAutoscaler is the Schema for the machineautoscalers API |
CronJob | batch | v1 | 真 | CronJob represents the configuration of a single cron job. |
作业 | batch | v1 | 真 | Job represents the configuration of a single job. |
CronJob | batch | v1beta1 | 真 | CronJob represents the configuration of a single cron job. |
构建 | build.openshift.io | v1 | 真 | Build encapsulates the inputs needed to produce a new deployable image, as well as the status of the execution and a reference to the Pod which executed the build.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
构建配置 | build.openshift.io | v1 | 真 | Build configurations define a build process for new container images. There are three types of builds possible - a container image build using a Dockerfile, a Source-to-Image build that uses a specially prepared base image that accepts source code that it can make runnable, and a custom build that can run // arbitrary container images as a base and accept the build parameters. Builds run on the cluster and on completion are pushed to the container image registry specified in the "output" section. A build can be triggered via a webhook, when the base image changes, or when a user manually requests a new build be // created.
Each build created by a build configuration is numbered and refers back to its parent configuration. Multiple builds can be triggered at once. Builds that do not have "output" set can be used to test code or run a verification build.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Tenant | capabilities.3scale.net | v1alpha1 | 真 | Tenant is the Schema for the tenants API |
ActiveDoc | capabilities.3scale.net | v1beta1 | 真 | ActiveDoc is the Schema for the activedocs API |
Backend | capabilities.3scale.net | v1beta1 | 真 | Backend is the Schema for the backends API |
CustomPolicyDefinition | capabilities.3scale.net | v1beta1 | 真 | CustomPolicyDefinition is the Schema for the custompolicydefinitions API |
DeveloperAccount | capabilities.3scale.net | v1beta1 | 真 | DeveloperAccount is the Schema for the developeraccounts API |
DeveloperUser | capabilities.3scale.net | v1beta1 | 真 | DeveloperUser is the Schema for the developerusers API |
OpenAPI | capabilities.3scale.net | v1beta1 | 真 | OpenAPI is the Schema for the openapis API |
Product | capabilities.3scale.net | v1beta1 | 真 | Product is the Schema for the products API |
证书签名请求(CSR) | certificates.k8s.io | v1 | 假 | CertificateSigningRequest objects provide a mechanism to obtain x509 certificates by submitting a certificate signing request, and having it asynchronously approved and issued.
Kubelets use this API to obtain:
1. client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client-kubelet" signerName).
2. serving certificates for TLS endpoints kube-apiserver can connect to securely (with the "kubernetes.io/kubelet-serving" signerName).
This API can be used to request client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client" signerName), or to obtain certificates from custom non-Kubernetes signers. |
CredentialsRequest | cloudcredential.openshift.io | v1 | 真 | CredentialsRequest is the Schema for the credentialsrequests API |
APIServer | config.openshift.io | v1 | 假 | APIServer holds configuration (like serving certificates, client CA and CORS domains) shared by all API servers in the system, among them especially kube-apiserver and openshift-apiserver. The canonical name of an instance is 'cluster'.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Authentication | config.openshift.io | v1 | 假 | Authentication specifies cluster-wide settings for authentication (like OAuth and webhook token authenticators). The canonical name of an instance is `cluster`.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Build | config.openshift.io | v1 | 假 | Build configures the behavior of OpenShift builds for the entire cluster. This includes default settings that can be overridden in BuildConfig objects, and overrides which are applied to all builds.
The canonical name is "cluster"
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
集群 Operator | config.openshift.io | v1 | 假 | ClusterOperator is the Custom Resource object which holds the current state of an operator. This object is used by operators to convey their state to the rest of the cluster.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
集群版本 | config.openshift.io | v1 | 假 | ClusterVersion is the configuration for the ClusterVersionOperator. This is where parameters related to automatic updates can be set.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Console | config.openshift.io | v1 | 假 | Console holds cluster-wide configuration for the web console, including the logout URL, and reports the public URL of the console. The canonical name is `cluster`.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
DNS | config.openshift.io | v1 | 假 | DNS holds cluster-wide information about DNS. The canonical name is `cluster`
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
FeatureGate | config.openshift.io | v1 | 假 | Feature holds cluster-wide information about feature gates. The canonical name is `cluster`
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Image | config.openshift.io | v1 | 假 | Image governs policies related to imagestream imports and runtime configuration for external registries. It allows cluster admins to configure which registries OpenShift is allowed to import images from, extra CA trust bundles for external registries, and policies to block or allow registry hostnames. When exposing OpenShift's image registry to the public, this also lets cluster admins specify the external hostname.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ImageContentPolicy | config.openshift.io | v1 | 假 | ImageContentPolicy holds cluster-wide information about how to handle registry mirror rules. When multiple policies are defined, the outcome of the behavior is defined on each field.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
基础架构 | config.openshift.io | v1 | 假 | Infrastructure holds cluster-wide information about Infrastructure. The canonical name is `cluster`
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Ingress | config.openshift.io | v1 | 假 | Ingress holds cluster-wide information about ingress, including the default ingress domain used for routes. The canonical name is `cluster`.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Network | config.openshift.io | v1 | 假 | Network holds cluster-wide information about Network. The canonical name is `cluster`. It is used to configure the desired network configuration, such as: IP address pools for services/pod IPs, network plugin, etc. Please view network.spec for an explanation on what applies when configuring this resource.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
OAuth | config.openshift.io | v1 | 假 | OAuth holds cluster-wide information about OAuth. The canonical name is `cluster`. It is used to configure the integrated OAuth server. This configuration is only honored when the top level Authentication config has type set to IntegratedOAuth.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
OperatorHub | config.openshift.io | v1 | 假 | OperatorHub is the Schema for the operatorhubs API. It can be used to change the state of the default hub sources for OperatorHub on the cluster from enabled to disabled and vice versa.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Project | config.openshift.io | v1 | 假 | Project holds cluster-wide information about Project. The canonical name is `cluster`
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Proxy | config.openshift.io | v1 | 假 | Proxy holds cluster-wide information on how to configure default proxies for the cluster. The canonical name is `cluster`
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Scheduler | config.openshift.io | v1 | 假 | Scheduler holds cluster-wide config information to run the Kubernetes Scheduler and influence its placement decisions. The canonical name for this config is `cluster`.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
控制台 CLI 下载 | console.openshift.io | v1 | 假 | ConsoleCLIDownload is an extension for configuring openshift web console command line interface (CLI) downloads.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
控制台外部日志链接 | console.openshift.io | v1 | 假 | ConsoleExternalLogLink is an extension for customizing OpenShift web console log links.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
控制台链接 | console.openshift.io | v1 | 假 | ConsoleLink is an extension for customizing OpenShift web console links.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
控制台通知 | console.openshift.io | v1 | 假 | ConsoleNotification is the extension for configuring openshift web console notifications.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ConsoleQuickStart | console.openshift.io | v1 | 假 | ConsoleQuickStart is an extension for guiding user through various workflows in the OpenShift web console.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
控制台YAML样本 | console.openshift.io | v1 | 假 | ConsoleYAMLSample is an extension for customizing OpenShift web console YAML samples.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
控制台插件 | console.openshift.io | v1alpha1 | 假 | ConsolePlugin is an extension for customizing OpenShift web console by dynamically loading code from another service running on the cluster.
Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support. |
PodNetworkConnectivityCheck | controlplane.operator.openshift.io | v1alpha1 | 真 | PodNetworkConnectivityCheck
Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support. |
Lease | coordination.k8s.io | v1 | 真 | Lease defines a lease concept. |
EndpointSlice | discovery.k8s.io | v1 | 真 | EndpointSlice represents a subset of the endpoints that implement a service. For a given service there may be multiple EndpointSlice objects, selected by labels, which must be joined to produce the full set of endpoints. |
EndpointSlice | discovery.k8s.io | v1beta1 | 真 | EndpointSlice represents a subset of the endpoints that implement a service. For a given service there may be multiple EndpointSlice objects, selected by labels, which must be joined to produce the full set of endpoints. |
Event | events.k8s.io | v1 | 真 | Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data. |
Event | events.k8s.io | v1beta1 | 真 | Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data. |
FlowSchema | flowcontrol.apiserver.k8s.io | v1beta1 | 假 | FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with similar attributes and is identified by a pair of strings: the name of the FlowSchema and a "flow distinguisher". |
PriorityLevelConfiguration | flowcontrol.apiserver.k8s.io | v1beta1 | 假 | PriorityLevelConfiguration represents the configuration of a priority level. |
FlowSchema | flowcontrol.apiserver.k8s.io | v1beta2 | 假 | FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with similar attributes and is identified by a pair of strings: the name of the FlowSchema and a "flow distinguisher". |
PriorityLevelConfiguration | flowcontrol.apiserver.k8s.io | v1beta2 | 假 | PriorityLevelConfiguration represents the configuration of a priority level. |
HelmChartRepository | helm.openshift.io | v1beta1 | 假 | HelmChartRepository holds cluster-wide configuration for proxied Helm chart repository
Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer). |
ProjectHelmChartRepository | helm.openshift.io | v1beta1 | 真 | ProjectHelmChartRepository holds namespace-wide configuration for proxied Helm chart repository
Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer). |
Image | image.openshift.io | v1 | 假 | Image is an immutable representation of a container image and metadata at a point in time. Images are named by taking a hash of their contents (metadata and content) and any change in format, content, or metadata results in a new name. The images resource is primarily for use by cluster administrators and integrations like the cluster image registry - end users instead access images via the imagestreamtags or imagestreamimages resources. While image metadata is stored in the API, any integration that implements the container image registry API must provide its own storage for the raw manifest data, image config, and layer contents.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ImageSignature | image.openshift.io | v1 | 假 | ImageSignature holds a signature of an image. It allows to verify image identity and possibly other claims as long as the signature is trusted. Based on this information it is possible to restrict runnable images to those matching cluster-wide policy. Mandatory fields should be parsed by clients doing image verification. The others are parsed from signature's content by the server. They serve just an informative purpose.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
镜像流 | image.openshift.io | v1 | 真 | An ImageStream stores a mapping of tags to images, metadata overrides that are applied when images are tagged in a stream, and an optional reference to a container image repository on a registry. Users typically update the spec.tags field to point to external images which are imported from container registries using credentials in your namespace with the pull secret type, or to existing image stream tags and images which are immediately accessible for tagging or pulling. The history of images applied to a tag is visible in the status.tags field and any user who can view an image stream is allowed to tag that image into their own image streams. Access to pull images from the integrated registry is granted by having the "get imagestreams/layers" permission on a given image stream. Users may remove a tag by deleting the imagestreamtag resource, which causes both spec and status for that tag to be removed. Image stream history is retained until an administrator runs the prune operation, which removes references that are no longer in use. To preserve a historical image, ensure there is a tag in spec pointing to that image by its digest.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ImageStreamImage | image.openshift.io | v1 | 真 | ImageStreamImage represents an Image that is retrieved by image name from an ImageStream. User interfaces and regular users can use this resource to access the metadata details of a tagged image in the image stream history for viewing, since Image resources are not directly accessible to end users. A not found error will be returned if no such image is referenced by a tag within the ImageStream. Images are created when spec tags are set on an image stream that represent an image in an external registry, when pushing to the integrated registry, or when tagging an existing image from one image stream to another. The name of an image stream image is in the form "<STREAM>@<DIGEST>", where the digest is the content addressible identifier for the image (sha256:xxxxx...). You can use ImageStreamImages as the from.kind of an image stream spec tag to reference an image exactly. The only operations supported on the imagestreamimage endpoint are retrieving the image.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
镜像流导入 | image.openshift.io | v1 | 真 | The image stream import resource provides an easy way for a user to find and import container images from other container image registries into the server. Individual images or an entire image repository may be imported, and users may choose to see the results of the import prior to tagging the resulting images into the specified image stream.
This API is intended for end-user tools that need to see the metadata of the image prior to import (for instance, to generate an application from it). Clients that know the desired image can continue to create spec.tags directly into their image streams.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ImageStreamMapping | image.openshift.io | v1 | 真 | ImageStreamMapping represents a mapping from a single image stream tag to a container image as well as the reference to the container image stream the image came from. This resource is used by privileged integrators to create an image resource and to associate it with an image stream in the status tags field. Creating an ImageStreamMapping will allow any user who can view the image stream to tag or pull that image, so only create mappings where the user has proven they have access to the image contents directly. The only operation supported for this resource is create and the metadata name and namespace should be set to the image stream containing the tag that should be updated.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
镜像流标签 | image.openshift.io | v1 | 真 | ImageStreamTag represents an Image that is retrieved by tag name from an ImageStream. Use this resource to interact with the tags and images in an image stream by tag, or to see the image details for a particular tag. The image associated with this resource is the most recently successfully tagged, imported, or pushed image (as described in the image stream status.tags.items list for this tag). If an import is in progress or has failed the previous image will be shown. Deleting an image stream tag clears both the status and spec fields of an image stream. If no image can be retrieved for a given tag, a not found error will be returned.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ImageTag | image.openshift.io | v1 | 真 | ImageTag represents a single tag within an image stream and includes the spec, the status history, and the currently referenced image (if any) of the provided tag. This type replaces the ImageStreamTag by providing a full view of the tag. ImageTags are returned for every spec or status tag present on the image stream. If no tag exists in either form a not found error will be returned by the API. A create operation will succeed if no spec tag has already been defined and the spec field is set. Delete will remove both spec and status elements from the image stream.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Config | imageregistry.operator.openshift.io | v1 | 假 | Config is the configuration object for a registry instance managed by the registry operator
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ImagePruner | imageregistry.operator.openshift.io | v1 | 假 | ImagePruner is the configuration object for an image registry pruner managed by the registry operator.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
DNSRecord | ingress.operator.openshift.io | v1 | 真 | DNSRecord is a DNS record managed in the zones defined by dns.config.openshift.io/cluster .spec.publicZone and .spec.privateZone.
Cluster admin manipulation of this resource is not supported. This resource is only for internal communication of OpenShift operators.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
NetworkAttachmentDefinition | k8s.cni.cncf.io | v1 | 真 | NetworkAttachmentDefinition is a CRD schema specified by the Network Plumbing Working Group to express the intent for attaching pods to one or more logical or physical networks. More information available at: https://github.com/k8snetworkplumbingwg/multi-net-spec |
机器 | machine.openshift.io | v1beta1 | 真 | Machine is the Schema for the machines API Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer). |
机器健康检查 | machine.openshift.io | v1beta1 | 真 | MachineHealthCheck is the Schema for the machinehealthchecks API Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer). |
机器集 | machine.openshift.io | v1beta1 | 真 | MachineSet ensures that a specified number of machines replicas are running at any given time. Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer). |
ContainerRuntimeConfig | machineconfiguration.openshift.io | v1 | 假 | ContainerRuntimeConfig describes a customized Container Runtime configuration. |
ControllerConfig | machineconfiguration.openshift.io | v1 | 假 | ControllerConfig describes configuration for MachineConfigController. This is currently only used to drive the MachineConfig objects generated by the TemplateController. |
KubeletConfig | machineconfiguration.openshift.io | v1 | 假 | KubeletConfig describes a customized Kubelet configuration. |
>机器配置 | machineconfiguration.openshift.io | v1 | 假 | MachineConfig defines the configuration for a machine |
Pool>机器配置池 | machineconfiguration.openshift.io | v1 | 假 | MachineConfigPool describes a pool of MachineConfigs. |
BMCEventSubscription | metal3.io | v1alpha1 | 真 | BMCEventSubscription is the Schema for the fast eventing API |
BareMetalHost | metal3.io | v1alpha1 | 真 | BareMetalHost is the Schema for the baremetalhosts API |
FirmwareSchema | metal3.io | v1alpha1 | 真 | FirmwareSchema is the Schema for the firmwareschemas API |
HostFirmwareSettings | metal3.io | v1alpha1 | 真 | HostFirmwareSettings is the Schema for the hostfirmwaresettings API |
PreprovisioningImage | metal3.io | v1alpha1 | 真 | PreprovisioningImage is the Schema for the preprovisioningimages API |
Provisioning | metal3.io | v1alpha1 | 假 | Provisioning contains configuration used by the Provisioning service (Ironic) to provision baremetal hosts. Provisioning is created by the OpenShift installer using admin or user provided information about the provisioning network and the NIC on the server that can be used to PXE boot it. This CR is a singleton, created by the installer and currently only consumed by the cluster-baremetal-operator to bring up and update containers in a metal3 cluster. |
NodeMetrics | metrics.k8s.io | v1beta1 | 假 | NodeMetrics sets resource usage metrics of a node. |
PodMetrics | metrics.k8s.io | v1beta1 | 真 | PodMetrics sets resource usage metrics of a pod. |
StorageState | migration.k8s.io | v1alpha1 | 假 | The state of the storage of a specific resource. |
StorageVersionMigration | migration.k8s.io | v1alpha1 | 假 | StorageVersionMigration represents a migration of stored data to the latest storage version. |
Alertmanager | monitoring.coreos.com | v1 | 真 | Alertmanager describes an Alertmanager cluster. |
PodMonitor | monitoring.coreos.com | v1 | 真 | PodMonitor defines monitoring for a set of pods. |
Probe | monitoring.coreos.com | v1 | 真 | Probe defines monitoring for a set of static targets or ingresses. |
Prometheus | monitoring.coreos.com | v1 | 真 | Prometheus defines a Prometheus deployment. |
PrometheusRule | monitoring.coreos.com | v1 | 真 | PrometheusRule defines recording and alerting rules for a Prometheus instance |
服务监控器 | monitoring.coreos.com | v1 | 真 | ServiceMonitor defines monitoring for a set of services. |
ThanosRuler | monitoring.coreos.com | v1 | 真 | ThanosRuler defines a ThanosRuler deployment. |
AlertmanagerConfig | monitoring.coreos.com | v1alpha1 | 真 | AlertmanagerConfig defines a namespaced AlertmanagerConfig to be aggregated across multiple namespaces configuring one Alertmanager cluster. |
ClusterNetwork | network.openshift.io | v1 | 假 | ClusterNetwork describes the cluster network. There is normally only one object of this type, named "default", which is created by the SDN network plugin based on the master configuration when the cluster is brought up for the first time. |
EgressNetworkPolicy | network.openshift.io | v1 | 真 | EgressNetworkPolicy describes the current egress network policy for a Namespace. When using the 'redhat/openshift-ovs-multitenant' network plugin, traffic from a pod to an IP address outside the cluster will be checked against each EgressNetworkPolicyRule in the pod's namespace's EgressNetworkPolicy, in order. If no rule matches (or no EgressNetworkPolicy is present) then the traffic will be allowed by default. |
HostSubnet | network.openshift.io | v1 | 假 | HostSubnet describes the container subnet network on a node. The HostSubnet object must have the same name as the Node object it corresponds to. |
NetNamespace | network.openshift.io | v1 | 假 | NetNamespace describes a single isolated network. When using the redhat/openshift-ovs-multitenant plugin, every Namespace will have a corresponding NetNamespace object with the same name. (When using redhat/openshift-ovs-subnet, NetNamespaces are not used.) |
EgressRouter | network.operator.openshift.io | v1 | 真 | EgressRouter is a feature allowing the user to define an egress router that acts as a bridge between pods and external systems. The egress router runs a service that redirects egress traffic originating from a pod or a group of pods to a remote external system or multiple destinations as per configuration.
It is consumed by the cluster-network-operator. More specifically, given an EgressRouter CR with <name>, the CNO will create and manage: - A service called <name> - An egress pod called <name> - A NAD called <name>
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
EgressRouter is a single egressrouter pod configuration object. |
OperatorPKI | network.operator.openshift.io | v1 | 真 | OperatorPKI is a simple certificate authority. It is not intended for external use - rather, it is internal to the network operator. The CNO creates a CA and a certificate signed by that CA. The certificate has both ClientAuth and ServerAuth extended usages enabled.
More specifically, given an OperatorPKI with <name>, the CNO will manage: - A Secret called <name>-ca with two data keys: - tls.key - the private key - tls.crt - the CA certificate - A ConfigMap called <name>-ca with a single data key: - cabundle.crt - the CA certificate(s) - A Secret called <name>-cert with two data keys: - tls.key - the private key - tls.crt - the certificate, signed by the CA
The CA certificate will have a validity of 10 years, rotated after 9. The target certificate will have a validity of 6 months, rotated after 3
The CA certificate will have a CommonName of "<namespace>_<name>-ca@<timestamp>", where <timestamp> is the last rotation time. |
Ingress | networking.k8s.io | v1 | 真 | Ingress is a collection of rules that allow inbound connections to reach the endpoints defined by a backend. An Ingress can be configured to give services externally-reachable urls, load balance traffic, terminate SSL, offer name based virtual hosting etc. |
IngressClass | networking.k8s.io | v1 | 假 | IngressClass represents the class of the Ingress, referenced by the Ingress Spec. The `ingressclass.kubernetes.io/is-default-class` annotation can be used to indicate that an IngressClass should be considered default. When a single IngressClass resource has this annotation set to true, new Ingress resources without a class specified will be assigned this default class. |
网络策略 | networking.k8s.io | v1 | 真 | NetworkPolicy describes what network traffic is allowed for a set of Pods |
NodeFeatureDiscovery | nfd.openshift.io | v1 | 真 | An Node Feature Discovery cluster instance |
NodeFeatureRule | nfd.openshift.io | v1alpha1 | 真 | NodeFeatureRule resource specifies a configuration for feature-based customization of node objects, such as node labeling. |
RuntimeClass | node.k8s.io | v1 | 假 | RuntimeClass defines a class of container runtime supported in the cluster. The RuntimeClass is used to determine which container runtime is used to run all containers in a pod. RuntimeClasses are manually defined by a user or cluster provisioner, and referenced in the PodSpec. The Kubelet is responsible for resolving the RuntimeClassName reference before running the pod. For more details, see https://kubernetes.io/docs/concepts/containers/runtime-class/ |
RuntimeClass | node.k8s.io | v1beta1 | 假 | RuntimeClass defines a class of container runtime supported in the cluster. The RuntimeClass is used to determine which container runtime is used to run all containers in a pod. RuntimeClasses are (currently) manually defined by a user or cluster provisioner, and referenced in the PodSpec. The Kubelet is responsible for resolving the RuntimeClassName reference before running the pod. For more details, see https://git.k8s.io/enhancements/keps/sig-node/585-runtime-class |
OAuthAccessToken | oauth.openshift.io | v1 | 假 | OAuthAccessToken describes an OAuth access token. The name of a token must be prefixed with a `sha256~` string, must not contain "/" or "%" characters and must be at least 32 characters long.
The name of the token is constructed from the actual token by sha256-hashing it and using URL-safe unpadded base64-encoding (as described in RFC4648) on the hashed result.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
OAuthAuthorizeToken | oauth.openshift.io | v1 | 假 | OAuthAuthorizeToken describes an OAuth authorization token
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
OAuthClient | oauth.openshift.io | v1 | 假 | OAuthClient describes an OAuth client
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
OAuthClientAuthorization | oauth.openshift.io | v1 | 假 | OAuthClientAuthorization describes an authorization created by an OAuth client
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
TokenReview | oauth.openshift.io | v1 | 假 | |
UserOAuthAccessToken | oauth.openshift.io | v1 | 假 | UserOAuthAccessToken is a virtual resource to mirror OAuthAccessTokens to the user the access token was issued for |
Authentication | operator.openshift.io | v1 | 假 | Authentication provides information to configure an operator to manage authentication.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
CSISnapshotController | operator.openshift.io | v1 | 假 | CSISnapshotController provides a means to configure an operator to manage the CSI snapshots. `cluster` is the canonical name.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
CloudCredential | operator.openshift.io | v1 | 假 | CloudCredential provides a means to configure an operator to manage CredentialsRequests.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ClusterCSIDriver | operator.openshift.io | v1 | 假 | ClusterCSIDriver object allows management and configuration of a CSI driver operator installed by default in OpenShift. Name of the object must be name of the CSI driver it operates. See CSIDriverName type for list of allowed values.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Config | operator.openshift.io | v1 | 假 | Config provides information to configure the config operator. It handles installation, migration or synchronization of cloud based cluster configurations like AWS or Azure.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Console | operator.openshift.io | v1 | 假 | Console provides a means to configure an operator to manage the console.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
DNS | operator.openshift.io | v1 | 假 | DNS manages the CoreDNS component to provide a name resolution service for pods and services in the cluster.
This supports the DNS-based service discovery specification: https://github.com/kubernetes/dns/blob/master/docs/specification.md
More details: https://kubernetes.io/docs/tasks/administer-cluster/coredns
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Etcd | operator.openshift.io | v1 | 假 | Etcd provides information to configure an operator to manage etcd.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
IngressController | operator.openshift.io | v1 | 真 | IngressController describes a managed ingress controller for the cluster. The controller can service OpenShift Route and Kubernetes Ingress resources.
When an IngressController is created, a new ingress controller deployment is created to allow external traffic to reach the services that expose Ingress or Route resources. Updating this resource may lead to disruption for public facing network connections as a new ingress controller revision may be rolled out.
https://kubernetes.io/docs/concepts/services-networking/ingress-controllers
Whenever possible, sensible defaults for the platform are used. See each field for more details.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
KubeAPIServer | operator.openshift.io | v1 | 假 | KubeAPIServer provides information to configure an operator to manage kube-apiserver.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
KubeControllerManager | operator.openshift.io | v1 | 假 | KubeControllerManager provides information to configure an operator to manage kube-controller-manager.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
KubeScheduler | operator.openshift.io | v1 | 假 | KubeScheduler provides information to configure an operator to manage scheduler.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
KubeStorageVersionMigrator | operator.openshift.io | v1 | 假 | KubeStorageVersionMigrator provides information to configure an operator to manage kube-storage-version-migrator.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Network | operator.openshift.io | v1 | 假 | Network describes the cluster's desired network configuration. It is consumed by the cluster-network-operator.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
OpenShiftAPIServer | operator.openshift.io | v1 | 假 | OpenShiftAPIServer provides information to configure an operator to manage openshift-apiserver.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
OpenShiftControllerManager | operator.openshift.io | v1 | 假 | OpenShiftControllerManager provides information to configure an operator to manage openshift-controller-manager.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ServiceCA | operator.openshift.io | v1 | 假 | ServiceCA provides information to configure an operator to manage the service cert controllers
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Storage | operator.openshift.io | v1 | 假 | Storage provides a means to configure an operator to manage the cluster storage operator. `cluster` is the canonical name.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
ImageContentSourcePolicy | operator.openshift.io | v1alpha1 | 假 | ImageContentSourcePolicy holds cluster-wide information about how to handle registry mirror rules. When multiple policies are defined, the outcome of the behavior is defined on each field.
Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support. |
OLMConfig | operators.coreos.com | v1 | 假 | OLMConfig is a resource responsible for configuring OLM. |
Operator | operators.coreos.com | v1 | 假 | Operator represents a cluster operator. |
OperatorCondition | operators.coreos.com | v1 | 真 | OperatorCondition is a Custom Resource of type `OperatorCondition` which is used to convey information to OLM about the state of an operator. |
OperatorGroup | operators.coreos.com | v1 | 真 | OperatorGroup is the unit of multitenancy for OLM managed operators. It constrains the installation of operators in its namespace to a specified set of target namespaces. |
CatalogSource | operators.coreos.com | v1alpha1 | 真 | CatalogSource is a repository of CSVs, CRDs, and operator packages. |
ClusterServiceVersion | operators.coreos.com | v1alpha1 | 真 | ClusterServiceVersion is a Custom Resource of type `ClusterServiceVersionSpec`. |
InstallPlan | operators.coreos.com | v1alpha1 | 真 | InstallPlan defines the installation of a set of operators. |
订阅 | operators.coreos.com | v1alpha1 | 真 | Subscription keeps operators up to date by tracking changes to Catalogs. |
OperatorGroup | operators.coreos.com | v1alpha2 | 真 | OperatorGroup is the unit of multitenancy for OLM managed operators. It constrains the installation of operators in its namespace to a specified set of target namespaces. |
OperatorCondition | operators.coreos.com | v2 | 真 | OperatorCondition is a Custom Resource of type `OperatorCondition` which is used to convey information to OLM about the state of an operator. |
PackageManifest | packages.operators.coreos.com | v1 | 真 | PackageManifest holds information about a package, which is a reference to one (or more) channels under a single package. |
PodDisruptionBudget | policy | v1 | 真 | PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods |
PodDisruptionBudget | policy | v1beta1 | 真 | PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods |
PodSecurityPolicy | policy | v1beta1 | 假 | PodSecurityPolicy governs the ability to make requests that affect the Security Context that will be applied to a pod and container. Deprecated in 1.21. |
项目 | project.openshift.io | v1 | 假 | Projects are the unit of isolation and collaboration in OpenShift. A project has one or more members, a quota on the resources that the project may consume, and the security controls on the resources in the project. Within a project, members may have different roles - project administrators can set membership, editors can create and manage the resources, and viewers can see but not access running containers. In a normal cluster project administrators are not able to alter their quotas - that is restricted to cluster administrators.
Listing or watching projects will return only projects the user has the reader role on.
An OpenShift project is an alternative representation of a Kubernetes namespace. Projects are exposed as editable to end users while namespaces are not. Direct creation of a project is typically restricted to administrators, while end users should use the requestproject resource.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
项目请求 | project.openshift.io | v1 | 假 | ProjectRequest is the set of options necessary to fully qualify a project request
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
AppliedClusterResourceQuota | quota.openshift.io | v1 | 真 | AppliedClusterResourceQuota mirrors ClusterResourceQuota at a project scope, for projection into a project. It allows a project-admin to know which ClusterResourceQuotas are applied to his project and their associated usage.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
集群资源配额 | quota.openshift.io | v1 | 假 | ClusterResourceQuota mirrors ResourceQuota at a cluster scope. This object is easily convertible to synthetic ResourceQuota object to allow quota evaluation re-use.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
集群角色 | rbac.authorization.k8s.io | v1 | 假 | ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding. |
集群角色绑定 | rbac.authorization.k8s.io | v1 | 假 | ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject. |
角色 | rbac.authorization.k8s.io | v1 | 真 | Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding. |
RoleBinding | rbac.authorization.k8s.io | v1 | 真 | RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace. |
路由 | route.openshift.io | v1 | 真 | A route allows developers to expose services through an HTTP(S) aware load balancing and proxy layer via a public DNS entry. The route may further specify TLS options and a certificate, or specify a public CNAME that the router should also accept for HTTP and HTTPS traffic. An administrator typically configures their router to be visible outside the cluster firewall, and may also add additional security, caching, or traffic controls on the service content. Routers usually talk directly to the service endpoints.
Once a route is created, the `host` field may not be changed. Generally, routers use the oldest route with a given host when resolving conflicts.
Routers are subject to additional customization and may support additional controls via the annotations field.
Because administrators may configure multiple routers, the route status field is used to return information to clients about the names and states of the route under each router. If a client chooses a duplicate name, for instance, the route status conditions are used to indicate the route cannot be chosen.
To enable HTTP/2 ALPN on a route it requires a custom (non-wildcard) certificate. This prevents connection coalescing by clients, notably web browsers. We do not support HTTP/2 ALPN on routes that use the default certificate because of the risk of connection re-use/coalescing. Routes that do not have their own custom certificate will not be HTTP/2 ALPN-enabled on either the frontend or the backend.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Config | samples.operator.openshift.io | v1 | 假 | Config contains the configuration and detailed condition status for the Samples Operator. |
PriorityClass | scheduling.k8s.io | v1 | 假 | PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer. |
RangeAllocation | security.internal.openshift.io | v1 | 假 | RangeAllocation is used so we can easily expose a RangeAllocation typed for security group This is an internal API, not intended for external consumption.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
PodSecurityPolicyReview | security.openshift.io | v1 | 真 | PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the `PodTemplateSpec` in question.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
PodSecurityPolicySelfSubjectReview | security.openshift.io | v1 | 真 | PodSecurityPolicySelfSubjectReview checks whether this user/SA tuple can create the PodTemplateSpec
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
PodSecurityPolicySubjectReview | security.openshift.io | v1 | 真 | PodSecurityPolicySubjectReview checks whether a particular user/SA tuple can create the PodTemplateSpec.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
RangeAllocation | security.openshift.io | v1 | 假 | RangeAllocation is used so we can easily expose a RangeAllocation typed for security group
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
SecurityContextConstraints | security.openshift.io | v1 | 假 | SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container. For historical reasons SCC was exposed under the core Kubernetes API group. That exposure is deprecated and will be removed in a future release - users should instead use the security.openshift.io group to manage SecurityContextConstraints.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
卷快照 | snapshot.storage.k8s.io | v1 | 真 | VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot. |
卷快照类 | snapshot.storage.k8s.io | v1 | 假 | VolumeSnapshotClass specifies parameters that a underlying storage system uses when creating a volume snapshot. A specific VolumeSnapshotClass is used by specifying its name in a VolumeSnapshot object. VolumeSnapshotClasses are non-namespaced |
卷快照内容 | snapshot.storage.k8s.io | v1 | 假 | VolumeSnapshotContent represents the actual "on-disk" snapshot object in the underlying storage system |
VolumeSnapshot | snapshot.storage.k8s.io | v1beta1 | 真 | VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot. |
VolumeSnapshotClass | snapshot.storage.k8s.io | v1beta1 | 假 | VolumeSnapshotClass specifies parameters that a underlying storage system uses when creating a volume snapshot. A specific VolumeSnapshotClass is used by specifying its name in a VolumeSnapshot object. VolumeSnapshotClasses are non-namespaced |
VolumeSnapshotContent | snapshot.storage.k8s.io | v1beta1 | 假 | VolumeSnapshotContent represents the actual "on-disk" snapshot object in the underlying storage system |
SpecialResource | sro.openshift.io | v1beta1 | 假 | SpecialResource is the Schema for the specialresources API |
CSI 驱动 | storage.k8s.io | v1 | 假 | CSIDriver captures information about a Container Storage Interface (CSI) volume driver deployed on the cluster. Kubernetes attach detach controller uses this object to determine whether attach is required. Kubelet uses this object to determine whether pod information needs to be passed on mount. CSIDriver objects are non-namespaced. |
CSINode | storage.k8s.io | v1 | 假 | CSINode holds information about all CSI drivers installed on a node. CSI drivers do not need to create the CSINode object directly. As long as they use the node-driver-registrar sidecar container, the kubelet will automatically populate the CSINode object for the CSI driver as part of kubelet plugin registration. CSINode has the same name as a node. If the object is missing, it means either there are no CSI Drivers available on the node, or the Kubelet version is low enough that it doesn't create this object. CSINode has an OwnerReference that points to the corresponding node object. |
存储类 | storage.k8s.io | v1 | 假 | StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.
StorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name. |
VolumeAttachment | storage.k8s.io | v1 | 假 | VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.
VolumeAttachment objects are non-namespaced. |
CSIStorageCapacity | storage.k8s.io | v1beta1 | 真 | CSIStorageCapacity stores the result of one CSI GetCapacity call. For a given StorageClass, this describes the available capacity in a particular topology segment. This can be used when considering where to instantiate new PersistentVolumes.
For example this can express things like: - StorageClass "standard" has "1234 GiB" available in "topology.kubernetes.io/zone=us-east1" - StorageClass "localssd" has "10 GiB" available in "kubernetes.io/hostname=knode-abc123"
The following three cases all imply that no capacity is available for a certain combination: - no object exists with suitable topology and storage class name - such an object exists, but the capacity is unset - such an object exists, but the capacity is zero
The producer of these objects can decide which approach is more suitable.
They are consumed by the kube-scheduler if the CSIStorageCapacity beta feature gate is enabled there and a CSI driver opts into capacity-aware scheduling with CSIDriver.StorageCapacity. |
BrokerTemplateInstance | template.openshift.io | v1 | 假 | BrokerTemplateInstance holds the service broker-related state associated with a TemplateInstance. BrokerTemplateInstance is part of an experimental API.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
模板 | template.openshift.io | v1 | 真 | Template contains the inputs needed to produce a Config.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
TemplateInstance | template.openshift.io | v1 | 真 | TemplateInstance requests and records the instantiation of a Template. TemplateInstance is part of an experimental API.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
NodeResourceTopology | topology.node.k8s.io | v1alpha1 | 假 | NodeResourceTopology describes node resources and their topology. |
AnsibleJob | tower.ansible.com | v1alpha1 | 真 | |
JobTemplate | tower.ansible.com | v1alpha1 | 真 | |
Profile | tuned.openshift.io | v1 | 真 | Profile is a specification for a Profile resource. |
Tuned | tuned.openshift.io | v1 | 真 | Tuned is a collection of rules that allows cluster-wide deployment of node-level sysctls and more flexibility to add custom tuning specified by user needs. These rules are translated and passed to all containerized Tuned daemons running in the cluster in the format that the daemons understand. The responsibility for applying the node-level tuning then lies with the containerized Tuned daemons. More info: https://github.com/openshift/cluster-node-tuning-operator |
组 | user.openshift.io | v1 | 假 | Group represents a referenceable set of Users
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
Identity | user.openshift.io | v1 | 假 | Identity records a successful authentication of a user with an identity provider. The information about the source of authentication is stored on the identity, and the identity is then associated with a single user object. Multiple identities can reference a single user. Information retrieved from the authentication provider is stored in the extra field using a schema determined by the provider.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
用户 | user.openshift.io | v1 | 假 | Upon log in, every user of the system receives a User and Identity resource. Administrators may directly manipulate the attributes of the users for their own tracking, or set groups via the API. The user name is unique and is chosen based on the value provided by the identity provider - if a user already exists with the incoming name, the user name may have a number appended to it depending on the configuration of the system.
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
UserIdentityMapping | user.openshift.io | v1 | 假 | UserIdentityMapping maps a user to an identity
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). |
IPPool | whereabouts.cni.cncf.io | v1alpha1 | 真 | IPPool is the Schema for Whereabouts for IP address allocation |
OverlappingRangeIPReservation | whereabouts.cni.cncf.io | v1alpha1 | 真 | OverlappingRangeIPReservation is the Schema for the OverlappingRangeIPReservations API |