Skip to Content
Red Hat OpenShift Container Platform

您已以临时管理用户身份登录。更新集群 OAuth 配置以允许其他人登录。

API Explorer

描述
Binding-v1
Binding ties one object to another; for example, a pod is bound to a node by a scheduler. Deprecated in 1.7, please use the bindings subresource of pods instead.
组件状态-v1
ComponentStatus (and ComponentStatusList) holds the cluster validation info. Deprecated: This API is deprecated in v1.19+
配置映射-v1
ConfigMap holds configuration data for pods to consume.
Endpoints-v1
Endpoints is a collection of endpoints that implement the actual service. Example: Name: "mysvc", Subsets: [ { Addresses: [{"ip": "10.10.1.1"}, {"ip": "10.10.2.2"}], Ports: [{"name": "a", "port": 8675}, {"name": "b", "port": 309}] }, { Addresses: [{"ip": "10.10.3.3"}], Ports: [{"name": "a", "port": 93}, {"name": "b", "port": 76}] }, ]
事件-v1
Event is a report of an event somewhere in the cluster. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data.
限制范围-v1
LimitRange sets resource usage limits for each kind of resource in a Namespace.
命名空间-v1
Namespace provides a scope for Names. Use of multiple namespaces is optional.
节点-v1
Node is a worker node in Kubernetes. Each node will have a unique identifier in the cache (i.e. in etcd).
持久性卷-v1
PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes
持久性卷声明-v1
PersistentVolumeClaim is a user's request for and claim to a persistent volume
Pod-v1
Pod is a collection of containers that can run on a host. This resource is created by clients and scheduled onto hosts.
PodTemplate-v1
PodTemplate describes a template for creating copies of a predefined pod.
复制控制器-v1
ReplicationController represents the configuration of a replication controller.
资源配额-v1
ResourceQuota sets aggregate quota restrictions enforced per namespace
Secret-v1
Secret holds secret data of a certain type. The total bytes of the values in the Data field must be less than MaxSecretSize bytes.
服务-v1
Service is a named abstraction of software service (for example, mysql) consisting of local port (for example 3306) that the proxy listens on, and the selector that determines which pods will answer requests sent through the proxy.
服务帐户-v1
ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets
MutatingWebhookConfigurationadmissionregistration.k8s.iov1
MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object.
ValidatingWebhookConfigurationadmissionregistration.k8s.iov1
ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it.
自定义资源定义apiextensions.k8s.iov1
CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format <.spec.name>.<.spec.group>.
API 服务apiregistration.k8s.iov1
APIService represents a server for a particular GroupVersion. Name must be "version.group".
APIRequestCountapiserver.openshift.iov1
APIRequestCount tracks requests made to an API. The instance name must be of the form `resource.version.group`, matching the resource. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ControllerRevisionappsv1
ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.
守护进程集appsv1
DaemonSet represents the configuration of a daemon set.
部署appsv1
Deployment enables declarative updates for Pods and ReplicaSets.
副本集appsv1
ReplicaSet ensures that a specified number of pod replicas are running at any given time.
StatefulSetappsv1
StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. - Storage: As many VolumeClaims as requested. The StatefulSet guarantees that a given network identity will always map to the same storage identity.
APIManagerapps.3scale.netv1alpha1
APIManager is the Schema for the apimanagers API
APIManagerBackupapps.3scale.netv1alpha1
APIManagerBackup represents an APIManager backup
APIManagerRestoreapps.3scale.netv1alpha1
APIManagerRestore represents an APIManager restore
部署配置apps.openshift.iov1
Deployment Configs define the template for a pod and manages deploying new images or configuration changes. A single deployment configuration is usually analogous to a single micro-service. Can support many different deployment patterns, including full restart, customizable rolling updates, and fully custom behaviors, as well as pre- and post- deployment hooks. Each individual deployment is represented as a replication controller. A deployment is "triggered" when its configuration is changed or a tag in an Image Stream is changed. Triggers can be disabled to allow manual control over a deployment. The "strategy" determines how the deployment is carried out and may be changed at any time. The `latestVersion` field is updated when a new deployment is triggered by any means. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
TokenReviewauthentication.k8s.iov1
TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.
LocalSubjectAccessReviewauthorization.k8s.iov1
LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.
SelfSubjectAccessReviewauthorization.k8s.iov1
SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action
SelfSubjectRulesReviewauthorization.k8s.iov1
SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.
SubjectAccessReviewauthorization.k8s.iov1
SubjectAccessReview checks whether or not a user or group can perform an action.
ClusterRoleauthorization.openshift.iov1
ClusterRole is a logical grouping of PolicyRules that can be referenced as a unit by ClusterRoleBindings. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ClusterRoleBindingauthorization.openshift.iov1
ClusterRoleBinding references a ClusterRole, but not contain it. It can reference any ClusterRole in the same namespace or in the global namespace. It adds who information via (Users and Groups) OR Subjects and namespace information by which namespace it exists in. ClusterRoleBindings in a given namespace only have effect in that namespace (excepting the master namespace which has power in all namespaces). Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
LocalResourceAccessReviewauthorization.openshift.iov1
LocalResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec in a particular namespace Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
LocalSubjectAccessReviewauthorization.openshift.iov1
LocalSubjectAccessReview is an object for requesting information about whether a user or group can perform an action in a particular namespace Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ResourceAccessReviewauthorization.openshift.iov1
ResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Roleauthorization.openshift.iov1
Role is a logical grouping of PolicyRules that can be referenced as a unit by RoleBindings. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
RoleBindingauthorization.openshift.iov1
RoleBinding references a Role, but not contain it. It can reference any Role in the same namespace or in the global namespace. It adds who information via (Users and Groups) OR Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace (excepting the master namespace which has power in all namespaces). Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
RoleBindingRestrictionauthorization.openshift.iov1
RoleBindingRestriction is an object that can be matched against a subject (user, group, or service account) to determine whether rolebindings on that subject are allowed in the namespace to which the RoleBindingRestriction belongs. If any one of those RoleBindingRestriction objects matches a subject, rolebindings on that subject in the namespace are allowed. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
SelfSubjectRulesReviewauthorization.openshift.iov1
SelfSubjectRulesReview is a resource you can create to determine which actions you can perform in a namespace Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
SubjectAccessReviewauthorization.openshift.iov1
SubjectAccessReview is an object for requesting information about whether a user or group can perform an action Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
SubjectRulesReviewauthorization.openshift.iov1
SubjectRulesReview is a resource you can create to determine which actions another user can perform in a namespace Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
AutomationControllerautomationcontroller.ansible.comv1beta1
Schema validation for the AWX CRD
AutomationControllerBackupautomationcontroller.ansible.comv1beta1
AutomationControllerRestoreautomationcontroller.ansible.comv1beta1
AutomationHubautomationhub.ansible.comv1beta1
AutomationHubBackupautomationhub.ansible.comv1beta1
AutomationHubRestoreautomationhub.ansible.comv1beta1
HorizontalPodAutoscalerautoscalingv1
configuration of a horizontal pod autoscaler.
HorizontalPodAutoscalerautoscalingv2
HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.
HorizontalPodAutoscalerautoscalingv2beta1
HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.
HorizontalPodAutoscalerautoscalingv2beta2
HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.
ClusterAutoscalerautoscaling.openshift.iov1
ClusterAutoscaler is the Schema for the clusterautoscalers API
MachineAutoscalerautoscaling.openshift.iov1beta1
MachineAutoscaler is the Schema for the machineautoscalers API
CronJobbatchv1
CronJob represents the configuration of a single cron job.
作业batchv1
Job represents the configuration of a single job.
CronJobbatchv1beta1
CronJob represents the configuration of a single cron job.
构建build.openshift.iov1
Build encapsulates the inputs needed to produce a new deployable image, as well as the status of the execution and a reference to the Pod which executed the build. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
构建配置build.openshift.iov1
Build configurations define a build process for new container images. There are three types of builds possible - a container image build using a Dockerfile, a Source-to-Image build that uses a specially prepared base image that accepts source code that it can make runnable, and a custom build that can run // arbitrary container images as a base and accept the build parameters. Builds run on the cluster and on completion are pushed to the container image registry specified in the "output" section. A build can be triggered via a webhook, when the base image changes, or when a user manually requests a new build be // created. Each build created by a build configuration is numbered and refers back to its parent configuration. Multiple builds can be triggered at once. Builds that do not have "output" set can be used to test code or run a verification build. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Tenantcapabilities.3scale.netv1alpha1
Tenant is the Schema for the tenants API
ActiveDoccapabilities.3scale.netv1beta1
ActiveDoc is the Schema for the activedocs API
Backendcapabilities.3scale.netv1beta1
Backend is the Schema for the backends API
CustomPolicyDefinitioncapabilities.3scale.netv1beta1
CustomPolicyDefinition is the Schema for the custompolicydefinitions API
DeveloperAccountcapabilities.3scale.netv1beta1
DeveloperAccount is the Schema for the developeraccounts API
DeveloperUsercapabilities.3scale.netv1beta1
DeveloperUser is the Schema for the developerusers API
OpenAPIcapabilities.3scale.netv1beta1
OpenAPI is the Schema for the openapis API
Productcapabilities.3scale.netv1beta1
Product is the Schema for the products API
证书签名请求(CSR)certificates.k8s.iov1
CertificateSigningRequest objects provide a mechanism to obtain x509 certificates by submitting a certificate signing request, and having it asynchronously approved and issued. Kubelets use this API to obtain: 1. client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client-kubelet" signerName). 2. serving certificates for TLS endpoints kube-apiserver can connect to securely (with the "kubernetes.io/kubelet-serving" signerName). This API can be used to request client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client" signerName), or to obtain certificates from custom non-Kubernetes signers.
CredentialsRequestcloudcredential.openshift.iov1
CredentialsRequest is the Schema for the credentialsrequests API
APIServerconfig.openshift.iov1
APIServer holds configuration (like serving certificates, client CA and CORS domains) shared by all API servers in the system, among them especially kube-apiserver and openshift-apiserver. The canonical name of an instance is 'cluster'. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Authenticationconfig.openshift.iov1
Authentication specifies cluster-wide settings for authentication (like OAuth and webhook token authenticators). The canonical name of an instance is `cluster`. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Buildconfig.openshift.iov1
Build configures the behavior of OpenShift builds for the entire cluster. This includes default settings that can be overridden in BuildConfig objects, and overrides which are applied to all builds. The canonical name is "cluster" Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
集群 Operatorconfig.openshift.iov1
ClusterOperator is the Custom Resource object which holds the current state of an operator. This object is used by operators to convey their state to the rest of the cluster. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
集群版本config.openshift.iov1
ClusterVersion is the configuration for the ClusterVersionOperator. This is where parameters related to automatic updates can be set. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Consoleconfig.openshift.iov1
Console holds cluster-wide configuration for the web console, including the logout URL, and reports the public URL of the console. The canonical name is `cluster`. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
DNSconfig.openshift.iov1
DNS holds cluster-wide information about DNS. The canonical name is `cluster` Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
FeatureGateconfig.openshift.iov1
Feature holds cluster-wide information about feature gates. The canonical name is `cluster` Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Imageconfig.openshift.iov1
Image governs policies related to imagestream imports and runtime configuration for external registries. It allows cluster admins to configure which registries OpenShift is allowed to import images from, extra CA trust bundles for external registries, and policies to block or allow registry hostnames. When exposing OpenShift's image registry to the public, this also lets cluster admins specify the external hostname. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ImageContentPolicyconfig.openshift.iov1
ImageContentPolicy holds cluster-wide information about how to handle registry mirror rules. When multiple policies are defined, the outcome of the behavior is defined on each field. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
基础架构config.openshift.iov1
Infrastructure holds cluster-wide information about Infrastructure. The canonical name is `cluster` Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Ingressconfig.openshift.iov1
Ingress holds cluster-wide information about ingress, including the default ingress domain used for routes. The canonical name is `cluster`. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Networkconfig.openshift.iov1
Network holds cluster-wide information about Network. The canonical name is `cluster`. It is used to configure the desired network configuration, such as: IP address pools for services/pod IPs, network plugin, etc. Please view network.spec for an explanation on what applies when configuring this resource. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
OAuthconfig.openshift.iov1
OAuth holds cluster-wide information about OAuth. The canonical name is `cluster`. It is used to configure the integrated OAuth server. This configuration is only honored when the top level Authentication config has type set to IntegratedOAuth. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
OperatorHubconfig.openshift.iov1
OperatorHub is the Schema for the operatorhubs API. It can be used to change the state of the default hub sources for OperatorHub on the cluster from enabled to disabled and vice versa. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Projectconfig.openshift.iov1
Project holds cluster-wide information about Project. The canonical name is `cluster` Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Proxyconfig.openshift.iov1
Proxy holds cluster-wide information on how to configure default proxies for the cluster. The canonical name is `cluster` Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Schedulerconfig.openshift.iov1
Scheduler holds cluster-wide config information to run the Kubernetes Scheduler and influence its placement decisions. The canonical name for this config is `cluster`. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
控制台 CLI 下载console.openshift.iov1
ConsoleCLIDownload is an extension for configuring openshift web console command line interface (CLI) downloads. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
控制台外部日志链接console.openshift.iov1
ConsoleExternalLogLink is an extension for customizing OpenShift web console log links. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
控制台链接console.openshift.iov1
ConsoleLink is an extension for customizing OpenShift web console links. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
控制台通知console.openshift.iov1
ConsoleNotification is the extension for configuring openshift web console notifications. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ConsoleQuickStartconsole.openshift.iov1
ConsoleQuickStart is an extension for guiding user through various workflows in the OpenShift web console. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
控制台YAML样本console.openshift.iov1
ConsoleYAMLSample is an extension for customizing OpenShift web console YAML samples. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
控制台插件console.openshift.iov1alpha1
ConsolePlugin is an extension for customizing OpenShift web console by dynamically loading code from another service running on the cluster. Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
PodNetworkConnectivityCheckcontrolplane.operator.openshift.iov1alpha1
PodNetworkConnectivityCheck Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
Leasecoordination.k8s.iov1
Lease defines a lease concept.
EndpointSlicediscovery.k8s.iov1
EndpointSlice represents a subset of the endpoints that implement a service. For a given service there may be multiple EndpointSlice objects, selected by labels, which must be joined to produce the full set of endpoints.
EndpointSlicediscovery.k8s.iov1beta1
EndpointSlice represents a subset of the endpoints that implement a service. For a given service there may be multiple EndpointSlice objects, selected by labels, which must be joined to produce the full set of endpoints.
Eventevents.k8s.iov1
Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data.
Eventevents.k8s.iov1beta1
Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system. Events have a limited retention time and triggers and messages may evolve with time. Event consumers should not rely on the timing of an event with a given Reason reflecting a consistent underlying trigger, or the continued existence of events with that Reason. Events should be treated as informative, best-effort, supplemental data.
FlowSchemaflowcontrol.apiserver.k8s.iov1beta1
FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with similar attributes and is identified by a pair of strings: the name of the FlowSchema and a "flow distinguisher".
PriorityLevelConfigurationflowcontrol.apiserver.k8s.iov1beta1
PriorityLevelConfiguration represents the configuration of a priority level.
FlowSchemaflowcontrol.apiserver.k8s.iov1beta2
FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with similar attributes and is identified by a pair of strings: the name of the FlowSchema and a "flow distinguisher".
PriorityLevelConfigurationflowcontrol.apiserver.k8s.iov1beta2
PriorityLevelConfiguration represents the configuration of a priority level.
HelmChartRepositoryhelm.openshift.iov1beta1
HelmChartRepository holds cluster-wide configuration for proxied Helm chart repository Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).
ProjectHelmChartRepositoryhelm.openshift.iov1beta1
ProjectHelmChartRepository holds namespace-wide configuration for proxied Helm chart repository Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).
Imageimage.openshift.iov1
Image is an immutable representation of a container image and metadata at a point in time. Images are named by taking a hash of their contents (metadata and content) and any change in format, content, or metadata results in a new name. The images resource is primarily for use by cluster administrators and integrations like the cluster image registry - end users instead access images via the imagestreamtags or imagestreamimages resources. While image metadata is stored in the API, any integration that implements the container image registry API must provide its own storage for the raw manifest data, image config, and layer contents. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ImageSignatureimage.openshift.iov1
ImageSignature holds a signature of an image. It allows to verify image identity and possibly other claims as long as the signature is trusted. Based on this information it is possible to restrict runnable images to those matching cluster-wide policy. Mandatory fields should be parsed by clients doing image verification. The others are parsed from signature's content by the server. They serve just an informative purpose. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
镜像流image.openshift.iov1
An ImageStream stores a mapping of tags to images, metadata overrides that are applied when images are tagged in a stream, and an optional reference to a container image repository on a registry. Users typically update the spec.tags field to point to external images which are imported from container registries using credentials in your namespace with the pull secret type, or to existing image stream tags and images which are immediately accessible for tagging or pulling. The history of images applied to a tag is visible in the status.tags field and any user who can view an image stream is allowed to tag that image into their own image streams. Access to pull images from the integrated registry is granted by having the "get imagestreams/layers" permission on a given image stream. Users may remove a tag by deleting the imagestreamtag resource, which causes both spec and status for that tag to be removed. Image stream history is retained until an administrator runs the prune operation, which removes references that are no longer in use. To preserve a historical image, ensure there is a tag in spec pointing to that image by its digest. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ImageStreamImageimage.openshift.iov1
ImageStreamImage represents an Image that is retrieved by image name from an ImageStream. User interfaces and regular users can use this resource to access the metadata details of a tagged image in the image stream history for viewing, since Image resources are not directly accessible to end users. A not found error will be returned if no such image is referenced by a tag within the ImageStream. Images are created when spec tags are set on an image stream that represent an image in an external registry, when pushing to the integrated registry, or when tagging an existing image from one image stream to another. The name of an image stream image is in the form "<STREAM>@<DIGEST>", where the digest is the content addressible identifier for the image (sha256:xxxxx...). You can use ImageStreamImages as the from.kind of an image stream spec tag to reference an image exactly. The only operations supported on the imagestreamimage endpoint are retrieving the image. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
镜像流导入image.openshift.iov1
The image stream import resource provides an easy way for a user to find and import container images from other container image registries into the server. Individual images or an entire image repository may be imported, and users may choose to see the results of the import prior to tagging the resulting images into the specified image stream. This API is intended for end-user tools that need to see the metadata of the image prior to import (for instance, to generate an application from it). Clients that know the desired image can continue to create spec.tags directly into their image streams. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ImageStreamMappingimage.openshift.iov1
ImageStreamMapping represents a mapping from a single image stream tag to a container image as well as the reference to the container image stream the image came from. This resource is used by privileged integrators to create an image resource and to associate it with an image stream in the status tags field. Creating an ImageStreamMapping will allow any user who can view the image stream to tag or pull that image, so only create mappings where the user has proven they have access to the image contents directly. The only operation supported for this resource is create and the metadata name and namespace should be set to the image stream containing the tag that should be updated. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
镜像流标签image.openshift.iov1
ImageStreamTag represents an Image that is retrieved by tag name from an ImageStream. Use this resource to interact with the tags and images in an image stream by tag, or to see the image details for a particular tag. The image associated with this resource is the most recently successfully tagged, imported, or pushed image (as described in the image stream status.tags.items list for this tag). If an import is in progress or has failed the previous image will be shown. Deleting an image stream tag clears both the status and spec fields of an image stream. If no image can be retrieved for a given tag, a not found error will be returned. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ImageTagimage.openshift.iov1
ImageTag represents a single tag within an image stream and includes the spec, the status history, and the currently referenced image (if any) of the provided tag. This type replaces the ImageStreamTag by providing a full view of the tag. ImageTags are returned for every spec or status tag present on the image stream. If no tag exists in either form a not found error will be returned by the API. A create operation will succeed if no spec tag has already been defined and the spec field is set. Delete will remove both spec and status elements from the image stream. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Configimageregistry.operator.openshift.iov1
Config is the configuration object for a registry instance managed by the registry operator Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ImagePrunerimageregistry.operator.openshift.iov1
ImagePruner is the configuration object for an image registry pruner managed by the registry operator. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
DNSRecordingress.operator.openshift.iov1
DNSRecord is a DNS record managed in the zones defined by dns.config.openshift.io/cluster .spec.publicZone and .spec.privateZone. Cluster admin manipulation of this resource is not supported. This resource is only for internal communication of OpenShift operators. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
NetworkAttachmentDefinitionk8s.cni.cncf.iov1
NetworkAttachmentDefinition is a CRD schema specified by the Network Plumbing Working Group to express the intent for attaching pods to one or more logical or physical networks. More information available at: https://github.com/k8snetworkplumbingwg/multi-net-spec
机器machine.openshift.iov1beta1
Machine is the Schema for the machines API Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).
机器健康检查machine.openshift.iov1beta1
MachineHealthCheck is the Schema for the machinehealthchecks API Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).
机器集machine.openshift.iov1beta1
MachineSet ensures that a specified number of machines replicas are running at any given time. Compatibility level 2: Stable within a major release for a minimum of 9 months or 3 minor releases (whichever is longer).
ContainerRuntimeConfigmachineconfiguration.openshift.iov1
ContainerRuntimeConfig describes a customized Container Runtime configuration.
ControllerConfigmachineconfiguration.openshift.iov1
ControllerConfig describes configuration for MachineConfigController. This is currently only used to drive the MachineConfig objects generated by the TemplateController.
KubeletConfigmachineconfiguration.openshift.iov1
KubeletConfig describes a customized Kubelet configuration.
>机器配置machineconfiguration.openshift.iov1
MachineConfig defines the configuration for a machine
Pool>机器配置池machineconfiguration.openshift.iov1
MachineConfigPool describes a pool of MachineConfigs.
BMCEventSubscriptionmetal3.iov1alpha1
BMCEventSubscription is the Schema for the fast eventing API
BareMetalHostmetal3.iov1alpha1
BareMetalHost is the Schema for the baremetalhosts API
FirmwareSchemametal3.iov1alpha1
FirmwareSchema is the Schema for the firmwareschemas API
HostFirmwareSettingsmetal3.iov1alpha1
HostFirmwareSettings is the Schema for the hostfirmwaresettings API
PreprovisioningImagemetal3.iov1alpha1
PreprovisioningImage is the Schema for the preprovisioningimages API
Provisioningmetal3.iov1alpha1
Provisioning contains configuration used by the Provisioning service (Ironic) to provision baremetal hosts. Provisioning is created by the OpenShift installer using admin or user provided information about the provisioning network and the NIC on the server that can be used to PXE boot it. This CR is a singleton, created by the installer and currently only consumed by the cluster-baremetal-operator to bring up and update containers in a metal3 cluster.
NodeMetricsmetrics.k8s.iov1beta1
NodeMetrics sets resource usage metrics of a node.
PodMetricsmetrics.k8s.iov1beta1
PodMetrics sets resource usage metrics of a pod.
StorageStatemigration.k8s.iov1alpha1
The state of the storage of a specific resource.
StorageVersionMigrationmigration.k8s.iov1alpha1
StorageVersionMigration represents a migration of stored data to the latest storage version.
Alertmanagermonitoring.coreos.comv1
Alertmanager describes an Alertmanager cluster.
PodMonitormonitoring.coreos.comv1
PodMonitor defines monitoring for a set of pods.
Probemonitoring.coreos.comv1
Probe defines monitoring for a set of static targets or ingresses.
Prometheusmonitoring.coreos.comv1
Prometheus defines a Prometheus deployment.
PrometheusRulemonitoring.coreos.comv1
PrometheusRule defines recording and alerting rules for a Prometheus instance
服务监控器monitoring.coreos.comv1
ServiceMonitor defines monitoring for a set of services.
ThanosRulermonitoring.coreos.comv1
ThanosRuler defines a ThanosRuler deployment.
AlertmanagerConfigmonitoring.coreos.comv1alpha1
AlertmanagerConfig defines a namespaced AlertmanagerConfig to be aggregated across multiple namespaces configuring one Alertmanager cluster.
ClusterNetworknetwork.openshift.iov1
ClusterNetwork describes the cluster network. There is normally only one object of this type, named "default", which is created by the SDN network plugin based on the master configuration when the cluster is brought up for the first time.
EgressNetworkPolicynetwork.openshift.iov1
EgressNetworkPolicy describes the current egress network policy for a Namespace. When using the 'redhat/openshift-ovs-multitenant' network plugin, traffic from a pod to an IP address outside the cluster will be checked against each EgressNetworkPolicyRule in the pod's namespace's EgressNetworkPolicy, in order. If no rule matches (or no EgressNetworkPolicy is present) then the traffic will be allowed by default.
HostSubnetnetwork.openshift.iov1
HostSubnet describes the container subnet network on a node. The HostSubnet object must have the same name as the Node object it corresponds to.
NetNamespacenetwork.openshift.iov1
NetNamespace describes a single isolated network. When using the redhat/openshift-ovs-multitenant plugin, every Namespace will have a corresponding NetNamespace object with the same name. (When using redhat/openshift-ovs-subnet, NetNamespaces are not used.)
EgressRouternetwork.operator.openshift.iov1
EgressRouter is a feature allowing the user to define an egress router that acts as a bridge between pods and external systems. The egress router runs a service that redirects egress traffic originating from a pod or a group of pods to a remote external system or multiple destinations as per configuration. It is consumed by the cluster-network-operator. More specifically, given an EgressRouter CR with <name>, the CNO will create and manage: - A service called <name> - An egress pod called <name> - A NAD called <name> Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer). EgressRouter is a single egressrouter pod configuration object.
OperatorPKInetwork.operator.openshift.iov1
OperatorPKI is a simple certificate authority. It is not intended for external use - rather, it is internal to the network operator. The CNO creates a CA and a certificate signed by that CA. The certificate has both ClientAuth and ServerAuth extended usages enabled. More specifically, given an OperatorPKI with <name>, the CNO will manage: - A Secret called <name>-ca with two data keys: - tls.key - the private key - tls.crt - the CA certificate - A ConfigMap called <name>-ca with a single data key: - cabundle.crt - the CA certificate(s) - A Secret called <name>-cert with two data keys: - tls.key - the private key - tls.crt - the certificate, signed by the CA The CA certificate will have a validity of 10 years, rotated after 9. The target certificate will have a validity of 6 months, rotated after 3 The CA certificate will have a CommonName of "<namespace>_<name>-ca@<timestamp>", where <timestamp> is the last rotation time.
Ingressnetworking.k8s.iov1
Ingress is a collection of rules that allow inbound connections to reach the endpoints defined by a backend. An Ingress can be configured to give services externally-reachable urls, load balance traffic, terminate SSL, offer name based virtual hosting etc.
IngressClassnetworking.k8s.iov1
IngressClass represents the class of the Ingress, referenced by the Ingress Spec. The `ingressclass.kubernetes.io/is-default-class` annotation can be used to indicate that an IngressClass should be considered default. When a single IngressClass resource has this annotation set to true, new Ingress resources without a class specified will be assigned this default class.
网络策略networking.k8s.iov1
NetworkPolicy describes what network traffic is allowed for a set of Pods
NodeFeatureDiscoverynfd.openshift.iov1
An Node Feature Discovery cluster instance
NodeFeatureRulenfd.openshift.iov1alpha1
NodeFeatureRule resource specifies a configuration for feature-based customization of node objects, such as node labeling.
RuntimeClassnode.k8s.iov1
RuntimeClass defines a class of container runtime supported in the cluster. The RuntimeClass is used to determine which container runtime is used to run all containers in a pod. RuntimeClasses are manually defined by a user or cluster provisioner, and referenced in the PodSpec. The Kubelet is responsible for resolving the RuntimeClassName reference before running the pod. For more details, see https://kubernetes.io/docs/concepts/containers/runtime-class/
RuntimeClassnode.k8s.iov1beta1
RuntimeClass defines a class of container runtime supported in the cluster. The RuntimeClass is used to determine which container runtime is used to run all containers in a pod. RuntimeClasses are (currently) manually defined by a user or cluster provisioner, and referenced in the PodSpec. The Kubelet is responsible for resolving the RuntimeClassName reference before running the pod. For more details, see https://git.k8s.io/enhancements/keps/sig-node/585-runtime-class
OAuthAccessTokenoauth.openshift.iov1
OAuthAccessToken describes an OAuth access token. The name of a token must be prefixed with a `sha256~` string, must not contain "/" or "%" characters and must be at least 32 characters long. The name of the token is constructed from the actual token by sha256-hashing it and using URL-safe unpadded base64-encoding (as described in RFC4648) on the hashed result. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
OAuthAuthorizeTokenoauth.openshift.iov1
OAuthAuthorizeToken describes an OAuth authorization token Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
OAuthClientoauth.openshift.iov1
OAuthClient describes an OAuth client Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
OAuthClientAuthorizationoauth.openshift.iov1
OAuthClientAuthorization describes an authorization created by an OAuth client Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
TokenReviewoauth.openshift.iov1
UserOAuthAccessTokenoauth.openshift.iov1
UserOAuthAccessToken is a virtual resource to mirror OAuthAccessTokens to the user the access token was issued for
Authenticationoperator.openshift.iov1
Authentication provides information to configure an operator to manage authentication. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
CSISnapshotControlleroperator.openshift.iov1
CSISnapshotController provides a means to configure an operator to manage the CSI snapshots. `cluster` is the canonical name. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
CloudCredentialoperator.openshift.iov1
CloudCredential provides a means to configure an operator to manage CredentialsRequests. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ClusterCSIDriveroperator.openshift.iov1
ClusterCSIDriver object allows management and configuration of a CSI driver operator installed by default in OpenShift. Name of the object must be name of the CSI driver it operates. See CSIDriverName type for list of allowed values. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Configoperator.openshift.iov1
Config provides information to configure the config operator. It handles installation, migration or synchronization of cloud based cluster configurations like AWS or Azure. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Consoleoperator.openshift.iov1
Console provides a means to configure an operator to manage the console. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
DNSoperator.openshift.iov1
DNS manages the CoreDNS component to provide a name resolution service for pods and services in the cluster. This supports the DNS-based service discovery specification: https://github.com/kubernetes/dns/blob/master/docs/specification.md More details: https://kubernetes.io/docs/tasks/administer-cluster/coredns Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Etcdoperator.openshift.iov1
Etcd provides information to configure an operator to manage etcd. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
IngressControlleroperator.openshift.iov1
IngressController describes a managed ingress controller for the cluster. The controller can service OpenShift Route and Kubernetes Ingress resources. When an IngressController is created, a new ingress controller deployment is created to allow external traffic to reach the services that expose Ingress or Route resources. Updating this resource may lead to disruption for public facing network connections as a new ingress controller revision may be rolled out. https://kubernetes.io/docs/concepts/services-networking/ingress-controllers Whenever possible, sensible defaults for the platform are used. See each field for more details. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
KubeAPIServeroperator.openshift.iov1
KubeAPIServer provides information to configure an operator to manage kube-apiserver. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
KubeControllerManageroperator.openshift.iov1
KubeControllerManager provides information to configure an operator to manage kube-controller-manager. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
KubeScheduleroperator.openshift.iov1
KubeScheduler provides information to configure an operator to manage scheduler. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
KubeStorageVersionMigratoroperator.openshift.iov1
KubeStorageVersionMigrator provides information to configure an operator to manage kube-storage-version-migrator. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Networkoperator.openshift.iov1
Network describes the cluster's desired network configuration. It is consumed by the cluster-network-operator. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
OpenShiftAPIServeroperator.openshift.iov1
OpenShiftAPIServer provides information to configure an operator to manage openshift-apiserver. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
OpenShiftControllerManageroperator.openshift.iov1
OpenShiftControllerManager provides information to configure an operator to manage openshift-controller-manager. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ServiceCAoperator.openshift.iov1
ServiceCA provides information to configure an operator to manage the service cert controllers Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Storageoperator.openshift.iov1
Storage provides a means to configure an operator to manage the cluster storage operator. `cluster` is the canonical name. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
ImageContentSourcePolicyoperator.openshift.iov1alpha1
ImageContentSourcePolicy holds cluster-wide information about how to handle registry mirror rules. When multiple policies are defined, the outcome of the behavior is defined on each field. Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
OLMConfigoperators.coreos.comv1
OLMConfig is a resource responsible for configuring OLM.
Operatoroperators.coreos.comv1
Operator represents a cluster operator.
OperatorConditionoperators.coreos.comv1
OperatorCondition is a Custom Resource of type `OperatorCondition` which is used to convey information to OLM about the state of an operator.
OperatorGroupoperators.coreos.comv1
OperatorGroup is the unit of multitenancy for OLM managed operators. It constrains the installation of operators in its namespace to a specified set of target namespaces.
CatalogSourceoperators.coreos.comv1alpha1
CatalogSource is a repository of CSVs, CRDs, and operator packages.
ClusterServiceVersionoperators.coreos.comv1alpha1
ClusterServiceVersion is a Custom Resource of type `ClusterServiceVersionSpec`.
InstallPlanoperators.coreos.comv1alpha1
InstallPlan defines the installation of a set of operators.
订阅operators.coreos.comv1alpha1
Subscription keeps operators up to date by tracking changes to Catalogs.
OperatorGroupoperators.coreos.comv1alpha2
OperatorGroup is the unit of multitenancy for OLM managed operators. It constrains the installation of operators in its namespace to a specified set of target namespaces.
OperatorConditionoperators.coreos.comv2
OperatorCondition is a Custom Resource of type `OperatorCondition` which is used to convey information to OLM about the state of an operator.
PackageManifestpackages.operators.coreos.comv1
PackageManifest holds information about a package, which is a reference to one (or more) channels under a single package.
PodDisruptionBudgetpolicyv1
PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods
PodDisruptionBudgetpolicyv1beta1
PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods
PodSecurityPolicypolicyv1beta1
PodSecurityPolicy governs the ability to make requests that affect the Security Context that will be applied to a pod and container. Deprecated in 1.21.
项目project.openshift.iov1
Projects are the unit of isolation and collaboration in OpenShift. A project has one or more members, a quota on the resources that the project may consume, and the security controls on the resources in the project. Within a project, members may have different roles - project administrators can set membership, editors can create and manage the resources, and viewers can see but not access running containers. In a normal cluster project administrators are not able to alter their quotas - that is restricted to cluster administrators. Listing or watching projects will return only projects the user has the reader role on. An OpenShift project is an alternative representation of a Kubernetes namespace. Projects are exposed as editable to end users while namespaces are not. Direct creation of a project is typically restricted to administrators, while end users should use the requestproject resource. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
项目请求project.openshift.iov1
ProjectRequest is the set of options necessary to fully qualify a project request Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
AppliedClusterResourceQuotaquota.openshift.iov1
AppliedClusterResourceQuota mirrors ClusterResourceQuota at a project scope, for projection into a project. It allows a project-admin to know which ClusterResourceQuotas are applied to his project and their associated usage. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
集群资源配额quota.openshift.iov1
ClusterResourceQuota mirrors ResourceQuota at a cluster scope. This object is easily convertible to synthetic ResourceQuota object to allow quota evaluation re-use. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
集群角色rbac.authorization.k8s.iov1
ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.
集群角色绑定rbac.authorization.k8s.iov1
ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.
角色rbac.authorization.k8s.iov1
Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.
RoleBindingrbac.authorization.k8s.iov1
RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.
路由route.openshift.iov1
A route allows developers to expose services through an HTTP(S) aware load balancing and proxy layer via a public DNS entry. The route may further specify TLS options and a certificate, or specify a public CNAME that the router should also accept for HTTP and HTTPS traffic. An administrator typically configures their router to be visible outside the cluster firewall, and may also add additional security, caching, or traffic controls on the service content. Routers usually talk directly to the service endpoints. Once a route is created, the `host` field may not be changed. Generally, routers use the oldest route with a given host when resolving conflicts. Routers are subject to additional customization and may support additional controls via the annotations field. Because administrators may configure multiple routers, the route status field is used to return information to clients about the names and states of the route under each router. If a client chooses a duplicate name, for instance, the route status conditions are used to indicate the route cannot be chosen. To enable HTTP/2 ALPN on a route it requires a custom (non-wildcard) certificate. This prevents connection coalescing by clients, notably web browsers. We do not support HTTP/2 ALPN on routes that use the default certificate because of the risk of connection re-use/coalescing. Routes that do not have their own custom certificate will not be HTTP/2 ALPN-enabled on either the frontend or the backend. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Configsamples.operator.openshift.iov1
Config contains the configuration and detailed condition status for the Samples Operator.
PriorityClassscheduling.k8s.iov1
PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer.
RangeAllocationsecurity.internal.openshift.iov1
RangeAllocation is used so we can easily expose a RangeAllocation typed for security group This is an internal API, not intended for external consumption. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
PodSecurityPolicyReviewsecurity.openshift.iov1
PodSecurityPolicyReview checks which service accounts (not users, since that would be cluster-wide) can create the `PodTemplateSpec` in question. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
PodSecurityPolicySelfSubjectReviewsecurity.openshift.iov1
PodSecurityPolicySelfSubjectReview checks whether this user/SA tuple can create the PodTemplateSpec Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
PodSecurityPolicySubjectReviewsecurity.openshift.iov1
PodSecurityPolicySubjectReview checks whether a particular user/SA tuple can create the PodTemplateSpec. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
RangeAllocationsecurity.openshift.iov1
RangeAllocation is used so we can easily expose a RangeAllocation typed for security group Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
SecurityContextConstraintssecurity.openshift.iov1
SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container. For historical reasons SCC was exposed under the core Kubernetes API group. That exposure is deprecated and will be removed in a future release - users should instead use the security.openshift.io group to manage SecurityContextConstraints. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
卷快照snapshot.storage.k8s.iov1
VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.
卷快照类snapshot.storage.k8s.iov1
VolumeSnapshotClass specifies parameters that a underlying storage system uses when creating a volume snapshot. A specific VolumeSnapshotClass is used by specifying its name in a VolumeSnapshot object. VolumeSnapshotClasses are non-namespaced
卷快照内容snapshot.storage.k8s.iov1
VolumeSnapshotContent represents the actual "on-disk" snapshot object in the underlying storage system
VolumeSnapshotsnapshot.storage.k8s.iov1beta1
VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.
VolumeSnapshotClasssnapshot.storage.k8s.iov1beta1
VolumeSnapshotClass specifies parameters that a underlying storage system uses when creating a volume snapshot. A specific VolumeSnapshotClass is used by specifying its name in a VolumeSnapshot object. VolumeSnapshotClasses are non-namespaced
VolumeSnapshotContentsnapshot.storage.k8s.iov1beta1
VolumeSnapshotContent represents the actual "on-disk" snapshot object in the underlying storage system
SpecialResourcesro.openshift.iov1beta1
SpecialResource is the Schema for the specialresources API
CSI 驱动storage.k8s.iov1
CSIDriver captures information about a Container Storage Interface (CSI) volume driver deployed on the cluster. Kubernetes attach detach controller uses this object to determine whether attach is required. Kubelet uses this object to determine whether pod information needs to be passed on mount. CSIDriver objects are non-namespaced.
CSINodestorage.k8s.iov1
CSINode holds information about all CSI drivers installed on a node. CSI drivers do not need to create the CSINode object directly. As long as they use the node-driver-registrar sidecar container, the kubelet will automatically populate the CSINode object for the CSI driver as part of kubelet plugin registration. CSINode has the same name as a node. If the object is missing, it means either there are no CSI Drivers available on the node, or the Kubelet version is low enough that it doesn't create this object. CSINode has an OwnerReference that points to the corresponding node object.
存储类storage.k8s.iov1
StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. StorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.
VolumeAttachmentstorage.k8s.iov1
VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node. VolumeAttachment objects are non-namespaced.
CSIStorageCapacitystorage.k8s.iov1beta1
CSIStorageCapacity stores the result of one CSI GetCapacity call. For a given StorageClass, this describes the available capacity in a particular topology segment. This can be used when considering where to instantiate new PersistentVolumes. For example this can express things like: - StorageClass "standard" has "1234 GiB" available in "topology.kubernetes.io/zone=us-east1" - StorageClass "localssd" has "10 GiB" available in "kubernetes.io/hostname=knode-abc123" The following three cases all imply that no capacity is available for a certain combination: - no object exists with suitable topology and storage class name - such an object exists, but the capacity is unset - such an object exists, but the capacity is zero The producer of these objects can decide which approach is more suitable. They are consumed by the kube-scheduler if the CSIStorageCapacity beta feature gate is enabled there and a CSI driver opts into capacity-aware scheduling with CSIDriver.StorageCapacity.
BrokerTemplateInstancetemplate.openshift.iov1
BrokerTemplateInstance holds the service broker-related state associated with a TemplateInstance. BrokerTemplateInstance is part of an experimental API. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
模板template.openshift.iov1
Template contains the inputs needed to produce a Config. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
TemplateInstancetemplate.openshift.iov1
TemplateInstance requests and records the instantiation of a Template. TemplateInstance is part of an experimental API. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
NodeResourceTopologytopology.node.k8s.iov1alpha1
NodeResourceTopology describes node resources and their topology.
AnsibleJobtower.ansible.comv1alpha1
JobTemplatetower.ansible.comv1alpha1
Profiletuned.openshift.iov1
Profile is a specification for a Profile resource.
Tunedtuned.openshift.iov1
Tuned is a collection of rules that allows cluster-wide deployment of node-level sysctls and more flexibility to add custom tuning specified by user needs. These rules are translated and passed to all containerized Tuned daemons running in the cluster in the format that the daemons understand. The responsibility for applying the node-level tuning then lies with the containerized Tuned daemons. More info: https://github.com/openshift/cluster-node-tuning-operator
user.openshift.iov1
Group represents a referenceable set of Users Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
Identityuser.openshift.iov1
Identity records a successful authentication of a user with an identity provider. The information about the source of authentication is stored on the identity, and the identity is then associated with a single user object. Multiple identities can reference a single user. Information retrieved from the authentication provider is stored in the extra field using a schema determined by the provider. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
用户user.openshift.iov1
Upon log in, every user of the system receives a User and Identity resource. Administrators may directly manipulate the attributes of the users for their own tracking, or set groups via the API. The user name is unique and is chosen based on the value provided by the identity provider - if a user already exists with the incoming name, the user name may have a number appended to it depending on the configuration of the system. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
UserIdentityMappinguser.openshift.iov1
UserIdentityMapping maps a user to an identity Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
IPPoolwhereabouts.cni.cncf.iov1alpha1
IPPool is the Schema for Whereabouts for IP address allocation
OverlappingRangeIPReservationwhereabouts.cni.cncf.iov1alpha1
OverlappingRangeIPReservation is the Schema for the OverlappingRangeIPReservations API