-
Notifications
You must be signed in to change notification settings - Fork 14.8k
Clarify whether CRDs are cluster scoped in multitenancy page #48156
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
✅ Pull request preview available for checkingBuilt without sensitive environment variables
To edit notification comments on pull requests, go to your Netlify site configuration. |
/retitle Clarify whether CRDs are cluster scoped in multitenancy page |
...nt/en/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definition-versioning.md
Outdated
Show resolved
Hide resolved
...nt/en/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definition-versioning.md
Show resolved
Hide resolved
...nt/en/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definition-versioning.md
Show resolved
Hide resolved
Update multi-tenancy file Update custom-resource-definition-versioning file Update custom-resource-definition-versioning file
d9e45e3
to
2903146
Compare
/lgtm |
LGTM label has been added. Git tree hash: fd5b0ac58ab544e2d2f27e026da8c615856447b8
|
@mengjiao-liu @mickeyboxell @tengqm @sftim Just wanted to follow up on the PR—everything is looking good on your end, and no further changes are needed. Could you please review it when you have a moment? If all looks good to you, feel free to go ahead and merge. |
...nt/en/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definition-versioning.md
Show resolved
Hide resolved
New changes are detected. LGTM label has been removed. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold Hold until the PR addresses the review comment #48156 (comment) by removing the changes from the unrelated file for this PR. |
This is a quick reminder about this PR. If everything looks good, could you please go ahead and merge it? Let me know if there’s anything else you need from me. |
@aryasoni98 did you see #48156 (comment)? There is a change you must make before we can merge this PR. If you know how to squash commits, please also do that - it's tidier. |
I will mark this as "rotten". That doesn't mean the code changes are poor; really, what the mark means is that it's OK for a bot to automatically close the PR if nothing happens. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Description
This PR updates the Kubernetes documentation to clarify the behavior of Custom Resource Definitions (CRDs) in the context of namespace isolation. The current wording incorrectly implies that namespace isolation does not apply to CRDs, without specifying that while CRDs are cluster-scoped, the resources they define can indeed be namespaced.
The revised sentence now reads:
"However, it can be difficult to configure, and it doesn't apply to resources that are cluster-scoped and not namespaced, such as Custom Resource Definitions (CRDs) themselves (though the custom resources they define can be namespaced), Storage Classes, and Webhooks."
This clarification will help users better understand the relationship between CRDs and namespace isolation.
Issue
Closes: #48112