-
Notifications
You must be signed in to change notification settings - Fork 782
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exclude resources by name #2930
Comments
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 14 days if no further activity occurs. Thank you for your contributions. |
This is a useful feature. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 14 days if no further activity occurs. Thank you for your contributions. |
This would be a useful feature. Has this been implemented? |
Reopened in case more people want this feature and if any volunteers wants to help drive the design. There is also labelSelectors that can be used. https://open-policy-agent.github.io/gatekeeper/website/docs/howto#the-match-field |
Describe the solution you'd like
When matching by namespace, we can exclude certain namespaces via the
excludeNamespaces
matcher.There is no equivalent for excluding by name. e.g.
excludeNames
This would be helpful for policies that match against cluster scoped resources.
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Environment:
kubectl version
):The text was updated successfully, but these errors were encountered: