Create tenant namespace template and enforcement #44

Open
opened 2025-09-01 14:18:54 +00:00 by chris · 0 comments
Owner

Description

  • Implement automation (script or controller) to create a tenant namespace with ResourceQuota, LimitRange, deny-by-default NetworkPolicy, and Role/RoleBinding templates.

Priority: P1
Estimate: 6 hours
Acceptance criteria

  • Creating a tenant via script produces a namespace with these objects.
  • A pod with no resource requests is limited by LimitRange defaults.
Description - Implement automation (script or controller) to create a tenant namespace with ResourceQuota, LimitRange, deny-by-default NetworkPolicy, and Role/RoleBinding templates. Priority: P1 Estimate: 6 hours Acceptance criteria - Creating a tenant via script produces a namespace with these objects. - A pod with no resource requests is limited by LimitRange defaults.
chris added this to the B - k3s Cluster & Storage milestone 2025-09-01 14:18:54 +00:00
chris added the
multi-tenancy
security
k8s
labels 2025-09-01 14:18:54 +00:00
chris self-assigned this 2025-09-01 14:18:54 +00:00
chris added this to the MVP project 2025-09-03 06:51:58 +00:00
This repository is archived. You cannot comment on issues.
No description provided.