Security context credentials

The Cloudera software must have privileged access at runtime. Cloudera recommends that you configure security context in your OpenShift cluster to ensure access to Cloudera Private Cloud Data Services.

You must install additional scc definitions into OpenShift that Cloudera provides as part of the installation software. For more information about security context credentials in OpenShift, see Introduction to Security Contexts and SCCs.

Check with your Openshift Admin to add the registry entry of the external Docker repository server to the allowedRegistries in the Image Controller configuration (image.config.openshift.io/cluster), to avoid policy denial during deployment.

For example:

For more information please see this link from RedHat

[..]
spec:
registrySources:
  allowedRegistries:
  - ##your_external docker repository server name###
  - quay.io
  - registry.redhat.io
  - image-registry.openshift-image-registry.svc:5000
  - registry.example.com:5000