Security context credentials
The Cloudera software must have privileged access at runtime. Cloudera recommends that you configure security context in your OpenShift cluster to ensure access to Cloudera Private Cloud Data Services.
You must install additional scc
definitions into OpenShift that Cloudera
provides as part of the installation software. For more information about security
context credentials in OpenShift, see Introduction to Security Contexts and
SCCs.
Check with your Openshift Admin to add the registry entry of the external Docker
repository server to the allowedRegistries
in the Image Controller
configuration (image.config.openshift.io/cluster), to avoid policy
denial during deployment.
For example:
For more information please see this link from RedHat
[..] spec: registrySources: allowedRegistries: - ##your_external docker repository server name### - quay.io - registry.redhat.io - image-registry.openshift-image-registry.svc:5000 - registry.example.com:5000