Skip to main content
Version: 0.1.0

Diagram

OpenBaoTenant is the namespace introduction point

The Provisioner reacts to OpenBaoTenant, introduces the namespace boundary, and only then can the rest of the operator safely manage cluster resources there.

Decision matrix

What OpenBaoTenant owns

What OpenBaoTenant owns.
SurfaceWhy it existsWhat it is not
Tenant RBACThe Provisioner creates the namespace-scoped RBAC the operator needs to manage OpenBao resources there.It is not a request to grant arbitrary Secret access to tenant users.
Default guardrailsTenant quotas, limit ranges, and namespace guardrail labels can be introduced as part of onboarding.It is not per-cluster tuning for the OpenBao workload itself.

Decision matrix

Choose the governance model

Choose the governance model.
ModelWho creates the requestBest fitTradeoff
Centrally managedPlatform admins create OpenBaoTenant from the operator namespace.Stricter environments that want review, auditability, or custom tenant guardrails.The platform team owns more of the namespace introduction workflow.
API contract

spec.targetNamespace is immutable after creation. If the target namespace changes, delete and recreate the OpenBaoTenant instead of trying to mutate it in place.

Continue from the concept into the task

Published release documentation

You are reading docs for version 0.1.0. Use the version menu to switch to next or another archived release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.