Document URL: https://docs.okd.io/latest/apb_devel/cli_tooling.html Section Number and Name: https://docs.okd.io/latest/apb_devel/cli_tooling.html#apb-devel-cli-install-prereqs-access-permissions Describe the issue: When running the CLI tool as cluster-admin, OpenShift will schedule the APB pod in the `anyuid` Security Context Constraint. This is well documented here: https://docs.okd.io/latest/architecture/additional_concepts/authorization.html#scc-prioritization This causes issues with some APBs because they require running tasks which annotate the currently running pod. This is not allowed in the `anyuid` scc. We documented this in this comment: https://bugzilla.redhat.com/show_bug.cgi?id=1613664#c7 Suggestions for improvement: Provide warning that running the CLI tool as a cluster-admin will cause APB pods to be deployed under `anyuid` scc which causes some APBs to fail. Additional information:
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 365 days