Understanding Namespaces
Namespaces are used for grouping and dedicating resources to specific Orka users or service accounts. All users have access to theorka-default namespace. Based on specific rolebindings, a user or a service account might also be able to access the resources within additional namespaces.
Key Concepts:
- Resource Isolation: VMs, nodes, and resources in one namespace are separate from other namespaces
- Access Control: Users and service accounts must be granted access to namespaces via rolebindings
- Default Namespace: All users have access to
orka-defaultby default - Custom Pods: Some namespaces can be configured to run custom Kubernetes resources instead of Orka VMs
**orka-******prefix.
Creating Namespaces
orka3 namespace create Create a new namespace with the specified name. Namespace Name Requirements:- Begins with the
orka-prefix - Does not exceed 63 characters (including the prefix)
- Consists of lowercase alphanumeric characters or dashes (-)
- Ends with an alphanumeric character
- Must be unique to the cluster
--enable-custom-pods is set, creates a new namespace dedicated to running custom K8s resources (formerly sandboxing). Orka VMs cannot be deployed in that namespace.
After Creating a Namespace:
- Move one or more nodes to the namespace to provide computational resources:
- Provide explicit access to users or service accounts: