Skip to content

Commit 097165d

Browse files
Update general.md
1 parent 76c1e08 commit 097165d

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/governance/policy/troubleshoot/general.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -437,7 +437,7 @@ $def = Get-AzPolicyDefinition -id '/providers/Microsoft.Authorization/policyDefi
437437
New-AzPolicyDefinition -name (new-guid).guid -DisplayName "$($def.DisplayName) (Copy)" -Description $def.Description -Metadata ($def.Metadata | convertto-json) -Parameter ($def.Parameters | convertto-json) -Policy ($def.PolicyRule | convertto-json -depth 15)
438438
```
439439

440-
### Scenario: Non-compliant Kubernetes resource gets created unexpectedly
440+
### Scenario: Kubernetes resource gets created during connectivity failure despite deny policy being assigned
441441

442442
#### Issue
443443

@@ -449,9 +449,9 @@ The GK fail-open model is by design and based on community feedback. Gatekeeper
449449

450450
#### Resolution
451451

452-
In the above event, the error case will be found in logs. And even if evaluation is bypassed at creation time and an object is created, it will still be reported on Azure Policy compliance as non-compliant as a flag to customers.
452+
In the above event, the error case can be monitored from the [admission webhook metrics](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#admission-webhook-metrics) provided by the kube-apiserver. And even if evaluation is bypassed at creation time and an object is created, it will still be reported on Azure Policy compliance as non-compliant as a flag to customers.
453453

454-
IRegardless of the above, in such a scenario, Azure policy will still retain the last known policy on the cluster and keep the guardrails in place. See more about this behavior here: https://docs.microsoft.com/en-us/azure/governance/policy/how-to/determine-non-compliance#aks-resource-provider-mode-compliance-reasons.
454+
Regardless of the above, in such a scenario, Azure policy will still retain the last known policy on the cluster and keep the guardrails in place.
455455

456456
## Next steps
457457

0 commit comments

Comments
 (0)