Skip to content

Commit ff9205b

Browse files
authored
Use the same file name for consistency
1 parent b547151 commit ff9205b

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/use-azure-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ kubectl apply -f nginx-privileged.yaml
108108
As expected the pod fails to be scheduled, as shown in the following example output:
109109

110110
```console
111-
$ kubectl apply -f privileged.yaml
111+
$ kubectl apply -f nginx-privileged.yaml
112112

113113
Error from server ([denied by azurepolicy-container-no-privilege-00edd87bf80f443fa51d10910255adbc4013d590bec3d290b4f48725d4dfbdf9] Privileged container is not allowed: nginx-privileged, securityContext: {"privileged": true}): error when creating "privileged.yaml": admission webhook "validation.gatekeeper.sh" denied the request: [denied by azurepolicy-container-no-privilege-00edd87bf80f443fa51d10910255adbc4013d590bec3d290b4f48725d4dfbdf9] Privileged container is not allowed: nginx-privileged, securityContext: {"privileged": true}
114114
```
@@ -194,4 +194,4 @@ For more information about how Azure Policy works:
194194
[custom-policy-tutorial-create]: ../governance/policy/tutorials/create-custom-policy-definition.md
195195
[custom-policy-tutorial-assign]: ../governance/policy/concepts/policy-for-kubernetes.md#assign-a-policy-definition
196196
[azure-policy-samples]: ../governance/policy/samples/index.md
197-
[azure-policy-definition-structure]: ../governance/policy/concepts/definition-structure.md
197+
[azure-policy-definition-structure]: ../governance/policy/concepts/definition-structure.md

0 commit comments

Comments
 (0)