Skip to content

Commit dd2f06f

Browse files
authored
Merge pull request #29476 from liggitt/podsecurity-audit-annotations
Clarify audit annotation destination
2 parents d12f421 + 315e290 commit dd2f06f

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/en/docs/concepts/security/pod-security-admission.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ takes if a potential violation is detected:
6262
{{< table caption="Pod Security Admission modes" >}}
6363
Mode | Description
6464
:---------|:------------
65-
**`enforce`** | Policy violations will cause the pod to be rejected.
66-
**`audit`** | Policy violations will trigger the addition of an audit annotation, but are otherwise allowed.
67-
**`warn`** | Policy violations will trigger a user-facing warning, but are otherwise allowed.
65+
**enforce** | Policy violations will cause the pod to be rejected.
66+
**audit** | Policy violations will trigger the addition of an audit annotation to the event recorded in the [audit log](/docs/tasks/debug-application-cluster/audit/), but are otherwise allowed.
67+
**warn** | Policy violations will trigger a user-facing warning, but are otherwise allowed.
6868
{{< /table >}}
6969

7070
A namespace can configure any or all modes, or even set a different level for different modes.

0 commit comments

Comments
 (0)