Skip to content

Commit e00fe1d

Browse files
committed
Remove the Used on information and replace caution tag with note
1 parent 3cc1b1b commit e00fe1d

File tree

1 file changed

+6
-12
lines changed

1 file changed

+6
-12
lines changed

content/en/docs/reference/labels-annotations-taints.md

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -455,28 +455,24 @@ for more information.
455455

456456
Example: `pod-security.kubernetes.io/exempt: namespace`
457457

458-
Used on: `audit.k8s.io/Event`
459-
460458
Value **must** be one of `user`, `namespace`, or `runtimeClass` which correspond to
461459
[Pod Security Exemption](/docs/concepts/security/pod-security-admission/#exemptions)
462460
dimensions. This annotation indicates on which dimension was based the exemption
463461
from the PodSecurity enforcement.
464462

465-
{{< caution >}}
463+
{{< note >}}
466464
This annotation is not used within the Kubernetes API. When you
467465
[enable auditing](/docs/tasks/debug-application-cluster/audit/) in your cluster,
468466
audit event data is written using `Event` from API group `audit.k8s.io`.
469467
The annotation applies to audit events. Audit events are different from objects in the
470468
[Event API](/docs/reference/kubernetes-api/cluster-resources/event-v1/) (API group
471469
`events.k8s.io`).
472-
{{< /caution >}}
470+
{{< /note >}}
473471

474472
## pod-security.kubernetes.io/enforce-policy
475473

476474
Example: `pod-security.kubernetes.io/enforce-policy: restricted:latest`
477475

478-
Used on: `audit.k8s.io/Event`
479-
480476
Value **must** be `privileged:<version>`, `baseline:<version>`,
481477
`restricted:<version>` which correspond to [Pod Security
482478
Standard](/docs/concepts/security/pod-security-standards) levels accompanied by
@@ -487,23 +483,21 @@ allowed or denied the pod during PodSecurity admission.
487483
See [Pod Security Standards](/docs/concepts/security/pod-security-standards/)
488484
for more information.
489485

490-
{{< caution >}}
486+
{{< note >}}
491487
This annotation is not used within the Kubernetes API. When you
492488
[enable auditing](/docs/tasks/debug-application-cluster/audit/) in your cluster,
493489
audit event data is written using `Event` from API group `audit.k8s.io`.
494490
The annotation applies to audit events. Audit events are different from objects in the
495491
[Event API](/docs/reference/kubernetes-api/cluster-resources/event-v1/) (API group
496492
`events.k8s.io`).
497-
{{< /caution >}}
493+
{{< /note >}}
498494

499495
## pod-security.kubernetes.io/audit-violations
500496

501497
Example: `pod-security.kubernetes.io/audit-violations: would violate
502498
PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container
503499
"example" must set securityContext.allowPrivilegeEscalation=false), ...`
504500

505-
Used on: `audit.k8s.io/Event`
506-
507501
Value details an audit policy violation, it contains the
508502
[Pod Security Standard](/docs/concepts/security/pod-security-standards/) level
509503
that was transgressed as well as the specific policies on the fields that were
@@ -512,14 +506,14 @@ violated from the PodSecurity enforcement.
512506
See [Pod Security Standards](/docs/concepts/security/pod-security-standards/)
513507
for more information.
514508

515-
{{< caution >}}
509+
{{< note >}}
516510
This annotation is not used within the Kubernetes API. When you
517511
[enable auditing](/docs/tasks/debug-application-cluster/audit/) in your cluster,
518512
audit event data is written using `Event` from API group `audit.k8s.io`.
519513
The annotation applies to audit events. Audit events are different from objects in the
520514
[Event API](/docs/reference/kubernetes-api/cluster-resources/event-v1/) (API group
521515
`events.k8s.io`).
522-
{{< /caution >}}
516+
{{< /note >}}
523517

524518
## seccomp.security.alpha.kubernetes.io/pod (deprecated) {#seccomp-security-alpha-kubernetes-io-pod}
525519

0 commit comments

Comments
 (0)