Skip to content

Commit 0c579aa

Browse files
authored
Merge pull request #79793 from bergerhoffer/OSDOCS-11409
OSDOCS#11409: Adding more detail for creating custom SCCs
2 parents ef75d89 + ea60bce commit 0c579aa

File tree

2 files changed

+21
-16
lines changed

2 files changed

+21
-16
lines changed

modules/security-context-constraints-command-reference.adoc

Lines changed: 20 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,11 @@
22
//
33
// * authentication/managing-security-context-constraints.adoc
44

5+
:_mod-docs-content-type: REFERENCE
56
[id="security-context-constraints-command-reference_{context}"]
67
= Reference of security context constraints commands
78

8-
You can manage security context constraints (SCCs) in your instance as normal API objects using the OpenShift CLI (`oc`).
9+
You can manage security context constraints (SCCs) in your instance as normal API objects by using the OpenShift CLI (`oc`).
910

1011
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
1112
[NOTE]
@@ -103,35 +104,39 @@ the default SCCs.
103104
//other than priority, users, groups, labels, and annotations.
104105
====
105106

106-
[id="deleting-security-context-constraints_{context}"]
107-
== Deleting security context constraints
107+
[id="updating-security-context-constraints_{context}"]
108+
== Updating security context constraints
108109

109-
To delete an SCC:
110+
If your custom SCC no longer satisfies your application workloads requirements, you can update your SCC by using the OpenShift CLI (`oc`).
111+
112+
To update an existing SCC:
110113

111114
[source,terminal]
112115
----
113-
$ oc delete scc <scc_name>
116+
$ oc edit scc <scc_name>
114117
----
115118

116-
[NOTE]
119+
[IMPORTANT]
117120
====
118-
If you delete a default SCC, it will regenerate when you restart the cluster.
121+
To preserve customized SCCs during upgrades, do not edit settings on
122+
the default SCCs.
123+
//other than priority, users, groups, labels, and annotations.
119124
====
120125

121-
[id="updating-security-context-constraints_{context}"]
122-
== Updating security context constraints
126+
[id="deleting-security-context-constraints_{context}"]
127+
== Deleting security context constraints
123128

124-
To update an existing SCC:
129+
If you no longer require your custom SCC, you can delete the SCC by using the OpenShift CLI (`oc`).
130+
131+
To delete an SCC:
125132

126133
[source,terminal]
127134
----
128-
$ oc edit scc <scc_name>
135+
$ oc delete scc <scc_name>
129136
----
130137

131-
[NOTE]
138+
[IMPORTANT]
132139
====
133-
To preserve customized SCCs during upgrades, do not edit settings on
134-
the default SCCs.
135-
//other than priority, users, groups, labels, and annotations.
140+
Do not delete default SCCs. If you delete a default SCC, it is regenerated by the Cluster Version Operator.
136141
====
137142
endif::openshift-enterprise,openshift-webscale,openshift-origin[]

modules/security-context-constraints-creating.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ifdef::openshift-dedicated[]
1111
= Creating security context constraints for CCS clusters
1212
endif::[]
1313

14-
You can create security context constraints (SCCs) by using the OpenShift CLI (`oc`).
14+
If the default security context constraints (SCCs) do not satisfy your application workload requirements, you can create a custom SCC by using the OpenShift CLI (`oc`).
1515

1616
[IMPORTANT]
1717
====

0 commit comments

Comments
 (0)