Skip to content

Commit a3aaed3

Browse files
Apply suggestions from code review
1 parent fdaf254 commit a3aaed3

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

content/operate/kubernetes/security/enable-privileged-mode.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ categories:
33
- docs
44
- operate
55
- kubernetes
6-
description: Enable adding additional capabilities to the security context for the Redis Enterprise container by editing the `allowPrivilegeEscalation` field in the REC.
6+
description: Enable adding additional capabilities to the security context for the Redis Enterprise container by enabling `allowAutoAdjustment`.
77
linkTitle: Enable privileged mode
88
title: Enable privileged mode
99
weight: 98
@@ -44,7 +44,7 @@ spec:
4444
allowAutoAdjustment: true
4545
```
4646

47-
In privileged mode, the security context should look like this:
47+
Allowing automatic resource limit adjustment will result in the security context looking like this:
4848

4949
```yaml
5050
securityContext:
@@ -72,7 +72,7 @@ oc delete scc/redis-enterprise-scc-v2
7272
oc adm policy remove-scc-from-user redis-enterprise-scc-v2 -z <service-account-name>
7373
```
7474

75-
If running in **privileged mode**, manually reapply the [security context constraints (SCC)](https://docs.openshift.com/container-platform/4.8/authentication/managing-security-context-constraints.html) file ([`scc.yaml`]({{< relref "/operate/kubernetes/deployment/openshift/openshift-cli#deploy-the-operator" >}})) and rebind it to the REC service account.
75+
If running in **privileged mode**, manually reapply the [security context constraints (SCC)](https://docs.openshift.com/container-platform/4.8/authentication/managing-security-context-constraints.html) file ([`scc.yaml`]({{< relref "/operate/kubernetes/deployment/openshift/openshift-cli#deploy-the-operator" >}})).
7676

7777
```sh
7878
oc apply -f openshift/scc.yaml
@@ -85,7 +85,7 @@ oc adm policy add-scc-to-user redis-enterprise-scc-v2 \
8585

8686
## New OpenShift installations
8787

88-
New installations of Redis Enterprise for Kubernetes 7.22.0-6 and later automatically run in **unprivileged mode**, using a built-in `nonroot-v2-SCC` which is less permissive and more secure.
88+
New installations of Redis Enterprise for Kubernetes 7.22.0-6 and later automatically run in **unprivileged mode**, using a built-in `nonroot-v2` which is less permissive and more secure.
8989

9090
To enable **privileged mode** after installation, apply and grant permissions to the `redis-enterprise-scc-v2` SCC.
9191

0 commit comments

Comments
 (0)