Skip to content

Commit 310ad66

Browse files
authored
Update deployment-safeguards-in-azure-kubernetes-service.md
1 parent 2c8f030 commit 310ad66

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

support/azure/azure-kubernetes/extensions/deployment-safeguards-in-azure-kubernetes-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ To disable deployment safeguards entirely, run the following command:
5151
Deployment Safeguards uses Azure Policy as an implementation detail. To turn on Deployment Safeguards on an AKS cluster, you don't have to have the
5252
correct permissions to assign or delete Azure Policies.
5353

54-
## 4. Why does my deployment resource get admitted even though it doesn\'t follow best practices?
54+
### Why does my deployment resource get admitted even though it doesn\'t follow best practices?
5555

5656
Deployment safeguards enforce best practice standards through Azure Policy controls. It has policies that validate against Kubernetes resources. To evaluate and enforce cluster components, Azure Policy extends [Gatekeeper](https://open-policy-agent.github.io/gatekeeper/website/). Gatekeeper enforcement also currently operates in a [fail-open model](https://open-policy-agent.github.io/gatekeeper/website/docs/failing-closed/#considerations). There are no guarantees that Gatekeeper will respond to our networking call. Therefore, we make sure that the validation doesn't run in such cases so that the denial doesn't block your deployments.
5757

0 commit comments

Comments
 (0)