From 8b0b80892bdddf61bf8afd6922e6f86372b0c05b Mon Sep 17 00:00:00 2001 From: Dean Lewis <22192242+saintdle@users.noreply.github.com> Date: Wed, 29 Mar 2023 18:32:27 +0100 Subject: [PATCH] Day 59 - added more resource links --- 2023/day59.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/2023/day59.md b/2023/day59.md index 894e136..9ba3fbc 100644 --- a/2023/day59.md +++ b/2023/day59.md @@ -484,4 +484,5 @@ On [Day 60](/day60.md)](/day60.md), we will look at OpenShift Projects Creation, - [Pods fail to create due to "allowPrivilegeEscalation: true" in OpenShift 4.11](https://access.redhat.com/solutions/6976492) - [Using the legacy restricted SCC in OCP 4.11+](https://access.redhat.com/articles/6973044) - [Role-based access to security context constraints](https://docs.openshift.com/container-platform/4.12/authentication/managing-security-context-constraints.html#role-based-access-to-ssc_configuring-internal-oauth) - - You can specify SCCs as resources that are handled by RBAC. This allows you to scope access to your SCCs to a certain project or to the entire cluster. \ No newline at end of file + - You can specify SCCs as resources that are handled by RBAC. This allows you to scope access to your SCCs to a certain project or to the entire cluster. +- Kubernetes.io - [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) \ No newline at end of file