You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/howto-run-privileged-containers.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Section titles in product-specific steps below refer directly to section titles
23
23
## Before you begin
24
24
25
25
The documentation of most security products assumes you have cluster-admin privileges.
26
-
Customer admins do not possess all privileges in Azure Red Hat OpenShift. Permissions required to modify cluster-wide resources are limited.
26
+
Customer admins don't have all privileges in Azure Red Hat OpenShift. Permissions required to modify cluster-wide resources are limited.
27
27
28
28
First, ensure the user is logged in to the cluster as a customer admin, by running
29
29
`oc get scc`. All users that are members of the customer admin group have permissions to view the Security Context Constraints (SCCs) on the cluster.
@@ -41,17 +41,17 @@ kubernetes v1.11.0+d4cacc0
41
41
```
42
42
43
43
## Product-specific steps for Aqua Security
44
-
The base instructions that are are going to be modified can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/deploy-openshift). The steps here will run in conjunction to the Aqua deployment documentation.
44
+
The base instructions that are going to be modified can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/openshift-red-hat). The steps here will run in conjunction to the Aqua deployment documentation.
45
45
46
-
The first step is to annotate the required SCCs that will be updated. These annotations prevent the cluster's Sync Pod from reverting the any changes to these SSCs.
46
+
The first step is to annotate the required SCCs that will be updated. These annotations prevent the cluster's Sync Pod from reverting any changes to these SSCs.
Continue following the remaining instructions in Step 1. This includes setting up the secret for the Aqua registry.
69
+
Continue following the remaining instructions in Step 1. Those instructions describe setting up the secret for the Aqua registry.
70
70
71
71
### Step 2: Deploy the Aqua Server, Database, and Gateway
72
-
Follow the steps provided in the Aqua documentation for installing the aqua-console.yaml.
72
+
Follow the steps provided in the Aqua documentation for installing the aqua-console.yaml.
73
73
74
-
This requires a modification to the provided `aqua-console.yaml`. Remove the top two objects labeled, `kind: ClusterRole` and `kind: ClusterRoleBinding`. These will fail during creation as the customer admin does not have permission at this time to modify `ClusterRole` and `ClusterRoleBinding` objects.
74
+
Modify the provided `aqua-console.yaml`. Remove the top two objects labeled, `kind: ClusterRole` and `kind: ClusterRoleBinding`. These resources won't be created as the customer admin doesn't have permission at this time to modify `ClusterRole` and `ClusterRoleBinding` objects.
75
75
76
-
The second modification will be to the `kind: Route` portion of the `aqua-console.yaml`. Substitute the following yaml for the `kind: Route` object in the provided yaml.
76
+
The second modification will be to the `kind: Route` portion of the `aqua-console.yaml`. Replace the following yaml for the `kind: Route` object in the `aqua-console.yaml` file.
77
77
```
78
78
apiVersion: route.openshift.io/v1
79
79
kind: Route
@@ -128,7 +128,7 @@ You can follow the documentation until the "Install Console" section, use the Pr
128
128
### Install Console
129
129
130
130
During `oc create -f twistlock_console.yaml` in Step 2, you'll get an Error when creating the namespace.
131
-
You can safely ignore it, the namespace has been created previoussly with the `oc new-project` command.
131
+
You can safely ignore it, the namespace has been created previously with the `oc new-project` command.
0 commit comments