Skip to content

Commit ae6187e

Browse files
committed
Minor fixes.
1 parent 5f26559 commit ae6187e

File tree

2 files changed

+31
-31
lines changed

2 files changed

+31
-31
lines changed

articles/openshift/howto-run-privileged-containers.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Section titles in product-specific steps below refer directly to section titles
2323
## Before you begin
2424

2525
The documentation of most security products assumes you have cluster-admin privileges.
26-
Customer admins do not possess all privileges in Azure Red Hat OpenShift. Permissions required to modify cluster-wide resources are limited.
26+
Customer admins don't have all privileges in Azure Red Hat OpenShift. Permissions required to modify cluster-wide resources are limited.
2727

2828
First, ensure the user is logged in to the cluster as a customer admin, by running
2929
`oc get scc`. All users that are members of the customer admin group have permissions to view the Security Context Constraints (SCCs) on the cluster.
@@ -41,17 +41,17 @@ kubernetes v1.11.0+d4cacc0
4141
```
4242

4343
## Product-specific steps for Aqua Security
44-
The base instructions that are are going to be modified can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/deploy-openshift). The steps here will run in conjunction to the Aqua deployment documentation.
44+
The base instructions that are going to be modified can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/openshift-red-hat). The steps here will run in conjunction to the Aqua deployment documentation.
4545

46-
The first step is to annotate the required SCCs that will be updated. These annotations prevent the cluster's Sync Pod from reverting the any changes to these SSCs.
46+
The first step is to annotate the required SCCs that will be updated. These annotations prevent the cluster's Sync Pod from reverting any changes to these SSCs.
4747

4848
```
4949
oc annotate scc hostaccess openshift.io/reconcile-protect=true
5050
oc annotate scc privileged openshift.io/reconcile-protect=true
5151
```
5252

5353
### Step 1: Prepare prerequisites
54-
Remember to log in to the cluster as a user with ARO Customer Admin privileges instead of the cluster-admin.
54+
Remember to log in to the cluster as an ARO Customer Admin instead of the cluster-admin role.
5555

5656
Create the project and the service account.
5757
```
@@ -66,14 +66,14 @@ oc adm policy add-scc-to-user privileged system:serviceaccount:aqua-security:aqu
6666
oc adm policy add-scc-to-user hostaccess system:serviceaccount:aqua-security:aqua-account
6767
```
6868

69-
Continue following the remaining instructions in Step 1. This includes setting up the secret for the Aqua registry.
69+
Continue following the remaining instructions in Step 1. Those instructions describe setting up the secret for the Aqua registry.
7070

7171
### Step 2: Deploy the Aqua Server, Database, and Gateway
72-
Follow the steps provided in the Aqua documentation for installing the aqua-console.yaml.
72+
Follow the steps provided in the Aqua documentation for installing the aqua-console.yaml.
7373

74-
This requires a modification to the provided `aqua-console.yaml`. Remove the top two objects labeled, `kind: ClusterRole` and `kind: ClusterRoleBinding`. These will fail during creation as the customer admin does not have permission at this time to modify `ClusterRole` and `ClusterRoleBinding` objects.
74+
Modify the provided `aqua-console.yaml`. Remove the top two objects labeled, `kind: ClusterRole` and `kind: ClusterRoleBinding`. These resources won't be created as the customer admin doesn't have permission at this time to modify `ClusterRole` and `ClusterRoleBinding` objects.
7575

76-
The second modification will be to the `kind: Route` portion of the `aqua-console.yaml`. Substitute the following yaml for the `kind: Route` object in the provided yaml.
76+
The second modification will be to the `kind: Route` portion of the `aqua-console.yaml`. Replace the following yaml for the `kind: Route` object in the `aqua-console.yaml` file.
7777
```
7878
apiVersion: route.openshift.io/v1
7979
kind: Route
@@ -128,7 +128,7 @@ You can follow the documentation until the "Install Console" section, use the Pr
128128
### Install Console
129129

130130
During `oc create -f twistlock_console.yaml` in Step 2, you'll get an Error when creating the namespace.
131-
You can safely ignore it, the namespace has been created previoussly with the `oc new-project` command.
131+
You can safely ignore it, the namespace has been created previously with the `oc new-project` command.
132132

133133
### Create an external route to Console
134134

articles/openshift/toc.yml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -27,29 +27,29 @@
2727
- name: How-to guides
2828
expanded: true
2929
items:
30-
- name: Set up your Azure Red Hat OpenShift dev environment
31-
href: howto-setup-environment.md
32-
expanded: true
33-
items:
34-
- name: Create an Azure AD tenant
35-
href: howto-create-tenant.md
36-
- name: Create an Azure AD app object and user
37-
href: howto-aad-app-configuration.md
38-
- name: Deploy a standalone prometheus in an Azure Red Hat OpenShift cluster
39-
href: howto-deploy-prometheus.md
40-
- name: Manage projects in an Azure Red Hat OpenShift cluster
41-
href: howto-manage-projects.md
42-
- name: Monitoring and logging
43-
items:
44-
- name: Azure Monitor for containers (preview)
30+
- name: Set up your Azure Red Hat OpenShift dev environment
31+
href: howto-setup-environment.md
32+
expanded: true
4533
items:
46-
- name: Configure Azure Monitor for containers
47-
href: ../azure-monitor/insights/container-insights-azure-redhat-setup.md
48-
maintainContext: true
49-
- name: Disable Azure Monitor for containers
50-
href: ../azure-monitor/insights/container-insights-optout-openshift.md
51-
maintainContext: true
52-
- name: Run privileged containers in an Azure Red Hat OpenShift cluster
34+
- name: Create an Azure AD tenant
35+
href: howto-create-tenant.md
36+
- name: Create an Azure AD app object and user
37+
href: howto-aad-app-configuration.md
38+
- name: Deploy a standalone prometheus in an Azure Red Hat OpenShift cluster
39+
href: howto-deploy-prometheus.md
40+
- name: Manage projects in an Azure Red Hat OpenShift cluster
41+
href: howto-manage-projects.md
42+
- name: Monitoring and logging
43+
items:
44+
- name: Azure Monitor for containers (preview)
45+
items:
46+
- name: Configure Azure Monitor for containers
47+
href: ../azure-monitor/insights/container-insights-azure-redhat-setup.md
48+
maintainContext: true
49+
- name: Disable Azure Monitor for containers
50+
href: ../azure-monitor/insights/container-insights-optout-openshift.md
51+
maintainContext: true
52+
- name: Run privileged containers in an Azure Red Hat OpenShift cluster
5353
href: howto-run-privileged-containers.md
5454
- name: Reference
5555
items:

0 commit comments

Comments
 (0)