Skip to content

Commit fd2f37c

Browse files
authored
Update vulnerability scanning references to generalize
1 parent 62b6647 commit fd2f37c

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/operator-nexus/howto-enable-disable-vulnerability-scanning.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Enable/Disable Trivy Vulnerability Scanning in Azure Operator Nexus
3-
description: Get instructions on enabling/disabling the Trivy Vulnerability Scanning setting.
2+
title: Enable/Disable Vulnerability Scanning in Azure Operator Nexus
3+
description: Get instructions on enabling/disabling the Vulnerability Scanning setting.
44
ms.service: azure-operator-nexus
55
ms.custom: template-how-to, devx-track-azurecli
66
ms.topic: how-to
@@ -9,17 +9,17 @@ author: sangeetgupta
99
ms.author: sangeetgupta
1010
---
1111

12-
# Enable/Disable Trivy Vulnerability Scanning in Azure Operator Nexus Cluster
12+
# Enable/Disable Vulnerability Scanning in Azure Operator Nexus Cluster
1313

14-
This guide provides you with instructions on how to enable or disable Trivy Vulnerability Scanning in an Azure Operator Nexus cluster.
14+
This guide provides you with instructions on how to enable or disable Vulnerability Scanning in an Azure Operator Nexus cluster.
1515

1616
## Before you begin
1717

1818
- Install the latest version of the [appropriate CLI extensions](./howto-install-cli-extensions.md).
1919

2020
## Setting variables
2121

22-
To help with configuring Trivy Vulnerability Scanning, define these environment variables used by the various commands throughout this guide.
22+
To help with configuring Vulnerability Scanning, define these environment variables used by the various commands throughout this guide.
2323

2424
> [!NOTE]
2525
> These environment variable values do not reflect a real deployment and users MUST change them to match their environments.
@@ -35,11 +35,11 @@ export MANAGED_RESOURCE_GROUP="contoso-cluster-managed-rg"
3535
export CLUSTER_NAME="contoso-cluster"
3636
```
3737

38-
## Defaults for Trivy Vulnerability Scanning
39-
The Trivy Vulnerability Scanning is `Enabled` by default.
38+
## Defaults for Vulnerability Scanning
39+
The Vulnerability Scanning is `Enabled` by default.
4040

41-
## Configuring Trivy Vulnerability Scanning
42-
The `az networkcloud cluster update` command allows you to update of the settings of Trivy Vulnerability Scanning by using the argument `--vulnerability-scanning-settings container-scan="<setting>"`.
41+
## Configuring Vulnerability Scanning
42+
The `az networkcloud cluster update` command allows you to update of the settings of Vulnerability Scanning by using the argument `--vulnerability-scanning-settings container-scan="<setting>"`.
4343

4444
The following command configures the `setting` for your Cluster.
4545

@@ -52,8 +52,8 @@ az networkcloud cluster update \
5252
```
5353

5454
Allowed values for `<setting>`: `Disabled`, `Enabled`.
55-
- `Disabled`: Trivy Vulnerability Scanning is turned off on the Cluster and no scans are performed.
56-
- `Enabled`: Trivy Vulnerability Scanning is enabled on the Cluster and scans are performed.
55+
- `Disabled`: Vulnerability Scanning is turned off on the Cluster and no scans are performed.
56+
- `Enabled`: Vulnerability Scanning is enabled on the Cluster and scans are performed.
5757

5858
You can confirm that setting was updated by inspecting the output for the following JSON snippet from the Cluster resource view:
5959

0 commit comments

Comments
 (0)