File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -26,8 +26,8 @@ to go to the Create Operator Subscription page.
26
26
27
27
. Select *Install* . The *Container Security* Operator appears after a few moments on the *Installed Operators* screen.
28
28
29
- . Optional: You can add custom certificates to the CSO . In this example, create a certificate
30
- named `quay.crt` in the current directory. Then run the following command to add the cert to the CSO :
29
+ . Optional: You can add custom certificates to the {rhq-cso} . In this example, create a certificate
30
+ named `quay.crt` in the current directory. Then run the following command to add the cert to the {rhq-cso} :
31
31
+
32
32
[source,terminal]
33
33
----
@@ -49,7 +49,7 @@ registry that the container came
49
49
from, where you can see information about the vulnerability. The following
50
50
figure shows an example of detected vulnerabilities from a Quay.io registry:
51
51
+
52
- image:cso-registry-vulnerable.png[The CSO points you to a registry containing the vulnerable image]
52
+ image:cso-registry-vulnerable.png[The {rhq-cso} points you to a registry containing the vulnerable image]
53
53
+
54
54
* Select the namespaces link to go to the *ImageManifestVuln* screen,
55
55
where you can see the name of the selected image
Original file line number Diff line number Diff line change 8
8
9
9
Using the {rhq-cso} , you can access vulnerability
10
10
scan results from the {product-title} web console for container images
11
- used in active pods on the cluster. The CSO :
11
+ used in active pods on the cluster. The {rhq-cso} :
12
12
13
13
* Watches containers associated with pods on all or specified namespaces
14
14
* Queries the container registry where the containers came from for
@@ -18,7 +18,7 @@ link:https://quay.io[Quay.io] or a
18
18
link:https://access.redhat.com/products/red-hat-quay[Red Hat Quay] registry with Clair scanning)
19
19
* Exposes vulnerabilities via the `ImageManifestVuln` object in the Kubernetes API
20
20
21
- Using the instructions here, the CSO is installed in the `openshift-operators`
21
+ Using the instructions here, the {rhq-cso} is installed in the `openshift-operators`
22
22
namespace, so it is available to all namespaces on your {product-title} cluster.
23
23
24
24
//
You can’t perform that action at this time.
0 commit comments