Skip to content

Commit 0df5db0

Browse files
authored
Merge pull request #45122 from stevsmit/GH-Issue-Fix
Fixes minor issues in the security pod scanning CSO file
2 parents 563bf3f + 5ccd4eb commit 0df5db0

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

modules/security-pod-scan-cso.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ to go to the Create Operator Subscription page.
2626

2727
. Select *Install*. The *Container Security* Operator appears after a few moments on the *Installed Operators* screen.
2828

29-
. Optional: You can add custom certificates to the CSO. In this example, create a certificate
30-
named `quay.crt` in the current directory. Then run the following command to add the cert to the CSO:
29+
. Optional: You can add custom certificates to the {rhq-cso}. In this example, create a certificate
30+
named `quay.crt` in the current directory. Then run the following command to add the cert to the {rhq-cso}:
3131
+
3232
[source,terminal]
3333
----
@@ -49,7 +49,7 @@ registry that the container came
4949
from, where you can see information about the vulnerability. The following
5050
figure shows an example of detected vulnerabilities from a Quay.io registry:
5151
+
52-
image:cso-registry-vulnerable.png[The CSO points you to a registry containing the vulnerable image]
52+
image:cso-registry-vulnerable.png[The {rhq-cso} points you to a registry containing the vulnerable image]
5353
+
5454
* Select the namespaces link to go to the *ImageManifestVuln* screen,
5555
where you can see the name of the selected image

security/pod-vulnerability-scan.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ toc::[]
88

99
Using the {rhq-cso}, you can access vulnerability
1010
scan results from the {product-title} web console for container images
11-
used in active pods on the cluster. The CSO:
11+
used in active pods on the cluster. The {rhq-cso}:
1212

1313
* Watches containers associated with pods on all or specified namespaces
1414
* Queries the container registry where the containers came from for
@@ -18,7 +18,7 @@ link:https://quay.io[Quay.io] or a
1818
link:https://access.redhat.com/products/red-hat-quay[Red Hat Quay] registry with Clair scanning)
1919
* Exposes vulnerabilities via the `ImageManifestVuln` object in the Kubernetes API
2020
21-
Using the instructions here, the CSO is installed in the `openshift-operators`
21+
Using the instructions here, the {rhq-cso} is installed in the `openshift-operators`
2222
namespace, so it is available to all namespaces on your {product-title} cluster.
2323

2424
//

0 commit comments

Comments
 (0)