File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed
Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -26,8 +26,8 @@ to go to the Create Operator Subscription page.
2626
2727. Select *Install* . The *Container Security* Operator appears after a few moments on the *Installed Operators* screen.
2828
29- . Optional: You can add custom certificates to the CSO . In this example, create a certificate
30- named `quay.crt` in the current directory. Then run the following command to add the cert to the CSO :
29+ . Optional: You can add custom certificates to the {rhq-cso} . In this example, create a certificate
30+ named `quay.crt` in the current directory. Then run the following command to add the cert to the {rhq-cso} :
3131+
3232[source,terminal]
3333----
@@ -49,7 +49,7 @@ registry that the container came
4949from, where you can see information about the vulnerability. The following
5050figure shows an example of detected vulnerabilities from a Quay.io registry:
5151+
52- image:cso-registry-vulnerable.png[The CSO points you to a registry containing the vulnerable image]
52+ image:cso-registry-vulnerable.png[The {rhq-cso} points you to a registry containing the vulnerable image]
5353+
5454* Select the namespaces link to go to the *ImageManifestVuln* screen,
5555where you can see the name of the selected image
Original file line number Diff line number Diff line change 88
99Using the {rhq-cso} , you can access vulnerability
1010scan results from the {product-title} web console for container images
11- used in active pods on the cluster. The CSO :
11+ used in active pods on the cluster. The {rhq-cso} :
1212
1313* Watches containers associated with pods on all or specified namespaces
1414* Queries the container registry where the containers came from for
@@ -18,7 +18,7 @@ link:https://quay.io[Quay.io] or a
1818link:https://access.redhat.com/products/red-hat-quay[Red Hat Quay] registry with Clair scanning)
1919* Exposes vulnerabilities via the `ImageManifestVuln` object in the Kubernetes API
2020
21- Using the instructions here, the CSO is installed in the `openshift-operators`
21+ Using the instructions here, the {rhq-cso} is installed in the `openshift-operators`
2222namespace, so it is available to all namespaces on your {product-title} cluster.
2323
2424//
You can’t perform that action at this time.
0 commit comments