Skip to content

Commit 989d1d9

Browse files
committed
Link to Octant plugin
1 parent d7366a3 commit 989d1d9

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

docs/scanning.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -82,16 +82,16 @@ To prevent deploying a container image with known vulnerabilities, you can use a
8282

8383
and denies admission if the image is vulnerable.
8484

85-
Teppei Fukuda has a [session at KubeCon this week](https://sched.co/Zekd) showing
85+
Teppei Fukuda has a [session at KubeCon this week](https://sched.co/Zekd) showing
8686
the use of [OPA](../policies/#general-purpose-policies) to make policy checks at the admission control stage.
8787

8888
## Scanning in live workloads
8989

9090
Scanning in the CI/CD pipeline can prevent you from storing a vulnerable image in the registry, and admission control can prevent you from deploying an image with known vulnerabilities. But you may also want the ability to check the container images used by your live workloads.
9191

9292
!!! tip "Security is an ongoing process"
93-
New vulnerabilities are found all the time. An image that you scan today
94-
might not have any vulnerablities, but a researcher may find a new issue
93+
New vulnerabilities are found all the time. An image that you scan today
94+
might not have any vulnerablities, but a researcher may find a new issue
9595
that means the same image will fail the scan tomorrow.
9696

9797
[Starboard](https://github.com/aquasecurity/starboard) is a tool for running security tools, including Trivy, within your Kubernetes cluster. This is an easy way to create and view scans of the container images used by your running workloads. Want to give it a try?
@@ -194,7 +194,7 @@ Within this output you can see that the job ran the `trivy` command, and the las
194194

195195
Starboard makes it easy to run Trivy over your running workloads, and coming soon, there will be an [operator](https://github.com/aquasecurity/starboard-security-operator) that will watch for new workloads and automatically run scans over them.
196196

197-
Today, there is also an Octant plugin so you can view the vulnerability results through the Octant UI.
197+
Today, there is also an [Octant plugin](https://github.com/aquasecurity/starboard-octant-plugin) so you can view the vulnerability results through the Octant UI.
198198

199199
![Octant deployment page showing vulnerability counts](img/octant-shellshock-vulns.png)
200200

docs/settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -147,8 +147,8 @@ This time you should see that test 4.2.6 passes. Congratulations, you have remed
147147
You can also use Starboard to run kube-bench and store the results in a Kubernetes CRD.
148148

149149
```sh
150-
$ kubectl starboard kube-bench
151-
$ kubectl get ciskubebenchreports -o yaml
150+
kubectl starboard kube-bench
151+
kubectl get ciskubebenchreports -o yaml
152152
```
153153

154154
These results can be easily viewed using Octant and the Octant Starboard plugin.

0 commit comments

Comments
 (0)