1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

Merge pull request #81045 from openshift-cherrypick-robot/cherry-pick-80905-to-enterprise-4.17

[enterprise-4.17] Adds a small procedure to completely remove CSO by deleting the CRD
This commit is contained in:
Steven Smith
2024-08-28 14:32:39 -04:00
committed by GitHub
2 changed files with 36 additions and 0 deletions

View File

@@ -0,0 +1,35 @@
// Module included in the following assemblies:
//
// * security/pod-vulnerability-scan.adoc
:_mod-docs-content-type: PROCEDURE
[id="uninstalling-container-security-operator_{context}"]
= Uninstalling the {rhq-cso}
To uninstall the Container Security Operator, you must uninstall the Operator and delete the `imagemanifestvulns.secscan.quay.redhat.com` custom resource definition (CRD).
.Procedure
. On the {product-title} web console, click *Operators* -> *Installed Operators*.
. Click the menu {kebab} of the Container Security Operator.
. Click *Uninstall Operator*.
. Confirm your decision by clicking *Uninstall* in the popup window.
. Use the CLI to delete the `imagemanifestvulns.secscan.quay.redhat.com` CRD.
.. Remove the `imagemanifestvulns.secscan.quay.redhat.com` custom resource definition by entering the following command:
+
[source,terminal]
----
$ oc delete customresourcedefinition imagemanifestvulns.secscan.quay.redhat.com
----
+
.Example output
+
[source,terminal]
----
customresourcedefinition.apiextensions.k8s.io "imagemanifestvulns.secscan.quay.redhat.com" deleted
----

View File

@@ -27,3 +27,4 @@ include::modules/security-pod-scan-cso-using.adoc[leveloffset=+1]
//
include::modules/security-pod-scan-query-cli.adoc[leveloffset=+1]
include::modules/removing-cso-operator.adoc[leveloffset=+1]