diff --git a/modules/removing-cso-operator.adoc b/modules/removing-cso-operator.adoc new file mode 100644 index 0000000000..e202805fb5 --- /dev/null +++ b/modules/removing-cso-operator.adoc @@ -0,0 +1,35 @@ +// Module included in the following assemblies: +// +// * security/pod-vulnerability-scan.adoc + +:_mod-docs-content-type: PROCEDURE +[id="uninstalling-container-security-operator_{context}"] += Uninstalling the {rhq-cso} + +To uninstall the Container Security Operator, you must uninstall the Operator and delete the `imagemanifestvulns.secscan.quay.redhat.com` custom resource definition (CRD). + +.Procedure + +. On the {product-title} web console, click *Operators* -> *Installed Operators*. + +. Click the menu {kebab} of the Container Security Operator. + +. Click *Uninstall Operator*. + +. Confirm your decision by clicking *Uninstall* in the popup window. + +. Use the CLI to delete the `imagemanifestvulns.secscan.quay.redhat.com` CRD. + +.. Remove the `imagemanifestvulns.secscan.quay.redhat.com` custom resource definition by entering the following command: ++ +[source,terminal] +---- +$ oc delete customresourcedefinition imagemanifestvulns.secscan.quay.redhat.com +---- ++ +.Example output ++ +[source,terminal] +---- +customresourcedefinition.apiextensions.k8s.io "imagemanifestvulns.secscan.quay.redhat.com" deleted +---- \ No newline at end of file diff --git a/security/pod-vulnerability-scan.adoc b/security/pod-vulnerability-scan.adoc index 00effbe42d..01bcffcd69 100644 --- a/security/pod-vulnerability-scan.adoc +++ b/security/pod-vulnerability-scan.adoc @@ -27,3 +27,4 @@ include::modules/security-pod-scan-cso-using.adoc[leveloffset=+1] // include::modules/security-pod-scan-query-cli.adoc[leveloffset=+1] +include::modules/removing-cso-operator.adoc[leveloffset=+1]