diff --git a/bundles.yaml b/bundles.yaml index a059c5ac..403f1581 100644 --- a/bundles.yaml +++ b/bundles.yaml @@ -1,5 +1,5 @@ # Oldest supported version should be equal to the lowest supported version in the support policy document. -# See: https://access.redhat.com/support/policy/updates/rhacs +# See: https://access.redhat.com/support/policy/updates/rhacs oldest_supported_version: 4.8.0 images: - image: registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6cdcf20771f9c46640b466f804190d00eaf2e59caee6d420436e78b283d177bf @@ -256,5 +256,7 @@ images: version: 4.9.2 - image: registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:4293e169ce795c57143e5a37e0b909ba19d702d26830c749f960ce4ec77c0897 version: 4.9.3 + - image: quay.io/rhacs-eng/release-operator-bundle@sha256:cb5fac5c451f2b46cdb74859f035b35878db033df803ef14b705fdd7a9181da5 + version: 4.9.4-rc.2 - image: registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1b1480e72310d6ec17c4dd4368214cd940a4da230b13304f4621c5ae560f9e9e version: 4.10.0 diff --git a/catalog-bundle-object/rhacs-operator/catalog.json b/catalog-bundle-object/rhacs-operator/catalog.json index ad385887..57bae0f3 100644 --- a/catalog-bundle-object/rhacs-operator/catalog.json +++ b/catalog-bundle-object/rhacs-operator/catalog.json @@ -2013,8 +2013,13 @@ "skipRange": ">= 4.8.0 < 4.9.3" }, { - "name": "rhacs-operator.v4.10.0", + "name": "rhacs-operator.v4.9.4-rc.2", "replaces": "rhacs-operator.v4.9.3", + "skipRange": ">= 4.8.0 < 4.9.4-rc.2" + }, + { + "name": "rhacs-operator.v4.10.0", + "replaces": "rhacs-operator.v4.9.4-rc.2", "skipRange": ">= 4.9.0 < 4.10.0" } ] @@ -4139,6 +4144,11 @@ "name": "rhacs-operator.v4.9.3", "replaces": "rhacs-operator.v4.9.2", "skipRange": ">= 4.8.0 < 4.9.3" + }, + { + "name": "rhacs-operator.v4.9.4-rc.2", + "replaces": "rhacs-operator.v4.9.3", + "skipRange": ">= 4.8.0 < 4.9.4-rc.2" } ] } @@ -4552,8 +4562,13 @@ "skipRange": ">= 4.8.0 < 4.9.3" }, { - "name": "rhacs-operator.v4.10.0", + "name": "rhacs-operator.v4.9.4-rc.2", "replaces": "rhacs-operator.v4.9.3", + "skipRange": ">= 4.8.0 < 4.9.4-rc.2" + }, + { + "name": "rhacs-operator.v4.10.0", + "replaces": "rhacs-operator.v4.9.4-rc.2", "skipRange": ">= 4.9.0 < 4.10.0" } ] @@ -20740,6 +20755,131 @@ } ] } +{ + "schema": "olm.bundle", + "name": "rhacs-operator.v4.9.4-rc.2", + "package": "rhacs-operator", + "image": "quay.io/rhacs-eng/release-operator-bundle@sha256:cb5fac5c451f2b46cdb74859f035b35878db033df803ef14b705fdd7a9181da5", + "properties": [ + { + "type": "olm.gvk", + "value": { + "group": "config.stackrox.io", + "kind": "SecurityPolicy", + "version": "v1alpha1" + } + }, + { + "type": "olm.gvk", + "value": { + "group": "platform.stackrox.io", + "kind": "Central", + "version": "v1alpha1" + } + }, + { + "type": "olm.gvk", + "value": { + "group": "platform.stackrox.io", + "kind": "SecuredCluster", + "version": "v1alpha1" + } + }, + { + "type": "olm.package", + "value": { + "packageName": "rhacs-operator", + "version": "4.9.4-rc.2" + } + }, + { + "type": "olm.bundle.object", + "value": { + "data": "{"apiVersion":"apiextensions.k8s.io/v1","kind":"CustomResourceDefinition","metadata":{"annotations":{"controller-gen.kubebuilder.io/version":"v0.19.0"},"creationTimestamp":null,"name":"centrals.platform.stackrox.io"},"spec":{"group":"platform.stackrox.io","names":{"kind":"Central","listKind":"CentralList","plural":"centrals","singular":"central"},"scope":"Namespaced","versions":[{"name":"v1alpha1","schema":{"openAPIV3Schema":{"description":"Central is the configuration template for the central services. This includes the API server, persistent storage,\nand the web UI, as well as the image scanner.","properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"CentralSpec defines the desired state of Central","properties":{"central":{"description":"Settings for the Central component, which is responsible for all user interaction.","properties":{"adminPasswordGenerationDisabled":{"description":"Disable admin password generation. Do not use this for first-time installations,\nas you will have no way to perform initial setup and configuration of alternative authentication methods.","type":"boolean"},"adminPasswordSecret":{"description":"Specify a secret that contains the administrator password in the \"password\" data item.\nIf omitted, the operator will auto-generate a password and store it in the \"password\" item\nin the \"central-htpasswd\" secret.","properties":{"name":{"description":"The name of the referenced secret.","type":"string"}},"required":["name"],"type":"object"},"db":{"description":"Settings for Central DB, which is responsible for data persistence.","properties":{"configOverride":{"description":"Config map containing postgresql.conf and pg_hba.conf that will be used if modifications need to be applied.","properties":{"name":{"description":"The name of the referenced config map.","type":"string"}},"required":["name"],"type":"object"},"connectionPoolSize":{"description":"Configures the database connection pool size.","properties":{"maxConnections":{"description":"Maximum number of connections in the connection pool.\nThe default is: 90.","format":"int32","minimum":1,"type":"integer"},"minConnections":{"description":"Minimum number of connections in the connection pool.\nThe default is: 10.","format":"int32","minimum":1,"type":"integer"}},"required":["maxConnections","minConnections"],"type":"object"},"connectionString":{"description":"Specify a connection string that corresponds to a database managed elsewhere. If set, the operator will not manage the Central DB.\nWhen using this option, you must explicitly set a password secret; automatically generating a password will not\nbe supported.","type":"string"},"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"isEnabled":{"description":"Obsolete field.\nThis field will be removed in a future release.","enum":["Default","Enabled"],"type":"string"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"passwordSecret":{"description":"Specify a secret that contains the password in the \"password\" data item. This can only be used when\nspecifying a connection string manually.\nWhen omitted, the operator will auto-generate a DB password and store it in the \"password\" item\nin the \"central-db-password\" secret.","properties":{"name":{"description":"The name of the referenced secret.","type":"string"}},"required":["name"],"type":"object"},"persistence":{"description":"Configures how Central DB should store its persistent data. You can choose between using a persistent\nvolume claim (recommended default), and a host path.","properties":{"hostPath":{"description":"Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view).","properties":{"path":{"description":"The path on the host running Central.","type":"string"}},"type":"object"},"persistentVolumeClaim":{"description":"Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users.","properties":{"claimName":{"description":"The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: central-db.","type":"string"},"size":{"description":"The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","type":"string"},"storageClassName":{"description":"The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.","type":"string"}},"type":"object"}},"type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"declarativeConfiguration":{"description":"Configures resources within Central in a declarative manner.","properties":{"configMaps":{"description":"List of config maps containing declarative configuration.","items":{"description":"LocalConfigMapReference is a reference to a config map within the same namespace.","properties":{"name":{"description":"The name of the referenced config map.","type":"string"}},"required":["name"],"type":"object"},"type":"array"},"secrets":{"description":"List of secrets containing declarative configuration.","items":{"description":"LocalSecretReference is a reference to a secret within the same namespace.","properties":{"name":{"description":"The name of the referenced secret.","type":"string"}},"required":["name"],"type":"object"},"type":"array"}},"type":"object"},"defaultTLSSecret":{"description":"By default, Central will only serve an internal TLS certificate, which means that you will\nneed to handle TLS termination at the ingress or load balancer level.\nIf you want to terminate TLS in Central and serve a custom server certificate, you can specify\na secret containing the certificate and private key here.","properties":{"name":{"description":"The name of the referenced secret.","type":"string"}},"required":["name"],"type":"object"},"exposure":{"description":"Here you can configure if you want to expose central through a node port, a load balancer, or an OpenShift\nroute.","properties":{"loadBalancer":{"description":"Expose Central through a load balancer service.","properties":{"enabled":{"description":"The default is: false.","type":"boolean"},"ip":{"description":"If you have a static IP address reserved for your load balancer, you can enter it here.","type":"string"},"port":{"description":"The default is: 443.","format":"int32","maximum":65535,"minimum":1,"type":"integer"}},"type":"object"},"nodePort":{"description":"Expose Central through a node port.","properties":{"enabled":{"description":"The default is: false.","type":"boolean"},"port":{"description":"Use this to specify an explicit node port. Most users should leave this empty.","format":"int32","maximum":65535,"minimum":1,"type":"integer"}},"type":"object"},"route":{"description":"Expose Central through an OpenShift route.","properties":{"enabled":{"description":"Expose Central with a passthrough route.\nThe default is: false.","type":"boolean"},"host":{"description":"Specify a custom hostname for the Central route.\nIf unspecified, an appropriate default value will be automatically chosen by the OpenShift route operator.","type":"string"},"reencrypt":{"description":"Set up a Central route with reencrypt TLS termination.\nFor reencrypt routes, the request is terminated on the OpenShift router with a custom certificate.\nThe request is then reencrypted by the OpenShift router and sent to Central.\n[user] --TLS--\u003e [OpenShift router] --TLS--\u003e [Central]","properties":{"enabled":{"description":"Expose Central with a reencrypt route.\nShould not be used for sensor communication.\nThe default is: false.","type":"boolean"},"host":{"description":"Specify a custom hostname for the Central reencrypt route.\nIf unspecified, an appropriate default value will be automatically chosen by the OpenShift route operator.","type":"string"},"tls":{"description":"TLS settings for exposing Central via a reencrypt Route.","properties":{"caCertificate":{"description":"The PEM encoded certificate chain that may be used to establish a complete chain of trust.\nDefaults to the OpenShift certificate authority.","type":"string"},"certificate":{"description":"The PEM encoded certificate that is served on the route. Must be a single serving\ncertificate instead of a certificate chain.\nDefaults to a certificate signed by the OpenShift certificate authority.","type":"string"},"destinationCACertificate":{"description":"The CA certificate of the final destination, i.e. of Central.\nUsed by the OpenShift router for health checks on the secure connection.\nDefaults to the Central certificate authority.","type":"string"},"key":{"description":"The PEM encoded private key of the certificate that is served on the route.\nDefaults to a certificate signed by the OpenShift certificate authority.","type":"string"}},"type":"object"}},"type":"object"}},"type":"object"}},"type":"object"},"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"monitoring":{"description":"Configures monitoring endpoint for Central. The monitoring endpoint\nallows other services to collect metrics from Central, provided in\nPrometheus compatible format.","properties":{"exposeEndpoint":{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"notifierSecretsEncryption":{"description":"Configures the encryption of notifier secrets stored in the Central DB.","properties":{"enabled":{"description":"Enables the encryption of notifier secrets stored in the Central DB.\nThe default is: false.","type":"boolean"}},"type":"object"},"persistence":{"description":"Unused field. This field exists solely for backward compatibility starting from version v4.6.0.","properties":{"hostPath":{"description":"Obsolete unused field.","properties":{"path":{"description":"The path on the host running Central.","type":"string"}},"type":"object"},"persistentVolumeClaim":{"description":"Obsolete unused field.","properties":{"claimName":{"description":"Obsolete unused field.","type":"string"},"size":{"description":"Obsolete unused field.","type":"string"},"storageClassName":{"description":"Obsolete unused field.","type":"string"}},"type":"object"}},"type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"telemetry":{"description":"Configures telemetry settings for Central. If enabled, Central transmits telemetry and diagnostic\ndata to a remote storage backend.","properties":{"enabled":{"description":"Specifies if Telemetry is enabled.\nThe default is: true.","type":"boolean"},"storage":{"description":"Defines the telemetry storage backend for Central.","properties":{"endpoint":{"description":"Storage API endpoint.","type":"string"},"key":{"description":"Storage API key. If not set, telemetry is disabled.","type":"string"}},"type":"object"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"configAsCode":{"description":"Config-as-Code configuration.","properties":{"configAsCodeComponent":{"description":"If you want to deploy the Config as Code component, set this to \"Enabled\"\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"customize":{"description":"Customizations to apply on all Central Services components.","properties":{"annotations":{"additionalProperties":{"type":"string"},"description":"Custom annotations to set on all managed objects.","type":"object"},"envVars":{"description":"Custom environment variables to set on managed pods' containers.","items":{"description":"EnvVar represents an environment variable present in a Container.","properties":{"name":{"description":"Name of the environment variable.\nMay consist of any printable ASCII characters except '='.","type":"string"},"value":{"description":"Variable references $(VAR_NAME) are expanded\nusing the previously defined environment variables in the container and\nany service environment variables. If a variable cannot be resolved,\nthe reference in the input string will be unchanged. Double $$ are reduced\nto a single $, which allows for escaping the $(VAR_NAME) syntax: i.e.\n\"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\".\nEscaped references will never be expanded, regardless of whether the variable\nexists or not.\nDefaults to \"\".","type":"string"},"valueFrom":{"description":"Source for the environment variable's value. Cannot be used if value is not empty.","properties":{"configMapKeyRef":{"description":"Selects a key of a ConfigMap.","properties":{"key":{"description":"The key to select.","type":"string"},"name":{"default":"","description":"Name of the referent.\nThis field is effectively required, but due to backwards compatibility is\nallowed to be empty. Instances of this type with an empty value here are\nalmost certainly wrong.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"optional":{"description":"Specify whether the ConfigMap or its key must be defined","type":"boolean"}},"required":["key"],"type":"object","x-kubernetes-map-type":"atomic"},"fieldRef":{"description":"Selects a field of the pod: supports metadata.name, metadata.namespace, `metadata.labels['\u003cKEY\u003e']`, `metadata.annotations['\u003cKEY\u003e']`,\nspec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs.","properties":{"apiVersion":{"description":"Version of the schema the FieldPath is written in terms of, defaults to \"v1\".","type":"string"},"fieldPath":{"description":"Path of the field to select in the specified API version.","type":"string"}},"required":["fieldPath"],"type":"object","x-kubernetes-map-type":"atomic"},"fileKeyRef":{"description":"FileKeyRef selects a key of the env file.\nRequires the EnvFiles feature gate to be enabled.","properties":{"key":{"description":"The key within the env file. An invalid key will prevent the pod from starting.\nThe keys defined within a source may consist of any printable ASCII characters except '='.\nDuring Alpha stage of the EnvFiles feature gate, the key size is limited to 128 characters.","type":"string"},"optional":{"default":false,"description":"Specify whether the file or its key must be defined. If the file or key\ndoes not exist, then the env var is not published.\nIf optional is set to true and the specified key does not exist,\nthe environment variable will not be set in the Pod's containers.\n\nIf optional is set to false and the specified key does not exist,\nan error will be returned during Pod creation.","type":"boolean"},"path":{"description":"The path within the volume from which to select the file.\nMust be relative and may not contain the '..' path or start with '..'.","type":"string"},"volumeName":{"description":"The name of the volume mount containing the env file.","type":"string"}},"required":["key","path","volumeName"],"type":"object","x-kubernetes-map-type":"atomic"},"resourceFieldRef":{"description":"Selects a resource of the container: only resources limits and requests\n(limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.","properties":{"containerName":{"description":"Container name: required for volumes, optional for env vars","type":"string"},"divisor":{"anyOf":[{"type":"integer"},{"type":"string"}],"description":"Specifies the output format of the exposed resources, defaults to \"1\"","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"resource":{"description":"Required: resource to select","type":"string"}},"required":["resource"],"type":"object","x-kubernetes-map-type":"atomic"},"secretKeyRef":{"description":"Selects a key of a secret in the pod's namespace","properties":{"key":{"description":"The key of the secret to select from.  Must be a valid secret key.","type":"string"},"name":{"default":"","description":"Name of the referent.\nThis field is effectively required, but due to backwards compatibility is\nallowed to be empty. Instances of this type with an empty value here are\nalmost certainly wrong.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"optional":{"description":"Specify whether the Secret or its key must be defined","type":"boolean"}},"required":["key"],"type":"object","x-kubernetes-map-type":"atomic"}},"type":"object"}},"required":["name"],"type":"object"},"type":"array"},"labels":{"additionalProperties":{"type":"string"},"description":"Custom labels to set on all managed objects.","type":"object"}},"type":"object"},"egress":{"description":"Settings related to outgoing network traffic.","properties":{"connectivityPolicy":{"description":"Configures whether Red Hat Advanced Cluster Security should run in online or offline (disconnected) mode.\nIn offline mode, automatic updates of vulnerability definitions and kernel modules are disabled.\nThe default is: Online.","enum":["Online","Offline"],"type":"string"}},"type":"object"},"imagePullSecrets":{"description":"Additional image pull secrets to be taken into account for pulling images.","items":{"description":"LocalSecretReference is a reference to a secret within the same namespace.","properties":{"name":{"description":"The name of the referenced secret.","type":"string"}},"required":["name"],"type":"object"},"type":"array"},"misc":{"description":"Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.","properties":{"createSCCs":{"description":"Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.","type":"boolean"}},"type":"object"},"monitoring":{"description":"Monitoring configuration.","properties":{"openshift":{"description":"OpenShiftMonitoring defines settings related to OpenShift Monitoring","properties":{"enabled":{"description":"The default is: true.","type":"boolean"}},"required":["enabled"],"type":"object"}},"type":"object"},"network":{"description":"Network configuration.","properties":{"policies":{"description":"To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"overlays":{"description":"Overlays","items":{"description":"K8sObjectOverlay is an overlay that applies a set of patches to a resource.\nIt targets a resource by its API version, kind, and name, and applies\na list of patches to this resource.\n\n# Examples\n\n## Adding an annotation to a resource\n\n\tapiVersion: v1\n\tkind: ServiceAccount\n\tname: central\n\tpatches:\n\t- path: metadata.annotations.eks\\.amazonaws\\.com/role-arn\n\t  value: \"\\\"arn:aws:iam:1234:role\\\"\"\n\n## Adding an environment variable to a deployment\n\n\tapiVersion: apps/v1\n\tkind: Deployment\n\tname: central\n\tpatches:\n\t- path: spec.template.spec.containers[name:central].env[-1]\n\t  value: |\n\t    name: MY_ENV_VAR\n\t    value: value\n\n## Adding an ingress to a network policy\n\n\tapiVersion: networking.k8s.io/v1\n\tkind: NetworkPolicy\n\tname: allow-ext-to-central\n\tpatches:\n\t- path: spec.ingress[-1]\n\t  value: |\n\t    ports:\n\t    - port: 999\n\t      protocol: TCP\n\n## Changing the value of a configMap\n\n\tapiVersion: v1\n\tkind: ConfigMap\n\tname: central-endpoints\n\tpatches:\n\t- path: data.endpoints\\.yaml:\n\t  verbatim: |\n\t    disableDefault: false\n\n## Adding a container to a deployment\n\n\tapiVersion: apps/v1\n\tkind: Deployment\n\tname: central\n\tpatches:\n\t  - path: spec.template.spec.containers[-1]\n\t    value: |\n\t      name: nginx\n\t      image: nginx\n\t      ports:\n\t      - containerPort: 8000\n\t        name: http\n\t        protocol: TCP","properties":{"apiVersion":{"description":"Resource API version.","type":"string"},"kind":{"description":"Resource kind.","type":"string"},"name":{"description":"Name of resource.","type":"string"},"optional":{"description":"Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown.","type":"boolean"},"patches":{"description":"List of patches to apply to resource.","items":{"description":"K8sObjectOverlayPatch defines a patch to apply to a resource.","properties":{"path":{"description":"Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist.","type":"string"},"value":{"description":"Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema.","type":"string"},"verbatim":{"description":"Verbatim value to add, delete or replace.\nSame as Value, however the content is not interpreted as YAML, but treated as literal string instead.\nAt least one of Value and Verbatim must be empty.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"scanner":{"description":"Settings for the Scanner component, which is responsible for vulnerability scanning of container\nimages.","properties":{"analyzer":{"description":"Settings pertaining to the analyzer deployment, such as for autoscaling.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"scaling":{"description":"Controls the number of analyzer replicas and autoscaling.","properties":{"autoScaling":{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"},"maxReplicas":{"description":"The default is: 5.","format":"int32","minimum":1,"type":"integer"},"minReplicas":{"description":"The default is: 2.","format":"int32","minimum":1,"type":"integer"},"replicas":{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","format":"int32","minimum":1,"type":"integer"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"db":{"description":"Settings pertaining to the database used by the Red Hat Advanced Cluster Security Scanner.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"monitoring":{"description":"Configures monitoring endpoint for Scanner. The monitoring endpoint\nallows other services to collect metrics from Scanner, provided in\nPrometheus compatible format.","properties":{"exposeEndpoint":{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"scannerComponent":{"description":"If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended). By default, the scanner is enabled.\nIf you do so, all the settings in this section will have no effect.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"scannerV4":{"description":"Settings for the Scanner V4 component, which can run in addition to the previously existing Scanner components","properties":{"db":{"description":"Settings pertaining to the DB deployment.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"persistence":{"description":"Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass.","properties":{"hostPath":{"description":"Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view).","properties":{"path":{"description":"The path on the host running Central.","type":"string"}},"type":"object"},"persistentVolumeClaim":{"description":"Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users.","properties":{"claimName":{"description":"The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db.","type":"string"},"size":{"description":"The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","type":"string"},"storageClassName":{"description":"The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.","type":"string"}},"type":"object"}},"type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"indexer":{"description":"Settings pertaining to the indexer deployment.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"scaling":{"description":"Controls the number of replicas and autoscaling for this component.","properties":{"autoScaling":{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"},"maxReplicas":{"description":"The default is: 5.","format":"int32","minimum":1,"type":"integer"},"minReplicas":{"description":"The default is: 2.","format":"int32","minimum":1,"type":"integer"},"replicas":{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","format":"int32","minimum":1,"type":"integer"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"matcher":{"description":"Settings pertaining to the matcher deployment.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"scaling":{"description":"Controls the number of replicas and autoscaling for this component.","properties":{"autoScaling":{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"},"maxReplicas":{"description":"The default is: 5.","format":"int32","minimum":1,"type":"integer"},"minReplicas":{"description":"The default is: 2.","format":"int32","minimum":1,"type":"integer"},"replicas":{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","format":"int32","minimum":1,"type":"integer"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"monitoring":{"description":"Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.","properties":{"exposeEndpoint":{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"scannerComponent":{"description":"Can be specified as \"Enabled\" or \"Disabled\".\nIf this field is not specified, the following defaulting takes place:\n* for new installations, Scanner V4 is enabled starting with ACS 4.8;\n* for upgrades to 4.8 from previous releases, Scanner V4 is disabled.","enum":["Default","Enabled","Disabled"],"type":"string"}},"type":"object"},"tls":{"description":"Settings related to Transport Layer Security, such as Certificate Authorities.","properties":{"additionalCAs":{"description":"Allows you to specify additional trusted Root CAs.","items":{"description":"AdditionalCA defines a certificate for an additional Certificate Authority.","properties":{"content":{"description":"PEM format","type":"string"},"name":{"description":"Must be a valid file basename","type":"string"}},"required":["content","name"],"type":"object"},"type":"array"}},"type":"object"}},"type":"object"},"status":{"description":"CentralStatus defines the observed state of Central.","properties":{"central":{"description":"CentralComponentStatus describes status specific to the central component.","properties":{"adminPassword":{"description":"AdminPassword stores information related to the auto-generated admin password.","properties":{"adminPasswordSecretReference":{"description":"AdminPasswordSecretReference contains reference for the admin password","type":"string"},"info":{"description":"Info stores information on how to obtain the admin password.","type":"string"}},"type":"object"}},"type":"object"},"conditions":{"items":{"description":"StackRoxCondition defines a condition for a StackRox custom resource.","properties":{"lastTransitionTime":{"format":"date-time","type":"string"},"message":{"type":"string"},"reason":{"description":"ConditionReason is a type of values of condition reason.","type":"string"},"status":{"description":"ConditionStatus is a type of values of condition status.","type":"string"},"type":{"description":"ConditionType is a type of values of condition type.","type":"string"}},"required":["status","type"],"type":"object"},"type":"array"},"deployedRelease":{"description":"StackRoxRelease describes the Helm \"release\" that was most recently applied.","properties":{"version":{"type":"string"}},"type":"object"},"productVersion":{"description":"The deployed version of the product.","type":"string"}},"required":["conditions"],"type":"object"}},"type":"object"}},"served":true,"storage":true,"subresources":{"status":{}}}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":null,"storedVersions":null}}" + } + }, + { + "type": "olm.bundle.object", + "value": { + "data": "{"apiVersion":"apiextensions.k8s.io/v1","kind":"CustomResourceDefinition","metadata":{"annotations":{"controller-gen.kubebuilder.io/version":"v0.19.0"},"creationTimestamp":null,"name":"securedclusters.platform.stackrox.io"},"spec":{"group":"platform.stackrox.io","names":{"kind":"SecuredCluster","listKind":"SecuredClusterList","plural":"securedclusters","singular":"securedcluster"},"scope":"Namespaced","versions":[{"name":"v1alpha1","schema":{"openAPIV3Schema":{"description":"SecuredCluster is the configuration template for the secured cluster services. These include Sensor, which is\nresponsible for the connection to Central, and Collector, which performs host-level collection of process and\nnetwork events.\u003cp\u003e\n**Important:** Please see the _Installation Prerequisites_ on the main RHACS operator page before deploying, or\nconsult the RHACS documentation on creating cluster init bundles.","properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"SecuredClusterSpec defines the desired configuration state of a secured cluster.","properties":{"admissionControl":{"description":"Settings for the Admission Control component, which is necessary for preventive policy enforcement,\nand for Kubernetes event monitoring.","properties":{"bypass":{"description":"Enables teams to bypass admission control in a monitored manner in the event of an emergency.\nThe default is: BreakGlassAnnotation.","enum":["BreakGlassAnnotation","Disabled"],"type":"string"},"contactImageScanners":{"description":"Deprecated field. This field will be removed in a future release.","enum":["ScanIfMissing","DoNotScanInline"],"type":"string"},"enforcement":{"description":"Set to Disabled to disable policy enforcement for the admission controller. This is not recommended.\nOn new deployments starting with version 4.9, defaults to Enabled.\nOn old deployments, defaults to Enabled if at least one of listenOnCreates or listenOnUpdates is true.","enum":["Enabled","Disabled"],"type":"string"},"failurePolicy":{"description":"If set to \"Fail\", the admission controller's webhooks are configured to fail-closed in case admission controller\nfails to respond in time. A failure policy \"Ignore\" configures the webhooks to fail-open.\nThe default is: Ignore.","enum":["Ignore","Fail"],"type":"string"},"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"listenOnCreates":{"description":"Deprecated field. This field will be removed in a future release.","type":"boolean"},"listenOnEvents":{"description":"Deprecated field. This field will be removed in a future release.","type":"boolean"},"listenOnUpdates":{"description":"Deprecated field. This field will be removed in a future release.","type":"boolean"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"replicas":{"description":"The number of replicas of the admission control pod.\nThe default is: 3.","format":"int32","minimum":1,"type":"integer"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"timeoutSeconds":{"description":"Deprecated field. This field will be removed in a future release.","format":"int32","type":"integer"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"auditLogs":{"description":"Settings relating to the ingestion of Kubernetes audit logs.","properties":{"collection":{"description":"Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only\nsupported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error.\nUse the 'Auto' setting to enable it on compatible environments, and disable it elsewhere.\nThe default is: Auto.","enum":["Auto","Disabled","Enabled"],"type":"string"}},"type":"object"},"centralEndpoint":{"description":"The endpoint of the Red Hat Advanced Cluster Security Central instance to connect to,\nincluding the port number. If no port is specified and the endpoint contains an https://\nprotocol specification, then the port 443 is implicitly assumed.\nIf using a non-gRPC capable load balancer, use the WebSocket protocol by prefixing the endpoint\naddress with wss://.\nNote: when leaving this blank, Sensor will attempt to connect to a Central instance running in the same\nnamespace.","type":"string"},"clusterLabels":{"additionalProperties":{"type":"string"},"description":"Custom labels associated with a secured cluster in Red Hat Advanced Cluster Security.","type":"object"},"clusterName":{"description":"The unique name of this cluster, as it will be shown in the Red Hat Advanced Cluster Security UI.\nNote: Once a name is set here, you will not be able to change it again. You will need to delete\nand re-create this object in order to register a cluster with a new name.","type":"string"},"customize":{"description":"Customizations to apply on all Central Services components.","properties":{"annotations":{"additionalProperties":{"type":"string"},"description":"Custom annotations to set on all managed objects.","type":"object"},"envVars":{"description":"Custom environment variables to set on managed pods' containers.","items":{"description":"EnvVar represents an environment variable present in a Container.","properties":{"name":{"description":"Name of the environment variable.\nMay consist of any printable ASCII characters except '='.","type":"string"},"value":{"description":"Variable references $(VAR_NAME) are expanded\nusing the previously defined environment variables in the container and\nany service environment variables. If a variable cannot be resolved,\nthe reference in the input string will be unchanged. Double $$ are reduced\nto a single $, which allows for escaping the $(VAR_NAME) syntax: i.e.\n\"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\".\nEscaped references will never be expanded, regardless of whether the variable\nexists or not.\nDefaults to \"\".","type":"string"},"valueFrom":{"description":"Source for the environment variable's value. Cannot be used if value is not empty.","properties":{"configMapKeyRef":{"description":"Selects a key of a ConfigMap.","properties":{"key":{"description":"The key to select.","type":"string"},"name":{"default":"","description":"Name of the referent.\nThis field is effectively required, but due to backwards compatibility is\nallowed to be empty. Instances of this type with an empty value here are\nalmost certainly wrong.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"optional":{"description":"Specify whether the ConfigMap or its key must be defined","type":"boolean"}},"required":["key"],"type":"object","x-kubernetes-map-type":"atomic"},"fieldRef":{"description":"Selects a field of the pod: supports metadata.name, metadata.namespace, `metadata.labels['\u003cKEY\u003e']`, `metadata.annotations['\u003cKEY\u003e']`,\nspec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs.","properties":{"apiVersion":{"description":"Version of the schema the FieldPath is written in terms of, defaults to \"v1\".","type":"string"},"fieldPath":{"description":"Path of the field to select in the specified API version.","type":"string"}},"required":["fieldPath"],"type":"object","x-kubernetes-map-type":"atomic"},"fileKeyRef":{"description":"FileKeyRef selects a key of the env file.\nRequires the EnvFiles feature gate to be enabled.","properties":{"key":{"description":"The key within the env file. An invalid key will prevent the pod from starting.\nThe keys defined within a source may consist of any printable ASCII characters except '='.\nDuring Alpha stage of the EnvFiles feature gate, the key size is limited to 128 characters.","type":"string"},"optional":{"default":false,"description":"Specify whether the file or its key must be defined. If the file or key\ndoes not exist, then the env var is not published.\nIf optional is set to true and the specified key does not exist,\nthe environment variable will not be set in the Pod's containers.\n\nIf optional is set to false and the specified key does not exist,\nan error will be returned during Pod creation.","type":"boolean"},"path":{"description":"The path within the volume from which to select the file.\nMust be relative and may not contain the '..' path or start with '..'.","type":"string"},"volumeName":{"description":"The name of the volume mount containing the env file.","type":"string"}},"required":["key","path","volumeName"],"type":"object","x-kubernetes-map-type":"atomic"},"resourceFieldRef":{"description":"Selects a resource of the container: only resources limits and requests\n(limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.","properties":{"containerName":{"description":"Container name: required for volumes, optional for env vars","type":"string"},"divisor":{"anyOf":[{"type":"integer"},{"type":"string"}],"description":"Specifies the output format of the exposed resources, defaults to \"1\"","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"resource":{"description":"Required: resource to select","type":"string"}},"required":["resource"],"type":"object","x-kubernetes-map-type":"atomic"},"secretKeyRef":{"description":"Selects a key of a secret in the pod's namespace","properties":{"key":{"description":"The key of the secret to select from.  Must be a valid secret key.","type":"string"},"name":{"default":"","description":"Name of the referent.\nThis field is effectively required, but due to backwards compatibility is\nallowed to be empty. Instances of this type with an empty value here are\nalmost certainly wrong.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"optional":{"description":"Specify whether the Secret or its key must be defined","type":"boolean"}},"required":["key"],"type":"object","x-kubernetes-map-type":"atomic"}},"type":"object"}},"required":["name"],"type":"object"},"type":"array"},"labels":{"additionalProperties":{"type":"string"},"description":"Custom labels to set on all managed objects.","type":"object"}},"type":"object"},"imagePullSecrets":{"description":"Additional image pull secrets to be taken into account for pulling images.","items":{"description":"LocalSecretReference is a reference to a secret within the same namespace.","properties":{"name":{"description":"The name of the referenced secret.","type":"string"}},"required":["name"],"type":"object"},"type":"array"},"misc":{"description":"Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.","properties":{"createSCCs":{"description":"Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.","type":"boolean"}},"type":"object"},"monitoring":{"description":"Monitoring configuration.","properties":{"openshift":{"description":"OpenShiftMonitoring defines settings related to OpenShift Monitoring","properties":{"enabled":{"description":"The default is: true.","type":"boolean"}},"required":["enabled"],"type":"object"}},"type":"object"},"network":{"description":"Network configuration.","properties":{"policies":{"description":"To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"overlays":{"description":"Overlays","items":{"description":"K8sObjectOverlay is an overlay that applies a set of patches to a resource.\nIt targets a resource by its API version, kind, and name, and applies\na list of patches to this resource.\n\n# Examples\n\n## Adding an annotation to a resource\n\n\tapiVersion: v1\n\tkind: ServiceAccount\n\tname: central\n\tpatches:\n\t- path: metadata.annotations.eks\\.amazonaws\\.com/role-arn\n\t  value: \"\\\"arn:aws:iam:1234:role\\\"\"\n\n## Adding an environment variable to a deployment\n\n\tapiVersion: apps/v1\n\tkind: Deployment\n\tname: central\n\tpatches:\n\t- path: spec.template.spec.containers[name:central].env[-1]\n\t  value: |\n\t    name: MY_ENV_VAR\n\t    value: value\n\n## Adding an ingress to a network policy\n\n\tapiVersion: networking.k8s.io/v1\n\tkind: NetworkPolicy\n\tname: allow-ext-to-central\n\tpatches:\n\t- path: spec.ingress[-1]\n\t  value: |\n\t    ports:\n\t    - port: 999\n\t      protocol: TCP\n\n## Changing the value of a configMap\n\n\tapiVersion: v1\n\tkind: ConfigMap\n\tname: central-endpoints\n\tpatches:\n\t- path: data.endpoints\\.yaml:\n\t  verbatim: |\n\t    disableDefault: false\n\n## Adding a container to a deployment\n\n\tapiVersion: apps/v1\n\tkind: Deployment\n\tname: central\n\tpatches:\n\t  - path: spec.template.spec.containers[-1]\n\t    value: |\n\t      name: nginx\n\t      image: nginx\n\t      ports:\n\t      - containerPort: 8000\n\t        name: http\n\t        protocol: TCP","properties":{"apiVersion":{"description":"Resource API version.","type":"string"},"kind":{"description":"Resource kind.","type":"string"},"name":{"description":"Name of resource.","type":"string"},"optional":{"description":"Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown.","type":"boolean"},"patches":{"description":"List of patches to apply to resource.","items":{"description":"K8sObjectOverlayPatch defines a patch to apply to a resource.","properties":{"path":{"description":"Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist.","type":"string"},"value":{"description":"Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema.","type":"string"},"verbatim":{"description":"Verbatim value to add, delete or replace.\nSame as Value, however the content is not interpreted as YAML, but treated as literal string instead.\nAt least one of Value and Verbatim must be empty.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"type":"array"},"perNode":{"description":"Settings for the components running on each node in the cluster (Collector and Compliance).","properties":{"collector":{"description":"Settings for the Collector container, which is responsible for collecting process and networking\nactivity at the host level.","properties":{"collection":{"description":"The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in these section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.\nThe default is: CORE_BPF.","enum":["EBPF","CORE_BPF","NoCollection","KernelModule"],"type":"string"},"forceCollection":{"description":"Obsolete field. This field will be removed in a future release.","type":"boolean"},"imageFlavor":{"description":"Obsolete field.","enum":["Regular","Slim"],"type":"string"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"}},"type":"object"},"compliance":{"description":"Settings for the Compliance container, which is responsible for checking host-level configurations.","properties":{"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"}},"type":"object"},"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeInventory":{"description":"Settings for the Node-Inventory container, which is responsible for scanning the Nodes' filesystem.","properties":{"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"}},"type":"object"},"taintToleration":{"description":"To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security\nwill run services on every node in the cluster, including tainted nodes by default. If you do\nnot want this behavior, please select 'AvoidTaints' here.\nThe default is: TolerateTaints.","enum":["TolerateTaints","AvoidTaints"],"type":"string"}},"type":"object"},"processBaselines":{"description":"Settings relating to process baselines.","properties":{"autoLock":{"description":"Should process baselines be automatically locked when the observation period (1 hour by default) ends.\nThe default is: Disabled.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"registryOverride":{"description":"Set this parameter to override the default registry in images. For example, nginx:latest -\u003e \u003cregistry override\u003e/library/nginx:latest","type":"string"},"scanner":{"description":"Settings for the Scanner component, which is responsible for vulnerability scanning of container\nimages stored in a cluster-local image repository.","properties":{"analyzer":{"description":"Settings pertaining to the analyzer deployment, such as for autoscaling.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"scaling":{"description":"Controls the number of analyzer replicas and autoscaling.","properties":{"autoScaling":{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"},"maxReplicas":{"description":"The default is: 5.","format":"int32","minimum":1,"type":"integer"},"minReplicas":{"description":"The default is: 2.","format":"int32","minimum":1,"type":"integer"},"replicas":{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","format":"int32","minimum":1,"type":"integer"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"db":{"description":"Settings pertaining to the database used by the Red Hat Advanced Cluster Security Scanner.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"scannerComponent":{"description":"If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended).\nIf you do so, all the settings in this section will have no effect.\nThe default is: AutoSense.","enum":["AutoSense","Disabled"],"type":"string"}},"type":"object"},"scannerV4":{"description":"Settings for the Scanner V4 components, which can run in addition to the previously existing Scanner components","properties":{"db":{"description":"Settings pertaining to the DB deployment.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"persistence":{"description":"Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass.","properties":{"hostPath":{"description":"Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view).","properties":{"path":{"description":"The path on the host running Central.","type":"string"}},"type":"object"},"persistentVolumeClaim":{"description":"Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users.","properties":{"claimName":{"description":"The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db.","type":"string"},"size":{"description":"The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","type":"string"},"storageClassName":{"description":"The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.","type":"string"}},"type":"object"}},"type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"indexer":{"description":"Settings pertaining to the indexer deployment.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"scaling":{"description":"Controls the number of replicas and autoscaling for this component.","properties":{"autoScaling":{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","enum":["Enabled","Disabled"],"type":"string"},"maxReplicas":{"description":"The default is: 5.","format":"int32","minimum":1,"type":"integer"},"minReplicas":{"description":"The default is: 2.","format":"int32","minimum":1,"type":"integer"},"replicas":{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","format":"int32","minimum":1,"type":"integer"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"monitoring":{"description":"Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.","properties":{"exposeEndpoint":{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","enum":["Enabled","Disabled"],"type":"string"}},"type":"object"},"scannerComponent":{"description":"If you want to enable the Scanner V4 component set this to \"AutoSense\"\nIf this field is not specified or set to \"Default\", the following defaulting takes place:\n* for new installations, Scanner V4 is enabled starting with ACS 4.8;\n* for upgrades to 4.8 from previous releases, Scanner V4 is disabled.","enum":["Default","AutoSense","Disabled"],"type":"string"}},"type":"object"},"sensor":{"description":"Settings for the Sensor component.","properties":{"hostAliases":{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","items":{"description":"HostAlias holds the mapping between IP and hostnames that will be injected as an entry in the\npod's hosts file.","properties":{"hostnames":{"description":"Hostnames for the above IP address.","items":{"type":"string"},"type":"array","x-kubernetes-list-type":"atomic"},"ip":{"description":"IP address of the host file entry.","type":"string"}},"required":["ip"],"type":"object"},"type":"array"},"nodeSelector":{"additionalProperties":{"type":"string"},"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","type":"object"},"resources":{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","properties":{"claims":{"description":"Claims lists the names of resources, defined in spec.resourceClaims,\nthat are used by this container.\n\nThis field depends on the\nDynamicResourceAllocation feature gate.\n\nThis field is immutable. It can only be set for containers.","items":{"description":"ResourceClaim references one entry in PodSpec.ResourceClaims.","properties":{"name":{"description":"Name must match the name of one entry in pod.spec.resourceClaims of\nthe Pod where this field is used. It makes that resource available\ninside a container.","type":"string"},"request":{"description":"Request is the name chosen for a request in the referenced claim.\nIf empty, everything from the claim is made available, otherwise\nonly the result of this request.","type":"string"}},"required":["name"],"type":"object"},"type":"array","x-kubernetes-list-map-keys":["name"],"x-kubernetes-list-type":"map"},"limits":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Limits describes the maximum amount of compute resources allowed.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"},"requests":{"additionalProperties":{"anyOf":[{"type":"integer"},{"type":"string"}],"pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"description":"Requests describes the minimum amount of compute resources required.\nIf Requests is omitted for a container, it defaults to Limits if that is explicitly specified,\notherwise to an implementation-defined value. Requests cannot exceed Limits.\nMore info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/","type":"object"}},"type":"object"},"tolerations":{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","items":{"description":"The pod this Toleration is attached to tolerates any taint that matches\nthe triple \u003ckey,value,effect\u003e using the matching operator \u003coperator\u003e.","properties":{"effect":{"description":"Effect indicates the taint effect to match. Empty means match all taint effects.\nWhen specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.","type":"string"},"key":{"description":"Key is the taint key that the toleration applies to. Empty means match all taint keys.\nIf the key is empty, operator must be Exists; this combination means to match all values and all keys.","type":"string"},"operator":{"description":"Operator represents a key's relationship to the value.\nValid operators are Exists and Equal. Defaults to Equal.\nExists is equivalent to wildcard for value, so that a pod can\ntolerate all taints of a particular category.","type":"string"},"tolerationSeconds":{"description":"TolerationSeconds represents the period of time the toleration (which must be\nof effect NoExecute, otherwise this field is ignored) tolerates the taint. By default,\nit is not set, which means tolerate the taint forever (do not evict). Zero and\nnegative values will be treated as 0 (evict immediately) by the system.","format":"int64","type":"integer"},"value":{"description":"Value is the taint value the toleration matches to.\nIf the operator is Exists, the value should be empty, otherwise just a regular string.","type":"string"}},"type":"object"},"type":"array"}},"type":"object"},"tls":{"description":"Settings related to Transport Layer Security, such as Certificate Authorities.","properties":{"additionalCAs":{"description":"Allows you to specify additional trusted Root CAs.","items":{"description":"AdditionalCA defines a certificate for an additional Certificate Authority.","properties":{"content":{"description":"PEM format","type":"string"},"name":{"description":"Must be a valid file basename","type":"string"}},"required":["content","name"],"type":"object"},"type":"array"}},"type":"object"}},"required":["clusterName"],"type":"object"},"status":{"description":"SecuredClusterStatus defines the observed state of SecuredCluster","properties":{"clusterName":{"description":"The assigned cluster name per the spec. This cannot be changed afterwards. If you need to change the\ncluster name, please delete and recreate this resource.","type":"string"},"conditions":{"items":{"description":"StackRoxCondition defines a condition for a StackRox custom resource.","properties":{"lastTransitionTime":{"format":"date-time","type":"string"},"message":{"type":"string"},"reason":{"description":"ConditionReason is a type of values of condition reason.","type":"string"},"status":{"description":"ConditionStatus is a type of values of condition status.","type":"string"},"type":{"description":"ConditionType is a type of values of condition type.","type":"string"}},"required":["status","type"],"type":"object"},"type":"array"},"deployedRelease":{"description":"StackRoxRelease describes the Helm \"release\" that was most recently applied.","properties":{"version":{"type":"string"}},"type":"object"},"productVersion":{"description":"The deployed version of the product.","type":"string"}},"required":["conditions"],"type":"object"}},"type":"object"}},"served":true,"storage":true,"subresources":{"status":{}}}]},"status":{"acceptedNames":{"kind":"","plural":""},"conditions":null,"storedVersions":null}}" + } + }, + { + "type": "olm.bundle.object", + "value": { + "data": "{"apiVersion":"apiextensions.k8s.io/v1","kind":"CustomResourceDefinition","metadata":{"annotations":{"controller-gen.kubebuilder.io/version":"v0.19.0"},"name":"securitypolicies.config.stackrox.io"},"spec":{"group":"config.stackrox.io","names":{"kind":"SecurityPolicy","listKind":"SecurityPolicyList","plural":"securitypolicies","shortNames":["sp"],"singular":"securitypolicy"},"scope":"Namespaced","versions":[{"name":"v1alpha1","schema":{"openAPIV3Schema":{"description":"SecurityPolicy is the Schema for the policies API","properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"SecurityPolicySpec defines the desired state of SecurityPolicy","properties":{"categories":{"description":"Categories is a list of categories that this policy falls under.  Category names must already exist in Central.","items":{"type":"string"},"minItems":1,"type":"array"},"criteriaLocked":{"description":"CriteriaLocked is unused and deprecated","type":"boolean"},"description":{"description":"Description is a free-form text description of this policy.","pattern":"^[^\\$]{0,800}$","type":"string"},"disabled":{"description":"Disabled toggles whether or not this policy will be executing and actively firing alerts.","type":"boolean"},"enforcementActions":{"description":"Enforcement lists the enforcement actions to take when a violation from this policy is identified.  Possible value are UNSET_ENFORCEMENT, SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, and. FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT.","items":{"enum":["UNSET_ENFORCEMENT","SCALE_TO_ZERO_ENFORCEMENT","UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT","KILL_POD_ENFORCEMENT","FAIL_BUILD_ENFORCEMENT","FAIL_KUBE_REQUEST_ENFORCEMENT","FAIL_DEPLOYMENT_CREATE_ENFORCEMENT","FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT"],"type":"string"},"type":"array"},"eventSource":{"description":"EventSource describes which events should trigger execution of this policy","enum":["NOT_APPLICABLE","DEPLOYMENT_EVENT","AUDIT_LOG_EVENT"],"type":"string"},"exclusions":{"description":"Exclusions define deployments or images that should be excluded from this policy.","items":{"properties":{"deployment":{"properties":{"name":{"type":"string"},"scope":{"properties":{"cluster":{"description":"Cluster is either the name or the ID of the cluster that this scope applies to","type":"string"},"label":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"namespace":{"type":"string"}},"type":"object"}},"type":"object"},"expiration":{"format":"date-time","type":"string"},"image":{"properties":{"name":{"type":"string"}},"type":"object"},"name":{"type":"string"}},"type":"object"},"type":"array"},"isDefault":{"description":"IsDefault is unused","type":"boolean"},"lifecycleStages":{"description":"LifecycleStages describes which policy lifecylce stages this policy applies to.  Choices are DEPLOY, BUILD, and RUNTIME.","items":{"enum":["DEPLOY","BUILD","RUNTIME"],"type":"string"},"minItems":1,"type":"array"},"mitreAttackVectors":{"items":{"properties":{"tactic":{"type":"string"},"techniques":{"items":{"type":"string"},"type":"array"}},"type":"object"},"type":"array"},"mitreVectorsLocked":{"description":"MitreVetorsLocked is unused and deprecated","type":"boolean"},"notifiers":{"description":"Notifiers is a list of IDs or names of the notifiers that should be triggered when a violation from this policy is identified.  IDs should be in the form of a UUID and are found through the Central API.","items":{"type":"string"},"type":"array"},"policyName":{"description":"PolicyName is the name of the policy as it appears in the API and UI.  Note that changing this value will rename the policy as stored in the database.  This field must be unique.","pattern":"^[^\\n\\r\\$]{5,128}$","type":"string"},"policySections":{"description":"PolicySections define the violation criteria for this policy.","items":{"properties":{"policyGroups":{"description":"PolicyGroups is the set of policies groups that make up this section.  Each group can be considered an individual criterion.","items":{"properties":{"booleanOperator":{"description":"BooleanOperator determines if the values are combined with an OR or an AND.  Defaults to OR.","enum":["OR","AND"],"type":"string"},"fieldName":{"description":"FieldName defines which field on a deployment or image this PolicyGroup evaluates.  See https://docs.openshift.com/acs/operating/manage-security-policies.html#policy-criteria_manage-security-policies for a complete list of possible values.","type":"string"},"negate":{"description":"Negate determines if the evaluation of this PolicyGroup is negated.  Default to false.","type":"boolean"},"values":{"description":"Values is the list of values for the specified field","items":{"properties":{"value":{"description":"Value is simply the string value","type":"string"}},"type":"object"},"type":"array"}},"required":["fieldName"],"type":"object"},"type":"array"},"sectionName":{"description":"SectionName is a user-friendly name for this section of policies","type":"string"}},"required":["policyGroups"],"type":"object"},"minItems":1,"type":"array"},"rationale":{"type":"string"},"remediation":{"description":"Remediation describes how to remediate a violation of this policy.","type":"string"},"scope":{"description":"Scope defines clusters, namespaces, and deployments that should be included in this policy.  No scopes defined includes everything.","items":{"properties":{"cluster":{"description":"Cluster is either the name or the ID of the cluster that this scope applies to","type":"string"},"label":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"namespace":{"type":"string"}},"type":"object"},"type":"array"},"severity":{"description":"Severity defines how severe a violation from this policy is.  Possible values are UNSET_SEVERITY, LOW_SEVERITY, MEDIUM_SEVERITY, HIGH_SEVERITY, and CRITICAL_SEVERITY.","enum":["UNSET_SEVERITY","LOW_SEVERITY","MEDIUM_SEVERITY","HIGH_SEVERITY","CRITICAL_SEVERITY"],"type":"string"}},"required":["categories","lifecycleStages","policyName","policySections","severity"],"type":"object"},"status":{"properties":{"accepted":{"description":"Accepted is deprecated in favor of conditions","type":"boolean"},"conditions":{"items":{"description":"SecurityPolicyCondition defines the observed state of SecurityPolicy","properties":{"lastTransitionTime":{"format":"date-time","type":"string"},"message":{"type":"string"},"status":{"type":"string"},"type":{"type":"string"}},"type":"object"},"type":"array"},"message":{"description":"Message is deprecated in favor of conditions","type":"string"},"policyId":{"type":"string"}},"type":"object"}},"type":"object"}},"served":true,"storage":true,"subresources":{"status":{}}}]}}" + } + }, + { + "type": "olm.bundle.object", + "value": { + "data": "{"apiVersion":"operators.coreos.com/v1alpha1","kind":"ClusterServiceVersion","metadata":{"annotations":{"alm-examples":"[\n  {\n    \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n    \"kind\": \"Central\",\n    \"metadata\": {\n      \"name\": \"stackrox-central-services\",\n      \"namespace\": \"stackrox\"\n    },\n    \"spec\": {\n      \"central\": {\n        \"exposure\": {\n          \"route\": {\n            \"enabled\": true\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n    \"kind\": \"SecuredCluster\",\n    \"metadata\": {\n      \"name\": \"stackrox-secured-cluster-services\",\n      \"namespace\": \"stackrox\"\n    },\n    \"spec\": {\n      \"clusterName\": \"my-cluster\"\n    }\n  }\n]","capabilities":"Seamless Upgrades","categories":"Security","containerImage":"registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:8796efaba046b9a20c223ae285a635f6a84af809a321869947ba476b98ba5fc1","createdAt":"2026-03-04T10:59:02.184496+00:00","description":"Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.","features.operators.openshift.io/cnf":"false","features.operators.openshift.io/cni":"false","features.operators.openshift.io/csi":"false","features.operators.openshift.io/disconnected":"true","features.operators.openshift.io/fips-compliant":"true","features.operators.openshift.io/proxy-aware":"true","features.operators.openshift.io/tls-profiles":"false","features.operators.openshift.io/token-auth-aws":"false","features.operators.openshift.io/token-auth-azure":"false","features.operators.openshift.io/token-auth-gcp":"false","olm.skipRange":"\u003e= 4.8.0 \u003c 4.9.4-rc.2","operatorframework.io/suggested-namespace":"rhacs-operator","operators.openshift.io/infrastructure-features":"[\"disconnected\", \"proxy-aware\"]","operators.openshift.io/valid-subscription":"[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]","operators.operatorframework.io/builder":"operator-sdk-unknown","operators.operatorframework.io/project_layout":"go.kubebuilder.io/v4","support":"Red Hat"},"labels":{"operatorframework.io/arch.amd64":"supported","operatorframework.io/arch.arm64":"supported","operatorframework.io/arch.ppc64le":"supported","operatorframework.io/arch.s390x":"supported"},"name":"rhacs-operator.v4.9.4-rc.2","namespace":"placeholder"},"spec":{"apiservicedefinitions":{},"customresourcedefinitions":{"owned":[{"description":"Central is the configuration template for the central services. This includes the API server, persistent storage,\nand the web UI, as well as the image scanner.","displayName":"Central","kind":"Central","name":"centrals.platform.stackrox.io","resources":[{"kind":"Deployment","name":"","version":"v1"},{"kind":"Route","name":"","version":"v1"},{"kind":"Secret","name":"","version":"v1"},{"kind":"Service","name":"","version":"v1"}],"specDescriptors":[{"description":"Settings for the Central component, which is responsible for all user interaction.","displayName":"Central Component Settings","path":"central"},{"description":"Settings for the Scanner component, which is responsible for vulnerability scanning of container\nimages.","displayName":"Scanner Component Settings","path":"scanner"},{"description":"Settings for the Scanner V4 component, which can run in addition to the previously existing Scanner components","displayName":"Scanner V4 Component Settings","path":"scannerV4"},{"description":"Settings related to outgoing network traffic.","displayName":"Egress","path":"egress"},{"description":"Settings related to Transport Layer Security, such as Certificate Authorities.","displayName":"TLS","path":"tls"},{"description":"Additional image pull secrets to be taken into account for pulling images.","displayName":"Image Pull Secrets","path":"imagePullSecrets","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Customizations to apply on all Central Services components.","displayName":"Customizations","path":"customize","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Overlays","displayName":"Overlays","path":"overlays","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Monitoring configuration.","displayName":"Monitoring","path":"monitoring","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Network configuration.","displayName":"Network","path":"network","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Config-as-Code configuration.","displayName":"Config-as-Code","path":"configAsCode","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.","displayName":"Miscellaneous","path":"misc","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Specify a secret that contains the administrator password in the \"password\" data item.\nIf omitted, the operator will auto-generate a password and store it in the \"password\" item\nin the \"central-htpasswd\" secret.","displayName":"Administrator Password","path":"central.adminPasswordSecret"},{"description":"Here you can configure if you want to expose central through a node port, a load balancer, or an OpenShift\nroute.","displayName":"Exposure","path":"central.exposure"},{"description":"By default, Central will only serve an internal TLS certificate, which means that you will\nneed to handle TLS termination at the ingress or load balancer level.\nIf you want to terminate TLS in Central and serve a custom server certificate, you can specify\na secret containing the certificate and private key here.","displayName":"User-facing TLS certificate secret","path":"central.defaultTLSSecret"},{"description":"Configures monitoring endpoint for Central. The monitoring endpoint\nallows other services to collect metrics from Central, provided in\nPrometheus compatible format.","displayName":"Monitoring","path":"central.monitoring"},{"description":"Settings for Central DB, which is responsible for data persistence.","displayName":"Central DB Settings","path":"central.db"},{"description":"Configures telemetry settings for Central. If enabled, Central transmits telemetry and diagnostic\ndata to a remote storage backend.","displayName":"Telemetry","path":"central.telemetry","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Configures resources within Central in a declarative manner.","displayName":"Declarative Configuration","path":"central.declarativeConfiguration","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Configures the encryption of notifier secrets stored in the Central DB.","displayName":"Notifier Secrets Encryption","path":"central.notifierSecretsEncryption","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"central.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"central.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"central.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"central.hostAliases"},{"description":"Disable admin password generation. Do not use this for first-time installations,\nas you will have no way to perform initial setup and configuration of alternative authentication methods.","displayName":"Admin Password Generation Disabled","path":"central.adminPasswordGenerationDisabled","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Unused field. This field exists solely for backward compatibility starting from version v4.6.0.","displayName":"Persistence","path":"central.persistence","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"The name of the referenced secret.","displayName":"Name","path":"central.adminPasswordSecret.name","x-descriptors":["urn:alm:descriptor:io.kubernetes:Secret"]},{"description":"Specify a secret that contains the password in the \"password\" data item. This can only be used when\nspecifying a connection string manually.\nWhen omitted, the operator will auto-generate a DB password and store it in the \"password\" item\nin the \"central-db-password\" secret.","displayName":"Administrator Password","path":"central.db.passwordSecret"},{"description":"Specify a connection string that corresponds to a database managed elsewhere. If set, the operator will not manage the Central DB.\nWhen using this option, you must explicitly set a password secret; automatically generating a password will not\nbe supported.","displayName":"Connection String","path":"central.db.connectionString"},{"description":"Configures how Central DB should store its persistent data. You can choose between using a persistent\nvolume claim (recommended default), and a host path.","displayName":"Persistence","path":"central.db.persistence"},{"description":"Config map containing postgresql.conf and pg_hba.conf that will be used if modifications need to be applied.","displayName":"Config map that will override postgresql.conf and pg_hba.conf","path":"central.db.configOverride"},{"description":"Configures the database connection pool size.","displayName":"Database Connection Pool Size Settings","path":"central.db.connectionPoolSize"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"central.db.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"central.db.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"central.db.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"central.db.hostAliases"},{"description":"Obsolete field.\nThis field will be removed in a future release.","displayName":"Is Enabled","path":"central.db.isEnabled","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"The name of the referenced config map.","displayName":"Name","path":"central.db.configOverride.name","x-descriptors":["urn:alm:descriptor:io.kubernetes:ConfigMap"]},{"description":"Maximum number of connections in the connection pool.\nThe default is: 90.","displayName":"Maximum Connections","path":"central.db.connectionPoolSize.maxConnections"},{"description":"Minimum number of connections in the connection pool.\nThe default is: 10.","displayName":"Minimum Connections","path":"central.db.connectionPoolSize.minConnections"},{"description":"The name of the referenced secret.","displayName":"Name","path":"central.db.passwordSecret.name","x-descriptors":["urn:alm:descriptor:io.kubernetes:Secret"]},{"description":"Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users.","displayName":"Persistent volume claim","path":"central.db.persistence.persistentVolumeClaim"},{"description":"Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view).","displayName":"Host path","path":"central.db.persistence.hostPath"},{"description":"The path on the host running Central.","displayName":"Path","path":"central.db.persistence.hostPath.path"},{"description":"The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: central-db.","displayName":"Claim Name","path":"central.db.persistence.persistentVolumeClaim.claimName"},{"description":"The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).","displayName":"Size","path":"central.db.persistence.persistentVolumeClaim.size","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:text"]},{"description":"The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.","displayName":"Storage Class","path":"central.db.persistence.persistentVolumeClaim.storageClassName","x-descriptors":["urn:alm:descriptor:io.kubernetes:StorageClass"]},{"description":"List of config maps containing declarative configuration.","displayName":"Config maps containing declarative configuration","path":"central.declarativeConfiguration.configMaps"},{"description":"List of secrets containing declarative configuration.","displayName":"Secrets containing declarative configuration","path":"central.declarativeConfiguration.secrets"},{"description":"The name of the referenced config map.","displayName":"Name","path":"central.declarativeConfiguration.configMaps[0].name","x-descriptors":["urn:alm:descriptor:io.kubernetes:ConfigMap"]},{"description":"The name of the referenced secret.","displayName":"Name","path":"central.declarativeConfiguration.secrets[0].name","x-descriptors":["urn:alm:descriptor:io.kubernetes:Secret"]},{"description":"The name of the referenced secret.","displayName":"Name","path":"central.defaultTLSSecret.name","x-descriptors":["urn:alm:descriptor:io.kubernetes:Secret"]},{"description":"Expose Central through an OpenShift route.","displayName":"Route","path":"central.exposure.route"},{"description":"Expose Central through a load balancer service.","displayName":"Load Balancer","path":"central.exposure.loadBalancer"},{"description":"Expose Central through a node port.","displayName":"Node Port","path":"central.exposure.nodePort"},{"description":"The default is: false.","displayName":"Enabled","path":"central.exposure.loadBalancer.enabled"},{"description":"The default is: 443.","displayName":"Port","path":"central.exposure.loadBalancer.port","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.exposure.loadBalancer.enabled:true"]},{"description":"If you have a static IP address reserved for your load balancer, you can enter it here.","displayName":"IP","path":"central.exposure.loadBalancer.ip","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.exposure.loadBalancer.enabled:true"]},{"description":"The default is: false.","displayName":"Enabled","path":"central.exposure.nodePort.enabled"},{"description":"Use this to specify an explicit node port. Most users should leave this empty.","displayName":"Port","path":"central.exposure.nodePort.port","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.exposure.nodePort.enabled:true"]},{"description":"Expose Central with a passthrough route.\nThe default is: false.","displayName":"Enabled","path":"central.exposure.route.enabled"},{"description":"Specify a custom hostname for the Central route.\nIf unspecified, an appropriate default value will be automatically chosen by the OpenShift route operator.","displayName":"Host","path":"central.exposure.route.host"},{"description":"Set up a Central route with reencrypt TLS termination.\nFor reencrypt routes, the request is terminated on the OpenShift router with a custom certificate.\nThe request is then reencrypted by the OpenShift router and sent to Central.\n[user] --TLS--\u003e [OpenShift router] --TLS--\u003e [Central]","displayName":"Re-Encrypt Route","path":"central.exposure.route.reencrypt"},{"description":"Expose Central with a reencrypt route.\nShould not be used for sensor communication.\nThe default is: false.","displayName":"Enabled","path":"central.exposure.route.reencrypt.enabled"},{"description":"Specify a custom hostname for the Central reencrypt route.\nIf unspecified, an appropriate default value will be automatically chosen by the OpenShift route operator.","displayName":"Host","path":"central.exposure.route.reencrypt.host"},{"description":"TLS settings for exposing Central via a reencrypt Route.","displayName":"TLS Settings","path":"central.exposure.route.reencrypt.tls"},{"description":"The PEM encoded certificate chain that may be used to establish a complete chain of trust.\nDefaults to the OpenShift certificate authority.","displayName":"CA Certificate","path":"central.exposure.route.reencrypt.tls.caCertificate"},{"description":"The PEM encoded certificate that is served on the route. Must be a single serving\ncertificate instead of a certificate chain.\nDefaults to a certificate signed by the OpenShift certificate authority.","displayName":"Certificate","path":"central.exposure.route.reencrypt.tls.certificate"},{"description":"The CA certificate of the final destination, i.e. of Central.\nUsed by the OpenShift router for health checks on the secure connection.\nDefaults to the Central certificate authority.","displayName":"Destination CA Certificate","path":"central.exposure.route.reencrypt.tls.destinationCACertificate"},{"description":"The PEM encoded private key of the certificate that is served on the route.\nDefaults to a certificate signed by the OpenShift certificate authority.","displayName":"Private Key","path":"central.exposure.route.reencrypt.tls.key"},{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","displayName":"Expose Endpoint","path":"central.monitoring.exposeEndpoint"},{"description":"Enables the encryption of notifier secrets stored in the Central DB.\nThe default is: false.","displayName":"Enabled","path":"central.notifierSecretsEncryption.enabled"},{"description":"Obsolete unused field.","displayName":"Host Path","path":"central.persistence.hostPath","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Obsolete unused field.","displayName":"Persistent Volume Claim","path":"central.persistence.persistentVolumeClaim","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"The path on the host running Central.","displayName":"Path","path":"central.persistence.hostPath.path"},{"description":"Obsolete unused field.","displayName":"Claim Name","path":"central.persistence.persistentVolumeClaim.claimName","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Obsolete unused field.","displayName":"Size","path":"central.persistence.persistentVolumeClaim.size","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Obsolete unused field.","displayName":"Storage Class Name","path":"central.persistence.persistentVolumeClaim.storageClassName","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Specifies if Telemetry is enabled.\nThe default is: true.","displayName":"Enabled","path":"central.telemetry.enabled","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:booleanSwitch"]},{"description":"Defines the telemetry storage backend for Central.","displayName":"Storage","path":"central.telemetry.storage","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.telemetry.enabled:true"]},{"description":"Storage API endpoint.","displayName":"Endpoint","path":"central.telemetry.storage.endpoint"},{"description":"Storage API key. If not set, telemetry is disabled.","displayName":"Key","path":"central.telemetry.storage.key"},{"description":"If you want to deploy the Config as Code component, set this to \"Enabled\"\nThe default is: Enabled.","displayName":"Config as Code component","path":"configAsCode.configAsCodeComponent"},{"description":"Custom labels to set on all managed objects.","displayName":"Labels","path":"customize.labels"},{"description":"Custom annotations to set on all managed objects.","displayName":"Annotations","path":"customize.annotations"},{"description":"Custom environment variables to set on managed pods' containers.","displayName":"Environment Variables","path":"customize.envVars"},{"description":"Configures whether Red Hat Advanced Cluster Security should run in online or offline (disconnected) mode.\nIn offline mode, automatic updates of vulnerability definitions and kernel modules are disabled.\nThe default is: Online.","displayName":"Connectivity Policy","path":"egress.connectivityPolicy"},{"description":"The name of the referenced secret.","displayName":"Name","path":"imagePullSecrets[0].name","x-descriptors":["urn:alm:descriptor:io.kubernetes:Secret"]},{"description":"Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.","displayName":"Create SecurityContextConstraints for Operand","path":"misc.createSCCs","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"The default is: true.","displayName":"Enabled","path":"monitoring.openshift.enabled","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:booleanSwitch"]},{"description":"To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled.","displayName":"Network Policies","path":"network.policies"},{"description":"Resource API version.","displayName":"API Version","path":"overlays[0].apiVersion"},{"description":"Resource kind.","displayName":"Kind","path":"overlays[0].kind"},{"description":"Name of resource.","displayName":"Name","path":"overlays[0].name"},{"description":"Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown.","displayName":"Optional","path":"overlays[0].optional"},{"description":"List of patches to apply to resource.","displayName":"Patches","path":"overlays[0].patches"},{"description":"Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist.","displayName":"Path","path":"overlays[0].patches[0].path"},{"description":"Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema.","displayName":"Value","path":"overlays[0].patches[0].value"},{"description":"Verbatim value to add, delete or replace.\nSame as Value, however the content is not interpreted as YAML, but treated as literal string instead.\nAt least one of Value and Verbatim must be empty.","displayName":"Verbatim","path":"overlays[0].patches[0].verbatim"},{"description":"If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended). By default, the scanner is enabled.\nIf you do so, all the settings in this section will have no effect.","displayName":"Scanner Component","path":"scanner.scannerComponent"},{"description":"Settings pertaining to the analyzer deployment, such as for autoscaling.","displayName":"Analyzer","path":"scanner.analyzer","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.scannerComponent:Enabled"]},{"description":"Settings pertaining to the database used by the Red Hat Advanced Cluster Security Scanner.","displayName":"DB","path":"scanner.db","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.scannerComponent:Enabled"]},{"description":"Configures monitoring endpoint for Scanner. The monitoring endpoint\nallows other services to collect metrics from Scanner, provided in\nPrometheus compatible format.","displayName":"Monitoring","path":"scanner.monitoring"},{"description":"Controls the number of analyzer replicas and autoscaling.","displayName":"Scaling","path":"scanner.analyzer.scaling"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scanner.analyzer.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scanner.analyzer.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scanner.analyzer.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scanner.analyzer.hostAliases"},{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","displayName":"Autoscaling","path":"scanner.analyzer.scaling.autoScaling"},{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","displayName":"Default Replicas","path":"scanner.analyzer.scaling.replicas"},{"description":"The default is: 2.","displayName":"Autoscaling Minimum Replicas","path":"scanner.analyzer.scaling.minReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled"]},{"description":"The default is: 5.","displayName":"Autoscaling Maximum Replicas","path":"scanner.analyzer.scaling.maxReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled"]},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scanner.db.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scanner.db.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scanner.db.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scanner.db.hostAliases"},{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","displayName":"Expose Endpoint","path":"scanner.monitoring.exposeEndpoint"},{"description":"Can be specified as \"Enabled\" or \"Disabled\".\nIf this field is not specified, the following defaulting takes place:\n* for new installations, Scanner V4 is enabled starting with ACS 4.8;\n* for upgrades to 4.8 from previous releases, Scanner V4 is disabled.","displayName":"Scanner V4 component","path":"scannerV4.scannerComponent"},{"description":"Settings pertaining to the indexer deployment.","displayName":"Indexer","path":"scannerV4.indexer","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled"]},{"description":"Settings pertaining to the matcher deployment.","displayName":"Matcher","path":"scannerV4.matcher","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled"]},{"description":"Settings pertaining to the DB deployment.","displayName":"DB","path":"scannerV4.db","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled"]},{"description":"Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.","displayName":"Monitoring","path":"scannerV4.monitoring","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled"]},{"description":"Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass.","displayName":"Persistence","path":"scannerV4.db.persistence"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scannerV4.db.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scannerV4.db.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scannerV4.db.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scannerV4.db.hostAliases"},{"description":"Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users.","displayName":"Persistent volume claim","path":"scannerV4.db.persistence.persistentVolumeClaim"},{"description":"Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view).","displayName":"Host path","path":"scannerV4.db.persistence.hostPath"},{"description":"The path on the host running Central.","displayName":"Path","path":"scannerV4.db.persistence.hostPath.path"},{"description":"The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db.","displayName":"Claim Name","path":"scannerV4.db.persistence.persistentVolumeClaim.claimName"},{"description":"The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).","displayName":"Size","path":"scannerV4.db.persistence.persistentVolumeClaim.size","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:text"]},{"description":"The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.","displayName":"Storage Class","path":"scannerV4.db.persistence.persistentVolumeClaim.storageClassName","x-descriptors":["urn:alm:descriptor:io.kubernetes:StorageClass"]},{"description":"Controls the number of replicas and autoscaling for this component.","displayName":"Scaling","path":"scannerV4.indexer.scaling"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scannerV4.indexer.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scannerV4.indexer.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scannerV4.indexer.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scannerV4.indexer.hostAliases"},{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","displayName":"Autoscaling","path":"scannerV4.indexer.scaling.autoScaling"},{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","displayName":"Default Replicas","path":"scannerV4.indexer.scaling.replicas"},{"description":"The default is: 2.","displayName":"Autoscaling Minimum Replicas","path":"scannerV4.indexer.scaling.minReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled"]},{"description":"The default is: 5.","displayName":"Autoscaling Maximum Replicas","path":"scannerV4.indexer.scaling.maxReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled"]},{"description":"Controls the number of replicas and autoscaling for this component.","displayName":"Scaling","path":"scannerV4.matcher.scaling"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scannerV4.matcher.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scannerV4.matcher.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scannerV4.matcher.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scannerV4.matcher.hostAliases"},{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","displayName":"Autoscaling","path":"scannerV4.matcher.scaling.autoScaling"},{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","displayName":"Default Replicas","path":"scannerV4.matcher.scaling.replicas"},{"description":"The default is: 2.","displayName":"Autoscaling Minimum Replicas","path":"scannerV4.matcher.scaling.minReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.matcher.scaling.autoScaling:Enabled"]},{"description":"The default is: 5.","displayName":"Autoscaling Maximum Replicas","path":"scannerV4.matcher.scaling.maxReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.matcher.scaling.autoScaling:Enabled"]},{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","displayName":"Expose Endpoint","path":"scannerV4.monitoring.exposeEndpoint"},{"description":"Allows you to specify additional trusted Root CAs.","displayName":"Additional CAs","path":"tls.additionalCAs"}],"statusDescriptors":[{"description":"Info stores information on how to obtain the admin password.","displayName":"Admin Credentials Info","path":"central.adminPassword.info"},{"description":"The deployed version of the product.","displayName":"Product Version","path":"productVersion"},{"displayName":"Central","path":"central"},{"description":"AdminPasswordSecretReference contains reference for the admin password","displayName":"Admin Password Secret Reference","path":"central.adminPassword.adminPasswordSecretReference","x-descriptors":["urn:alm:descriptor:io.kubernetes:Secret"]}],"version":"v1alpha1"},{"description":"SecuredCluster is the configuration template for the secured cluster services. These include Sensor, which is\nresponsible for the connection to Central, and Collector, which performs host-level collection of process and\nnetwork events.\u003cp\u003e\n**Important:** Please see the _Installation Prerequisites_ on the main RHACS operator page before deploying, or\nconsult the RHACS documentation on creating cluster init bundles.","displayName":"Secured Cluster","kind":"SecuredCluster","name":"securedclusters.platform.stackrox.io","resources":[{"kind":"DaemonSet","name":"","version":"v1"},{"kind":"Deployment","name":"","version":"v1"}],"specDescriptors":[{"description":"The unique name of this cluster, as it will be shown in the Red Hat Advanced Cluster Security UI.\nNote: Once a name is set here, you will not be able to change it again. You will need to delete\nand re-create this object in order to register a cluster with a new name.","displayName":"Cluster Name","path":"clusterName"},{"description":"The endpoint of the Red Hat Advanced Cluster Security Central instance to connect to,\nincluding the port number. If no port is specified and the endpoint contains an https://\nprotocol specification, then the port 443 is implicitly assumed.\nIf using a non-gRPC capable load balancer, use the WebSocket protocol by prefixing the endpoint\naddress with wss://.\nNote: when leaving this blank, Sensor will attempt to connect to a Central instance running in the same\nnamespace.","displayName":"Central Endpoint","path":"centralEndpoint"},{"description":"Settings for the Sensor component.","displayName":"Sensor Settings","path":"sensor"},{"description":"Settings for the Admission Control component, which is necessary for preventive policy enforcement,\nand for Kubernetes event monitoring.","displayName":"Admission Control Settings","path":"admissionControl"},{"description":"Settings for the components running on each node in the cluster (Collector and Compliance).","displayName":"Per Node Settings","path":"perNode"},{"description":"Settings relating to the ingestion of Kubernetes audit logs.","displayName":"Kubernetes Audit Logs Ingestion Settings","path":"auditLogs"},{"description":"Settings relating to process baselines.","displayName":"Process Baselines Settings","path":"processBaselines"},{"description":"Settings for the Scanner component, which is responsible for vulnerability scanning of container\nimages stored in a cluster-local image repository.","displayName":"Scanner Component Settings","path":"scanner"},{"description":"Settings for the Scanner V4 components, which can run in addition to the previously existing Scanner components","displayName":"Scanner V4 Component Settings","path":"scannerV4"},{"description":"Settings related to Transport Layer Security, such as Certificate Authorities.","displayName":"TLS","path":"tls"},{"description":"Additional image pull secrets to be taken into account for pulling images.","displayName":"Image Pull Secrets","path":"imagePullSecrets","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Customizations to apply on all Central Services components.","displayName":"Customizations","path":"customize","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Overlays","displayName":"Overlays","path":"overlays","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Monitoring configuration.","displayName":"Monitoring","path":"monitoring","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Set this parameter to override the default registry in images. For example, nginx:latest -\u003e \u003cregistry override\u003e/library/nginx:latest","displayName":"Custom Default Image Registry","path":"registryOverride","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Network configuration.","displayName":"Network","path":"network","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:advanced"]},{"description":"Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.","displayName":"Miscellaneous","path":"misc","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Set to Disabled to disable policy enforcement for the admission controller. This is not recommended.\nOn new deployments starting with version 4.9, defaults to Enabled.\nOn old deployments, defaults to Enabled if at least one of listenOnCreates or listenOnUpdates is true.","displayName":"Enforcement","path":"admissionControl.enforcement"},{"description":"Enables teams to bypass admission control in a monitored manner in the event of an emergency.\nThe default is: BreakGlassAnnotation.","displayName":"Bypass","path":"admissionControl.bypass"},{"description":"If set to \"Fail\", the admission controller's webhooks are configured to fail-closed in case admission controller\nfails to respond in time. A failure policy \"Ignore\" configures the webhooks to fail-open.\nThe default is: Ignore.","displayName":"Failure Policy","path":"admissionControl.failurePolicy"},{"description":"The number of replicas of the admission control pod.\nThe default is: 3.","displayName":"Replicas","path":"admissionControl.replicas"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"admissionControl.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"admissionControl.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"admissionControl.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"admissionControl.hostAliases"},{"description":"Deprecated field. This field will be removed in a future release.","displayName":"Contact Image Scanners","path":"admissionControl.contactImageScanners","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Deprecated field. This field will be removed in a future release.","displayName":"Listen On Creates","path":"admissionControl.listenOnCreates","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Deprecated field. This field will be removed in a future release.","displayName":"Listen On Events","path":"admissionControl.listenOnEvents","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Deprecated field. This field will be removed in a future release.","displayName":"Listen On Updates","path":"admissionControl.listenOnUpdates","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Deprecated field. This field will be removed in a future release.","displayName":"Timeout Seconds","path":"admissionControl.timeoutSeconds","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only\nsupported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error.\nUse the 'Auto' setting to enable it on compatible environments, and disable it elsewhere.\nThe default is: Auto.","displayName":"Collection","path":"auditLogs.collection"},{"description":"Custom labels to set on all managed objects.","displayName":"Labels","path":"customize.labels"},{"description":"Custom annotations to set on all managed objects.","displayName":"Annotations","path":"customize.annotations"},{"description":"Custom environment variables to set on managed pods' containers.","displayName":"Environment Variables","path":"customize.envVars"},{"description":"The name of the referenced secret.","displayName":"Name","path":"imagePullSecrets[0].name","x-descriptors":["urn:alm:descriptor:io.kubernetes:Secret"]},{"description":"Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.","displayName":"Create SecurityContextConstraints for Operand","path":"misc.createSCCs","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"The default is: true.","displayName":"Enabled","path":"monitoring.openshift.enabled","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:booleanSwitch"]},{"description":"To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled.","displayName":"Network Policies","path":"network.policies"},{"description":"Resource API version.","displayName":"API Version","path":"overlays[0].apiVersion"},{"description":"Resource kind.","displayName":"Kind","path":"overlays[0].kind"},{"description":"Name of resource.","displayName":"Name","path":"overlays[0].name"},{"description":"Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown.","displayName":"Optional","path":"overlays[0].optional"},{"description":"List of patches to apply to resource.","displayName":"Patches","path":"overlays[0].patches"},{"description":"Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist.","displayName":"Path","path":"overlays[0].patches[0].path"},{"description":"Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema.","displayName":"Value","path":"overlays[0].patches[0].value"},{"description":"Verbatim value to add, delete or replace.\nSame as Value, however the content is not interpreted as YAML, but treated as literal string instead.\nAt least one of Value and Verbatim must be empty.","displayName":"Verbatim","path":"overlays[0].patches[0].verbatim"},{"description":"Settings for the Collector container, which is responsible for collecting process and networking\nactivity at the host level.","displayName":"Collector Settings","path":"perNode.collector"},{"description":"Settings for the Compliance container, which is responsible for checking host-level configurations.","displayName":"Compliance Settings","path":"perNode.compliance"},{"description":"Settings for the Node-Inventory container, which is responsible for scanning the Nodes' filesystem.","displayName":"Node Scanning Settings","path":"perNode.nodeInventory"},{"description":"To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security\nwill run services on every node in the cluster, including tainted nodes by default. If you do\nnot want this behavior, please select 'AvoidTaints' here.\nThe default is: TolerateTaints.","displayName":"Taint Toleration","path":"perNode.taintToleration"},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"perNode.hostAliases"},{"description":"The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in these section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.\nThe default is: CORE_BPF.","displayName":"Collection","path":"perNode.collector.collection","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:select:CORE_BPF","urn:alm:descriptor:com.tectonic.ui:select:NoCollection"]},{"description":"Obsolete field.","displayName":"Image Flavor","path":"perNode.collector.imageFlavor","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Obsolete field. This field will be removed in a future release.","displayName":"Force Collection","path":"perNode.collector.forceCollection","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:hidden"]},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"perNode.collector.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"perNode.compliance.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"perNode.nodeInventory.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"Should process baselines be automatically locked when the observation period (1 hour by default) ends.\nThe default is: Disabled.","displayName":"Auto Lock","path":"processBaselines.autoLock","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:select:Enabled","urn:alm:descriptor:com.tectonic.ui:select:Disabled"]},{"description":"If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended).\nIf you do so, all the settings in this section will have no effect.\nThe default is: AutoSense.","displayName":"Scanner Component","path":"scanner.scannerComponent"},{"description":"Settings pertaining to the analyzer deployment, such as for autoscaling.","displayName":"Analyzer","path":"scanner.analyzer"},{"description":"Settings pertaining to the database used by the Red Hat Advanced Cluster Security Scanner.","displayName":"DB","path":"scanner.db"},{"description":"Controls the number of analyzer replicas and autoscaling.","displayName":"Scaling","path":"scanner.analyzer.scaling"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scanner.analyzer.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scanner.analyzer.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scanner.analyzer.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scanner.analyzer.hostAliases"},{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","displayName":"Autoscaling","path":"scanner.analyzer.scaling.autoScaling"},{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","displayName":"Default Replicas","path":"scanner.analyzer.scaling.replicas"},{"description":"The default is: 2.","displayName":"Autoscaling Minimum Replicas","path":"scanner.analyzer.scaling.minReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled"]},{"description":"The default is: 5.","displayName":"Autoscaling Maximum Replicas","path":"scanner.analyzer.scaling.maxReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled"]},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scanner.db.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scanner.db.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scanner.db.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scanner.db.hostAliases"},{"description":"If you want to enable the Scanner V4 component set this to \"AutoSense\"\nIf this field is not specified or set to \"Default\", the following defaulting takes place:\n* for new installations, Scanner V4 is enabled starting with ACS 4.8;\n* for upgrades to 4.8 from previous releases, Scanner V4 is disabled.","displayName":"Scanner V4 component","path":"scannerV4.scannerComponent"},{"description":"Settings pertaining to the indexer deployment.","displayName":"Indexer","path":"scannerV4.indexer","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense"]},{"description":"Settings pertaining to the DB deployment.","displayName":"DB","path":"scannerV4.db","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense"]},{"description":"Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.","displayName":"Monitoring","path":"scannerV4.monitoring","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense"]},{"description":"Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass.","displayName":"Persistence","path":"scannerV4.db.persistence"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scannerV4.db.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scannerV4.db.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scannerV4.db.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scannerV4.db.hostAliases"},{"description":"Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users.","displayName":"Persistent volume claim","path":"scannerV4.db.persistence.persistentVolumeClaim"},{"description":"Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view).","displayName":"Host path","path":"scannerV4.db.persistence.hostPath"},{"description":"The path on the host running Central.","displayName":"Path","path":"scannerV4.db.persistence.hostPath.path"},{"description":"The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db.","displayName":"Claim Name","path":"scannerV4.db.persistence.persistentVolumeClaim.claimName"},{"description":"The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).","displayName":"Size","path":"scannerV4.db.persistence.persistentVolumeClaim.size","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:text"]},{"description":"The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.","displayName":"Storage Class","path":"scannerV4.db.persistence.persistentVolumeClaim.storageClassName","x-descriptors":["urn:alm:descriptor:io.kubernetes:StorageClass"]},{"description":"Controls the number of replicas and autoscaling for this component.","displayName":"Scaling","path":"scannerV4.indexer.scaling"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"scannerV4.indexer.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"scannerV4.indexer.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"scannerV4.indexer.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"scannerV4.indexer.hostAliases"},{"description":"When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled.","displayName":"Autoscaling","path":"scannerV4.indexer.scaling.autoScaling"},{"description":"When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3.","displayName":"Default Replicas","path":"scannerV4.indexer.scaling.replicas"},{"description":"The default is: 2.","displayName":"Autoscaling Minimum Replicas","path":"scannerV4.indexer.scaling.minReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled"]},{"description":"The default is: 5.","displayName":"Autoscaling Maximum Replicas","path":"scannerV4.indexer.scaling.maxReplicas","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled"]},{"description":"Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port.","displayName":"Expose Endpoint","path":"scannerV4.monitoring.exposeEndpoint"},{"description":"Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.","displayName":"Resources","path":"sensor.resources","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:resourceRequirements"]},{"description":"If you want this component to only run on specific nodes, you can configure a node selector here.","displayName":"Node Selector","path":"sensor.nodeSelector"},{"description":"If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.","displayName":"Tolerations","path":"sensor.tolerations","x-descriptors":["urn:alm:descriptor:com.tectonic.ui:tolerations"]},{"description":"HostAliases allows configuring additional hostnames to resolve in the pod's hosts file.","displayName":"Host Aliases","path":"sensor.hostAliases"},{"description":"Allows you to specify additional trusted Root CAs.","displayName":"Additional CAs","path":"tls.additionalCAs"}],"statusDescriptors":[{"description":"The deployed version of the product.","displayName":"Product Version","path":"productVersion"},{"description":"The assigned cluster name per the spec. This cannot be changed afterwards. If you need to change the\ncluster name, please delete and recreate this resource.","displayName":"Cluster Name","path":"clusterName"}],"version":"v1alpha1"},{"description":"SecurityPolicy is the schema for the policies API.","displayName":"Security Policy","kind":"SecurityPolicy","name":"securitypolicies.config.stackrox.io","resources":[{"kind":"Deployment","name":"","version":"v1"}],"version":"v1alpha1"}]},"description":"## Why use Red Hat Advanced Cluster Security for Kubernetes?\n\nProtecting cloud-native applications requires significant changes in how we approach security—we must apply controls earlier in the application development life cycle, use the infrastructure itself to apply controls, and keep up with increasingly rapid release schedules.\n\n\nRed Hat® Advanced Cluster Security for Kubernetes, powered by StackRox technology, protects your vital applications across build, deploy, and runtime. Our software deploys in your infrastructure and integrates with your DevOps tooling and workflows to deliver better security and compliance. The policy engine includes hundreds of built-in controls to enforce DevOps and security best practices, industry standards such as CIS Benchmarks and National Institute of Standards Technology (NIST) guidelines, configuration management of both containers and Kubernetes, and runtime security.\n\nRed Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize security.\n\n## Features and Benefits\n\n**Kubernetes-native security:**\n1. Increases protection.\n1. Eliminates blind spots, providing staff with insights into critical vulnerabilities and threat vectors.\n1. Reduces time and costs.\n1. Reduces the time and effort needed to implement security and streamlines security analysis, investigation, and remediation using the rich context Kubernetes provides.\n1. Increases scalability and portability.\n1. Provides scalability and resiliency native to Kubernetes, avoiding operational conflict and complexity that can result from out-of-band security controls.\n\n## Using the RHACS Operator\n\n**RHACS Operator channels:**\n\nRed Hat provides the RHACS Operator by using the following update channels in the Red Hat Operator catalog:\n\n* `stable`: Provides the most recent version and patches to the most recent version.\n  Using the `stable` channel and configuring automatic operator upgrades ensures that the most recent RHACS version is deployed.\n* `rhacs-x.yy` (for example, `rhacs-3.74`): Channels follow a specific RHACS version and include all patches to that version (e.g. `3.74.0`, `3.74.1`, ...).\n\nNote that the `latest` channel is deprecated and is not updated after RHACS version 3.74. Newer versions are published to the `stable` channel.\n\n**RHACS comes with two custom resources:**\n\n1. **Central Services** - Central is a deployment required on only one cluster in your environment. Users interact with RHACS via the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. Users may select exposures for Central that best meet their environment.\n\n2. **Secured Cluster Services** - Secured cluster services are placed on each cluster you manage and report back to Central. These services allow users to enforce policies and monitor your OpenShift and Kubernetes clusters. Secured Cluster Services come as two Deployments (Sensor and Admission Controller) and one DaemonSet (Collector).\n\n### Central Services Explained\n\n| Service                          | Deployment Type | Description     |\n| :------------------------------- | :-------------- | :-------------- |\n| Central                          | Deployment      | Users interact with Red Hat Advanced Cluster Security through the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. |\n| Central DB                       | Deployment      | Central DB is a PostgreSQL-based persistent storage for the data collected and managed by Central. |\n| Scanner                          | Deployment      | Scanner is a Red Hat developed and certified image scanner. Scanner analyzes and reports vulnerabilities for images. Scanner uses HPA to scale the number of replicas based on workload. |\n| Scanner DB                       | Deployment      | Scanner DB is a cache for vulnerability definitions to serve vulnerability scanning use cases throughout the software development life cycle. |\n\n### Secured Cluster Services Explained\n\n| Service                          | Deployment Type | Description     |\n| :------------------------------- | :-------------- | :-------------- |\n| Sensor                           | Deployment      | Sensor analyzes and monitors Kubernetes in secured clusters. |\n| Collector                        | DaemonSet       | Analyzes and monitors container activity on Kubernetes nodes.|\n| Admission Controller             | Deployment      | ValidatingWebhookConfiguration for enforcing policies in the deploy lifecycle. |\n\n### Central Custom Resource\n\nCentral Services is the configuration template for RHACS Central deployment. For all customization options, please visit the RHACS documentation.\n\n### SecuredCluster Custom Resource\n\nSecuredCluster is the configuration template for the RHACS Secured Cluster services.\n\n#### Installation Prerequisites\n\nBefore deploying a SecuredCluster resource, you need to create a cluster init bundle secret.\n\n- **Through the RHACS UI:** To create a cluster init bundle secret through the RHACS UI, navigate to `Platform Configuration \u003e Clusters`, and then click `Manage Tokens` in the top-right corner. Select `Cluster Init Bundle`, and click `Generate Bundle`. Select `Download Kubernetes secrets file`, and store the file under a name of your choice (for example, `cluster-init-secrets.yaml`).\n- **Through the `roxctl` CLI:** To create a cluster init bundle secret through the `roxctl` command-line interface, run `roxctl central init-bundles generate \u003cname\u003e --output-secrets \u003cfile name\u003e`. Choose any `name` and `file name` that you like.\n\nRun `oc project` and check that it reports the correct namespace where you intend to deploy SecuredCluster. In case you want to install SecuredCluster to a different namespace, select it by running `oc project \u003cnamespace\u003e`.\nThen, run `oc create -f init-bundle.yaml`. If you have chosen a name other than `init-bundle.yaml`, specify that file name instead.\n\n#### Required Fields\n\nThe following attributes are required to be specified. For all customization options, please visit the RHACS documentation.\n\n| Parameter          | Description     |\n| :----------------- | :-------------- |\n| `clusterName`      | The name given to this secured cluster. The cluster will appear with this name in RHACS user interface. |\n| `centralEndpoint`  | This field should specify the address of the Central endpoint, including the port number. `centralEndpoint` may be omitted if this SecuredCluster Custom Resource is in the same cluster and namespace as Central. |\n","displayName":"Advanced Cluster Security for Kubernetes","icon":[{"base64data":"iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAgAElEQVR4nO3dv48cRf7/8VefLvbO55Pb2+S2doix2CbldHdDaOtOnhALgrkICQKWACRnexIIspvV54RDxiBImUU4ZkY4Z9bOv8z4H6hvUN3r2WV/dFdXd/WP50Mq7Z2Z7qnZH6+peVd1dWSMEQCg+/4UugMAgHoQ+ADQEwQ+APQEgQ8APUHgA0BPEPgA0BMEPgD0BIEPAD3x59AdwFlRFCWh+wB4tDLGrEJ3AlbElbbViKIolhRLGkoabH2VpP0gnQKa5Tj9upa02PrKm0RFCHwP0lH5cKvtBe0Q0A1L2TeAhaSFMWYetjvtR+AXFEXRQFKy1Qh3oD5LSfOsGWPWQXvTMgR+DlEUDSWN0kbAA82xlDSTNDPGLEJ3pukI/EukIT+WDfndsL0BkMOJbPhPCf+LEfhb0onWcdoIeaC9TiRNZcN/FbYrzUHgS4qiaCwb8qyeAbrnWDb4p6E7ElpvAz+dfJ2I0TzQF9mo/7Cvk729C/y0bJMF/U7IvgAIYqNXwb8K25V69Sbw06A/kPQgaEcANMmRpIO+BH/nA3+rdPNx6L4AaKxP1INST6cDP4qiieyontINgOtsZEf7h6E7UpVOBn661cFUTMYCKO5E0riLWzl0KvDT8s1U0t8DdwVA+z2RDf7OlHk6sx9+Wr5ZibAH4MffJa3SbOmE1o/w01H9TFw0BaA6x5JGbR/tt3qEH0XRSHZUT9gDqNK+7Gh/FLojZbQy8KMoGkRRdCjpG7ECB0A9diR9E0XRYVpZaJ3WlXTSC6hmYptiAOEsZUs8q9AdKaJVI/z049RChD2AsPYkLdpW4mlN4Kcz5ZRwADRFVuJpzSqeVpR0oiiaij1wADTXkTFmHLoT12l04LPkEkCLNH7pZmMDPw37uajXA2iPpaSkqaHfyBp+uhJnLsIeQLvsSZo3ddlm40b46c3D52JyFkB7bWRH+o26mXqjRviEPYCO2JEd6Q9Dd2RbY0b46UeglQh7AN2xkRQ3pabfiBH+1gQtYQ+gS7KRfiNq+sEDn9U4ADquMRO5wQNf7IsDoPv2ZLMuqKCBn15By0VVAPpgP828YIIFfrr/BNslAOiTByH33gmySifdYe6b2p8YAJrhHWNM7SWe2gM/vYp2IVbkAOivjaRh3fvp11rS2doMjbAH0Gc7kmZ1r9ypu4Z/IFbkAIBks/CgziesraRD3R4ALlRbPb+WwGfbBAC4VG3bL9RV0qFuDwAX21FNF2VVHvjpmlMurgKAy+3XsT6/0pIOpRwAyK3y0k7VI/ypCHsAyGNHNjMrU9kIP4qiRNKPlZwcALrrLWPMvIoTVxn4K0m7lZwcALrrxBgTV3HiSko66eQDYQ8Axe1WNYHrfYTPRC0AlFbJBG4VI/yJCHsAKGNHNku98jrCT3fC/M3bCQGg317zuaOm7xH+gefzAUCfHfg8mbcRPqN7AKiEt1G+zxF+sNt2AUCHectWLyN8VuYAQGW8rdjxNcJnZQ4AVMPbih1fI/yVuNAKAKri5erb0iP8KIrGIuwBoEq7adaW4qOkU7oTAIBrjcueoFRJh6WYAFCrUks0y47wxyWPBwDkNy5zcNkR/krU7wGgLqUmb51H+FEUDUXYA0CddtPsdVKmpDMucSwAwM3Y9UDnkg7lHAAIwrms4zTCp5wDAME4l3VcSzojx+MAAOU5ZTCBDwDt45TBhWv46c6Yv7s8GQDAm/8puoOmywg/cTgGAOBXUvQAAh8A2ikpegCBDwDtlBQ9wKWG7+cmuACAUowxUZHHFxrhR1GUFOoNAKAyRTO5aEmn0MkBAJUqdAFW0cCPCz4eAFCdSgPfeZc2AIB3hTK50KQtE7YA0CxFJm5zj/DT2xkCABqkSDYXKenkPikAoDZx3gcWCXzq9wDQPLmzuUjgDxw6AgCoVu5sZoQPAO3GCB8AeqKSET4AoMVyr8NnDT66IEmSM/9/Pp8H6QfgU961+H+uuiNAKMPh8LQlSaK9vb0LH7dcLjWfz7VYLE4b0EWM8NEJg8FASZKchvtwONTOzo7TuTabjRaLxembwHw+13pd6E5yQK3yjvAJfLRSkiSnwT4cDrW7u1vp852cnJyO/ufzOaUgNAqBj87YLssMh8NLSzN1Wy6XZz4JUApCKAQ+WimO4zPhvr+/H7pLhRwfH595E1itVqG7hB4g8NF4g8HgTLgnSeJcd2+qzWZzZi5gsVgwHwDvCHw0znbNvUmlmbplpaDtOQGgDAIfQcVxfCbg21aaqVtWCsreACgFoQgCH7XxuSQSFktDUQSBj8qcD/eql0TCypaGbr8JABKBD0/yXq2KMLhKGBKBDwfZksgs3Km7t9Px8fGZNwHmA7qPwMeVzi+J7Etp5uTk5LQUkiRJb17z9oQwS0O7h8DHGefDvQ+lme2Jz8uCbvuNr08TzttLQ7PvDdqLwO+xtl+t6srX0sa+LinlKuH2IvB7ghFqPSNUPiFRCmoyAr+jzm9FQA06jL7PgVAKahYCv2NGo5EODw97ESptXWXSx1VOJycnmkwmms1mobvSawR+h0ynUz148CB0NyrR9S2Gm7q1s29HR0caj8ehu9FbBH5HjEYjffPNN6G74QVXilpdvVL5nXfeYaQfCIHfEavVqpWBwF4w+XVlL6KTkxPFcRy6G71E4HfAcDjUL7/8ErobubDbo19tXRr6+uuvd64s1wZ5A//PVXcE7po6WtpeqdHn0kyVVquVptPpmX/bfgNo6gqtwWAQugu4AoGPK3HHpuY4f/P0PtwxDH4R+A0WIli52rI91uv1H94E+nqVNfIh8Hus60si+2i1Wmm1Wp1ZLdOXpaG4HoHfE+evVqXu3h/Zz317TmB7K44uLQ3F1Qj8Djq/JJLSDM67rBTU9qWhuIYxJleTZGj1tiRJTFHj8Th4v2ndaOPxuPDvX5Ikwfvdx5Y3x/8kdAojefjC71L3EPgA0BMEPgD0BIEPAD1B4ANATxD4ANATBD4A9ASBDwA9QeADQE8Q+ADQEwQ+APQEgQ8APUHgA0BPEPgA0BMEPgD0BIEPAD3BHa/QG3fSdjv9KklvXPLYl5J+lbRJvz5Lvz6vuI9AlQh8dNYtSXclvZ1+vVHg2Bt69Wbw9ta/v5D0s6QfJH3voY9AnQh8dM592ZB++7oHOrgp6V7aXsqG/mPZNwGg6Qh8dMKOpHdlw/5mTc95Q6/C/6ls8H9d03MDLpi0Res9lLSU9IHqC/vz3pD0uaSfZMtHQBMR+Gitu7JB/6mK1eerdFvSt5L+KzuHADQJgY/W2ZH0mWywhhrRX+dt2dH+/dAdAbYQ+GiVO5K+k63XN90N2TLPF7JvUkBoBD5a4y+yYX87dEcKuifbb0o8CI3ARyvcl/R/ak6tvqjbsiWeO9c9EKgQgY/Guy9bGmm7G7IjfUIfoRD4aLSuhH2G0EdIXHiFxqoj7LM9c867bI8dH7LQf1PszYN6EfhopDuySy99eya7HcJTvdoc7TK30n68ITth7HMJ6A3Ztfp/vaYPgE8EPhpnRzYMfU3QvpD0lWzQFxlRP0/b95I+lA3/d2XD30ffbsu+qb3n4VxAHtTw0ThfyM9o+oWk9yXtSfpS5csnv8qG856kR7LloLLuiYuzUB8CH43yF/nZ5fKRbI28is3MNlvnf+rhfJ+JNfqoB4GP4O7I7otzV3Z0X8YLSfuygVx1bfy5bA3+o5LnuaHyrxvIgxo+anNXdgL0juyI1vcVs88UZhL0S9n98L+Te23/DdnvD/vqo0oEPip1V7ZO7Wui8zKPZSdWQ614+VX2zaZM6H8hOz8AVIWSDipxX3br4m9lA7/KsH8mO5kaenljFvquk7k3xQQuqkXgw6ss6D9XPVsXZ2WcpshC39UHvjoCXIDAhxe3ZMsZdQW9ZEfSTRjZn/er3Cdyb4o7ZqE6BD5Kuy+7E2SV2xFc5JEu3hahCb6U9IPjsfd8dgTYQuCjlC9kR/V1b1v8VDZUm+xDudXz74kbpqAaBD6c7MiWcEKNRh8Fet4insv9TekvPjsCpAh8FJaFfd0lnMxTtWe9+ldyG+X7uNoYOI/AR2GhbzPYhtF9ZiO37R2YuEUVCHwU8oXChv1jtWd0n/nK4Zgb4iYp8I/AR24PFXYFyWO1cyvh57LXCxRF4MM3tlZALndUzUVBz2TLHtnNSO7IzhFszw/8IDtKbtvIftv3Kv7JKOQnKXQTgY9cvpCfpZcvZcPvh/RrX7hso8wIH74R+LjWfZUfbb6UXaL4lZp3ZWwdXD6dsBYfvlHDx5V2VP7esk9lbxZSxx71Tfai4ONvixujwC8CH1d6V+VKOY9kNxMre3vBLnD5Hixkl8GyTBM+EPi4Upntet9Xu9bMN9UbsttMfyHKPCiHwMel7st958uPVM39ZPvsnuzW02y7AFcEPi7lenn/D2r+xmZtdUPS/6n8vAr6icDHhXbkFvjZHvWo1rvixucojsDHhVwnCUPeV7Zv7onQRzEEPi7kshPmC1G3v0oVVwrfk93yAsiDwMeFXEb4hP3VHld03k/Fsk3kQ+DjQi5X1lYVaF3xXG47Z+bBkk3kQeDjD1yu7nwhLq7K40NV88Z4U3YiF7gKgY8/cAn8pt5MvInek/Q3ud/k/DIPxSgfVyPw4QWBX8zPkv4h6X8lDSX9U+VH/jfEKB9XI/CBwJ7LbhX9nmz4u2ylnCmzFQa6j8AHGuS57GZzrqP9m2LrBVyOwAca6D25h77LNRToBwIfvbAjO6n5naT/l7bv1OyJzg9VfA99iTX5uByBDy+afDu++7K7TH6qs6PfN9J/W6qZte+N3LaX5l64uAyBjz9wWU/fxMC/K+knSZ/r6pu43Egf85OaNzr+Wozy4Q+Bjz9wCfybak7o35K98vRbFRvt3tarG4006daCVezBg34i8HEhl6WB97z3opgdSR/IjtTL9OVeeo4P1Iz6PlcwwxcCHxdyuZDqvsIF5H29Cuky9+DN3NCrN48m1vcBFwQ+LuQywg9xpecd2dU2n8v9doxXuZme+zs1p2QFuCLwcaHvZe9eVdRD1VP/3pGttR+rnnXnb6TPFWJXyiaUldANBD4u9b3DMTck/dd3R875QHYpZYg5g+xG4h/U+JxcOQtfCHxcyvVKz9uq5tZ7d/UqbH3U6V1l9f2lql/+eFdupSpW9uAiBD4u9bPc1oBLfu+3eku2hv6tqqnTu7op26fvVF0Zy+WThOvPDN1H4ONKLld6ZrLQd61B70j6TNJCzd4f5g3ZPn4mv/X2h3J73YzucRkCH1dyvdIzc09uK1weypZM2rS/+7uyffZxU/H7sts+uPB9YxV0B4GPa71X8vjbsqGfd/T7hWzYhazTu7oh23fXclb2qeZzx+Nfym2yHf1A4ONaP6v8qPGGbJBd576qXX3zVPYmI2VvNHKdeyp2wVa2m+dPKvephrDHVQh85PKe3Nblb7un60f5VS13fCF7H9m/ym5VkN1o5G+qbpIz72u5Ixv0n6r8pHSZORd0H4GPXDay92At66pavusSxKu8lPSRpD1dPJn5c/rfPlL5N7Tzbur6ZZvZCiQfr/ux2HcHVyPwkdvPssHYFo9lw/zLHI/9Mn1s2RuJF/WZ/MxVvJS9YQpwFQIfhXyp+kOxqKeS9mXLUJsCx23SY/ZVbX0/c0vS257OVfS1op8IfBRW5n6rVZYcXkj6p2xt3mW3z8yv6Tn+qWovYvJ1sdZjMVmLfAh8OHEJ/apqzC9lJyv35Df4vk/P+Uj+6/u+PFP5ZbPoDwIfzt6T9H7Ox2ah7NsPkt6s6NyZR+lzNO2Cpmeyn0SAvAj8jhkOh7U+39eyNe+rSh8v9Go5pG9fVXTe856nz+VTmbLTD7Lf0yrr9kmSVHh2hEDgd8xgMKj9OX+VHQF/JDvZ+TJtT2U/AbypcuHWVRu5zYU8kl0iyyQtivpz6A6gGzayK3jyLIHEKx/K7nefZ2nmC9kyGpujwRUjfCCgjWxp5tkVj3kh+0npsovHgLwY4XdMiJIOyslKYvdl1+XvbP37M9l5khDiOA70zKgKgd9gi8Wi8DF1T9rCn68VLtwv4hL4Lr+zqA8lnQZbr9ehuwAUwu9ssxH4HcPHcPjCp8XuIfAbbrlcFnr87u5uRT1B3+zsFLthY9HfVdSPwG84l4/ITNyiLJdPipRzmo/Ab7jValX4GD6KoyyXwHf5XUW9CPyGc/kjoo6PslwGDQR+8xH4DeeyzI3AR1ksyewmAr/hXOqibHqFslxG+NTwm4/Ab7j5fF74GEb4KMsl8F1+V1EvAr8FTk5OCj1+d3e3Nyt13tWrrQiqtJM+Vx/EcVx4SWbR31GEQeC3gEtttC9lnbclLSU9rPA5HqbP4ev+s03HhG13EfgtwJ46V7sh6VPZUL7r8bx303N+qnzbF3eFy2CBck47EPgtwAg/n5uSvpX0ncrdIPxWeo5v03P2jctggRU67RAZY/I9MIryPRDeDQYD/f7774WPi6Kogt5U565syPrySPa2hHnvDJXV6T/w2Ie/qX172OfNhG2vvfYaZZ2AjDG5/tgZ4bfAer12mhTr4yh/2weyJZn7OR57P32sz7Bvo9FoVPiYk5MTwr4lCPyWcKmRuvzxhvSz7L1wfboh6XNJP+ni+v7d9L99Lv91+pdq3+jeZZBAOac9CPyWcAn8No7wH1V03tuy5aL/ytbob6X/+9v0v1WhqtdSJdbfdxs1/JaI41i//fZb4ePaWFv9QtK9Cs+ffYqocuXNY9kbjrcN9ft2oobfMavVyqmO37ayjmSD8iP5L+9kbqi6sH8p2/c2hr1UfE976vftQuC3yGw2K3zMeDz235EafClpT3ak3BaPZfv8ZeiOlFC0Hk85p10I/BZx+ePa29tr7d46G9mR8r6kp4H7cpWnsn18T/mXgDbVdDqt9PEIi8Bvkdlsps2meKS0sayz7VdJf5X0vqQXgfuy7YVsn/4q28cumM/nOjo6yvXYo6MjRvgtQ+C3jEtZZzKZVNCT+n0t6U3Z1S9V1ffzeJn24c20T10zHo+vDf2jo6PWlgv7jMBvGZfA393dbeUSzYts9CpsQ9T3H+vVm07byzdXGY/Heuedd/TkyZMz//7kyRO99dZbhH1LsSyzhdbrdeHta7s6Irsr6TNVt5Y+80zSh2rfhVToB5ZldpjLKP/Bgwed3CP/Z9kR9/uqpszzMj33myLs0X4Efgu5rozoSi3/Il/LLon0eXXro/ScXazTo58o6bTUarXS7u5uoWM2m43iOO78vUdvyZZ5XG9Y8oNs+ea5tx4B1aKk03GHh4eFj9nZ2en0KD/zXNI/ZLcmLrKM80V6zD9E2KObGOG3lOse+X0Z5W97KLvt8WXbKWTLLNt8hSz6jRF+x63X69wXyGzryyh/W7ZNwyPZ1TaZZ3pVpyfs0QeM8FvMdQfNPo7ygS5jhN8Dq9VKx8fHhY/b2dlxmgMA0G6M8FsuSRL9+OOPTse+/vrr3K0I6ABG+D0xn8+dRvmS20ofAO1F4HfAwcGB03H7+/u9m8AF+oySTkfM53Pt7+8XPm6z2Wg4HHLXIqDF8pZ0CPyOGA6H+uWXX5yOPT4+7sxuml0wGo2UJInTDcXzWq1Wms/nms1mrNbqgLyBL2NMribJ0JrdptOpcXVwcBC8/31vw+HQLBYL55+hi/V6bcbjcfDXTivXTN4cz/3ABrwo2tVtMBiY9Xrt/MefJEnw19DXNhwOS/3syiL0290Mgd/PNplMnP/o1+u1GQwGwV9DH9t8Pnf+ufkSx3Hw7wPNrRkCv7+tTFlgsVgE73/f2nA4dP55+XR4eBj8e0FzayZnjrMss4PK3Nlqb2/Peb99uGnKTeaZuO8+Ar+DFouFPvnkE+fjHzx44Ly2H+21t7cXuguoGIHfUQcHB1oul87Hf/zxx528By7QZwR+h5UN7P/85z+Efg246A21yVvsVwMmJmjFW5lVOxmW7FXbyi6n9Sn094Lm1gyrdGhZm81mpYOA0K+2jcfj0j8jH0J/H2huzRD4tKwNBgMvV3AS+tW2JoR+6O8Bza0ZAp+23XxdyTmdToO/li63JEm8fCJzFfr109yaIfBp59toNPISCrPZjCtyA/8cq6r5h35tNLdmCHzaRc1X2WCxWJjhcBj89fStHRwcePn5XSb066O5NUPg0y5rh4eHXsJhvV6b0WgU/PX0oQ0Gg1r22wn9OmluzRD4tKtama2Uz5tOp5R4KmxJktS2bDP0a6W5NUPg065rPkN/tVqxvbLnNhgMvH0ayyv0a6a5NUPg0/I0n6FvjN1xkdF++TYajcxqtfL6s8kj9OumuTVD4NPyNt+hz12U3FscxyzLpBVuhsCnFWm+Q98YY+bzOWWenG0wGFS+AieP0N8HmlszBD6taKuqXjydTrmb0hXt4OCAvXRopZoh8GkurcrL+wn+V20wGJjJZFJZnX61WjmdO/T3hebWDIFPc21VLwPsc6knjuPKR/SLxcJ53X7o7w/NrRkCn1amxXHsZcO1q6xWKzOZTHqxqidJkkrmSc7bvi8tgd+fZgh8Wtk2GAxqCSljbLmna1ftZqP5OpZXXnTVM4Hfn2YIfJqvNh6Pa5tUXK/XrQ7/OI7NZDKp/NPRtsViceHcCIHfn2YIfJrPVkeJ57z1em1ms5mZTCaN3ahtMBiY0WhkDg8Pg1wodXBwcGnfCPxetdjkyPHI/oyvF0VRvgei0w4ODvTxxx8Hee7NZqP5fK7FYnH6db1e19qH4XB42pIk0d7eXq3Pn1kulxqPx1osFpc+Zj6fa39/v9B5oygq2zUEYIzJ9YMj8FFYHMeaTqeFw6QKJycnWq1Wms/nknT6tcybwXA41GAwUBzHiuNYw+FQcRwHC/dtm81Gh4eHOjg4uPaxBH5/EPio3Hg81uHhoXZ2dkJ35UrZm8JVmvDmdZ0nT55oMplc+1oyRQN/uVxqOBw69g4h5Q18avi0Uq0pWwJ0metOpJPJpNDzbC/ppLWrGSZtaXW2OI5rW8LZF6vVqtQmdIPBIPfqqvV6zVXQLW6GwKeFaAR/eWWDfrvlvXk9u5u2u5kKAn8e+kXR2tMI/uJ8Bv12Gw6Hly4Z5cY1nWhzkzPHi0zaziXt53owkIrjWOPxWJPJpPGTu6EcHx/r8PBQs9ms0ucZjUZnJmUXi0Xlz4laHBtjklyPzPvOIGmm8O9ktBa38Xhc+8VbTbVer83h4SF1c5qPNjMVlHQOGvDCaB1ocRwHuzI1tNlsRr2c5rsdmAoCf9KAF0brWBsOh50P/yzk+7ArKC1Im5gKaviJpB9zPRhwMBwONRqNlCRJKy6EuszJyYnm87lms5nm83nt2z+gd94yxszzPLBI4MeSfnPuElDAYDBQkiSne9Y0+Q0gC/jtPX6AGr1mjFnleWDuwJfYXgFhbW9clrW6V/4sl0utVqugG7gB20zebRVUPPAXksLvIAVsSZJEg8HgdMlhtvmZZD8p5Nn0bLPZnBmZZ0G+Wq3ONKBhlsaY3BsgFQ38qaQHDp0CAPh3ZIwZ533wnwqenOIkADRHoUwm8AGgvQplcqGSjsTELQA0RZEJW6n4CF+Slg7HAAD8KpzFLoE/dzgGAODXvOgBBD4AtNO86AEuNfyBpN+LPhEAwKv/McYUuuqv8Ag/fQLq+AAQzrJo2EtuJR3J7o0PAAjDKYMJfABoH6cMLlzDPz0wilaSdp0OBgC4OjHGxC4Huo7wJUb5ABCCc/aWCfxpiWMBAG6mrgc6l3QkyjoAUDPnco5UboQvMcoHgDpNyxxcdoQfi9seAkBdct/O8CKlRvjpEx+XOQcAIJfjMmEvlS/pSJR1AKAO07InKFXSOT0Jk7cAUKVSk7UZHyN8iVE+AFRp6uMkvkb4A0krSTulTwYA2LaRFLtslnaelxF+2pGpj3MBAM6Y+gh7ydMIX2KJJgBUpNRSzG2+avjZEs0jX+cDAOjIV9hLHkf4EqN8APDM2+he8jjCl05H+Z/4PCcA9NQnPsNe8jzCl1ixAwAeeFuZs83rCF86XbFz4Pu8ANAjB77DXqpghH96Yq6+BQAXXq6qvYj3Ef6WcYXnBoCuGld14soC3xgzl/SkqvMDQAc9SbOzEpWVdCQmcAGggEomardVWdJhAhcA8qtkonZbpSP80yeJormk/cqfCADa6dgYk1T9JHUFPqUdALhY5aWcTKUlnUz6QsZ1PBcAtMy4jrCXagp8STLGzCT9u67nA4AW+HeajbWopaRz+mS2tDOXtFfbkwJAMy0lJXWN7qWaA1863VFzIer5APprI2noe3O069RW0smkL3Bc9/MCQIOM6w57KUDgS6f1/H+FeG4ACOxfddbtt9Ve0jnz5FE0lfQgWAcAoF5HxphxqCcPGvgSF2UB6I1aLq66SpCSzjkj2dlqAOiqpWzWBRU88NMlSYkIfQDdVPvyy8sEL+lk2H4BQAfVtm1CHsFH+Jmtkf4mcFcAwIeNGjKyzzQm8CXJGLMQoQ+g/bKwX4TuyLZGBb50GvqxqOkDaKelbBmnUWEvNTDwJSZyAbRWYyZoL9LIwJfOhP5x4K4AQB7HanDYSw0OfMmGfnqhwlHovgDAFY6MMY0Oe6nhgZ9JL0Vm7x0ATfSvkNslFNGYdfh5RFE0kjQVa/UBhLeR3fUyyEZoLloV+NLpfvozcRMVAOEsJY1CbHFcRitKOtvSb3AibpcIIIx/y07OrkJ3pKjWjfC3UeIBUKPWlXDOa3XgS6d78MzEFssAqnMsW8Jp9Cqc67SupHPe1tLNf4ktGQD4tZFdhdP4JZd5tH6Evy0d7U8l/T1wVwC03xPZEk7rgz7TqcDPRFGUyAb/btieAGihE9mgn4fuiG+tL+lcxBgzN8bEoswDIL+sfBN3Meyljo7wt6Vlnomkj0P3BUBjfSLpsEvlm4t0PvAz6QVbB5IeBO0IgCY5knTQxjX1LnoT+Jk0+CeSxmL9PtBHG9k5vsO+BH2md4Gf2Sr1jHX30CkAAADvSURBVMXkLtAHJ3oV9J0u3Vymt4G/LYqisWzwc/EW0D3HkqbGmGnojoRG4G9Jyz1jMeoH2i4bzU/7Vra5CoF/iSiKhrLBPxLhD7TBiew2K9Mm3k+2CQj8HNLwH6WNbZmB5ljKhvyMkL8egV9QOtmbbDXeAID6LCXNs9bXyVdXBL4H6VYOw63GmwBQ3lLSImtdvfq1TgR+RdIJ4Fj2DWCw9VViNRAg2dUzkrSWDfXs64qJ1moQ+A2y9SYBdMWCsktzEPgA0BOd3C0TAPBHBD4A9ASBDwA9QeADQE8Q+ADQEwQ+APQEgQ8APUHgA0BP/H9f56NLOEVbbgAAAABJRU5ErkJggg==","mediatype":"image/png"}],"install":{"spec":{"clusterPermissions":[{"rules":[{"apiGroups":["*"],"resources":["*"],"verbs":["*"]},{"apiGroups":["platform.stackrox.io"],"resources":["centrals","securedclusters"],"verbs":["create","delete","get","list","patch","update","watch"]},{"apiGroups":["platform.stackrox.io"],"resources":["centrals/finalizers","securedclusters/finalizers"],"verbs":["update"]},{"apiGroups":["platform.stackrox.io"],"resources":["centrals/status","securedclusters/status"],"verbs":["get","patch","update"]},{"apiGroups":["authentication.k8s.io"],"resources":["tokenreviews"],"verbs":["create"]},{"apiGroups":["authorization.k8s.io"],"resources":["subjectaccessreviews"],"verbs":["create"]}],"serviceAccountName":"rhacs-operator-controller-manager"}],"deployments":[{"label":{"app":"rhacs-operator","control-plane":"controller-manager"},"name":"rhacs-operator-controller-manager","spec":{"replicas":1,"selector":{"matchLabels":{"app":"rhacs-operator","control-plane":"controller-manager"}},"strategy":{},"template":{"metadata":{"annotations":{"kubectl.kubernetes.io/default-container":"manager"},"labels":{"app":"rhacs-operator","control-plane":"controller-manager"}},"spec":{"containers":[{"args":["--health-probe-bind-address=:8081","--metrics-bind-address=0.0.0.0:8443","--leader-elect"],"env":[{"name":"RELATED_IMAGE_MAIN","value":"registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:cb4c824228ed500d8906adb0add2bfde28c6fb6618442bbe181ec8b4673d54d9"},{"name":"RELATED_IMAGE_SCANNER","value":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e66d880952d5ad5cc6eb5c36c4234a83a5fa3f7407aad8f97bb885f85f174b39"},{"name":"RELATED_IMAGE_SCANNER_SLIM","value":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7d74cfab59d7af011b3711f4be2d362bcfbffb9839a409fd7cefb71154f9b6b3"},{"name":"RELATED_IMAGE_SCANNER_DB","value":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4dd8884af50ea6ce2d4873e973e1a0e504e288c846a1a6098c81fae8f0359c01"},{"name":"RELATED_IMAGE_SCANNER_DB_SLIM","value":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8fa6e7a4cf136a7cdcbcc00ee5130d6089c75805be35cf72930e279503853235"},{"name":"RELATED_IMAGE_COLLECTOR","value":"registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:523c028ce03473016c3a77572c89e2b92dd5620f367b425cbf417c1cd974ee1b"},{"name":"RELATED_IMAGE_ROXCTL","value":"registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f9ab76f639938df678c02fa404a461d9d7e1809053674359991bafdc149f287"},{"name":"RELATED_IMAGE_CENTRAL_DB","value":"registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:463c9a0aba057c18ee34bf229380cbde8da2eae3adad851b007d16f7202d1508"},{"name":"RELATED_IMAGE_SCANNER_V4_DB","value":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:f3c57ff7563fd0983e8047db3c2eedb96ecca6e6ad3778e9ba326a37a9be551c"},{"name":"RELATED_IMAGE_SCANNER_V4","value":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:36229fe2a50ed0ad79ded35b5652d35f559a676f780ededbead6332951e7bd89"},{"name":"MEMORY_LIMIT_BYTES","valueFrom":{"resourceFieldRef":{"containerName":"manager","divisor":"0","resource":"limits.memory"}}}],"image":"registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:8796efaba046b9a20c223ae285a635f6a84af809a321869947ba476b98ba5fc1","livenessProbe":{"httpGet":{"path":"/healthz","port":8081},"initialDelaySeconds":15,"periodSeconds":20},"name":"manager","ports":[{"containerPort":8443,"name":"https","protocol":"TCP"}],"readinessProbe":{"httpGet":{"path":"/readyz","port":8081},"initialDelaySeconds":5,"periodSeconds":10},"resources":{"limits":{"cpu":"200m","memory":"1Gi"},"requests":{"cpu":"100m","memory":"200Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}}],"securityContext":{"runAsNonRoot":true},"serviceAccountName":"rhacs-operator-controller-manager","terminationGracePeriodSeconds":10}}}}],"permissions":[{"rules":[{"apiGroups":[""],"resources":["configmaps"],"verbs":["get","list","watch","create","update","patch","delete"]},{"apiGroups":["coordination.k8s.io"],"resources":["leases"],"verbs":["get","list","watch","create","update","patch","delete"]},{"apiGroups":[""],"resources":["events"],"verbs":["create","patch"]}],"serviceAccountName":"rhacs-operator-controller-manager"}]},"strategy":"deployment"},"installModes":[{"supported":false,"type":"OwnNamespace"},{"supported":false,"type":"SingleNamespace"},{"supported":false,"type":"MultiNamespace"},{"supported":true,"type":"AllNamespaces"}],"keywords":["advanced-cluster-security","stackrox","security","vulnerabilities","compliance","devsecops","monitoring","scanning","runtime-security","network policy","configuration","risk"],"links":[{"name":"Red Hat Advanced Cluster Security Documentation","url":"https://docs.openshift.com/acs/welcome/"},{"name":"DataSheet","url":"https://www.redhat.com/en/resources/advanced-cluster-security-for-kubernetes-datasheet"},{"name":"Support Policy","url":"https://access.redhat.com/node/5822721"},{"name":"Community Site","url":"https://www.stackrox.io/"}],"maintainers":[{"email":"rhacs-pm@redhat.com","name":"Advanced Cluster Security product team"}],"maturity":"alpha","minKubeVersion":"1.15.0","provider":{"name":"Red Hat"},"relatedImages":[{"image":"registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:523c028ce03473016c3a77572c89e2b92dd5620f367b425cbf417c1cd974ee1b","name":"collector"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:463c9a0aba057c18ee34bf229380cbde8da2eae3adad851b007d16f7202d1508","name":"central_db"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e66d880952d5ad5cc6eb5c36c4234a83a5fa3f7407aad8f97bb885f85f174b39","name":"scanner"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:36229fe2a50ed0ad79ded35b5652d35f559a676f780ededbead6332951e7bd89","name":"scanner_v4"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7d74cfab59d7af011b3711f4be2d362bcfbffb9839a409fd7cefb71154f9b6b3","name":"scanner_slim"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:f3c57ff7563fd0983e8047db3c2eedb96ecca6e6ad3778e9ba326a37a9be551c","name":"scanner_v4_db"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:cb4c824228ed500d8906adb0add2bfde28c6fb6618442bbe181ec8b4673d54d9","name":"main"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4dd8884af50ea6ce2d4873e973e1a0e504e288c846a1a6098c81fae8f0359c01","name":"scanner_db"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8fa6e7a4cf136a7cdcbcc00ee5130d6089c75805be35cf72930e279503853235","name":"scanner_db_slim"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f9ab76f639938df678c02fa404a461d9d7e1809053674359991bafdc149f287","name":"roxctl"},{"image":"registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:8796efaba046b9a20c223ae285a635f6a84af809a321869947ba476b98ba5fc1","name":"manager"}],"replaces":"rhacs-operator.v4.9.3","skips":["rhacs-operator.v4.1.0"],"version":"4.9.4-rc.2"}}" + } + }, + { + "type": "olm.bundle.object", + "value": { + "data": "eyJhcGlWZXJzaW9uIjoicmJhYy5hdXRob3JpemF0aW9uLms4cy5pby92MSIsImtpbmQiOiJDbHVzdGVyUm9sZSIsIm1ldGFkYXRhIjp7ImNyZWF0aW9uVGltZXN0YW1wIjpudWxsLCJuYW1lIjoicmhhY3Mtb3BlcmF0b3ItbWV0cmljcy1yZWFkZXIifSwicnVsZXMiOlt7Im5vblJlc291cmNlVVJMcyI6WyIvbWV0cmljcyJdLCJ2ZXJicyI6WyJnZXQiXX1dfQ==" + } + }, + { + "type": "olm.bundle.object", + "value": { + "data": "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" + } + } + ], + "relatedImages": [ + { + "name": "", + "image": "quay.io/rhacs-eng/release-operator-bundle@sha256:cb5fac5c451f2b46cdb74859f035b35878db033df803ef14b705fdd7a9181da5" + }, + { + "name": "central_db", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:463c9a0aba057c18ee34bf229380cbde8da2eae3adad851b007d16f7202d1508" + }, + { + "name": "collector", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:523c028ce03473016c3a77572c89e2b92dd5620f367b425cbf417c1cd974ee1b" + }, + { + "name": "main", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:cb4c824228ed500d8906adb0add2bfde28c6fb6618442bbe181ec8b4673d54d9" + }, + { + "name": "manager", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:8796efaba046b9a20c223ae285a635f6a84af809a321869947ba476b98ba5fc1" + }, + { + "name": "roxctl", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f9ab76f639938df678c02fa404a461d9d7e1809053674359991bafdc149f287" + }, + { + "name": "scanner_db", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4dd8884af50ea6ce2d4873e973e1a0e504e288c846a1a6098c81fae8f0359c01" + }, + { + "name": "scanner_db_slim", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8fa6e7a4cf136a7cdcbcc00ee5130d6089c75805be35cf72930e279503853235" + }, + { + "name": "scanner", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e66d880952d5ad5cc6eb5c36c4234a83a5fa3f7407aad8f97bb885f85f174b39" + }, + { + "name": "scanner_slim", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7d74cfab59d7af011b3711f4be2d362bcfbffb9839a409fd7cefb71154f9b6b3" + }, + { + "name": "scanner_v4_db", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:f3c57ff7563fd0983e8047db3c2eedb96ecca6e6ad3778e9ba326a37a9be551c" + }, + { + "name": "scanner_v4", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:36229fe2a50ed0ad79ded35b5652d35f559a676f780ededbead6332951e7bd89" + } + ] +} { "schema": "olm.deprecations", "package": "rhacs-operator", diff --git a/catalog-csv-metadata/rhacs-operator/catalog.json b/catalog-csv-metadata/rhacs-operator/catalog.json index eea7a4c9..27a87374 100644 --- a/catalog-csv-metadata/rhacs-operator/catalog.json +++ b/catalog-csv-metadata/rhacs-operator/catalog.json @@ -2013,8 +2013,13 @@ "skipRange": ">= 4.8.0 < 4.9.3" }, { - "name": "rhacs-operator.v4.10.0", + "name": "rhacs-operator.v4.9.4-rc.2", "replaces": "rhacs-operator.v4.9.3", + "skipRange": ">= 4.8.0 < 4.9.4-rc.2" + }, + { + "name": "rhacs-operator.v4.10.0", + "replaces": "rhacs-operator.v4.9.4-rc.2", "skipRange": ">= 4.9.0 < 4.10.0" } ] @@ -4139,6 +4144,11 @@ "name": "rhacs-operator.v4.9.3", "replaces": "rhacs-operator.v4.9.2", "skipRange": ">= 4.8.0 < 4.9.3" + }, + { + "name": "rhacs-operator.v4.9.4-rc.2", + "replaces": "rhacs-operator.v4.9.3", + "skipRange": ">= 4.8.0 < 4.9.4-rc.2" } ] } @@ -4552,8 +4562,13 @@ "skipRange": ">= 4.8.0 < 4.9.3" }, { - "name": "rhacs-operator.v4.10.0", + "name": "rhacs-operator.v4.9.4-rc.2", "replaces": "rhacs-operator.v4.9.3", + "skipRange": ">= 4.8.0 < 4.9.4-rc.2" + }, + { + "name": "rhacs-operator.v4.10.0", + "replaces": "rhacs-operator.v4.9.4-rc.2", "skipRange": ">= 4.9.0 < 4.10.0" } ] @@ -61554,45 +61569,1593 @@ ] }, { - "path": "network", - "displayName": "Network", - "description": "Network configuration.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:advanced" - ] + "path": "network", + "displayName": "Network", + "description": "Network configuration.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "misc", + "displayName": "Miscellaneous", + "description": "Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.enforcement", + "displayName": "Enforcement", + "description": "Set to Disabled to disable policy enforcement for the admission controller. This is not recommended.\nOn upgrades to 4.9 from previous releases, defaults to Enabled only if at least one of listenOnCreates or listenOnUpdates is true.\nOn new deployments starting with version 4.9, the default is: Enabled." + }, + { + "path": "admissionControl.bypass", + "displayName": "Bypass", + "description": "Enables teams to bypass admission control in a monitored manner in the event of an emergency.\nThe default is: BreakGlassAnnotation." + }, + { + "path": "admissionControl.failurePolicy", + "displayName": "Failure Policy", + "description": "If set to \"Fail\", the admission controller's webhooks are configured to fail-closed in case admission controller\nfails to respond in time. A failure policy \"Ignore\" configures the webhooks to fail-open.\nThe default is: Ignore." + }, + { + "path": "admissionControl.replicas", + "displayName": "Replicas", + "description": "The number of replicas of the admission control pod.\nThe default is: 3." + }, + { + "path": "admissionControl.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "admissionControl.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + }, + { + "path": "admissionControl.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "admissionControl.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, + { + "path": "admissionControl.contactImageScanners", + "displayName": "Contact Image Scanners", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.listenOnCreates", + "displayName": "Listen On Creates", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.listenOnEvents", + "displayName": "Listen On Events", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.listenOnUpdates", + "displayName": "Listen On Updates", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.timeoutSeconds", + "displayName": "Timeout Seconds", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "auditLogs.collection", + "displayName": "Collection", + "description": "Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only\nsupported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error.\nUse the 'Auto' setting to enable it on compatible environments, and disable it elsewhere.\nThe default is: Auto." + }, + { + "path": "customize.labels", + "displayName": "Labels", + "description": "Custom labels to set on all managed objects." + }, + { + "path": "customize.annotations", + "displayName": "Annotations", + "description": "Custom annotations to set on all managed objects." + }, + { + "path": "customize.envVars", + "displayName": "Environment Variables", + "description": "Custom environment variables to set on managed pods' containers." + }, + { + "path": "customize.deploymentDefaults", + "displayName": "Deployment Defaults", + "description": "Global nodeSelector and tolerations for Deployment-based components. DaemonSets (Collector) are not affected.\nComponent-level nodeSelector and tolerations settings override these defaults on a field-by-field basis." + }, + { + "path": "customize.deploymentDefaults.pinToNodes", + "displayName": "Pin To Nodes", + "description": "Pin all Deployment-based components to specific node types. This is a convenience setting\nthat automatically configures both nodeSelector and tolerations with predefined values.\nUse this for common scenarios like running on OpenShift infrastructure nodes.\nFor custom node selection, use the explicit nodeSelector and tolerations fields instead.\nCannot be used together with nodeSelector or tolerations fields.\nThe default is: None." + }, + { + "path": "customize.deploymentDefaults.nodeSelector", + "displayName": "Node Selector", + "description": "Default nodeSelector applied to all Deployment-based components. Use this for custom node\nselection criteria.\nCannot be used together with pinToNodes." + }, + { + "path": "customize.deploymentDefaults.tolerations", + "displayName": "Tolerations", + "description": "Default tolerations applied to all Deployment-based components. Use this when your target\nnodes have custom taints that pods must tolerate.\nCannot be used together with pinToNodes." + }, + { + "path": "imagePullSecrets[0].name", + "displayName": "Name", + "description": "The name of the referenced secret.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:Secret" + ] + }, + { + "path": "misc.createSCCs", + "displayName": "Create SecurityContextConstraints for Operand", + "description": "Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "monitoring.openshift.enabled", + "displayName": "Enabled", + "description": "The default is: true.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" + ] + }, + { + "path": "network.policies", + "displayName": "Network Policies", + "description": "To provide security at the network level, the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled." + }, + { + "path": "overlays[0].apiVersion", + "displayName": "API Version", + "description": "Resource API version." + }, + { + "path": "overlays[0].kind", + "displayName": "Kind", + "description": "Resource kind." + }, + { + "path": "overlays[0].name", + "displayName": "Name", + "description": "Name of resource." + }, + { + "path": "overlays[0].optional", + "displayName": "Optional", + "description": "Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown." + }, + { + "path": "overlays[0].patches", + "displayName": "Patches", + "description": "List of patches to apply to resource." + }, + { + "path": "overlays[0].patches[0].path", + "displayName": "Path", + "description": "Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist." + }, + { + "path": "overlays[0].patches[0].value", + "displayName": "Value", + "description": "Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema." + }, + { + "path": "overlays[0].patches[0].verbatim", + "displayName": "Verbatim", + "description": "Verbatim value to add, delete or replace.\nSame as Value, but the content is not interpreted as YAML and is treated as a literal string instead.\nAt least one of Value and Verbatim must be empty." + }, + { + "path": "perNode.collector", + "displayName": "Collector Settings", + "description": "Settings for the Collector container, which is responsible for collecting process and networking\nactivity at the host level." + }, + { + "path": "perNode.compliance", + "displayName": "Compliance Settings", + "description": "Settings for the Compliance container, which is responsible for checking host-level configurations." + }, + { + "path": "perNode.nodeInventory", + "displayName": "Node Scanning Settings", + "description": "Settings for the Node-Inventory container, which is responsible for scanning the Nodes' filesystem." + }, + { + "path": "perNode.fileActivityMonitoring", + "displayName": "File Activity Monitoring Settings", + "description": "Settings for the File Activity Monitoring container, which is responsible for monitoring file operations on the Node." + }, + { + "path": "perNode.taintToleration", + "displayName": "Taint Toleration", + "description": "To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security\nwill run services on every node in the cluster, including tainted nodes by default. If you do\nnot want this behavior, please select 'AvoidTaints' here.\nThe default is: TolerateTaints." + }, + { + "path": "perNode.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, + { + "path": "perNode.collector.collection", + "displayName": "Collection", + "description": "The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in this section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.\nThe default is: CORE_BPF.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:select:CORE_BPF", + "urn:alm:descriptor:com.tectonic.ui:select:NoCollection" + ] + }, + { + "path": "perNode.collector.imageFlavor", + "displayName": "Image Flavor", + "description": "Obsolete field.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "perNode.collector.forceCollection", + "displayName": "Force Collection", + "description": "Obsolete field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "perNode.collector.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "perNode.compliance.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "perNode.fileActivityMonitoring.mode", + "displayName": "Mode", + "description": "Specifies whether File Activity Monitoring is deployed.\nThe default is: Disabled.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:select:Enabled", + "urn:alm:descriptor:com.tectonic.ui:select:Disabled" + ] + }, + { + "path": "perNode.fileActivityMonitoring.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "perNode.nodeInventory.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "processBaselines.autoLock", + "displayName": "Auto Lock", + "description": "Should process baselines be automatically locked when the observation period (1 hour by default) ends.\nThe default is: Disabled.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:select:Enabled", + "urn:alm:descriptor:com.tectonic.ui:select:Disabled" + ] + }, + { + "path": "scanner.scannerComponent", + "displayName": "Scanner Component", + "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended).\nIf you do so, all the settings in this section will have no effect.\nThe default is: AutoSense." + }, + { + "path": "scanner.analyzer", + "displayName": "Analyzer", + "description": "Settings pertaining to the analyzer deployment, such as for autoscaling." + }, + { + "path": "scanner.db", + "displayName": "DB", + "description": "Settings pertaining to the database used by the Red Hat Advanced Cluster Security Scanner." + }, + { + "path": "scanner.analyzer.scaling", + "displayName": "Scaling", + "description": "Controls the number of analyzer replicas and autoscaling." + }, + { + "path": "scanner.analyzer.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scanner.analyzer.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + }, + { + "path": "scanner.analyzer.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scanner.analyzer.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, + { + "path": "scanner.analyzer.scaling.autoScaling", + "displayName": "Autoscaling", + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." + }, + { + "path": "scanner.analyzer.scaling.replicas", + "displayName": "Default Replicas", + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." + }, + { + "path": "scanner.analyzer.scaling.minReplicas", + "displayName": "Autoscaling Minimum Replicas", + "description": "The default is: 2.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scanner.analyzer.scaling.maxReplicas", + "displayName": "Autoscaling Maximum Replicas", + "description": "The default is: 5.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scanner.db.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scanner.db.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + }, + { + "path": "scanner.db.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scanner.db.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, + { + "path": "scannerV4.scannerComponent", + "displayName": "Scanner V4 component", + "description": "If you want to enable the Scanner V4 component set this to \"AutoSense\".\nA value of \"AutoSense\" means that Scanner V4 should be installed,\nunless there is a Central resource in the same namespace.\nIn that case typically a central Scanner V4 will be deployed as a component of Central.\nA value of \"Disabled\" means that Scanner V4 should not be installed.\nIf this field is not specified or set to \"Default\", the following defaulting takes place:\n* for upgrades to 4.8 from previous releases, the default is: Disabled;\n* for new installations starting with ACS 4.8, the default is: AutoSense." + }, + { + "path": "scannerV4.indexer", + "displayName": "Indexer", + "description": "Settings pertaining to the indexer deployment.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" + ] + }, + { + "path": "scannerV4.db", + "displayName": "DB", + "description": "Settings pertaining to the DB deployment.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" + ] + }, + { + "path": "scannerV4.monitoring", + "displayName": "Monitoring", + "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" + ] + }, + { + "path": "scannerV4.db.persistence", + "displayName": "Persistence", + "description": "Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." + }, + { + "path": "scannerV4.db.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scannerV4.db.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + }, + { + "path": "scannerV4.db.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scannerV4.db.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim", + "displayName": "Persistent volume claim", + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users." + }, + { + "path": "scannerV4.db.persistence.hostPath", + "displayName": "Host path", + "description": "Stores persistent data in a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view)." + }, + { + "path": "scannerV4.db.persistence.hostPath.path", + "displayName": "Path", + "description": "The path on the host running Central." + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", + "displayName": "Claim Name", + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db." + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.size", + "displayName": "Size", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:text" + ] + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.storageClassName", + "displayName": "Storage Class", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:StorageClass" + ] + }, + { + "path": "scannerV4.indexer.scaling", + "displayName": "Scaling", + "description": "Controls the number of replicas and autoscaling for this component." + }, + { + "path": "scannerV4.indexer.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scannerV4.indexer.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + }, + { + "path": "scannerV4.indexer.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scannerV4.indexer.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, + { + "path": "scannerV4.indexer.scaling.autoScaling", + "displayName": "Autoscaling", + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." + }, + { + "path": "scannerV4.indexer.scaling.replicas", + "displayName": "Default Replicas", + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." + }, + { + "path": "scannerV4.indexer.scaling.minReplicas", + "displayName": "Autoscaling Minimum Replicas", + "description": "The default is: 2.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.indexer.scaling.maxReplicas", + "displayName": "Autoscaling Maximum Replicas", + "description": "The default is: 5.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.monitoring.exposeEndpoint", + "displayName": "Expose Endpoint", + "description": "Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port." + }, + { + "path": "sensor.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "sensor.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + }, + { + "path": "sensor.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "sensor.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, + { + "path": "tls.additionalCAs", + "displayName": "Additional CAs", + "description": "Allows you to specify additional trusted Root CAs." + } + ] + }, + { + "name": "securitypolicies.config.stackrox.io", + "version": "v1alpha1", + "kind": "SecurityPolicy", + "displayName": "Security Policy", + "description": "SecurityPolicy is the schema for the policies API.", + "resources": [ + { + "name": "", + "kind": "Deployment", + "version": "v1" + } + ] + } + ] + }, + "description": "## Why use Red Hat Advanced Cluster Security for Kubernetes?\n\nProtecting cloud-native applications requires significant changes in how we approach security—we must apply controls earlier in the application development life cycle, use the infrastructure itself to apply controls, and keep up with increasingly rapid release schedules.\n\n\nRed Hat® Advanced Cluster Security for Kubernetes, powered by StackRox technology, protects your vital applications across build, deploy, and runtime. Our software deploys in your infrastructure and integrates with your DevOps tooling and workflows to deliver better security and compliance. The policy engine includes hundreds of built-in controls to enforce DevOps and security best practices, industry standards such as CIS Benchmarks and National Institute of Standards Technology (NIST) guidelines, configuration management of both containers and Kubernetes, and runtime security.\n\nRed Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize security.\n\n## Features and Benefits\n\n**Kubernetes-native security:**\n1. Increases protection.\n1. Eliminates blind spots, providing staff with insights into critical vulnerabilities and threat vectors.\n1. Reduces time and costs.\n1. Reduces the time and effort needed to implement security and streamlines security analysis, investigation, and remediation using the rich context Kubernetes provides.\n1. Increases scalability and portability.\n1. Provides scalability and resiliency native to Kubernetes, avoiding operational conflict and complexity that can result from out-of-band security controls.\n\n## Using the RHACS Operator\n\n**RHACS Operator channels:**\n\nRed Hat provides the RHACS Operator by using the following update channels in the Red Hat Operator catalog:\n\n* `stable`: Provides the most recent version and patches to the most recent version.\n Using the `stable` channel and configuring automatic operator upgrades ensures that the most recent RHACS version is deployed.\n* `rhacs-x.yy` (for example, `rhacs-3.74`): Channels follow a specific RHACS version and include all patches to that version (e.g. `3.74.0`, `3.74.1`, ...).\n\nNote that the `latest` channel is deprecated and is not updated after RHACS version 3.74. Newer versions are published to the `stable` channel.\n\n**RHACS comes with two custom resources:**\n\n1. **Central Services** - Central is a deployment required on only one cluster in your environment. Users interact with RHACS via the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. Users may select exposures for Central that best meet their environment.\n\n2. **Secured Cluster Services** - Secured cluster services are placed on each cluster you manage and report back to Central. These services allow users to enforce policies and monitor your OpenShift and Kubernetes clusters. Secured Cluster Services come as two Deployments (Sensor and Admission Controller) and one DaemonSet (Collector).\n\n**Console Plugin (Tech Preview):** RHACS provides a dynamic plugin that displays vulnerability management information in the OpenShift web console. Install a SecuredCluster to deploy the plugin. Enable the plugin by selecting *Operators* > *Installed Operators* or by modifying the console Operator configuration.\n**Important:** The Console Plugin requires OpenShift 4.19 or later.\n\n### Central Services Explained\n\n| Service | Deployment Type | Description |\n| :------------------------------- | :-------------- | :-------------- |\n| Central | Deployment | Users interact with Red Hat Advanced Cluster Security through the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. |\n| Central DB | Deployment | Central DB is a PostgreSQL-based persistent storage for the data collected and managed by Central. |\n| Scanner | Deployment | Scanner is a Red Hat developed and certified image scanner. Scanner analyzes and reports vulnerabilities for images. Scanner uses HPA to scale the number of replicas based on workload. |\n| Scanner DB | Deployment | Scanner DB is a cache for vulnerability definitions to serve vulnerability scanning use cases throughout the software development life cycle. |\n\n### Secured Cluster Services Explained\n\n| Service | Deployment Type | Description |\n| :------------------------------- | :-------------- | :-------------- |\n| Sensor | Deployment | Sensor analyzes and monitors Kubernetes in secured clusters. |\n| Collector | DaemonSet | Analyzes and monitors container activity on Kubernetes nodes.|\n| Admission Controller | Deployment | ValidatingWebhookConfiguration for enforcing policies in the deploy lifecycle. |\n\n### Central Custom Resource\n\nCentral Services is the configuration template for RHACS Central deployment. For all customization options, please visit the RHACS documentation.\n\n### SecuredCluster Custom Resource\n\nSecuredCluster is the configuration template for the RHACS Secured Cluster services.\n\n#### Installation Prerequisites\n\nBefore deploying a SecuredCluster resource, you need to create a cluster init bundle secret.\n\n- **Through the RHACS UI:** To create a cluster init bundle secret through the RHACS UI, navigate to `Platform Configuration > Clusters`, and then click `Manage Tokens` in the top-right corner. Select `Cluster Init Bundle`, and click `Generate Bundle`. Select `Download Kubernetes secrets file`, and store the file under a name of your choice (for example, `cluster-init-secrets.yaml`).\n- **Through the `roxctl` CLI:** To create a cluster init bundle secret through the `roxctl` command-line interface, run `roxctl central init-bundles generate --output-secrets `. Choose any `name` and `file name` that you like.\n\nRun `oc project` and check that it reports the correct namespace where you intend to deploy SecuredCluster. In case you want to install SecuredCluster to a different namespace, select it by running `oc project `.\nThen, run `oc create -f init-bundle.yaml`. If you have chosen a name other than `init-bundle.yaml`, specify that file name instead.\n\n#### Required Fields\n\nThe following attributes are required to be specified. For all customization options, please visit the RHACS documentation.\n\n| Parameter | Description |\n| :----------------- | :-------------- |\n| `clusterName` | The name given to this secured cluster. The cluster will appear with this name in RHACS user interface. |\n| `centralEndpoint` | This field should specify the address of the Central endpoint, including the port number. `centralEndpoint` may be omitted if this SecuredCluster Custom Resource is in the same cluster and namespace as Central. |\n", + "displayName": "Advanced Cluster Security for Kubernetes", + "installModes": [ + { + "type": "OwnNamespace", + "supported": false + }, + { + "type": "SingleNamespace", + "supported": false + }, + { + "type": "MultiNamespace", + "supported": false + }, + { + "type": "AllNamespaces", + "supported": true + } + ], + "keywords": [ + "advanced-cluster-security", + "stackrox", + "security", + "vulnerabilities", + "compliance", + "devsecops", + "monitoring", + "scanning", + "runtime-security", + "network policy", + "configuration", + "risk" + ], + "labels": { + "operatorframework.io/arch.amd64": "supported", + "operatorframework.io/arch.arm64": "supported", + "operatorframework.io/arch.ppc64le": "supported", + "operatorframework.io/arch.s390x": "supported" + }, + "links": [ + { + "name": "Red Hat Advanced Cluster Security Documentation", + "url": "https://docs.openshift.com/acs/welcome/" + }, + { + "name": "DataSheet", + "url": "https://www.redhat.com/en/resources/advanced-cluster-security-for-kubernetes-datasheet" + }, + { + "name": "Support Policy", + "url": "https://access.redhat.com/node/5822721" + }, + { + "name": "Community Site", + "url": "https://www.stackrox.io/" + } + ], + "maintainers": [ + { + "name": "Advanced Cluster Security product team", + "email": "rhacs-pm@redhat.com" + } + ], + "maturity": "alpha", + "minKubeVersion": "1.15.0", + "provider": { + "name": "Red Hat" + } + } + } + ], + "relatedImages": [ + { + "name": "central_db", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9280902d31fe515efeb26cc346d019894ebd0b678adc33585084f5783201fa0a" + }, + { + "name": "collector", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:189de9892aa3cf5edd881fef4409715119d015a8e594f66bf4abc306c548075d" + }, + { + "name": "fact", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-fact-rhel8@sha256:79d23bcdc6b009d22859b63c27a503fff8f0c44bf2dec9ed7841a497d630197b" + }, + { + "name": "main", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:41b2490ed442c7c6e8dff959223b55d6306b7cadb4ef40f014c802bfb9aedc43" + }, + { + "name": "", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1b1480e72310d6ec17c4dd4368214cd940a4da230b13304f4621c5ae560f9e9e" + }, + { + "name": "manager", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2205a04f297fa92b157e36ff3e6994dc88c041b291193bd7d03b3f033910b2fe" + }, + { + "name": "roxctl", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:26d3a03be4e87deb29b7c1d4bb3b6f428338629312a678184ba256e1526126b6" + }, + { + "name": "scanner_db", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6cc97529c4474e068158150f489bed91179289dae481b408ccf30c7285653e79" + }, + { + "name": "scanner_db_slim", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6af90becfb85161e72f52f98aae545a1d66c36bdcc8fb1c64c2e3d5207db91e0" + }, + { + "name": "scanner", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9183f498b1eefb0a75a96ad0aca4b0218f4ab7d0b3464b759ea1fb2a390ab25a" + }, + { + "name": "scanner_slim", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cb9fbe92c8de52dfea21502c2646cf82cd9ca50b4a08b980acf674c0adec39bd" + }, + { + "name": "scanner_v4_db", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5b2d2a20c0a61f402ae2148f4111224b1ad01494a73eb8e44b49a04ba0baa87f" + }, + { + "name": "scanner_v4", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:856f87371c8a528629df7a15db703bc04c73850f81946bc640cdd7d8868541f6" + } + ] +} +{ + "schema": "olm.bundle", + "name": "rhacs-operator.v4.2.0", + "package": "rhacs-operator", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:de3b2e28150c6428864fe8dd7ef325b806bc9e9881d883ba3335e00b6593618c", + "properties": [ + { + "type": "olm.gvk", + "value": { + "group": "platform.stackrox.io", + "kind": "Central", + "version": "v1alpha1" + } + }, + { + "type": "olm.gvk", + "value": { + "group": "platform.stackrox.io", + "kind": "SecuredCluster", + "version": "v1alpha1" + } + }, + { + "type": "olm.package", + "value": { + "packageName": "rhacs-operator", + "version": "4.2.0" + } + }, + { + "type": "olm.csv.metadata", + "value": { + "annotations": { + "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", + "capabilities": "Seamless Upgrades", + "categories": "Security", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992", + "createdAt": "2023-09-12T01:02:34.540467+00:00", + "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", + "olm.skipRange": ">= 4.1.0 < 4.2.0", + "operatorframework.io/suggested-namespace": "rhacs-operator", + "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", + "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", + "operators.operatorframework.io/builder": "operator-sdk-unknown", + "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3", + "support": "Red Hat" + }, + "apiServiceDefinitions": {}, + "crdDescriptions": { + "owned": [ + { + "name": "centrals.platform.stackrox.io", + "version": "v1alpha1", + "kind": "Central", + "displayName": "Central", + "description": "Central is the configuration template for the central services. This includes the API server, persistent storage, and the web UI, as well as the image scanner.", + "resources": [ + { + "name": "", + "kind": "Deployment", + "version": "v1" + }, + { + "name": "", + "kind": "Route", + "version": "v1" + }, + { + "name": "", + "kind": "Secret", + "version": "v1" + }, + { + "name": "", + "kind": "Service", + "version": "v1" + } + ], + "statusDescriptors": [ + { + "path": "central.adminPassword.info", + "displayName": "Admin Credentials Info", + "description": "Info stores information on how to obtain the admin password." + }, + { + "path": "productVersion", + "displayName": "Product Version", + "description": "The deployed version of the product." + }, + { + "path": "central", + "displayName": "Central" + }, + { + "path": "central.adminPassword.adminPasswordSecretReference", + "displayName": "Admin Password Secret Reference", + "description": "AdminPasswordSecretReference contains reference for the admin password", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:Secret" + ] + } + ], + "specDescriptors": [ + { + "path": "central", + "displayName": "Central Component Settings", + "description": "Settings for the Central component, which is responsible for all user interaction." + }, + { + "path": "scanner", + "displayName": "Scanner Component Settings", + "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container images." + }, + { + "path": "egress", + "displayName": "Egress", + "description": "Settings related to outgoing network traffic." + }, + { + "path": "tls", + "displayName": "TLS", + "description": "Allows you to specify additional trusted Root CAs." + }, + { + "path": "imagePullSecrets", + "displayName": "Image Pull Secrets", + "description": "Additional image pull secrets to be taken into account for pulling images.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "customize", + "displayName": "Customizations", + "description": "Customizations to apply on all Central Services components.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "misc", + "displayName": "Miscellaneous", + "description": "Miscellaneous settings.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "overlays", + "displayName": "Overlays", + "description": "Overlays", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "monitoring", + "displayName": "Monitoring", + "description": "Monitoring configuration.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "central.adminPasswordSecret", + "displayName": "Administrator Password", + "description": "Specify a secret that contains the administrator password in the \"password\" data item. If omitted, the operator will auto-generate a password and store it in the \"password\" item in the \"central-htpasswd\" secret." + }, + { + "path": "central.exposure", + "displayName": "Exposure", + "description": "Here you can configure if you want to expose central through a node port, a load balancer, or an OpenShift route." + }, + { + "path": "central.defaultTLSSecret", + "displayName": "User-facing TLS certificate secret", + "description": "By default, Central will only serve an internal TLS certificate, which means that you will need to handle TLS termination at the ingress or load balancer level. If you want to terminate TLS in Central and serve a custom server certificate, you can specify a secret containing the certificate and private key here." + }, + { + "path": "central.monitoring", + "displayName": "Monitoring", + "description": "Configures monitoring endpoint for Central. The monitoring endpoint allows other services to collect metrics from Central, provided in Prometheus compatible format." + }, + { + "path": "central.persistence", + "displayName": "Persistence", + "description": "Configures how Central should store its persistent data. You can choose between using a persistent volume claim (recommended default), and a host path." + }, + { + "path": "central.db", + "displayName": "Central DB Settings", + "description": "Settings for Central DB, which is responsible for data persistence." + }, + { + "path": "central.telemetry", + "displayName": "Telemetry", + "description": "Configures telemetry settings for Central. If enabled, Central transmits telemetry and diagnostic data to a remote storage backend.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "central.declarativeConfiguration", + "displayName": "Declarative Configuration", + "description": "Configures resources within Central in a declarative manner.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "central.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "central.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "central.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "central.adminPasswordGenerationDisabled", + "displayName": "Admin Password Generation Disabled", + "description": "Disable admin password generation. Do not use this for first-time installations, as you will have no way to perform initial setup and configuration of alternative authentication methods.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "central.adminPasswordSecret.name", + "displayName": "Name", + "description": "The name of the referenced secret.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:Secret" + ] + }, + { + "path": "central.db.passwordSecret", + "displayName": "Administrator Password", + "description": "Specify a secret that contains the password in the \"password\" data item. This can only be used when specifying a connection string manually. When omitted, the operator will auto-generate a DB password and store it in the \"password\" item in the \"central-db-password\" secret." + }, + { + "path": "central.db.connectionString", + "displayName": "Connection String (Technology Preview)", + "description": "NOTE: Connecting to an external database is in Technology Preview. Specify a connection string that corresponds to an external database. If set, the operator will not manage Central DB. When using this option, you must explicitly set a password secret; automatically generating a password will not be supported." + }, + { + "path": "central.db.persistence", + "displayName": "Persistence", + "description": "Configures how Central DB should store its persistent data. You can choose between using a persistent volume claim (recommended default), and a host path." + }, + { + "path": "central.db.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "central.db.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "central.db.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "central.db.configOverride", + "displayName": "Config map that will override postgresql.conf and pg_hba.conf", + "description": "Config map containing postgresql.conf and pg_hba.conf that will be used if modifications need to be applied." + }, + { + "path": "central.db.isEnabled", + "displayName": "Is Enabled", + "description": "Deprecated field. It is no longer necessary to specify it. This field will be removed in a future release. Central is configured to use PostgreSQL by default.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "central.db.configOverride.name", + "displayName": "Name", + "description": "The name of the referenced config map.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:ConfigMap" + ] + }, + { + "path": "central.db.passwordSecret.name", + "displayName": "Name", + "description": "The name of the referenced secret.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:Secret" + ] + }, + { + "path": "central.db.persistence.persistentVolumeClaim", + "displayName": "Persistent volume claim", + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + }, + { + "path": "central.db.persistence.hostPath", + "displayName": "Host path", + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + }, + { + "path": "central.db.persistence.hostPath.path", + "displayName": "Path", + "description": "The path on the host running Central." + }, + { + "path": "central.db.persistence.persistentVolumeClaim.claimName", + "displayName": "Claim Name", + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"central-db\" if not set." + }, + { + "path": "central.db.persistence.persistentVolumeClaim.size", + "displayName": "Size", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:text" + ] + }, + { + "path": "central.db.persistence.persistentVolumeClaim.storageClassName", + "displayName": "Storage Class", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:StorageClass" + ] + }, + { + "path": "central.declarativeConfiguration.configMaps", + "displayName": "Config maps containing declarative configuration", + "description": "List of config maps containing declarative configuration." + }, + { + "path": "central.declarativeConfiguration.secrets", + "displayName": "Secrets containing declarative configuration", + "description": "List of secrets containing declarative configuration." + }, + { + "path": "central.declarativeConfiguration.configMaps[0].name", + "displayName": "Name", + "description": "The name of the referenced config map.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:ConfigMap" + ] + }, + { + "path": "central.declarativeConfiguration.secrets[0].name", + "displayName": "Name", + "description": "The name of the referenced secret.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:Secret" + ] + }, + { + "path": "central.defaultTLSSecret.name", + "displayName": "Name", + "description": "The name of the referenced secret.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:Secret" + ] + }, + { + "path": "central.exposure.route", + "displayName": "Route", + "description": "Expose Central through an OpenShift route." + }, + { + "path": "central.exposure.loadBalancer", + "displayName": "Load Balancer", + "description": "Expose Central through a load balancer service." + }, + { + "path": "central.exposure.nodePort", + "displayName": "Node Port", + "description": "Expose Central through a node port." + }, + { + "path": "central.exposure.loadBalancer.enabled", + "displayName": "Enabled" + }, + { + "path": "central.exposure.loadBalancer.port", + "displayName": "Port", + "description": "Defaults to 443 if not set.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.exposure.loadBalancer.enabled:true" + ] + }, + { + "path": "central.exposure.loadBalancer.ip", + "displayName": "IP", + "description": "If you have a static IP address reserved for your load balancer, you can enter it here.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.exposure.loadBalancer.enabled:true" + ] + }, + { + "path": "central.exposure.nodePort.enabled", + "displayName": "Enabled" + }, + { + "path": "central.exposure.nodePort.port", + "displayName": "Port", + "description": "Use this to specify an explicit node port. Most users should leave this empty.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.exposure.nodePort.enabled:true" + ] + }, + { + "path": "central.exposure.route.enabled", + "displayName": "Enabled" + }, + { + "path": "central.exposure.route.host", + "displayName": "Host", + "description": "Specify a custom hostname for the central route. If unspecified, an appropriate default value will be automatically chosen by OpenShift route operator." + }, + { + "path": "central.monitoring.exposeEndpoint", + "displayName": "Expose Endpoint", + "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + }, + { + "path": "central.persistence.persistentVolumeClaim", + "displayName": "Persistent volume claim", + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + }, + { + "path": "central.persistence.hostPath", + "displayName": "Host path", + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + }, + { + "path": "central.persistence.hostPath.path", + "displayName": "Path", + "description": "The path on the host running Central." + }, + { + "path": "central.persistence.persistentVolumeClaim.claimName", + "displayName": "Claim Name", + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"stackrox-db\" if not set." + }, + { + "path": "central.persistence.persistentVolumeClaim.size", + "displayName": "Size", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:text" + ] + }, + { + "path": "central.persistence.persistentVolumeClaim.storageClassName", + "displayName": "Storage Class", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:StorageClass" + ] + }, + { + "path": "central.telemetry.enabled", + "displayName": "Enabled", + "description": "Specifies if Telemetry is enabled.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" + ] + }, + { + "path": "central.telemetry.storage", + "displayName": "Storage", + "description": "Defines the telemetry storage backend for Central.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.telemetry.enabled:true" + ] + }, + { + "path": "central.telemetry.storage.endpoint", + "displayName": "Endpoint", + "description": "Storage API endpoint." + }, + { + "path": "central.telemetry.storage.key", + "displayName": "Key", + "description": "Storage API key. If not set, telemetry is disabled." + }, + { + "path": "customize.labels", + "displayName": "Labels", + "description": "Custom labels to set on all managed objects." + }, + { + "path": "customize.annotations", + "displayName": "Annotations", + "description": "Custom annotations to set on all managed objects." + }, + { + "path": "customize.envVars", + "displayName": "Environment Variables", + "description": "Custom environment variables to set on managed pods' containers." + }, + { + "path": "egress.connectivityPolicy", + "displayName": "Connectivity Policy", + "description": "Configures whether Red Hat Advanced Cluster Security should run in online or offline (disconnected) mode. In offline mode, automatic updates of vulnerability definitions and kernel modules are disabled." + }, + { + "path": "imagePullSecrets[0].name", + "displayName": "Name", + "description": "The name of the referenced secret.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:Secret" + ] + }, + { + "path": "misc.createSCCs", + "displayName": "Create SecurityContextConstraints for Operand", + "description": "Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads." + }, + { + "path": "monitoring.openshift.enabled", + "displayName": "Enabled", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" + ] + }, + { + "path": "overlays[0].apiVersion", + "displayName": "API Version", + "description": "Resource API version." + }, + { + "path": "overlays[0].kind", + "displayName": "Kind", + "description": "Resource kind." + }, + { + "path": "overlays[0].name", + "displayName": "Name", + "description": "Name of resource." + }, + { + "path": "overlays[0].patches", + "displayName": "Patches", + "description": "List of patches to apply to resource." + }, + { + "path": "overlays[0].patches[0].path", + "displayName": "Path", + "description": "Path of the form a.[key1:value1].b.[:value2] Where [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value selector to identify a list element in a leaf list. All path intermediate nodes must exist." + }, + { + "path": "overlays[0].patches[0].value", + "displayName": "Value", + "description": "Value to add, delete or replace. For add, the path should be a new leaf. For delete, value should be unset. For replace, path should reference an existing node. All values are strings but are converted into appropriate type based on schema." + }, + { + "path": "scanner.scannerComponent", + "displayName": "Scanner Component", + "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here (not recommended). By default, the scanner is enabled. If you do so, all the settings in this section will have no effect." + }, + { + "path": "scanner.analyzer", + "displayName": "Analyzer", + "description": "Settings pertaining to the analyzer deployment, such as for autoscaling.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.scannerComponent:Enabled" + ] + }, + { + "path": "scanner.db", + "displayName": "DB", + "description": "Settings pertaining to the database used by the Red Hat Advanced Cluster Security Scanner.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.scannerComponent:Enabled" + ] + }, + { + "path": "scanner.monitoring", + "displayName": "Monitoring", + "description": "Configures monitoring endpoint for Scanner. The monitoring endpoint allows other services to collect metrics from Scanner, provided in Prometheus compatible format." + }, + { + "path": "scanner.analyzer.scaling", + "displayName": "Scaling", + "description": "Controls the number of analyzer replicas and autoscaling." + }, + { + "path": "scanner.analyzer.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scanner.analyzer.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "scanner.analyzer.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scanner.analyzer.scaling.autoScaling", + "displayName": "Autoscaling", + "description": "When enabled, the number of analyzer replicas is managed dynamically based on the load, within the limits specified below." + }, + { + "path": "scanner.analyzer.scaling.replicas", + "displayName": "Default Replicas", + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + }, + { + "path": "scanner.analyzer.scaling.minReplicas", + "displayName": "Autoscaling Minimum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scanner.analyzer.scaling.maxReplicas", + "displayName": "Autoscaling Maximum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scanner.db.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scanner.db.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "scanner.db.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scanner.monitoring.exposeEndpoint", + "displayName": "Expose Endpoint", + "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + }, + { + "path": "tls.additionalCAs", + "displayName": "Additional CAs" + } + ] + }, + { + "name": "securedclusters.platform.stackrox.io", + "version": "v1alpha1", + "kind": "SecuredCluster", + "displayName": "Secured Cluster", + "description": "SecuredCluster is the configuration template for the secured cluster services. These include Sensor, which is responsible for the connection to Central, and Collector, which performs host-level collection of process and network events.

**Important:** Please see the _Installation Prerequisites_ on the main RHACS operator page before deploying, or consult the RHACS documentation on creating cluster init bundles.", + "resources": [ + { + "name": "", + "kind": "DaemonSet", + "version": "v1" + }, + { + "name": "", + "kind": "Deployment", + "version": "v1" + } + ], + "statusDescriptors": [ + { + "path": "productVersion", + "displayName": "Product Version", + "description": "The deployed version of the product." + }, + { + "path": "clusterName", + "displayName": "Cluster Name", + "description": "The assigned cluster name per the spec. This cannot be changed afterwards. If you need to change the cluster name, please delete and recreate this resource." + } + ], + "specDescriptors": [ + { + "path": "clusterName", + "displayName": "Cluster Name", + "description": "The unique name of this cluster, as it will be shown in the Red Hat Advanced Cluster Security UI. Note: Once a name is set here, you will not be able to change it again. You will need to delete and re-create this object in order to register a cluster with a new name." + }, + { + "path": "centralEndpoint", + "displayName": "Central Endpoint", + "description": "The endpoint of the Red Hat Advanced Cluster Security Central instance to connect to, including the port number. If using a non-gRPC capable load balancer, use the WebSocket protocol by prefixing the endpoint address with wss://. Note: when leaving this blank, Sensor will attempt to connect to a Central instance running in the same namespace." + }, + { + "path": "sensor", + "displayName": "Sensor Settings", + "description": "Settings for the Sensor component." + }, + { + "path": "admissionControl", + "displayName": "Admission Control Settings", + "description": "Settings for the Admission Control component, which is necessary for preventive policy enforcement, and for Kubernetes event monitoring." + }, + { + "path": "perNode", + "displayName": "Per Node Settings", + "description": "Settings for the components running on each node in the cluster (Collector and Compliance)." + }, + { + "path": "auditLogs", + "displayName": "Kubernetes Audit Logs Ingestion Settings", + "description": "Settings relating to the ingestion of Kubernetes audit logs." + }, + { + "path": "scanner", + "displayName": "Scanner Component Settings", + "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container images stored in a cluster-local image repository." + }, + { + "path": "tls", + "displayName": "TLS", + "description": "Allows you to specify additional trusted Root CAs." + }, + { + "path": "imagePullSecrets", + "displayName": "Image Pull Secrets", + "description": "Additional image pull secrets to be taken into account for pulling images.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "customize", + "displayName": "Customizations", + "description": "Customizations to apply on all Central Services components.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "misc", + "displayName": "Miscellaneous", + "description": "Miscellaneous settings.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "overlays", + "displayName": "Overlays", + "description": "Overlays", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "monitoring", + "displayName": "Monitoring", + "description": "Monitoring configuration.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "registryOverride", + "displayName": "Custom Default Image Registry", + "description": "Set this parameter to override the default registry in images. For example, nginx:latest -> /library/nginx:latest", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "admissionControl.listenOnCreates", + "displayName": "Listen On Creates", + "description": "Set this to 'true' to enable preventive policy enforcement for object creations." }, { - "path": "misc", - "displayName": "Miscellaneous", - "description": "Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] + "path": "admissionControl.listenOnUpdates", + "displayName": "Listen On Updates", + "description": "Set this to 'true' to enable preventive policy enforcement for object updates. \n Note: this will not have any effect unless 'Listen On Creates' is set to 'true' as well." }, { - "path": "admissionControl.enforcement", - "displayName": "Enforcement", - "description": "Set to Disabled to disable policy enforcement for the admission controller. This is not recommended.\nOn upgrades to 4.9 from previous releases, defaults to Enabled only if at least one of listenOnCreates or listenOnUpdates is true.\nOn new deployments starting with version 4.9, the default is: Enabled." + "path": "admissionControl.listenOnEvents", + "displayName": "Listen On Events", + "description": "Set this to 'true' to enable monitoring and enforcement for Kubernetes events (port-forward and exec)." }, { - "path": "admissionControl.bypass", - "displayName": "Bypass", - "description": "Enables teams to bypass admission control in a monitored manner in the event of an emergency.\nThe default is: BreakGlassAnnotation." + "path": "admissionControl.contactImageScanners", + "displayName": "Contact Image Scanners", + "description": "Should inline scanning be performed on previously unscanned images during a deployments admission review." }, { - "path": "admissionControl.failurePolicy", - "displayName": "Failure Policy", - "description": "If set to \"Fail\", the admission controller's webhooks are configured to fail-closed in case admission controller\nfails to respond in time. A failure policy \"Ignore\" configures the webhooks to fail-open.\nThe default is: Ignore." + "path": "admissionControl.timeoutSeconds", + "displayName": "Timeout Seconds", + "description": "Maximum timeout period for admission review, upon which admission review will fail open. Use it to set request timeouts when you enable inline image scanning. The default kubectl timeout is 30 seconds; taking padding into account, this should not exceed 25 seconds." + }, + { + "path": "admissionControl.bypass", + "displayName": "Bypass", + "description": "Enables teams to bypass admission control in a monitored manner in the event of an emergency." }, { "path": "admissionControl.replicas", "displayName": "Replicas", - "description": "The number of replicas of the admission control pod.\nThe default is: 3." + "description": "The number of replicas of the admission control pod." }, { "path": "admissionControl.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -61600,65 +63163,20 @@ { "path": "admissionControl.nodeSelector", "displayName": "Node Selector", - "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." }, { "path": "admissionControl.tolerations", "displayName": "Tolerations", - "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, - { - "path": "admissionControl.hostAliases", - "displayName": "Host Aliases", - "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." - }, - { - "path": "admissionControl.contactImageScanners", - "displayName": "Contact Image Scanners", - "description": "Deprecated field. This field will be removed in a future release.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] - }, - { - "path": "admissionControl.listenOnCreates", - "displayName": "Listen On Creates", - "description": "Deprecated field. This field will be removed in a future release.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] - }, - { - "path": "admissionControl.listenOnEvents", - "displayName": "Listen On Events", - "description": "Deprecated field. This field will be removed in a future release.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] - }, - { - "path": "admissionControl.listenOnUpdates", - "displayName": "Listen On Updates", - "description": "Deprecated field. This field will be removed in a future release.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] - }, - { - "path": "admissionControl.timeoutSeconds", - "displayName": "Timeout Seconds", - "description": "Deprecated field. This field will be removed in a future release.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] - }, { "path": "auditLogs.collection", "displayName": "Collection", - "description": "Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only\nsupported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error.\nUse the 'Auto' setting to enable it on compatible environments, and disable it elsewhere.\nThe default is: Auto." + "description": "Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only supported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error. Use the 'Auto' setting to enable it on compatible environments, and disable it elsewhere." }, { "path": "customize.labels", @@ -61675,26 +63193,6 @@ "displayName": "Environment Variables", "description": "Custom environment variables to set on managed pods' containers." }, - { - "path": "customize.deploymentDefaults", - "displayName": "Deployment Defaults", - "description": "Global nodeSelector and tolerations for Deployment-based components. DaemonSets (Collector) are not affected.\nComponent-level nodeSelector and tolerations settings override these defaults on a field-by-field basis." - }, - { - "path": "customize.deploymentDefaults.pinToNodes", - "displayName": "Pin To Nodes", - "description": "Pin all Deployment-based components to specific node types. This is a convenience setting\nthat automatically configures both nodeSelector and tolerations with predefined values.\nUse this for common scenarios like running on OpenShift infrastructure nodes.\nFor custom node selection, use the explicit nodeSelector and tolerations fields instead.\nCannot be used together with nodeSelector or tolerations fields.\nThe default is: None." - }, - { - "path": "customize.deploymentDefaults.nodeSelector", - "displayName": "Node Selector", - "description": "Default nodeSelector applied to all Deployment-based components. Use this for custom node\nselection criteria.\nCannot be used together with pinToNodes." - }, - { - "path": "customize.deploymentDefaults.tolerations", - "displayName": "Tolerations", - "description": "Default tolerations applied to all Deployment-based components. Use this when your target\nnodes have custom taints that pods must tolerate.\nCannot be used together with pinToNodes." - }, { "path": "imagePullSecrets[0].name", "displayName": "Name", @@ -61706,24 +63204,15 @@ { "path": "misc.createSCCs", "displayName": "Create SecurityContextConstraints for Operand", - "description": "Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] + "description": "Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads." }, { "path": "monitoring.openshift.enabled", "displayName": "Enabled", - "description": "The default is: true.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" ] }, - { - "path": "network.policies", - "displayName": "Network Policies", - "description": "To provide security at the network level, the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled." - }, { "path": "overlays[0].apiVersion", "displayName": "API Version", @@ -61739,11 +63228,6 @@ "displayName": "Name", "description": "Name of resource." }, - { - "path": "overlays[0].optional", - "displayName": "Optional", - "description": "Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown." - }, { "path": "overlays[0].patches", "displayName": "Patches", @@ -61752,22 +63236,17 @@ { "path": "overlays[0].patches[0].path", "displayName": "Path", - "description": "Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist." + "description": "Path of the form a.[key1:value1].b.[:value2] Where [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value selector to identify a list element in a leaf list. All path intermediate nodes must exist." }, { "path": "overlays[0].patches[0].value", "displayName": "Value", - "description": "Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema." - }, - { - "path": "overlays[0].patches[0].verbatim", - "displayName": "Verbatim", - "description": "Verbatim value to add, delete or replace.\nSame as Value, but the content is not interpreted as YAML and is treated as a literal string instead.\nAt least one of Value and Verbatim must be empty." + "description": "Value to add, delete or replace. For add, the path should be a new leaf. For delete, value should be unset. For replace, path should reference an existing node. All values are strings but are converted into appropriate type based on schema." }, { "path": "perNode.collector", "displayName": "Collector Settings", - "description": "Settings for the Collector container, which is responsible for collecting process and networking\nactivity at the host level." + "description": "Settings for the Collector container, which is responsible for collecting process and networking activity at the host level." }, { "path": "perNode.compliance", @@ -61779,26 +63258,17 @@ "displayName": "Node Scanning Settings", "description": "Settings for the Node-Inventory container, which is responsible for scanning the Nodes' filesystem." }, - { - "path": "perNode.fileActivityMonitoring", - "displayName": "File Activity Monitoring Settings", - "description": "Settings for the File Activity Monitoring container, which is responsible for monitoring file operations on the Node." - }, { "path": "perNode.taintToleration", "displayName": "Taint Toleration", - "description": "To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security\nwill run services on every node in the cluster, including tainted nodes by default. If you do\nnot want this behavior, please select 'AvoidTaints' here.\nThe default is: TolerateTaints." - }, - { - "path": "perNode.hostAliases", - "displayName": "Host Aliases", - "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + "description": "To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security will run services on every node in the cluster, including tainted nodes by default. If you do not want this behavior, please select 'AvoidTaints' here." }, { "path": "perNode.collector.collection", "displayName": "Collection", - "description": "The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in this section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.\nThe default is: CORE_BPF.", + "description": "The method for system-level data collection. EBPF is recommended. If you select \"NoCollection\", you will not be able to see any information about network activity and process executions. The remaining settings in these section will not have any effect.", "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:select:EBPF", "urn:alm:descriptor:com.tectonic.ui:select:CORE_BPF", "urn:alm:descriptor:com.tectonic.ui:select:NoCollection" ] @@ -61806,23 +63276,12 @@ { "path": "perNode.collector.imageFlavor", "displayName": "Image Flavor", - "description": "Obsolete field.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] - }, - { - "path": "perNode.collector.forceCollection", - "displayName": "Force Collection", - "description": "Obsolete field. This field will be removed in a future release.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:hidden" - ] + "description": "The image flavor to use for collector. \"Regular\" images are bigger in size, but contain probes for most kernels. If you use the \"Slim\" image flavor, you must ensure that your Central instance is connected to the internet, or regularly receives Collector Support Package updates (for further instructions, please refer to the documentation)." }, { "path": "perNode.collector.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -61830,24 +63289,7 @@ { "path": "perNode.compliance.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" - ] - }, - { - "path": "perNode.fileActivityMonitoring.mode", - "displayName": "Mode", - "description": "Specifies whether File Activity Monitoring is deployed.\nThe default is: Disabled.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:select:Enabled", - "urn:alm:descriptor:com.tectonic.ui:select:Disabled" - ] - }, - { - "path": "perNode.fileActivityMonitoring.resources", - "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -61855,24 +63297,15 @@ { "path": "perNode.nodeInventory.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] }, - { - "path": "processBaselines.autoLock", - "displayName": "Auto Lock", - "description": "Should process baselines be automatically locked when the observation period (1 hour by default) ends.\nThe default is: Disabled.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:select:Enabled", - "urn:alm:descriptor:com.tectonic.ui:select:Disabled" - ] - }, { "path": "scanner.scannerComponent", "displayName": "Scanner Component", - "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended).\nIf you do so, all the settings in this section will have no effect.\nThe default is: AutoSense." + "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here (not recommended). If you do so, all the settings in this section will have no effect." }, { "path": "scanner.analyzer", @@ -61892,7 +63325,7 @@ { "path": "scanner.analyzer.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -61900,35 +63333,29 @@ { "path": "scanner.analyzer.nodeSelector", "displayName": "Node Selector", - "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." }, { "path": "scanner.analyzer.tolerations", "displayName": "Tolerations", - "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, - { - "path": "scanner.analyzer.hostAliases", - "displayName": "Host Aliases", - "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." - }, { "path": "scanner.analyzer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." + "description": "When enabled, the number of analyzer replicas is managed dynamically based on the load, within the limits specified below." }, { "path": "scanner.analyzer.scaling.replicas", "displayName": "Default Replicas", - "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." }, { "path": "scanner.analyzer.scaling.minReplicas", "displayName": "Autoscaling Minimum Replicas", - "description": "The default is: 2.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" ] @@ -61936,7 +63363,6 @@ { "path": "scanner.analyzer.scaling.maxReplicas", "displayName": "Autoscaling Maximum Replicas", - "description": "The default is: 5.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" ] @@ -61944,7 +63370,7 @@ { "path": "scanner.db.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -61952,183 +63378,20 @@ { "path": "scanner.db.nodeSelector", "displayName": "Node Selector", - "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." }, { "path": "scanner.db.tolerations", "displayName": "Tolerations", - "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:tolerations" - ] - }, - { - "path": "scanner.db.hostAliases", - "displayName": "Host Aliases", - "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." - }, - { - "path": "scannerV4.scannerComponent", - "displayName": "Scanner V4 component", - "description": "If you want to enable the Scanner V4 component set this to \"AutoSense\".\nA value of \"AutoSense\" means that Scanner V4 should be installed,\nunless there is a Central resource in the same namespace.\nIn that case typically a central Scanner V4 will be deployed as a component of Central.\nA value of \"Disabled\" means that Scanner V4 should not be installed.\nIf this field is not specified or set to \"Default\", the following defaulting takes place:\n* for upgrades to 4.8 from previous releases, the default is: Disabled;\n* for new installations starting with ACS 4.8, the default is: AutoSense." - }, - { - "path": "scannerV4.indexer", - "displayName": "Indexer", - "description": "Settings pertaining to the indexer deployment.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" - ] - }, - { - "path": "scannerV4.db", - "displayName": "DB", - "description": "Settings pertaining to the DB deployment.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" - ] - }, - { - "path": "scannerV4.monitoring", - "displayName": "Monitoring", - "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" - ] - }, - { - "path": "scannerV4.db.persistence", - "displayName": "Persistence", - "description": "Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." - }, - { - "path": "scannerV4.db.resources", - "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" - ] - }, - { - "path": "scannerV4.db.nodeSelector", - "displayName": "Node Selector", - "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." - }, - { - "path": "scannerV4.db.tolerations", - "displayName": "Tolerations", - "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:tolerations" - ] - }, - { - "path": "scannerV4.db.hostAliases", - "displayName": "Host Aliases", - "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." - }, - { - "path": "scannerV4.db.persistence.persistentVolumeClaim", - "displayName": "Persistent volume claim", - "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users." - }, - { - "path": "scannerV4.db.persistence.hostPath", - "displayName": "Host path", - "description": "Stores persistent data in a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view)." - }, - { - "path": "scannerV4.db.persistence.hostPath.path", - "displayName": "Path", - "description": "The path on the host running Central." - }, - { - "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", - "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db." - }, - { - "path": "scannerV4.db.persistence.persistentVolumeClaim.size", - "displayName": "Size", - "description": "The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:text" - ] - }, - { - "path": "scannerV4.db.persistence.persistentVolumeClaim.storageClassName", - "displayName": "Storage Class", - "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.", - "x-descriptors": [ - "urn:alm:descriptor:io.kubernetes:StorageClass" - ] - }, - { - "path": "scannerV4.indexer.scaling", - "displayName": "Scaling", - "description": "Controls the number of replicas and autoscaling for this component." - }, - { - "path": "scannerV4.indexer.resources", - "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" - ] - }, - { - "path": "scannerV4.indexer.nodeSelector", - "displayName": "Node Selector", - "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." - }, - { - "path": "scannerV4.indexer.tolerations", - "displayName": "Tolerations", - "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, - { - "path": "scannerV4.indexer.hostAliases", - "displayName": "Host Aliases", - "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." - }, - { - "path": "scannerV4.indexer.scaling.autoScaling", - "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." - }, - { - "path": "scannerV4.indexer.scaling.replicas", - "displayName": "Default Replicas", - "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." - }, - { - "path": "scannerV4.indexer.scaling.minReplicas", - "displayName": "Autoscaling Minimum Replicas", - "description": "The default is: 2.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" - ] - }, - { - "path": "scannerV4.indexer.scaling.maxReplicas", - "displayName": "Autoscaling Maximum Replicas", - "description": "The default is: 5.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" - ] - }, - { - "path": "scannerV4.monitoring.exposeEndpoint", - "displayName": "Expose Endpoint", - "description": "Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port." - }, { "path": "sensor.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -62136,45 +63399,25 @@ { "path": "sensor.nodeSelector", "displayName": "Node Selector", - "description": "If you want this component to only run on specific nodes, you can configure a node selector here.\nThis setting overrides spec.customize.deploymentDefaults.nodeSelector." + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." }, { "path": "sensor.tolerations", "displayName": "Tolerations", - "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.\nThis setting overrides spec.customize.deploymentDefaults.tolerations.", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, - { - "path": "sensor.hostAliases", - "displayName": "Host Aliases", - "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." - }, { "path": "tls.additionalCAs", - "displayName": "Additional CAs", - "description": "Allows you to specify additional trusted Root CAs." - } - ] - }, - { - "name": "securitypolicies.config.stackrox.io", - "version": "v1alpha1", - "kind": "SecurityPolicy", - "displayName": "Security Policy", - "description": "SecurityPolicy is the schema for the policies API.", - "resources": [ - { - "name": "", - "kind": "Deployment", - "version": "v1" + "displayName": "Additional CAs" } ] } ] }, - "description": "## Why use Red Hat Advanced Cluster Security for Kubernetes?\n\nProtecting cloud-native applications requires significant changes in how we approach security—we must apply controls earlier in the application development life cycle, use the infrastructure itself to apply controls, and keep up with increasingly rapid release schedules.\n\n\nRed Hat® Advanced Cluster Security for Kubernetes, powered by StackRox technology, protects your vital applications across build, deploy, and runtime. Our software deploys in your infrastructure and integrates with your DevOps tooling and workflows to deliver better security and compliance. The policy engine includes hundreds of built-in controls to enforce DevOps and security best practices, industry standards such as CIS Benchmarks and National Institute of Standards Technology (NIST) guidelines, configuration management of both containers and Kubernetes, and runtime security.\n\nRed Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize security.\n\n## Features and Benefits\n\n**Kubernetes-native security:**\n1. Increases protection.\n1. Eliminates blind spots, providing staff with insights into critical vulnerabilities and threat vectors.\n1. Reduces time and costs.\n1. Reduces the time and effort needed to implement security and streamlines security analysis, investigation, and remediation using the rich context Kubernetes provides.\n1. Increases scalability and portability.\n1. Provides scalability and resiliency native to Kubernetes, avoiding operational conflict and complexity that can result from out-of-band security controls.\n\n## Using the RHACS Operator\n\n**RHACS Operator channels:**\n\nRed Hat provides the RHACS Operator by using the following update channels in the Red Hat Operator catalog:\n\n* `stable`: Provides the most recent version and patches to the most recent version.\n Using the `stable` channel and configuring automatic operator upgrades ensures that the most recent RHACS version is deployed.\n* `rhacs-x.yy` (for example, `rhacs-3.74`): Channels follow a specific RHACS version and include all patches to that version (e.g. `3.74.0`, `3.74.1`, ...).\n\nNote that the `latest` channel is deprecated and is not updated after RHACS version 3.74. Newer versions are published to the `stable` channel.\n\n**RHACS comes with two custom resources:**\n\n1. **Central Services** - Central is a deployment required on only one cluster in your environment. Users interact with RHACS via the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. Users may select exposures for Central that best meet their environment.\n\n2. **Secured Cluster Services** - Secured cluster services are placed on each cluster you manage and report back to Central. These services allow users to enforce policies and monitor your OpenShift and Kubernetes clusters. Secured Cluster Services come as two Deployments (Sensor and Admission Controller) and one DaemonSet (Collector).\n\n**Console Plugin (Tech Preview):** RHACS provides a dynamic plugin that displays vulnerability management information in the OpenShift web console. Install a SecuredCluster to deploy the plugin. Enable the plugin by selecting *Operators* > *Installed Operators* or by modifying the console Operator configuration.\n**Important:** The Console Plugin requires OpenShift 4.19 or later.\n\n### Central Services Explained\n\n| Service | Deployment Type | Description |\n| :------------------------------- | :-------------- | :-------------- |\n| Central | Deployment | Users interact with Red Hat Advanced Cluster Security through the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. |\n| Central DB | Deployment | Central DB is a PostgreSQL-based persistent storage for the data collected and managed by Central. |\n| Scanner | Deployment | Scanner is a Red Hat developed and certified image scanner. Scanner analyzes and reports vulnerabilities for images. Scanner uses HPA to scale the number of replicas based on workload. |\n| Scanner DB | Deployment | Scanner DB is a cache for vulnerability definitions to serve vulnerability scanning use cases throughout the software development life cycle. |\n\n### Secured Cluster Services Explained\n\n| Service | Deployment Type | Description |\n| :------------------------------- | :-------------- | :-------------- |\n| Sensor | Deployment | Sensor analyzes and monitors Kubernetes in secured clusters. |\n| Collector | DaemonSet | Analyzes and monitors container activity on Kubernetes nodes.|\n| Admission Controller | Deployment | ValidatingWebhookConfiguration for enforcing policies in the deploy lifecycle. |\n\n### Central Custom Resource\n\nCentral Services is the configuration template for RHACS Central deployment. For all customization options, please visit the RHACS documentation.\n\n### SecuredCluster Custom Resource\n\nSecuredCluster is the configuration template for the RHACS Secured Cluster services.\n\n#### Installation Prerequisites\n\nBefore deploying a SecuredCluster resource, you need to create a cluster init bundle secret.\n\n- **Through the RHACS UI:** To create a cluster init bundle secret through the RHACS UI, navigate to `Platform Configuration > Clusters`, and then click `Manage Tokens` in the top-right corner. Select `Cluster Init Bundle`, and click `Generate Bundle`. Select `Download Kubernetes secrets file`, and store the file under a name of your choice (for example, `cluster-init-secrets.yaml`).\n- **Through the `roxctl` CLI:** To create a cluster init bundle secret through the `roxctl` command-line interface, run `roxctl central init-bundles generate --output-secrets `. Choose any `name` and `file name` that you like.\n\nRun `oc project` and check that it reports the correct namespace where you intend to deploy SecuredCluster. In case you want to install SecuredCluster to a different namespace, select it by running `oc project `.\nThen, run `oc create -f init-bundle.yaml`. If you have chosen a name other than `init-bundle.yaml`, specify that file name instead.\n\n#### Required Fields\n\nThe following attributes are required to be specified. For all customization options, please visit the RHACS documentation.\n\n| Parameter | Description |\n| :----------------- | :-------------- |\n| `clusterName` | The name given to this secured cluster. The cluster will appear with this name in RHACS user interface. |\n| `centralEndpoint` | This field should specify the address of the Central endpoint, including the port number. `centralEndpoint` may be omitted if this SecuredCluster Custom Resource is in the same cluster and namespace as Central. |\n", + "description": "## Why use Red Hat Advanced Cluster Security for Kubernetes?\n\nProtecting cloud-native applications requires significant changes in how we approach security—we must apply controls earlier in the application development life cycle, use the infrastructure itself to apply controls, and keep up with increasingly rapid release schedules.\n\n\nRed Hat® Advanced Cluster Security for Kubernetes, powered by StackRox technology, protects your vital applications across build, deploy, and runtime. Our software deploys in your infrastructure and integrates with your DevOps tooling and workflows to deliver better security and compliance. The policy engine includes hundreds of built-in controls to enforce DevOps and security best practices, industry standards such as CIS Benchmarks and National Institute of Standards Technology (NIST) guidelines, configuration management of both containers and Kubernetes, and runtime security.\n\nRed Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize security.\n\n## Features and Benefits\n\n**Kubernetes-native security:**\n1. Increases protection.\n1. Eliminates blind spots, providing staff with insights into critical vulnerabilities and threat vectors.\n1. Reduces time and costs.\n1. Reduces the time and effort needed to implement security and streamlines security analysis, investigation, and remediation using the rich context Kubernetes provides.\n1. Increases scalability and portability.\n1. Provides scalability and resiliency native to Kubernetes, avoiding operational conflict and complexity that can result from out-of-band security controls.\n\n## Using the RHACS Operator\n\n**RHACS Operator channels:**\n\nRed Hat provides the RHACS Operator by using the following update channels in the Red Hat Operator catalog:\n\n* `stable`: Provides the most recent version and patches to the most recent version.\n Using the `stable` channel and configuring automatic operator upgrades ensures that the most recent RHACS version is deployed.\n* `rhacs-x.yy` (for example, `rhacs-3.74`): Channels follow a specific RHACS version and include all patches to that version (e.g. `3.74.0`, `3.74.1`, ...).\n\nNote that the `latest` channel is deprecated and is not updated after RHACS version 3.74. Newer versions are published to the `stable` channel.\n\n**RHACS comes with two custom resources:**\n\n1. **Central Services** - Central is a deployment required on only one cluster in your environment. Users interact with RHACS via the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. Users may select exposures for Central that best meet their environment.\n\n2. **Secured Cluster Services** - Secured cluster services are placed on each cluster you manage and report back to Central. These services allow users to enforce policies and monitor your OpenShift and Kubernetes clusters. Secured Cluster Services come as two Deployments (Sensor and Admission Controller) and one DaemonSet (Collector).\n\n### Central Services Explained\n\n| Service | Deployment Type | Description |\n| :------------------------------- | :-------------- | :-------------- |\n| Central | Deployment | Users interact with Red Hat Advanced Cluster Security through the user interface or APIs on Central. Central also sends notifications for violations and interacts with integrations. |\n| Central DB | Deployment | Central DB is a PostgreSQL-based persistent storage for the data collected and managed by Central. |\n| Scanner | Deployment | Scanner is a Red Hat developed and certified image scanner. Scanner analyzes and reports vulnerabilities for images. Scanner uses HPA to scale the number of replicas based on workload. |\n| Scanner DB | Deployment | Scanner DB is a cache for vulnerability definitions to serve vulnerability scanning use cases throughout the software development life cycle. |\n\n### Secured Cluster Services Explained\n\n| Service | Deployment Type | Description |\n| :------------------------------- | :-------------- | :-------------- |\n| Sensor | Deployment | Sensor analyzes and monitors Kubernetes in secured clusters. |\n| Collector | DaemonSet | Analyzes and monitors container activity on Kubernetes nodes.|\n| Admission Controller | Deployment | ValidatingWebhookConfiguration for enforcing policies in the deploy lifecycle. |\n\n### Central Custom Resource\n\nCentral Services is the configuration template for RHACS Central deployment. For all customization options, please visit the RHACS documentation.\n\n### SecuredCluster Custom Resource\n\nSecuredCluster is the configuration template for the RHACS Secured Cluster services.\n\n#### Installation Prerequisites\n\nBefore deploying a SecuredCluster resource, you need to create a cluster init bundle secret.\n\n- **Through the RHACS UI:** To create a cluster init bundle secret through the RHACS UI, navigate to `Platform Configuration > Clusters`, and then click `Manage Tokens` in the top-right corner. Select `Cluster Init Bundle`, and click `Generate Bundle`. Select `Download Kubernetes secrets file`, and store the file under a name of your choice (for example, `cluster-init-secrets.yaml`).\n- **Through the `roxctl` CLI:** To create a cluster init bundle secret through the `roxctl` command-line interface, run `roxctl central init-bundles generate --output-secrets `. Choose any `name` and `file name` that you like.\n\nRun `oc project` and check that it reports the correct namespace where you intend to deploy SecuredCluster. In case you want to install SecuredCluster to a different namespace, select it by running `oc project `.\nThen, run `oc create -f init-bundle.yaml`. If you have chosen a name other than `init-bundle.yaml`, specify that file name instead.\n\n#### Required Fields\n\nThe following attributes are required to be specified. For all customization options, please visit the RHACS documentation.\n\n| Parameter | Description |\n| :----------------- | :-------------- |\n| `clusterName` | The name given to this secured cluster. The cluster will appear with this name in RHACS user interface. |\n| `centralEndpoint` | This field should specify the address of the Central endpoint, including the port number. `centralEndpoint` may be omitted if this SecuredCluster Custom Resource is in the same cluster and namespace as Central. |\n", "displayName": "Advanced Cluster Security for Kubernetes", "installModes": [ { @@ -62210,7 +63453,6 @@ ], "labels": { "operatorframework.io/arch.amd64": "supported", - "operatorframework.io/arch.arm64": "supported", "operatorframework.io/arch.ppc64le": "supported", "operatorframework.io/arch.s390x": "supported" }, @@ -62249,63 +63491,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9280902d31fe515efeb26cc346d019894ebd0b678adc33585084f5783201fa0a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:6b09646e1dd6e3d90c299f60af0d1c2ce318cbe20b3acd98ffaa1c19fa8b74d0" }, { - "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:189de9892aa3cf5edd881fef4409715119d015a8e594f66bf4abc306c548075d" + "name": "collector_full", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e63fd46fd603324ee7047173f2d0d2dc5d2bf1b662d88e03df0890b91c9e33fc" }, { - "name": "fact", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-fact-rhel8@sha256:79d23bcdc6b009d22859b63c27a503fff8f0c44bf2dec9ed7841a497d630197b" + "name": "collector_slim", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:f5bb0b9116b1fd8547c67b789e94dbe594d0ee4d4c6b00f8df0f3a3bb6f20237" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:41b2490ed442c7c6e8dff959223b55d6306b7cadb4ef40f014c802bfb9aedc43" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:7a0f38b62e47fe5a4276d48ddfb543731018b5e938694a2b78021293d24a53e9" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1b1480e72310d6ec17c4dd4368214cd940a4da230b13304f4621c5ae560f9e9e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:de3b2e28150c6428864fe8dd7ef325b806bc9e9881d883ba3335e00b6593618c" + }, + { + "name": "rhacs-rhel8-operator-e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2205a04f297fa92b157e36ff3e6994dc88c041b291193bd7d03b3f033910b2fe" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:26d3a03be4e87deb29b7c1d4bb3b6f428338629312a678184ba256e1526126b6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:ae5c518588809e7c7175ecf7657920756e221e38b8a6e96a884b0415a5255a61" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6cc97529c4474e068158150f489bed91179289dae481b408ccf30c7285653e79" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2567d22cfaddd2137914bd3c01372f9be7d0f34fb0011d845711cf015689bca5" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6af90becfb85161e72f52f98aae545a1d66c36bdcc8fb1c64c2e3d5207db91e0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:1bc8f517e01db203ae1f3c41732589aed3c2ce65a205e400fb4ddac08200f978" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9183f498b1eefb0a75a96ad0aca4b0218f4ab7d0b3464b759ea1fb2a390ab25a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:674c28a9865f45464c4c5b8e9bbf1cd74e650ee65196242eef8a6ed6514ee7bb" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cb9fbe92c8de52dfea21502c2646cf82cd9ca50b4a08b980acf674c0adec39bd" - }, - { - "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5b2d2a20c0a61f402ae2148f4111224b1ad01494a73eb8e44b49a04ba0baa87f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:c1a3908d8ac8c354a861301df24c43df4026891745cf337c11b634a3389fa9b0" }, { - "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:856f87371c8a528629df7a15db703bc04c73850f81946bc640cdd7d8868541f6" + "name": "kube-rbac-proxy", + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:fcb3b8ab93dfb5ef2b290e39ea5899dbb5e0c6d430370b8d281e59e74d94d749" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.2.0", + "name": "rhacs-operator.v4.2.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:de3b2e28150c6428864fe8dd7ef325b806bc9e9881d883ba3335e00b6593618c", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff1860a69cb72220a536e3d51510fe88169f75e73918a4935c99fd0704dbdd91", "properties": [ { "type": "olm.gvk", @@ -62327,7 +63569,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.2.0" + "version": "4.2.1" } }, { @@ -62337,10 +63579,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992", - "createdAt": "2023-09-12T01:02:34.540467+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5", + "createdAt": "2023-09-29T16:19:13.443248+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.1.0 < 4.2.0", + "olm.skipRange": ">= 4.1.0 < 4.2.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -63476,51 +64718,51 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:6b09646e1dd6e3d90c299f60af0d1c2ce318cbe20b3acd98ffaa1c19fa8b74d0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:c8b16e11a5520d475d2f358777e92bfca4ddd8402d0cd409e5ddfe694b731871" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e63fd46fd603324ee7047173f2d0d2dc5d2bf1b662d88e03df0890b91c9e33fc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:ce4aaca38ed0f4d9ede5209cbeb6374e0e83d3a9669488b086a238ced16cc85c" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:f5bb0b9116b1fd8547c67b789e94dbe594d0ee4d4c6b00f8df0f3a3bb6f20237" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2ffa951bf80160f1399ba6ee7eab4217fd51c6b8a1175c0796b78fc93b5402de" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:7a0f38b62e47fe5a4276d48ddfb543731018b5e938694a2b78021293d24a53e9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:80ae157e48287cc28c52c517fc31b8d8fe735f1d9902c11ab05ab98121e533e0" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:de3b2e28150c6428864fe8dd7ef325b806bc9e9881d883ba3335e00b6593618c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff1860a69cb72220a536e3d51510fe88169f75e73918a4935c99fd0704dbdd91" }, { - "name": "rhacs-rhel8-operator-e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992" + "name": "rhacs-rhel8-operator-9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e335093bb5b12a4086afffdacb16ac033918d673bedf610805217c1b6068d992" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:ae5c518588809e7c7175ecf7657920756e221e38b8a6e96a884b0415a5255a61" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:edd9bd0ae5c2e020b71fbfcbccabd6aa1c6f876941cb9b4599116cd99ef228da" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2567d22cfaddd2137914bd3c01372f9be7d0f34fb0011d845711cf015689bca5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:cf7883ad05642769e444a2586d6cedc67290df618cec33297d9a27356677bea3" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:1bc8f517e01db203ae1f3c41732589aed3c2ce65a205e400fb4ddac08200f978" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:21de53f939c19e8e8d9ab675f2b2ac692b551a8740f8cae51525b874bffb71bd" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:674c28a9865f45464c4c5b8e9bbf1cd74e650ee65196242eef8a6ed6514ee7bb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:57cc00eda72a69adec8538176a0830dc70c9fa48605ea3dbdb30a154e8d373a1" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:c1a3908d8ac8c354a861301df24c43df4026891745cf337c11b634a3389fa9b0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e1db72d1a522ead3ee820bfacea72fa7f1dd96dacd303c6b958ba7bdeae90ecb" }, { "name": "kube-rbac-proxy", @@ -63530,9 +64772,9 @@ } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.2.1", + "name": "rhacs-operator.v4.2.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff1860a69cb72220a536e3d51510fe88169f75e73918a4935c99fd0704dbdd91", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:75148e16a364e4f67ecb8e914fc16b7ca4112c4e844b0d361a3feb88468f1215", "properties": [ { "type": "olm.gvk", @@ -63554,7 +64796,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.2.1" + "version": "4.2.2" } }, { @@ -63564,10 +64806,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5", - "createdAt": "2023-09-29T16:19:13.443248+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077", + "createdAt": "2023-10-19T13:32:34.111693+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.1.0 < 4.2.1", + "olm.skipRange": ">= 4.1.0 < 4.2.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -64703,63 +65945,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:c8b16e11a5520d475d2f358777e92bfca4ddd8402d0cd409e5ddfe694b731871" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ed31dd2d4f4e1f8d4c684fdd139701bdffa26d59cf20f631c5883dcb3317a46a" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:ce4aaca38ed0f4d9ede5209cbeb6374e0e83d3a9669488b086a238ced16cc85c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:43cdeebd380aa11bd4d5d8f3bc2552e6185fefcb78e81a5a1c1918353a550bfe" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2ffa951bf80160f1399ba6ee7eab4217fd51c6b8a1175c0796b78fc93b5402de" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:41bafcedb2f1a8c423d9d334d472c498675728123b6db477dfee161b543d593c" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:80ae157e48287cc28c52c517fc31b8d8fe735f1d9902c11ab05ab98121e533e0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d9d9d5c213fb1bed63be3824f640534eb532727e84b2ab55388dbb0c18a8c7a2" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff1860a69cb72220a536e3d51510fe88169f75e73918a4935c99fd0704dbdd91" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:75148e16a364e4f67ecb8e914fc16b7ca4112c4e844b0d361a3feb88468f1215" }, { - "name": "rhacs-rhel8-operator-9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5" + "name": "rhacs-rhel8-operator-1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9083beb92d9021dd7cc55fd5c0d4e77155a42a2c82a273496df80ecd0ea00ea5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:edd9bd0ae5c2e020b71fbfcbccabd6aa1c6f876941cb9b4599116cd99ef228da" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:5d9f05103c0576e53452e472009be3f49e0affa2c477548879690e548e920e84" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:cf7883ad05642769e444a2586d6cedc67290df618cec33297d9a27356677bea3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:d27bb6be54fb49f3fd8413019600bc23dae4d740b38632a9ca01ddffaf34cf07" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:21de53f939c19e8e8d9ab675f2b2ac692b551a8740f8cae51525b874bffb71bd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:65cd9446a3ba251e09c6084f3805cfe8b6d6224b8c874f08e2078fb72026b7b8" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:57cc00eda72a69adec8538176a0830dc70c9fa48605ea3dbdb30a154e8d373a1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:52ef910ceebd4f6626e266ef10c8cb68f1b694391efe70a6ffbc4eb63be51d4c" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e1db72d1a522ead3ee820bfacea72fa7f1dd96dacd303c6b958ba7bdeae90ecb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d8a39cbc3068273635b94f02f6471c61aabe25c0b93944537a8bf1ebff5f6dde" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:fcb3b8ab93dfb5ef2b290e39ea5899dbb5e0c6d430370b8d281e59e74d94d749" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:cfa10bb6b461f302674f185b26c8d6efaaeba7f3f65d2cf05ae1f069aa2710d3" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.2.2", + "name": "rhacs-operator.v4.2.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:75148e16a364e4f67ecb8e914fc16b7ca4112c4e844b0d361a3feb88468f1215", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:978d9f800d70144021cc5fd318def9f4d82ddbbbe520e432a9a9e0cf445bf854", "properties": [ { "type": "olm.gvk", @@ -64781,7 +66023,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.2.2" + "version": "4.2.3" } }, { @@ -64791,10 +66033,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077", - "createdAt": "2023-10-19T13:32:34.111693+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d", + "createdAt": "2023-11-21T05:25:39.011981+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.1.0 < 4.2.2", + "olm.skipRange": ">= 4.1.0 < 4.2.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -65930,63 +67172,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ed31dd2d4f4e1f8d4c684fdd139701bdffa26d59cf20f631c5883dcb3317a46a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:8e2bea57264957db3bca039de9404ac7fad09986da60695a1c292a9d5abe993a" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:43cdeebd380aa11bd4d5d8f3bc2552e6185fefcb78e81a5a1c1918353a550bfe" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:5f3e022d28ef8fb59817d83d3264d66a5023ab5fa2e9ad1331068537de6cb86f" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:41bafcedb2f1a8c423d9d334d472c498675728123b6db477dfee161b543d593c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:8aab28a4df716ee04b6d264d5f9803df3b9b5dd6524fb2ec1126fe84464b4779" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d9d9d5c213fb1bed63be3824f640534eb532727e84b2ab55388dbb0c18a8c7a2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:4abe592d41d039a137da983f901b5e430b429edfa7445a93a30adc470a35510b" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:75148e16a364e4f67ecb8e914fc16b7ca4112c4e844b0d361a3feb88468f1215" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:978d9f800d70144021cc5fd318def9f4d82ddbbbe520e432a9a9e0cf445bf854" }, { - "name": "rhacs-rhel8-operator-1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077" + "name": "rhacs-rhel8-operator-de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:1aa0285e9aa30160e93a5864b12c3554a0e6074b089e852b718c31d81f5b2077" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:5d9f05103c0576e53452e472009be3f49e0affa2c477548879690e548e920e84" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:def4b207cd3cc088d87448fbc0d15a6c017d0bf327629784c1db940c4b700ddc" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:d27bb6be54fb49f3fd8413019600bc23dae4d740b38632a9ca01ddffaf34cf07" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6ff1db301f25bb82e98a6d4981121cb377315735ab334f2181db1ded4b21c63c" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:65cd9446a3ba251e09c6084f3805cfe8b6d6224b8c874f08e2078fb72026b7b8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:adcb3ac8246bdbd03ca497d25106ed3481669562a14037b8728c1877d0b164c1" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:52ef910ceebd4f6626e266ef10c8cb68f1b694391efe70a6ffbc4eb63be51d4c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:c50648d479e3c1b8058eedeb7e7d457b703e8dac0a5047c63c0ea3408130873e" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d8a39cbc3068273635b94f02f6471c61aabe25c0b93944537a8bf1ebff5f6dde" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d8240bfdbe9406b0bc930c33991afc40d8ea953c62d5035ff1a52e6bdc68a26c" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:cfa10bb6b461f302674f185b26c8d6efaaeba7f3f65d2cf05ae1f069aa2710d3" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:e33874a51971a90917cf437fc6cbeea1da569ba07217f66f1bba96d594f58aed" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.2.3", + "name": "rhacs-operator.v4.2.4", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:978d9f800d70144021cc5fd318def9f4d82ddbbbe520e432a9a9e0cf445bf854", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d12dd40975045afad1cd5575ced8ce5c443fd0f872bceca5a759233828a051e6", "properties": [ { "type": "olm.gvk", @@ -66008,7 +67250,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.2.3" + "version": "4.2.4" } }, { @@ -66018,10 +67260,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d", - "createdAt": "2023-11-21T05:25:39.011981+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8", + "createdAt": "2024-01-18T02:09:52.083679+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.1.0 < 4.2.3", + "olm.skipRange": ">= 4.1.0 < 4.2.4", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -67157,63 +68399,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:8e2bea57264957db3bca039de9404ac7fad09986da60695a1c292a9d5abe993a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:2915ca70a7e45dd58d3356ece548c3f66490ebf0e40165d729cf8c706ea1baf5" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:5f3e022d28ef8fb59817d83d3264d66a5023ab5fa2e9ad1331068537de6cb86f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e3d1f8e595c6fe4499f78c0c12c83d5d00357ca13568c2e2538f5aa752eefcda" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:8aab28a4df716ee04b6d264d5f9803df3b9b5dd6524fb2ec1126fe84464b4779" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:14a2a8439e2e769e53b64315c0c0f8d82c44c9ef5dda73f7b849282fded33de3" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:4abe592d41d039a137da983f901b5e430b429edfa7445a93a30adc470a35510b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d0fc60e22e2bfc9835997207da151caef4a155e8ff748d5fa2a74575d5fa1c51" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:978d9f800d70144021cc5fd318def9f4d82ddbbbe520e432a9a9e0cf445bf854" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d12dd40975045afad1cd5575ced8ce5c443fd0f872bceca5a759233828a051e6" }, { - "name": "rhacs-rhel8-operator-de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d" + "name": "rhacs-rhel8-operator-bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:de0f97546a3324ad3d828dcb17bff0eedc8290342d35a490fbe06eb97b78650d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:def4b207cd3cc088d87448fbc0d15a6c017d0bf327629784c1db940c4b700ddc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:250fe9b4a6c43e3141ee3fbb2055d70f11703d46167552483e83d2acc5a69ae1" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6ff1db301f25bb82e98a6d4981121cb377315735ab334f2181db1ded4b21c63c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0f3d6fe7470b9045e1162d950a614c766932fea647c9b67a05928359ddf9b92e" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:adcb3ac8246bdbd03ca497d25106ed3481669562a14037b8728c1877d0b164c1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8f58170e19784d750a6fb02be54929392ee2000c9ac2866a3d538067eb1559df" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:c50648d479e3c1b8058eedeb7e7d457b703e8dac0a5047c63c0ea3408130873e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1cefdc53193ffef13c70ca6e391329cce9fac16fe67802ae401db9250118066f" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d8240bfdbe9406b0bc930c33991afc40d8ea953c62d5035ff1a52e6bdc68a26c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:11e9c6ca6bb4e0b1faf3aeb26457498f25c0c8ee37200cf5052ce7a33c396199" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:e33874a51971a90917cf437fc6cbeea1da569ba07217f66f1bba96d594f58aed" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:a8ad0e76ce4cae9f9b36aecf125c4ed56fc2d776fe3df113d41bfc1c2f8b3602" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.2.4", + "name": "rhacs-operator.v4.2.5", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d12dd40975045afad1cd5575ced8ce5c443fd0f872bceca5a759233828a051e6", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:08aebe6e8275d3314b6756d522ec568ccdfb9c52df98c9822f187f6c5a3af19c", "properties": [ { "type": "olm.gvk", @@ -67235,7 +68477,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.2.4" + "version": "4.2.5" } }, { @@ -67245,10 +68487,17 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8", - "createdAt": "2024-01-18T02:09:52.083679+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872", + "createdAt": "2024-03-13T14:51:55.084122+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.1.0 < 4.2.4", + "features.operators.openshift.io/disconnected": "true", + "features.operators.openshift.io/fips-compliant": "false", + "features.operators.openshift.io/proxy-aware": "true", + "features.operators.openshift.io/tls-profiles": "false", + "features.operators.openshift.io/token-auth-aws": "false", + "features.operators.openshift.io/token-auth-azure": "false", + "features.operators.openshift.io/token-auth-gcp": "false", + "olm.skipRange": ">= 4.1.0 < 4.2.5", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -68384,63 +69633,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:2915ca70a7e45dd58d3356ece548c3f66490ebf0e40165d729cf8c706ea1baf5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ff27f03064633d6d08f8383649069e39c868def4aeca8f2622750397e049d0ec" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e3d1f8e595c6fe4499f78c0c12c83d5d00357ca13568c2e2538f5aa752eefcda" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e2b07cb7d690477d78a2b8e1875545998d4bdb946f80dd0533a14187da99dbbf" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:14a2a8439e2e769e53b64315c0c0f8d82c44c9ef5dda73f7b849282fded33de3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:b82f7f654235688fc07fb037422a73e1106e27024d39a68ef7fac1422b69496d" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d0fc60e22e2bfc9835997207da151caef4a155e8ff748d5fa2a74575d5fa1c51" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3858ab936d4626a11bbf895d41bad181364ee5df3312f6dd29ebeb9b7d31ec77" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d12dd40975045afad1cd5575ced8ce5c443fd0f872bceca5a759233828a051e6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:08aebe6e8275d3314b6756d522ec568ccdfb9c52df98c9822f187f6c5a3af19c" }, { - "name": "rhacs-rhel8-operator-bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8" + "name": "rhacs-rhel8-operator-4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bf1efcf48f3ca38e12da50320cb31a3ecd87ebdf1d98231f79292a745bd373b8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:250fe9b4a6c43e3141ee3fbb2055d70f11703d46167552483e83d2acc5a69ae1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2f326cabf03f780a3e6120995d5442641764641f62430d82e05edbe21b30c7b2" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0f3d6fe7470b9045e1162d950a614c766932fea647c9b67a05928359ddf9b92e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:e79a5e5681ebfe2d6349e2763ee0c1fa521b20319846958e402d23229b1f257b" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8f58170e19784d750a6fb02be54929392ee2000c9ac2866a3d538067eb1559df" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:4b35f5f39865238a8e95d3cba7ebb5f15ccfbf6a2563c34f57d91a0b5c927066" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1cefdc53193ffef13c70ca6e391329cce9fac16fe67802ae401db9250118066f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:59f1862c8ce188906499f08201ae05deeb47bd4fc5eab4be0386ca44ec065da8" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:11e9c6ca6bb4e0b1faf3aeb26457498f25c0c8ee37200cf5052ce7a33c396199" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b5a15f2985b114bf9bc24a0d9942db5d0cb818e60fd15a2f9094aa00904cce77" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:a8ad0e76ce4cae9f9b36aecf125c4ed56fc2d776fe3df113d41bfc1c2f8b3602" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:12db245af3b8475c9b5680bb0035c566109819e05cfe62bd1dfdfb5d6ed25bea" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.2.5", + "name": "rhacs-operator.v4.3.0", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:08aebe6e8275d3314b6756d522ec568ccdfb9c52df98c9822f187f6c5a3af19c", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff41517cf745183c940b587be2d25f606ef0d3a5048f9455188d518655dbd85c", "properties": [ { "type": "olm.gvk", @@ -68462,7 +69711,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.2.5" + "version": "4.3.0" } }, { @@ -68472,17 +69721,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872", - "createdAt": "2024-03-13T14:51:55.084122+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7", + "createdAt": "2023-11-07T21:47:58.616239+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "false", - "features.operators.openshift.io/proxy-aware": "true", - "features.operators.openshift.io/tls-profiles": "false", - "features.operators.openshift.io/token-auth-aws": "false", - "features.operators.openshift.io/token-auth-azure": "false", - "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.1.0 < 4.2.5", + "olm.skipRange": ">= 4.2.0 < 4.3.0", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -68652,6 +69894,14 @@ "urn:alm:descriptor:com.tectonic.ui:hidden" ] }, + { + "path": "central.notifierSecretsEncryption", + "displayName": "Notifier Secrets Encryption", + "description": "Configures the encryption of notifier secrets stored in the Central DB.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, { "path": "central.resources", "displayName": "Resources", @@ -68885,6 +70135,11 @@ "displayName": "Expose Endpoint", "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." }, + { + "path": "central.notifierSecretsEncryption.enabled", + "displayName": "Enabled", + "description": "Enables the encryption of notifier secrets stored in the Central DB. An encryption key must be provided in a secret called `central-encryption-key` in the Central namespace, with the key stored in the `encryption-key` data field." + }, { "path": "central.persistence.persistentVolumeClaim", "displayName": "Persistent volume claim", @@ -69618,63 +70873,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ff27f03064633d6d08f8383649069e39c868def4aeca8f2622750397e049d0ec" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:797125539fc62f28fda091d917e87abcfbf37f799a81efdfcc16262f05d6098e" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e2b07cb7d690477d78a2b8e1875545998d4bdb946f80dd0533a14187da99dbbf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:4093199e05054f03066d9cd293b3d45ba7f2bea4c2f258373148fb25d268b5ad" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:b82f7f654235688fc07fb037422a73e1106e27024d39a68ef7fac1422b69496d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:6afa0e1268e028a0afa7ad71531ed2f4bf12b5582984a513163840aedd6925d2" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3858ab936d4626a11bbf895d41bad181364ee5df3312f6dd29ebeb9b7d31ec77" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:c61644103b0a398d04911779a4265cacce09ef6e1148468c79c953d3906a13ba" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:08aebe6e8275d3314b6756d522ec568ccdfb9c52df98c9822f187f6c5a3af19c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff41517cf745183c940b587be2d25f606ef0d3a5048f9455188d518655dbd85c" }, { - "name": "rhacs-rhel8-operator-4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872" + "name": "rhacs-rhel8-operator-bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4253eca84cbb0c5fc033507ddc2deef235b054c0ba944fa271ebbba21545b872" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2f326cabf03f780a3e6120995d5442641764641f62430d82e05edbe21b30c7b2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:eafb609e84e04b037a092fa9c75894b14fd13df5b32f7bf0d91ee71617822ebf" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:e79a5e5681ebfe2d6349e2763ee0c1fa521b20319846958e402d23229b1f257b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:b5d5befc15211c56dafc8a250fe549d5bf91a76e4754b35fd9df3fb40e6d2c01" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:4b35f5f39865238a8e95d3cba7ebb5f15ccfbf6a2563c34f57d91a0b5c927066" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:03e7e615bb955d74dc66b99191ce71cb751502b76ef914b5fe6082a2806ae7eb" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:59f1862c8ce188906499f08201ae05deeb47bd4fc5eab4be0386ca44ec065da8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e436ac89c1f8c8b23c4253ec3bc77e0c69d1ced62f6428a6c8c8308bd3b34e20" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b5a15f2985b114bf9bc24a0d9942db5d0cb818e60fd15a2f9094aa00904cce77" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:29ce2a50edad8397c09ceccd909cc38827ac2adfebbc8368e61e1e1bc5ed9b41" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:12db245af3b8475c9b5680bb0035c566109819e05cfe62bd1dfdfb5d6ed25bea" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:53d3620bb0490d83aaf6a356bb7d3b9e7147222d1a2017f8317f05fa90cd3de9" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.0", + "name": "rhacs-operator.v4.3.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff41517cf745183c940b587be2d25f606ef0d3a5048f9455188d518655dbd85c", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:90bdfd8fba74a36a81c52c2fe7abbd79158d1482699bda52af7e2caf0803b3fc", "properties": [ { "type": "olm.gvk", @@ -69696,7 +70951,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.0" + "version": "4.3.1" } }, { @@ -69706,10 +70961,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7", - "createdAt": "2023-11-07T21:47:58.616239+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d", + "createdAt": "2023-12-06T13:20:57.612053+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.2.0 < 4.3.0", + "olm.skipRange": ">= 4.2.0 < 4.3.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -70858,63 +72113,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:797125539fc62f28fda091d917e87abcfbf37f799a81efdfcc16262f05d6098e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:4524e6fe6ef1530a4e1d8fcb878d7ef6b7030486fd2798b78ed567426a672a35" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:4093199e05054f03066d9cd293b3d45ba7f2bea4c2f258373148fb25d268b5ad" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:6f8899babbdbf69fa4bae947019e56b3593303cd3105bd0bc4a475205c5ee35c" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:6afa0e1268e028a0afa7ad71531ed2f4bf12b5582984a513163840aedd6925d2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:5c5393cee19e43dee36f51463d230483dcbb14ea74c3eb10d741e3f19177d957" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:c61644103b0a398d04911779a4265cacce09ef6e1148468c79c953d3906a13ba" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:efe15271124ec2fb311b98b181b06a2ad0c47e6a04ef277591b9187ce8a3a04c" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:ff41517cf745183c940b587be2d25f606ef0d3a5048f9455188d518655dbd85c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:90bdfd8fba74a36a81c52c2fe7abbd79158d1482699bda52af7e2caf0803b3fc" }, { - "name": "rhacs-rhel8-operator-bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7" + "name": "rhacs-rhel8-operator-317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd90d281cfcfe902fefb12923ba1941639b5e1268681dcefb91d6baf478ed1c7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:eafb609e84e04b037a092fa9c75894b14fd13df5b32f7bf0d91ee71617822ebf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d247677755613dc66798ffef40f1b6d314eeba041eb6e1614bd7f1dfa8feb421" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:b5d5befc15211c56dafc8a250fe549d5bf91a76e4754b35fd9df3fb40e6d2c01" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:5d2095145158cdc886a7dc63d4ef8bfcbe562f691e2536b48febc3a756c12ec8" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:03e7e615bb955d74dc66b99191ce71cb751502b76ef914b5fe6082a2806ae7eb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:25643f9c7c15b2928f4162dbc427f30b20e0c4b8bc739e14c28782fecea1c074" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e436ac89c1f8c8b23c4253ec3bc77e0c69d1ced62f6428a6c8c8308bd3b34e20" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:73fd903983f21f3dad0e2c114402aa51140de77b11591bed0abac926aa544032" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:29ce2a50edad8397c09ceccd909cc38827ac2adfebbc8368e61e1e1bc5ed9b41" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:a5f48be2972026cd76c0f305232e3387abc558758173c32075636af8b365960e" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:53d3620bb0490d83aaf6a356bb7d3b9e7147222d1a2017f8317f05fa90cd3de9" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:a8ad0e76ce4cae9f9b36aecf125c4ed56fc2d776fe3df113d41bfc1c2f8b3602" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.1", + "name": "rhacs-operator.v4.3.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:90bdfd8fba74a36a81c52c2fe7abbd79158d1482699bda52af7e2caf0803b3fc", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6604d204de27b02e379579d9182e68f4bd3150825462d471a0cf20963fe6fe2e", "properties": [ { "type": "olm.gvk", @@ -70936,7 +72191,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.1" + "version": "4.3.2" } }, { @@ -70946,10 +72201,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d", - "createdAt": "2023-12-06T13:20:57.612053+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be", + "createdAt": "2024-01-04T20:10:39.006092+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.2.0 < 4.3.1", + "olm.skipRange": ">= 4.2.0 < 4.3.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -72098,51 +73353,51 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:4524e6fe6ef1530a4e1d8fcb878d7ef6b7030486fd2798b78ed567426a672a35" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a86714e7a25b306ee3cd81423b114e0afe6407aa11adee0921c7d5b2b1f1d5cc" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:6f8899babbdbf69fa4bae947019e56b3593303cd3105bd0bc4a475205c5ee35c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:2530941510e526f8806acfb2d79c2f300de06222fc3ffd0f50ee2b465da6ee4e" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:5c5393cee19e43dee36f51463d230483dcbb14ea74c3eb10d741e3f19177d957" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:ca44589b7b8db8218b716d43803835eb048f1b5344c08cb1b5e16618972d729e" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:efe15271124ec2fb311b98b181b06a2ad0c47e6a04ef277591b9187ce8a3a04c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:9eb343aed548df2ac646719ea71fb60d3bb4c59382ab956303e2b901b5fbeffd" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:90bdfd8fba74a36a81c52c2fe7abbd79158d1482699bda52af7e2caf0803b3fc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6604d204de27b02e379579d9182e68f4bd3150825462d471a0cf20963fe6fe2e" }, { - "name": "rhacs-rhel8-operator-317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d" + "name": "rhacs-rhel8-operator-62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:317ae4f287e4e35de7bbb3459d22e57228c7e1ed582d9f42b1bfe86e20ad7d1d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d247677755613dc66798ffef40f1b6d314eeba041eb6e1614bd7f1dfa8feb421" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:dc693d51bc5a9e23bd7a77f5162d8651279051aab7979b71b0e74a322f99593f" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:5d2095145158cdc886a7dc63d4ef8bfcbe562f691e2536b48febc3a756c12ec8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f151486be73932b0274268a2f4280052bd653bf9d6b73cdad065d6e3623d5de8" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:25643f9c7c15b2928f4162dbc427f30b20e0c4b8bc739e14c28782fecea1c074" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:065c6107edf3aae96bd0e290215cf1bb861dfff6e6973629c13f808f0bbf283a" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:73fd903983f21f3dad0e2c114402aa51140de77b11591bed0abac926aa544032" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:5d0a34b09e0ba5ae419ec0d144b6252318e4a149015e52a8534d07ec203ffa45" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:a5f48be2972026cd76c0f305232e3387abc558758173c32075636af8b365960e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b31362568d27666ab8724302d56d5e6cbeaf20a05b18ceab92897b5d78e75703" }, { "name": "kube-rbac-proxy", @@ -72152,9 +73407,9 @@ } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.2", + "name": "rhacs-operator.v4.3.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6604d204de27b02e379579d9182e68f4bd3150825462d471a0cf20963fe6fe2e", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:22a1e067ff9e0e0b5f2f819ffc863e7a877030b4c18fbab0abfa75af46307d15", "properties": [ { "type": "olm.gvk", @@ -72176,7 +73431,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.2" + "version": "4.3.3" } }, { @@ -72186,10 +73441,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be", - "createdAt": "2024-01-04T20:10:39.006092+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e", + "createdAt": "2024-01-16T14:42:12.278842+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.2.0 < 4.3.2", + "olm.skipRange": ">= 4.2.0 < 4.3.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -73338,51 +74593,51 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a86714e7a25b306ee3cd81423b114e0afe6407aa11adee0921c7d5b2b1f1d5cc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a266b9263d05d9d092bf8bfd1e9fd26b4ffd10a0330bce5d028f1d3f75164626" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:2530941510e526f8806acfb2d79c2f300de06222fc3ffd0f50ee2b465da6ee4e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e11d77969890cdd930dbbc3b4c04940edc343ed3c96aa3b64beb6af9a7772b99" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:ca44589b7b8db8218b716d43803835eb048f1b5344c08cb1b5e16618972d729e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:6b7ef7314c80fc7a0188dfa01d6dfd896c1c95a4cbaa62ab8ea7d35ad61038f1" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:9eb343aed548df2ac646719ea71fb60d3bb4c59382ab956303e2b901b5fbeffd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:1df6cfb5dc581651a4502c9108959dbcc7fd146dd455dbfb2498ce58c0b53427" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6604d204de27b02e379579d9182e68f4bd3150825462d471a0cf20963fe6fe2e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:22a1e067ff9e0e0b5f2f819ffc863e7a877030b4c18fbab0abfa75af46307d15" }, { - "name": "rhacs-rhel8-operator-62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be" + "name": "rhacs-rhel8-operator-74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:62138df757e1f1c7abdafa93577d92ef6c74aa021109c2ab9efa7b4a9dd7f6be" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:dc693d51bc5a9e23bd7a77f5162d8651279051aab7979b71b0e74a322f99593f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:39c63edba3548f330476fa962363a4875ab6e6fd03aeb37f67f7bd83127c2ac6" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f151486be73932b0274268a2f4280052bd653bf9d6b73cdad065d6e3623d5de8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:34c6d859587525871edfcdb441958e9a5c2ac75564e35d7ec523642c86eb6fd8" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:065c6107edf3aae96bd0e290215cf1bb861dfff6e6973629c13f808f0bbf283a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:77d6eb1fe1decae8190982be5beb621a8e99b359433998145f5d646aa326e516" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:5d0a34b09e0ba5ae419ec0d144b6252318e4a149015e52a8534d07ec203ffa45" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:ba2f69006f8a5766b75c7333ef6669e9614afd28780a0c567b13a23168f3bbc1" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b31362568d27666ab8724302d56d5e6cbeaf20a05b18ceab92897b5d78e75703" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:21d4b288ed21b19e39132010e07804eeceeebea8f7697355b26af93b4363d8b2" }, { "name": "kube-rbac-proxy", @@ -73392,9 +74647,9 @@ } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.3", + "name": "rhacs-operator.v4.3.4", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:22a1e067ff9e0e0b5f2f819ffc863e7a877030b4c18fbab0abfa75af46307d15", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c87ee25e0a7d9b4359d38af6fcd6551b038728cf9c701dac3687cd441faa7810", "properties": [ { "type": "olm.gvk", @@ -73416,7 +74671,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.3" + "version": "4.3.4" } }, { @@ -73426,10 +74681,10 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e", - "createdAt": "2024-01-16T14:42:12.278842+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9", + "createdAt": "2024-01-19T17:55:30.535183+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.2.0 < 4.3.3", + "olm.skipRange": ">= 4.2.0 < 4.3.4", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -74578,51 +75833,51 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a266b9263d05d9d092bf8bfd1e9fd26b4ffd10a0330bce5d028f1d3f75164626" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ade3c0b4cfb4b40b107c05dd4e384a3d255852bbfc99cc45b53472180f4aad73" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e11d77969890cdd930dbbc3b4c04940edc343ed3c96aa3b64beb6af9a7772b99" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:718dafd75b2f37904acae157de11be8827c0adc523f870c3bc8cc89f3987d8a2" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:6b7ef7314c80fc7a0188dfa01d6dfd896c1c95a4cbaa62ab8ea7d35ad61038f1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:55695b0f92544108645c2bd2128f0bae1f2b7f87fb774fd8345ce71c9319c11e" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:1df6cfb5dc581651a4502c9108959dbcc7fd146dd455dbfb2498ce58c0b53427" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:04820b12f8d78d1da4c6fa055f8284be0c0b6e3541969257c87fb950adfa044c" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:22a1e067ff9e0e0b5f2f819ffc863e7a877030b4c18fbab0abfa75af46307d15" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c87ee25e0a7d9b4359d38af6fcd6551b038728cf9c701dac3687cd441faa7810" }, { - "name": "rhacs-rhel8-operator-74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e" + "name": "rhacs-rhel8-operator-2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:74f7c1a984fc0aaeacbb0c93b83b1d41352c8eb0c064da8ce353c206ce0f4c6e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:39c63edba3548f330476fa962363a4875ab6e6fd03aeb37f67f7bd83127c2ac6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:31fda70497c8d178257a58830ff64adc2e452e4ef946293b62d6cb2974bd52ed" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:34c6d859587525871edfcdb441958e9a5c2ac75564e35d7ec523642c86eb6fd8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:359d14444d599da13706737560f5f3f344e47ab15aaed806164a450414f599df" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:77d6eb1fe1decae8190982be5beb621a8e99b359433998145f5d646aa326e516" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:1ac1d4f3c9fee60d4927e7e1df38867b5b5cae738f2e036ae365695e3cecf6d2" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:ba2f69006f8a5766b75c7333ef6669e9614afd28780a0c567b13a23168f3bbc1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:4bb16bf9a0162dc80fce2ae7ba941540ea03c7c1cc929a2af27c9acb51030806" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:21d4b288ed21b19e39132010e07804eeceeebea8f7697355b26af93b4363d8b2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:c773398e7278d7ec19c802786f0db169bcaba24449d906ed2c3327d91203b94d" }, { "name": "kube-rbac-proxy", @@ -74632,9 +75887,9 @@ } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.4", + "name": "rhacs-operator.v4.3.5", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c87ee25e0a7d9b4359d38af6fcd6551b038728cf9c701dac3687cd441faa7810", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7", "properties": [ { "type": "olm.gvk", @@ -74656,7 +75911,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.4" + "version": "4.3.5" } }, { @@ -74666,10 +75921,17 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9", - "createdAt": "2024-01-19T17:55:30.535183+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217", + "createdAt": "2024-03-12T22:54:10.070283+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", - "olm.skipRange": ">= 4.2.0 < 4.3.4", + "features.operators.openshift.io/disconnected": "true", + "features.operators.openshift.io/fips-compliant": "false", + "features.operators.openshift.io/proxy-aware": "true", + "features.operators.openshift.io/tls-profiles": "false", + "features.operators.openshift.io/token-auth-aws": "false", + "features.operators.openshift.io/token-auth-azure": "false", + "features.operators.openshift.io/token-auth-gcp": "false", + "olm.skipRange": ">= 4.2.0 < 4.3.5", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -75818,63 +77080,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ade3c0b4cfb4b40b107c05dd4e384a3d255852bbfc99cc45b53472180f4aad73" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:e562f838e61edb366ec09298c183d5745576677729e4448dff2db604dd21f8f5" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:718dafd75b2f37904acae157de11be8827c0adc523f870c3bc8cc89f3987d8a2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:92c395af04f3731e7de2002c747935a4c9ed0f966dbea3c07cfa1fab149dff75" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:55695b0f92544108645c2bd2128f0bae1f2b7f87fb774fd8345ce71c9319c11e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:e13807fad4d3c64a3938b9b674e0b960e8dd6db2aae348e7decc1775644d5045" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:04820b12f8d78d1da4c6fa055f8284be0c0b6e3541969257c87fb950adfa044c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:c704bfe3c7a40f36bdfdcb89e343d33a800eb4873927c267f1d0124d0ca8ae1b" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c87ee25e0a7d9b4359d38af6fcd6551b038728cf9c701dac3687cd441faa7810" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7" }, { - "name": "rhacs-rhel8-operator-2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9" + "name": "rhacs-rhel8-operator-b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2667b40a5a90d15eaa696453dd39146c2072f9630aa14deac1a0d38bddc2aee9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:31fda70497c8d178257a58830ff64adc2e452e4ef946293b62d6cb2974bd52ed" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d6fa7a57eb4d934f57a80fcb5d26f6eb6bebaf577540603e8edfdae454d220f3" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:359d14444d599da13706737560f5f3f344e47ab15aaed806164a450414f599df" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f495dbdbfb7041bc27fb7334da6702ce6091bdd69295f362e64b8c5e41c0f71f" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:1ac1d4f3c9fee60d4927e7e1df38867b5b5cae738f2e036ae365695e3cecf6d2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8fbd53e9384844e062e59e029e0cba6983dee990703f14803d7fcbd39e7915a0" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:4bb16bf9a0162dc80fce2ae7ba941540ea03c7c1cc929a2af27c9acb51030806" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:5fd3846d4dfccf96ecd517c432998d7d286e1d070d00daa4a22ee7329dfd9fd3" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:c773398e7278d7ec19c802786f0db169bcaba24449d906ed2c3327d91203b94d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:ed60ba81f696aefffe27e5c2513b016271a0c176da9f211542c90ad244f0bc91" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:a8ad0e76ce4cae9f9b36aecf125c4ed56fc2d776fe3df113d41bfc1c2f8b3602" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:48cf6065279581d33647ab384b9b22c444cab82d3da729f51b34af29cd8987ec" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.5", + "name": "rhacs-operator.v4.3.6", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:355567de35493ef1122e8a60385828c98ba62272aaf60d4ab6336466418ec6c9", "properties": [ { "type": "olm.gvk", @@ -75896,7 +77158,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.5" + "version": "4.3.6" } }, { @@ -75906,8 +77168,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217", - "createdAt": "2024-03-12T22:54:10.070283+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3", + "createdAt": "2024-03-26T14:20:06.765795+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -75916,7 +77178,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.2.0 < 4.3.5", + "olm.skipRange": ">= 4.2.0 < 4.3.6", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -77065,63 +78327,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:e562f838e61edb366ec09298c183d5745576677729e4448dff2db604dd21f8f5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:70fc8ed2e572ae048309969be722b96bfe1dd7b079536a8a94f734a441b302d2" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:92c395af04f3731e7de2002c747935a4c9ed0f966dbea3c07cfa1fab149dff75" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:91581683238f048e0b8f21d61f4cf23905021b0d6d38d903675b6ddebd151ab9" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:e13807fad4d3c64a3938b9b674e0b960e8dd6db2aae348e7decc1775644d5045" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:536925964bb05b3ed9ca4b287a58e161bec58f139b07490347c8dd86333b1e3a" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:c704bfe3c7a40f36bdfdcb89e343d33a800eb4873927c267f1d0124d0ca8ae1b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:2e87b031a7f36e01bff51f50befae11147903b73feb44592c431d45d045ddb5b" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c1e7a5e80831c5f078e1aa26e57870aec1949c148f02c255e76a7a98c01099d7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:355567de35493ef1122e8a60385828c98ba62272aaf60d4ab6336466418ec6c9" }, { - "name": "rhacs-rhel8-operator-b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217" + "name": "rhacs-rhel8-operator-93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b015698840362ecb3c33796634f2300755c6fdebbb07075de89d3a28dd4f7217" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d6fa7a57eb4d934f57a80fcb5d26f6eb6bebaf577540603e8edfdae454d220f3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2a629ec8e638de66fdea6fd3bc6302d6dfd4c045e315753b7a2f0847f7750292" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f495dbdbfb7041bc27fb7334da6702ce6091bdd69295f362e64b8c5e41c0f71f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2bbc545d916e17c788a4880919edebfa1123d1045fa93df2b86cf176a031e432" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8fbd53e9384844e062e59e029e0cba6983dee990703f14803d7fcbd39e7915a0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:333563e3796ca06ce05f1198ab5d1c4daa4719355ed62cc161acc6ac76ae8f8c" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:5fd3846d4dfccf96ecd517c432998d7d286e1d070d00daa4a22ee7329dfd9fd3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:356cb467b3995c961e50ed86babe6201c42681a5a9474f88e5697365b6156666" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:ed60ba81f696aefffe27e5c2513b016271a0c176da9f211542c90ad244f0bc91" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:3d8880e528761f68b20473c08a96e378bd15027860e454756ec40242f5d1691d" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:48cf6065279581d33647ab384b9b22c444cab82d3da729f51b34af29cd8987ec" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:12db245af3b8475c9b5680bb0035c566109819e05cfe62bd1dfdfb5d6ed25bea" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.6", + "name": "rhacs-operator.v4.3.7", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:355567de35493ef1122e8a60385828c98ba62272aaf60d4ab6336466418ec6c9", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e8115bdc0ed2d01d7576524e9796606244963a1447eae55872674c0113fb9c4", "properties": [ { "type": "olm.gvk", @@ -77143,7 +78405,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.6" + "version": "4.3.7" } }, { @@ -77153,8 +78415,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3", - "createdAt": "2024-03-26T14:20:06.765795+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224", + "createdAt": "2024-05-08T08:29:41.699528+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -77163,7 +78425,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.2.0 < 4.3.6", + "olm.skipRange": ">= 4.2.0 < 4.3.7", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -78312,63 +79574,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:70fc8ed2e572ae048309969be722b96bfe1dd7b079536a8a94f734a441b302d2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9ca2f9095873d1bf68b01cf733cabbd38f3ba2f6b4f53dba9a0ec2d0c74ee523" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:91581683238f048e0b8f21d61f4cf23905021b0d6d38d903675b6ddebd151ab9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0073d3022da55561cc5b3b12046662e918c3802f3a6806783471dc0019b914ea" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:536925964bb05b3ed9ca4b287a58e161bec58f139b07490347c8dd86333b1e3a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:46c11b36d974cf3e28e424b5acf79652658cab22bb508c511e27cc74866e55b7" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:2e87b031a7f36e01bff51f50befae11147903b73feb44592c431d45d045ddb5b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:e147f65a87b2c20613a9b03493703dace3691f7a12495f0e7f1122f4547364f5" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:355567de35493ef1122e8a60385828c98ba62272aaf60d4ab6336466418ec6c9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e8115bdc0ed2d01d7576524e9796606244963a1447eae55872674c0113fb9c4" }, { - "name": "rhacs-rhel8-operator-93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3" + "name": "rhacs-rhel8-operator-31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:93cb63f2561ef7a9642658cef1397921b3313437e2b6fd0f6a33e6f615a1fac3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2a629ec8e638de66fdea6fd3bc6302d6dfd4c045e315753b7a2f0847f7750292" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:8a9790b4aa8efa66bcf1deb70c0aa7dbddc433ab1ae1150bb9e08bdcf0226c33" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2bbc545d916e17c788a4880919edebfa1123d1045fa93df2b86cf176a031e432" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:089b8a94a78484480ebbe59c54e53a7a242d749ad275c393a429fc7f788ea2ae" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:333563e3796ca06ce05f1198ab5d1c4daa4719355ed62cc161acc6ac76ae8f8c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d687822eafb3697530aa646a289059b33c815bebb284dd43752c8d5e723367ca" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:356cb467b3995c961e50ed86babe6201c42681a5a9474f88e5697365b6156666" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:322437fcc03bad63a35df308261b3dbdd54cc58ab9f81e7e1284f89fb10af5ef" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:3d8880e528761f68b20473c08a96e378bd15027860e454756ec40242f5d1691d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:67f0c97ff069347230d611bb3b177a55266346b721da0be596d2f57d49f2df8a" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:12db245af3b8475c9b5680bb0035c566109819e05cfe62bd1dfdfb5d6ed25bea" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:d3d498d1e716abe32ee8f561888966f5fa89a27d1426b6c0e0ec856e6a43d13c" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.7", + "name": "rhacs-operator.v4.3.8", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e8115bdc0ed2d01d7576524e9796606244963a1447eae55872674c0113fb9c4", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:30f9384244819da013358325cec364bb210b3b33b4cf9680698531fe50562aac", "properties": [ { "type": "olm.gvk", @@ -78390,7 +79652,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.7" + "version": "4.3.8" } }, { @@ -78400,8 +79662,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224", - "createdAt": "2024-05-08T08:29:41.699528+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce", + "createdAt": "2024-06-06T22:31:19.365878+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -78410,7 +79672,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.2.0 < 4.3.7", + "olm.skipRange": ">= 4.2.0 < 4.3.8", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -79559,63 +80821,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9ca2f9095873d1bf68b01cf733cabbd38f3ba2f6b4f53dba9a0ec2d0c74ee523" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:10d0cc82b6eddd089f3a7af37b872c33248513d0b4d3f094b6f62c01f4460825" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0073d3022da55561cc5b3b12046662e918c3802f3a6806783471dc0019b914ea" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:9fba889021a876ab627ff8c496e4b6c46c221c61142cd0c76daf33c89762e2c1" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:46c11b36d974cf3e28e424b5acf79652658cab22bb508c511e27cc74866e55b7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2bb643651c8d51525223df3b2b675947174bbe9f1eaea8688e1fa83044cfa41f" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:e147f65a87b2c20613a9b03493703dace3691f7a12495f0e7f1122f4547364f5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6b55a25eb3a611c648d9be883828834592229c16f4166fd28ef40a25fc667061" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e8115bdc0ed2d01d7576524e9796606244963a1447eae55872674c0113fb9c4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:30f9384244819da013358325cec364bb210b3b33b4cf9680698531fe50562aac" }, { - "name": "rhacs-rhel8-operator-31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224" + "name": "rhacs-rhel8-operator-266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:31fa86a7e3dcf3687b8f9cf469df6ce5f79ad6b6199bdf4f242c9c917754f224" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:8a9790b4aa8efa66bcf1deb70c0aa7dbddc433ab1ae1150bb9e08bdcf0226c33" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:bdf9785bff51194636c6e8a518448c6d12a297bd31c4bb2e79d07084409c18b4" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:089b8a94a78484480ebbe59c54e53a7a242d749ad275c393a429fc7f788ea2ae" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:5092c3fbb4a38c06a2f42d125dc718ef0e1005f304ad8046afdd2a5e7ccbc580" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d687822eafb3697530aa646a289059b33c815bebb284dd43752c8d5e723367ca" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:2c35cb6f518393d002edd2bf5f714c1d053cd0fab55f6152a2f35676e4979202" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:322437fcc03bad63a35df308261b3dbdd54cc58ab9f81e7e1284f89fb10af5ef" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:b0c9b3858fc0547dcb4eb3065dedd5bbcf1e1f6707a8ab812ed06882d4f6d6ad" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:67f0c97ff069347230d611bb3b177a55266346b721da0be596d2f57d49f2df8a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b7eb17fbcf6c4a6e4205ad66f1ffd9b10a4634f6ef5045d407c266566b1f255d" }, { "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:d3d498d1e716abe32ee8f561888966f5fa89a27d1426b6c0e0ec856e6a43d13c" + "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:c36a557c9dc2ae4479c432933a9a4dbef38f2be53360a68a5b6befb614d01dac" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.3.8", + "name": "rhacs-operator.v4.4.0", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:30f9384244819da013358325cec364bb210b3b33b4cf9680698531fe50562aac", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:94fcee9ac22671bd18be77381214665d9289151703a9ed78c29cee02b92612f4", "properties": [ { "type": "olm.gvk", @@ -79637,7 +80899,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.3.8" + "version": "4.4.0" } }, { @@ -79647,8 +80909,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce", - "createdAt": "2024-06-06T22:31:19.365878+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414", + "createdAt": "2024-03-28T13:36:16.105762+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -79657,7 +80919,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.2.0 < 4.3.8", + "olm.skipRange": ">= 4.3.0 < 4.4.0", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -79731,6 +80993,11 @@ "displayName": "Scanner Component Settings", "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container images." }, + { + "path": "scannerV4", + "displayName": "Scanner V4 Component Settings", + "description": "Settings for the Scanner V4 component, which can run in addition to the previously existing Scanner components" + }, { "path": "egress", "displayName": "Egress", @@ -79757,14 +81024,6 @@ "urn:alm:descriptor:com.tectonic.ui:advanced" ] }, - { - "path": "misc", - "displayName": "Miscellaneous", - "description": "Miscellaneous settings.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:advanced" - ] - }, { "path": "overlays", "displayName": "Overlays", @@ -79781,6 +81040,14 @@ "urn:alm:descriptor:com.tectonic.ui:advanced" ] }, + { + "path": "misc", + "displayName": "Miscellaneous", + "description": "Deprecated field. This field will be removed in a future release. Miscellaneous settings.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, { "path": "central.adminPasswordSecret", "displayName": "Administrator Password", @@ -79879,8 +81146,8 @@ }, { "path": "central.db.connectionString", - "displayName": "Connection String (Technology Preview)", - "description": "NOTE: Connecting to an external database is in Technology Preview. Specify a connection string that corresponds to an external database. If set, the operator will not manage Central DB. When using this option, you must explicitly set a password secret; automatically generating a password will not be supported." + "displayName": "Connection String", + "description": "Specify a connection string that corresponds to a database managed elsewhere. If set, the operator will not manage the Central DB. When using this option, you must explicitly set a password secret; automatically generating a password will not be supported." }, { "path": "central.db.persistence", @@ -80071,7 +81338,7 @@ { "path": "central.notifierSecretsEncryption.enabled", "displayName": "Enabled", - "description": "Enables the encryption of notifier secrets stored in the Central DB. An encryption key must be provided in a secret called `central-encryption-key` in the Central namespace, with the key stored in the `encryption-key` data field." + "description": "Enables the encryption of notifier secrets stored in the Central DB." }, { "path": "central.persistence.persistentVolumeClaim", @@ -80166,7 +81433,10 @@ { "path": "misc.createSCCs", "displayName": "Create SecurityContextConstraints for Operand", - "description": "Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads." + "description": "Deprecated field. This field will be removed in a future release. Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] }, { "path": "monitoring.openshift.enabled", @@ -80260,7 +81530,7 @@ { "path": "scanner.analyzer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of analyzer replicas is managed dynamically based on the load, within the limits specified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." }, { "path": "scanner.analyzer.scaling.replicas", @@ -80307,6 +81577,210 @@ "displayName": "Expose Endpoint", "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." }, + { + "path": "scannerV4.scannerComponent", + "displayName": "Scanner V4 component", + "description": "If you want to deploy Scanner V4 components set this to \"Enabled\"" + }, + { + "path": "scannerV4.indexer", + "displayName": "Indexer", + "description": "Settings pertaining to the indexer deployment.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled" + ] + }, + { + "path": "scannerV4.matcher", + "displayName": "Matcher", + "description": "Settings pertaining to the matcher deployment.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled" + ] + }, + { + "path": "scannerV4.db", + "displayName": "DB", + "description": "Settings pertaining to the DB deployment.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled" + ] + }, + { + "path": "scannerV4.monitoring", + "displayName": "Monitoring", + "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint allows other services to collect metrics from Scanner V4, provided in Prometheus compatible format.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled" + ] + }, + { + "path": "scannerV4.db.persistence", + "displayName": "Persistence", + "description": "Configures how Scanner V4 should store its persistent data. You can use a persistent volume claim (the recommended default), a host path, or an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." + }, + { + "path": "scannerV4.db.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scannerV4.db.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "scannerV4.db.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim", + "displayName": "Persistent volume claim", + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + }, + { + "path": "scannerV4.db.persistence.hostPath", + "displayName": "Host path", + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + }, + { + "path": "scannerV4.db.persistence.hostPath.path", + "displayName": "Path", + "description": "The path on the host running Central." + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", + "displayName": "Claim Name", + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"scanner-v4-db\" if not set." + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.size", + "displayName": "Size", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:text" + ] + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.storageClassName", + "displayName": "Storage Class", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:StorageClass" + ] + }, + { + "path": "scannerV4.indexer.scaling", + "displayName": "Scaling", + "description": "Controls the number of replicas and autoscaling for this component." + }, + { + "path": "scannerV4.indexer.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scannerV4.indexer.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "scannerV4.indexer.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scannerV4.indexer.scaling.autoScaling", + "displayName": "Autoscaling", + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + }, + { + "path": "scannerV4.indexer.scaling.replicas", + "displayName": "Default Replicas", + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + }, + { + "path": "scannerV4.indexer.scaling.minReplicas", + "displayName": "Autoscaling Minimum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.indexer.scaling.maxReplicas", + "displayName": "Autoscaling Maximum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.matcher.scaling", + "displayName": "Scaling", + "description": "Controls the number of replicas and autoscaling for this component." + }, + { + "path": "scannerV4.matcher.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scannerV4.matcher.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "scannerV4.matcher.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scannerV4.matcher.scaling.autoScaling", + "displayName": "Autoscaling", + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + }, + { + "path": "scannerV4.matcher.scaling.replicas", + "displayName": "Default Replicas", + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + }, + { + "path": "scannerV4.matcher.scaling.minReplicas", + "displayName": "Autoscaling Minimum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.matcher.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.matcher.scaling.maxReplicas", + "displayName": "Autoscaling Maximum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.matcher.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.monitoring.exposeEndpoint", + "displayName": "Expose Endpoint", + "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + }, { "path": "tls.additionalCAs", "displayName": "Additional CAs" @@ -80379,6 +81853,11 @@ "displayName": "Scanner Component Settings", "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container images stored in a cluster-local image repository." }, + { + "path": "scannerV4", + "displayName": "Scanner V4 Component Settings", + "description": "Settings for the Scanner V4 components, which can run in addition to the previously existing Scanner components" + }, { "path": "tls", "displayName": "TLS", @@ -80400,14 +81879,6 @@ "urn:alm:descriptor:com.tectonic.ui:advanced" ] }, - { - "path": "misc", - "displayName": "Miscellaneous", - "description": "Miscellaneous settings.", - "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:advanced" - ] - }, { "path": "overlays", "displayName": "Overlays", @@ -80432,6 +81903,14 @@ "urn:alm:descriptor:com.tectonic.ui:advanced" ] }, + { + "path": "misc", + "displayName": "Miscellaneous", + "description": "Deprecated field. This field will be removed in a future release. Miscellaneous settings.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, { "path": "admissionControl.listenOnCreates", "displayName": "Listen On Creates", @@ -80519,7 +81998,10 @@ { "path": "misc.createSCCs", "displayName": "Create SecurityContextConstraints for Operand", - "description": "Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads." + "description": "Deprecated field. This field will be removed in a future release. Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] }, { "path": "monitoring.openshift.enabled", @@ -80581,7 +82063,7 @@ { "path": "perNode.collector.collection", "displayName": "Collection", - "description": "The method for system-level data collection. EBPF is recommended. If you select \"NoCollection\", you will not be able to see any information about network activity and process executions. The remaining settings in these section will not have any effect.", + "description": "The method for system-level data collection. CORE_BPF is recommended. If you select \"NoCollection\", you will not be able to see any information about network activity and process executions. The remaining settings in these section will not have any effect. The value is a subject of conversion by the operator if needed, e.g. to remove deprecated methods.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:select:EBPF", "urn:alm:descriptor:com.tectonic.ui:select:CORE_BPF", @@ -80593,6 +82075,14 @@ "displayName": "Image Flavor", "description": "The image flavor to use for collector. \"Regular\" images are bigger in size, but contain probes for most kernels. If you use the \"Slim\" image flavor, you must ensure that your Central instance is connected to the internet, or regularly receives Collector Support Package updates (for further instructions, please refer to the documentation)." }, + { + "path": "perNode.collector.forceCollection", + "displayName": "Force Collection", + "description": "When the \"collection\" field is set to the deprecated value \"EBPF\", then setting this to \"true\" prevents conversion of the collection method to \"CORE_BPF\". This could be used in exceptional situations when \"EBPF\" has to be used.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, { "path": "perNode.collector.resources", "displayName": "Resources", @@ -80661,7 +82151,7 @@ { "path": "scanner.analyzer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of analyzer replicas is managed dynamically based on the load, within the limits specified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." }, { "path": "scanner.analyzer.scaling.replicas", @@ -80703,6 +82193,152 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scannerV4.scannerComponent", + "displayName": "Scanner V4 component", + "description": "If you want to enable the Scanner V4 component set this to \"AutoSense\"" + }, + { + "path": "scannerV4.indexer", + "displayName": "Indexer", + "description": "Settings pertaining to the indexer deployment.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" + ] + }, + { + "path": "scannerV4.db", + "displayName": "DB", + "description": "Settings pertaining to the DB deployment.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" + ] + }, + { + "path": "scannerV4.monitoring", + "displayName": "Monitoring", + "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint allows other services to collect metrics from Scanner V4, provided in Prometheus compatible format.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" + ] + }, + { + "path": "scannerV4.db.persistence", + "displayName": "Persistence", + "description": "Configures how Scanner V4 should store its persistent data. You can use a persistent volume claim (the recommended default), a host path, or an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." + }, + { + "path": "scannerV4.db.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scannerV4.db.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "scannerV4.db.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim", + "displayName": "Persistent volume claim", + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + }, + { + "path": "scannerV4.db.persistence.hostPath", + "displayName": "Host path", + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + }, + { + "path": "scannerV4.db.persistence.hostPath.path", + "displayName": "Path", + "description": "The path on the host running Central." + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", + "displayName": "Claim Name", + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"scanner-v4-db\" if not set." + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.size", + "displayName": "Size", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:text" + ] + }, + { + "path": "scannerV4.db.persistence.persistentVolumeClaim.storageClassName", + "displayName": "Storage Class", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "x-descriptors": [ + "urn:alm:descriptor:io.kubernetes:StorageClass" + ] + }, + { + "path": "scannerV4.indexer.scaling", + "displayName": "Scaling", + "description": "Controls the number of replicas and autoscaling for this component." + }, + { + "path": "scannerV4.indexer.resources", + "displayName": "Resources", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" + ] + }, + { + "path": "scannerV4.indexer.nodeSelector", + "displayName": "Node Selector", + "description": "If you want this component to only run on specific nodes, you can configure a node selector here." + }, + { + "path": "scannerV4.indexer.tolerations", + "displayName": "Tolerations", + "description": "If you want this component to only run on specific nodes, you can configure tolerations of tainted nodes.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:tolerations" + ] + }, + { + "path": "scannerV4.indexer.scaling.autoScaling", + "displayName": "Autoscaling", + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + }, + { + "path": "scannerV4.indexer.scaling.replicas", + "displayName": "Default Replicas", + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + }, + { + "path": "scannerV4.indexer.scaling.minReplicas", + "displayName": "Autoscaling Minimum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.indexer.scaling.maxReplicas", + "displayName": "Autoscaling Maximum Replicas", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" + ] + }, + { + "path": "scannerV4.monitoring.exposeEndpoint", + "displayName": "Expose Endpoint", + "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + }, { "path": "sensor.resources", "displayName": "Resources", @@ -80806,63 +82442,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:10d0cc82b6eddd089f3a7af37b872c33248513d0b4d3f094b6f62c01f4460825" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:1dfdfcfff0a0b63fbfefbf4d8f729115fa451579decbcde2b0642f5db135e9aa" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:9fba889021a876ab627ff8c496e4b6c46c221c61142cd0c76daf33c89762e2c1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:350e81da8098d92433cf098c509881f9d5d6c824e61c9132bdf12cdf60e3a303" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2bb643651c8d51525223df3b2b675947174bbe9f1eaea8688e1fa83044cfa41f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:275959a9daa8a8273ce35fc8baab9e6a16eb54b29e6a56326e85a4e27b1f4432" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6b55a25eb3a611c648d9be883828834592229c16f4166fd28ef40a25fc667061" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:78e97d1015ce6887acdd54e308a35f96b3d2093f773f0a3f1b4f49c5e693332d" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:30f9384244819da013358325cec364bb210b3b33b4cf9680698531fe50562aac" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:94fcee9ac22671bd18be77381214665d9289151703a9ed78c29cee02b92612f4" }, { - "name": "rhacs-rhel8-operator-266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce" + "name": "manager", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414" }, { - "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:266cbbc270efafa26d5d15f3e333c96eaedee3b47854ff337ae1c572d34901ce" + "name": "rhacs-rhel8-operator-3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:bdf9785bff51194636c6e8a518448c6d12a297bd31c4bb2e79d07084409c18b4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c6c578a79e7fdf07a424af06a569dafe707f58096dbd5bb4e4b8617f493747c9" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:5092c3fbb4a38c06a2f42d125dc718ef0e1005f304ad8046afdd2a5e7ccbc580" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:ca6719b04994956335e2a57af104cc185576838ff26a2405e49e42bf0f8cca94" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:2c35cb6f518393d002edd2bf5f714c1d053cd0fab55f6152a2f35676e4979202" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:126a1f17667e246cd9a6d175b1b5bd74a769e10b427983f749b471c3e3d9f380" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:b0c9b3858fc0547dcb4eb3065dedd5bbcf1e1f6707a8ab812ed06882d4f6d6ad" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:57d281dfe9f6935a343d3ebbf1fc15e230618de1e99b776d1a84954b7b93aa41" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b7eb17fbcf6c4a6e4205ad66f1ffd9b10a4634f6ef5045d407c266566b1f255d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:fc3470f9272e39ed86ea20970d34ecc2798982756d32ed8bbabc7c992564cfbc" }, { - "name": "kube-rbac-proxy", - "image": "registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:c36a557c9dc2ae4479c432933a9a4dbef38f2be53360a68a5b6befb614d01dac" + "name": "scanner_v4_db", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:0fbf174c4741ee9ea4c92993d65e3f92f38d26c6eb5e9a1e9bb2060034704453" + }, + { + "name": "scanner_v4", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:d40b4e3fb44243a81fb59b33f7921f9fcc4f888bd33268e131ea2b12b7bc2e82" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.0", + "name": "rhacs-operator.v4.4.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:94fcee9ac22671bd18be77381214665d9289151703a9ed78c29cee02b92612f4", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:7612cd4a854c01f27df8c36d74413bd52f85f5e7c73b6a7bd565e0d531a35862", "properties": [ { "type": "olm.gvk", @@ -80884,7 +82524,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.0" + "version": "4.4.1" } }, { @@ -80894,8 +82534,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414", - "createdAt": "2024-03-28T13:36:16.105762+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617", + "createdAt": "2024-04-19T04:56:16.762727+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -80904,7 +82544,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.0", + "olm.skipRange": ">= 4.3.0 < 4.4.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -82427,67 +84067,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:1dfdfcfff0a0b63fbfefbf4d8f729115fa451579decbcde2b0642f5db135e9aa" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:f64428aabe6a7d8740eecc356af2e963810429db426b52667404fff3c5fc6b39" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:350e81da8098d92433cf098c509881f9d5d6c824e61c9132bdf12cdf60e3a303" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d31ed45980477d8b484ad696bd0f2875a040819f29a05b57060b36b13f2f069e" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:275959a9daa8a8273ce35fc8baab9e6a16eb54b29e6a56326e85a4e27b1f4432" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:77a5114354f5bd68f3f86ffed3da0f0f64bf845adcb268cdddfd07646be22501" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:78e97d1015ce6887acdd54e308a35f96b3d2093f773f0a3f1b4f49c5e693332d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:95a0755dc9f14a689aabc9ff12f39d5ae12c514d2cd93d32ad01b05bd5cff6d6" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:94fcee9ac22671bd18be77381214665d9289151703a9ed78c29cee02b92612f4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:7612cd4a854c01f27df8c36d74413bd52f85f5e7c73b6a7bd565e0d531a35862" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617" }, { - "name": "rhacs-rhel8-operator-3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3d66cf825e320519a3be3a19617f8e9565288b998cf1866c1ce6935ec7233414" + "name": "rhacs-rhel8-operator-b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c6c578a79e7fdf07a424af06a569dafe707f58096dbd5bb4e4b8617f493747c9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:6ec85815c64a890846e3551e75feee815b4ff7c6344419a177bc50b045b98890" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:ca6719b04994956335e2a57af104cc185576838ff26a2405e49e42bf0f8cca94" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:3f7607f12090d88a52dd53c2f10c8a565ce5ea46557ba90099b146e07b4ea9f4" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:126a1f17667e246cd9a6d175b1b5bd74a769e10b427983f749b471c3e3d9f380" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:3aca14bc3fb38c12c101d12e535c7636c3e15d4402f265f306681e6759e08ca5" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:57d281dfe9f6935a343d3ebbf1fc15e230618de1e99b776d1a84954b7b93aa41" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:2341c6e277d8f4b79cea262020a34b7cbc8b48ecc6bfe868634042f7b2c3c5c4" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:fc3470f9272e39ed86ea20970d34ecc2798982756d32ed8bbabc7c992564cfbc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:fca1d15ed72bc0a4fd4b3617db09222fd469bcd2228045cd82ac6d8e4eb16287" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:0fbf174c4741ee9ea4c92993d65e3f92f38d26c6eb5e9a1e9bb2060034704453" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:7d6e95555c837ff2cbc8305c0cc98866dd00b00c17e996d935d65ccc96706475" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:d40b4e3fb44243a81fb59b33f7921f9fcc4f888bd33268e131ea2b12b7bc2e82" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:b9109294daa9d7b013f4e6f981ba94c73f6e662d65a542ed7d7bb4006938e6c4" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.1", + "name": "rhacs-operator.v4.4.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:7612cd4a854c01f27df8c36d74413bd52f85f5e7c73b6a7bd565e0d531a35862", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b800c559f4e93d6a8d7422128e26688b8872c589c92944cb46815ec2b7c68371", "properties": [ { "type": "olm.gvk", @@ -82509,7 +84149,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.1" + "version": "4.4.2" } }, { @@ -82519,8 +84159,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617", - "createdAt": "2024-04-19T04:56:16.762727+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9", + "createdAt": "2024-05-17T07:35:35.027800+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -82529,7 +84169,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.1", + "olm.skipRange": ">= 4.3.0 < 4.4.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -84052,67 +85692,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:f64428aabe6a7d8740eecc356af2e963810429db426b52667404fff3c5fc6b39" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:29e9c8a57163175291511ffe4644564820f0c9af8e8f992acd8eae8aa7f47c2e" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d31ed45980477d8b484ad696bd0f2875a040819f29a05b57060b36b13f2f069e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0ea0fd7ec5a40c870653f461bb5f865cecb18dbd3677967a625cee6704437244" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:77a5114354f5bd68f3f86ffed3da0f0f64bf845adcb268cdddfd07646be22501" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:e9fea01c4c677c611ca656fa2ddfc03702131f5ea0ec7175a09b0669ffbf158b" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:95a0755dc9f14a689aabc9ff12f39d5ae12c514d2cd93d32ad01b05bd5cff6d6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:217fd00d4e41a99a5335f43d828db13579dd3ad67d48d17ebea1ab3d60c5337f" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:7612cd4a854c01f27df8c36d74413bd52f85f5e7c73b6a7bd565e0d531a35862" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b800c559f4e93d6a8d7422128e26688b8872c589c92944cb46815ec2b7c68371" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9" }, { - "name": "rhacs-rhel8-operator-b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b77a9aa74cf3b8574d8cc0516810d5faaefae7e0a591eec5b4b70cf34ec8c617" + "name": "rhacs-rhel8-operator-b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:6ec85815c64a890846e3551e75feee815b4ff7c6344419a177bc50b045b98890" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:001f1c0fd30e5c8e477984d3bd4a2b614b79d9a842168b2975724adac26dd2ba" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:3f7607f12090d88a52dd53c2f10c8a565ce5ea46557ba90099b146e07b4ea9f4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:164b20ecc9f7a5a77270bcd368fc560f6ea3e8057877b370e675ebc5d0c23916" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:3aca14bc3fb38c12c101d12e535c7636c3e15d4402f265f306681e6759e08ca5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:7261c6ba8acca4a0e2f7a79105d2015c655eef5b227fbba94104bc61fec02df7" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:2341c6e277d8f4b79cea262020a34b7cbc8b48ecc6bfe868634042f7b2c3c5c4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:0ede3ac7ac71b402c08cf765079a0278a6b38cf126015d2d407143d08f06b107" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:fca1d15ed72bc0a4fd4b3617db09222fd469bcd2228045cd82ac6d8e4eb16287" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d2950a630ee16025bd7b79e5d4d60fc53632926938323c61687741e52736279e" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:7d6e95555c837ff2cbc8305c0cc98866dd00b00c17e996d935d65ccc96706475" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:4fbd75c30e08c3a3cb6ffbb214e4dc952caf928dfcb07898c9388216a2878ccf" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:b9109294daa9d7b013f4e6f981ba94c73f6e662d65a542ed7d7bb4006938e6c4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:b60d655c4aeb39c21407fd18005402e3500ff4ebc8aa807eaf90ac6ef674150e" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.2", + "name": "rhacs-operator.v4.4.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b800c559f4e93d6a8d7422128e26688b8872c589c92944cb46815ec2b7c68371", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:39e7f184f83bdf38407c7d6a783ac9490e81cb1a8ca1af15a6f419be993361f9", "properties": [ { "type": "olm.gvk", @@ -84134,7 +85774,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.2" + "version": "4.4.3" } }, { @@ -84144,8 +85784,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9", - "createdAt": "2024-05-17T07:35:35.027800+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785", + "createdAt": "2024-06-07T17:48:09.590145+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -84154,7 +85794,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.2", + "olm.skipRange": ">= 4.3.0 < 4.4.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -85677,67 +87317,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:29e9c8a57163175291511ffe4644564820f0c9af8e8f992acd8eae8aa7f47c2e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:569255ea56f72faed02d44c108aa1c9f29162ef0fbfcc2467771d98a2692e168" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0ea0fd7ec5a40c870653f461bb5f865cecb18dbd3677967a625cee6704437244" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:3032052a64d644cbbe704eda470f238eb482e6d40a93d992874d71c72d640e07" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:e9fea01c4c677c611ca656fa2ddfc03702131f5ea0ec7175a09b0669ffbf158b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:25442054a6deb20482f8cee15088ad1700586eb2a63a23a3c3b29f8c05e9ab34" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:217fd00d4e41a99a5335f43d828db13579dd3ad67d48d17ebea1ab3d60c5337f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:ffe11cf0805000ae831110807e5d615f230e0d0cda883e4df597646d78601589" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b800c559f4e93d6a8d7422128e26688b8872c589c92944cb46815ec2b7c68371" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:39e7f184f83bdf38407c7d6a783ac9490e81cb1a8ca1af15a6f419be993361f9" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785" }, { - "name": "rhacs-rhel8-operator-b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b1f9f7b6ba8224d01945ad4cff1e7a333ca8af413992102aff184a4c8b1ebed9" + "name": "rhacs-rhel8-operator-a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:001f1c0fd30e5c8e477984d3bd4a2b614b79d9a842168b2975724adac26dd2ba" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7104e324fcc00a742cebe1357f358877845866f7b2ec4eab1b14277c0f9d3243" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:164b20ecc9f7a5a77270bcd368fc560f6ea3e8057877b370e675ebc5d0c23916" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:e8ca461e691f835ca5b106d9962994b8214c5e509b48e7dd385a0e953a7f07c5" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:7261c6ba8acca4a0e2f7a79105d2015c655eef5b227fbba94104bc61fec02df7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:c39a87b21e96c21584af16bec27b8a1ef5db497c4629e899596ca54dcb4870c8" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:0ede3ac7ac71b402c08cf765079a0278a6b38cf126015d2d407143d08f06b107" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1bbada96230fc4921786251519361970ff13402c88aa443c7d2d8fe6096f889f" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d2950a630ee16025bd7b79e5d4d60fc53632926938323c61687741e52736279e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:999170e6177d3a3a527107a9d5acb429b5e06683e64e1fb4907bec6f2d17333c" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:4fbd75c30e08c3a3cb6ffbb214e4dc952caf928dfcb07898c9388216a2878ccf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:c749411127b4b7f3947be6d3f878f798f641a5d742bd60957445ddc4407ef855" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:b60d655c4aeb39c21407fd18005402e3500ff4ebc8aa807eaf90ac6ef674150e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8e44ff967c79ac7e0e7ca08f615fc23bd75d444846fcd03803aea2326f25351d" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.3", + "name": "rhacs-operator.v4.4.4", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:39e7f184f83bdf38407c7d6a783ac9490e81cb1a8ca1af15a6f419be993361f9", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9f84b5e8757bb2b1a7fb7b57cbf5c1e989cd3bbca33566eea94f07af23ae725f", "properties": [ { "type": "olm.gvk", @@ -85759,7 +87399,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.3" + "version": "4.4.4" } }, { @@ -85769,8 +87409,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785", - "createdAt": "2024-06-07T17:48:09.590145+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c", + "createdAt": "2024-06-28T21:30:10.488800+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -85779,7 +87419,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.3", + "olm.skipRange": ">= 4.3.0 < 4.4.4", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -87302,67 +88942,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:569255ea56f72faed02d44c108aa1c9f29162ef0fbfcc2467771d98a2692e168" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:79dfb96fd4d2b1e7cc0eb3c2875fe1273090f0a463688ca70c63d4c12995417b" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:3032052a64d644cbbe704eda470f238eb482e6d40a93d992874d71c72d640e07" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:46ee8bbed08e87a4b4a4df0211859d759e44e0a5a0107d5e7b1dd25d8254f8a2" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:25442054a6deb20482f8cee15088ad1700586eb2a63a23a3c3b29f8c05e9ab34" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:627aa07ec02aec7541abbefde11a719fe300bfdf6e2dc8ce448a47ed68ea6713" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:ffe11cf0805000ae831110807e5d615f230e0d0cda883e4df597646d78601589" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3bfc643acf90182dcd342c2fb3be13391145bca3509e7b202bdd76c6e6839f3f" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:39e7f184f83bdf38407c7d6a783ac9490e81cb1a8ca1af15a6f419be993361f9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9f84b5e8757bb2b1a7fb7b57cbf5c1e989cd3bbca33566eea94f07af23ae725f" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c" }, { - "name": "rhacs-rhel8-operator-a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a2203b3295c9f8354969793e1f8efa06abd52573355935de532531bdf7796785" + "name": "rhacs-rhel8-operator-044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7104e324fcc00a742cebe1357f358877845866f7b2ec4eab1b14277c0f9d3243" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:462f1171b6aaa58dd60576349d581886866cef88c7cc698b4ebc4fbc88872b28" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:e8ca461e691f835ca5b106d9962994b8214c5e509b48e7dd385a0e953a7f07c5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:61e11eeb2029253bd0c198e130555f30bfd54f1a63268cae488a22e9d00500e4" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:c39a87b21e96c21584af16bec27b8a1ef5db497c4629e899596ca54dcb4870c8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:bac349ff96fadaf87b614cd6c506635eef31ee84b9f28d2b88b77b19cb9def31" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1bbada96230fc4921786251519361970ff13402c88aa443c7d2d8fe6096f889f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:dc9e67d135fd477e1aae927d0d3326d93d6195f2ce4e785939e8027a68325bf5" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:999170e6177d3a3a527107a9d5acb429b5e06683e64e1fb4907bec6f2d17333c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:2621fd78eacf27591c1dc7788229fcd2996d3b9c60d69c9e18bb44122626c3a6" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:c749411127b4b7f3947be6d3f878f798f641a5d742bd60957445ddc4407ef855" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:d55776adfc64f6a5ee1be4abbc815ea43e1a0978a43ae79c106b28621142fd5e" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8e44ff967c79ac7e0e7ca08f615fc23bd75d444846fcd03803aea2326f25351d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:03491dc74975580ad99e3c252dbb24e4082b1bd8a0153d382c5ac7c63d2d301f" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.4", + "name": "rhacs-operator.v4.4.5", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9f84b5e8757bb2b1a7fb7b57cbf5c1e989cd3bbca33566eea94f07af23ae725f", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:176837c3041894c294b64da0181b8ad3bc53b3538d5ba70868979c57c7ec1644", "properties": [ { "type": "olm.gvk", @@ -87384,7 +89024,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.4" + "version": "4.4.5" } }, { @@ -87394,8 +89034,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c", - "createdAt": "2024-06-28T21:30:10.488800+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e", + "createdAt": "2024-08-27T12:29:34.335422+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -87404,7 +89044,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.4", + "olm.skipRange": ">= 4.3.0 < 4.4.5", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -88927,67 +90567,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:79dfb96fd4d2b1e7cc0eb3c2875fe1273090f0a463688ca70c63d4c12995417b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:7fe4d35c59a6f5b2ebdddc49d70c50dcf7316f95d4c0119db1e357ff33086bd5" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:46ee8bbed08e87a4b4a4df0211859d759e44e0a5a0107d5e7b1dd25d8254f8a2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:b91e13bf7c84b0b7a405f51e637b203a2378851fe532f51344c5ce5fe3d81538" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:627aa07ec02aec7541abbefde11a719fe300bfdf6e2dc8ce448a47ed68ea6713" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:277c062fb960ed52b6dad334bdca09d7d83912509760080e9dc699377c4c1f9c" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3bfc643acf90182dcd342c2fb3be13391145bca3509e7b202bdd76c6e6839f3f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:9111e2d51457ec6ef717f2e97be48c575274194ea2b61404652f4e104936f73e" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9f84b5e8757bb2b1a7fb7b57cbf5c1e989cd3bbca33566eea94f07af23ae725f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:176837c3041894c294b64da0181b8ad3bc53b3538d5ba70868979c57c7ec1644" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e" }, { - "name": "rhacs-rhel8-operator-044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:044965511860430259846bbcd9f7e16587c717dd0b18815bcc13ee2e2c67206c" + "name": "rhacs-rhel8-operator-16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:462f1171b6aaa58dd60576349d581886866cef88c7cc698b4ebc4fbc88872b28" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:4935d41907366941c5d2956cd96909f239c7244d16bf7d270352e286f233960f" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:61e11eeb2029253bd0c198e130555f30bfd54f1a63268cae488a22e9d00500e4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4dc70643a0feb688407b55fed62f4c3026785642dadce6537f28659d6471e4c7" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:bac349ff96fadaf87b614cd6c506635eef31ee84b9f28d2b88b77b19cb9def31" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:4adc06b109b5bcce64e2ccac60d23eea16aec9a01526534ec8eec1ff6f864779" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:dc9e67d135fd477e1aae927d0d3326d93d6195f2ce4e785939e8027a68325bf5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:81b91cc4ba78abc4ac9177b0748b9fe95b9d8aa3c8298b41ad09fddf50c313e7" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:2621fd78eacf27591c1dc7788229fcd2996d3b9c60d69c9e18bb44122626c3a6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:a6ea6b8a9b6dc7d48f1f37cbe23dae651db8cb360b9c087e899d3994cd4b017a" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:d55776adfc64f6a5ee1be4abbc815ea43e1a0978a43ae79c106b28621142fd5e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:71503d6335a18a086ec4928ea8e0e8a539bcbcd95ca1d64f05a17f4ce45e017d" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:03491dc74975580ad99e3c252dbb24e4082b1bd8a0153d382c5ac7c63d2d301f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:0acd5c16b17620291e31e36e5f901cacdc2f20dd84b53cf58d79912b4d762d8b" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.5", + "name": "rhacs-operator.v4.4.6", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:176837c3041894c294b64da0181b8ad3bc53b3538d5ba70868979c57c7ec1644", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b481c31ea787bb4817304023ab223996b5deaf01f0c80557d652ca2e76a3dfc5", "properties": [ { "type": "olm.gvk", @@ -89009,7 +90649,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.5" + "version": "4.4.6" } }, { @@ -89019,8 +90659,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e", - "createdAt": "2024-08-27T12:29:34.335422+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886", + "createdAt": "2024-11-10T04:53:15.387280+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -89029,7 +90669,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.5", + "olm.skipRange": ">= 4.3.0 < 4.4.6", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -90552,67 +92192,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:7fe4d35c59a6f5b2ebdddc49d70c50dcf7316f95d4c0119db1e357ff33086bd5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:de337ff8e692e430b8ad643ada00f715303d4b4ac279b40a92794a39cc6612bf" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:b91e13bf7c84b0b7a405f51e637b203a2378851fe532f51344c5ce5fe3d81538" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:9b8946e5c126635796b9d3659024ff71a1487d5980c8e86fc62bfc08dd7b354e" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:277c062fb960ed52b6dad334bdca09d7d83912509760080e9dc699377c4c1f9c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:b1f91a861fa150aae28443a9649bf1faf0ae1a65999cac3527d22f3bc57a44ce" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:9111e2d51457ec6ef717f2e97be48c575274194ea2b61404652f4e104936f73e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:00303fec7050c6bcfc7e0c96a17fbd798f66849c6d01085dd4bfaec464a99d50" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:176837c3041894c294b64da0181b8ad3bc53b3538d5ba70868979c57c7ec1644" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b481c31ea787bb4817304023ab223996b5deaf01f0c80557d652ca2e76a3dfc5" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886" }, { - "name": "rhacs-rhel8-operator-16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:16060bbbc481f31daf4cef7649a8878a5d98220b75cc7b96e7453d9bdef7dc4e" + "name": "rhacs-rhel8-operator-4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:4935d41907366941c5d2956cd96909f239c7244d16bf7d270352e286f233960f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:52cc104212f579270004375cfa5147f6c7618098953663f148ede48c6cc86933" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4dc70643a0feb688407b55fed62f4c3026785642dadce6537f28659d6471e4c7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:52609e59f0a918fa77d8bda4d972d8bbf235cd907bf04c60efac12216387691b" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:4adc06b109b5bcce64e2ccac60d23eea16aec9a01526534ec8eec1ff6f864779" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:e7153f65cff6842e2887635292717e7e7f661c4e2e51d084d2a0ccb04fdc6ad9" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:81b91cc4ba78abc4ac9177b0748b9fe95b9d8aa3c8298b41ad09fddf50c313e7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1d65f48654fb976004db1dffc62f1185a7818b26f87db7924a42f11db2b43e67" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:a6ea6b8a9b6dc7d48f1f37cbe23dae651db8cb360b9c087e899d3994cd4b017a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:9d21db5d86f933b80eef9651573e2cd90bc20c3d7068e4ff455d7d91e72fab9c" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:71503d6335a18a086ec4928ea8e0e8a539bcbcd95ca1d64f05a17f4ce45e017d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:825b55f83cd0327845591844e317776f125dc2b9543315cc8893e48daefb7e19" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:0acd5c16b17620291e31e36e5f901cacdc2f20dd84b53cf58d79912b4d762d8b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5b4c9002f5486a7fc1e46c7ad8e6e62cfab9c4e185c5e5b24b804ee855e9c209" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.6", + "name": "rhacs-operator.v4.4.7", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b481c31ea787bb4817304023ab223996b5deaf01f0c80557d652ca2e76a3dfc5", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0584255cd3289c421454544b7eaa7d13be85c0572ddba1731cb86137195232d6", "properties": [ { "type": "olm.gvk", @@ -90634,7 +92274,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.6" + "version": "4.4.7" } }, { @@ -90644,8 +92284,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886", - "createdAt": "2024-11-10T04:53:15.387280+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11", + "createdAt": "2024-11-20T14:24:50.035665+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -90654,7 +92294,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.6", + "olm.skipRange": ">= 4.3.0 < 4.4.7", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -92177,67 +93817,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:de337ff8e692e430b8ad643ada00f715303d4b4ac279b40a92794a39cc6612bf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:512c9e36544363a16ad99082c27f3873c803746f4713d7a4683b87ed84c9e495" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:9b8946e5c126635796b9d3659024ff71a1487d5980c8e86fc62bfc08dd7b354e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:aff9e7d7f925a21d31a7ecffa6fbba0298bedfd56fd622f1509649a2a3fffdb8" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:b1f91a861fa150aae28443a9649bf1faf0ae1a65999cac3527d22f3bc57a44ce" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:d28be04f772c333094373aa44d1ecb36b0d37fcb3dde3247af6119110487ea8c" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:00303fec7050c6bcfc7e0c96a17fbd798f66849c6d01085dd4bfaec464a99d50" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6138135bbf60dc8741381bddc1f73bef62cd80f498251ef18231b2b9db471e97" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b481c31ea787bb4817304023ab223996b5deaf01f0c80557d652ca2e76a3dfc5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0584255cd3289c421454544b7eaa7d13be85c0572ddba1731cb86137195232d6" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11" }, { - "name": "rhacs-rhel8-operator-4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4c52719e62622c25906d2a888fa2f981bbc23d09ddc0862befd433075ed4c886" + "name": "rhacs-rhel8-operator-fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:52cc104212f579270004375cfa5147f6c7618098953663f148ede48c6cc86933" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:3e7bac286117a18dbd6f713234c6d8d9a2f44b8adb823019fd941919afce80d1" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:52609e59f0a918fa77d8bda4d972d8bbf235cd907bf04c60efac12216387691b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c6a58870d884a7bd5e8d5406c19d07b9b697df60258566fc734825e02d54cb52" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:e7153f65cff6842e2887635292717e7e7f661c4e2e51d084d2a0ccb04fdc6ad9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6c3e12d9b7b3e09b8e50d4e60d98f2768632a0375cdc38b2bb24ceb6d314a657" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1d65f48654fb976004db1dffc62f1185a7818b26f87db7924a42f11db2b43e67" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a77ed092e49f6cab07f08a4fc235da4c2c4021f995d7b64daaf7ad66558bacbc" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:9d21db5d86f933b80eef9651573e2cd90bc20c3d7068e4ff455d7d91e72fab9c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:4a1441026abcaacc4414fdcda406d99d87e7d4393870153453f33275bd744beb" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:825b55f83cd0327845591844e317776f125dc2b9543315cc8893e48daefb7e19" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:0f0ddb0bf71cb988061c9538a8fa139718a65fa0172c646854bea575c5a05b16" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5b4c9002f5486a7fc1e46c7ad8e6e62cfab9c4e185c5e5b24b804ee855e9c209" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:ed72ec8d8c930b763e1924340c2b85b812a4c4f2f023c3072c32217eb1efa9b8" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.7", + "name": "rhacs-operator.v4.4.8", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0584255cd3289c421454544b7eaa7d13be85c0572ddba1731cb86137195232d6", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:123c0108bd7a190dd2accfd21786600f787147f040e57fb5f840861e2caa441d", "properties": [ { "type": "olm.gvk", @@ -92259,7 +93899,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.7" + "version": "4.4.8" } }, { @@ -92269,17 +93909,17 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11", - "createdAt": "2024-11-20T14:24:50.035665+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4", + "createdAt": "2025-02-10T19:50:13.597164+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "false", + "features.operators.openshift.io/fips-compliant": "true", "features.operators.openshift.io/proxy-aware": "true", "features.operators.openshift.io/tls-profiles": "false", "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.7", + "olm.skipRange": ">= 4.3.0 < 4.4.8", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -93802,67 +95442,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:512c9e36544363a16ad99082c27f3873c803746f4713d7a4683b87ed84c9e495" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:664a5dc40dc1fa06c47a11e13b0ab5e0612a981d7b69bcfb29422abf3d1a13b2" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:aff9e7d7f925a21d31a7ecffa6fbba0298bedfd56fd622f1509649a2a3fffdb8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:39cfd01236e905034f6645a73063427436c14e351e0e0bc735e73e62aa5a1c3c" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:d28be04f772c333094373aa44d1ecb36b0d37fcb3dde3247af6119110487ea8c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:69c12230a785619c765e3749a7d56f76dce9ce4f530c20e8a9387b99eb65627b" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6138135bbf60dc8741381bddc1f73bef62cd80f498251ef18231b2b9db471e97" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:183c75920ab8e7cb947cb966f1543e39b6fdb5e1bb0caa1b0cf5f89671f0328f" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0584255cd3289c421454544b7eaa7d13be85c0572ddba1731cb86137195232d6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:123c0108bd7a190dd2accfd21786600f787147f040e57fb5f840861e2caa441d" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4" }, { - "name": "rhacs-rhel8-operator-fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fde6ea36658517408457d342f043ed767a2352b8a2a616f3b1e0d6522ce62a11" + "name": "rhacs-rhel8-operator-2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:3e7bac286117a18dbd6f713234c6d8d9a2f44b8adb823019fd941919afce80d1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:467d069ee957aea07882b83b60ae9fcc62ccca159f5d643aac13e531ccf7df88" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c6a58870d884a7bd5e8d5406c19d07b9b697df60258566fc734825e02d54cb52" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:d6b4f8caf342b105c8df14c5c9180cb36123e08d34756ee8fe4f2f76c34f8064" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6c3e12d9b7b3e09b8e50d4e60d98f2768632a0375cdc38b2bb24ceb6d314a657" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:763e7568704971cb4656727dc223374de13e82b4304dd3f5387ddc0f4e42b8b6" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a77ed092e49f6cab07f08a4fc235da4c2c4021f995d7b64daaf7ad66558bacbc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:65707fdad55767ff5598a8d3679fd0779a37f59501e58971b81bebcb23f1f9fc" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:4a1441026abcaacc4414fdcda406d99d87e7d4393870153453f33275bd744beb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:76f9dc2e2ee5595c36530d97dec216e2dbefada2fe0747e3f6a3a725b75722ab" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:0f0ddb0bf71cb988061c9538a8fa139718a65fa0172c646854bea575c5a05b16" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:ba6e25a413c79131b966a097f72c36478933ea52deb55a62acda7011a96b3983" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:ed72ec8d8c930b763e1924340c2b85b812a4c4f2f023c3072c32217eb1efa9b8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:0df4e95c7406aee7812d145cdd4d8c61cec32857fd2079dbc4244954a9d8288a" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.4.8", + "name": "rhacs-operator.v4.5.0", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:123c0108bd7a190dd2accfd21786600f787147f040e57fb5f840861e2caa441d", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:afe3518921c5f14f11f7543f384c6cfc32eaae86d2a38bb6e36b783aeec53f79", "properties": [ { "type": "olm.gvk", @@ -93884,7 +95524,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.4.8" + "version": "4.5.0" } }, { @@ -93894,17 +95534,17 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4", - "createdAt": "2025-02-10T19:50:13.597164+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa", + "createdAt": "2024-07-18T07:50:57.394343+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "true", + "features.operators.openshift.io/fips-compliant": "false", "features.operators.openshift.io/proxy-aware": "true", "features.operators.openshift.io/tls-profiles": "false", "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.3.0 < 4.4.8", + "olm.skipRange": ">= 4.4.0 < 4.5.0", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -95427,67 +97067,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:664a5dc40dc1fa06c47a11e13b0ab5e0612a981d7b69bcfb29422abf3d1a13b2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:bc20ba0e49cc42cf77b6fae6d1bfa37c40d4713783355adbffea40849f0c9d06" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:39cfd01236e905034f6645a73063427436c14e351e0e0bc735e73e62aa5a1c3c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:c12c7f776a974f3d14c52015734874d50146eb302d32c4f020414843fcfa6816" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:69c12230a785619c765e3749a7d56f76dce9ce4f530c20e8a9387b99eb65627b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:df2ecd6353a9cfb38d5e3c4d2ad2a13236dd863dab86291a21e62d0068242154" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:183c75920ab8e7cb947cb966f1543e39b6fdb5e1bb0caa1b0cf5f89671f0328f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:68e65aa5a59df96617226c706381fcb70cc4bf838ddbfb2e4b2a56db5a531f38" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:123c0108bd7a190dd2accfd21786600f787147f040e57fb5f840861e2caa441d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:afe3518921c5f14f11f7543f384c6cfc32eaae86d2a38bb6e36b783aeec53f79" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa" }, { - "name": "rhacs-rhel8-operator-2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2b87569d7f4ef5e06c989b273c378e007c6d87b26eec41774ac1fc67dcd9e4e4" + "name": "rhacs-rhel8-operator-a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:467d069ee957aea07882b83b60ae9fcc62ccca159f5d643aac13e531ccf7df88" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e43a1503811bd30dcb6b1a8ef7f96fe3f904661f1ceff2125115770936b11202" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:d6b4f8caf342b105c8df14c5c9180cb36123e08d34756ee8fe4f2f76c34f8064" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:ab4bab6a66fe5da63820f5f6500b8a4a99b4a6c22272fe7c76f62db6d62849d8" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:763e7568704971cb4656727dc223374de13e82b4304dd3f5387ddc0f4e42b8b6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5c92e9f69b8b7f961c397748014a3d91e64f5b68bff36b46a7e8eacdf267004e" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:65707fdad55767ff5598a8d3679fd0779a37f59501e58971b81bebcb23f1f9fc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f5f82ace42e13461ff57da7d6c69efa616dc60c7b24926c1f2d2becccf642a7b" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:76f9dc2e2ee5595c36530d97dec216e2dbefada2fe0747e3f6a3a725b75722ab" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:693284a6b7e07bb9dd456b75ac2c6caf17ddc293a79093ee2186a50fd4284c26" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:ba6e25a413c79131b966a097f72c36478933ea52deb55a62acda7011a96b3983" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:9018c2e0754e775e13a7e30a7e91d7d267a5f9184c53e352dc1c12ed65d7490d" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:0df4e95c7406aee7812d145cdd4d8c61cec32857fd2079dbc4244954a9d8288a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:7fead1377298400a004aa42e8d7cfc591aaf0ec5cac6d4a2e764ff398db36919" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.0", + "name": "rhacs-operator.v4.5.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:afe3518921c5f14f11f7543f384c6cfc32eaae86d2a38bb6e36b783aeec53f79", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:25680f4d265895dac28686e234f026c10c015b3f94434e00f5c8b680e1c7e834", "properties": [ { "type": "olm.gvk", @@ -95509,7 +97149,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.0" + "version": "4.5.1" } }, { @@ -95519,8 +97159,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa", - "createdAt": "2024-07-18T07:50:57.394343+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f", + "createdAt": "2024-08-09T22:22:58.344207+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -95529,7 +97169,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.0", + "olm.skipRange": ">= 4.4.0 < 4.5.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -97052,67 +98692,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:bc20ba0e49cc42cf77b6fae6d1bfa37c40d4713783355adbffea40849f0c9d06" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:c47c380e159f0fe5d1ee1eacf1fc0a66f90508c0e469066547e6f76600533bd3" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:c12c7f776a974f3d14c52015734874d50146eb302d32c4f020414843fcfa6816" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:76ca11f71297291621873fa9c5c68379630ab16c394489ce74f6d227b9bf87b2" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:df2ecd6353a9cfb38d5e3c4d2ad2a13236dd863dab86291a21e62d0068242154" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:5c8e95d66b5ba6083c5ee1da569190462a859b4ba4190293067e72628a8777c0" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:68e65aa5a59df96617226c706381fcb70cc4bf838ddbfb2e4b2a56db5a531f38" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:2324000b14f541648d60ce899be66a6f0b3d080812bc85cd5c44d5c6dadf1d39" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:afe3518921c5f14f11f7543f384c6cfc32eaae86d2a38bb6e36b783aeec53f79" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:25680f4d265895dac28686e234f026c10c015b3f94434e00f5c8b680e1c7e834" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f" }, { - "name": "rhacs-rhel8-operator-a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a1e894ee102f90b2ee2f2649e5693e7768f6fb969669acbc6e985f7930b46afa" + "name": "rhacs-rhel8-operator-3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e43a1503811bd30dcb6b1a8ef7f96fe3f904661f1ceff2125115770936b11202" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:f8cee8c592880a6885b008816f3b3a6555f44e125e08024a8a8a8e371b294a7f" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:ab4bab6a66fe5da63820f5f6500b8a4a99b4a6c22272fe7c76f62db6d62849d8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c63ff4a336733b75676f16fb8c766b8944d653387932c809a8acc4c321f359be" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5c92e9f69b8b7f961c397748014a3d91e64f5b68bff36b46a7e8eacdf267004e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6b2d1d3b42fda54a179b8cdebe3e6d8599b0d8a5ca9d3755227f2ba5f5190644" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f5f82ace42e13461ff57da7d6c69efa616dc60c7b24926c1f2d2becccf642a7b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:3a4ca0f86da98cd9ae91436924a670f9b300c4706049543f9c7aa5a6524a39db" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:693284a6b7e07bb9dd456b75ac2c6caf17ddc293a79093ee2186a50fd4284c26" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0033b4064951a3074761ce094d09b85ea3605c06b9f77e35cb80f74f714d479c" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:9018c2e0754e775e13a7e30a7e91d7d267a5f9184c53e352dc1c12ed65d7490d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:e9446bf4735d37afd9d293c7a71777278d86bf7569c5ea4da85b3791f9a6ce73" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:7fead1377298400a004aa42e8d7cfc591aaf0ec5cac6d4a2e764ff398db36919" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:019846b2fcdeddf6011483882a1fa8154188f18a74ca254485cca1ef0b281609" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.1", + "name": "rhacs-operator.v4.5.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:25680f4d265895dac28686e234f026c10c015b3f94434e00f5c8b680e1c7e834", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d8021e8768281376c5b64be666fef3e2a398928d35e2e4a9b64f22ab3ac6b168", "properties": [ { "type": "olm.gvk", @@ -97134,7 +98774,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.1" + "version": "4.5.2" } }, { @@ -97144,8 +98784,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f", - "createdAt": "2024-08-09T22:22:58.344207+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62", + "createdAt": "2024-09-10T14:22:01.819821+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -97154,7 +98794,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.1", + "olm.skipRange": ">= 4.4.0 < 4.5.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -98677,67 +100317,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:c47c380e159f0fe5d1ee1eacf1fc0a66f90508c0e469066547e6f76600533bd3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ea991f822bf9365279b387f27f8ad1e15da66bcc87294e1262aef6e14d68e4fb" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:76ca11f71297291621873fa9c5c68379630ab16c394489ce74f6d227b9bf87b2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:2e90455d2e0144eaaa67e8c96ecc80513208822264d069cd6ee091580d3e0cc8" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:5c8e95d66b5ba6083c5ee1da569190462a859b4ba4190293067e72628a8777c0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:e8ef6cd453c9ffce6b81845d1b475ee2a1049c0448be13ffa11998c41a68b604" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:2324000b14f541648d60ce899be66a6f0b3d080812bc85cd5c44d5c6dadf1d39" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:8f6b2db71dfbddacd1db0694dc08c65e14a574ce3002112c45be779f5bde154c" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:25680f4d265895dac28686e234f026c10c015b3f94434e00f5c8b680e1c7e834" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d8021e8768281376c5b64be666fef3e2a398928d35e2e4a9b64f22ab3ac6b168" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62" }, { - "name": "rhacs-rhel8-operator-3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3530bf8b21e989e7a69ec9d74747739991981ed41ba0ad43544e5ce3daa0512f" + "name": "rhacs-rhel8-operator-59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:f8cee8c592880a6885b008816f3b3a6555f44e125e08024a8a8a8e371b294a7f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7768d886a7e645ab0d100897d9f282c2f5935ba347baeae91d5a8a197c464490" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c63ff4a336733b75676f16fb8c766b8944d653387932c809a8acc4c321f359be" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:504c5f64602692254203b8514e3b10b61f7c05c1864ca14c67f4e3778f172804" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6b2d1d3b42fda54a179b8cdebe3e6d8599b0d8a5ca9d3755227f2ba5f5190644" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:0daea5e6dc06d61b0e32e9860f3772e782d848b61cb41fb11be1f614d396432b" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:3a4ca0f86da98cd9ae91436924a670f9b300c4706049543f9c7aa5a6524a39db" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9b5d1a4b63c6c50706d149e391118e5791dcdc387f61e78d6bc20ba811c2f430" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:0033b4064951a3074761ce094d09b85ea3605c06b9f77e35cb80f74f714d479c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f7ae63d68e39454cfa5d09557d9d6ac37dcb04897c396e4df0a80d8a4f423b1e" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:e9446bf4735d37afd9d293c7a71777278d86bf7569c5ea4da85b3791f9a6ce73" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:19fab95311b5ce17ed61e6a1480a60c57a70caedb8a603f27d6cdec40d83aa75" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:019846b2fcdeddf6011483882a1fa8154188f18a74ca254485cca1ef0b281609" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:cf021d74621d36baa1376a8a447e6211a0f34907e6f46500c695354000c5c77d" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.2", + "name": "rhacs-operator.v4.5.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d8021e8768281376c5b64be666fef3e2a398928d35e2e4a9b64f22ab3ac6b168", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8bca9a8388de978872eb2834ea7563baacf3a851e1bbaf11acd507d5acce9999", "properties": [ { "type": "olm.gvk", @@ -98759,7 +100399,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.2" + "version": "4.5.3" } }, { @@ -98769,8 +100409,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62", - "createdAt": "2024-09-10T14:22:01.819821+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054", + "createdAt": "2024-09-26T09:42:38.694087+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -98779,7 +100419,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.2", + "olm.skipRange": ">= 4.4.0 < 4.5.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -100302,67 +101942,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ea991f822bf9365279b387f27f8ad1e15da66bcc87294e1262aef6e14d68e4fb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:be90e0fcee9dcb015bfac1d4c02c8eedded9141ad38ca632fb0715f679423d6e" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:2e90455d2e0144eaaa67e8c96ecc80513208822264d069cd6ee091580d3e0cc8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:490f2e0170d162ec496588b878dbbef96d66bfc1ee8f3c6dc2f9263458d901cd" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:e8ef6cd453c9ffce6b81845d1b475ee2a1049c0448be13ffa11998c41a68b604" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:6762a626b0342a5d9d106827bfd13a94a087882f8885a2bdfab86fd2fd4de310" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:8f6b2db71dfbddacd1db0694dc08c65e14a574ce3002112c45be779f5bde154c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:595c65a6335f33ebc8ee9d012b5cc4945a032ff14a50ac6e24fa2e8e92b583d5" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:d8021e8768281376c5b64be666fef3e2a398928d35e2e4a9b64f22ab3ac6b168" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8bca9a8388de978872eb2834ea7563baacf3a851e1bbaf11acd507d5acce9999" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054" }, { - "name": "rhacs-rhel8-operator-59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:59c604bc151f3700aa93bd06ad70ea493709846e4716621f61c8d9b3dd839c62" + "name": "rhacs-rhel8-operator-9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7768d886a7e645ab0d100897d9f282c2f5935ba347baeae91d5a8a197c464490" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:3a61d781f0d961ab410d88faccff870a356dd15edc3e69e1c1878961db5884c3" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:504c5f64602692254203b8514e3b10b61f7c05c1864ca14c67f4e3778f172804" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2381e5f5befabc89817b3737461ac8948b0c98e9d8fb04b61cbd6055a469e74b" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:0daea5e6dc06d61b0e32e9860f3772e782d848b61cb41fb11be1f614d396432b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9a110df33c169932b4e8c0a98abb83d97a5215fbf0a8b688a66916454835a8d5" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9b5d1a4b63c6c50706d149e391118e5791dcdc387f61e78d6bc20ba811c2f430" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:64439c4e1e8e234d0bafe01394b20c79ede42684144838f8a2411523bda5f1c5" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:f7ae63d68e39454cfa5d09557d9d6ac37dcb04897c396e4df0a80d8a4f423b1e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d19e6dc268547e7fc2a042b799b977f73aa61600050df4b616ee73bbb51a7c9f" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:19fab95311b5ce17ed61e6a1480a60c57a70caedb8a603f27d6cdec40d83aa75" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:8adbe0d91c30aaf847074f62cfb31f415b1bd663f3c0c99b19f57e5e2aac0e6f" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:cf021d74621d36baa1376a8a447e6211a0f34907e6f46500c695354000c5c77d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:28dea7a1ba2c878b13c598518a572f982ce7a4e176b071b93a2320290cbf91db" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.3", + "name": "rhacs-operator.v4.5.4", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8bca9a8388de978872eb2834ea7563baacf3a851e1bbaf11acd507d5acce9999", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8cc0088423509c0fe8413cdf1b85f66269a6e62f3a59708a25fa91acac94a44c", "properties": [ { "type": "olm.gvk", @@ -100384,7 +102024,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.3" + "version": "4.5.4" } }, { @@ -100394,8 +102034,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054", - "createdAt": "2024-09-26T09:42:38.694087+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da", + "createdAt": "2024-10-10T11:16:01.785870+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -100404,7 +102044,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.3", + "olm.skipRange": ">= 4.4.0 < 4.5.4", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -101927,67 +103567,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:be90e0fcee9dcb015bfac1d4c02c8eedded9141ad38ca632fb0715f679423d6e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3b5fffb40c68870387293458bca2ee6f035e7be0c7e95c9d7d47e806b1ee0841" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:490f2e0170d162ec496588b878dbbef96d66bfc1ee8f3c6dc2f9263458d901cd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:53e291598c0756cf0c5402107e568bdd8eb8ae37b41c4596467e09543c8b36dd" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:6762a626b0342a5d9d106827bfd13a94a087882f8885a2bdfab86fd2fd4de310" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:c1eb9c5e3b62805cd30ee314fdf5b92d3ca7a3075b9d9ba02679e3d4b62240b4" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:595c65a6335f33ebc8ee9d012b5cc4945a032ff14a50ac6e24fa2e8e92b583d5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:853ce8d425b52959557227dfb8cb241e6843e710be56b9aaa08fabaa294206a0" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8bca9a8388de978872eb2834ea7563baacf3a851e1bbaf11acd507d5acce9999" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8cc0088423509c0fe8413cdf1b85f66269a6e62f3a59708a25fa91acac94a44c" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da" }, { - "name": "rhacs-rhel8-operator-9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9905fb7988a9203b3aaa3295e19149fd2312872c11e3aca2686cb3c4dcee7054" + "name": "rhacs-rhel8-operator-bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:3a61d781f0d961ab410d88faccff870a356dd15edc3e69e1c1878961db5884c3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e1e3ef9c4113c1a19a1bb304fdb79ec00abf9d54f4337d6481bf4d5943b259bd" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2381e5f5befabc89817b3737461ac8948b0c98e9d8fb04b61cbd6055a469e74b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:03d198bbd9a30578ee57099fc1e6c795bd9ad714ad519fa5419ea89d4b446bfb" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9a110df33c169932b4e8c0a98abb83d97a5215fbf0a8b688a66916454835a8d5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:7a149b76269ee937e2db0b9c1f63e5763c770babc9c32d6f19982163e9fc2831" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:64439c4e1e8e234d0bafe01394b20c79ede42684144838f8a2411523bda5f1c5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:2f110138f996e4e455bb9158ca4174ebecf6053ec73c7793b596cd7094441e63" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d19e6dc268547e7fc2a042b799b977f73aa61600050df4b616ee73bbb51a7c9f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:ad8457ee562501c6fde0bba7361dfd717321af3e959de8f85156ce01f47b1622" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:8adbe0d91c30aaf847074f62cfb31f415b1bd663f3c0c99b19f57e5e2aac0e6f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:f29b582541b597299a37d2e7d834ad03a8bdcc140a867d6c6a3aa6cbe2bde946" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:28dea7a1ba2c878b13c598518a572f982ce7a4e176b071b93a2320290cbf91db" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:2f04f3b6de16da6f4d3ce4a16eff72654d45a76887764b0c54669316a0f54fa3" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.4", + "name": "rhacs-operator.v4.5.5", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8cc0088423509c0fe8413cdf1b85f66269a6e62f3a59708a25fa91acac94a44c", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b262749b36483ac23f7e9311a410b4e1bfb3455074e189d2cd4e88570c953803", "properties": [ { "type": "olm.gvk", @@ -102009,7 +103649,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.4" + "version": "4.5.5" } }, { @@ -102019,8 +103659,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da", - "createdAt": "2024-10-10T11:16:01.785870+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a", + "createdAt": "2024-11-18T20:39:57.020288+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "false", @@ -102029,7 +103669,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.4", + "olm.skipRange": ">= 4.4.0 < 4.5.5", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -103552,67 +105192,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3b5fffb40c68870387293458bca2ee6f035e7be0c7e95c9d7d47e806b1ee0841" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:8d0b78910967f571e27d3f98fd27705010d146683c17dd4bc94a0b513d4ed948" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:53e291598c0756cf0c5402107e568bdd8eb8ae37b41c4596467e09543c8b36dd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:f36004ced010b8fbb1e3241a4b09e158c74a70ddc74db4b0aa70ffc96df78182" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:c1eb9c5e3b62805cd30ee314fdf5b92d3ca7a3075b9d9ba02679e3d4b62240b4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2898d89213eb5ee53361fbc4e376f6963bd3d4b1845532216c0268d90ffa0155" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:853ce8d425b52959557227dfb8cb241e6843e710be56b9aaa08fabaa294206a0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:677098b23e50545d9c3f3b5e1f4fdf1d3fa4943633735ec8ede2024507dcab19" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8cc0088423509c0fe8413cdf1b85f66269a6e62f3a59708a25fa91acac94a44c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b262749b36483ac23f7e9311a410b4e1bfb3455074e189d2cd4e88570c953803" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a" }, { - "name": "rhacs-rhel8-operator-bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bd2b9597b046a7d3726780343ef6887b9c848ca90e751e52a687166f92d890da" + "name": "rhacs-rhel8-operator-23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e1e3ef9c4113c1a19a1bb304fdb79ec00abf9d54f4337d6481bf4d5943b259bd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d9c2441eff9cdad021b5dd7107e3803f93f8901f2c722cfe10ddce6dc4348370" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:03d198bbd9a30578ee57099fc1e6c795bd9ad714ad519fa5419ea89d4b446bfb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bc00f06a7d90ea2ff62cb9a6c70e79dd599defd234f284cafebd244748ef025d" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:7a149b76269ee937e2db0b9c1f63e5763c770babc9c32d6f19982163e9fc2831" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9befd40ad7022dc4b3aca6228f0cd075a8427f82e3d1dee3ca56db7c0dd1e7da" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:2f110138f996e4e455bb9158ca4174ebecf6053ec73c7793b596cd7094441e63" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:7f0112dfbabc71b54ccd67c08de80dd099030ece8ca4a62ae3dbf76a077e1419" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:ad8457ee562501c6fde0bba7361dfd717321af3e959de8f85156ce01f47b1622" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:6eba7131d78e0cbd42c8578bf0676adeeef3b8db75883cad018f93fedb0f1ef3" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:f29b582541b597299a37d2e7d834ad03a8bdcc140a867d6c6a3aa6cbe2bde946" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:77a78fe7759d35e27b11b1f7f9cc944694b697a8b78a3ecb9b5ad7dcac3f4586" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:2f04f3b6de16da6f4d3ce4a16eff72654d45a76887764b0c54669316a0f54fa3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:cd1c3a677eaec056f9198e388f87cd016e75148070c345ef5479130fd46402b1" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.5", + "name": "rhacs-operator.v4.5.6", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b262749b36483ac23f7e9311a410b4e1bfb3455074e189d2cd4e88570c953803", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:56772b736bb1aec1b10d38d4c2b18bcde17b450b55f8c260ac38b23bd6c85b5c", "properties": [ { "type": "olm.gvk", @@ -103634,7 +105274,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.5" + "version": "4.5.6" } }, { @@ -103644,17 +105284,17 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a", - "createdAt": "2024-11-18T20:39:57.020288+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de", + "createdAt": "2025-02-05T21:19:41.562041+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "false", + "features.operators.openshift.io/fips-compliant": "true", "features.operators.openshift.io/proxy-aware": "true", "features.operators.openshift.io/tls-profiles": "false", "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.5", + "olm.skipRange": ">= 4.4.0 < 4.5.6", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -105177,67 +106817,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:8d0b78910967f571e27d3f98fd27705010d146683c17dd4bc94a0b513d4ed948" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:465b5ed07e986d6a7e3a09b87320bdd2324428a43a908644a3afcf530d77bdea" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:f36004ced010b8fbb1e3241a4b09e158c74a70ddc74db4b0aa70ffc96df78182" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e142b203bbd602e56ce8780632b0220b2874615336556fdb77682cad766e1fa5" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2898d89213eb5ee53361fbc4e376f6963bd3d4b1845532216c0268d90ffa0155" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:f5705ab5b54a50b205c0c18323e8e8d0dc81a017c67a2941f578e9af27778d55" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:677098b23e50545d9c3f3b5e1f4fdf1d3fa4943633735ec8ede2024507dcab19" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b93bdb31f5d00889bc759de735757aced5e10a8a7d1e38e45e1117e33a677254" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b262749b36483ac23f7e9311a410b4e1bfb3455074e189d2cd4e88570c953803" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:56772b736bb1aec1b10d38d4c2b18bcde17b450b55f8c260ac38b23bd6c85b5c" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de" }, { - "name": "rhacs-rhel8-operator-23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:23f09bdf3deed0e24273db44097bc3e27abec5c8f2809614d4fdb73cf9325e1a" + "name": "rhacs-rhel8-operator-a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d9c2441eff9cdad021b5dd7107e3803f93f8901f2c722cfe10ddce6dc4348370" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d63ade51a5ee79bc44328cc1b6b36340d301d0d4c6dff6c9e01a784776847e28" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bc00f06a7d90ea2ff62cb9a6c70e79dd599defd234f284cafebd244748ef025d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:fa5967d7837c727e3ae4ecb43dcbc448fe02e0a50477c16427355beb7bc1b06b" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9befd40ad7022dc4b3aca6228f0cd075a8427f82e3d1dee3ca56db7c0dd1e7da" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:aa3e619c4edf6a1dcc77e0b41776e6e3581b4d9f580a0eea130d4203c73d60f7" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:7f0112dfbabc71b54ccd67c08de80dd099030ece8ca4a62ae3dbf76a077e1419" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:3413b70781fa3852b6ac66b20e43859de29d51d9f2f5a30ff2c7a9dca95db045" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:6eba7131d78e0cbd42c8578bf0676adeeef3b8db75883cad018f93fedb0f1ef3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e1005e5a1adf70f6278d42488dd39a424737e097f8664aaddb85f565055dfde0" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:77a78fe7759d35e27b11b1f7f9cc944694b697a8b78a3ecb9b5ad7dcac3f4586" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:978e91a41b41c8770942f4d3a78e4a42ed8f562391d033082c35afc84ae07a91" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:cd1c3a677eaec056f9198e388f87cd016e75148070c345ef5479130fd46402b1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:fa8f2123d56e9d50ad91b75762e345ffc1a71b833f1056d14255e8834e1a3446" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.6", + "name": "rhacs-operator.v4.5.7", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:56772b736bb1aec1b10d38d4c2b18bcde17b450b55f8c260ac38b23bd6c85b5c", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:04b8413db1c7b315643c2c420e7d2b71d805956c93db779f363beef09339041f", "properties": [ { "type": "olm.gvk", @@ -105259,7 +106899,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.6" + "version": "4.5.7" } }, { @@ -105269,8 +106909,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de", - "createdAt": "2025-02-05T21:19:41.562041+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42", + "createdAt": "2025-03-05T11:12:37.179666+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "true", @@ -105279,7 +106919,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.6", + "olm.skipRange": ">= 4.4.0 < 4.5.7", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -106802,67 +108442,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:465b5ed07e986d6a7e3a09b87320bdd2324428a43a908644a3afcf530d77bdea" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:75a46a470b2583d2ec49b5008525f7c97e378ea1594d1e2ac46cd1348b6e00e9" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e142b203bbd602e56ce8780632b0220b2874615336556fdb77682cad766e1fa5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:16ca809dc41a9a28ff7e887662213fdd7f78e047558c58ae0ca11d06c957d713" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:f5705ab5b54a50b205c0c18323e8e8d0dc81a017c67a2941f578e9af27778d55" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:137f1fb95698dda7d47eb8a62dbb8239768e34d557ab71b228e7b0d9e9a20676" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b93bdb31f5d00889bc759de735757aced5e10a8a7d1e38e45e1117e33a677254" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d31fcbcf5c0a773566e4058d3be99c46658bb7d1eefbbb378c7c42950df6d855" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:56772b736bb1aec1b10d38d4c2b18bcde17b450b55f8c260ac38b23bd6c85b5c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:04b8413db1c7b315643c2c420e7d2b71d805956c93db779f363beef09339041f" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42" }, { - "name": "rhacs-rhel8-operator-a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a17265d8a275e088ede9f563cca0a21033441a0850118dd9a04ff511e331f8de" + "name": "rhacs-rhel8-operator-f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d63ade51a5ee79bc44328cc1b6b36340d301d0d4c6dff6c9e01a784776847e28" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b69418d1371d5b29885524ff6b55081b37b92119a5d0ac59bf725af9634b6e31" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:fa5967d7837c727e3ae4ecb43dcbc448fe02e0a50477c16427355beb7bc1b06b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6de6238bb8674cd356985dd291b9e6433d02090c7aa60920946d2e07d865d88f" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:aa3e619c4edf6a1dcc77e0b41776e6e3581b4d9f580a0eea130d4203c73d60f7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:cfdbd03d5ca3d44c515e9342b8a364eacca0adcd4a3f19a6b41e87f53e115d4d" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:3413b70781fa3852b6ac66b20e43859de29d51d9f2f5a30ff2c7a9dca95db045" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:271cb3b6f6d56fa6e490719cf6ff1f4b627b6b5af75e00567a261516587e577c" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e1005e5a1adf70f6278d42488dd39a424737e097f8664aaddb85f565055dfde0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e2d1522facbb8f267efb56051afad11106c32169dc3f8b943f044dc8af8714bd" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:978e91a41b41c8770942f4d3a78e4a42ed8f562391d033082c35afc84ae07a91" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:95dfc83e4e46df84331bd3ce54f5f73f826f64efe9fc303f9b271943b92d39c8" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:fa8f2123d56e9d50ad91b75762e345ffc1a71b833f1056d14255e8834e1a3446" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:c4019f6efc9bd7df2fdf6ce5d12c606436c02e76390b0b62449457a8c871b247" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.7", + "name": "rhacs-operator.v4.5.8", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:04b8413db1c7b315643c2c420e7d2b71d805956c93db779f363beef09339041f", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e4c21f9a8098205cfd520627dcfdfca84c40c66e93698398a350647dc5fa1a1", "properties": [ { "type": "olm.gvk", @@ -106884,7 +108524,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.7" + "version": "4.5.8" } }, { @@ -106894,8 +108534,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42", - "createdAt": "2025-03-05T11:12:37.179666+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5", + "createdAt": "2025-03-25T11:32:03.015706+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "true", @@ -106904,7 +108544,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.7", + "olm.skipRange": ">= 4.4.0 < 4.5.8", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -108427,67 +110067,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:75a46a470b2583d2ec49b5008525f7c97e378ea1594d1e2ac46cd1348b6e00e9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:57737285be6c214bf0a29232b675019091e5e66f56da3fb176f7fc9797c317d6" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:16ca809dc41a9a28ff7e887662213fdd7f78e047558c58ae0ca11d06c957d713" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:5e269cae611aa447311c8acff54f703195a8925842e8b60f35f2aed10b158fe1" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:137f1fb95698dda7d47eb8a62dbb8239768e34d557ab71b228e7b0d9e9a20676" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:eaa60a7fb99c8df081a834f620346c7317be4b78c096f1fa1714ef44a32de372" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d31fcbcf5c0a773566e4058d3be99c46658bb7d1eefbbb378c7c42950df6d855" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:e7e8cac20074b323928ce71265dbf93e5cf7d79ed9c9fc83caba4bb8a8cc8000" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:04b8413db1c7b315643c2c420e7d2b71d805956c93db779f363beef09339041f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e4c21f9a8098205cfd520627dcfdfca84c40c66e93698398a350647dc5fa1a1" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5" }, { - "name": "rhacs-rhel8-operator-f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f0dd0ce70082648d4c6461abdee44e086cd56658dee6e9a9314d263f22648d42" + "name": "rhacs-rhel8-operator-110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b69418d1371d5b29885524ff6b55081b37b92119a5d0ac59bf725af9634b6e31" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:188fac77dacc4270b1a53658d0fb1427e005e1c9fef62cdfb2b025d0d14932cf" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6de6238bb8674cd356985dd291b9e6433d02090c7aa60920946d2e07d865d88f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f60d5adc6ccacb9335ee285203e9a9e29981903fe5f3e42645ca4ab2f2ab4b5e" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:cfdbd03d5ca3d44c515e9342b8a364eacca0adcd4a3f19a6b41e87f53e115d4d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:37de1446b4b352895d8def4bb4bfbbc7a45813800bfd6348f985837d28481731" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:271cb3b6f6d56fa6e490719cf6ff1f4b627b6b5af75e00567a261516587e577c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:357fd16b14e6f4ff21c324fa03d88d33e13aa4a5123eede7cbf5d58fa3fc35d0" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e2d1522facbb8f267efb56051afad11106c32169dc3f8b943f044dc8af8714bd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b287edbf5e0375460f17ccad7c88a6b8c834520f46c0e17cc37a40a684ad1323" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:95dfc83e4e46df84331bd3ce54f5f73f826f64efe9fc303f9b271943b92d39c8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:928d54658623a883da727ea4e4e58d7dd514a07995a139de15b429e46cccebeb" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:c4019f6efc9bd7df2fdf6ce5d12c606436c02e76390b0b62449457a8c871b247" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5aa4e611577e2f14f0209ee8ae14f3af4c572e19034eba2643af430417fc972f" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.8", + "name": "rhacs-operator.v4.5.9", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e4c21f9a8098205cfd520627dcfdfca84c40c66e93698398a350647dc5fa1a1", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:41351e88688d23a443ad4f141caf0433b2c2789e6a1a85b4f5b36abeb5656bb1", "properties": [ { "type": "olm.gvk", @@ -108509,7 +110149,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.8" + "version": "4.5.9" } }, { @@ -108519,8 +110159,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5", - "createdAt": "2025-03-25T11:32:03.015706+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d", + "createdAt": "2025-04-09T22:51:15.157672+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/disconnected": "true", "features.operators.openshift.io/fips-compliant": "true", @@ -108529,7 +110169,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.8", + "olm.skipRange": ">= 4.4.0 < 4.5.9", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -110052,68 +111692,76 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:57737285be6c214bf0a29232b675019091e5e66f56da3fb176f7fc9797c317d6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:dc7f23341c8b209f1846f29f889d00ef232fb58da9d5b4bd561f3933093b2786" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:5e269cae611aa447311c8acff54f703195a8925842e8b60f35f2aed10b158fe1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:5914548f6ce2160e92c5d96580ffba23cdf1ae940c1f73f3f6424d15c6e97c37" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:eaa60a7fb99c8df081a834f620346c7317be4b78c096f1fa1714ef44a32de372" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:ed33e7396357f1db03a065573c020846a5872b12a21284439770686689222434" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:e7e8cac20074b323928ce71265dbf93e5cf7d79ed9c9fc83caba4bb8a8cc8000" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:fde78d34ecd2944c7c16b4e823c76b3667bf6c5b468e9991128ecc4272ec0e2e" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1e4c21f9a8098205cfd520627dcfdfca84c40c66e93698398a350647dc5fa1a1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:41351e88688d23a443ad4f141caf0433b2c2789e6a1a85b4f5b36abeb5656bb1" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d" }, { - "name": "rhacs-rhel8-operator-110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:110bb2df6108d7f0916f090254c4fe3c2daab814c4cc58dce3b2112d3e78dcf5" + "name": "rhacs-rhel8-operator-a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:188fac77dacc4270b1a53658d0fb1427e005e1c9fef62cdfb2b025d0d14932cf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:0ff948b5517df3773cae2df02b708c348d8707409899b1de4108588e31601c0c" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f60d5adc6ccacb9335ee285203e9a9e29981903fe5f3e42645ca4ab2f2ab4b5e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c2656b794ec4236e36f48f71bf26bdedd9de27fc4acef39deba2bdcfcddab03b" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:37de1446b4b352895d8def4bb4bfbbc7a45813800bfd6348f985837d28481731" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d928600f75461465598a10de8df2495a275fd5232a92b078f609d1f5774eb778" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:357fd16b14e6f4ff21c324fa03d88d33e13aa4a5123eede7cbf5d58fa3fc35d0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f07cba0738897e0e7ae74971be0470ce2a855657f133a6e1cdd8a7092f6151b0" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b287edbf5e0375460f17ccad7c88a6b8c834520f46c0e17cc37a40a684ad1323" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cc4b329cc795752ecbb178d2e4efc152bde54b04181334eb5bd70304c3354cad" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:928d54658623a883da727ea4e4e58d7dd514a07995a139de15b429e46cccebeb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5109b304eb9458f97af85c2ba63e08f51672fa3f9406226b7f357b86b5828dc0" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5aa4e611577e2f14f0209ee8ae14f3af4c572e19034eba2643af430417fc972f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:1817cf8d2c08b04391792321702ef53d16a4b1ca06459c00c9c053128f534358" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.5.9", + "name": "rhacs-operator.v4.6.0", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:41351e88688d23a443ad4f141caf0433b2c2789e6a1a85b4f5b36abeb5656bb1", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c803494bdb0418d27931a15c79f8cf142ae10ccd0a50d76a10c48219d34c59f4", "properties": [ + { + "type": "olm.gvk", + "value": { + "group": "config.stackrox.io", + "kind": "SecurityPolicy", + "version": "v1alpha1" + } + }, { "type": "olm.gvk", "value": { @@ -110134,7 +111782,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.5.9" + "version": "4.6.0" } }, { @@ -110144,22 +111792,25 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d", - "createdAt": "2025-04-09T22:51:15.157672+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55", + "createdAt": "2024-12-03T01:44:17.371830+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", + "features.operators.openshift.io/cnf": "false", + "features.operators.openshift.io/cni": "false", + "features.operators.openshift.io/csi": "false", "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "true", + "features.operators.openshift.io/fips-compliant": "false", "features.operators.openshift.io/proxy-aware": "true", "features.operators.openshift.io/tls-profiles": "false", "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.4.0 < 4.5.9", + "olm.skipRange": ">= 4.5.0 < 4.6.0", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", "operators.operatorframework.io/builder": "operator-sdk-unknown", - "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3", + "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4", "support": "Red Hat" }, "apiServiceDefinitions": {}, @@ -110170,7 +111821,7 @@ "version": "v1alpha1", "kind": "Central", "displayName": "Central", - "description": "Central is the configuration template for the central services. This includes the API server, persistent storage, and the web UI, as well as the image scanner.", + "description": "Central is the configuration template for the central services. This includes the API server, persistent storage,\nand the web UI, as well as the image scanner.", "resources": [ { "name": "", @@ -110226,7 +111877,7 @@ { "path": "scanner", "displayName": "Scanner Component Settings", - "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container images." + "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container\nimages." }, { "path": "scannerV4", @@ -110275,10 +111926,26 @@ "urn:alm:descriptor:com.tectonic.ui:advanced" ] }, + { + "path": "network", + "displayName": "Network", + "description": "Network configuration.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, + { + "path": "configAsCode", + "displayName": "Config-as-Code", + "description": "Config-as-Code configuration.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, { "path": "misc", "displayName": "Miscellaneous", - "description": "Deprecated field. This field will be removed in a future release. Miscellaneous settings.", + "description": "Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -110286,27 +111953,22 @@ { "path": "central.adminPasswordSecret", "displayName": "Administrator Password", - "description": "Specify a secret that contains the administrator password in the \"password\" data item. If omitted, the operator will auto-generate a password and store it in the \"password\" item in the \"central-htpasswd\" secret." + "description": "Specify a secret that contains the administrator password in the \"password\" data item.\nIf omitted, the operator will auto-generate a password and store it in the \"password\" item\nin the \"central-htpasswd\" secret." }, { "path": "central.exposure", "displayName": "Exposure", - "description": "Here you can configure if you want to expose central through a node port, a load balancer, or an OpenShift route." + "description": "Here you can configure if you want to expose central through a node port, a load balancer, or an OpenShift\nroute." }, { "path": "central.defaultTLSSecret", "displayName": "User-facing TLS certificate secret", - "description": "By default, Central will only serve an internal TLS certificate, which means that you will need to handle TLS termination at the ingress or load balancer level. If you want to terminate TLS in Central and serve a custom server certificate, you can specify a secret containing the certificate and private key here." + "description": "By default, Central will only serve an internal TLS certificate, which means that you will\nneed to handle TLS termination at the ingress or load balancer level.\nIf you want to terminate TLS in Central and serve a custom server certificate, you can specify\na secret containing the certificate and private key here." }, { "path": "central.monitoring", "displayName": "Monitoring", - "description": "Configures monitoring endpoint for Central. The monitoring endpoint allows other services to collect metrics from Central, provided in Prometheus compatible format." - }, - { - "path": "central.persistence", - "displayName": "Persistence", - "description": "Configures how Central should store its persistent data. You can choose between using a persistent volume claim (recommended default), and a host path." + "description": "Configures monitoring endpoint for Central. The monitoring endpoint\nallows other services to collect metrics from Central, provided in\nPrometheus compatible format." }, { "path": "central.db", @@ -110316,7 +111978,7 @@ { "path": "central.telemetry", "displayName": "Telemetry", - "description": "Configures telemetry settings for Central. If enabled, Central transmits telemetry and diagnostic data to a remote storage backend.", + "description": "Configures telemetry settings for Central. If enabled, Central transmits telemetry and diagnostic\ndata to a remote storage backend.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -110340,7 +112002,7 @@ { "path": "central.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -110358,10 +112020,23 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "central.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "central.adminPasswordGenerationDisabled", "displayName": "Admin Password Generation Disabled", - "description": "Disable admin password generation. Do not use this for first-time installations, as you will have no way to perform initial setup and configuration of alternative authentication methods.", + "description": "Disable admin password generation. Do not use this for first-time installations,\nas you will have no way to perform initial setup and configuration of alternative authentication methods.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "central.persistence", + "displayName": "Persistence", + "description": "Unused field. This field exists solely for backward compatibility starting from version v4.6.0.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -110377,22 +112052,32 @@ { "path": "central.db.passwordSecret", "displayName": "Administrator Password", - "description": "Specify a secret that contains the password in the \"password\" data item. This can only be used when specifying a connection string manually. When omitted, the operator will auto-generate a DB password and store it in the \"password\" item in the \"central-db-password\" secret." + "description": "Specify a secret that contains the password in the \"password\" data item. This can only be used when\nspecifying a connection string manually.\nWhen omitted, the operator will auto-generate a DB password and store it in the \"password\" item\nin the \"central-db-password\" secret." }, { "path": "central.db.connectionString", "displayName": "Connection String", - "description": "Specify a connection string that corresponds to a database managed elsewhere. If set, the operator will not manage the Central DB. When using this option, you must explicitly set a password secret; automatically generating a password will not be supported." + "description": "Specify a connection string that corresponds to a database managed elsewhere. If set, the operator will not manage the Central DB.\nWhen using this option, you must explicitly set a password secret; automatically generating a password will not\nbe supported." }, { "path": "central.db.persistence", "displayName": "Persistence", - "description": "Configures how Central DB should store its persistent data. You can choose between using a persistent volume claim (recommended default), and a host path." + "description": "Configures how Central DB should store its persistent data. You can choose between using a persistent\nvolume claim (recommended default), and a host path." + }, + { + "path": "central.db.configOverride", + "displayName": "Config map that will override postgresql.conf and pg_hba.conf", + "description": "Config map containing postgresql.conf and pg_hba.conf that will be used if modifications need to be applied." + }, + { + "path": "central.db.connectionPoolSize", + "displayName": "Database Connection Pool Size Settings", + "description": "Configures the database connection pool size." }, { "path": "central.db.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -110411,14 +112096,14 @@ ] }, { - "path": "central.db.configOverride", - "displayName": "Config map that will override postgresql.conf and pg_hba.conf", - "description": "Config map containing postgresql.conf and pg_hba.conf that will be used if modifications need to be applied." + "path": "central.db.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." }, { "path": "central.db.isEnabled", "displayName": "Is Enabled", - "description": "Deprecated field. It is no longer necessary to specify it. This field will be removed in a future release. Central is configured to use PostgreSQL by default.", + "description": "Deprecated field. It is no longer necessary to specify it.\nThis field will be removed in a future release.\nCentral is configured to use PostgreSQL by default.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -110431,6 +112116,16 @@ "urn:alm:descriptor:io.kubernetes:ConfigMap" ] }, + { + "path": "central.db.connectionPoolSize.maxConnections", + "displayName": "Maximum Connections", + "description": "Maximum number of connections in the connection pool." + }, + { + "path": "central.db.connectionPoolSize.minConnections", + "displayName": "Minimum Connections", + "description": "Minimum number of connections in the connection pool." + }, { "path": "central.db.passwordSecret.name", "displayName": "Name", @@ -110442,12 +112137,12 @@ { "path": "central.db.persistence.persistentVolumeClaim", "displayName": "Persistent volume claim", - "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users." }, { "path": "central.db.persistence.hostPath", "displayName": "Host path", - "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view)." }, { "path": "central.db.persistence.hostPath.path", @@ -110457,12 +112152,12 @@ { "path": "central.db.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"central-db\" if not set." + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"central-db\" if not set." }, { "path": "central.db.persistence.persistentVolumeClaim.size", "displayName": "Size", - "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:text" ] @@ -110470,7 +112165,7 @@ { "path": "central.db.persistence.persistentVolumeClaim.storageClassName", "displayName": "Storage Class", - "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.", "x-descriptors": [ "urn:alm:descriptor:io.kubernetes:StorageClass" ] @@ -110563,12 +112258,12 @@ { "path": "central.exposure.route.host", "displayName": "Host", - "description": "Specify a custom hostname for the central route. If unspecified, an appropriate default value will be automatically chosen by OpenShift route operator." + "description": "Specify a custom hostname for the central route.\nIf unspecified, an appropriate default value will be automatically chosen by OpenShift route operator." }, { "path": "central.monitoring.exposeEndpoint", "displayName": "Expose Endpoint", - "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + "description": "Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port." }, { "path": "central.notifierSecretsEncryption.enabled", @@ -110578,12 +112273,12 @@ { "path": "central.persistence.persistentVolumeClaim", "displayName": "Persistent volume claim", - "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users." }, { "path": "central.persistence.hostPath", "displayName": "Host path", - "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view)." }, { "path": "central.persistence.hostPath.path", @@ -110593,12 +112288,12 @@ { "path": "central.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"stackrox-db\" if not set." + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"stackrox-db\" if not set." }, { "path": "central.persistence.persistentVolumeClaim.size", "displayName": "Size", - "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:text" ] @@ -110606,7 +112301,7 @@ { "path": "central.persistence.persistentVolumeClaim.storageClassName", "displayName": "Storage Class", - "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.", "x-descriptors": [ "urn:alm:descriptor:io.kubernetes:StorageClass" ] @@ -110637,6 +112332,11 @@ "displayName": "Key", "description": "Storage API key. If not set, telemetry is disabled." }, + { + "path": "configAsCode.configAsCodeComponent", + "displayName": "Config as Code component", + "description": "If you want to deploy the Config as Code component, set this to \"Enabled\"" + }, { "path": "customize.labels", "displayName": "Labels", @@ -110655,7 +112355,7 @@ { "path": "egress.connectivityPolicy", "displayName": "Connectivity Policy", - "description": "Configures whether Red Hat Advanced Cluster Security should run in online or offline (disconnected) mode. In offline mode, automatic updates of vulnerability definitions and kernel modules are disabled." + "description": "Configures whether Red Hat Advanced Cluster Security should run in online or offline (disconnected) mode.\nIn offline mode, automatic updates of vulnerability definitions and kernel modules are disabled." }, { "path": "imagePullSecrets[0].name", @@ -110668,7 +112368,7 @@ { "path": "misc.createSCCs", "displayName": "Create SecurityContextConstraints for Operand", - "description": "Deprecated field. This field will be removed in a future release. Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads.", + "description": "Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -110680,6 +112380,11 @@ "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" ] }, + { + "path": "network.policies", + "displayName": "Network Policies", + "description": "To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\"." + }, { "path": "overlays[0].apiVersion", "displayName": "API Version", @@ -110695,6 +112400,11 @@ "displayName": "Name", "description": "Name of resource." }, + { + "path": "overlays[0].optional", + "displayName": "Optional", + "description": "Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown." + }, { "path": "overlays[0].patches", "displayName": "Patches", @@ -110703,17 +112413,17 @@ { "path": "overlays[0].patches[0].path", "displayName": "Path", - "description": "Path of the form a.[key1:value1].b.[:value2] Where [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value selector to identify a list element in a leaf list. All path intermediate nodes must exist." + "description": "Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist." }, { "path": "overlays[0].patches[0].value", "displayName": "Value", - "description": "Value to add, delete or replace. For add, the path should be a new leaf. For delete, value should be unset. For replace, path should reference an existing node. All values are strings but are converted into appropriate type based on schema." + "description": "Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema." }, { "path": "scanner.scannerComponent", "displayName": "Scanner Component", - "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here (not recommended). By default, the scanner is enabled. If you do so, all the settings in this section will have no effect." + "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended). By default, the scanner is enabled.\nIf you do so, all the settings in this section will have no effect." }, { "path": "scanner.analyzer", @@ -110734,7 +112444,7 @@ { "path": "scanner.monitoring", "displayName": "Monitoring", - "description": "Configures monitoring endpoint for Scanner. The monitoring endpoint allows other services to collect metrics from Scanner, provided in Prometheus compatible format." + "description": "Configures monitoring endpoint for Scanner. The monitoring endpoint\nallows other services to collect metrics from Scanner, provided in\nPrometheus compatible format." }, { "path": "scanner.analyzer.scaling", @@ -110744,7 +112454,7 @@ { "path": "scanner.analyzer.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -110762,10 +112472,15 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scanner.analyzer.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scanner.analyzer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." }, { "path": "scanner.analyzer.scaling.replicas", @@ -110789,7 +112504,7 @@ { "path": "scanner.db.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -110807,10 +112522,15 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scanner.db.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scanner.monitoring.exposeEndpoint", "displayName": "Expose Endpoint", - "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + "description": "Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port." }, { "path": "scannerV4.scannerComponent", @@ -110844,7 +112564,7 @@ { "path": "scannerV4.monitoring", "displayName": "Monitoring", - "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint allows other services to collect metrics from Scanner V4, provided in Prometheus compatible format.", + "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:Enabled" ] @@ -110852,12 +112572,12 @@ { "path": "scannerV4.db.persistence", "displayName": "Persistence", - "description": "Configures how Scanner V4 should store its persistent data. You can use a persistent volume claim (the recommended default), a host path, or an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." + "description": "Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." }, { "path": "scannerV4.db.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -110875,15 +112595,20 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scannerV4.db.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scannerV4.db.persistence.persistentVolumeClaim", "displayName": "Persistent volume claim", - "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users." }, { "path": "scannerV4.db.persistence.hostPath", "displayName": "Host path", - "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view)." }, { "path": "scannerV4.db.persistence.hostPath.path", @@ -110893,12 +112618,12 @@ { "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"scanner-v4-db\" if not set." + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"scanner-v4-db\" if not set." }, { "path": "scannerV4.db.persistence.persistentVolumeClaim.size", "displayName": "Size", - "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:text" ] @@ -110906,7 +112631,7 @@ { "path": "scannerV4.db.persistence.persistentVolumeClaim.storageClassName", "displayName": "Storage Class", - "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.", "x-descriptors": [ "urn:alm:descriptor:io.kubernetes:StorageClass" ] @@ -110919,7 +112644,7 @@ { "path": "scannerV4.indexer.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -110937,10 +112662,15 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scannerV4.indexer.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scannerV4.indexer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." }, { "path": "scannerV4.indexer.scaling.replicas", @@ -110969,7 +112699,7 @@ { "path": "scannerV4.matcher.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -110987,10 +112717,15 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scannerV4.matcher.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scannerV4.matcher.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." }, { "path": "scannerV4.matcher.scaling.replicas", @@ -111014,7 +112749,7 @@ { "path": "scannerV4.monitoring.exposeEndpoint", "displayName": "Expose Endpoint", - "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + "description": "Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port." }, { "path": "tls.additionalCAs", @@ -111027,7 +112762,7 @@ "version": "v1alpha1", "kind": "SecuredCluster", "displayName": "Secured Cluster", - "description": "SecuredCluster is the configuration template for the secured cluster services. These include Sensor, which is responsible for the connection to Central, and Collector, which performs host-level collection of process and network events.

**Important:** Please see the _Installation Prerequisites_ on the main RHACS operator page before deploying, or consult the RHACS documentation on creating cluster init bundles.", + "description": "SecuredCluster is the configuration template for the secured cluster services. These include Sensor, which is\nresponsible for the connection to Central, and Collector, which performs host-level collection of process and\nnetwork events.

\n**Important:** Please see the _Installation Prerequisites_ on the main RHACS operator page before deploying, or\nconsult the RHACS documentation on creating cluster init bundles.", "resources": [ { "name": "", @@ -111049,19 +112784,19 @@ { "path": "clusterName", "displayName": "Cluster Name", - "description": "The assigned cluster name per the spec. This cannot be changed afterwards. If you need to change the cluster name, please delete and recreate this resource." + "description": "The assigned cluster name per the spec. This cannot be changed afterwards. If you need to change the\ncluster name, please delete and recreate this resource." } ], "specDescriptors": [ { "path": "clusterName", "displayName": "Cluster Name", - "description": "The unique name of this cluster, as it will be shown in the Red Hat Advanced Cluster Security UI. Note: Once a name is set here, you will not be able to change it again. You will need to delete and re-create this object in order to register a cluster with a new name." + "description": "The unique name of this cluster, as it will be shown in the Red Hat Advanced Cluster Security UI.\nNote: Once a name is set here, you will not be able to change it again. You will need to delete\nand re-create this object in order to register a cluster with a new name." }, { "path": "centralEndpoint", "displayName": "Central Endpoint", - "description": "The endpoint of the Red Hat Advanced Cluster Security Central instance to connect to, including the port number. If using a non-gRPC capable load balancer, use the WebSocket protocol by prefixing the endpoint address with wss://. Note: when leaving this blank, Sensor will attempt to connect to a Central instance running in the same namespace." + "description": "The endpoint of the Red Hat Advanced Cluster Security Central instance to connect to,\nincluding the port number. If no port is specified and the endpoint contains an https://\nprotocol specification, then the port 443 is implicitly assumed.\nIf using a non-gRPC capable load balancer, use the WebSocket protocol by prefixing the endpoint\naddress with wss://.\nNote: when leaving this blank, Sensor will attempt to connect to a Central instance running in the same\nnamespace." }, { "path": "sensor", @@ -111071,7 +112806,7 @@ { "path": "admissionControl", "displayName": "Admission Control Settings", - "description": "Settings for the Admission Control component, which is necessary for preventive policy enforcement, and for Kubernetes event monitoring." + "description": "Settings for the Admission Control component, which is necessary for preventive policy enforcement,\nand for Kubernetes event monitoring." }, { "path": "perNode", @@ -111086,7 +112821,7 @@ { "path": "scanner", "displayName": "Scanner Component Settings", - "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container images stored in a cluster-local image repository." + "description": "Settings for the Scanner component, which is responsible for vulnerability scanning of container\nimages stored in a cluster-local image repository." }, { "path": "scannerV4", @@ -111138,10 +112873,18 @@ "urn:alm:descriptor:com.tectonic.ui:advanced" ] }, + { + "path": "network", + "displayName": "Network", + "description": "Network configuration.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:advanced" + ] + }, { "path": "misc", "displayName": "Miscellaneous", - "description": "Deprecated field. This field will be removed in a future release. Miscellaneous settings.", + "description": "Deprecated field. This field will be removed in a future release.\nMiscellaneous settings.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -111154,7 +112897,7 @@ { "path": "admissionControl.listenOnUpdates", "displayName": "Listen On Updates", - "description": "Set this to 'true' to enable preventive policy enforcement for object updates. \n Note: this will not have any effect unless 'Listen On Creates' is set to 'true' as well." + "description": "Set this to 'true' to enable preventive policy enforcement for object updates.\n\n\nNote: this will not have any effect unless 'Listen On Creates' is set to 'true' as well." }, { "path": "admissionControl.listenOnEvents", @@ -111169,7 +112912,7 @@ { "path": "admissionControl.timeoutSeconds", "displayName": "Timeout Seconds", - "description": "Maximum timeout period for admission review, upon which admission review will fail open. Use it to set request timeouts when you enable inline image scanning. The default kubectl timeout is 30 seconds; taking padding into account, this should not exceed 25 seconds." + "description": "Maximum timeout period for admission review, upon which admission review will fail open.\nUse it to set request timeouts when you enable inline image scanning.\nThe default kubectl timeout is 30 seconds; taking padding into account, this should not exceed 25 seconds.\nOn OpenShift webhook timeouts cannot exceed 13 seconds, hence with padding this value shall not exceed 10 seconds." }, { "path": "admissionControl.bypass", @@ -111184,7 +112927,7 @@ { "path": "admissionControl.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111202,10 +112945,15 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "admissionControl.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "auditLogs.collection", "displayName": "Collection", - "description": "Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only supported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error. Use the 'Auto' setting to enable it on compatible environments, and disable it elsewhere." + "description": "Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only\nsupported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error.\nUse the 'Auto' setting to enable it on compatible environments, and disable it elsewhere." }, { "path": "customize.labels", @@ -111233,7 +112981,7 @@ { "path": "misc.createSCCs", "displayName": "Create SecurityContextConstraints for Operand", - "description": "Deprecated field. This field will be removed in a future release. Set this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This isn't usually needed, and may interfere with other workloads.", + "description": "Deprecated field. This field will be removed in a future release.\nSet this to true to have the operator create SecurityContextConstraints (SCCs) for the operands. This\nisn't usually needed, and may interfere with other workloads.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -111245,6 +112993,11 @@ "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" ] }, + { + "path": "network.policies", + "displayName": "Network Policies", + "description": "To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\"." + }, { "path": "overlays[0].apiVersion", "displayName": "API Version", @@ -111260,6 +113013,11 @@ "displayName": "Name", "description": "Name of resource." }, + { + "path": "overlays[0].optional", + "displayName": "Optional", + "description": "Optional marks the overlay as optional.\nWhen Optional is true, and the specified resource does not exist in the output manifests, the overlay will be skipped, and a warning will be logged.\nWhen Optional is false, and the specified resource does not exist in the output manifests, an error will be thrown." + }, { "path": "overlays[0].patches", "displayName": "Patches", @@ -111268,17 +113026,17 @@ { "path": "overlays[0].patches[0].path", "displayName": "Path", - "description": "Path of the form a.[key1:value1].b.[:value2] Where [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value selector to identify a list element in a leaf list. All path intermediate nodes must exist." + "description": "Path of the form a.[key1:value1].b.[:value2]\nWhere [key1:value1] is a selector for a key-value pair to identify a list element and [:value] is a value\nselector to identify a list element in a leaf list.\nAll path intermediate nodes must exist." }, { "path": "overlays[0].patches[0].value", "displayName": "Value", - "description": "Value to add, delete or replace. For add, the path should be a new leaf. For delete, value should be unset. For replace, path should reference an existing node. All values are strings but are converted into appropriate type based on schema." + "description": "Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema." }, { "path": "perNode.collector", "displayName": "Collector Settings", - "description": "Settings for the Collector container, which is responsible for collecting process and networking activity at the host level." + "description": "Settings for the Collector container, which is responsible for collecting process and networking\nactivity at the host level." }, { "path": "perNode.compliance", @@ -111293,12 +113051,17 @@ { "path": "perNode.taintToleration", "displayName": "Taint Toleration", - "description": "To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security will run services on every node in the cluster, including tainted nodes by default. If you do not want this behavior, please select 'AvoidTaints' here." + "description": "To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security\nwill run services on every node in the cluster, including tainted nodes by default. If you do\nnot want this behavior, please select 'AvoidTaints' here." + }, + { + "path": "perNode.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." }, { "path": "perNode.collector.collection", "displayName": "Collection", - "description": "The method for system-level data collection. CORE_BPF is recommended. If you select \"NoCollection\", you will not be able to see any information about network activity and process executions. The remaining settings in these section will not have any effect. The value is a subject of conversion by the operator if needed, e.g. to remove deprecated methods.", + "description": "The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in these section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:select:EBPF", "urn:alm:descriptor:com.tectonic.ui:select:CORE_BPF", @@ -111308,12 +113071,12 @@ { "path": "perNode.collector.imageFlavor", "displayName": "Image Flavor", - "description": "The image flavor to use for collector. \"Regular\" images are bigger in size, but contain probes for most kernels. If you use the \"Slim\" image flavor, you must ensure that your Central instance is connected to the internet, or regularly receives Collector Support Package updates (for further instructions, please refer to the documentation)." + "description": "The image flavor to use for collector. \"Regular\" images are bigger in size, but contain probes\nfor most kernels. If you use the \"Slim\" image flavor, you must ensure that your Central instance\nis connected to the internet, or regularly receives Collector Support Package updates (for further\ninstructions, please refer to the documentation)." }, { "path": "perNode.collector.forceCollection", "displayName": "Force Collection", - "description": "When the \"collection\" field is set to the deprecated value \"EBPF\", then setting this to \"true\" prevents conversion of the collection method to \"CORE_BPF\". This could be used in exceptional situations when \"EBPF\" has to be used.", + "description": "Deprecated field. This field will be removed in a future release.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -111321,7 +113084,7 @@ { "path": "perNode.collector.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111329,7 +113092,7 @@ { "path": "perNode.compliance.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111337,7 +113100,7 @@ { "path": "perNode.nodeInventory.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111345,7 +113108,7 @@ { "path": "scanner.scannerComponent", "displayName": "Scanner Component", - "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here (not recommended). If you do so, all the settings in this section will have no effect." + "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended).\nIf you do so, all the settings in this section will have no effect." }, { "path": "scanner.analyzer", @@ -111365,7 +113128,7 @@ { "path": "scanner.analyzer.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111383,10 +113146,15 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scanner.analyzer.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scanner.analyzer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." }, { "path": "scanner.analyzer.scaling.replicas", @@ -111410,7 +113178,7 @@ { "path": "scanner.db.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111428,6 +113196,11 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scanner.db.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scannerV4.scannerComponent", "displayName": "Scanner V4 component", @@ -111452,7 +113225,7 @@ { "path": "scannerV4.monitoring", "displayName": "Monitoring", - "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint allows other services to collect metrics from Scanner V4, provided in Prometheus compatible format.", + "description": "Configures monitoring endpoint for Scanner V4. The monitoring endpoint\nallows other services to collect metrics from Scanner V4, provided in\nPrometheus compatible format.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.scannerComponent:AutoSense" ] @@ -111460,12 +113233,12 @@ { "path": "scannerV4.db.persistence", "displayName": "Persistence", - "description": "Configures how Scanner V4 should store its persistent data. You can use a persistent volume claim (the recommended default), a host path, or an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." + "description": "Configures how Scanner V4 should store its persistent data.\nYou can use a persistent volume claim (the recommended default), a host path,\nor an emptyDir volume if Scanner V4 is running on a secured cluster without default StorageClass." }, { "path": "scannerV4.db.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111483,15 +113256,20 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scannerV4.db.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scannerV4.db.persistence.persistentVolumeClaim", "displayName": "Persistent volume claim", - "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data. Recommended for most users." + "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users." }, { "path": "scannerV4.db.persistence.hostPath", "displayName": "Host path", - "description": "Stores persistent data on a directory on the host. This is not recommended, and should only be used together with a node selector (only available in YAML view)." + "description": "Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view)." }, { "path": "scannerV4.db.persistence.hostPath.path", @@ -111501,12 +113279,12 @@ { "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be created. Defaults to \"scanner-v4-db\" if not set." + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"scanner-v4-db\" if not set." }, { "path": "scannerV4.db.persistence.persistentVolumeClaim.size", "displayName": "Size", - "description": "The size of the persistent volume when created through the claim. If a claim was automatically created, this can be used after the initial deployment to resize (grow) the volume (only supported by some storage class controllers).", + "description": "The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:text" ] @@ -111514,7 +113292,7 @@ { "path": "scannerV4.db.persistence.persistentVolumeClaim.storageClassName", "displayName": "Storage Class", - "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage class, you must select a value here.", + "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.", "x-descriptors": [ "urn:alm:descriptor:io.kubernetes:StorageClass" ] @@ -111527,7 +113305,7 @@ { "path": "scannerV4.indexer.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111545,10 +113323,15 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "scannerV4.indexer.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "scannerV4.indexer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits specified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." }, { "path": "scannerV4.indexer.scaling.replicas", @@ -111572,12 +113355,12 @@ { "path": "scannerV4.monitoring.exposeEndpoint", "displayName": "Expose Endpoint", - "description": "Expose the monitoring endpoint. A new service, \"monitoring\", with port 9090, will be created as well as a network policy allowing inbound connections to the port." + "description": "Expose the monitoring endpoint. A new service, \"monitoring\",\nwith port 9090, will be created as well as a network policy allowing\ninbound connections to the port." }, { "path": "sensor.resources", "displayName": "Resources", - "description": "Allows overriding the default resource settings for this component. Please consult the documentation for an overview of default resource requirements and a sizing guide.", + "description": "Allows overriding the default resource settings for this component. Please consult the documentation\nfor an overview of default resource requirements and a sizing guide.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] @@ -111595,11 +113378,30 @@ "urn:alm:descriptor:com.tectonic.ui:tolerations" ] }, + { + "path": "sensor.hostAliases", + "displayName": "Host Aliases", + "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." + }, { "path": "tls.additionalCAs", "displayName": "Additional CAs" } ] + }, + { + "name": "securitypolicies.config.stackrox.io", + "version": "v1alpha1", + "kind": "SecurityPolicy", + "displayName": "Security Policy", + "description": "SecurityPolicy is the schema for the policies API.", + "resources": [ + { + "name": "", + "kind": "Deployment", + "version": "v1" + } + ] } ] }, @@ -111638,6 +113440,7 @@ "risk" ], "labels": { + "operatorframework.io/arch.aarch64": "supported", "operatorframework.io/arch.amd64": "supported", "operatorframework.io/arch.ppc64le": "supported", "operatorframework.io/arch.s390x": "supported" @@ -111677,67 +113480,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:dc7f23341c8b209f1846f29f889d00ef232fb58da9d5b4bd561f3933093b2786" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:898f1a96734a9eb97793f259bcf067eca706b91bfaa7051ae9aafdcfbd48b795" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:5914548f6ce2160e92c5d96580ffba23cdf1ae940c1f73f3f6424d15c6e97c37" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:b74e4ad9d5ba32fc8ebbbddc7327f9858c48413d645f1d084a87474f02e5e50b" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:ed33e7396357f1db03a065573c020846a5872b12a21284439770686689222434" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:039612ff2c9e4dfe2034f819001831515914584d28d01dff3612bc1d4c818762" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:fde78d34ecd2944c7c16b4e823c76b3667bf6c5b468e9991128ecc4272ec0e2e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:328f2bbc1cfc7a05f6d820078b221184033d978435305cca90aaa30e33c416f4" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:41351e88688d23a443ad4f141caf0433b2c2789e6a1a85b4f5b36abeb5656bb1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c803494bdb0418d27931a15c79f8cf142ae10ccd0a50d76a10c48219d34c59f4" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55" }, { - "name": "rhacs-rhel8-operator-a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a7dfbe3590668f91fe6694335b5a35b2fca07b4735348cc5202921755d2f654d" + "name": "rhacs-rhel8-operator-42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:0ff948b5517df3773cae2df02b708c348d8707409899b1de4108588e31601c0c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7829d2e733b63ca11edd6439ea05a8db73f37ac135bca692c63cfaf330fd7571" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c2656b794ec4236e36f48f71bf26bdedd9de27fc4acef39deba2bdcfcddab03b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:646a642d0f972b56942de966f71cd7c3302087bde998abcbcc601fe78c7c65f4" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d928600f75461465598a10de8df2495a275fd5232a92b078f609d1f5774eb778" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6effcb43450c984d139bc9b48760d34e0dbeeebcaf5f478d9c3f7026919c9c05" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f07cba0738897e0e7ae74971be0470ce2a855657f133a6e1cdd8a7092f6151b0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:065fb737c2290cb9e6726e910a2f4e544ae78601cc686560f55c6d4ddca460e7" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cc4b329cc795752ecbb178d2e4efc152bde54b04181334eb5bd70304c3354cad" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:2dd155a98eda0ada2d8aa6482d9e59224bbb9c8d3dfa4f0f98cd4cffc1aa5609" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5109b304eb9458f97af85c2ba63e08f51672fa3f9406226b7f357b86b5828dc0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:864bc44de84432fca57451a89b42919a86fa74cd8f40f6a6775ba9e8fd669aa3" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:1817cf8d2c08b04391792321702ef53d16a4b1ca06459c00c9c053128f534358" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:68fc5841e5f0de7601e2624dea02a0935373ba079675cd52bc28c1e74118fce2" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.0", + "name": "rhacs-operator.v4.6.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c803494bdb0418d27931a15c79f8cf142ae10ccd0a50d76a10c48219d34c59f4", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3df6a9cfda7b1e236bd152e4eb84bb4c39057fd82bb928e3d00307ed64052d6c", "properties": [ { "type": "olm.gvk", @@ -111767,7 +113570,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.0" + "version": "4.6.1" } }, { @@ -111777,8 +113580,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55", - "createdAt": "2024-12-03T01:44:17.371830+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640", + "createdAt": "2024-12-16T08:57:12.959931+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -111790,7 +113593,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.0", + "olm.skipRange": ">= 4.5.0 < 4.6.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -113465,67 +115268,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:898f1a96734a9eb97793f259bcf067eca706b91bfaa7051ae9aafdcfbd48b795" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:547fd8411340c076790a117737febe61689dfdf711d363997d1922dc45cc03c2" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:b74e4ad9d5ba32fc8ebbbddc7327f9858c48413d645f1d084a87474f02e5e50b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d4840509147ba8936fcc26298241f513a4db6b51a23043583fc679977c21aa58" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:039612ff2c9e4dfe2034f819001831515914584d28d01dff3612bc1d4c818762" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:886a6a0d4ea34659a772d2aee149e62f26ef41e1d64ae28536cba3a42b89843c" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:328f2bbc1cfc7a05f6d820078b221184033d978435305cca90aaa30e33c416f4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:710ecc84318c54c9d1e08fe89d03e74cc09350909e5b12e5d07ac6941fd02b27" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c803494bdb0418d27931a15c79f8cf142ae10ccd0a50d76a10c48219d34c59f4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3df6a9cfda7b1e236bd152e4eb84bb4c39057fd82bb928e3d00307ed64052d6c" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640" }, { - "name": "rhacs-rhel8-operator-42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:42c8e5ecd0c06eca9ce0ea202b685e911e14feeabd003f13a33afd2a64edde55" + "name": "rhacs-rhel8-operator-ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7829d2e733b63ca11edd6439ea05a8db73f37ac135bca692c63cfaf330fd7571" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:6d80ce2d7766a75a0aab40d11a32b2decf3716257a29c5726b97fca8b9626eac" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:646a642d0f972b56942de966f71cd7c3302087bde998abcbcc601fe78c7c65f4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:79cca16519a8ffda0be3968a302a0b67c3a4e46a29c33f47d2a7590dd3dde1f9" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6effcb43450c984d139bc9b48760d34e0dbeeebcaf5f478d9c3f7026919c9c05" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82bacb0454b56771e3d34908026a9a5202c1f65af96c935331f7b7c7f0a03fe0" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:065fb737c2290cb9e6726e910a2f4e544ae78601cc686560f55c6d4ddca460e7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:8160352e35a53da165e13f18c3c27f3c16d5db63a6728a3f1caccd522cad660a" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:2dd155a98eda0ada2d8aa6482d9e59224bbb9c8d3dfa4f0f98cd4cffc1aa5609" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:05b80b7a3da8921b3a40ae04b6a5229a209cc710a8199f21cde2922fc02f3297" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:864bc44de84432fca57451a89b42919a86fa74cd8f40f6a6775ba9e8fd669aa3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:782d0c3f60431dd70af30a280500e2ffda831402e695379ec88940efcc893a68" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:68fc5841e5f0de7601e2624dea02a0935373ba079675cd52bc28c1e74118fce2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:612a4491061cb63ae270e947e2c2d616dd27cde974e6e37d43f8a3b0173bb414" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.1", + "name": "rhacs-operator.v4.6.10", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3df6a9cfda7b1e236bd152e4eb84bb4c39057fd82bb928e3d00307ed64052d6c", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6d6b2696a12d49cf3403e338a0e028187473b6f43ef2b0bd72c7701200ac8e2e", "properties": [ { "type": "olm.gvk", @@ -113555,7 +115358,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.1" + "version": "4.6.10" } }, { @@ -113565,20 +115368,20 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640", - "createdAt": "2024-12-16T08:57:12.959931+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c4d434e1ff052508e5594d2b95dafa8726fd8adf5317754774c013a46de224d8", + "createdAt": "2025-09-26T09:24:28.046251+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", "features.operators.openshift.io/csi": "false", "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "false", + "features.operators.openshift.io/fips-compliant": "true", "features.operators.openshift.io/proxy-aware": "true", "features.operators.openshift.io/tls-profiles": "false", "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.1", + "olm.skipRange": ">= 4.5.0 < 4.6.10", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -115213,8 +117016,8 @@ "risk" ], "labels": { - "operatorframework.io/arch.aarch64": "supported", "operatorframework.io/arch.amd64": "supported", + "operatorframework.io/arch.arm64": "supported", "operatorframework.io/arch.ppc64le": "supported", "operatorframework.io/arch.s390x": "supported" }, @@ -115253,67 +117056,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:547fd8411340c076790a117737febe61689dfdf711d363997d1922dc45cc03c2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:8fad8ab2efdcbc99d9efa736a90cca6f236f0a9d45fdb355ae0b6b4dc42d77f0" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d4840509147ba8936fcc26298241f513a4db6b51a23043583fc679977c21aa58" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:ffe41363dc00b05b0daa0c6d16efb30e534086aa4e3d7ccc599c86d33813138c" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:886a6a0d4ea34659a772d2aee149e62f26ef41e1d64ae28536cba3a42b89843c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:16b61ca1b9ee4e0821e7fc82fe4def75ed22950e502730f5704ec4fe63bb2e59" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:710ecc84318c54c9d1e08fe89d03e74cc09350909e5b12e5d07ac6941fd02b27" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b630d53ad0b862151be7e14f0483ca5adac570216deae66f60e75af87a4dfd46" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3df6a9cfda7b1e236bd152e4eb84bb4c39057fd82bb928e3d00307ed64052d6c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6d6b2696a12d49cf3403e338a0e028187473b6f43ef2b0bd72c7701200ac8e2e" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640" - }, - { - "name": "rhacs-rhel8-operator-ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:ae91b22cc334e262dffacfe4c6826dd178b88986fa53910c0da30f66998b1640" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c4d434e1ff052508e5594d2b95dafa8726fd8adf5317754774c013a46de224d8" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:6d80ce2d7766a75a0aab40d11a32b2decf3716257a29c5726b97fca8b9626eac" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:65793c05aec8085a53fab8bcf33a85192c17b46c91a7d86e0a457d1e3a113878" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:79cca16519a8ffda0be3968a302a0b67c3a4e46a29c33f47d2a7590dd3dde1f9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:90c47c6f95571cfcca04aa4e05a18befad75c1b44a6f3a055fcdfdab749d29c5" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:82bacb0454b56771e3d34908026a9a5202c1f65af96c935331f7b7c7f0a03fe0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:899da9c23000bb821bc9d544ebb56bcda4f3245ceee5b1b9c12d09f580b4b9a1" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:8160352e35a53da165e13f18c3c27f3c16d5db63a6728a3f1caccd522cad660a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:b5cd08349931669055f03d21331499ef2ea04597f8a90fb201615d43000271bc" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:05b80b7a3da8921b3a40ae04b6a5229a209cc710a8199f21cde2922fc02f3297" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:713e61d3c8b55de1edc9d7834d3e8576718e1327665f94a6b58178fa7496c0cc" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:782d0c3f60431dd70af30a280500e2ffda831402e695379ec88940efcc893a68" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:6da59c5b82625894f6efa3fa0bc5ea0378edd4f95cf42dee772e9c8a565dba81" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:612a4491061cb63ae270e947e2c2d616dd27cde974e6e37d43f8a3b0173bb414" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:19db8c5d2425dcf18ae63b025f946fc46adaec0578e9505415cb585797069e95" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.10", + "name": "rhacs-operator.v4.6.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6d6b2696a12d49cf3403e338a0e028187473b6f43ef2b0bd72c7701200ac8e2e", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:324eafac9e2a9000c6032f152867defb4f4402ae8772677d7a1b45eb6df1b9be", "properties": [ { "type": "olm.gvk", @@ -115343,7 +117142,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.10" + "version": "4.6.2" } }, { @@ -115353,20 +117152,20 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c4d434e1ff052508e5594d2b95dafa8726fd8adf5317754774c013a46de224d8", - "createdAt": "2025-09-26T09:24:28.046251+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269", + "createdAt": "2025-01-29T02:41:28.863294+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", "features.operators.openshift.io/csi": "false", "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "true", + "features.operators.openshift.io/fips-compliant": "false", "features.operators.openshift.io/proxy-aware": "true", "features.operators.openshift.io/tls-profiles": "false", "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.10", + "olm.skipRange": ">= 4.5.0 < 4.6.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -117001,8 +118800,8 @@ "risk" ], "labels": { + "operatorframework.io/arch.aarch64": "supported", "operatorframework.io/arch.amd64": "supported", - "operatorframework.io/arch.arm64": "supported", "operatorframework.io/arch.ppc64le": "supported", "operatorframework.io/arch.s390x": "supported" }, @@ -117041,63 +118840,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:8fad8ab2efdcbc99d9efa736a90cca6f236f0a9d45fdb355ae0b6b4dc42d77f0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:638da5c4300dc3bed6c4c4eb4a5003edbf049dec0965cbdb603eab200b54ff88" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:ffe41363dc00b05b0daa0c6d16efb30e534086aa4e3d7ccc599c86d33813138c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0c985ce9a05b8a3ac766148cf550a9991f8f2bd8655beb8100df69f40daddf4f" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:16b61ca1b9ee4e0821e7fc82fe4def75ed22950e502730f5704ec4fe63bb2e59" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:a98eddc549e87f270d9b977508f9dbb9f51497d5f86ef94cfdc4599ab2ae1bd5" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b630d53ad0b862151be7e14f0483ca5adac570216deae66f60e75af87a4dfd46" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:8182722b40844e68c9732166d6c77f656aa467d7a85d34451d61938ee9e6a1d3" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6d6b2696a12d49cf3403e338a0e028187473b6f43ef2b0bd72c7701200ac8e2e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:324eafac9e2a9000c6032f152867defb4f4402ae8772677d7a1b45eb6df1b9be" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c4d434e1ff052508e5594d2b95dafa8726fd8adf5317754774c013a46de224d8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269" + }, + { + "name": "rhacs-rhel8-operator-a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:65793c05aec8085a53fab8bcf33a85192c17b46c91a7d86e0a457d1e3a113878" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:1b104dd9b704a6e6060230d6256be7f89d071c9ac15b88b6f1d2b02bce136ae5" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:90c47c6f95571cfcca04aa4e05a18befad75c1b44a6f3a055fcdfdab749d29c5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:107c291051374cc7dd81f7eab0be6e35fbd55caa1c89c71b2da7a195c53673b0" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:899da9c23000bb821bc9d544ebb56bcda4f3245ceee5b1b9c12d09f580b4b9a1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:02f9ac1b92e90418212a6de83ca6c389db0162f06074f968b06a6d05adf08441" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:b5cd08349931669055f03d21331499ef2ea04597f8a90fb201615d43000271bc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f718e68c72291da524132fb0091bc412c412e5736affca49e01dec535d013573" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:713e61d3c8b55de1edc9d7834d3e8576718e1327665f94a6b58178fa7496c0cc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e6135c6cbf866c22af175e6e7f64d0d3d07bd2f6631279b94c3a90a397df73ca" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:6da59c5b82625894f6efa3fa0bc5ea0378edd4f95cf42dee772e9c8a565dba81" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:9371c9589bf24acc6be39eda30fdc651bf310fd0988fc6d30af9d3431f1477d6" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:19db8c5d2425dcf18ae63b025f946fc46adaec0578e9505415cb585797069e95" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:e2d3fbf1c0051e817ed0c23e87e2347c45abbfafb50b644523e3968679e2b632" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.2", + "name": "rhacs-operator.v4.6.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:324eafac9e2a9000c6032f152867defb4f4402ae8772677d7a1b45eb6df1b9be", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:588e9a7db449055473470e0c2102ed551a6d67d26bb6c45415d297f87701c1e2", "properties": [ { "type": "olm.gvk", @@ -117127,7 +118930,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.2" + "version": "4.6.3" } }, { @@ -117137,20 +118940,20 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269", - "createdAt": "2025-01-29T02:41:28.863294+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571", + "createdAt": "2025-03-05T11:04:05.599661+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", "features.operators.openshift.io/csi": "false", "features.operators.openshift.io/disconnected": "true", - "features.operators.openshift.io/fips-compliant": "false", + "features.operators.openshift.io/fips-compliant": "true", "features.operators.openshift.io/proxy-aware": "true", "features.operators.openshift.io/tls-profiles": "false", "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.2", + "olm.skipRange": ">= 4.5.0 < 4.6.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -118825,67 +120628,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:638da5c4300dc3bed6c4c4eb4a5003edbf049dec0965cbdb603eab200b54ff88" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:26826990c0c0ed9a90861b746c3a30aa22f0e3791b679c53013bc5a8e4c18d1e" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0c985ce9a05b8a3ac766148cf550a9991f8f2bd8655beb8100df69f40daddf4f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d08a5e37f2a3d262c7cff2611561e1314717ff22e6efa445f509c13623598e77" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:a98eddc549e87f270d9b977508f9dbb9f51497d5f86ef94cfdc4599ab2ae1bd5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2ffca10dc8207f4c27615f9e29228b8fce65989d9c449f158e2f79a6f2957483" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:8182722b40844e68c9732166d6c77f656aa467d7a85d34451d61938ee9e6a1d3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:69eb3008a211af6d983b3ef42627558bdc435498c1584d53080afb1e87787896" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:324eafac9e2a9000c6032f152867defb4f4402ae8772677d7a1b45eb6df1b9be" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:588e9a7db449055473470e0c2102ed551a6d67d26bb6c45415d297f87701c1e2" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571" }, { - "name": "rhacs-rhel8-operator-a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a96572d0df791da60763dec4b4f0f52124772c3649303170968806dcc3de8269" + "name": "rhacs-rhel8-operator-7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:1b104dd9b704a6e6060230d6256be7f89d071c9ac15b88b6f1d2b02bce136ae5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:940bbbacc8bec1faa56ce43151f62018b526fe0dd7b2e9ed0bf0c2f29107d5c0" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:107c291051374cc7dd81f7eab0be6e35fbd55caa1c89c71b2da7a195c53673b0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2f1135038cf64a45d42536d155fba37b384c234c5cb9049561ddfd625802051e" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:02f9ac1b92e90418212a6de83ca6c389db0162f06074f968b06a6d05adf08441" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:2c415068f76f53a3f7ff4cd77a5bc044a236178a962bf497590f4fba86538ca9" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f718e68c72291da524132fb0091bc412c412e5736affca49e01dec535d013573" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a6bbd7b3a08309061c6c1cbb52eaed5561a5784cbcf6abbbc9733e4829cf6839" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:e6135c6cbf866c22af175e6e7f64d0d3d07bd2f6631279b94c3a90a397df73ca" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:9f355bb228f2e1e528fcff049b6b38c0cca9da8e3123be2683738b4932ae451c" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:9371c9589bf24acc6be39eda30fdc651bf310fd0988fc6d30af9d3431f1477d6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:6dc5d7517d6455fb0f103422ac59a6b83df140825ddc4571ebff6489da5e9316" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:e2d3fbf1c0051e817ed0c23e87e2347c45abbfafb50b644523e3968679e2b632" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:63b5c00f3eb6deb384268dd8a2966c1a589152fcb39220a171f7dd149c4f8823" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.3", + "name": "rhacs-operator.v4.6.4", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:588e9a7db449055473470e0c2102ed551a6d67d26bb6c45415d297f87701c1e2", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:40422d266354c240237d66bb621660ed235af7c8620de8432912854cc11c084b", "properties": [ { "type": "olm.gvk", @@ -118915,7 +120718,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.3" + "version": "4.6.4" } }, { @@ -118925,8 +120728,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571", - "createdAt": "2025-03-05T11:04:05.599661+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039", + "createdAt": "2025-03-27T13:59:26.005302+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -118938,7 +120741,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.3", + "olm.skipRange": ">= 4.5.0 < 4.6.4", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -120613,67 +122416,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:26826990c0c0ed9a90861b746c3a30aa22f0e3791b679c53013bc5a8e4c18d1e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:163456e26fd025450e394fe59cc1d19218cee661e8d013e85af6b5a07941957d" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d08a5e37f2a3d262c7cff2611561e1314717ff22e6efa445f509c13623598e77" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:23dbf3e9b88ff0e83e271dd69c8386cb6f398f620f2fddb39cf2a24777f6f420" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2ffca10dc8207f4c27615f9e29228b8fce65989d9c449f158e2f79a6f2957483" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:45cac472ab6672df692181ebc480fa38c7dfdcf40ab3f12bd50d69f1219c0356" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:69eb3008a211af6d983b3ef42627558bdc435498c1584d53080afb1e87787896" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3f6598ff1ad819cece2bfd3f0549b1990b8922ca4d10a33eb1211fbe56afcbb2" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:588e9a7db449055473470e0c2102ed551a6d67d26bb6c45415d297f87701c1e2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:40422d266354c240237d66bb621660ed235af7c8620de8432912854cc11c084b" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039" }, { - "name": "rhacs-rhel8-operator-7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7ed73015b288b79c32ea0914aedb12c47e1ceeeeea8b582e953e183e1447a571" + "name": "rhacs-rhel8-operator-807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:940bbbacc8bec1faa56ce43151f62018b526fe0dd7b2e9ed0bf0c2f29107d5c0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c5375395f1ab79bf6e64ee58a587d9ed6d960c54509932782ef9aa8987d8f17d" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2f1135038cf64a45d42536d155fba37b384c234c5cb9049561ddfd625802051e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:99ec6dc9379be4ea6f3cbb67019b5f1bfe18d8f1e3fa7404ef15a36833e32a5b" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:2c415068f76f53a3f7ff4cd77a5bc044a236178a962bf497590f4fba86538ca9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5e194cceaeeb7da8876da475eb0a6b7f4b89eb9787ec536f533bd29a7038b142" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a6bbd7b3a08309061c6c1cbb52eaed5561a5784cbcf6abbbc9733e4829cf6839" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:330c2df84aec3d06e551c05542fc9bb66557903e5a57816bde544d61487c3a57" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:9f355bb228f2e1e528fcff049b6b38c0cca9da8e3123be2683738b4932ae451c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:98e967e0c2a5e6fb8df2655b4a22fbb7bd340e8e9b02e07fa1fdcbcd844bf972" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:6dc5d7517d6455fb0f103422ac59a6b83df140825ddc4571ebff6489da5e9316" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:9158941068dbdfad03a1754148187cbfaed719f1b3c0d990380400377f8cdb4c" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:63b5c00f3eb6deb384268dd8a2966c1a589152fcb39220a171f7dd149c4f8823" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5d9f3589dd7f8c88a7125cb32550cec8bfcf3f9339d6a672b2f52938878e4990" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.4", + "name": "rhacs-operator.v4.6.5", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:40422d266354c240237d66bb621660ed235af7c8620de8432912854cc11c084b", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:f61189397263f05214c2d36b4dc0a71a924c2481a1e365b7fb3c71d8dfce6b27", "properties": [ { "type": "olm.gvk", @@ -120703,7 +122506,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.4" + "version": "4.6.5" } }, { @@ -120713,8 +122516,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039", - "createdAt": "2025-03-27T13:59:26.005302+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e", + "createdAt": "2025-04-09T22:56:31.952064+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -120726,7 +122529,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.4", + "olm.skipRange": ">= 4.5.0 < 4.6.5", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -122401,67 +124204,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:163456e26fd025450e394fe59cc1d19218cee661e8d013e85af6b5a07941957d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:79aa6808fb042d7af06da962285a7e31adbe1899f1001d7b38b0892a74b06fef" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:23dbf3e9b88ff0e83e271dd69c8386cb6f398f620f2fddb39cf2a24777f6f420" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d84fc5e73d1f61ea5f8440ea7da37ac1c972db13bacdca2c14c68912a6ac8837" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:45cac472ab6672df692181ebc480fa38c7dfdcf40ab3f12bd50d69f1219c0356" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:9ee40e5a58b4343ab36f8d427a60c2e5ed6bdf39730dc9d87fce202e71e5a3b2" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3f6598ff1ad819cece2bfd3f0549b1990b8922ca4d10a33eb1211fbe56afcbb2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:02d0d4d5e01ee4fa84566651a1c76baba02fdb47519539bdee5dc7ea9f502678" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:40422d266354c240237d66bb621660ed235af7c8620de8432912854cc11c084b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:f61189397263f05214c2d36b4dc0a71a924c2481a1e365b7fb3c71d8dfce6b27" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e" }, { - "name": "rhacs-rhel8-operator-807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:807d0a5cd7677cff200e15e90f3c14e0539b0b5bb70451521695847d39d88039" + "name": "rhacs-rhel8-operator-81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c5375395f1ab79bf6e64ee58a587d9ed6d960c54509932782ef9aa8987d8f17d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:6d4b7c90414120759d80971bec465cb15172cf6bc6135d160133464c9f4da58b" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:99ec6dc9379be4ea6f3cbb67019b5f1bfe18d8f1e3fa7404ef15a36833e32a5b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:8d9a8245c8de51d56c30301633edc3d4a7f9d0da12228cf9e36728c75c57c57e" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5e194cceaeeb7da8876da475eb0a6b7f4b89eb9787ec536f533bd29a7038b142" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:dc562ace0439fc89801799394fd9a44967be76cc8c0af9e213c9aa0ed23b97c6" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:330c2df84aec3d06e551c05542fc9bb66557903e5a57816bde544d61487c3a57" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:658db364757c10aa97e010e372c84a12e3584c3f4e91c447372512ce631e6a3a" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:98e967e0c2a5e6fb8df2655b4a22fbb7bd340e8e9b02e07fa1fdcbcd844bf972" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:45091749b61cb2822bf37f3cd8026f96fada060eb14960840fd9cfd1d6787fa8" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:9158941068dbdfad03a1754148187cbfaed719f1b3c0d990380400377f8cdb4c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:bbbc59f5cf24a6c60cfaa3bd2d593a29357df0b13a172870508747c2c131b2c9" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5d9f3589dd7f8c88a7125cb32550cec8bfcf3f9339d6a672b2f52938878e4990" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:95f135bf53b7469dafb4a4309d2dea383f81295d90138698e4cfa60c77fcd6cf" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.5", + "name": "rhacs-operator.v4.6.6", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:f61189397263f05214c2d36b4dc0a71a924c2481a1e365b7fb3c71d8dfce6b27", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b0590a2248d948f82e8a116e37a2be42f49a3edeb4a92d41416420ea604d5b34", "properties": [ { "type": "olm.gvk", @@ -122491,7 +124294,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.5" + "version": "4.6.6" } }, { @@ -122501,8 +124304,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e", - "createdAt": "2025-04-09T22:56:31.952064+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939", + "createdAt": "2025-05-20T16:00:10.253579+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -122514,7 +124317,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.5", + "olm.skipRange": ">= 4.5.0 < 4.6.6", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -124189,67 +125992,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:79aa6808fb042d7af06da962285a7e31adbe1899f1001d7b38b0892a74b06fef" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:2f4e04e91dc377065ce953e9ff89938dab9a70306ac86fa17a6bdd88ced0b36f" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:d84fc5e73d1f61ea5f8440ea7da37ac1c972db13bacdca2c14c68912a6ac8837" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:949dcdf0f10df63e3a4e5928a5f9f99a11066b003983116eb5416e80f66555d1" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:9ee40e5a58b4343ab36f8d427a60c2e5ed6bdf39730dc9d87fce202e71e5a3b2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:a77ac0d07bc004574bd6fa593b6d4cd60536669305fa0bc14e0c64a55c93769b" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:02d0d4d5e01ee4fa84566651a1c76baba02fdb47519539bdee5dc7ea9f502678" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:5cf145229ef289dccb27b2d98fd3dcb2a30540df076df1dcd97de13c891e4b93" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:f61189397263f05214c2d36b4dc0a71a924c2481a1e365b7fb3c71d8dfce6b27" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b0590a2248d948f82e8a116e37a2be42f49a3edeb4a92d41416420ea604d5b34" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939" }, { - "name": "rhacs-rhel8-operator-81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:81e467e51e499f86d059e91e715c2cb8285728a097d3c7821557f03de4f1b74e" + "name": "rhacs-rhel8-operator-c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:6d4b7c90414120759d80971bec465cb15172cf6bc6135d160133464c9f4da58b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:cd3c577ddb86ffc14ea3d5fd8dde3dc06043e295da94be704bcbf6652164d661" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:8d9a8245c8de51d56c30301633edc3d4a7f9d0da12228cf9e36728c75c57c57e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:02d74c90175a240c28d4917552be5c43a41b4a86764fa289c3a54408b60b82aa" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:dc562ace0439fc89801799394fd9a44967be76cc8c0af9e213c9aa0ed23b97c6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:08c9e3e54bb08a97809390726d79c63113cbdc4c542f4d2e9a9089112e17e175" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:658db364757c10aa97e010e372c84a12e3584c3f4e91c447372512ce631e6a3a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:0c51827eacd33a7dfc5c7239e6579234fab96f18c2a1b704789d345416e0c3c2" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:45091749b61cb2822bf37f3cd8026f96fada060eb14960840fd9cfd1d6787fa8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:07d4990f13ee4e8a15d5a582a3aa6188cb3dd201bafa9c3ba6155dcf1cda329c" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:bbbc59f5cf24a6c60cfaa3bd2d593a29357df0b13a172870508747c2c131b2c9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:ebc3d3af3054c6e1688a02e89540aab8d322e5bc0513c7e81e7dfaacad06dfcc" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:95f135bf53b7469dafb4a4309d2dea383f81295d90138698e4cfa60c77fcd6cf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:2b6bbfd9a257e79af4af0f0445d176594d6699f3ab77a370883502627c62c52b" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.6", + "name": "rhacs-operator.v4.6.7", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b0590a2248d948f82e8a116e37a2be42f49a3edeb4a92d41416420ea604d5b34", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:a2e9af0568ae9b6401655f3662a7a914c34c29a5616d590da7ef19248e2d1068", "properties": [ { "type": "olm.gvk", @@ -124279,7 +126082,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.6" + "version": "4.6.7" } }, { @@ -124289,8 +126092,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939", - "createdAt": "2025-05-20T16:00:10.253579+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07", + "createdAt": "2025-06-06T16:43:15.187144+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -124302,7 +126105,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.6", + "olm.skipRange": ">= 4.5.0 < 4.6.7", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -125977,67 +127780,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:2f4e04e91dc377065ce953e9ff89938dab9a70306ac86fa17a6bdd88ced0b36f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:5892ca0e329bebdaa71b60b18231058ea3046d87f80e350db4180d43dc212e15" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:949dcdf0f10df63e3a4e5928a5f9f99a11066b003983116eb5416e80f66555d1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:43ec3bb6a3821021251d361f04e404da7badddb135cb27c44db84a698593eac4" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:a77ac0d07bc004574bd6fa593b6d4cd60536669305fa0bc14e0c64a55c93769b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:40c0871ed84c1cc59e6402156f6315bef319b1942d3cf3377f9744c68cea5e35" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:5cf145229ef289dccb27b2d98fd3dcb2a30540df076df1dcd97de13c891e4b93" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:91cb2cf650723027f2f929c041ec9b42415ff051d183938575f92054091315ee" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b0590a2248d948f82e8a116e37a2be42f49a3edeb4a92d41416420ea604d5b34" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:a2e9af0568ae9b6401655f3662a7a914c34c29a5616d590da7ef19248e2d1068" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07" }, { - "name": "rhacs-rhel8-operator-c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c03d65e4875499588007e22c3029fe04bcad6574e4633a0e84c8bfb060679939" + "name": "rhacs-rhel8-operator-97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:cd3c577ddb86ffc14ea3d5fd8dde3dc06043e295da94be704bcbf6652164d661" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2521f59d49a49ced1405bb90b1bca3441f4f880978d73529a4f9b8e7ffbf7d08" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:02d74c90175a240c28d4917552be5c43a41b4a86764fa289c3a54408b60b82aa" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:fc2712ab9a07e18e2fbaf28873c43a29fbd4f03e5ae87a5d9d13d4948ac61727" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:08c9e3e54bb08a97809390726d79c63113cbdc4c542f4d2e9a9089112e17e175" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:57ff6ed4bf28cda1b41c5ae85e178a9240cf4601930eb3f3ee726bc85249f4e5" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:0c51827eacd33a7dfc5c7239e6579234fab96f18c2a1b704789d345416e0c3c2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:46c9c1c0304340f8db0f9540676220e1071327c72d09b37171046550ff46b4a1" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:07d4990f13ee4e8a15d5a582a3aa6188cb3dd201bafa9c3ba6155dcf1cda329c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:af7cc40e2c714763b5ea783d89512cd3b2e539275d49dc8e8d336fdbcb153ec5" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:ebc3d3af3054c6e1688a02e89540aab8d322e5bc0513c7e81e7dfaacad06dfcc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:864483ad0f72d152e78036db2bb17af46154e39a836a7d3d5d927ffa749db2e9" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:2b6bbfd9a257e79af4af0f0445d176594d6699f3ab77a370883502627c62c52b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:3438f6fdb9cff79fb492f7b2ad33bbc84156a5b8ebc39587c0e4a95ba62f1e40" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.7", + "name": "rhacs-operator.v4.6.8", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:a2e9af0568ae9b6401655f3662a7a914c34c29a5616d590da7ef19248e2d1068", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:adb6c303305804dc46759f6561971c5bf484c76c773997237dae9b902d08d982", "properties": [ { "type": "olm.gvk", @@ -126067,7 +127870,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.7" + "version": "4.6.8" } }, { @@ -126077,8 +127880,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07", - "createdAt": "2025-06-06T16:43:15.187144+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e", + "createdAt": "2025-07-16T06:20:16.381009+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -126090,7 +127893,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.7", + "olm.skipRange": ">= 4.5.0 < 4.6.8", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -127765,67 +129568,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:5892ca0e329bebdaa71b60b18231058ea3046d87f80e350db4180d43dc212e15" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:c00536ed5e82ed2c059a9395a6bb0488c79f680c41db24d4d384abceb665211f" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:43ec3bb6a3821021251d361f04e404da7badddb135cb27c44db84a698593eac4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:8dd4f43a47517621f32f91c9bdf063f2cc47f79fa99fd4aa4008dc60e47e15ba" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:40c0871ed84c1cc59e6402156f6315bef319b1942d3cf3377f9744c68cea5e35" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:7a38f9814ff4319fcbad12d9d117a0bbd407e8c8aa73afe6009198264b0aa827" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:91cb2cf650723027f2f929c041ec9b42415ff051d183938575f92054091315ee" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:fe416c8a2c0270cf48afc87f54508dd3e1a284f812267b7a8fd791db42d4ff48" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:a2e9af0568ae9b6401655f3662a7a914c34c29a5616d590da7ef19248e2d1068" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:adb6c303305804dc46759f6561971c5bf484c76c773997237dae9b902d08d982" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e" }, { - "name": "rhacs-rhel8-operator-97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:97a727fc20b3b653d5c7a44707213f7c586630a38a555e0d4cf1903d26228a07" + "name": "rhacs-rhel8-operator-a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2521f59d49a49ced1405bb90b1bca3441f4f880978d73529a4f9b8e7ffbf7d08" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:35a58b0ed95dbd928c5bf8930c3ca1116d4e149830130aa0ffca4c07cef14c05" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:fc2712ab9a07e18e2fbaf28873c43a29fbd4f03e5ae87a5d9d13d4948ac61727" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f5bd251a24b862437df19998d33c04bf58b9e01dbca3d519995eb769183b0d50" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:57ff6ed4bf28cda1b41c5ae85e178a9240cf4601930eb3f3ee726bc85249f4e5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:e2a898fb9527e13c45616558026ec913514c21958aaf2084f7f1cd8112b92886" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:46c9c1c0304340f8db0f9540676220e1071327c72d09b37171046550ff46b4a1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:add610c48f3c4618610b7d56ede858aed669e7328e0739f2863db8d0f09f8191" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:af7cc40e2c714763b5ea783d89512cd3b2e539275d49dc8e8d336fdbcb153ec5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:5d0e3b00381cb06f405e10a12b3cdc37d1375954f598c50c2d75c4735783c7f5" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:864483ad0f72d152e78036db2bb17af46154e39a836a7d3d5d927ffa749db2e9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:2832f65b83cc27d9e2e363f4a015ba530f798bd6d8ce87824363857d3cb8224e" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:3438f6fdb9cff79fb492f7b2ad33bbc84156a5b8ebc39587c0e4a95ba62f1e40" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5686555757352405d7bae8953f30f4c1e04778e772ad4432082b5146c56cff01" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.8", + "name": "rhacs-operator.v4.6.9", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:adb6c303305804dc46759f6561971c5bf484c76c773997237dae9b902d08d982", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:eee21ee829be000db4a804aa7d0dded1a42767c37f56ac6ef4b4df6d9ab026f2", "properties": [ { "type": "olm.gvk", @@ -127855,7 +129658,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.8" + "version": "4.6.9" } }, { @@ -127865,8 +129668,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e", - "createdAt": "2025-07-16T06:20:16.381009+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661", + "createdAt": "2025-08-14T17:46:18.113538+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -127878,7 +129681,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.8", + "olm.skipRange": ">= 4.5.0 < 4.6.9", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -129553,67 +131356,67 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:c00536ed5e82ed2c059a9395a6bb0488c79f680c41db24d4d384abceb665211f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9ea975ea544c509ead7cf0a0e137bac006c89acb1897e7b1975dcc9b173b88ff" }, { "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:8dd4f43a47517621f32f91c9bdf063f2cc47f79fa99fd4aa4008dc60e47e15ba" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:8cfa65691100319c9ef687a627766f94f26a34063efc428d94ff8b0c4f534d53" }, { "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:7a38f9814ff4319fcbad12d9d117a0bbd407e8c8aa73afe6009198264b0aa827" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2550591bd9d5272001cc3f0298fd01b736cccc4d456d6a63ebe0d56fd7d3868f" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:fe416c8a2c0270cf48afc87f54508dd3e1a284f812267b7a8fd791db42d4ff48" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6a22b0ebf29d54433cdb9dcb3b1ba4f33737ca85ec134ba8ac655ab7d56be583" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:adb6c303305804dc46759f6561971c5bf484c76c773997237dae9b902d08d982" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:eee21ee829be000db4a804aa7d0dded1a42767c37f56ac6ef4b4df6d9ab026f2" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661" }, { - "name": "rhacs-rhel8-operator-a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:a450a8aaa2638ff55ab19515e31c49766a4eb953c59aca3503dde20d911d062e" + "name": "rhacs-rhel8-operator-d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:35a58b0ed95dbd928c5bf8930c3ca1116d4e149830130aa0ffca4c07cef14c05" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d533f8730e02eb9b0b73f6fafe42bff36ee4ddcffffaf2b0cd694323659351a8" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f5bd251a24b862437df19998d33c04bf58b9e01dbca3d519995eb769183b0d50" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:852b629321443b08f77b44b96cd294f528789cef4be3ecb3ff8ace37c13e9637" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:e2a898fb9527e13c45616558026ec913514c21958aaf2084f7f1cd8112b92886" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d02cdb6aa55f142803751481d2d0f5e0d9e03ced10c8adb5b5676809cba503e8" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:add610c48f3c4618610b7d56ede858aed669e7328e0739f2863db8d0f09f8191" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1b9566e692200cae917f652c6a135c325ee1d3983aa5d035bbbdba6a350083f2" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:5d0e3b00381cb06f405e10a12b3cdc37d1375954f598c50c2d75c4735783c7f5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:5d7392cf4d8248cb3f2d9137d45438fd026eecdbe987527bc4b834290d08c1f0" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:2832f65b83cc27d9e2e363f4a015ba530f798bd6d8ce87824363857d3cb8224e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:719968b68e00ff5284a8599bb393677ada1dbaac865b0b40fa9916c58bfcdb32" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5686555757352405d7bae8953f30f4c1e04778e772ad4432082b5146c56cff01" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:975c0543ad8d3d45f4e5eac573f6e24fe7f8d7537eed73ec2a8664d4a1479d1b" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.6.9", + "name": "rhacs-operator.v4.7.0", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:eee21ee829be000db4a804aa7d0dded1a42767c37f56ac6ef4b4df6d9ab026f2", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6937beffd348474d4d9b06f14fabfeb74efb69cf7bc60e6e12eb5b45b03014d5", "properties": [ { "type": "olm.gvk", @@ -129643,7 +131446,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.6.9" + "version": "4.7.0" } }, { @@ -129653,8 +131456,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661", - "createdAt": "2025-08-14T17:46:18.113538+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68", + "createdAt": "2025-03-03T21:35:05.802338+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -129666,7 +131469,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.5.0 < 4.6.9", + "olm.skipRange": ">= 4.6.0 < 4.7.0", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -130758,7 +132561,7 @@ { "path": "admissionControl.listenOnUpdates", "displayName": "Listen On Updates", - "description": "Set this to 'true' to enable preventive policy enforcement for object updates.\n\n\nNote: this will not have any effect unless 'Listen On Creates' is set to 'true' as well." + "description": "Set this to 'true' to enable preventive policy enforcement for object updates.\n\nNote: this will not have any effect unless 'Listen On Creates' is set to 'true' as well." }, { "path": "admissionControl.listenOnEvents", @@ -130924,7 +132727,6 @@ "displayName": "Collection", "description": "The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in these section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.", "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:select:EBPF", "urn:alm:descriptor:com.tectonic.ui:select:CORE_BPF", "urn:alm:descriptor:com.tectonic.ui:select:NoCollection" ] @@ -130932,7 +132734,10 @@ { "path": "perNode.collector.imageFlavor", "displayName": "Image Flavor", - "description": "The image flavor to use for collector. \"Regular\" images are bigger in size, but contain probes\nfor most kernels. If you use the \"Slim\" image flavor, you must ensure that your Central instance\nis connected to the internet, or regularly receives Collector Support Package updates (for further\ninstructions, please refer to the documentation)." + "description": "Deprecated field.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] }, { "path": "perNode.collector.forceCollection", @@ -131341,67 +133146,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9ea975ea544c509ead7cf0a0e137bac006c89acb1897e7b1975dcc9b173b88ff" - }, - { - "name": "collector_full", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:8cfa65691100319c9ef687a627766f94f26a34063efc428d94ff8b0c4f534d53" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ce1dbef29e7861f5d4c66f8315349ab5aebc563a65e88955f43d04847e7c8602" }, { - "name": "collector_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2550591bd9d5272001cc3f0298fd01b736cccc4d456d6a63ebe0d56fd7d3868f" + "name": "collector", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:3163efc7235828def4e78728f44f66cd3a1fce30ba842258e7dbf9e13c991ec4" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6a22b0ebf29d54433cdb9dcb3b1ba4f33737ca85ec134ba8ac655ab7d56be583" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:e503a3bcd91fba2e30c380aaff6f3df7bddaef40223695bef6d7fb6c698d90e3" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:eee21ee829be000db4a804aa7d0dded1a42767c37f56ac6ef4b4df6d9ab026f2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6937beffd348474d4d9b06f14fabfeb74efb69cf7bc60e6e12eb5b45b03014d5" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68" }, { - "name": "rhacs-rhel8-operator-d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8fd339930d05c701bad741913773573955d6ecc9b63d16d436114fb6a683661" + "name": "rhacs-rhel8-operator-898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d533f8730e02eb9b0b73f6fafe42bff36ee4ddcffffaf2b0cd694323659351a8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:a1f9fc80da61b9dc89c991facd7145505d001168d3ac7ce9338824173df1c5e1" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:852b629321443b08f77b44b96cd294f528789cef4be3ecb3ff8ace37c13e9637" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:170c7b617e0ea4a5a75eebbebaedfef4ff86907668d8ae0b6f8f68e781e7319c" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d02cdb6aa55f142803751481d2d0f5e0d9e03ced10c8adb5b5676809cba503e8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:936d0cb7de992801f5716cca70e098744403cbd4ce732c0c658c2edb216a044f" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1b9566e692200cae917f652c6a135c325ee1d3983aa5d035bbbdba6a350083f2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1b2590e914ba0682a48eb5d8de56c76bd91c6082461b035bd341680323d35695" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:5d7392cf4d8248cb3f2d9137d45438fd026eecdbe987527bc4b834290d08c1f0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7f4a6aaa4acf7a4dc73c3c8b2c40a9c8a915281074ae966223e70547a09ec108" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:719968b68e00ff5284a8599bb393677ada1dbaac865b0b40fa9916c58bfcdb32" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:1bc4846995e23a7950eb371c452562583ca7b7f14b44830ba608676cb50aeeaa" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:975c0543ad8d3d45f4e5eac573f6e24fe7f8d7537eed73ec2a8664d4a1479d1b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:f0222a1f17259d479ef57627175bcda070b4ca988035673f5ef970d9fac11bba" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.0", + "name": "rhacs-operator.v4.7.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6937beffd348474d4d9b06f14fabfeb74efb69cf7bc60e6e12eb5b45b03014d5", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e23398e5f761b4a2fb94ec91b7f009e4e6abf09ec511dbf30468142e742d311d", "properties": [ { "type": "olm.gvk", @@ -131431,7 +133232,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.0" + "version": "4.7.1" } }, { @@ -131441,8 +133242,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68", - "createdAt": "2025-03-03T21:35:05.802338+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222", + "createdAt": "2025-03-24T17:52:02.024830+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -131454,7 +133255,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.0", + "olm.skipRange": ">= 4.6.0 < 4.7.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -133131,63 +134932,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ce1dbef29e7861f5d4c66f8315349ab5aebc563a65e88955f43d04847e7c8602" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:345ebe9e503ab55fd79d93d79dededc4f01dc206082b679853cc94a58955c480" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:3163efc7235828def4e78728f44f66cd3a1fce30ba842258e7dbf9e13c991ec4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:cf8715b0b73a2e8e2126f3c55e6ba7023ea67e006673124d598070d2c1841ae8" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:e503a3bcd91fba2e30c380aaff6f3df7bddaef40223695bef6d7fb6c698d90e3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:00f0757cc04fe701219c006a3e5fb8a24b442ba75a7e8e3d693577d32e7349bb" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:6937beffd348474d4d9b06f14fabfeb74efb69cf7bc60e6e12eb5b45b03014d5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e23398e5f761b4a2fb94ec91b7f009e4e6abf09ec511dbf30468142e742d311d" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222" }, { - "name": "rhacs-rhel8-operator-898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:898261b1d5f659cc952bec1a64932ac2698fe5f99fa8caa863d66817ded8bd68" + "name": "rhacs-rhel8-operator-63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:a1f9fc80da61b9dc89c991facd7145505d001168d3ac7ce9338824173df1c5e1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:fc123457b6525f7eb26a6850ca91d98cd8ff2bcb6044b34e73d240f86c2b3a98" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:170c7b617e0ea4a5a75eebbebaedfef4ff86907668d8ae0b6f8f68e781e7319c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aebb4a7b84cc9d9b4154b606afd8160d0c4e960d29c8c146b2f23c5dab730006" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:936d0cb7de992801f5716cca70e098744403cbd4ce732c0c658c2edb216a044f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d2fd10bd74cc64d6853e5c923d380ed9a75e9c33499e639d1f764aea72606e63" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:1b2590e914ba0682a48eb5d8de56c76bd91c6082461b035bd341680323d35695" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:507b718f3e38bee95d854c2c9f2da62d975e5a916017217beda7b3790a550ab9" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7f4a6aaa4acf7a4dc73c3c8b2c40a9c8a915281074ae966223e70547a09ec108" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:07bba246bb646cc4322da8a44782ea29690125c6b31d13a3e39f87e238fe9588" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:1bc4846995e23a7950eb371c452562583ca7b7f14b44830ba608676cb50aeeaa" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:14d1e6e5665b3546fe4851bdca923a02f3147c1937704bcd89376620b651340f" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:f0222a1f17259d479ef57627175bcda070b4ca988035673f5ef970d9fac11bba" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:1106758da4358e026e53811ee163e7c7a53504181440f817664e92227be792c2" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.1", + "name": "rhacs-operator.v4.7.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e23398e5f761b4a2fb94ec91b7f009e4e6abf09ec511dbf30468142e742d311d", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:567535d4a629980952e42537221a232e24399462c8ffda467c38195ea7afa3e2", "properties": [ { "type": "olm.gvk", @@ -133217,7 +135018,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.1" + "version": "4.7.2" } }, { @@ -133227,8 +135028,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222", - "createdAt": "2025-03-24T17:52:02.024830+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27", + "createdAt": "2025-04-10T22:15:36.458414+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -133240,7 +135041,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.1", + "olm.skipRange": ">= 4.6.0 < 4.7.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -134917,63 +136718,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:345ebe9e503ab55fd79d93d79dededc4f01dc206082b679853cc94a58955c480" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3081b0171fcdb48d174d7e0269dddd7fe999d3b690d88c1f5eb23e8688c1d38a" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:cf8715b0b73a2e8e2126f3c55e6ba7023ea67e006673124d598070d2c1841ae8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:7fa4a50498f994d7cdc08a189ce0c7f1f88dce626a4b3a7202a402126820a519" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:00f0757cc04fe701219c006a3e5fb8a24b442ba75a7e8e3d693577d32e7349bb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:32a4d9bb9fab3a0b1a2097a07e15e0cd7f6f0a513a36989e317712efc901e44c" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e23398e5f761b4a2fb94ec91b7f009e4e6abf09ec511dbf30468142e742d311d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:567535d4a629980952e42537221a232e24399462c8ffda467c38195ea7afa3e2" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27" }, { - "name": "rhacs-rhel8-operator-63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:63cb8ad6a6dee3e29b8d8e9859b61ce16341c47db1ee4f736709e79be6d1b222" + "name": "rhacs-rhel8-operator-2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:fc123457b6525f7eb26a6850ca91d98cd8ff2bcb6044b34e73d240f86c2b3a98" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c3c744575723fda16ac465a75a22ca4730b7fb2819522581076e26c9337b14b7" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:aebb4a7b84cc9d9b4154b606afd8160d0c4e960d29c8c146b2f23c5dab730006" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4aca11de59a4a2562ae8a7a1bbf72cd582e09b0ba92e0f5189bb3aad0b7150a3" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d2fd10bd74cc64d6853e5c923d380ed9a75e9c33499e639d1f764aea72606e63" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9975c60b21c87c28f0b4f694e8ed1f1c066e81a5ea9b36ebc2112b51ab493da4" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:507b718f3e38bee95d854c2c9f2da62d975e5a916017217beda7b3790a550ab9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:8abb617197083bf853fc2ff2964f49a22b0d41fe41e8ba0677cdded990779fd5" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:07bba246bb646cc4322da8a44782ea29690125c6b31d13a3e39f87e238fe9588" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:c3f3b643b1518e0e570f52f89829d75b6f34ed550c5dfca8ffa7e09b04e8a0f4" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:14d1e6e5665b3546fe4851bdca923a02f3147c1937704bcd89376620b651340f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:865315508f1329523cec2e0a1ad4032385c9aa9415aeda12d79b068aa5f7380b" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:1106758da4358e026e53811ee163e7c7a53504181440f817664e92227be792c2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:e66b3d65d5a0908ae856ce669589fcccb6fecb138da5b307d92af6786cd6d64b" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.2", + "name": "rhacs-operator.v4.7.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:567535d4a629980952e42537221a232e24399462c8ffda467c38195ea7afa3e2", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b24edee77ea1320adb9c5ae3fd5ae538059e2b9475abf8f338ecce136c331e07", "properties": [ { "type": "olm.gvk", @@ -135003,7 +136804,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.2" + "version": "4.7.3" } }, { @@ -135013,8 +136814,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27", - "createdAt": "2025-04-10T22:15:36.458414+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941", + "createdAt": "2025-05-08T19:00:40.297611+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -135026,7 +136827,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.2", + "olm.skipRange": ">= 4.6.0 < 4.7.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -136703,63 +138504,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3081b0171fcdb48d174d7e0269dddd7fe999d3b690d88c1f5eb23e8688c1d38a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:027adb1b95c7d77633356daae7077fe07284a9473d4b094f6efb97b8e83ccf6d" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:7fa4a50498f994d7cdc08a189ce0c7f1f88dce626a4b3a7202a402126820a519" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:f5490e13f95ddf76d39f277d2f5119b4ec2f8359310a4ebf0f9a455a2ee41ac0" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:32a4d9bb9fab3a0b1a2097a07e15e0cd7f6f0a513a36989e317712efc901e44c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:96fff6d59d35e0bd824d3fce8b130836e72f802c0613db13562e0a714dd2fccf" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:567535d4a629980952e42537221a232e24399462c8ffda467c38195ea7afa3e2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b24edee77ea1320adb9c5ae3fd5ae538059e2b9475abf8f338ecce136c331e07" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941" }, { - "name": "rhacs-rhel8-operator-2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2994daf79c1290c07e27087b6c92dcfafac0202d495b5567c301bae883c4eb27" + "name": "rhacs-rhel8-operator-d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c3c744575723fda16ac465a75a22ca4730b7fb2819522581076e26c9337b14b7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:46390085637511c007d67ecbc8bc5c98c752ed8903c9ab00140074dfa817b80b" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4aca11de59a4a2562ae8a7a1bbf72cd582e09b0ba92e0f5189bb3aad0b7150a3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:213d4a607edfb44852f5209e0c9c2d55e46bd5668f0f45e754f8058dc33471d3" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9975c60b21c87c28f0b4f694e8ed1f1c066e81a5ea9b36ebc2112b51ab493da4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:db43b891621e0ff4319fc9c2ac6906151e618503d24b53f159ecc1b042ede63c" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:8abb617197083bf853fc2ff2964f49a22b0d41fe41e8ba0677cdded990779fd5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:362c7f274ea40f090fd83f145b3e628db230b87e812445718e24f3db9df49f6b" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:c3f3b643b1518e0e570f52f89829d75b6f34ed550c5dfca8ffa7e09b04e8a0f4" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:4990abd2d9b8196db54063e8f15701cd2da168e0f8c78a99ab110a7121ceee7c" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:865315508f1329523cec2e0a1ad4032385c9aa9415aeda12d79b068aa5f7380b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:7ed0b22a2b7c575ae948e3bf1122e26ccf9257680e879376b77ee0f421a0e941" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:e66b3d65d5a0908ae856ce669589fcccb6fecb138da5b307d92af6786cd6d64b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:f60afdd96a9800bd59d5b50407e75c409615db06499caadea32a7ac8a9fe159a" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.3", + "name": "rhacs-operator.v4.7.4", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b24edee77ea1320adb9c5ae3fd5ae538059e2b9475abf8f338ecce136c331e07", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8c3fd7e6809ecdbf54c4d29af25f8d9dca013fff31abefafba9908a86ef6c4d8", "properties": [ { "type": "olm.gvk", @@ -136789,7 +138590,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.3" + "version": "4.7.4" } }, { @@ -136799,8 +138600,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941", - "createdAt": "2025-05-08T19:00:40.297611+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673", + "createdAt": "2025-06-06T16:19:04.574623+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -136812,7 +138613,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.3", + "olm.skipRange": ">= 4.6.0 < 4.7.4", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -138489,63 +140290,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:027adb1b95c7d77633356daae7077fe07284a9473d4b094f6efb97b8e83ccf6d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:42ae4039eaef6f5a39482e350c55d63a7962dc99614eda6bdc732c46ae0c8e4a" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:f5490e13f95ddf76d39f277d2f5119b4ec2f8359310a4ebf0f9a455a2ee41ac0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:35aa14d17a691c530e9b5dc9c9e2329880e983a86227dbec532f0ba9c33d976d" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:96fff6d59d35e0bd824d3fce8b130836e72f802c0613db13562e0a714dd2fccf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:795b1b1c3d2208c759c3d4c28791d96898be6c7aa5fb60b818ea0a6755b20e9c" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b24edee77ea1320adb9c5ae3fd5ae538059e2b9475abf8f338ecce136c331e07" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8c3fd7e6809ecdbf54c4d29af25f8d9dca013fff31abefafba9908a86ef6c4d8" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673" }, { - "name": "rhacs-rhel8-operator-d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:d8f421e7f8118b2dc4816af08c024dd0bf00312429790c49832a9a25a4c97941" + "name": "rhacs-rhel8-operator-f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:46390085637511c007d67ecbc8bc5c98c752ed8903c9ab00140074dfa817b80b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:121fae6de5e864b38605f3d5a718451fed311793558a3ba6bb0a49d54bb59696" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:213d4a607edfb44852f5209e0c9c2d55e46bd5668f0f45e754f8058dc33471d3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:25cbb5b6df7ef6a18b5beccd5c7cd2929ab4427c52dcae270397e91dafb80001" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:db43b891621e0ff4319fc9c2ac6906151e618503d24b53f159ecc1b042ede63c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:0539210b126de11806bfc67bc2527e9b1e2dc345ce2d072b7e0cbc534c9538d5" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:362c7f274ea40f090fd83f145b3e628db230b87e812445718e24f3db9df49f6b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f4595e28496f9c6dd2ab86290f40f5100e756265c7c624fa7628bbe23ef4b1f0" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:4990abd2d9b8196db54063e8f15701cd2da168e0f8c78a99ab110a7121ceee7c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cc26e836559d682b836f54e310801a558e5d8e19c99bacea91a3002afe5de447" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:7ed0b22a2b7c575ae948e3bf1122e26ccf9257680e879376b77ee0f421a0e941" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:54f32b6ce8dfba198610fed1ee0ce4de795fa9adc8181f2f6417fbb816c109b9" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:f60afdd96a9800bd59d5b50407e75c409615db06499caadea32a7ac8a9fe159a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8cf9d001e5e7e1d3c5e0ffbe10dca959dba939cd546cf949ffc5add3164b4a6e" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.4", + "name": "rhacs-operator.v4.7.5", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8c3fd7e6809ecdbf54c4d29af25f8d9dca013fff31abefafba9908a86ef6c4d8", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:208b2b32acdcd58ff3702421c2a303fb2f237f320ec53d5428d280a677211484", "properties": [ { "type": "olm.gvk", @@ -138575,7 +140376,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.4" + "version": "4.7.5" } }, { @@ -138585,8 +140386,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673", - "createdAt": "2025-06-06T16:19:04.574623+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd", + "createdAt": "2025-07-16T05:51:00.631658+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -138598,7 +140399,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.4", + "olm.skipRange": ">= 4.6.0 < 4.7.5", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -140275,63 +142076,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:42ae4039eaef6f5a39482e350c55d63a7962dc99614eda6bdc732c46ae0c8e4a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:aee00aa3008fe0f5521581856342a41ff0338822bae55448bb66c8fff84c4dcf" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:35aa14d17a691c530e9b5dc9c9e2329880e983a86227dbec532f0ba9c33d976d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:03a543961e89c73b0869c4082ca9c6e46bb7a33ca638bc84fef1172a0421d883" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:795b1b1c3d2208c759c3d4c28791d96898be6c7aa5fb60b818ea0a6755b20e9c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b8270408d90bb14575760cd014b30c58eebfe8adc908910587b09140739b2480" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:8c3fd7e6809ecdbf54c4d29af25f8d9dca013fff31abefafba9908a86ef6c4d8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:208b2b32acdcd58ff3702421c2a303fb2f237f320ec53d5428d280a677211484" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd" }, { - "name": "rhacs-rhel8-operator-f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f5c8ffc516243b2c36a20792332dbcc2461c09c394dc87de4fb6d23267b9d673" + "name": "rhacs-rhel8-operator-103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:121fae6de5e864b38605f3d5a718451fed311793558a3ba6bb0a49d54bb59696" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:17305562b1b5156829ae7cf78ea62556e08ab00bf282ac17681f9d5aa460a4fd" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:25cbb5b6df7ef6a18b5beccd5c7cd2929ab4427c52dcae270397e91dafb80001" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:d4bd56474001025d4a02684ead4e7f42621d3e8461165eea328b9eddae2a017e" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:0539210b126de11806bfc67bc2527e9b1e2dc345ce2d072b7e0cbc534c9538d5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ec77457c7248df043e7716dd61052b6f2e06cdd2e5ad7c87f5f857bd692e958" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:f4595e28496f9c6dd2ab86290f40f5100e756265c7c624fa7628bbe23ef4b1f0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:531f365e2488e5a1c01201a213fb1ead2899acdd83deb895db05c439a1086352" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cc26e836559d682b836f54e310801a558e5d8e19c99bacea91a3002afe5de447" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b15d9d4e3a8302935aa37faca43957f72594d62c633293d847be4fc65f4ba452" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:54f32b6ce8dfba198610fed1ee0ce4de795fa9adc8181f2f6417fbb816c109b9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:2de829a284eb2eaa9dac4a7e5122bffa0c3c1bec509e1b0469c75f7ed6a28cd7" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8cf9d001e5e7e1d3c5e0ffbe10dca959dba939cd546cf949ffc5add3164b4a6e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:4caaf763c45469596ad2bc35a8d78d93997e47f4cbe4c36f8025450fffde70cd" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.5", + "name": "rhacs-operator.v4.7.6", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:208b2b32acdcd58ff3702421c2a303fb2f237f320ec53d5428d280a677211484", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3b99056ad9f5f53c75eff0e70c07cf3892c3867fe36c59138468b645f24547f2", "properties": [ { "type": "olm.gvk", @@ -140361,7 +142162,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.5" + "version": "4.7.6" } }, { @@ -140371,8 +142172,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd", - "createdAt": "2025-07-16T05:51:00.631658+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35", + "createdAt": "2025-08-14T15:43:31.913774+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -140384,7 +142185,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.5", + "olm.skipRange": ">= 4.6.0 < 4.7.6", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -142061,63 +143862,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:aee00aa3008fe0f5521581856342a41ff0338822bae55448bb66c8fff84c4dcf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a4f238aec8ed3dc15b674220420a117c6e28a88b3e9e97bdcc9e0199ac2828a5" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:03a543961e89c73b0869c4082ca9c6e46bb7a33ca638bc84fef1172a0421d883" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:bcaa5df8f5cfe1daf458e37fb7eeaa4f445f6c5bbe1ad3b109967f993e3ae979" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b8270408d90bb14575760cd014b30c58eebfe8adc908910587b09140739b2480" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6cec142052664ffbed746e1b9d035b1e3905dcfed280ff505a4096be8497fce2" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:208b2b32acdcd58ff3702421c2a303fb2f237f320ec53d5428d280a677211484" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3b99056ad9f5f53c75eff0e70c07cf3892c3867fe36c59138468b645f24547f2" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35" }, { - "name": "rhacs-rhel8-operator-103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:103e40f0c58da1c4f682815b1aada1e10147b3cc0e06ccc2e26e2c8258c06dfd" + "name": "rhacs-rhel8-operator-6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:17305562b1b5156829ae7cf78ea62556e08ab00bf282ac17681f9d5aa460a4fd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2dcb9e6d4618f6972b10cb9ef608e6286c2b9fb58d4778c484f2dab7e975b4bd" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:d4bd56474001025d4a02684ead4e7f42621d3e8461165eea328b9eddae2a017e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0f8cea7ecfb9cdb5507683319c6b4eee9480a6c54010f77849319f758044c8c6" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ec77457c7248df043e7716dd61052b6f2e06cdd2e5ad7c87f5f857bd692e958" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:12f47feb906b7282c24792d43b8a088ac82b308383015f40663c24b50f20e472" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:531f365e2488e5a1c01201a213fb1ead2899acdd83deb895db05c439a1086352" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:79e95c165fbe4ca107b5eb858d68f3bebf84f6fbb886a8658cf09be1f4776794" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b15d9d4e3a8302935aa37faca43957f72594d62c633293d847be4fc65f4ba452" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:9424f30eba9b6769a09a5e41cefa5a249363651aec7ec4548786795e88edeecd" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:2de829a284eb2eaa9dac4a7e5122bffa0c3c1bec509e1b0469c75f7ed6a28cd7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:518d4267a20a14b5aa03786cebbcc80fcb0cd364e359554cca80df2e4a977a9f" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:4caaf763c45469596ad2bc35a8d78d93997e47f4cbe4c36f8025450fffde70cd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:a9225988bb18e85d42763d229e5c952ccaa187e95b77da79eecaa7751d9b9ad9" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.6", + "name": "rhacs-operator.v4.7.7", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3b99056ad9f5f53c75eff0e70c07cf3892c3867fe36c59138468b645f24547f2", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c7f894ab773d1d389656d13ed88fbf575faddd95c5b8396c6593ab3f993f331e", "properties": [ { "type": "olm.gvk", @@ -142147,7 +143948,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.6" + "version": "4.7.7" } }, { @@ -142157,8 +143958,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35", - "createdAt": "2025-08-14T15:43:31.913774+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:5b60d8271d6fa70df3c8f7e0ecd0d64feecfdf674dc84036500fe5f145c9415a", + "createdAt": "2025-09-26T11:05:05.900682+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -142170,7 +143971,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.6", + "olm.skipRange": ">= 4.6.0 < 4.7.7", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -143807,8 +145608,8 @@ "risk" ], "labels": { - "operatorframework.io/arch.aarch64": "supported", "operatorframework.io/arch.amd64": "supported", + "operatorframework.io/arch.arm64": "supported", "operatorframework.io/arch.ppc64le": "supported", "operatorframework.io/arch.s390x": "supported" }, @@ -143847,63 +145648,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a4f238aec8ed3dc15b674220420a117c6e28a88b3e9e97bdcc9e0199ac2828a5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:bac79889d4717233e89bb6c8fae6732ed7bec5b9a55fd3b3de1f1311d870d2b1" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:bcaa5df8f5cfe1daf458e37fb7eeaa4f445f6c5bbe1ad3b109967f993e3ae979" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:def71e1ddea5b8c1e54c8582f39dc9ecca855b38aa9423690150aa6ef0ff189f" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:6cec142052664ffbed746e1b9d035b1e3905dcfed280ff505a4096be8497fce2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:0c32318ee4cbd547e2c1fd64433cd23a629d1b06523d7c0f07ddb98c2baaa708" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3b99056ad9f5f53c75eff0e70c07cf3892c3867fe36c59138468b645f24547f2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c7f894ab773d1d389656d13ed88fbf575faddd95c5b8396c6593ab3f993f331e" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35" - }, - { - "name": "rhacs-rhel8-operator-6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:6be89d8531799dcbfc97397301023dd94b9f219acc9bc451a7bc4e2b054e5b35" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:5b60d8271d6fa70df3c8f7e0ecd0d64feecfdf674dc84036500fe5f145c9415a" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:2dcb9e6d4618f6972b10cb9ef608e6286c2b9fb58d4778c484f2dab7e975b4bd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7596529cbdce7118226b79d69e0667ab35ee692569e4014b74abdf0fa7415222" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0f8cea7ecfb9cdb5507683319c6b4eee9480a6c54010f77849319f758044c8c6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:5ed9902b52830be93436d7977c10e73d346b6290532f6d7245cfe7cca9c93b31" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:12f47feb906b7282c24792d43b8a088ac82b308383015f40663c24b50f20e472" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d8fcfe1267495801d23a0b94101c7b4d06b48346a949c97946ebcbffe148f4b6" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:79e95c165fbe4ca107b5eb858d68f3bebf84f6fbb886a8658cf09be1f4776794" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:6bb454d64a9e339b1aeb81ca17b26f33db4a84f19ced4ad81858e40fd01878dc" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:9424f30eba9b6769a09a5e41cefa5a249363651aec7ec4548786795e88edeecd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:98553e6f18d3c03a29212b4f7ea1d30a42bcf8b52ca12aecbcbc47769fc35b53" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:518d4267a20a14b5aa03786cebbcc80fcb0cd364e359554cca80df2e4a977a9f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:b8882c00c9be9b579654a9ee8cd0c38537cf92d2f4bd8ebded1678aa0b6ae827" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:a9225988bb18e85d42763d229e5c952ccaa187e95b77da79eecaa7751d9b9ad9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:34ea97c6e9fc2d23427d0c6f2628075c0eaa0e151ca1c381539b039c249217f7" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.7", + "name": "rhacs-operator.v4.7.8", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c7f894ab773d1d389656d13ed88fbf575faddd95c5b8396c6593ab3f993f331e", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3659fb7acda8c7a7dc86795a942be7be0c339dd83c8763010cb89dcb09458222", "properties": [ { "type": "olm.gvk", @@ -143933,7 +145730,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.7" + "version": "4.7.8" } }, { @@ -143943,8 +145740,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:5b60d8271d6fa70df3c8f7e0ecd0d64feecfdf674dc84036500fe5f145c9415a", - "createdAt": "2025-09-26T11:05:05.900682+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c2dfa4021f46493a6a574477ba45ed2456190da346580a9c77344ab03f9489a9", + "createdAt": "2025-11-04T08:59:51.765679+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -143956,7 +145753,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.7", + "olm.skipRange": ">= 4.6.0 < 4.7.8", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -145633,59 +147430,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:bac79889d4717233e89bb6c8fae6732ed7bec5b9a55fd3b3de1f1311d870d2b1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9368d496499602fb58f7f568c62f07cf912039da1970af8745ec26481a2ae896" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:def71e1ddea5b8c1e54c8582f39dc9ecca855b38aa9423690150aa6ef0ff189f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:b1178b8bff2c7618b54b6b72252135f43c173a1898f5761546e80483102ba6c7" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:0c32318ee4cbd547e2c1fd64433cd23a629d1b06523d7c0f07ddb98c2baaa708" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b7810ec9983ad7210c0b9eb50bc58b963461eb6729fdb1cc93ebd4240070e923" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:c7f894ab773d1d389656d13ed88fbf575faddd95c5b8396c6593ab3f993f331e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3659fb7acda8c7a7dc86795a942be7be0c339dd83c8763010cb89dcb09458222" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:5b60d8271d6fa70df3c8f7e0ecd0d64feecfdf674dc84036500fe5f145c9415a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c2dfa4021f46493a6a574477ba45ed2456190da346580a9c77344ab03f9489a9" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7596529cbdce7118226b79d69e0667ab35ee692569e4014b74abdf0fa7415222" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:733479ac6b67fb646f9d90000c973da09c0405cc5b7230d198a7e3983d631bd5" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:5ed9902b52830be93436d7977c10e73d346b6290532f6d7245cfe7cca9c93b31" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:8a2c2d5f3686fd4b1edf4ecda8df9c82a8d59605cd9c90621dee7c37a198fc10" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d8fcfe1267495801d23a0b94101c7b4d06b48346a949c97946ebcbffe148f4b6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:966e5512d9978ef4a78120cccc47b05bf4e819c13102b6ce1c4b389b168c9cf2" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:6bb454d64a9e339b1aeb81ca17b26f33db4a84f19ced4ad81858e40fd01878dc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:08d7b57ad2b922167e9810add39d848541f90d91ccf6ba527221edcfaafd9e7f" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:98553e6f18d3c03a29212b4f7ea1d30a42bcf8b52ca12aecbcbc47769fc35b53" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d6408450daa21cb6cc49c515a107ea6b26d18dccf642988d11f31faf4467fc65" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:b8882c00c9be9b579654a9ee8cd0c38537cf92d2f4bd8ebded1678aa0b6ae827" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:7b88b22cb7271fa00ad101a843e37d1fdf208def2d3121364d7d88b7d676a2a6" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:34ea97c6e9fc2d23427d0c6f2628075c0eaa0e151ca1c381539b039c249217f7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:b2096df34750e8d6fd25e202b98059b3a01d0e84bf5f319e550fa7d55512b84d" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.8", + "name": "rhacs-operator.v4.7.9", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3659fb7acda8c7a7dc86795a942be7be0c339dd83c8763010cb89dcb09458222", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e7106f927313f2e0a08c85cf1ecfd1338d222f02dcac6c40846858a7e0c9c32b", "properties": [ { "type": "olm.gvk", @@ -145715,7 +147512,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.8" + "version": "4.7.9" } }, { @@ -145725,8 +147522,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c2dfa4021f46493a6a574477ba45ed2456190da346580a9c77344ab03f9489a9", - "createdAt": "2025-11-04T08:59:51.765679+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:414b03b9830f755e459127f3f926e275b5049eba0f199dd9e4975974800979e8", + "createdAt": "2025-12-15T14:49:31.922833+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -145738,7 +147535,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.8", + "olm.skipRange": ">= 4.6.0 < 4.7.9", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -147415,59 +149212,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:9368d496499602fb58f7f568c62f07cf912039da1970af8745ec26481a2ae896" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ee14e7361bf64117af506a99906b3ae43a2b34c78f6e80a924a4419b047beadd" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:b1178b8bff2c7618b54b6b72252135f43c173a1898f5761546e80483102ba6c7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:6981a243b8e6f095cbcabae3056012e9c60914ac42cd795c4163f4fce64a6aef" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b7810ec9983ad7210c0b9eb50bc58b963461eb6729fdb1cc93ebd4240070e923" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d45d0e810330d7c95c2e4dc2f1bc5c5613f06ec09b4061f2874c8837c73379b9" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:3659fb7acda8c7a7dc86795a942be7be0c339dd83c8763010cb89dcb09458222" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e7106f927313f2e0a08c85cf1ecfd1338d222f02dcac6c40846858a7e0c9c32b" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:c2dfa4021f46493a6a574477ba45ed2456190da346580a9c77344ab03f9489a9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:414b03b9830f755e459127f3f926e275b5049eba0f199dd9e4975974800979e8" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:733479ac6b67fb646f9d90000c973da09c0405cc5b7230d198a7e3983d631bd5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b3b498320cfcbf06da095f2427814d7f157ccec870383085be733ad7b6e6ccba" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:8a2c2d5f3686fd4b1edf4ecda8df9c82a8d59605cd9c90621dee7c37a198fc10" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4e48a0441240e9531e1490079e19edd65526b726b87bc5613b3cc62e3f59c1be" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:966e5512d9978ef4a78120cccc47b05bf4e819c13102b6ce1c4b389b168c9cf2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:b55eae54dd5bc1bc58e9d52722a5830f8ee73bd59cdd0190147df8145f5ccedf" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:08d7b57ad2b922167e9810add39d848541f90d91ccf6ba527221edcfaafd9e7f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:7e1371e5e0b53983ca615309f44f6e4c124874ca1ae8a0fd4a59a470eb6a15df" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d6408450daa21cb6cc49c515a107ea6b26d18dccf642988d11f31faf4467fc65" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b6f7cc10247ab111a4aea231858b4f6fd17bfd4e4b4e4bd62873567ab875fb2e" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:7b88b22cb7271fa00ad101a843e37d1fdf208def2d3121364d7d88b7d676a2a6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:19b84b221ab9ce59fd0c8fbb4a713ee66304fd92822cebbcde0d77496ca82b0a" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:b2096df34750e8d6fd25e202b98059b3a01d0e84bf5f319e550fa7d55512b84d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8b24cb309fb5dad63d92605093b7e1cb659d9c0c1f31f6d5a223746f25dc5e23" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.7.9", + "name": "rhacs-operator.v4.8.0", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e7106f927313f2e0a08c85cf1ecfd1338d222f02dcac6c40846858a7e0c9c32b", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:59c16145f8691120ba7af1448ca7a3bd8c4e5a0cb912bcf7a6a10779dc2919be", "properties": [ { "type": "olm.gvk", @@ -147497,7 +149294,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.7.9" + "version": "4.8.0" } }, { @@ -147507,8 +149304,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:414b03b9830f755e459127f3f926e275b5049eba0f199dd9e4975974800979e8", - "createdAt": "2025-12-15T14:49:31.922833+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883", + "createdAt": "2025-07-02T17:07:47.878287+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -147520,7 +149317,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.6.0 < 4.7.9", + "olm.skipRange": ">= 4.7.0 < 4.8.0", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -147968,12 +149765,53 @@ }, { "path": "central.exposure.route.enabled", - "displayName": "Enabled" + "displayName": "Enabled", + "description": "Expose Central with a passthrough route." }, { "path": "central.exposure.route.host", "displayName": "Host", - "description": "Specify a custom hostname for the central route.\nIf unspecified, an appropriate default value will be automatically chosen by OpenShift route operator." + "description": "Specify a custom hostname for the Central route.\nIf unspecified, an appropriate default value will be automatically chosen by the OpenShift route operator." + }, + { + "path": "central.exposure.route.reencrypt", + "displayName": "Re-Encrypt Route", + "description": "Set up a Central route with reencrypt TLS termination.\nFor reencrypt routes, the request is terminated on the OpenShift router with a custom certificate.\nThe request is then reencrypted by the OpenShift router and sent to Central.\n[user] --TLS--> [OpenShift router] --TLS--> [Central]" + }, + { + "path": "central.exposure.route.reencrypt.enabled", + "displayName": "Enabled", + "description": "Expose Central with a reencrypt route.\nShould not be used for sensor communication." + }, + { + "path": "central.exposure.route.reencrypt.host", + "displayName": "Host", + "description": "Specify a custom hostname for the Central reencrypt route.\nIf unspecified, an appropriate default value will be automatically chosen by the OpenShift route operator." + }, + { + "path": "central.exposure.route.reencrypt.tls", + "displayName": "TLS Settings", + "description": "TLS settings for exposing Central via a reencrypt Route." + }, + { + "path": "central.exposure.route.reencrypt.tls.caCertificate", + "displayName": "CA Certificate", + "description": "The PEM encoded certificate chain that may be used to establish a complete chain of trust.\nDefaults to the OpenShift certificate authority." + }, + { + "path": "central.exposure.route.reencrypt.tls.certificate", + "displayName": "Certificate", + "description": "The PEM encoded certificate that is served on the route. Must be a single serving\ncertificate instead of a certificate chain.\nDefaults to a certificate signed by the OpenShift certificate authority." + }, + { + "path": "central.exposure.route.reencrypt.tls.destinationCACertificate", + "displayName": "Destination CA Certificate", + "description": "The CA certificate of the final destination, i.e. of Central.\nUsed by the OpenShift router for health checks on the secure connection.\nDefaults to the Central certificate authority." + }, + { + "path": "central.exposure.route.reencrypt.tls.key", + "displayName": "Private Key", + "description": "The PEM encoded private key of the certificate that is served on the route.\nDefaults to a certificate signed by the OpenShift certificate authority." }, { "path": "central.monitoring.exposeEndpoint", @@ -148135,6 +149973,11 @@ "displayName": "Value", "description": "Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema." }, + { + "path": "overlays[0].patches[0].verbatim", + "displayName": "Verbatim", + "description": "Verbatim value to add, delete or replace.\nSame as Value, however the content is not interpreted as YAML, but treated as literal string instead.\nAt least one of Value and Verbatim must be empty." + }, { "path": "scanner.scannerComponent", "displayName": "Scanner Component", @@ -148250,7 +150093,7 @@ { "path": "scannerV4.scannerComponent", "displayName": "Scanner V4 component", - "description": "If you want to deploy Scanner V4 components set this to \"Enabled\"" + "description": "Can be specified as \"Enabled\" or \"Disabled\".\nIf this field is not specified, the following defaulting takes place:\n* for new installations, Scanner V4 is enabled starting with ACS 4.8;\n* for upgrades to 4.8 from previous releases, Scanner V4 is disabled." }, { "path": "scannerV4.indexer", @@ -148748,6 +150591,11 @@ "displayName": "Value", "description": "Value to add, delete or replace.\nFor add, the path should be a new leaf.\nFor delete, value should be unset.\nFor replace, path should reference an existing node.\nAll values are strings but are converted into appropriate type based on schema." }, + { + "path": "overlays[0].patches[0].verbatim", + "displayName": "Verbatim", + "description": "Verbatim value to add, delete or replace.\nSame as Value, however the content is not interpreted as YAML, but treated as literal string instead.\nAt least one of Value and Verbatim must be empty." + }, { "path": "perNode.collector", "displayName": "Collector Settings", @@ -148921,7 +150769,7 @@ { "path": "scannerV4.scannerComponent", "displayName": "Scanner V4 component", - "description": "If you want to enable the Scanner V4 component set this to \"AutoSense\"" + "description": "If you want to enable the Scanner V4 component set this to \"AutoSense\"\nIf this field is not specified or set to \"Default\", the following defaulting takes place:\n* for new installations, Scanner V4 is enabled starting with ACS 4.8;\n* for upgrades to 4.8 from previous releases, Scanner V4 is disabled." }, { "path": "scannerV4.indexer", @@ -149157,8 +151005,8 @@ "risk" ], "labels": { + "operatorframework.io/arch.aarch64": "supported", "operatorframework.io/arch.amd64": "supported", - "operatorframework.io/arch.arm64": "supported", "operatorframework.io/arch.ppc64le": "supported", "operatorframework.io/arch.s390x": "supported" }, @@ -149197,59 +151045,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:ee14e7361bf64117af506a99906b3ae43a2b34c78f6e80a924a4419b047beadd" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:e5e5a08ebf7c4bb50a6513b6d2fe0806000916b2e92f9ac60ebf0b65255e680a" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:6981a243b8e6f095cbcabae3056012e9c60914ac42cd795c4163f4fce64a6aef" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:997f95b8a0c1885486d8869a994abac9d33a449e7600dd6a81f60e1ce4ce6208" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d45d0e810330d7c95c2e4dc2f1bc5c5613f06ec09b4061f2874c8837c73379b9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:16b6aea233f9034c51ec728ea475770d1cdbbed4c78d4b8a6baf1f6d11830850" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:e7106f927313f2e0a08c85cf1ecfd1338d222f02dcac6c40846858a7e0c9c32b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:59c16145f8691120ba7af1448ca7a3bd8c4e5a0cb912bcf7a6a10779dc2919be" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:414b03b9830f755e459127f3f926e275b5049eba0f199dd9e4975974800979e8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883" + }, + { + "name": "rhacs-rhel8-operator-f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b3b498320cfcbf06da095f2427814d7f157ccec870383085be733ad7b6e6ccba" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:eea5bfbce9c59a90dddcfb528da56ce6dcc6becbd96a0c29daba24a5d21f5203" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4e48a0441240e9531e1490079e19edd65526b726b87bc5613b3cc62e3f59c1be" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6744594f5fe261eb6ddc8d5853c50c7b2e1d3aa5c4cf36bb9ce90038bcdcf062" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:b55eae54dd5bc1bc58e9d52722a5830f8ee73bd59cdd0190147df8145f5ccedf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6883bb369a8db523b818c03022964d2b52b310c3e85683a0ad9ed89fbaa951cc" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:7e1371e5e0b53983ca615309f44f6e4c124874ca1ae8a0fd4a59a470eb6a15df" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:18c03dfedbd5d8b7148e120c884bd8bda3331ccacb012da5fe42899af28a3ead" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b6f7cc10247ab111a4aea231858b4f6fd17bfd4e4b4e4bd62873567ab875fb2e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:6f6a4b148c7b761c79535c74f0c63f3b7309366ab5c52e35f1f3b5198d713df5" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:19b84b221ab9ce59fd0c8fbb4a713ee66304fd92822cebbcde0d77496ca82b0a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5ea5a1f4958d4d51994af5b460734e775274bafe64c4cfa4608a0f9d51430013" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8b24cb309fb5dad63d92605093b7e1cb659d9c0c1f31f6d5a223746f25dc5e23" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:892621bbf43cb375bb88fe5273d39132218de1e6182aa9e7ebda2c3ff9f22347" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.0", + "name": "rhacs-operator.v4.8.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:59c16145f8691120ba7af1448ca7a3bd8c4e5a0cb912bcf7a6a10779dc2919be", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:272e3d6e2f7f207b3d3866d8be00715e6a6086d50b110c45662d99d217d48dbc", "properties": [ { "type": "olm.gvk", @@ -149279,7 +151131,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.0" + "version": "4.8.1" } }, { @@ -149289,8 +151141,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883", - "createdAt": "2025-07-02T17:07:47.878287+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8", + "createdAt": "2025-07-21T14:57:08.578993+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -149302,7 +151154,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.0", + "olm.skipRange": ">= 4.7.0 < 4.8.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -151030,63 +152882,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:e5e5a08ebf7c4bb50a6513b6d2fe0806000916b2e92f9ac60ebf0b65255e680a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:7aec522e832e03e32ccc955c7b42056921d892a97c6f50223b87c1cbac4d8de0" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:997f95b8a0c1885486d8869a994abac9d33a449e7600dd6a81f60e1ce4ce6208" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:459a0cedd62db1c959078141accac6e9dfb995f4c618c65c83350f2dc3f8f867" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:16b6aea233f9034c51ec728ea475770d1cdbbed4c78d4b8a6baf1f6d11830850" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b8b33abc5143ab77d7d39057b7aa7188a59de3e9f2679f48d94968174be0e689" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:59c16145f8691120ba7af1448ca7a3bd8c4e5a0cb912bcf7a6a10779dc2919be" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:272e3d6e2f7f207b3d3866d8be00715e6a6086d50b110c45662d99d217d48dbc" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8" }, { - "name": "rhacs-rhel8-operator-f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:f4fba1e46163f77bff90476cbe0f4492e3824b35550d57829c0397f364bbb883" + "name": "rhacs-rhel8-operator-2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:eea5bfbce9c59a90dddcfb528da56ce6dcc6becbd96a0c29daba24a5d21f5203" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b763a3bdda558e7ccbe4454b3a9a6c94052c3547edfc1f27d79cbf5ce101ba3b" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:6744594f5fe261eb6ddc8d5853c50c7b2e1d3aa5c4cf36bb9ce90038bcdcf062" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f7ec55c47529483b50948913e9883eddefe938fe6f0164474b8169253212eb71" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:6883bb369a8db523b818c03022964d2b52b310c3e85683a0ad9ed89fbaa951cc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fcdb52e977ae21ee356bfd8510ca197b1b9d93b19d27e8707a35e705af271f69" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:18c03dfedbd5d8b7148e120c884bd8bda3331ccacb012da5fe42899af28a3ead" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a5464178fbe538c2f5bbabc9a0ae1b057be397e5753f2ea50d741c13e2b3120e" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:6f6a4b148c7b761c79535c74f0c63f3b7309366ab5c52e35f1f3b5198d713df5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b4a9e3b2153d729e4c8f6f8c0a909a84b1387f73bd6fb775d38d7629fdadc803" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5ea5a1f4958d4d51994af5b460734e775274bafe64c4cfa4608a0f9d51430013" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:33b2b40bae65f675c50dce5b1e4653512272e6c624be5e1c93e5ce21e7f35ad8" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:892621bbf43cb375bb88fe5273d39132218de1e6182aa9e7ebda2c3ff9f22347" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:d501b263da5273be7c722df04199d0f7e51df1b41877f72f66d78302f226964f" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.1", + "name": "rhacs-operator.v4.8.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:272e3d6e2f7f207b3d3866d8be00715e6a6086d50b110c45662d99d217d48dbc", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:68633e6b12768689f352e1318dc0acc388522d8b6295bf6ca662834cf1367b85", "properties": [ { "type": "olm.gvk", @@ -151116,7 +152968,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.1" + "version": "4.8.2" } }, { @@ -151126,8 +152978,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8", - "createdAt": "2025-07-21T14:57:08.578993+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142", + "createdAt": "2025-08-14T13:00:56.914011+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -151139,7 +152991,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.1", + "olm.skipRange": ">= 4.7.0 < 4.8.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -152867,63 +154719,63 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:7aec522e832e03e32ccc955c7b42056921d892a97c6f50223b87c1cbac4d8de0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:2b6da0f5120b46fa0a4ed21af3bab6eba294f107f49facb86d336597b8878396" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:459a0cedd62db1c959078141accac6e9dfb995f4c618c65c83350f2dc3f8f867" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:14cae786f2e5f5643a2de28017869a5dfb030909d0a2de2ff5b923ca30acb70b" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:b8b33abc5143ab77d7d39057b7aa7188a59de3e9f2679f48d94968174be0e689" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3750cdad4d5e705fa6f0be3c3aeb45e8ac63cf744c3620d6ac4817ceba191804" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:272e3d6e2f7f207b3d3866d8be00715e6a6086d50b110c45662d99d217d48dbc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:68633e6b12768689f352e1318dc0acc388522d8b6295bf6ca662834cf1367b85" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142" }, { - "name": "rhacs-rhel8-operator-2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:2ea8d7fd47d8772440201631a99324745cf588bcf8e134781a718feed951beb8" + "name": "rhacs-rhel8-operator-b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142-annotation", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b763a3bdda558e7ccbe4454b3a9a6c94052c3547edfc1f27d79cbf5ce101ba3b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:420d3d867bfaea81ac825c8019dda153a80b9307a257881e7dd40242b64fe720" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f7ec55c47529483b50948913e9883eddefe938fe6f0164474b8169253212eb71" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:812c8f4a6dcffd4ea35a10e5c1feca009cc74559e36c4cb97d5734c07c1f21cb" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fcdb52e977ae21ee356bfd8510ca197b1b9d93b19d27e8707a35e705af271f69" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:c410fd5ae11a2ffafeaeac8fd993ec87a9448bdb1a0b35ff826b271524e6c0d1" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a5464178fbe538c2f5bbabc9a0ae1b057be397e5753f2ea50d741c13e2b3120e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:72d383181e7b4f17be5785685d355155286712f8ef072a17791901d3b57c0b7d" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:b4a9e3b2153d729e4c8f6f8c0a909a84b1387f73bd6fb775d38d7629fdadc803" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:142b6c0f0200dc4cf43d0d49c8c6d8082078c240bf4f3e3d9fc73f56c080c34d" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:33b2b40bae65f675c50dce5b1e4653512272e6c624be5e1c93e5ce21e7f35ad8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:c356d755fc18562a157b01fcb64deebf948f25eb04f122bc53738b010dcd094a" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:d501b263da5273be7c722df04199d0f7e51df1b41877f72f66d78302f226964f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:3066cfcb737b690b134261d6e363eb3c887a9255ebab9cc03c0bae473df932fe" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.2", + "name": "rhacs-operator.v4.8.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:68633e6b12768689f352e1318dc0acc388522d8b6295bf6ca662834cf1367b85", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:44823edf63a673d6df937271c2b504782752e832d31517076593e1706a6cf434", "properties": [ { "type": "olm.gvk", @@ -152953,7 +154805,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.2" + "version": "4.8.3" } }, { @@ -152963,8 +154815,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142", - "createdAt": "2025-08-14T13:00:56.914011+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:420396344a3320abe6614eac4ce08b7522545b923873427096bf2caa6cf12620", + "createdAt": "2025-09-05T12:10:56.175887+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -152976,7 +154828,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.2", + "olm.skipRange": ">= 4.7.0 < 4.8.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -154664,8 +156516,8 @@ "risk" ], "labels": { - "operatorframework.io/arch.aarch64": "supported", "operatorframework.io/arch.amd64": "supported", + "operatorframework.io/arch.arm64": "supported", "operatorframework.io/arch.ppc64le": "supported", "operatorframework.io/arch.s390x": "supported" }, @@ -154704,63 +156556,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:2b6da0f5120b46fa0a4ed21af3bab6eba294f107f49facb86d336597b8878396" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2cd8d1b282b452e0ce1656e07e8762ef837937448d30678421ea755395e3b5b" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:14cae786f2e5f5643a2de28017869a5dfb030909d0a2de2ff5b923ca30acb70b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0c92d5b5508032d77559606927e45686179eaafc59e16d5496e088f2f212d258" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:3750cdad4d5e705fa6f0be3c3aeb45e8ac63cf744c3620d6ac4817ceba191804" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:5dc4149dbe9ba035ce23eb4c2441a4df53d9ebda74aee94734b71cd03956ba00" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:68633e6b12768689f352e1318dc0acc388522d8b6295bf6ca662834cf1367b85" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:44823edf63a673d6df937271c2b504782752e832d31517076593e1706a6cf434" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142" - }, - { - "name": "rhacs-rhel8-operator-b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142-annotation", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:b3ce0da59afacc3ccae7ac6a5e51b52fcf41e87bbd50d194a9fc1a3ab9acf142" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:420396344a3320abe6614eac4ce08b7522545b923873427096bf2caa6cf12620" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:420d3d867bfaea81ac825c8019dda153a80b9307a257881e7dd40242b64fe720" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f26a07badc7ab56a87b33520c908d96e1af149af334103d2affda0a2ff0c837" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:812c8f4a6dcffd4ea35a10e5c1feca009cc74559e36c4cb97d5734c07c1f21cb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:97df59280c12727a99fdec0c9bf56eb874e6a1cacd12d849709797d4be635ce9" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:c410fd5ae11a2ffafeaeac8fd993ec87a9448bdb1a0b35ff826b271524e6c0d1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:92ff7691963e620dc5bf6da0a7694e6bcd68c2545afc1642a59a443ba2ab5611" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:72d383181e7b4f17be5785685d355155286712f8ef072a17791901d3b57c0b7d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e949830f3034c41aa5434a3654b2b1ccba7dac0373bf43d7c50a9ea43bb686fb" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:142b6c0f0200dc4cf43d0d49c8c6d8082078c240bf4f3e3d9fc73f56c080c34d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:db691065e46f604b980b0b202f6c2e14c8b204094d784c4a15db1e4fecb2965e" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:c356d755fc18562a157b01fcb64deebf948f25eb04f122bc53738b010dcd094a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:1cfb774f89e3c047e287fddbc1a22b4b6daed4fba068c6d29dad360b305cfef8" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:3066cfcb737b690b134261d6e363eb3c887a9255ebab9cc03c0bae473df932fe" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:e1cc194c09c96fcef62296755ed8cbc87d5b063370b21474970a67c27146e1f3" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.3", + "name": "rhacs-operator.v4.8.4", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:44823edf63a673d6df937271c2b504782752e832d31517076593e1706a6cf434", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0c0a839b097ccbf758b084b85f8f9285a7e621fd44e8a62752be7b6bcae86669", "properties": [ { "type": "olm.gvk", @@ -154790,7 +156638,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.3" + "version": "4.8.4" } }, { @@ -154800,8 +156648,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:420396344a3320abe6614eac4ce08b7522545b923873427096bf2caa6cf12620", - "createdAt": "2025-09-05T12:10:56.175887+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fe56f7733778f2ba9072ee35df562e82283eaeaa7bed26333d2fb916ecb76929", + "createdAt": "2025-09-12T11:06:11.361461+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -154813,7 +156661,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.3", + "olm.skipRange": ">= 4.7.0 < 4.8.4", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -156541,7 +158389,7 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:a2cd8d1b282b452e0ce1656e07e8762ef837937448d30678421ea755395e3b5b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:e5c200f28187c1f6971562e41cae969183ee15f3d0feb076bb202b22ff67cbcb" }, { "name": "collector", @@ -156549,19 +158397,19 @@ }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:5dc4149dbe9ba035ce23eb4c2441a4df53d9ebda74aee94734b71cd03956ba00" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:adf47cb6615d344533fcca0aee41774f5e8df9b952b9b89a57c2be2b7e0fc03c" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:44823edf63a673d6df937271c2b504782752e832d31517076593e1706a6cf434" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0c0a839b097ccbf758b084b85f8f9285a7e621fd44e8a62752be7b6bcae86669" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:420396344a3320abe6614eac4ce08b7522545b923873427096bf2caa6cf12620" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fe56f7733778f2ba9072ee35df562e82283eaeaa7bed26333d2fb916ecb76929" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f26a07badc7ab56a87b33520c908d96e1af149af334103d2affda0a2ff0c837" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:16912df2c26e5fc2e6051c0501170722856db274415063608de716cf53851038" }, { "name": "scanner_db", @@ -156581,19 +158429,19 @@ }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:1cfb774f89e3c047e287fddbc1a22b4b6daed4fba068c6d29dad360b305cfef8" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:b8964b1441251607b23f92918e9158724174013dc4af423988f56d6098dfb2d5" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:e1cc194c09c96fcef62296755ed8cbc87d5b063370b21474970a67c27146e1f3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:d1758b76c32f03b5a1a44951d18fb2bb0c4fd0a99d24f8c42fe9e6b059574889" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.4", + "name": "rhacs-operator.v4.8.5", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0c0a839b097ccbf758b084b85f8f9285a7e621fd44e8a62752be7b6bcae86669", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:323f62203914d00b29a6f8c1a1230bbbf19ab14c8c4c70bf0474dd87c493d4f2", "properties": [ { "type": "olm.gvk", @@ -156623,7 +158471,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.4" + "version": "4.8.5" } }, { @@ -156633,8 +158481,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fe56f7733778f2ba9072ee35df562e82283eaeaa7bed26333d2fb916ecb76929", - "createdAt": "2025-09-12T11:06:11.361461+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:965ce96e73301dd6378633ea90eb3db395805877349798b9e96cd75910f5c79f", + "createdAt": "2025-10-29T22:41:05.897776+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -156646,7 +158494,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.4", + "olm.skipRange": ">= 4.7.0 < 4.8.5", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -158374,59 +160222,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:e5c200f28187c1f6971562e41cae969183ee15f3d0feb076bb202b22ff67cbcb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:40d07a431ee71e3398a2a4a7726949c7520cfb78e4fb479ee07c571a328818ae" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:0c92d5b5508032d77559606927e45686179eaafc59e16d5496e088f2f212d258" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e9fadd17404247cb17eb0cd1e7038031e4c68ac073143f5ef1cb3f3405f32f91" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:adf47cb6615d344533fcca0aee41774f5e8df9b952b9b89a57c2be2b7e0fc03c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:c5774f92900ec1e3b936712599caac36c47c1b1be3489184c80f40a8389ac149" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:0c0a839b097ccbf758b084b85f8f9285a7e621fd44e8a62752be7b6bcae86669" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:323f62203914d00b29a6f8c1a1230bbbf19ab14c8c4c70bf0474dd87c493d4f2" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:fe56f7733778f2ba9072ee35df562e82283eaeaa7bed26333d2fb916ecb76929" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:965ce96e73301dd6378633ea90eb3db395805877349798b9e96cd75910f5c79f" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:16912df2c26e5fc2e6051c0501170722856db274415063608de716cf53851038" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:eab5e1ec257c035808398aa72d7b861253fb609641a42628cc7cbd0bf9a90c43" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:97df59280c12727a99fdec0c9bf56eb874e6a1cacd12d849709797d4be635ce9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:841a80eea56ff2c4486af65eb8831c060f1459a03e1b0fbc8b8c3e18f53593f0" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:92ff7691963e620dc5bf6da0a7694e6bcd68c2545afc1642a59a443ba2ab5611" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:682231b3956c58a3553d486182a5a84c0a0cdf6ae22fe6702c93352c64841b90" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e949830f3034c41aa5434a3654b2b1ccba7dac0373bf43d7c50a9ea43bb686fb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:23241c29e2371dc0f0a8ed695d452ae5d40d525a031ed94c9d6a1ee4f4dfd682" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:db691065e46f604b980b0b202f6c2e14c8b204094d784c4a15db1e4fecb2965e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d5e775102f7abf3585ba48b406ea06876cffa7bf32f2aacd2ae05440334a7c0b" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:b8964b1441251607b23f92918e9158724174013dc4af423988f56d6098dfb2d5" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:b4d50131685eb51d960e27b07c3120e0f9787ef2d304caa9b1035bfc95b2b1c2" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:d1758b76c32f03b5a1a44951d18fb2bb0c4fd0a99d24f8c42fe9e6b059574889" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:cbb370c3e5b4cb6022f38d30b39dd74c499891c03737474c772efab5ed77b8cb" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.5", + "name": "rhacs-operator.v4.8.6", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:323f62203914d00b29a6f8c1a1230bbbf19ab14c8c4c70bf0474dd87c493d4f2", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:57a4b1a83e9fde88b7036214af7755f7596af46b1d80c2a3487a52fcb0e58451", "properties": [ { "type": "olm.gvk", @@ -158456,7 +160304,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.5" + "version": "4.8.6" } }, { @@ -158466,8 +160314,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:965ce96e73301dd6378633ea90eb3db395805877349798b9e96cd75910f5c79f", - "createdAt": "2025-10-29T22:41:05.897776+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e89f9e87b5e9b7e21dff28db007350c25ec6fbd2fcafbdbd72cfc10c61ae0dde", + "createdAt": "2025-11-24T20:36:10.771786+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -158479,7 +160327,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.5", + "olm.skipRange": ">= 4.7.0 < 4.8.6", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -160207,59 +162055,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:40d07a431ee71e3398a2a4a7726949c7520cfb78e4fb479ee07c571a328818ae" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:80001002b1fe75a237e2afc472c81d9cd733d4fe65a3485078a22b4dfd4112e1" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:e9fadd17404247cb17eb0cd1e7038031e4c68ac073143f5ef1cb3f3405f32f91" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:1b51ec285e4f0d78c637c800ea17b05866a371a93455fc605d1f2ebc04ebf17d" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:c5774f92900ec1e3b936712599caac36c47c1b1be3489184c80f40a8389ac149" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:714364f82db2d6ba931261a78d520aae6450ea29fbc479341205e65a5f9f5e58" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:323f62203914d00b29a6f8c1a1230bbbf19ab14c8c4c70bf0474dd87c493d4f2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:57a4b1a83e9fde88b7036214af7755f7596af46b1d80c2a3487a52fcb0e58451" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:965ce96e73301dd6378633ea90eb3db395805877349798b9e96cd75910f5c79f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e89f9e87b5e9b7e21dff28db007350c25ec6fbd2fcafbdbd72cfc10c61ae0dde" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:eab5e1ec257c035808398aa72d7b861253fb609641a42628cc7cbd0bf9a90c43" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d6d5e50d1deda1e7b232d4e3f60fda6f3d27266b6fc007c8ec48a324e1c6c15c" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:841a80eea56ff2c4486af65eb8831c060f1459a03e1b0fbc8b8c3e18f53593f0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0430256b0490f1c4da11a869608abf9bc03150ab6cb03b5978924abf53ffb778" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:682231b3956c58a3553d486182a5a84c0a0cdf6ae22fe6702c93352c64841b90" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:481e8b0d6ddfe7d624e50a7726bb52ea76bf42bd728955e2c07e811026fb3ccc" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:23241c29e2371dc0f0a8ed695d452ae5d40d525a031ed94c9d6a1ee4f4dfd682" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9b3cc365dc8737d2b5b11d9a6dc604351b57bf18f283fe029810a849ff6cb31a" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d5e775102f7abf3585ba48b406ea06876cffa7bf32f2aacd2ae05440334a7c0b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:50f9392684483cd969464ee560f61f3739ae45cb0f644bc08681e19edce8fc27" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:b4d50131685eb51d960e27b07c3120e0f9787ef2d304caa9b1035bfc95b2b1c2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:a4b4f08b25f1c8d84392956a49ed473a8c4d8133cea9e9db4bdba23a8fc0713b" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:cbb370c3e5b4cb6022f38d30b39dd74c499891c03737474c772efab5ed77b8cb" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:721b12b0c750f54b6b94e9b24a1e1e7dff7d65f6673d2b4d802576859b38dbe9" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.6", + "name": "rhacs-operator.v4.8.7", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:57a4b1a83e9fde88b7036214af7755f7596af46b1d80c2a3487a52fcb0e58451", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:24481e3ee1dab49893e7f5891e97e3287ec6f35105b6e927ce0acc7da24a6982", "properties": [ { "type": "olm.gvk", @@ -160289,7 +162137,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.6" + "version": "4.8.7" } }, { @@ -160299,8 +162147,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e89f9e87b5e9b7e21dff28db007350c25ec6fbd2fcafbdbd72cfc10c61ae0dde", - "createdAt": "2025-11-24T20:36:10.771786+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7429ff838a2899577091ba14fbdc812e85b5d1e9c4394e45ead07725c70c79aa", + "createdAt": "2025-12-17T14:22:57.176442+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -160312,7 +162160,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.6", + "olm.skipRange": ">= 4.7.0 < 4.8.7", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -162040,59 +163888,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:80001002b1fe75a237e2afc472c81d9cd733d4fe65a3485078a22b4dfd4112e1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:82dc5edf423b3f9c377c9d2c80d1d19eaf15684872dc41d4baa9efddf082f350" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:1b51ec285e4f0d78c637c800ea17b05866a371a93455fc605d1f2ebc04ebf17d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:440e0ac120a2a7e8dfcad6b53bb120667e293492d9bbcbe9d1ca0a6ed7b2dd62" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:714364f82db2d6ba931261a78d520aae6450ea29fbc479341205e65a5f9f5e58" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:a58c6e952333169b21ffefdbd1acd3fff9c8d8dfac28795ee290756ca4394f5a" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:57a4b1a83e9fde88b7036214af7755f7596af46b1d80c2a3487a52fcb0e58451" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:24481e3ee1dab49893e7f5891e97e3287ec6f35105b6e927ce0acc7da24a6982" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:e89f9e87b5e9b7e21dff28db007350c25ec6fbd2fcafbdbd72cfc10c61ae0dde" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7429ff838a2899577091ba14fbdc812e85b5d1e9c4394e45ead07725c70c79aa" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d6d5e50d1deda1e7b232d4e3f60fda6f3d27266b6fc007c8ec48a324e1c6c15c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:23150ab7d7d79cf1f5bc70f4f8e32da76ff06af123c395fb46b0be9e6ded7e1f" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0430256b0490f1c4da11a869608abf9bc03150ab6cb03b5978924abf53ffb778" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:fc03a63aada7586517d68c279fe59415b1fc0b3756ee87c5110f19c90712e903" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:481e8b0d6ddfe7d624e50a7726bb52ea76bf42bd728955e2c07e811026fb3ccc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:142732544a7553f4eb203b314b3bdc76e5102d7ef3080f1fe36e8ddadffb9ca9" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9b3cc365dc8737d2b5b11d9a6dc604351b57bf18f283fe029810a849ff6cb31a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:fe1732a51218d60b1c5f6fa96357c0d50ce48ae6802da91ff594f7ef184effe9" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:50f9392684483cd969464ee560f61f3739ae45cb0f644bc08681e19edce8fc27" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:5e84e22ba7e21b8ec3e55283a53ea73a14f2bfd41eea5a80ca7a95360f799c52" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:a4b4f08b25f1c8d84392956a49ed473a8c4d8133cea9e9db4bdba23a8fc0713b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:3325c985bbe99f6717dae2dbcb6aedaadfa7eb5f403b109628356485a97f6cf7" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:721b12b0c750f54b6b94e9b24a1e1e7dff7d65f6673d2b4d802576859b38dbe9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8322bb5c9649b552aaaa62ba52067028a828c9dcb16c7580ec235e6b48b75e53" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.7", + "name": "rhacs-operator.v4.8.8", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:24481e3ee1dab49893e7f5891e97e3287ec6f35105b6e927ce0acc7da24a6982", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b22341e8dfba8b10b70f21f3b597c02874bae485c07517402db0930397d82688", "properties": [ { "type": "olm.gvk", @@ -162122,7 +163970,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.7" + "version": "4.8.8" } }, { @@ -162132,8 +163980,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7429ff838a2899577091ba14fbdc812e85b5d1e9c4394e45ead07725c70c79aa", - "createdAt": "2025-12-17T14:22:57.176442+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9af2e62dbfae1e2828daf4f1af46093639957551dc88b36570247ffae0c74b03", + "createdAt": "2026-01-28T16:54:56.941413+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -162145,7 +163993,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.7", + "olm.skipRange": ">= 4.7.0 < 4.8.8", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -163873,59 +165721,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:82dc5edf423b3f9c377c9d2c80d1d19eaf15684872dc41d4baa9efddf082f350" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3f1e304e0560feddb1e9af747e776d5bf9523eff36afaf4dffd41269249f454b" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:440e0ac120a2a7e8dfcad6b53bb120667e293492d9bbcbe9d1ca0a6ed7b2dd62" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:acd810787f472ab16704e7b67c19780f75fabf27a69ca1e2097d6ae36e45007e" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:a58c6e952333169b21ffefdbd1acd3fff9c8d8dfac28795ee290756ca4394f5a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:0aa055c5f92358b93a65aebccb5f2c8863c777f18a061f6e24a5bccdbae9c6d2" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:24481e3ee1dab49893e7f5891e97e3287ec6f35105b6e927ce0acc7da24a6982" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b22341e8dfba8b10b70f21f3b597c02874bae485c07517402db0930397d82688" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:7429ff838a2899577091ba14fbdc812e85b5d1e9c4394e45ead07725c70c79aa" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9af2e62dbfae1e2828daf4f1af46093639957551dc88b36570247ffae0c74b03" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:23150ab7d7d79cf1f5bc70f4f8e32da76ff06af123c395fb46b0be9e6ded7e1f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:de63c514daff7b64511599c4ccc3bbebab4efcd40abbf498c508f98adf9f4a3b" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:fc03a63aada7586517d68c279fe59415b1fc0b3756ee87c5110f19c90712e903" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c88278bf0be39566b9cc6d74cbed357459b2b53d9d44818f15b84698b0a83a75" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:142732544a7553f4eb203b314b3bdc76e5102d7ef3080f1fe36e8ddadffb9ca9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:1a75e89f7e2de4f9c2904fe1129244eeeaff5c222c272b1627df9e291833975c" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:fe1732a51218d60b1c5f6fa96357c0d50ce48ae6802da91ff594f7ef184effe9" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:fb90724bba526007dd88af36a83e9679b5d85b35ba16cbf6add6a36d6e7284fa" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:5e84e22ba7e21b8ec3e55283a53ea73a14f2bfd41eea5a80ca7a95360f799c52" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:80464e5116aca53eefa8278a9023cb1befaf3e14bad55afac5dd90b9a3e0150e" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:3325c985bbe99f6717dae2dbcb6aedaadfa7eb5f403b109628356485a97f6cf7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:feb0df655762f320b2a85490907fce5d6b9aa6c8186d123324cd3812ab148def" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:8322bb5c9649b552aaaa62ba52067028a828c9dcb16c7580ec235e6b48b75e53" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:9476b1b03a69300deddc7ffdbb03bf408831ba37653669ea0d601fa60f274867" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.8.8", + "name": "rhacs-operator.v4.9.0", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b22341e8dfba8b10b70f21f3b597c02874bae485c07517402db0930397d82688", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:02a50a53dddbbdd749b0b6cc01f555308ab3c16045130d07483bfddd6861de42", "properties": [ { "type": "olm.gvk", @@ -163955,7 +165803,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.8.8" + "version": "4.9.0" } }, { @@ -163965,8 +165813,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9af2e62dbfae1e2828daf4f1af46093639957551dc88b36570247ffae0c74b03", - "createdAt": "2026-01-28T16:54:56.941413+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3471d6c2b77ad4be863f7d5b0e5da5cd8a9c267126c003424c27b91e1cbf1b24", + "createdAt": "2025-10-30T15:19:35.144226+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -163978,7 +165826,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.7.0 < 4.8.8", + "olm.skipRange": ">= 4.8.0 < 4.9.0", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -164065,7 +165913,7 @@ { "path": "tls", "displayName": "TLS", - "description": "Allows you to specify additional trusted Root CAs." + "description": "Settings related to Transport Layer Security, such as Certificate Authorities." }, { "path": "imagePullSecrets", @@ -164276,7 +166124,7 @@ { "path": "central.db.isEnabled", "displayName": "Is Enabled", - "description": "Deprecated field. It is no longer necessary to specify it.\nThis field will be removed in a future release.\nCentral is configured to use PostgreSQL by default.", + "description": "Obsolete field.\nThis field will be removed in a future release.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -164292,12 +166140,12 @@ { "path": "central.db.connectionPoolSize.maxConnections", "displayName": "Maximum Connections", - "description": "Maximum number of connections in the connection pool." + "description": "Maximum number of connections in the connection pool.\nThe default is: 90." }, { "path": "central.db.connectionPoolSize.minConnections", "displayName": "Minimum Connections", - "description": "Minimum number of connections in the connection pool." + "description": "Minimum number of connections in the connection pool.\nThe default is: 10." }, { "path": "central.db.passwordSecret.name", @@ -164325,7 +166173,7 @@ { "path": "central.db.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"central-db\" if not set." + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: central-db." }, { "path": "central.db.persistence.persistentVolumeClaim.size", @@ -164394,12 +166242,13 @@ }, { "path": "central.exposure.loadBalancer.enabled", - "displayName": "Enabled" + "displayName": "Enabled", + "description": "The default is: false." }, { "path": "central.exposure.loadBalancer.port", "displayName": "Port", - "description": "Defaults to 443 if not set.", + "description": "The default is: 443.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:central.exposure.loadBalancer.enabled:true" ] @@ -164414,7 +166263,8 @@ }, { "path": "central.exposure.nodePort.enabled", - "displayName": "Enabled" + "displayName": "Enabled", + "description": "The default is: false." }, { "path": "central.exposure.nodePort.port", @@ -164427,7 +166277,7 @@ { "path": "central.exposure.route.enabled", "displayName": "Enabled", - "description": "Expose Central with a passthrough route." + "description": "Expose Central with a passthrough route.\nThe default is: false." }, { "path": "central.exposure.route.host", @@ -164442,7 +166292,7 @@ { "path": "central.exposure.route.reencrypt.enabled", "displayName": "Enabled", - "description": "Expose Central with a reencrypt route.\nShould not be used for sensor communication." + "description": "Expose Central with a reencrypt route.\nShould not be used for sensor communication.\nThe default is: false." }, { "path": "central.exposure.route.reencrypt.host", @@ -164482,17 +166332,23 @@ { "path": "central.notifierSecretsEncryption.enabled", "displayName": "Enabled", - "description": "Enables the encryption of notifier secrets stored in the Central DB." + "description": "Enables the encryption of notifier secrets stored in the Central DB.\nThe default is: false." }, { - "path": "central.persistence.persistentVolumeClaim", - "displayName": "Persistent volume claim", - "description": "Uses a Kubernetes persistent volume claim (PVC) to manage the storage location of persistent data.\nRecommended for most users." + "path": "central.persistence.hostPath", + "displayName": "Host Path", + "description": "Obsolete unused field.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] }, { - "path": "central.persistence.hostPath", - "displayName": "Host path", - "description": "Stores persistent data on a directory on the host. This is not recommended, and should only\nbe used together with a node selector (only available in YAML view)." + "path": "central.persistence.persistentVolumeClaim", + "displayName": "Persistent Volume Claim", + "description": "Obsolete unused field.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] }, { "path": "central.persistence.hostPath.path", @@ -164502,28 +166358,31 @@ { "path": "central.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"stackrox-db\" if not set." + "description": "Obsolete unused field.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] }, { "path": "central.persistence.persistentVolumeClaim.size", "displayName": "Size", - "description": "The size of the persistent volume when created through the claim. If a claim was automatically created,\nthis can be used after the initial deployment to resize (grow) the volume (only supported by some\nstorage class controllers).", + "description": "Obsolete unused field.", "x-descriptors": [ - "urn:alm:descriptor:com.tectonic.ui:text" + "urn:alm:descriptor:com.tectonic.ui:hidden" ] }, { "path": "central.persistence.persistentVolumeClaim.storageClassName", - "displayName": "Storage Class", - "description": "The name of the storage class to use for the PVC. If your cluster is not configured with a default storage\nclass, you must select a value here.", + "displayName": "Storage Class Name", + "description": "Obsolete unused field.", "x-descriptors": [ - "urn:alm:descriptor:io.kubernetes:StorageClass" + "urn:alm:descriptor:com.tectonic.ui:hidden" ] }, { "path": "central.telemetry.enabled", "displayName": "Enabled", - "description": "Specifies if Telemetry is enabled.", + "description": "Specifies if Telemetry is enabled.\nThe default is: true.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" ] @@ -164549,7 +166408,7 @@ { "path": "configAsCode.configAsCodeComponent", "displayName": "Config as Code component", - "description": "If you want to deploy the Config as Code component, set this to \"Enabled\"" + "description": "If you want to deploy the Config as Code component, set this to \"Enabled\"\nThe default is: Enabled." }, { "path": "customize.labels", @@ -164569,7 +166428,7 @@ { "path": "egress.connectivityPolicy", "displayName": "Connectivity Policy", - "description": "Configures whether Red Hat Advanced Cluster Security should run in online or offline (disconnected) mode.\nIn offline mode, automatic updates of vulnerability definitions and kernel modules are disabled." + "description": "Configures whether Red Hat Advanced Cluster Security should run in online or offline (disconnected) mode.\nIn offline mode, automatic updates of vulnerability definitions and kernel modules are disabled.\nThe default is: Online." }, { "path": "imagePullSecrets[0].name", @@ -164590,6 +166449,7 @@ { "path": "monitoring.openshift.enabled", "displayName": "Enabled", + "description": "The default is: true.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" ] @@ -164597,7 +166457,7 @@ { "path": "network.policies", "displayName": "Network Policies", - "description": "To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\"." + "description": "To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled." }, { "path": "overlays[0].apiVersion", @@ -164699,16 +166559,17 @@ { "path": "scanner.analyzer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." }, { "path": "scanner.analyzer.scaling.replicas", "displayName": "Default Replicas", - "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." }, { "path": "scanner.analyzer.scaling.minReplicas", "displayName": "Autoscaling Minimum Replicas", + "description": "The default is: 2.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" ] @@ -164716,6 +166577,7 @@ { "path": "scanner.analyzer.scaling.maxReplicas", "displayName": "Autoscaling Maximum Replicas", + "description": "The default is: 5.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" ] @@ -164837,7 +166699,7 @@ { "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"scanner-v4-db\" if not set." + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db." }, { "path": "scannerV4.db.persistence.persistentVolumeClaim.size", @@ -164889,16 +166751,17 @@ { "path": "scannerV4.indexer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." }, { "path": "scannerV4.indexer.scaling.replicas", "displayName": "Default Replicas", - "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." }, { "path": "scannerV4.indexer.scaling.minReplicas", "displayName": "Autoscaling Minimum Replicas", + "description": "The default is: 2.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" ] @@ -164906,6 +166769,7 @@ { "path": "scannerV4.indexer.scaling.maxReplicas", "displayName": "Autoscaling Maximum Replicas", + "description": "The default is: 5.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" ] @@ -164944,16 +166808,17 @@ { "path": "scannerV4.matcher.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." }, { "path": "scannerV4.matcher.scaling.replicas", "displayName": "Default Replicas", - "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." }, { "path": "scannerV4.matcher.scaling.minReplicas", "displayName": "Autoscaling Minimum Replicas", + "description": "The default is: 2.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.matcher.scaling.autoScaling:Enabled" ] @@ -164961,6 +166826,7 @@ { "path": "scannerV4.matcher.scaling.maxReplicas", "displayName": "Autoscaling Maximum Replicas", + "description": "The default is: 5.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.matcher.scaling.autoScaling:Enabled" ] @@ -164972,7 +166838,8 @@ }, { "path": "tls.additionalCAs", - "displayName": "Additional CAs" + "displayName": "Additional CAs", + "description": "Allows you to specify additional trusted Root CAs." } ] }, @@ -165037,6 +166904,11 @@ "displayName": "Kubernetes Audit Logs Ingestion Settings", "description": "Settings relating to the ingestion of Kubernetes audit logs." }, + { + "path": "processBaselines", + "displayName": "Process Baselines Settings", + "description": "Settings relating to process baselines." + }, { "path": "scanner", "displayName": "Scanner Component Settings", @@ -165050,7 +166922,7 @@ { "path": "tls", "displayName": "TLS", - "description": "Allows you to specify additional trusted Root CAs." + "description": "Settings related to Transport Layer Security, such as Certificate Authorities." }, { "path": "imagePullSecrets", @@ -165109,39 +166981,24 @@ ] }, { - "path": "admissionControl.listenOnCreates", - "displayName": "Listen On Creates", - "description": "Set this to 'true' to enable preventive policy enforcement for object creations." - }, - { - "path": "admissionControl.listenOnUpdates", - "displayName": "Listen On Updates", - "description": "Set this to 'true' to enable preventive policy enforcement for object updates.\n\nNote: this will not have any effect unless 'Listen On Creates' is set to 'true' as well." - }, - { - "path": "admissionControl.listenOnEvents", - "displayName": "Listen On Events", - "description": "Set this to 'true' to enable monitoring and enforcement for Kubernetes events (port-forward and exec)." - }, - { - "path": "admissionControl.contactImageScanners", - "displayName": "Contact Image Scanners", - "description": "Should inline scanning be performed on previously unscanned images during a deployments admission review." - }, - { - "path": "admissionControl.timeoutSeconds", - "displayName": "Timeout Seconds", - "description": "Maximum timeout period for admission review, upon which admission review will fail open.\nUse it to set request timeouts when you enable inline image scanning.\nThe default kubectl timeout is 30 seconds; taking padding into account, this should not exceed 25 seconds.\nOn OpenShift webhook timeouts cannot exceed 13 seconds, hence with padding this value shall not exceed 10 seconds." + "path": "admissionControl.enforcement", + "displayName": "Enforcement", + "description": "Set to Disabled to disable policy enforcement for the admission controller. This is not recommended.\nOn new deployments starting with version 4.9, defaults to Enabled.\nOn old deployments, defaults to Enabled if at least one of listenOnCreates or listenOnUpdates is true." }, { "path": "admissionControl.bypass", "displayName": "Bypass", - "description": "Enables teams to bypass admission control in a monitored manner in the event of an emergency." + "description": "Enables teams to bypass admission control in a monitored manner in the event of an emergency.\nThe default is: BreakGlassAnnotation." + }, + { + "path": "admissionControl.failurePolicy", + "displayName": "Failure Policy", + "description": "If set to \"Fail\", the admission controller's webhooks are configured to fail-closed in case admission controller\nfails to respond in time. A failure policy \"Ignore\" configures the webhooks to fail-open.\nThe default is: Ignore." }, { "path": "admissionControl.replicas", "displayName": "Replicas", - "description": "The number of replicas of the admission control pod." + "description": "The number of replicas of the admission control pod.\nThe default is: 3." }, { "path": "admissionControl.resources", @@ -165169,10 +167026,50 @@ "displayName": "Host Aliases", "description": "HostAliases allows configuring additional hostnames to resolve in the pod's hosts file." }, + { + "path": "admissionControl.contactImageScanners", + "displayName": "Contact Image Scanners", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.listenOnCreates", + "displayName": "Listen On Creates", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.listenOnEvents", + "displayName": "Listen On Events", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.listenOnUpdates", + "displayName": "Listen On Updates", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, + { + "path": "admissionControl.timeoutSeconds", + "displayName": "Timeout Seconds", + "description": "Deprecated field. This field will be removed in a future release.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:hidden" + ] + }, { "path": "auditLogs.collection", "displayName": "Collection", - "description": "Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only\nsupported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error.\nUse the 'Auto' setting to enable it on compatible environments, and disable it elsewhere." + "description": "Whether collection of Kubernetes audit logs should be enabled or disabled. Currently, this is only\nsupported on OpenShift 4, and trying to enable it on non-OpenShift 4 clusters will result in an error.\nUse the 'Auto' setting to enable it on compatible environments, and disable it elsewhere.\nThe default is: Auto." }, { "path": "customize.labels", @@ -165208,6 +167105,7 @@ { "path": "monitoring.openshift.enabled", "displayName": "Enabled", + "description": "The default is: true.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:booleanSwitch" ] @@ -165215,7 +167113,7 @@ { "path": "network.policies", "displayName": "Network Policies", - "description": "To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\"." + "description": "To provide security at the network level the ACS Operator creates NetworkPolicy resources by default. If you want to manage your own NetworkPolicy objects then set this to \"Disabled\".\nThe default is: Enabled." }, { "path": "overlays[0].apiVersion", @@ -165275,7 +167173,7 @@ { "path": "perNode.taintToleration", "displayName": "Taint Toleration", - "description": "To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security\nwill run services on every node in the cluster, including tainted nodes by default. If you do\nnot want this behavior, please select 'AvoidTaints' here." + "description": "To ensure comprehensive monitoring of your cluster activity, Red Hat Advanced Cluster Security\nwill run services on every node in the cluster, including tainted nodes by default. If you do\nnot want this behavior, please select 'AvoidTaints' here.\nThe default is: TolerateTaints." }, { "path": "perNode.hostAliases", @@ -165285,7 +167183,7 @@ { "path": "perNode.collector.collection", "displayName": "Collection", - "description": "The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in these section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.", + "description": "The method for system-level data collection. CORE_BPF is recommended.\nIf you select \"NoCollection\", you will not be able to see any information about network activity\nand process executions. The remaining settings in these section will not have any effect.\nThe value is a subject of conversion by the operator if needed, e.g. to\nremove deprecated methods.\nThe default is: CORE_BPF.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:select:CORE_BPF", "urn:alm:descriptor:com.tectonic.ui:select:NoCollection" @@ -165294,7 +167192,7 @@ { "path": "perNode.collector.imageFlavor", "displayName": "Image Flavor", - "description": "Deprecated field.", + "description": "Obsolete field.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -165302,7 +167200,7 @@ { "path": "perNode.collector.forceCollection", "displayName": "Force Collection", - "description": "Deprecated field. This field will be removed in a future release.", + "description": "Obsolete field. This field will be removed in a future release.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:hidden" ] @@ -165331,10 +167229,19 @@ "urn:alm:descriptor:com.tectonic.ui:resourceRequirements" ] }, + { + "path": "processBaselines.autoLock", + "displayName": "Auto Lock", + "description": "Should process baselines be automatically locked when the observation period (1 hour by default) ends.\nThe default is: Disabled.", + "x-descriptors": [ + "urn:alm:descriptor:com.tectonic.ui:select:Enabled", + "urn:alm:descriptor:com.tectonic.ui:select:Disabled" + ] + }, { "path": "scanner.scannerComponent", "displayName": "Scanner Component", - "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended).\nIf you do so, all the settings in this section will have no effect." + "description": "If you do not want to deploy the Red Hat Advanced Cluster Security Scanner, you can disable it here\n(not recommended).\nIf you do so, all the settings in this section will have no effect.\nThe default is: AutoSense." }, { "path": "scanner.analyzer", @@ -165380,16 +167287,17 @@ { "path": "scanner.analyzer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." }, { "path": "scanner.analyzer.scaling.replicas", "displayName": "Default Replicas", - "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." }, { "path": "scanner.analyzer.scaling.minReplicas", "displayName": "Autoscaling Minimum Replicas", + "description": "The default is: 2.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" ] @@ -165397,6 +167305,7 @@ { "path": "scanner.analyzer.scaling.maxReplicas", "displayName": "Autoscaling Maximum Replicas", + "description": "The default is: 5.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scanner.analyzer.scaling.autoScaling:Enabled" ] @@ -165505,7 +167414,7 @@ { "path": "scannerV4.db.persistence.persistentVolumeClaim.claimName", "displayName": "Claim Name", - "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated. Defaults to \"scanner-v4-db\" if not set." + "description": "The name of the PVC to manage persistent data. If no PVC with the given name exists, it will be\ncreated.\nThe default is: scanner-v4-db." }, { "path": "scannerV4.db.persistence.persistentVolumeClaim.size", @@ -165557,16 +167466,17 @@ { "path": "scannerV4.indexer.scaling.autoScaling", "displayName": "Autoscaling", - "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below." + "description": "When enabled, the number of component replicas is managed dynamically based on the load, within the limits\nspecified below.\nThe default is: Enabled." }, { "path": "scannerV4.indexer.scaling.replicas", "displayName": "Default Replicas", - "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value." + "description": "When autoscaling is disabled, the number of replicas will always be configured to match this value.\nThe default is: 3." }, { "path": "scannerV4.indexer.scaling.minReplicas", "displayName": "Autoscaling Minimum Replicas", + "description": "The default is: 2.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" ] @@ -165574,6 +167484,7 @@ { "path": "scannerV4.indexer.scaling.maxReplicas", "displayName": "Autoscaling Maximum Replicas", + "description": "The default is: 5.", "x-descriptors": [ "urn:alm:descriptor:com.tectonic.ui:fieldDependency:scannerV4.indexer.scaling.autoScaling:Enabled" ] @@ -165611,7 +167522,8 @@ }, { "path": "tls.additionalCAs", - "displayName": "Additional CAs" + "displayName": "Additional CAs", + "description": "Allows you to specify additional trusted Root CAs." } ] }, @@ -165706,59 +167618,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3f1e304e0560feddb1e9af747e776d5bf9523eff36afaf4dffd41269249f454b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3967c7c91238516bfd5df4a893e0df644b8aca0d6b249dbd2e94c063dad12fba" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:acd810787f472ab16704e7b67c19780f75fabf27a69ca1e2097d6ae36e45007e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:591dcc1532ae2e40a7e78e117f7c02de81c0742f48b97436c2e4a7fd5a9fe649" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:0aa055c5f92358b93a65aebccb5f2c8863c777f18a061f6e24a5bccdbae9c6d2" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:26e01b4554d6ff2d2a1333ff86244f61a037b61bb3b26a14b0927d245a1b0c21" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b22341e8dfba8b10b70f21f3b597c02874bae485c07517402db0930397d82688" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:02a50a53dddbbdd749b0b6cc01f555308ab3c16045130d07483bfddd6861de42" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:9af2e62dbfae1e2828daf4f1af46093639957551dc88b36570247ffae0c74b03" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3471d6c2b77ad4be863f7d5b0e5da5cd8a9c267126c003424c27b91e1cbf1b24" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:de63c514daff7b64511599c4ccc3bbebab4efcd40abbf498c508f98adf9f4a3b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:cc741551497f949a2c337a6fed0313c807cc46d0ad5adc281505146f22fb356a" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:c88278bf0be39566b9cc6d74cbed357459b2b53d9d44818f15b84698b0a83a75" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:8281d43a5b1f2cfc7893d812703e283f5f5c30617733b531d86dc201fd1bcf9f" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:1a75e89f7e2de4f9c2904fe1129244eeeaff5c222c272b1627df9e291833975c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9dab85eabbae8cc51ea9288aeaf0ac47009d293006264b6f88991815772d9df1" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:fb90724bba526007dd88af36a83e9679b5d85b35ba16cbf6add6a36d6e7284fa" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a283a8e651a4d6fc991c4801e8480f31fb72b6305b0b9c8741733c9847235e65" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:80464e5116aca53eefa8278a9023cb1befaf3e14bad55afac5dd90b9a3e0150e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:6dd9e4842988728a930451b25822c1e049cd2f6c7b3e358df18e74ca15b1f972" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:feb0df655762f320b2a85490907fce5d6b9aa6c8186d123324cd3812ab148def" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5062cf77952f21fb428ff7a230c3f692bbb73f888ab102e5ac197a352415b18a" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:9476b1b03a69300deddc7ffdbb03bf408831ba37653669ea0d601fa60f274867" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:2bd192a9f1960af7008341a39ff3379c121860a8c1145f120007e106bab582cc" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.9.0", + "name": "rhacs-operator.v4.9.1", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:02a50a53dddbbdd749b0b6cc01f555308ab3c16045130d07483bfddd6861de42", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9312c096fef02f70b642551338fdf968ec6657ff0385f51c13767d8b29afc76d", "properties": [ { "type": "olm.gvk", @@ -165788,7 +167700,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.9.0" + "version": "4.9.1" } }, { @@ -165798,8 +167710,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3471d6c2b77ad4be863f7d5b0e5da5cd8a9c267126c003424c27b91e1cbf1b24", - "createdAt": "2025-10-30T15:19:35.144226+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:68d9c77d33b50fde89121bc62ffb8a2fe8b43f50ebf0ec964938d33ffef17874", + "createdAt": "2025-11-20T10:17:44.970647+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -165811,7 +167723,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.8.0 < 4.9.0", + "olm.skipRange": ">= 4.8.0 < 4.9.1", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -167603,59 +169515,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:3967c7c91238516bfd5df4a893e0df644b8aca0d6b249dbd2e94c063dad12fba" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:cda9b4a23df0c420751f4d37955f9a84a18775b4a6938b8c70bca08ddb572062" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:591dcc1532ae2e40a7e78e117f7c02de81c0742f48b97436c2e4a7fd5a9fe649" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:a662237e4b36010f400418eede4605bf12e55a475ad8f91455f6a59b7bd066e0" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:26e01b4554d6ff2d2a1333ff86244f61a037b61bb3b26a14b0927d245a1b0c21" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d1a469f4335ae9ed3e60e1bb0ebd7651454c9b26bb804326e448b94254ec70c0" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:02a50a53dddbbdd749b0b6cc01f555308ab3c16045130d07483bfddd6861de42" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9312c096fef02f70b642551338fdf968ec6657ff0385f51c13767d8b29afc76d" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:3471d6c2b77ad4be863f7d5b0e5da5cd8a9c267126c003424c27b91e1cbf1b24" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:68d9c77d33b50fde89121bc62ffb8a2fe8b43f50ebf0ec964938d33ffef17874" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:cc741551497f949a2c337a6fed0313c807cc46d0ad5adc281505146f22fb356a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d2595a663db335c9951b05ade48b73bd88b26f3754a621b430593b8497b496db" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:8281d43a5b1f2cfc7893d812703e283f5f5c30617733b531d86dc201fd1bcf9f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:50c3a82767c8e87a3bcad7d4fd2650cf2a1ec0eb8ef4f7f60fa2c751b43f53ae" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:9dab85eabbae8cc51ea9288aeaf0ac47009d293006264b6f88991815772d9df1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5a5a6ba8e773dfb6c3fe5e632dcc1028fa75cd96d83f891847509e922ab5d9ec" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:a283a8e651a4d6fc991c4801e8480f31fb72b6305b0b9c8741733c9847235e65" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:271ad8cfc4b895aa54f183503b41a68fffaaa152e51b4fb7451d09da62a7f765" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:6dd9e4842988728a930451b25822c1e049cd2f6c7b3e358df18e74ca15b1f972" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:aa9f528f8e329678d52f585554d2cd4378638ae8fd92c90bc7af5cc29a5d95ce" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5062cf77952f21fb428ff7a230c3f692bbb73f888ab102e5ac197a352415b18a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:17b091957cfd1925da1e082dff249fe09069392654cc085d473b768097613b9d" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:2bd192a9f1960af7008341a39ff3379c121860a8c1145f120007e106bab582cc" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:91c8e7a5289a4e3f5aac5069fdf24f334aa8307f57278878725b81d8f78e419c" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.9.1", + "name": "rhacs-operator.v4.9.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9312c096fef02f70b642551338fdf968ec6657ff0385f51c13767d8b29afc76d", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b3fbc67b7b2333acf5b574dafc727b5953ff8360b2a9ead7505d3f223f29dbe6", "properties": [ { "type": "olm.gvk", @@ -167685,7 +169597,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.9.1" + "version": "4.9.2" } }, { @@ -167695,8 +169607,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:68d9c77d33b50fde89121bc62ffb8a2fe8b43f50ebf0ec964938d33ffef17874", - "createdAt": "2025-11-20T10:17:44.970647+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bca0bc3c0c158d459198562fe25e3de63fc7ba136b403238d9104b815c916c7e", + "createdAt": "2025-12-15T11:46:09.678434+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -167708,7 +169620,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.8.0 < 4.9.1", + "olm.skipRange": ">= 4.8.0 < 4.9.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -169500,59 +171412,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:cda9b4a23df0c420751f4d37955f9a84a18775b4a6938b8c70bca08ddb572062" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:f738b52dd27d5df837fcdfd64008b23af542c5149635094fa19879bcdf62727b" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:a662237e4b36010f400418eede4605bf12e55a475ad8f91455f6a59b7bd066e0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:601c0d927f051cad10b8ffc17617694cb3f75fbf59f2ac4e667e3b152ef5e16a" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:d1a469f4335ae9ed3e60e1bb0ebd7651454c9b26bb804326e448b94254ec70c0" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:4118ac0a9af4d6c38fcdde1236a963a47a41eb465d15a9a0bf90b30679a2b2f1" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:9312c096fef02f70b642551338fdf968ec6657ff0385f51c13767d8b29afc76d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b3fbc67b7b2333acf5b574dafc727b5953ff8360b2a9ead7505d3f223f29dbe6" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:68d9c77d33b50fde89121bc62ffb8a2fe8b43f50ebf0ec964938d33ffef17874" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bca0bc3c0c158d459198562fe25e3de63fc7ba136b403238d9104b815c916c7e" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:d2595a663db335c9951b05ade48b73bd88b26f3754a621b430593b8497b496db" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e171702dceae6d0182fb282633083429507ebe3cee0d8d1311362e20798be8cf" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:50c3a82767c8e87a3bcad7d4fd2650cf2a1ec0eb8ef4f7f60fa2c751b43f53ae" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:7d77daa7c1a4219d3988e86062a97295a6eb1c423bc9906c5ef31084f5a5fca7" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5a5a6ba8e773dfb6c3fe5e632dcc1028fa75cd96d83f891847509e922ab5d9ec" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:e48f539bbe3b874be10dcc31ea61b074854a00d1bbccbbd3ec72b185345ba55e" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:271ad8cfc4b895aa54f183503b41a68fffaaa152e51b4fb7451d09da62a7f765" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9fdfe4745d943dc150c2fcef04684cd6f96a9ab773ba08d1c7a109f5cfa0114b" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:aa9f528f8e329678d52f585554d2cd4378638ae8fd92c90bc7af5cc29a5d95ce" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7ea0bc82c690cddc9ee7907ea6f21ce40f1a882143c49bfca3651519985b4687" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:17b091957cfd1925da1e082dff249fe09069392654cc085d473b768097613b9d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:8402cb5f37bfa0bc173292a893fe0d2a6d2faa0bda72a9a6e5af0d291e2c608d" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:91c8e7a5289a4e3f5aac5069fdf24f334aa8307f57278878725b81d8f78e419c" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5e2d60a6ab9babf749eed37ea3fd32516e07201033995697046f28e02df5c8d7" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.9.2", + "name": "rhacs-operator.v4.9.3", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b3fbc67b7b2333acf5b574dafc727b5953ff8360b2a9ead7505d3f223f29dbe6", + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:4293e169ce795c57143e5a37e0b909ba19d702d26830c749f960ce4ec77c0897", "properties": [ { "type": "olm.gvk", @@ -169582,7 +171494,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.9.2" + "version": "4.9.3" } }, { @@ -169592,8 +171504,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bca0bc3c0c158d459198562fe25e3de63fc7ba136b403238d9104b815c916c7e", - "createdAt": "2025-12-15T11:46:09.678434+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4ce128a2edcd1c4e1b32d631a058a0c89ed1b69f10f584e142ba382cb4524ed1", + "createdAt": "2026-02-11T13:05:53.745090+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -169605,7 +171517,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.8.0 < 4.9.2", + "olm.skipRange": ">= 4.8.0 < 4.9.3", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -171397,59 +173309,59 @@ "relatedImages": [ { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:f738b52dd27d5df837fcdfd64008b23af542c5149635094fa19879bcdf62727b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:5351893996eab02ca1b273e6c3efd3dda0a65d3a3c566ef722321fce4edf1387" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:601c0d927f051cad10b8ffc17617694cb3f75fbf59f2ac4e667e3b152ef5e16a" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:99779433e9439c573b32a9252cba053eabd2a8b6c7cdce68dbede24cdb7a012f" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:4118ac0a9af4d6c38fcdde1236a963a47a41eb465d15a9a0bf90b30679a2b2f1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:0dbb0444ea1c93e05c1f5519559c5c2f50f02e384e6975f709a34365791e2944" }, { "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b3fbc67b7b2333acf5b574dafc727b5953ff8360b2a9ead7505d3f223f29dbe6" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:4293e169ce795c57143e5a37e0b909ba19d702d26830c749f960ce4ec77c0897" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:bca0bc3c0c158d459198562fe25e3de63fc7ba136b403238d9104b815c916c7e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4ce128a2edcd1c4e1b32d631a058a0c89ed1b69f10f584e142ba382cb4524ed1" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e171702dceae6d0182fb282633083429507ebe3cee0d8d1311362e20798be8cf" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c1bc956d1dd4cd64960e9be0c7c1deb665acfe651f1a7d786266c16ec9ed5e3f" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:7d77daa7c1a4219d3988e86062a97295a6eb1c423bc9906c5ef31084f5a5fca7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0e0825f1f0cffd170bd9f6ed38a7275c7444a8b5e7c263fe21701e789fb843a7" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:e48f539bbe3b874be10dcc31ea61b074854a00d1bbccbbd3ec72b185345ba55e" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d12f159693d529fb4c8b1bc3fdc80922b4a76bf9c5062ba85aa83caf4ae4e4fa" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:9fdfe4745d943dc150c2fcef04684cd6f96a9ab773ba08d1c7a109f5cfa0114b" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:546a1c9117389c788b23c8b4dfd44822e297325e0377cf67e7352c605ffe4aa3" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7ea0bc82c690cddc9ee7907ea6f21ce40f1a882143c49bfca3651519985b4687" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7d578bc8b0bb6015747f1d1e64e418aa2a88d6b9479e0123c5ab1bcf6e500f99" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:8402cb5f37bfa0bc173292a893fe0d2a6d2faa0bda72a9a6e5af0d291e2c608d" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:cdf4123ba9a11c7bfc39e54dbbbd2adda83ce7034448bd1abcd18685ae315527" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:5e2d60a6ab9babf749eed37ea3fd32516e07201033995697046f28e02df5c8d7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:6928246d4947b643f5af6b4385011091a20501091912be36b75a4a18c5bba7a1" } ] } { "schema": "olm.bundle", - "name": "rhacs-operator.v4.9.3", + "name": "rhacs-operator.v4.9.4-rc.2", "package": "rhacs-operator", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:4293e169ce795c57143e5a37e0b909ba19d702d26830c749f960ce4ec77c0897", + "image": "quay.io/rhacs-eng/release-operator-bundle@sha256:cb5fac5c451f2b46cdb74859f035b35878db033df803ef14b705fdd7a9181da5", "properties": [ { "type": "olm.gvk", @@ -171479,7 +173391,7 @@ "type": "olm.package", "value": { "packageName": "rhacs-operator", - "version": "4.9.3" + "version": "4.9.4-rc.2" } }, { @@ -171489,8 +173401,8 @@ "alm-examples": "[\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"Central\",\n \"metadata\": {\n \"name\": \"stackrox-central-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"central\": {\n \"exposure\": {\n \"route\": {\n \"enabled\": true\n }\n }\n }\n }\n },\n {\n \"apiVersion\": \"platform.stackrox.io/v1alpha1\",\n \"kind\": \"SecuredCluster\",\n \"metadata\": {\n \"name\": \"stackrox-secured-cluster-services\",\n \"namespace\": \"stackrox\"\n },\n \"spec\": {\n \"clusterName\": \"my-cluster\"\n }\n }\n]", "capabilities": "Seamless Upgrades", "categories": "Security", - "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4ce128a2edcd1c4e1b32d631a058a0c89ed1b69f10f584e142ba382cb4524ed1", - "createdAt": "2026-02-11T13:05:53.745090+00:00", + "containerImage": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:8796efaba046b9a20c223ae285a635f6a84af809a321869947ba476b98ba5fc1", + "createdAt": "2026-03-04T10:59:02.184496+00:00", "description": "Red Hat Advanced Cluster Security (RHACS) operator provisions the services necessary to secure each of your OpenShift and Kubernetes clusters.", "features.operators.openshift.io/cnf": "false", "features.operators.openshift.io/cni": "false", @@ -171502,7 +173414,7 @@ "features.operators.openshift.io/token-auth-aws": "false", "features.operators.openshift.io/token-auth-azure": "false", "features.operators.openshift.io/token-auth-gcp": "false", - "olm.skipRange": ">= 4.8.0 < 4.9.3", + "olm.skipRange": ">= 4.8.0 < 4.9.4-rc.2", "operatorframework.io/suggested-namespace": "rhacs-operator", "operators.openshift.io/infrastructure-features": "[\"disconnected\", \"proxy-aware\"]", "operators.openshift.io/valid-subscription": "[\"OpenShift Platform Plus\", \"Red Hat Advanced Cluster Security\"]", @@ -173292,53 +175204,53 @@ } ], "relatedImages": [ + { + "name": "", + "image": "quay.io/rhacs-eng/release-operator-bundle@sha256:cb5fac5c451f2b46cdb74859f035b35878db033df803ef14b705fdd7a9181da5" + }, { "name": "central_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:5351893996eab02ca1b273e6c3efd3dda0a65d3a3c566ef722321fce4edf1387" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8@sha256:463c9a0aba057c18ee34bf229380cbde8da2eae3adad851b007d16f7202d1508" }, { "name": "collector", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:99779433e9439c573b32a9252cba053eabd2a8b6c7cdce68dbede24cdb7a012f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8@sha256:523c028ce03473016c3a77572c89e2b92dd5620f367b425cbf417c1cd974ee1b" }, { "name": "main", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:0dbb0444ea1c93e05c1f5519559c5c2f50f02e384e6975f709a34365791e2944" - }, - { - "name": "", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:4293e169ce795c57143e5a37e0b909ba19d702d26830c749f960ce4ec77c0897" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8@sha256:cb4c824228ed500d8906adb0add2bfde28c6fb6618442bbe181ec8b4673d54d9" }, { "name": "manager", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:4ce128a2edcd1c4e1b32d631a058a0c89ed1b69f10f584e142ba382cb4524ed1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator@sha256:8796efaba046b9a20c223ae285a635f6a84af809a321869947ba476b98ba5fc1" }, { "name": "roxctl", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:c1bc956d1dd4cd64960e9be0c7c1deb665acfe651f1a7d786266c16ec9ed5e3f" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f9ab76f639938df678c02fa404a461d9d7e1809053674359991bafdc149f287" }, { "name": "scanner_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:0e0825f1f0cffd170bd9f6ed38a7275c7444a8b5e7c263fe21701e789fb843a7" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:4dd8884af50ea6ce2d4873e973e1a0e504e288c846a1a6098c81fae8f0359c01" }, { "name": "scanner_db_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:d12f159693d529fb4c8b1bc3fdc80922b4a76bf9c5062ba85aa83caf4ae4e4fa" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8fa6e7a4cf136a7cdcbcc00ee5130d6089c75805be35cf72930e279503853235" }, { "name": "scanner", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:546a1c9117389c788b23c8b4dfd44822e297325e0377cf67e7352c605ffe4aa3" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8@sha256:e66d880952d5ad5cc6eb5c36c4234a83a5fa3f7407aad8f97bb885f85f174b39" }, { "name": "scanner_slim", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7d578bc8b0bb6015747f1d1e64e418aa2a88d6b9479e0123c5ab1bcf6e500f99" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:7d74cfab59d7af011b3711f4be2d362bcfbffb9839a409fd7cefb71154f9b6b3" }, { "name": "scanner_v4_db", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:cdf4123ba9a11c7bfc39e54dbbbd2adda83ce7034448bd1abcd18685ae315527" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:f3c57ff7563fd0983e8047db3c2eedb96ecca6e6ad3778e9ba326a37a9be551c" }, { "name": "scanner_v4", - "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:6928246d4947b643f5af6b4385011091a20501091912be36b75a4a18c5bba7a1" + "image": "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:36229fe2a50ed0ad79ded35b5652d35f559a676f780ededbead6332951e7bd89" } ] } diff --git a/catalog-template.yaml b/catalog-template.yaml index 919082a0..13b85661 100644 --- a/catalog-template.yaml +++ b/catalog-template.yaml @@ -2227,6 +2227,9 @@ entries: - name: rhacs-operator.v4.9.3 replaces: rhacs-operator.v4.9.2 skipRange: ">= 4.8.0 < 4.9.3" + - name: rhacs-operator.v4.9.4-rc.2 + replaces: rhacs-operator.v4.9.3 + skipRange: ">= 4.8.0 < 4.9.4-rc.2" - schema: olm.channel name: rhacs-4.10 package: rhacs-operator @@ -2473,8 +2476,11 @@ entries: - name: rhacs-operator.v4.9.3 replaces: rhacs-operator.v4.9.2 skipRange: ">= 4.8.0 < 4.9.3" - - name: rhacs-operator.v4.10.0 + - name: rhacs-operator.v4.9.4-rc.2 replaces: rhacs-operator.v4.9.3 + skipRange: ">= 4.8.0 < 4.9.4-rc.2" + - name: rhacs-operator.v4.10.0 + replaces: rhacs-operator.v4.9.4-rc.2 skipRange: ">= 4.9.0 < 4.10.0" - schema: olm.channel name: stable @@ -2722,8 +2728,11 @@ entries: - name: rhacs-operator.v4.9.3 replaces: rhacs-operator.v4.9.2 skipRange: ">= 4.8.0 < 4.9.3" - - name: rhacs-operator.v4.10.0 + - name: rhacs-operator.v4.9.4-rc.2 replaces: rhacs-operator.v4.9.3 + skipRange: ">= 4.8.0 < 4.9.4-rc.2" + - name: rhacs-operator.v4.10.0 + replaces: rhacs-operator.v4.9.4-rc.2 skipRange: ">= 4.9.0 < 4.10.0" - schema: olm.deprecations package: rhacs-operator @@ -3526,5 +3535,7 @@ entries: image: registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:b3fbc67b7b2333acf5b574dafc727b5953ff8360b2a9ead7505d3f223f29dbe6 - schema: olm.bundle image: registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:4293e169ce795c57143e5a37e0b909ba19d702d26830c749f960ce4ec77c0897 +- schema: olm.bundle + image: quay.io/rhacs-eng/release-operator-bundle@sha256:cb5fac5c451f2b46cdb74859f035b35878db033df803ef14b705fdd7a9181da5 - schema: olm.bundle image: registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle@sha256:1b1480e72310d6ec17c4dd4368214cd940a4da230b13304f4621c5ae560f9e9e