-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade of IBM Common Service operator and related dependencies #516
Comments
Hi @mhcastro On the current release of common service operator, we set the Operator's Therefore, if we want to pin the operator and its dependencies on the specific version, we have to tag the
Since their is no image update in that specific version of In the next release, we will support to set the I hope it would be helpful to you. |
Thanks. Right, so if Cloud Registry image scanners identify any vulnerability on the latest, for example, OpenShift Quay Security Scanner, what would be the approach to highlight and patch these images? |
No, we would not patch the images that have been published. And I don't think we will highlight the current image which includes the vulnerability. If there is any vulnerability issue found in the existing images on the |
Thanks @Daniel-Fan. |
Hi folks! What would be the process to take on new updates of the IBM Common Services operator and other related dependencies with their respective container? For example, in the operator list below: what would be the approach to take new versions of the operator and/or the containers pulled automatically by the operator?
The following indicates an automatic upgrade process every 45 minutes. But is there a manual task to take on new containers - e.g., let's say a new patched container image has been published to the registry?
Thanks!
The text was updated successfully, but these errors were encountered: