diff --git a/docs/docs/coverage/kubernetes.md b/docs/docs/coverage/kubernetes.md index e3b8b8743627..d2516d5a91a4 100644 --- a/docs/docs/coverage/kubernetes.md +++ b/docs/docs/coverage/kubernetes.md @@ -6,7 +6,8 @@ When scanning a Kubernetes cluster, Trivy differentiates between the following: 1. Cluster configuration (e.g Roles, ClusterRoles). 1. Application workloads (e.g nginx, postgresql). -When scanning any of the above, Trivy differentiates between the Kubernetes Resource definition (i.e the YAML that defines it), and the container image if relevant. +Whenever Trivy scans either of these Kubernetes resources, the container image is scanned separately to the Kubernetes Resource Definition (the YAML manifest) that defines the resource. +When scanning any of the above, the container image is scanned separately to the Kubernetes Resource Definition (the YAML manifest) that defines the resource. Container image is scanned for: - Vulnerabilities diff --git a/docs/docs/target/kubernetes.md b/docs/docs/target/kubernetes.md index 449038abe0c6..447d29dce249 100644 --- a/docs/docs/target/kubernetes.md +++ b/docs/docs/target/kubernetes.md @@ -12,7 +12,7 @@ When scanning a Kubernetes cluster, Trivy differentiates between the following: 1. Cluster configuration (e.g Roles, ClusterRoles). 1. Application workloads (e.g nginx, postgresql). -When scanning any of the above, Trivy differentiates between the Kubernetes Resource definition (i.e the YAML that defines it), and the container image if relevant. +When scanning any of the above, the container image is scanned separately to the Kubernetes Resource Definition (the YAML manifest) that defines the resource. Container image is scanned for: - Vulnerabilities