Browse Source

fix(docs): update anchore-engine-credentials.md (#5172)

Fix formatting and a little bit rephrase to make the doc sounding better to English speakers.

Signed-off-by: George Gaál <gb12335@gmail.com>
George Gaál 7 months ago
parent
commit
20d5f9ec5a
1 changed files with 10 additions and 10 deletions
  1. 10 10
      docs/examples/anchore-engine-credentials.md

+ 10 - 10
docs/examples/anchore-engine-credentials.md

@@ -1,20 +1,20 @@
 # Getting started
 
-Anchore Engine is an open-source project that provides a centralized service for inspection, analysis, and certification of container images. With Kubernetes, it also brings nice features like preventing unscanned images from being deployed into your clusters
+**Anchore Engine** is an open-source platform that provides centralized inspection, analysis, and certification of container images. When integrated with Kubernetes, it adds powerful features—such as preventing unscanned images from being deployed into your clusters.
 
-## Installing with Helm
+## Installation with Helm
 
-There are several parts of the installation that require credentials these being :-
+There are several parts of the installation that require credentials these being:
 
-ANCHORE_ADMIN_USERNAME
-ANCHORE_ADMIN_PASSWORD
-ANCHORE_DB_PASSWORD
-db-url
-db-user
-postgres-password
+- `ANCHORE_ADMIN_USERNAME`
+- `ANCHORE_ADMIN_PASSWORD`
+- `ANCHORE_DB_PASSWORD`
+- `db-url`
+- `db-user`
+- `postgres-password`
 
+You can use an **ExternalSecret** to automatically fetch these credentials from your preferred backend provider. The following examples demonstrate how to configure it with **HashiCorp Vault** and **AWS Secrets Manager**.
 
-Creating the following external secret ensure the credentials are drawn from the backend provider of choice. The example shown here works with Hashicorp Vault and AWS Secrets Manager providers.
 
 #### Hashicorp Vault