Skip to content
This repository was archived by the owner on Sep 15, 2022. It is now read-only.

Commit 9a61b62

Browse files
author
David Wertenteil
committed
Merge remote-tracking branch 'armosec/dev' into dev
2 parents fa9ccfb + 5cfe977 commit 9a61b62

File tree

3 files changed

+36
-18
lines changed

3 files changed

+36
-18
lines changed

README.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ helm upgrade --install armo armo/armo-cluster-components -n armo-system --creat
4343
| armoCollector.affinity | object | `{}` | Assign custom [affinity](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) rules to the StatefulSet |
4444
| armoCollector.enabled | bool | `true` | enable/disable the armoCollector |
4545
| armoCollector.env[0] | object | `{"name":"PRINT_REPORT","value":"false"}` | print in verbose mode (print all reported data) |
46-
| armoCollector.image.repository | string | `"quay.io/armosec/cluster-collector"` | [source code](https://github.com/armosec/k8s-armo-collector) (private repo) |
46+
| armoCollector.image.repository | string | `"quay.io/kubescape/kollector"` | [source code](https://github.com/kubescape/kollector) |
4747
| armoCollector.nodeSelector | object | `{}` | [Node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) |
4848
| armoCollector.volumes | object | `[]` | Additional volumes for the collector |
4949
| armoCollector.volumeMounts | object | `[]` | Additional volumeMounts for the collector |
@@ -65,19 +65,21 @@ helm upgrade --install armo armo/armo-cluster-components -n armo-system --creat
6565
| armoKubescapeScanScheduler.volumeMounts | object | `[]` | Additional volumeMounts for scan scheduler |
6666
| armoNotificationService.affinity | object | `{}` | Assign custom [affinity](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) rules to the deployment |
6767
| armoNotificationService.enabled | bool | `true` | enable/disable passing notifications from ARMO SaaS to the armo-web-socket microservice. The notifications are the onDemand scanning and the scanning schedule settings |
68-
| armoNotificationService.image.repository | string | `"quay.io/armosec/notification-server"` | [source code](https://github.com/armosec/capostman) (private repo) |
68+
| armoNotificationService.image.repository | string | `"quay.io/kubescape/gateway"` | [source code](https://github.com/kubescape/gateway) |
6969
| armoNotificationService.nodeSelector | object | `{}` | [Node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) |
7070
| armoNotificationService.volumes | object | `[]` | Additional volumes for the notification service |
7171
| armoNotificationService.volumeMounts | object | `[]` | Additional volumeMounts for the notification service |
7272
| armoVulnScanner.affinity | object | `{}` | Assign custom [affinity](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) rules to the deployment |
7373
| armoVulnScanner.enabled | bool | `true` | enable/disable image vulnerability scanning |
74-
| armoVulnScanner.image.repository | string | `"quay.io/armosec/images-vulnerabilities-scan"` | [source code](https://github.com/armosec/ca-vuln-scan) (private repo) |
74+
| armoVulnScanner.image.repository | string | `"quay.io/kubescape/kubevuln"` | [source code](https://github.com/kubescape/kubevuln) |
7575
| armoVulnScanner.nodeSelector | object | `{}` | [Node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) |
7676
| armoVulnScanner.volumes | object | `[]` | Additional volumes for the image vulnerability scanning |
7777
| armoVulnScanner.volumeMounts | object | `[]` | Additional volumeMounts for the image vulnerability scanning |
78+
| armoVulnScanScheduler.volumes | object | `[]` | Additional volumes for scan scheduler |
79+
| armoVulnScanScheduler.volumeMounts | object | `[]` | Additional volumeMounts for scan scheduler |
7880
| armoWebsocket.affinity | object | `{}` | Assign custom [affinity](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) rules to the deployment |
7981
| armoWebsocket.enabled | bool | `true` | enable/disable kubescape and image vulnerability scanning |
80-
| armoWebsocket.image.repository | string | `"quay.io/armosec/action-trigger"` | [source code](https://github.com/armosec/k8s-ca-websocket) (private repo) |
82+
| armoWebsocket.image.repository | string | `"quay.io/kubescape/kontroller"` | [source code](https://github.com/kubescape/kontroller) |
8183
| armoWebsocket.nodeSelector | object | `{}` | [Node selector](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/) |
8284
| armoWebsocket.volumes | object | `[]` | Additional volumes for the web socket |
8385
| armoWebsocket.volumeMounts | object | `[]` | Additional volumeMounts for the web socket |

charts/armo-components/assets/armo-vulnscan-cronjob-full.yaml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,12 +32,22 @@ apiVersion: batch/v1
3232
mountPath: /home/ks/request-body.json
3333
subPath: request-body.json
3434
readOnly: true
35+
{{- if .Values.volumeMounts }}
36+
{{ toYaml .Values.volumeMounts | indent 18 }}
37+
{{- end }}
38+
{{- if .Values.armoVulnScanScheduler.volumeMounts }}
39+
{{ toYaml .Values.armoVulnScanScheduler.volumeMounts | indent 18 }}
40+
{{- end }}
3541
restartPolicy: Never
3642
automountServiceAccountToken: false
3743
volumes:
3844
- name: "request-body-volume" # placeholder
3945
configMap:
4046
name: {{ .Values.armoVulnScanScheduler.name }}
41-
42-
47+
{{- if .Values.volumes }}
48+
{{ toYaml .Values.volumes | indent 16 }}
49+
{{- end }}
50+
{{- if .Values.armoVulnScanScheduler.volumes }}
51+
{{ toYaml .Values.armoVulnScanScheduler.volumes | indent 16 }}
52+
{{- end }}
4353

charts/armo-components/values.yaml

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -175,9 +175,9 @@ armoWebsocket:
175175
name: armo-web-socket
176176

177177
image:
178-
# -- source code: https://github.com/armosec/k8s-ca-websocket (private repo)
179-
repository: quay.io/armosec/action-trigger
180-
tag: v0.0.58
178+
# -- source code: https://github.com/kubescape/kontroller
179+
repository: quay.io/kubescape/kontroller
180+
tag: v0.0.60
181181
pullPolicy: Always
182182

183183
service:
@@ -232,6 +232,12 @@ armoVulnScanScheduler:
232232

233233
replicaCount: 1
234234

235+
# Additional volumes to be mounted on the vuln scan scheduler
236+
volumes: []
237+
238+
# Additional volumeMounts to be mounted on the vuln scan scheduler
239+
volumeMounts: []
240+
235241
# image vulnerability scanning microservice
236242
armoVulnScanner:
237243

@@ -245,9 +251,9 @@ armoVulnScanner:
245251
name: armo-vuln-scan
246252

247253
image:
248-
# -- source code: https://github.com/armosec/ca-vuln-scan (private repo)
249-
repository: quay.io/armosec/images-vulnerabilities-scan
250-
tag: v0.0.32
254+
# -- source code: https://github.com/kubescape/kubevuln
255+
repository: quay.io/kubescape/kubevuln
256+
tag: v0.0.39
251257
pullPolicy: Always
252258

253259
replicaCount: 1
@@ -293,9 +299,9 @@ armoCollector:
293299
name: armo-collector
294300

295301
image:
296-
# -- source code: https://github.com/armosec/k8s-armo-collector (private repo)
297-
repository: quay.io/armosec/cluster-collector
298-
tag: v0.0.23
302+
# -- source code: https://github.com/kubescape/kollector
303+
repository: quay.io/kubescape/kollector
304+
tag: v0.0.24
299305
pullPolicy: Always
300306

301307
replicaCount: 1
@@ -345,9 +351,9 @@ armoNotificationService:
345351
protocol: TCP
346352

347353
image:
348-
# -- source code: https://github.com/armosec/capostman (private repo)
349-
repository: quay.io/armosec/notification-server
350-
tag: v0.0.5
354+
# -- source code: https://github.com/kubescape/gateway
355+
repository: quay.io/kubescape/gateway
356+
tag: v0.0.11
351357
pullPolicy: Always
352358

353359
replicaCount: 1

0 commit comments

Comments
 (0)