Skip to content

DoD-Platform-One/Rapidfort

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

bigbang-rapidfort

Version: 1.2.5-bb.2 Type: application AppVersion: 1.1.165 Maintenance Track: unknown

BigBang compatible Helm chart for RapidFort

Upstream Release Notes

This package has no upstream release note links on file. Please add some to chart/Chart.yaml under annotations.bigbang.dev/upstreamReleaseNotesMarkdown. Example:

annotations:
  bigbang.dev/upstreamReleaseNotesMarkdown: |
    - [Find our upstream chart's CHANGELOG here](https://link-goes-here/CHANGELOG.md)
    - [and our upstream application release notes here](https://another-link-here/RELEASE_NOTES.md)

Learn More

Pre-Requisites

  • Kubernetes Cluster deployed
  • Kubernetes config installed in ~/.kube/config
  • Helm installed

Install Helm

https://helm.sh/docs/intro/install/

Deployment

  • Clone down the repository
  • cd into directory
helm install bigbang-rapidfort chart/

Values

Key Type Default Description
rapidfort.enabled bool true
rapidfort.sourceType string "git"
rapidfort.git.repo string "https://repo1.dso.mil/platform-one/big-bang/apps/third-party/rapidfort"
rapidfort.git.branch string "main"
rapidfort.git.path string "chart"
rapidfort.helmRepo.repoName string "registry1"
rapidfort.helmRepo.chartName string "rapidfort"
rapidfort.helmRepo.tag string "1.2.4-bb.12"
rapidfort.flux object {}
rapidfort.ingress.gateway string ""
rapidfort.objectStorage.aws_access_key_id string "AKI***" Access key for connecting to object storage endpoint.
rapidfort.objectStorage.aws_secret_access_key string "Fh***" Secret key for connecting to object storage endpoint.
rapidfort.objectStorage.aws_default_region string "us-east-1" Region that bucket is in
rapidfort.objectStorage.s3_bucket string "rapidfort-bucket" Bucket name to use for RapidFort
rapidfort.objectStorage.rf_app_admin string "[email protected]"
rapidfort.objectStorage.rf_app_admin_password string "test123"
rapidfort.objectStorage.imagePullSecret string ""
rapidfort.objectStorage.aws_role_arn string ""
domain string "bigbang.dev"
networkPolicies.enabled bool true
istioOperator.enabled bool true
istio.enabled bool true
neuvector.enabled bool false
kyvernoPolicies.enabled bool false
kyvernoPolicies.values.policies.restrict-image-registries.enabled bool true
kyvernoPolicies.values.policies.restrict-image-registries.validationFailureAction string "Audit"
kyvernoPolicies.values.policies.restrict-image-registries.parameters.allow list ["registry1.dso.mil","public.ecr.aws/rapidfort","274057717848.dkr.ecr.us-east-1.amazonaws.com"] List of allowed registries that images may use
kyvernoPolicies.values.policies.require-non-root-user.enabled bool true
kyvernoPolicies.values.policies.require-non-root-user.validationFailureAction string "audit"
kyvernoPolicies.values.policies.require-non-root-user.parameters.excludeContainers[0] string "isomaster*"
kyvernoPolicies.values.policies.require-non-root-user.parameters.excludeContainers[1] string "runner*"
kyvernoPolicies.values.policies.require-non-root-user.parameters.excludeContainers[2] string "vulnsdb*"
kyvernoPolicies.values.policies.require-non-root-group.enabled bool true
kyvernoPolicies.values.policies.require-non-root-group.validationFailureAction string "audit"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[0] string "mysql*"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[1] string "redis*"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[2] string "filesredis*"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[3] string "lockredis*"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[4] string "keycloak*"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[5] string "runner*"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[6] string "isomaster*"
kyvernoPolicies.values.policies.require-non-root-group.parameters.excludeContainers[7] string "vulnsdb*"
gatekeeper.enabled bool false
gatekeeper.values.controllerManager.resources.limits.cpu string "400m"
gatekeeper.values.controllerManager.resources.limits.memory string "2048Mi"
gatekeeper.values.controllerManager.resources.requests.cpu string "175m"
gatekeeper.values.controllerManager.resources.requests.memory string "512Mi"
gatekeeper.values.violations.allowedDockerRegistries.parameters.repos[0] string "registry1.dso.mil"
gatekeeper.values.violations.allowedDockerRegistries.parameters.repos[1] string "public.ecr.aws/rapidfort"
gatekeeper.values.violations.allowedDockerRegistries.parameters.repos[2] string "274057717848.dkr.ecr.us-east-1.amazonaws.com"
gatekeeper.values.violations.allowedHostFilesystem.parameters.allowedHostPaths[0].pathPrefix string "/var/lib/kubelet/pods"
gatekeeper.values.violations.allowedHostFilesystem.parameters.allowedHostPaths[1].pathPrefix string "/var/run/docker.sock"
gatekeeper.values.violations.allowedHostFilesystem.parameters.allowedHostPaths[1].readOnly bool false
gatekeeper.values.violations.allowedHostFilesystem.parameters.allowedHostPaths[2].pathPrefix string "/tmp"
gatekeeper.values.violations.allowedHostFilesystem.parameters.allowedHostPaths[2].readOnly bool false
gatekeeper.values.violations.allowedHostFilesystem.parameters.excludedResources[0] string "velero/*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[0] string "velero/*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[1] string "rapidfort/aggregator-.*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[2] string "rapidfort/backend-.*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[3] string "rapidfort/fileupload-.*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[4] string "rapidfort/isomaster-.*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[5] string "rapidfort/rfscan-.*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[6] string "rapidfort/runner-.*"
gatekeeper.values.violations.volumeTypes.parameters.excludedResources[7] string "rapidfort/runnerbeat-.*"
gatekeeper.values.violations.restrictedTaint.parameters.excludedResources[0] string "monitoring/monitoring-monitoring-prometheus-node-exporter-.*"
gatekeeper.values.violations.restrictedTaint.parameters.excludedResources[1] string "twistlock/twistlock-defender-ds-.*"
gatekeeper.values.violations.restrictedTaint.parameters.excludedResources[2] string "logging/logging-fluent-bit-.*"
gatekeeper.values.violations.noHostNamespace.parameters.excludedResources string nil
gatekeeper.values.violations.hostNetworking.parameters.excludedResources string nil
jaeger.enabled bool false
kiali.enabled bool false
clusterAuditor.enabled bool false
tempo.enabled bool false
promtail.enabled bool false
loki.enabled bool false
eckOperator.enabled bool false
elasticsearchKibana.enabled bool false
fluentbit.enabled bool false
monitoring.enabled bool false
grafana.enabled bool false
twistlock.enabled bool false
addons.argocd.enabled bool false
addons.authservice.enabled bool false
addons.gitlab.enabled bool false
addons.gitlabRunner.enabled bool false
addons.anchore.enabled bool false
addons.sonarqube.enabled bool false
addons.minioOperator.enabled bool false
addons.minio.enabled bool false
addons.mattermostoperator.enabled bool false
addons.mattermost.enabled bool false
addons.nexus.enabled bool false
addons.velero.enabled bool false
addons.keycloak.enabled bool false
addons.vault.enabled bool false

Contributing

Please see the contributing guide if you are interested in contributing.


This file is programatically generated using helm-docs and some BigBang-specific templates. The gluon repository has instructions for regenerating package READMEs.

rapidfort

Version: 1.2.5-bb.2 Type: application AppVersion: 1.1.165 Maintenance Track: unknown

Automated Container Hardening

Upstream Release Notes

This package has no upstream release note links on file. Please add some to chart/Chart.yaml under annotations.bigbang.dev/upstreamReleaseNotesMarkdown. Example:

annotations:
  bigbang.dev/upstreamReleaseNotesMarkdown: |
    - [Find our upstream chart's CHANGELOG here](https://link-goes-here/CHANGELOG.md)
    - [and our upstream application release notes here](https://another-link-here/RELEASE_NOTES.md)

Learn More

Pre-Requisites

  • Kubernetes Cluster deployed
  • Kubernetes config installed in ~/.kube/config
  • Helm installed

Install Helm

https://helm.sh/docs/intro/install/

Deployment

  • Clone down the repository
  • cd into directory
helm install rapidfort chart/

Values

Key Type Default Description
global.admin string "[email protected]"
global.passwd string "P@ssw0rd!"
global.hostname string "test.example.com"
global.cloud string "eks"
global.type string ""
global.communityservice.enabled bool false
global.imagePullSecrets[0].name string "private-registry"
global.ingress.enabled bool false
global.ingress.className string "nginx"
global.ingress.annotations object {}
global.ingress.tls list []
global.aws object {}
global.keycloak_admin string "keycloakAdmin"
global.keycloak_admin_passwd string "Dz4HEhDCaEEoDPom"
global.keycloak_service_account_client_secret string ""
global.api_key string ""
serviceAccount.create bool true
storageClass.create bool true
storageClass.name string "rf-storage-rw"
db.auth.username string "root"
db.auth.password string "RF-123579"
db.auth.port string "3306"
db.auth.host string "mysql"
db.auth.db_name string "standalone"
db.ssl.enabled bool false
db.ssl.secretName string "rapidfort-db-connection-certs"
db.ssl.certFile string ""
aggregator.enabled bool true
aggregator.replicaCount int 1
aggregator.image string "registry1.dso.mil/ironbank/rapidfort/aggregator-exe:1.1.165-rfhardened"
aggregator.ports object {}
aggregator.ephemeralVolumeClaimTemplates[0].name string "aggregator-data"
aggregator.ephemeralVolumeClaimTemplates[0].accessMode string "ReadWriteOnce"
aggregator.ephemeralVolumeClaimTemplates[0].storageClassName string "{{ .Values.storageClass.name }}"
aggregator.ephemeralVolumeClaimTemplates[0].size string "29Gi"
aggregator.volumes list []
aggregator.volumeMounts[0].name string "aggregator-data"
aggregator.volumeMounts[0].mountPath string "/mnt/raid/aggregator"
aggregator.initContainers list []
aggregator.podSecurityContext.fsGroup int 1000
aggregator.containerSecurityContext object {}
aggregator.service object {}
aggregator.ingress object {}
aggregator.resources.limits.cpu string "2000m"
aggregator.resources.limits.memory string "4096Mi"
aggregator.resources.requests.cpu string "500m"
aggregator.resources.requests.memory string "512Mi"
aggregator.envVars.RF_API_SERVER string "iso-master"
aggregator.envVars.RF_DEBUG string "no"
aggregator.envVarsSecret[0] string "RF_S3_BUCKET"
aggregator.envVarsSecret[1] string "RF_STORAGE_TYPE"
aggregator.envVarsSecret[2] string "AWS_ACCESS_KEY_ID"
aggregator.envVarsSecret[3] string "AWS_DEFAULT_REGION"
aggregator.envVarsSecret[4] string "AWS_SECRET_ACCESS_KEY"
aggregator.envVarsSecret[5] string "RF_GS_CREDS"
aggregator.envVarsSecret[6] string "RF_ROLE_ARN"
aggregator.envVarsSecret[7] string "RF_APP_HOST"
aggregator.envVarsSecret[8] string "DEPLOY_MODE"
aggregator.envVarsSecret[9] string "RF_VERBOSE"
aggregator.envVarsSecret[10] string "RF_AZURE_CONNECTION_STRING"
aggregator.startupProbe object {}
aggregator.livenessProbe object {}
aggregator.readinessProbe object {}
backend.enabled bool true
backend.replicaCount int 1
backend.image string "registry1.dso.mil/ironbank/rapidfort/backend-exe:1.1.165-rfhardened"
backend.ports[0].name string "http"
backend.ports[0].containerPort int 8080
backend.ephemeralVolumeClaimTemplates list []
backend.volumes[0].name string "imgs-work-dir"
backend.volumes[0].emptyDir.sizeLimit string "10Gi"
backend.volumeMounts[0].name string "imgs-work-dir"
backend.volumeMounts[0].mountPath string "/opt/rapidfort/backend/app/imgs_work_dir"
backend.initContainers list []
backend.podSecurityContext object {}
backend.containerSecurityContext object {}
backend.service.type string "ClusterIP"
backend.service.port int 80
backend.service.targetPort int 8080
backend.ingress.className string ""
backend.ingress.annotations."nginx.ingress.kubernetes.io/proxy-read-timeout" string "3600"
backend.ingress.annotations."nginx.ingress.kubernetes.io/server-snippet" string "gzip on;\ngzip_disable \"MSIE [1-6]\\.(?!.*SV1)\"\ngzip_vary on;\ngzip_proxied any;\ngzip_comp_level 5;\ngzip_min_length 512;\ngzip_buffers 16 128k;\ngzip_http_version 1.0;\ngzip_types application/json;\n"
backend.ingress.hosts[0].host string nil
backend.ingress.hosts[0].paths[0].path string "/api/v1/"
backend.ingress.hosts[0].paths[0].pathType string "Prefix"
backend.resources.limits.cpu string "2000m"
backend.resources.limits.memory string "4096Mi"
backend.resources.requests.cpu string "500m"
backend.resources.requests.memory string "512Mi"
backend.envVars.AUTH_SERVER_ROOT_URL string "http://keycloak"
backend.envVars.LC_ALL string "en_US.UTF-8"
backend.envVars.QUAY_ENABLED_RF_APP_HOST string "preprod.azure.rapidfort.io us01.rapidfort.com"
backend.envVarsSecret[0] string "RF_APP_HOST"
backend.envVarsSecret[1] string "DB_URL"
backend.envVarsSecret[2] string "DEPLOY_MODE"
backend.envVarsSecret[3] string "RF_VERBOSE"
backend.envVarsSecret[4] string "RF_APP_ADMIN"
backend.envVarsSecret[5] string "RF_APP_ADMIN_PASSWD"
backend.envVarsSecret[6] string "RF_STORAGE_TYPE"
backend.envVarsSecret[7] string "RF_S3_BUCKET"
backend.envVarsSecret[8] string "AWS_ACCESS_KEY_ID"
backend.envVarsSecret[9] string "AWS_DEFAULT_REGION"
backend.envVarsSecret[10] string "AWS_SECRET_ACCESS_KEY"
backend.envVarsSecret[11] string "RF_ROLE_ARN"
backend.envVarsSecret[12] string "RF_GS_CREDS"
backend.envVarsSecret[13] string "RF_AZURE_CONNECTION_STRING"
backend.envVarsSecret[14] string "KEYCLOAK_JWT_PUB_KEY"
backend.envVarsSecret[15] string "KEYCLOAK_CLIENT_ID"
backend.envVarsSecret[16] string "KEYCLOAK_REALM"
backend.envVarsSecret[17] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_ID"
backend.envVarsSecret[18] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_SECRET"
backend.envVarsSecret[19] string "QUAY_TOKEN"
backend.envVarsSecret[20] string "KEYCLOAK_ADMIN"
backend.envVarsSecret[21] string "KEYCLOAK_ADMIN_PASSWORD"
backend.envVarsSecret[22] string "ONBOARD_API_KEY"
backend.startupProbe object {}
backend.livenessProbe.httpGet.path string "/"
backend.livenessProbe.httpGet.port int 8080
backend.livenessProbe.failureThreshold int 10
backend.readinessProbe.httpGet.path string "/"
backend.readinessProbe.httpGet.port int 8080
backend.readinessProbe.failureThreshold int 10
filesredis.enabled bool true
filesredis.replicaCount int 1
filesredis.image string "registry1.dso.mil/ironbank/bitnami/redis:7.2.4"
filesredis.ports[0].containerPort int 6379
filesredis.ports[0].name string "redis"
filesredis.volumeClaimTemplates[0].name string "redis-data"
filesredis.volumeClaimTemplates[0].accessMode string "ReadWriteOnce"
filesredis.volumeClaimTemplates[0].storageClassName string "{{ .Values.storageClass.name }}"
filesredis.volumeClaimTemplates[0].size string "256Gi"
filesredis.volumeMounts[0].name string "redis-data"
filesredis.volumeMounts[0].mountPath string "/bitnami/redis/data"
filesredis.initContainers[0].name string "disk-init"
filesredis.initContainers[0].image string "registry1.dso.mil/ironbank/redhat/ubi/ubi8-minimal:8.9"
filesredis.initContainers[0].command[0] string "chown"
filesredis.initContainers[0].command[1] string "1001"
filesredis.initContainers[0].command[2] string "/opt/rapidfort/local-bucket/data/files-redis"
filesredis.initContainers[0].volumeMounts[0].name string "redis-data"
filesredis.initContainers[0].volumeMounts[0].mountPath string "/opt/rapidfort/local-bucket/data/files-redis"
filesredis.podSecurityContext object {}
filesredis.containerSecurityContext object {}
filesredis.service.type string "ClusterIP"
filesredis.service.port int 6379
filesredis.ingress object {}
filesredis.resources.limits.cpu string "2"
filesredis.resources.limits.memory string "6144Mi"
filesredis.resources.requests.cpu string "1"
filesredis.resources.requests.memory string "2048Mi"
filesredis.envVars.ALLOW_EMPTY_PASSWORD string "yes"
filesredis.envVars.REDIS_AOF_ENABLED string "no"
filesredis.envVarsSecret object {}
filesredis.startupProbe object {}
filesredis.livenessProbe.exec.command[0] string "redis-cli"
filesredis.livenessProbe.exec.command[1] string "ping"
filesredis.livenessProbe.failureThreshold int 10
filesredis.readinessProbe.exec.command[0] string "redis-cli"
filesredis.readinessProbe.exec.command[1] string "ping"
filesredis.readinessProbe.failureThreshold int 10
fileupload.enabled bool true
fileupload.replicaCount int 1
fileupload.image string "registry1.dso.mil/ironbank/rapidfort/fileupload:1.1.165-rfhardened"
fileupload.ports[0].name string "http"
fileupload.ports[0].containerPort int 8080
fileupload.ephemeralVolumeClaimTemplates list []
fileupload.volumes list []
fileupload.volumeMounts list []
fileupload.podSecurityContext object {}
fileupload.containerSecurityContext object {}
fileupload.service.type string "ClusterIP"
fileupload.service.port int 80
fileupload.service.targetPort int 8080
fileupload.ingress.className string ""
fileupload.ingress.annotations."nginx.ingress.kubernetes.io/proxy-read-timeout" string "3600"
fileupload.ingress.annotations."nginx.ingress.kubernetes.io/proxy-buffering" string "off"
fileupload.ingress.annotations."nginx.ingress.kubernetes.io/proxy-body-size" string "10240m"
fileupload.ingress.annotations."nginx.ingress.kubernetes.io/proxy-request-buffering" string "off"
fileupload.ingress.hosts[0].host string nil
fileupload.ingress.hosts[0].paths[0].path string "/upload"
fileupload.ingress.hosts[0].paths[0].pathType string "Exact"
fileupload.ingress.hosts[0].paths[1].path string "/download"
fileupload.ingress.hosts[0].paths[1].pathType string "Prefix"
fileupload.resources object {}
fileupload.envVars object {}
fileupload.envVarsSecret[0] string "DB_URL"
fileupload.envVarsSecret[1] string "RF_S3_BUCKET"
fileupload.envVarsSecret[2] string "RF_STORAGE_TYPE"
fileupload.envVarsSecret[3] string "KEYCLOAK_JWT_PUB_KEY"
fileupload.envVarsSecret[4] string "KEYCLOAK_CLIENT_ID"
fileupload.envVarsSecret[5] string "KEYCLOAK_REALM"
fileupload.envVarsSecret[6] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_ID"
fileupload.envVarsSecret[7] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_SECRET"
fileupload.envVarsSecret[8] string "AWS_DEFAULT_REGION"
fileupload.envVarsSecret[9] string "AWS_ACCESS_KEY_ID"
fileupload.envVarsSecret[10] string "RF_ROLE_ARN"
fileupload.envVarsSecret[11] string "RF_GS_CREDS"
fileupload.envVarsSecret[12] string "RF_AZURE_CONNECTION_STRING"
fileupload.envVarsSecret[13] string "AWS_SECRET_ACCESS_KEY"
fileupload.envVarsSecret[14] string "RF_VERBOSE"
fileupload.startupProbe object {}
fileupload.livenessProbe.httpGet.path string "/"
fileupload.livenessProbe.httpGet.port int 8080
fileupload.livenessProbe.failureThreshold int 99
fileupload.readinessProbe.httpGet.path string "/"
fileupload.readinessProbe.httpGet.port int 8080
fileupload.readinessProbe.failureThreshold int 99
frontrow.enabled bool true
frontrow.replicaCount int 1
frontrow.image string "registry1.dso.mil/ironbank/rapidfort/frontrow:1.1.165-rfhardened"
frontrow.ports[0].name string "http"
frontrow.ports[0].containerPort int 8080
frontrow.volumes object {}
frontrow.volumeMounts object {}
frontrow.initContainers object {}
frontrow.podSecurityContext object {}
frontrow.containerSecurityContext object {}
frontrow.service.type string "ClusterIP"
frontrow.service.port int 80
frontrow.service.targetPort int 8080
frontrow.ingress.className string ""
frontrow.ingress.annotations."nginx.ingress.kubernetes.io/ssl-redirect" string "true"
frontrow.ingress.annotations."nginx.ingress.kubernetes.io/force-ssl-redirect" string "true"
frontrow.ingress.hosts[0].host string nil
frontrow.ingress.hosts[0].paths[0].path string "/"
frontrow.ingress.hosts[0].paths[0].pathType string "Prefix"
frontrow.ingress.hosts[0].paths[1].path string "/cli"
frontrow.ingress.hosts[0].paths[1].pathType string "Prefix"
frontrow.resources object {}
frontrow.envVars object {}
frontrow.envVarsSecret[0] string "RF_APP_HOST"
frontrow.envVarsSecret[1] string "DEPLOY_MODE"
frontrow.startupProbe object {}
frontrow.livenessProbe.httpGet.path string "/"
frontrow.livenessProbe.httpGet.port int 8080
frontrow.livenessProbe.failureThreshold int 10
frontrow.readinessProbe.httpGet.path string "/"
frontrow.readinessProbe.httpGet.port int 8080
frontrow.readinessProbe.failureThreshold int 10
isomaster.enabled bool true
isomaster.replicaCount int 1
isomaster.image string "registry1.dso.mil/ironbank/rapidfort/iso-master-exe:1.1.165-rfhardened"
isomaster.ports[0].name string "http"
isomaster.ports[0].containerPort int 8080
isomaster.ephemeralVolumeClaimTemplates list []
isomaster.volumes[0].name string "imgs-work-dir"
isomaster.volumes[0].emptyDir.sizeLimit string "10Gi"
isomaster.volumeMounts[0].name string "imgs-work-dir"
isomaster.volumeMounts[0].mountPath string "/opt/rapidfort/iso-master/app/imgs_work_dir"
isomaster.initContainers list []
isomaster.serviceAccount object {}
isomaster.podSecurityContext object {}
isomaster.containerSecurityContext object {}
isomaster.service.type string "ClusterIP"
isomaster.service.port int 80
isomaster.service.targetPort int 8080
isomaster.ingress.className string ""
isomaster.ingress.annotations."nginx.ingress.kubernetes.io/proxy-read-timeout" string "3600"
isomaster.ingress.hosts[0].host string nil
isomaster.ingress.hosts[0].paths[0].path string "/iso-master/"
isomaster.ingress.hosts[0].paths[0].pathType string "Prefix"
isomaster.resources object {}
isomaster.envVars.LC_ALL string "en_US.UTF-8"
isomaster.envVarsSecret[0] string "DB_URL"
isomaster.envVarsSecret[1] string "AWS_DEFAULT_REGION"
isomaster.envVarsSecret[2] string "RF_S3_BUCKET"
isomaster.envVarsSecret[3] string "RF_STORAGE_TYPE"
isomaster.envVarsSecret[4] string "AWS_ACCESS_KEY_ID"
isomaster.envVarsSecret[5] string "AWS_SECRET_ACCESS_KEY"
isomaster.envVarsSecret[6] string "RF_ROLE_ARN"
isomaster.envVarsSecret[7] string "RF_GS_CREDS"
isomaster.envVarsSecret[8] string "RF_AZURE_CONNECTION_STRING"
isomaster.envVarsSecret[9] string "RF_APP_HOST"
isomaster.envVarsSecret[10] string "DEPLOY_MODE"
isomaster.envVarsSecret[11] string "RF_VERBOSE"
isomaster.envVarsSecret[12] string "KEYCLOAK_JWT_PUB_KEY"
isomaster.envVarsSecret[13] string "KEYCLOAK_CLIENT_ID"
isomaster.envVarsSecret[14] string "KEYCLOAK_REALM"
isomaster.envVarsSecret[15] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_ID"
isomaster.envVarsSecret[16] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_SECRET"
isomaster.startupProbe object {}
isomaster.livenessProbe.httpGet.path string "/"
isomaster.livenessProbe.httpGet.port int 8080
isomaster.livenessProbe.failureThreshold int 10
isomaster.readinessProbe.httpGet.path string "/"
isomaster.readinessProbe.httpGet.port int 8080
isomaster.readinessProbe.failureThreshold int 10
keycloak.enabled bool true
keycloak.replicaCount int 1
keycloak.image string "registry1.dso.mil/ironbank/rapidfort/keycloak:24.0.1"
keycloak.ports[0].name string "http"
keycloak.ports[0].containerPort int 8080
keycloak.volumes object {}
keycloak.volumeMounts object {}
keycloak.podSecurityContext object {}
keycloak.containerSecurityContext object {}
keycloak.service.type string "ClusterIP"
keycloak.service.port int 80
keycloak.service.healthPort int 9000
keycloak.service.targetPort string "http"
keycloak.service.targetHealthPort string "http"
keycloak.ingress.enabled bool false
keycloak.ingress.className string ""
keycloak.ingress.annotations string nil
keycloak.ingress.hosts[0].host string nil
keycloak.ingress.hosts[0].paths[0].path string "/auth/"
keycloak.ingress.hosts[0].paths[0].pathType string "Prefix"
keycloak.resources object {}
keycloak.envVars object {}
keycloak.envVarsSecret[0] string "KC_DB_URL"
keycloak.envVarsSecret[1] string "KEYCLOAK_ADMIN"
keycloak.envVarsSecret[2] string "KEYCLOAK_ADMIN_PASSWORD"
keycloak.startupProbe object {}
keycloak.livenessProbe.httpGet.path string "/auth/health/live"
keycloak.livenessProbe.httpGet.port int 8080
keycloak.livenessProbe.failureThreshold int 99
keycloak.readinessProbe.httpGet.path string "/auth/health/ready"
keycloak.readinessProbe.httpGet.port int 8080
keycloak.readinessProbe.failureThreshold int 99
lockredis.enabled bool true
lockredis.replicaCount int 1
lockredis.image string "registry1.dso.mil/ironbank/bitnami/redis:7.2.4"
lockredis.ports[0].containerPort int 6379
lockredis.ports[0].name string "redis"
lockredis.volumeClaimTemplates[0].name string "redis-data"
lockredis.volumeClaimTemplates[0].accessMode string "ReadWriteOnce"
lockredis.volumeClaimTemplates[0].storageClassName string "{{ .Values.storageClass.name }}"
lockredis.volumeClaimTemplates[0].size string "64Gi"
lockredis.volumeMounts[0].name string "redis-data"
lockredis.volumeMounts[0].mountPath string "/bitnami/redis/data"
lockredis.initContainers[0].name string "disk-init"
lockredis.initContainers[0].image string "registry1.dso.mil/ironbank/redhat/ubi/ubi8-minimal:8.9"
lockredis.initContainers[0].command[0] string "chown"
lockredis.initContainers[0].command[1] string "1001"
lockredis.initContainers[0].command[2] string "/opt/rapidfort/local-bucket/data/lock-redis"
lockredis.initContainers[0].volumeMounts[0].name string "redis-data"
lockredis.initContainers[0].volumeMounts[0].mountPath string "/opt/rapidfort/local-bucket/data/lock-redis"
lockredis.podSecurityContext object {}
lockredis.containerSecurityContext object {}
lockredis.service.type string "ClusterIP"
lockredis.service.port int 6379
lockredis.ingress object {}
lockredis.resources object {}
lockredis.envVars.ALLOW_EMPTY_PASSWORD string "yes"
lockredis.envVars.REDIS_AOF_ENABLED string "no"
lockredis.envVarsSecret object {}
lockredis.startupProbe object {}
lockredis.livenessProbe.exec.command[0] string "redis-cli"
lockredis.livenessProbe.exec.command[1] string "ping"
lockredis.livenessProbe.failureThreshold int 10
lockredis.readinessProbe.exec.command[0] string "redis-cli"
lockredis.readinessProbe.exec.command[1] string "ping"
lockredis.readinessProbe.failureThreshold int 10
mysql.enabled bool true
mysql.replicaCount int 1
mysql.image string "registry1.dso.mil/ironbank/bitnami/mysql8:8.0.36-debian-11-r1"
mysql.ports[0].name string "mysql"
mysql.ports[0].containerPort int 3306
mysql.volumes[0].name string "mysql-initdb"
mysql.volumes[0].configMap.name string "mysql-initdb-config"
mysql.volumeMounts[0].name string "mysql-data"
mysql.volumeMounts[0].mountPath string "/bitnami/mysql/data"
mysql.volumeMounts[1].name string "mysql-initdb"
mysql.volumeMounts[1].mountPath string "/docker-entrypoint-initdb.d"
mysql.volumeClaimTemplates[0].name string "mysql-data"
mysql.volumeClaimTemplates[0].accessMode string "ReadWriteOnce"
mysql.volumeClaimTemplates[0].storageClassName string "{{ .Values.storageClass.name }}"
mysql.volumeClaimTemplates[0].size string "256Gi"
mysql.initContainers[0].name string "disk-init"
mysql.initContainers[0].image string "registry1.dso.mil/ironbank/redhat/ubi/ubi8-minimal:8.9"
mysql.initContainers[0].command[0] string "chown"
mysql.initContainers[0].command[1] string "1001"
mysql.initContainers[0].command[2] string "/opt/rapidfort/local-bucket/data/mysql"
mysql.initContainers[0].volumeMounts[0].name string "mysql-data"
mysql.initContainers[0].volumeMounts[0].mountPath string "/opt/rapidfort/local-bucket/data/mysql"
mysql.podSecurityContext object {}
mysql.containerSecurityContext object {}
mysql.ingress object {}
mysql.resources object {}
mysql.envVars.MYSQL_DATABASE string "keycloak"
mysql.envVars.MYSQL_AUTHENTICATION_PLUGIN string "mysql_native_password"
mysql.envVarsSecret object {}
mysql.startupProbe object {}
mysql.livenessProbe.exec.command[0] string "mysql"
mysql.livenessProbe.exec.command[1] string "-h"
mysql.livenessProbe.exec.command[2] string "localhost"
mysql.livenessProbe.exec.command[3] string "-u"
mysql.livenessProbe.exec.command[4] string "{{ .Values.db.auth.username }}"
mysql.livenessProbe.exec.command[5] string "-p{{ .Values.db.auth.password }}"
mysql.livenessProbe.exec.command[6] string "-e"
mysql.livenessProbe.exec.command[7] string "SHOW DATABASES;"
mysql.livenessProbe.failureThreshold int 10
mysql.readinessProbe.exec.command[0] string "mysql"
mysql.readinessProbe.exec.command[1] string "-h"
mysql.readinessProbe.exec.command[2] string "localhost"
mysql.readinessProbe.exec.command[3] string "-u"
mysql.readinessProbe.exec.command[4] string "{{ .Values.db.auth.username }}"
mysql.readinessProbe.exec.command[5] string "-p{{ .Values.db.auth.password }}"
mysql.readinessProbe.exec.command[6] string "-e"
mysql.readinessProbe.exec.command[7] string "SHOW DATABASES;"
mysql.readinessProbe.failureThreshold int 10
redis.enabled bool true
redis.replicaCount int 1
redis.image string "registry1.dso.mil/ironbank/bitnami/redis:7.2.4"
redis.ports[0].containerPort int 6379
redis.ports[0].name string "redis"
redis.volumeMounts[0].name string "redis-data"
redis.volumeMounts[0].mountPath string "/bitnami/redis/data"
redis.volumeClaimTemplates[0].name string "redis-data"
redis.volumeClaimTemplates[0].accessMode string "ReadWriteOnce"
redis.volumeClaimTemplates[0].storageClassName string "{{ .Values.storageClass.name }}"
redis.volumeClaimTemplates[0].size string "128Gi"
redis.initContainers[0].name string "disk-init"
redis.initContainers[0].image string "registry1.dso.mil/ironbank/redhat/ubi/ubi8-minimal:8.9"
redis.initContainers[0].command[0] string "chown"
redis.initContainers[0].command[1] string "1001"
redis.initContainers[0].command[2] string "/opt/rapidfort/local-bucket/data/redis"
redis.initContainers[0].volumeMounts[0].name string "redis-data"
redis.initContainers[0].volumeMounts[0].mountPath string "/opt/rapidfort/local-bucket/data/redis"
redis.podSecurityContext object {}
redis.containerSecurityContext object {}
redis.service.type string "ClusterIP"
redis.service.port int 6379
redis.ingress object {}
redis.resources.limits.cpu string "2"
redis.resources.limits.memory string "6144Mi"
redis.resources.requests.cpu string "1"
redis.resources.requests.memory string "2048Mi"
redis.envVars.ALLOW_EMPTY_PASSWORD string "yes"
redis.envVars.REDIS_AOF_ENABLED string "no"
redis.envVarsSecret object {}
redis.startupProbe object {}
redis.livenessProbe.exec.command[0] string "redis-cli"
redis.livenessProbe.exec.command[1] string "ping"
redis.livenessProbe.failureThreshold int 10
redis.readinessProbe.exec.command[0] string "redis-cli"
redis.readinessProbe.exec.command[1] string "ping"
redis.readinessProbe.failureThreshold int 10
rfscan.enabled bool true
rfscan.replicaCount int 1
rfscan.image string "registry1.dso.mil/ironbank/rapidfort/rf-scan-exe:1.1.165-rfhardened"
rfscan.ports[0].name string "http"
rfscan.ports[0].containerPort int 8080
rfscan.ephemeralVolumeClaimTemplates list []
rfscan.volumes[0].name string "imgs-work-dir"
rfscan.volumes[0].emptyDir.sizeLimit string "10Gi"
rfscan.volumeMounts[0].name string "imgs-work-dir"
rfscan.volumeMounts[0].mountPath string "/opt/rapidfort/iso-master/app/imgs_work_dir"
rfscan.initContainers list []
rfscan.serviceAccount object {}
rfscan.podSecurityContext object {}
rfscan.containerSecurityContext object {}
rfscan.service.type string "ClusterIP"
rfscan.service.port int 80
rfscan.service.targetPort int 8080
rfscan.ingress.className string ""
rfscan.ingress.annotations."nginx.ingress.kubernetes.io/proxy-read-timeout" string "3600"
rfscan.ingress.hosts[0].host string nil
rfscan.ingress.hosts[0].paths[0].path string "/rf-scan/"
rfscan.ingress.hosts[0].paths[0].pathType string "Prefix"
rfscan.resources object {}
rfscan.envVars.LC_ALL string "en_US.UTF-8"
rfscan.envVarsSecret[0] string "AWS_DEFAULT_REGION"
rfscan.envVarsSecret[1] string "DB_URL"
rfscan.envVarsSecret[2] string "RF_S3_BUCKET"
rfscan.envVarsSecret[3] string "RF_STORAGE_TYPE"
rfscan.envVarsSecret[4] string "AWS_ACCESS_KEY_ID"
rfscan.envVarsSecret[5] string "AWS_SECRET_ACCESS_KEY"
rfscan.envVarsSecret[6] string "RF_ROLE_ARN"
rfscan.envVarsSecret[7] string "RF_GS_CREDS"
rfscan.envVarsSecret[8] string "KEYCLOAK_JWT_PUB_KEY"
rfscan.envVarsSecret[9] string "KEYCLOAK_REALM"
rfscan.envVarsSecret[10] string "KEYCLOAK_CLIENT_ID"
rfscan.envVarsSecret[11] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_ID"
rfscan.envVarsSecret[12] string "KEYCLOAK_SERVICE_ACCOUNT_CLIENT_SECRET"
rfscan.envVarsSecret[13] string "RF_APP_HOST"
rfscan.envVarsSecret[14] string "DEPLOY_MODE"
rfscan.envVarsSecret[15] string "RF_VERBOSE"
rfscan.envVarsSecret[16] string "RF_AZURE_CONNECTION_STRING"
rfscan.startupProbe object {}
rfscan.livenessProbe.httpGet.path string "/"
rfscan.livenessProbe.httpGet.port int 8080
rfscan.livenessProbe.failureThreshold int 10
rfscan.readinessProbe.httpGet.path string "/"
rfscan.readinessProbe.httpGet.port int 8080
rfscan.readinessProbe.failureThreshold int 10
rfapi.enabled bool true
rfapi.replicaCount int 1
rfapi.image string "registry1.dso.mil/ironbank/rapidfort/rfapi-exe:1.1.165-rfhardened"
rfapi.ports[0].name string "http"
rfapi.ports[0].containerPort int 8080
rfapi.volumes object {}
rfapi.volumeMounts object {}
rfapi.initContainers list []
rfapi.service.port int 80
rfapi.service.targetPort int 8080
rfapi.ingress.ingressClassName string ""
rfapi.ingress.http.annotations."nginx.ingress.kubernetes.io/proxy-read-timeout" string "3600"
rfapi.ingress.http.hosts[0].host string nil
rfapi.ingress.http.hosts[0].paths[0].path string "/rfapi/"
rfapi.ingress.http.hosts[0].paths[0].pathType string "Prefix"
rfapi.ingress.websocket.annotations."nginx.ingress.kubernetes.io/configuration-snippet" string "proxy_set_header Upgrade \"websocket\";\nproxy_set_header Connection \"Upgrade\";\n"
rfapi.ingress.websocket.annotations."nginx.ingress.kubernetes.io/proxy-read-timeout" string "3600"
rfapi.ingress.websocket.annotations."nginx.ingress.kubernetes.io/proxy-send-timeout" string "3600"
rfapi.ingress.websocket.annotations."nginx.ingress.kubernetes.io/server-snippets" string "location /rfapi/events {\n proxy_set_header X-Forwarded-Host $http_host;\n proxy_set_header X-Forwarded-Proto $scheme;\n proxy_set_header X-Forwarded-For $remote_addr;\n proxy_set_header Host $host;\n}\n"
rfapi.ingress.websocket.hosts[0].host string nil
rfapi.ingress.websocket.hosts[0].paths[0].path string "/rfapi/events"
rfapi.ingress.websocket.hosts[0].paths[0].pathType string "Prefix"
rfapi.resources object {}
rfapi.envVars object {}
rfapi.envVarsSecret object {}
rfapi.startupProbe object {}
rfapi.livenessProbe object {}
rfapi.readinessProbe object {}
rfpubsub.enabled bool true
rfpubsub.replicaCount int 1
rfpubsub.image string "registry1.dso.mil/ironbank/rapidfort/rfpubsub-exe:1.1.165-rfhardened"
rfpubsub.ports[0].name string "http"
rfpubsub.ports[0].containerPort int 8080
rfpubsub.volumes object {}
rfpubsub.volumeMounts object {}
rfpubsub.initContainers list []
rfpubsub.podSecurityContext object {}
rfpubsub.containerSecurityContext object {}
rfpubsub.service.type string "ClusterIP"
rfpubsub.service.port int 80
rfpubsub.service.targetPort int 8080
rfpubsub.ingress.className string ""
rfpubsub.ingress.annotations."nginx.ingress.kubernetes.io/configuration-snippet" string "proxy_set_header Upgrade \"websocket\";\nproxy_set_header Connection \"Upgrade\";\n"
rfpubsub.ingress.annotations."nginx.ingress.kubernetes.io/proxy-read-timeout" string "3600"
rfpubsub.ingress.annotations."nginx.ingress.kubernetes.io/proxy-send-timeout" string "3600"
rfpubsub.ingress.annotations."nginx.ingress.kubernetes.io/server-snippets" string "location /rfpubsub/events {\n proxy_set_header X-Forwarded-Host $http_host;\n proxy_set_header X-Forwarded-Proto $scheme;\n proxy_set_header X-Forwarded-For $remote_addr;\n proxy_set_header Host $host;\n}\n"
rfpubsub.ingress.hosts[0].host string nil
rfpubsub.ingress.hosts[0].paths[0].path string "/rfpubsub"
rfpubsub.ingress.hosts[0].paths[0].pathType string "Prefix"
rfpubsub.resources object {}
rfpubsub.envVars.RFPUBSUB_WS_PORT int 8080
rfpubsub.envVars.API_KEY string "03f4b34739f506f88c9bbc3410b5d070"
rfpubsub.envVars.RF_API_SERVER string "iso-master"
rfpubsub.envVarsSecret object {}
rfpubsub.startupProbe object {}
rfpubsub.livenessProbe object {}
rfpubsub.readinessProbe object {}
runner.enabled bool true
runner.replicaCount int 1
runner.image string "registry1.dso.mil/ironbank/rapidfort/runner:1.1.165-rfhardened"
runner.ports[0].name string "http"
runner.ports[0].containerPort int 8080
runner.ephemeralVolumeClaimTemplates[0].name string "var-lib-containers"
runner.ephemeralVolumeClaimTemplates[0].accessMode string "ReadWriteOnce"
runner.ephemeralVolumeClaimTemplates[0].storageClassName string "{{ .Values.storageClass.name }}"
runner.ephemeralVolumeClaimTemplates[0].size string "256Gi"
runner.volumes list []
runner.volumeMounts[0].name string "var-lib-containers"
runner.volumeMounts[0].mountPath string "/var/lib/containers"
runner.initContainers list []
runner.podSecurityContext object {}
runner.containerSecurityContext object {}
runner.service.type string "ClusterIP"
runner.service.port int 80
runner.service.targetPort int 8080
runner.ingress.className string ""
runner.ingress.annotations string nil
runner.ingress.hosts[0].host string nil
runner.ingress.hosts[0].paths[0].path string "/runner/"
runner.ingress.hosts[0].paths[0].pathType string "Prefix"
runner.resources object {}
runner.envVars.RFVDB_HOST string "frontrow.rapidfort.com"
runner.envVars.RF_CONTAINER_ENGINE string "podman"
runner.envVars.RF_INTERNAL int 1
runner.envVars.RF_DEBUG string "no"
runner.envVarsSecret[0] string "RF_APP_HOST"
runner.envVarsSecret[1] string "DB_URL"
runner.envVarsSecret[2] string "DEPLOY_MODE"
runner.envVarsSecret[3] string "RF_VERBOSE"
runner.envVarsSecret[4] string "RF_APP_ADMIN"
runner.envVarsSecret[5] string "RF_APP_ADMIN_PASSWD"
runner.envVarsSecret[6] string "RF_STORAGE_TYPE"
runner.envVarsSecret[7] string "RF_S3_BUCKET"
runner.envVarsSecret[8] string "AWS_ACCESS_KEY_ID"
runner.envVarsSecret[9] string "AWS_DEFAULT_REGION"
runner.envVarsSecret[10] string "AWS_SECRET_ACCESS_KEY"
runner.envVarsSecret[11] string "RF_ROLE_ARN"
runner.envVarsSecret[12] string "RF_GS_CREDS"
runner.envVarsSecret[13] string "RF_AZURE_CONNECTION_STRING"
runner.envVarsSecret[14] string "KEYCLOAK_JWT_PUB_KEY"
runner.startupProbe object {}
runner.livenessProbe.httpGet.path string "/"
runner.livenessProbe.httpGet.port int 8080
runner.livenessProbe.failureThreshold int 10
runner.readinessProbe.httpGet.path string "/"
runner.readinessProbe.httpGet.port int 8080
runner.readinessProbe.failureThreshold int 10
rfvdb.enabled bool false
rfvdb.replicaCount int 1
rfvdb.image string "registry1.dso.mil/ironbank/rapidfort/rfvdb:1.1.45-rfhardened"
rfvdb.ports[0].name string "http"
rfvdb.ports[0].containerPort int 8080
rfvdb.volumes object {}
rfvdb.volumeMounts object {}
rfvdb.initContainers list []
rfvdb.podSecurityContext object {}
rfvdb.containerSecurityContext object {}
rfvdb.service.type string "ClusterIP"
rfvdb.service.port int 80
rfvdb.service.targetPort int 8080
rfvdb.ingress.className string ""
rfvdb.ingress.annotations."nginx.ingress.kubernetes.io/proxy-body-size" string "1250m"
rfvdb.ingress.hosts[0].host string nil
rfvdb.ingress.hosts[0].paths[0].path string "/rfvdb/"
rfvdb.ingress.hosts[0].paths[0].pathType string "Prefix"
rfvdb.resources object {}
rfvdb.envVars.RF_DEBUG string "no"
rfvdb.envVars.RF_RFVDB_PORT string "8080"
rfvdb.envVarsSecret[0] string "RF_S3_BUCKET"
rfvdb.envVarsSecret[1] string "RF_STORAGE_TYPE"
rfvdb.envVarsSecret[2] string "AWS_ACCESS_KEY_ID"
rfvdb.envVarsSecret[3] string "AWS_DEFAULT_REGION"
rfvdb.envVarsSecret[4] string "AWS_SECRET_ACCESS_KEY"
rfvdb.envVarsSecret[5] string "RF_GS_CREDS"
rfvdb.envVarsSecret[6] string "RF_ROLE_ARN"
rfvdb.envVarsSecret[7] string "RF_APP_HOST"
rfvdb.envVarsSecret[8] string "DEPLOY_MODE"
rfvdb.envVarsSecret[9] string "RF_VERBOSE"
rfvdb.envVarsSecret[10] string "RF_AZURE_CONNECTION_STRING"
rfvdb.livenessProbe.httpGet.path string "/"
rfvdb.livenessProbe.httpGet.port int 8080
rfvdb.livenessProbe.failureThreshold int 10
rfvdb.readinessProbe.httpGet.path string "/"
rfvdb.readinessProbe.httpGet.port int 8080
rfvdb.readinessProbe.failureThreshold int 10
vulnsdb.enabled bool true
vulnsdb.replicaCount int 1
vulnsdb.image string "registry1.dso.mil/ironbank/rapidfort/vulns-db:1.1.165-rfhardened"
vulnsdb.ports[0].name string "http"
vulnsdb.ports[0].containerPort int 8080
vulnsdb.volumes object {}
vulnsdb.volumeMounts object {}
vulnsdb.initContainers list []
vulnsdb.podSecurityContext object {}
vulnsdb.containerSecurityContext object {}
vulnsdb.service.type string "ClusterIP"
vulnsdb.service.port int 80
vulnsdb.service.targetPort int 8080
vulnsdb.ingress.className string ""
vulnsdb.ingress.annotations."nginx.ingress.kubernetes.io/proxy-body-size" string "250m"
vulnsdb.ingress.hosts[0].host string nil
vulnsdb.ingress.hosts[0].paths[0].path string "/vulns-db/"
vulnsdb.ingress.hosts[0].paths[0].pathType string "Prefix"
vulnsdb.resources.limits.cpu string "2"
vulnsdb.resources.limits.memory string "4096Mi"
vulnsdb.resources.requests.cpu string "1"
vulnsdb.resources.requests.memory string "512Mi"
vulnsdb.envVars.RFVDB_HOST string "vulndb.rapidfort.com"
vulnsdb.envVars.RF_DEBUG string "no"
vulnsdb.envVars.REDIS_AOF_ENABLED string "no"
vulnsdb.envVarsSecret object {}
vulnsdb.startupProbe object {}
vulnsdb.livenessProbe.httpGet.path string "/"
vulnsdb.livenessProbe.httpGet.port int 8080
vulnsdb.livenessProbe.failureThreshold int 10
vulnsdb.readinessProbe.httpGet.path string "/"
vulnsdb.readinessProbe.httpGet.port int 8080
vulnsdb.readinessProbe.failureThreshold int 10
domain string "bigbang.dev" Big Bang Values
istio.enabled bool true
istio.mtls.mode string "STRICT" STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic PERMISSIVE is required for any action which redeploys pods because STRICT interferes with initContainers Can be changed to STRICT after all initContainers have finished but will interfere with upgrades/pod deployments that have initContainers
istio.rapidfort.enabled bool true
istio.rapidfort.allowed_rf_host string "us01.rapidfort.com"
istio.rapidfort.gateways[0] string "istio-system/public"
istio.rapidfort.hosts[0] string "rapidfort.{{ .Values.domain }}"
networkPolicies.enabled bool true
networkPolicies.ingressLabels.app string "public-ingressgateway"
networkPolicies.ingressLabels.istio string "ingressgateway"
networkPolicies.rapidfortApiIpRange string "" IP range of api.rapidfort.com
networkPolicies.controlPlaneCidr string "" test
bbtests object {"addons":{"minio":{"enabled":false}},"cypress":{"artifacts":true,"envs":{"cypress_url":"http://test.test"}},"enabled":false,"scripts":{"envs":{"URL":"http://test.test"}}} Bigbang helm test values - default disabled

Contributing

Please see the contributing guide if you are interested in contributing.


This file is programatically generated using helm-docs and some BigBang-specific templates. The gluon repository has instructions for regenerating package READMEs.