forked from threatstack/threatstack-helm
-
Notifications
You must be signed in to change notification settings - Fork 0
/
values.yaml
177 lines (158 loc) · 5.56 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
### Overriding default helm chart/kubernetes object names
nameOverride: ""
fullnameOverride: ""
imagePullSecrets: []
## Set the appropriate variable to true for your node OS type, if running on GKE
## NOTE: DO NOT MODIFY THESE! If you want custom commands, use the`customDaemonsetCmd` attributes
# Using ContainerOS nodes
gkeContainerOs: false
gkeContainerOsCmd:
command: ["bash"]
args: ["-c", "chroot /threatstackfs /bin/bash -c 'systemctl stop systemd-journald-audit.socket; systemctl mask systemd-journald-audit.socket; systemctl restart systemd-journald; auditctl --backlog_wait_time 0'; eval tsagent setup $THREATSTACK_SETUP_ARGS; eval tsagent config --set $THREATSTACK_CONFIG_ARGS; sleep 5; /opt/threatstack/sbin/tsagentd -logstdout"]
# Using Ubuntu nodes
gkeUbuntu: false
gkeUbuntuCmd:
command: ["bash"]
args: ["-c", "chroot /threatstackfs /bin/bash -c 'systemctl stop auditd; systemctl disable auditd'; eval tsagent setup $THREATSTACK_SETUP_ARGS; eval tsagent config --set $THREATSTACK_CONFIG_ARGS; sleep 5; /opt/threatstack/sbin/tsagentd -logstdout"]
# Uncomment and set child attributes to execute custom commands in your container
customDaemonsetCmd:
# command: [""]
# args: ["", ""]
### Default values for threatstack-agent chart
image:
repository: threatstack/ts-docker2
version: ""
pullPolicy: Always
### RBAC and namespacing settings for release
# create :: If `true`, the chart will generate a service account
# serviceAccountName :: If `rbac.create` is set to `false`, use this as the service account name
rbac:
create: true
serviceAccountName: "threatstack-agent"
### Threat Stack Agent settings
#
# rulesets :: Define what rules will be applied to the agent by default
# additionalSetupConfig :: Additional parameters passed to the backend during initial agent registration
# additionalConfig :: Additional parameters to configure the running agent
# capabilities :: Docker capabilites required for the proper operation of the agent
rulesets: "Base Rule Set, Docker Rule Set, Kubernetes Rule Set"
additionalSetupConfig: ""
additionalConfig: "log.level info"
capabilities: |
["AUDIT_CONTROL", "AUDIT_READ", "SYS_CHROOT", "CHOWN","DAC_OVERRIDE", "DAC_READ_SEARCH", "FOWNER", "FSETID", "SETGID", "SETUID", "SYS_ADMIN", "SYS_PTRACE"]
#####
# WARNING!
#
# Do not store the deploy key in a source control system!
# Pass this in via an addditional values yaml file when installing this helm chart
#
# Example: `helm install --name threatstack-agent -f values.yaml -f overriding-deploy-key.yaml threatstack-agent`
#
#####
agentDeployKey: ""
#####
#
# Alterntatively, define your own secret, and put the secret's name/key in the child values
#
######
agentSetupExternalSecretRef: {}
# name: ""
# key: ""
#####
#
# Deploy Threat Stack with the Pod Security Policy for clusters with
# strict admission control requirements.
#
#####
podSecurityPolicyEnabled: false
########
#
# API Server reader Deployment settings
#
# This section configures a single-instance ReplicaSet threatstack-agent pod
#
# The pod makes requests to kubernetes api-server to retrieve information
# on the state of the cluster.
#
# NOTE: This pod DOES NOT monitor its node activity.
#
########
apiReader:
# Override the agent's liveness probe logic from the default:
# In case of issues with the probe, you can disable it with the
# following values, to allow easier investigating:
#
# livenessProbe:
# exec:
# command: ["/bin/true"]
# The below values are suggestions. Individual workloads may vary
# and require higher or lower resource requirements. It is
# highly recommended to validate these settings in the target
# environment, and adjust to achieve desired performance.
#
# Ref: http://kubernetes.io/docs/user-guide/compute-resources/
#
# resources:
# requests:
# memory: "256Mi"
# cpu: "200m"
# limits:
# memory: "512Mi"
# cpu: "400m"
# Override kubernetes api reader agent's default target nodes
# Default is any node within the target namespace
#
# Set these as desired to only install the kubernetes api reader agent on
# one of a subset of your kubernetes nodes
nodeSelector: {}
# foo: bar
# Optional
affinity: {}
# Optional
tolerations: []
########
#
# Threat Stack Agent Daemonset settings
#
# This section configures a daemonset of threatstack-agent pods
#
# The pods monitor the activity of other pods/deployments on
# the node.
#
########
daemonset:
# Override the agent's liveness probe logic from the default:
# In case of issues with the probe, you can disable it with the
# following values, to allow easier investigating:
#
# livenessProbe:
# exec:
# command: ["/bin/true"]
# The below values are suggestions. Individual workloads may vary
# and require higher or lower resource requirements. It is
# highly recommended to validate these settings in the target
# environment, and adjust to achieve desired performance.
#
# Ref: http://kubernetes.io/docs/user-guide/compute-resources/
#
#
# resources:
# requests:
# memory: "256Mi"
# cpu: "200m"
# limits:
# memory: "512Mi"
# cpu: "400m"
# Override agent's default target nodes
# Default is all nodes within the target namespace
#
# Set these as desired to only install agent on a subset of your kubernetes nodes.
nodeSelector: {}
# threatstack-agent: "true"
# Optional
affinity: {}
# Optional
tolerations: []
# Optional
# Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/
priorityClassName: ""