diff --git a/templates/aqua/0/README.md b/templates/aqua/0/README.md index 0530088..7ecd10d 100644 --- a/templates/aqua/0/README.md +++ b/templates/aqua/0/README.md @@ -8,6 +8,4 @@ Aqua’s comprehensive, purpose-built platform for container security provides f - **User Access Control:** Fine-grained access control that enforces role-based access privileges at the container level.with full end-user accountability. - **Auditing & Compliance:** Track and audit events in your containerized applications, with real-time logging of granular event data and SIEM integration. #### Request a Trial -For Hong Kong and Singapore, please contact support@edvancesecurity.com
-For China, please contact chinasupport@edvancesecurity.com
-For other region, please contact contact@aquasec.com +For trail please contact contact@aquasec.com diff --git a/templates/aqua/1/README.md b/templates/aqua/1/README.md new file mode 100644 index 0000000..7ecd10d --- /dev/null +++ b/templates/aqua/1/README.md @@ -0,0 +1,11 @@ +# Aqua +Aqua’s comprehensive, purpose-built platform for container security provides full visibility and control over containerized environments, with tight runtime security controls and intrusion prevention capabilities, at any scale. The platform provides programmatic access to all its functions through an API. +#### Features +- **Continuous Image Assurance:** Scan images for vulnerabilities and malicious behavior, enforce image integrity and permissions from dev to production. +- **Runtime Protection:** Gain real-time visibility into container activity, enforce policies, and detect and prevent configuration errors, exploits and attacks. +- **Docker Security:** Scalable security controls for Docker environments that provide optimal, contextualized hardening and runtime protection.of the entire stack. +- **Network Nano-Segmentation:** Lock down container network activity to permit only legitimate connections in the application context, limiting the "blast radius" in case of an attack. +- **User Access Control:** Fine-grained access control that enforces role-based access privileges at the container level.with full end-user accountability. +- **Auditing & Compliance:** Track and audit events in your containerized applications, with real-time logging of granular event data and SIEM integration. +#### Request a Trial +For trail please contact contact@aquasec.com diff --git a/templates/aqua/1/docker-compose.yml b/templates/aqua/1/docker-compose.yml new file mode 100644 index 0000000..66f82d9 --- /dev/null +++ b/templates/aqua/1/docker-compose.yml @@ -0,0 +1,18 @@ +version: '2' +services: + aqua-csp-service: + image: aquasec/csp:2.6.4 + hostname: aqua-csp + environment: + BATCH_INSTALL_ENFORCE_MODE: n + BATCH_INSTALL_GATEWAY: csp + BATCH_INSTALL_NAME: default + BATCH_INSTALL_TOKEN: aqua-csp + SCALOCK_GATEWAY_NAME: csp + volumes: + - /var/run/docker.sock:/var/run/docker.sock + - /tmp/aqua-data:/var/lib/postgresql/data + ports: + - ${console_port}:8080/tcp + - 3622:3622/tcp + user: root diff --git a/templates/aqua/1/rancher-compose.yml b/templates/aqua/1/rancher-compose.yml new file mode 100644 index 0000000..77361bd --- /dev/null +++ b/templates/aqua/1/rancher-compose.yml @@ -0,0 +1,12 @@ +.catalog: + name: "aqua" + version: "2.6.4" + description: "aqua csp 2.6.4" + minimum_rancher_version: v1.1.0 + questions: + - variable: console_port + description: "Port of the management console" + label: "Console Port" + type: "int" + required: true + default: "9090" diff --git a/templates/aqua/config.yml b/templates/aqua/config.yml index 57fa6cb..4d3463c 100644 --- a/templates/aqua/config.yml +++ b/templates/aqua/config.yml @@ -1,5 +1,5 @@ name: Aqua description: | Aqua Container Security Platform -version: 2.6.3 +version: 2.6.4 category: Security