diff --git a/templates/aqua/0/docker-compose.yml b/templates/aqua/0/docker-compose.yml index 66f82d9..e6bb5a7 100644 --- a/templates/aqua/0/docker-compose.yml +++ b/templates/aqua/0/docker-compose.yml @@ -1,7 +1,7 @@ version: '2' services: aqua-csp-service: - image: aquasec/csp:2.6.4 + image: aquasec/csp:2.6.3 hostname: aqua-csp environment: BATCH_INSTALL_ENFORCE_MODE: n diff --git a/templates/aqua/0/rancher-compose.yml b/templates/aqua/0/rancher-compose.yml index 77361bd..ee780ac 100644 --- a/templates/aqua/0/rancher-compose.yml +++ b/templates/aqua/0/rancher-compose.yml @@ -1,7 +1,7 @@ .catalog: name: "aqua" - version: "2.6.4" - description: "aqua csp 2.6.4" + version: "2.6.3" + description: "aqua csp 2.6.3" minimum_rancher_version: v1.1.0 questions: - variable: console_port diff --git a/templates/aqua/1/README.md b/templates/aqua/1/README.md new file mode 100644 index 0000000..7ecd10d --- /dev/null +++ b/templates/aqua/1/README.md @@ -0,0 +1,11 @@ +# Aqua +Aqua’s comprehensive, purpose-built platform for container security provides full visibility and control over containerized environments, with tight runtime security controls and intrusion prevention capabilities, at any scale. The platform provides programmatic access to all its functions through an API. +#### Features +- **Continuous Image Assurance:** Scan images for vulnerabilities and malicious behavior, enforce image integrity and permissions from dev to production. +- **Runtime Protection:** Gain real-time visibility into container activity, enforce policies, and detect and prevent configuration errors, exploits and attacks. +- **Docker Security:** Scalable security controls for Docker environments that provide optimal, contextualized hardening and runtime protection.of the entire stack. +- **Network Nano-Segmentation:** Lock down container network activity to permit only legitimate connections in the application context, limiting the "blast radius" in case of an attack. +- **User Access Control:** Fine-grained access control that enforces role-based access privileges at the container level.with full end-user accountability. +- **Auditing & Compliance:** Track and audit events in your containerized applications, with real-time logging of granular event data and SIEM integration. +#### Request a Trial +For trail please contact contact@aquasec.com diff --git a/templates/aqua/1/docker-compose.yml b/templates/aqua/1/docker-compose.yml new file mode 100644 index 0000000..66f82d9 --- /dev/null +++ b/templates/aqua/1/docker-compose.yml @@ -0,0 +1,18 @@ +version: '2' +services: + aqua-csp-service: + image: aquasec/csp:2.6.4 + hostname: aqua-csp + environment: + BATCH_INSTALL_ENFORCE_MODE: n + BATCH_INSTALL_GATEWAY: csp + BATCH_INSTALL_NAME: default + BATCH_INSTALL_TOKEN: aqua-csp + SCALOCK_GATEWAY_NAME: csp + volumes: + - /var/run/docker.sock:/var/run/docker.sock + - /tmp/aqua-data:/var/lib/postgresql/data + ports: + - ${console_port}:8080/tcp + - 3622:3622/tcp + user: root diff --git a/templates/aqua/1/rancher-compose.yml b/templates/aqua/1/rancher-compose.yml new file mode 100644 index 0000000..77361bd --- /dev/null +++ b/templates/aqua/1/rancher-compose.yml @@ -0,0 +1,12 @@ +.catalog: + name: "aqua" + version: "2.6.4" + description: "aqua csp 2.6.4" + minimum_rancher_version: v1.1.0 + questions: + - variable: console_port + description: "Port of the management console" + label: "Console Port" + type: "int" + required: true + default: "9090"