11matches the snapshot :
22 1 : |
3- raw : |
4- CHART NAME : minio
5- CHART VERSION : 13.4 .6
6- APP VERSION : 2024.2 .13
7-
8- ** Please be patient while the chart is being deployed **
9-
10- MinIO & reg ; can be accessed via port on the following DNS name from within your cluster :
11-
12- RELEASE - NAME - minio .NAMESPACE .svc .cluster .local
13-
14- To get your credentials run :
15-
16- export ROOT_USER =$ (kubectl get secret --namespace NAMESPACE RELEASE -NAME -minio -o jsonpath =" {.data.root-user}" | base64 -d )
17- export ROOT_PASSWORD =$ (kubectl get secret --namespace NAMESPACE RELEASE -NAME -minio -o jsonpath =" {.data.root-password}" | base64 -d )
18-
19- To connect to your MinIO & reg ; server using a client :
20-
21- - Run a MinIO & reg ; Client pod and append the desired command (e .g . ' admin info' ):
22-
23- kubectl run -- namespace NAMESPACE RELEASE -NAME -minio -client \
24- -- rm -- tty - i -- restart = ' Never' \
25- -- env MINIO_SERVER_ROOT_USER = $ROOT_USER \
26- -- env MINIO_SERVER_ROOT_PASSWORD = $ROOT_PASSWORD \
27- -- env MINIO_SERVER_HOST = RELEASE - NAME - minio \
28- -- image docker .io / bitnami / minio - client :2024.2 .9 - debian - 11 - r7 -- admin info minio
29-
30- To access the MinIO & reg ; web UI :
31-
32- - Get the MinIO & reg ; URL :
33-
34- echo " MinIO® web URL: http://127.0.0.1:9001/minio"
35- kubectl port - forward -- namespace NAMESPACE svc /RELEASE -NAME -minio 9001:9001
36- 2 : |
373 raw : " \n secureCodeBox Operator Deployed \U 0001F680\n\n The operator can orchestrate the execution of various security scanning tools inside of your cluster.\n You can find a list of all officially supported scanners here: https://www.securecodebox.io/\n The website also lists other integrations, like persisting scan results to DefectDojo or Elasticsearch.\n\n The operator send out regular telemetry pings to a central service.\n This lets us, the secureCodeBox team, get a grasp on how much the secureCodeBox is used.\n The submitted data is chosen to be as anonymous as possible.\n You can find a complete report of the data submitted and links to the source-code at: https://www.securecodebox.io/docs/telemetry\n The first ping is send one hour after the install, you can prevent this by upgrading the chart and setting `telemetryEnabled` to `false`.\n "
38- 3 : |
4+ 2 : |
395 apiVersion : apps / v1
406 kind : Deployment
417 metadata :
@@ -139,7 +105,7 @@ matches the snapshot:
139105 - configMap :
140106 name : foo
141107 name : ca - certificate
142- 4 : |
108+ 3 : |
143109 apiVersion : rbac .authorization .k8s .io / v1
144110 kind : ClusterRole
145111 metadata :
@@ -149,7 +115,7 @@ matches the snapshot:
149115 - / metrics
150116 verbs :
151117 - get
152- 5 : |
118+ 4 : |
153119 apiVersion : rbac .authorization .k8s .io / v1
154120 kind : ClusterRole
155121 metadata :
@@ -167,7 +133,7 @@ matches the snapshot:
167133 - subjectaccessreviews
168134 verbs :
169135 - create
170- 6 : |
136+ 5 : |
171137 apiVersion : rbac .authorization .k8s .io / v1
172138 kind : ClusterRoleBinding
173139 metadata :
@@ -180,7 +146,7 @@ matches the snapshot:
180146 - kind : ServiceAccount
181147 name : securecodebox - operator
182148 namespace : NAMESPACE
183- 7 : |
149+ 6 : |
184150 apiVersion : v1
185151 kind : Service
186152 metadata :
@@ -195,7 +161,7 @@ matches the snapshot:
195161 targetPort : https
196162 selector :
197163 control - plane : controller - manager
198- 8 : |
164+ 7 : |
199165 apiVersion : rbac .authorization .k8s .io / v1
200166 kind : ClusterRole
201167 metadata :
@@ -219,7 +185,7 @@ matches the snapshot:
219185 - cascadingrules / status
220186 verbs :
221187 - get
222- 9 : |
188+ 8 : |
223189 apiVersion : rbac .authorization .k8s .io / v1
224190 kind : ClusterRole
225191 metadata :
@@ -239,7 +205,7 @@ matches the snapshot:
239205 - cascadingrules / status
240206 verbs :
241207 - get
242- 10 : |
208+ 9 : |
243209 apiVersion : rbac .authorization .k8s .io / v1
244210 kind : Role
245211 metadata :
@@ -276,7 +242,7 @@ matches the snapshot:
276242 verbs :
277243 - create
278244 - patch
279- 11 : |
245+ 10 : |
280246 apiVersion : rbac .authorization .k8s .io / v1
281247 kind : RoleBinding
282248 metadata :
@@ -289,7 +255,7 @@ matches the snapshot:
289255 - kind : ServiceAccount
290256 name : securecodebox - operator
291257 namespace : NAMESPACE
292- 12 : |
258+ 11 : |
293259 apiVersion : rbac .authorization .k8s .io / v1
294260 kind : ClusterRole
295261 metadata :
@@ -313,7 +279,7 @@ matches the snapshot:
313279 - parsedefinitions / status
314280 verbs :
315281 - get
316- 13 : |
282+ 12 : |
317283 apiVersion : rbac .authorization .k8s .io / v1
318284 kind : ClusterRole
319285 metadata :
@@ -333,7 +299,7 @@ matches the snapshot:
333299 - parsedefinitions / status
334300 verbs :
335301 - get
336- 14 : |
302+ 13 : |
337303 apiVersion : rbac .authorization .k8s .io / v1
338304 kind : ClusterRole
339305 metadata :
@@ -464,7 +430,7 @@ matches the snapshot:
464430 - list
465431 - update
466432 - watch
467- 15 : |
433+ 14 : |
468434 apiVersion : rbac .authorization .k8s .io / v1
469435 kind : ClusterRoleBinding
470436 metadata :
@@ -477,7 +443,7 @@ matches the snapshot:
477443 - kind : ServiceAccount
478444 name : securecodebox - operator
479445 namespace : NAMESPACE
480- 16 : |
446+ 15 : |
481447 apiVersion : rbac .authorization .k8s .io / v1
482448 kind : ClusterRole
483449 metadata :
@@ -501,7 +467,7 @@ matches the snapshot:
501467 - scans / status
502468 verbs :
503469 - get
504- 17 : |
470+ 16 : |
505471 apiVersion : rbac .authorization .k8s .io / v1
506472 kind : ClusterRole
507473 metadata :
@@ -521,7 +487,7 @@ matches the snapshot:
521487 - scans / status
522488 verbs :
523489 - get
524- 18 : |
490+ 17 : |
525491 apiVersion : rbac .authorization .k8s .io / v1
526492 kind : ClusterRole
527493 metadata :
@@ -545,7 +511,7 @@ matches the snapshot:
545511 - scancompletionhooks / status
546512 verbs :
547513 - get
548- 19 : |
514+ 18 : |
549515 apiVersion : rbac .authorization .k8s .io / v1
550516 kind : ClusterRole
551517 metadata :
@@ -565,7 +531,7 @@ matches the snapshot:
565531 - scancompletionhooks / status
566532 verbs :
567533 - get
568- 20 : |
534+ 19 : |
569535 apiVersion : rbac .authorization .k8s .io / v1
570536 kind : ClusterRole
571537 metadata :
@@ -589,7 +555,7 @@ matches the snapshot:
589555 - scantypes / status
590556 verbs :
591557 - get
592- 21 : |
558+ 20 : |
593559 apiVersion : rbac .authorization .k8s .io / v1
594560 kind : ClusterRole
595561 metadata :
@@ -609,7 +575,7 @@ matches the snapshot:
609575 - scantypes / status
610576 verbs :
611577 - get
612- 22 : |
578+ 21 : |
613579 apiVersion : rbac .authorization .k8s .io / v1
614580 kind : ClusterRole
615581 metadata :
@@ -633,7 +599,7 @@ matches the snapshot:
633599 - scheduledscans / status
634600 verbs :
635601 - get
636- 23 : |
602+ 22 : |
637603 apiVersion : rbac .authorization .k8s .io / v1
638604 kind : ClusterRole
639605 metadata :
@@ -653,7 +619,7 @@ matches the snapshot:
653619 - scheduledscans / status
654620 verbs :
655621 - get
656- 24 : |
622+ 23 : |
657623 apiVersion : v1
658624 kind : ServiceAccount
659625 metadata :
0 commit comments