You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/Getting started/_index.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,8 +12,8 @@ Terrascan is a static code analyzer for Infrastructure as Code. It can be instal
12
12
13
13
Quickly get started with these common first tasks:
14
14
15
-
-[Installing Terrascan](#installing-terrascan)
16
-
-[Scanning with Terrascan](#scanning-with-terrascan)
15
+
-[Installing Terrascan](#installing-terrascan)
16
+
-[Scanning with Terrascan](#scanning-with-terrascan)
17
17
18
18
## Installing Terrascan
19
19
Terrascan is a portable executable that does not strictly require installation, and is also available as a container image in Docker Hub. You can use Terrascan in two different methods based on your preference:
@@ -22,7 +22,7 @@ Terrascan is a portable executable that does not strictly require installation,
22
22
2.[Using a Docker container](#using-a-docker-container)
23
23
24
24
### Native executable
25
-
Terrascan's [release page](https://github.com/accurics/terrascan/releases) includes latest version of builds for common platforms. Download and extract the package for your platform. Follow instructions that apply to your platform:
25
+
Terrascan's [release page](https://github.com/tenable/terrascan/releases) includes latest version of builds for common platforms. Download and extract the package for your platform. Follow instructions that apply to your platform:
26
26
27
27
#### macOS and Linux
28
28
Download the latest version of builds for macOS and enter the following command.
@@ -62,7 +62,7 @@ Terrascan is also available as a Docker image in Docker Hub and can be used as f
62
62
$ docker run --rm tenable/terrascan version
63
63
```
64
64
65
-
If you want to use the Docker image for the rest of this "Getting Started" guide, please refer to the following command. Note the volume `(-v)` that is being mapped to the docker, and modify it if necessary to suit your environment.
65
+
If you want to use the Docker image for the rest of this "Getting Started" guide, please refer to the following command. Note the volume `(-v)` that is being mapped to the docker, and modify it if necessary to suit your environment.
66
66
67
67
```Bash
68
68
$ alias terrascan="docker run --rm -it -v "$(pwd):/iac" -w /iac tenable/terrascan"
Copy file name to clipboardExpand all lines: content/en/docs/Integrations/Atlantis.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ workflows:
57
57
```
58
58
### Script configuration
59
59
60
-
Modify the `terrascan-remote-scan.sh` script according your environment. The script is [located here](https://github.com/accurics/terrascan/tree/master/scripts). Open the script with your any editor of your choice and review the following six settings which is found at the top of the file:
60
+
Modify the `terrascan-remote-scan.sh` script according your environment. The script is [located here](https://github.com/tenable/terrascan/tree/master/scripts). Open the script with your any editor of your choice and review the following six settings which is found at the top of the file:
61
61
62
62
```
63
63
TERRASCAN_SERVER=192.168.1.55
@@ -113,7 +113,7 @@ In code repository, usage is exactly the same as atlantis, add a comment `atlant
113
113
##### To use the default built-in container image:
The syntax of the Atlantis server command here is same as in [atlantis docs](https://www.runatlantis.io/docs/), except for an optional `-c` flag which can be used to specify the file path for the toml config to be used by Terrascan. Another way to provide the toml config filepath would be the TERRASCAN_CONFIG environment variable. You need to provide all the environment variables that terraform requires to operate with your respective cloud providers.
138
138
139
-
> **Note**: As a good practice, Terrascan recommends use of a [specific tag](https://hub.docker.com/r/accurics/terrascan_atlantis/tags) of the container image rather than the latest tag.
139
+
> **Note**: As a good practice, Terrascan recommends use of a [specific tag](https://hub.docker.com/r/tenable/terrascan_atlantis/tags) of the container image rather than the latest tag.
140
140
141
141
[comment]: <>(Moved the workflow yaml note to above where its mentioned)
Copy file name to clipboardExpand all lines: content/en/docs/Integrations/argocd.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Argo CD"
3
3
linkTitle: "Argo CD"
4
4
weight: 20
5
5
description: >
6
-
Terrascan can be configured as an Argo CD job during the application sync process using ArgoCD’s resource hook.
6
+
Terrascan can be configured as an Argo CD job during the application sync process using ArgoCD’s resource hook.
7
7
---
8
8
9
9
## Terrascan can be integrated with Argo CD in two ways
@@ -46,7 +46,7 @@ spec:
46
46
- name: ssh-key-secret
47
47
secret:
48
48
secretName: ssh-key-secret
49
-
#add a secret for git config file
49
+
#add a secret for git config file
50
50
- name: ssh-config
51
51
secret:
52
52
secretName: ssh-config-secret
@@ -148,7 +148,7 @@ fi
148
148
For private repositories, the private following keys must be added as kubernetes secret:
149
149
- `private key`and ssh `config` as Secret
150
150
- `known_hosts`as ConfigMap
151
-
151
+
152
152
```
153
153
kubectl create secret generic ssh-key-secret \
154
154
--from-file=ssh-privatekey= < path to your private key > \
@@ -159,7 +159,7 @@ For private repositories, the private following keys must be added as kubernetes
159
159
160
160
```
161
161
kubectl create configmap ssh-known-hosts --from-file=< path to your known hosts file >
162
-
```
162
+
```
163
163
164
164
```
165
165
kubectl create configmap slack-notifications --from-file=< path to your notification script >
@@ -170,7 +170,7 @@ For private repositories, the private following keys must be added as kubernetes
170
170
```
171
171
kubectl create secret generic ssh-config-secret \
172
172
--from-file=< path to your ssh config file >
173
-
```
173
+
```
174
174
175
175
##### Example ssh config file
176
176
@@ -229,7 +229,7 @@ template:
229
229
value: yoursecretapikey
230
230
volumeMounts:
231
231
- mountPath: /data/certs
232
-
name: terrascan-certs-secret
232
+
name: terrascan-certs-secret
233
233
readOnly: true
234
234
- mountPath: /data/config
235
235
name: terrascan-config
@@ -256,23 +256,23 @@ template:
256
256
- name: ssh-key-secret
257
257
secret:
258
258
secretName: ssh-key-secret
259
-
#add a secret for git config file
259
+
#add a secret for git config file
260
260
- name: ssh-config
261
261
secret:
262
262
secretName: ssh-config-secret
263
263
#add a configmap for the ssh known_hosts file
264
264
- name: ssh-known-hosts
265
265
configMap:
266
266
name: known-hosts-config
267
-
#add a configmap for the terrascan config.toml file
267
+
#add a configmap for the terrascan config.toml file
268
268
- name: terrascan-config
269
269
configMap:
270
270
name: terrascan-config
271
-
#add a secret for the tls certificates
271
+
#add a secret for the tls certificates
272
272
- name: terrascan-certs-secret
273
273
secret:
274
-
secretName: terrascan-certs-secret
275
-
```
274
+
secretName: terrascan-certs-secret
275
+
```
276
276
**Service example**
277
277
278
278
```yaml
@@ -332,7 +332,7 @@ Host github.com
332
332
333
333
After making changes to the webhook deployment file, apply this yaml in your cluster.
334
334
335
-
You can also run terrascan admission controller server outside cluster, for more information and instructions on configuring terrascan as an admission controller webhook, see https://docs.accurics.com/projects/accurics-terrascan/en/latest/integrations/admission-controller-webhooks-usage.
335
+
You can also run terrascan admission controller server outside cluster, for more information and instructions on configuring terrascan as an admission controller webhook, see https://runterrascan.io/docs/integrations/k8s/.
336
336
337
337
#### Step 2: Create a Dockerfile
338
338
@@ -427,7 +427,7 @@ metadata:
427
427
generateName: terrascan-hook-
428
428
namespace: <YOUR APP NAMESPACE>
429
429
annotations:
430
-
argocd.argoproj.io/hook: PreSync
430
+
argocd.argoproj.io/hook: PreSync
431
431
spec:
432
432
ttlSecondsAfterFinished: 3600
433
433
template:
@@ -457,7 +457,7 @@ template:
457
457
- name: CLOUD_PROVIDER
458
458
value: <TYPE OF CLOUD PROVIDER> #If not provided default value is 'all'
459
459
- name: REMOTE_TYPE
460
-
value: <TYPE OF REMOTE> #If not provided default value is 'git'
460
+
value: <TYPE OF REMOTE> #If not provided default value is 'git'
Copy file name to clipboardExpand all lines: content/en/docs/Integrations/cicd.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Using Terrascan's SARIF output, the action can include issues found during the s
22
22
23
23
24
24
```YAML
25
-
25
+
26
26
on: [push]
27
27
28
28
jobs:
@@ -34,7 +34,7 @@ jobs:
34
34
uses: actions/checkout@v2
35
35
- name: Run Terrascan
36
36
id: terrascan
37
-
uses: accurics/terrascan-action@main
37
+
uses: tenable/terrascan-action@main
38
38
with:
39
39
iac_type: 'terraform'
40
40
iac_version: 'v14'
@@ -53,21 +53,21 @@ jobs:
53
53
```
54
54
55
55
56
-
A detailed explanation of the action's input variables is available in the [terrascan-action](https://github.com/accurics/terrascan-action/) repository.
56
+
A detailed explanation of the action's input variables is available in the [terrascan-action](https://github.com/tenable/terrascan-action/) repository.
57
57
58
58
## GitLab CI
59
59
60
60
[GitLab CI](https://docs.gitlab.com/ee/ci/README.html) can use [Docker images](https://docs.gitlab.com/ee/ci/docker/using_docker_images.html) as part of a pipeline. We can take advantage of this functionality and use Terrascan's docker image as part of your [pipeline](https://docs.gitlab.com/ee/ci/pipelines/) to scan infrastructure as code.
61
61
62
-
To do this you can update your .gitlab-ci.yml file to use the "accurics/terrascan:latest" image with the ["bin/sh", "-c"] entrypoint. Terrascan can be found on "/go/bin" in the image and you can use any [Terrascan command line options](http://ubusvr:8000/getting-started/usage/#terrascan-commands) according to your needs. Here's an example .gitlab-ci.yml file:
62
+
To do this you can update your .gitlab-ci.yml file to use the "tenable/terrascan:latest" image with the ["bin/sh", "-c"] entrypoint. Terrascan can be found on "/go/bin" in the image and you can use any [Terrascan command line options](http://ubusvr:8000/getting-started/usage/#terrascan-commands) according to your needs. Here's an example .gitlab-ci.yml file:
63
63
64
64
```YAML
65
65
stages:
66
66
- scan
67
67
68
68
terrascan:
69
69
image:
70
-
name: accurics/terrascan:latest
70
+
name: tenable/terrascan:latest
71
71
entrypoint: ["/bin/sh", "-c"]
72
72
stage: scan
73
73
script:
@@ -194,7 +194,7 @@ The `Dockerfile` is, of course, used to build the container. In this case, we s
Copy file name to clipboardExpand all lines: content/en/docs/Integrations/k8s.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ description: >
9
9
10
10
## Overview
11
11
Terrascan can be integrated with K8s [admissions webhooks](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/).
12
-
Admission controllers help you control resources created on a kubernetes cluster. By using Terrascan as an admission controller, resources violating security policies can be prevented from getting created in a Kubernetes cluster. For more details and instructions, [click here to see our blog](https://www.accurics.com/blog/terrascan-blog/kubernetes-security-terrascan-validating-admission-controller/).
12
+
Admission controllers help you control resources created on a kubernetes cluster. By using Terrascan as an admission controller, resources violating security policies can be prevented from getting created in a Kubernetes cluster.
13
13
14
14
> **Note on SSL certificates**: You can use valid SSL certificates or create self signed certificates and have your Kubernetes cluster trust it.
15
15
@@ -28,7 +28,7 @@ Create an instance of Terrascan. To scan K8s configurations, your Terrascan inst
28
28
29
29
1. Make sure Terrascan is accessible via HTTPS. Ensure your cloud firewall is configured to allow this.
30
30
2. Have a valid SSL certificate for the served domain name using one of the suggested methods below:
31
-
- Use a subdomain of your choice (e.g dev-terrascan-k8s.accurics.com) and create a valid certificate for this subdomain through your SSL certificate provider. You can use [Let's Encrypt](https://letsencrypt.org/) which is a free, simple to use certificate authority.
31
+
- Use a subdomain of your choice (e.g dev-terrascan-k8s.tenable.com) and create a valid certificate for this subdomain through your SSL certificate provider. You can use [Let's Encrypt](https://letsencrypt.org/) which is a free, simple to use certificate authority.
32
32
- Use a reverse-proxy to serve SSL requests; for example, use Cloudflare Flexible to get a certificate by a trusted-CA to your [self-signed certificate](https://www.digitalocean.com/community/tutorials/openssl-essentials-working-with-ssl-certificates-private-keys-and-csrs).
33
33
- Generate a self-signed certificate and configure your K8s cluster to trust it. To add a trusted CA to ca-pemstore, as demonstrated in [paraspatidar's blog post](https://medium.com/@paraspatidar/add-ssl-tls-certificate-or-pem-file-to-kubernetes-pod-s-trusted-root-ca-store-7bed5cd683d).
34
34
3. Use the Terrascan docker as demonstrated in this document, or run it from the sources.
@@ -78,7 +78,7 @@ You can specify the following configurations:
78
78
Run Terrascan docker image in your server using the following command:
79
79
80
80
```Bash
81
-
sudo docker run -p 443:9443 -v <DATA_PATH>:/data -u root -e K8S_WEBHOOK_API_KEY=<API_KEY>accurics/terrascan server --cert-path /data/cert.pem --key-path /data/key.pem -c /data/config.toml
81
+
sudo docker run -p 443:9443 -v <DATA_PATH>:/data -u root -e K8S_WEBHOOK_API_KEY=<API_KEY>tenable/terrascan server --cert-path /data/cert.pem --key-path /data/key.pem -c /data/config.toml
0 commit comments