Skip to content

twistlock values.yamlπŸ“œ

domainπŸ“œ

Type: string

Default value
"dev.bigbang.mil"

Description: domain to use for virtual service

monitoring.enabledπŸ“œ

Type: bool

Default value
false

Description: Toggle monitoring integration, only used if init job is enabled, creates required metrics user, serviceMonitor, networkPolicy, etc

monitoring.serviceMonitor.schemeπŸ“œ

Type: string

Default value
""

monitoring.serviceMonitor.tlsConfigπŸ“œ

Type: object

Default value
{}

ssoπŸ“œ

Type: object

Default value
cert: ''
client_id: ''
console_url: ''
enabled: false
groups: ''
idp_url: ''
issuer_uri: ''
provider_name: ''
provider_type: shibboleth

Description: Configuration of Twistlock’s SAML SSO capability. This requires init.enabled=true, valid credentials, and a valid license. Refer to docs/KEYCLOAK.md for additional information.

sso.enabledπŸ“œ

Type: bool

Default value
false

Description: Toggle SAML SSO

sso.client_idπŸ“œ

Type: string

Default value
""

Description: SAML client ID

sso.provider_nameπŸ“œ

Type: string

Default value
""

Description: SAML Povider Alias (optional)

sso.provider_typeπŸ“œ

Type: string

Default value
"shibboleth"

Description: SAML Identity Provider. shibboleth is recommended by Twistlock support for Keycloak

sso.issuer_uriπŸ“œ

Type: string

Default value
""

Description: Identity Provider url with path to realm, example: https://keycloak.bigbang.dev/auth/realms/baby-yoda

sso.idp_urlπŸ“œ

Type: string

Default value
""

Description: SAML Identity Provider SSO URL, example: https://keycloak.bigbang.dev/auth/realms/baby-yoda/protocol/samlβ€œ

sso.console_urlπŸ“œ

Type: string

Default value
""

Description: Console URL of the Twistlock app. Example: https://twistlock.bigbang.dev (optional)

sso.groupsπŸ“œ

Type: string

Default value
""

Description: Groups attribute (optional)

sso.certπŸ“œ

Type: string

Default value
""` | X.509 Certificate from Identity Provider (i.e. Keycloak). See docs/KEYCLOAK.md for format. Use the 

Description: -` syntax for multiline string

istio.enabledπŸ“œ

Type: bool

Default value
false

Description: Toggle istio integration

istio.hardenedπŸ“œ

Type: object

Default value
customAuthorizationPolicies: []
customServiceEntries: []
enabled: false
outboundTrafficPolicyMode: REGISTRY_ONLY

Description: Default twistlock peer authentication

istio.tempo.enabledπŸ“œ

Type: bool

Default value
false

istio.tempo.namespaces[0]πŸ“œ

Type: string

Default value
"tempo"

istio.tempo.principals[0]πŸ“œ

Type: string

Default value
"cluster.local/ns/tempo/sa/tempo-tempo"

istio.mtls.modeπŸ“œ

Type: string

Default value
"STRICT"

Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic

istio.console.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggle vs creation

istio.console.annotationsπŸ“œ

Type: object

Default value
{}

Description: Annotations for VS

istio.console.labelsπŸ“œ

Type: object

Default value
{}

Description: Labels for VS

istio.console.gatewaysπŸ“œ

Type: list

Default value
- istio-system/main

Description: Gateways for VS

istio.console.hostsπŸ“œ

Type: list

Default value
- twistlock.{{ .Values.domain }}

Description: Hosts for VS

networkPolicies.enabledπŸ“œ

Type: bool

Default value
false

Description: Toggle network policies

networkPolicies.ingressLabelsπŸ“œ

Type: object

Default value
app: istio-ingressgateway
istio: ingressgateway

Description: Labels for ingress pods to allow traffic

networkPolicies.controlPlaneCidrπŸ“œ

Type: string

Default value
"0.0.0.0/0"

Description: Control Plane CIDR to allow init job communication to the Kubernetes API. Use kubectl get endpoints kubernetes to get the CIDR range needed for your cluster

networkPolicies.nodeCidrπŸ“œ

Type: string

Default value
nil

Description: Node CIDR to allow defender to communicate with console. Defaults to allowing β€œ10.0.0.0/8” β€œ172.16.0.0/12” β€œ192.168.0.0/16” β€œ100.64.0.0/10” networks. use kubectl get nodes -owide and review the INTERNAL-IP column to derive CIDR range. Must be an IP CIDR range (x.x.x.x/x - ideally a /16 or /24 to include multiple IPs)

imagePullSecretNameπŸ“œ

Type: string

Default value
"private-registry"

Description: Defines the secret to use when pulling the container images

selinuxLabelπŸ“œ

Type: string

Default value
"disable"

Description: Run Twistlock Console and Defender with a dedicated SELinux label. See https://docs.docker.com/engine/reference/run/#security-configuration

systemdπŸ“œ

Type: object

Default value
enabled: false

Description: systemd configuration

systemd.enabledπŸ“œ

Type: bool

Default value
false

Description: option to install Twistlock as systemd service. true or false

console.dataRecoveryπŸ“œ

Type: bool

Default value
true

Description: Enables or Disables data recovery. Values: true or false.

console.image.repositoryπŸ“œ

Type: string

Default value
"registry1.dso.mil/ironbank/twistlock/console/console"

Description: Full image name for console

console.image.tagπŸ“œ

Type: string

Default value
"33.03.138"

Description: Full image tag for console

console.image.imagePullPolicyπŸ“œ

Type: string

Default value
"IfNotPresent"

Description: Pull policy for console image

console.ports.managementHttpπŸ“œ

Type: int

Default value
8081

Description: Enables the management HTTP listener.

console.ports.managementHttpsπŸ“œ

Type: int

Default value
8083

Description: Enables the management HTTPS listener.

console.ports.communicationπŸ“œ

Type: int

Default value
8084

Description: Sets the port for communication between the Defender(s) and the Console

console.securityContextπŸ“œ

Type: object

Default value
capabilities:
  drop:
  - ALL
readOnlyRootFilesystem: true
runAsGroup: 2674
runAsNonRoot: true
runAsUser: 2674

Description: Sets the container security context for the console

console.persistence.sizeπŸ“œ

Type: string

Default value
"100Gi"

Description: Size of Twistlock PVC

console.persistence.accessModeπŸ“œ

Type: string

Default value
"ReadWriteOnce"

Description: Access mode for Twistlock PVC

console.syslogAuditIntegrationπŸ“œ

Type: object

Default value
enabled: false

Description: Enable syslog audit feature When integrating with BigBang, make sure to include an exception to Gatekeeper and/or Kyverno for Volume Types.

console.disableCgroupLimitsπŸ“œ

Type: bool

Default value
false

Description: Controls console container’s resource constraints. Set to β€œtrue” to run without limits. See https://docs.docker.com/engine/reference/run/#runtime-constraints-on-resources

console.licenseπŸ“œ

Type: string

Default value
""

Description: The license key to use. If not specified, the license must be installed manually.

console.runAsRootπŸ“œ

Type: bool

Default value
false

Description: Run Twistlock Console processes as root (default false, twistlock user account). Values: true or false

console.credentialsπŸ“œ

Type: object

Default value
password: change_this_password
username: admin

Description: Required if init is enabled. Admin account to use for configuration through API. Will create account if Twistlock is a new install. Otherwise, an existing account needs to be provided.

console.credentials.usernameπŸ“œ

Type: string

Default value
"admin"

Description: Username of account

console.credentials.passwordπŸ“œ

Type: string

Default value
"change_this_password"

Description: Password of account

console.additionalUsersπŸ“œ

Type: list

Default value
[]

Description: Additional users to setup. This requires init.enabled=true, valid credentials, and a valid license.

console.updateUsersπŸ“œ

Type: bool

Default value
false

Description: Toggles whether to update the additionalUsers if the user is already created (e.g. on upgrades). This would overwrite the existing user configuration.

console.groupsπŸ“œ

Type: list

Default value
[]

Description: Additional users to setup. This requires init.enabled=true, valid credentials, and a valid license.

console.options.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggle setting all options in this section

console.options.networkπŸ“œ

Type: object

Default value
container: true
host: true

Description: Network monitoring options

console.options.network.containerπŸ“œ

Type: bool

Default value
true

Description: Toggle network monitoring of containers

console.options.network.hostπŸ“œ

Type: bool

Default value
true

Description: Toggle network monitoring of hosts

console.options.loggingπŸ“œ

Type: bool

Default value
true

Description: Toggle logging Prisma Cloud events to standard output

console.options.telemetryπŸ“œ

Type: bool

Default value
false

Description: Toggle sending product usage data to Palo Alto Networks

console.volumeUpgradeπŸ“œ

Type: bool

Default value
true

Description: This value should be enabled when upgrading from a version <=0.10.0-bb.1 in order to allow the console to run as non-root

console.trustedImagesπŸ“œ

Type: object

Default value
defaultEffect: alert
enabled: true
name: BigBang-Trusted
registryMatches:
- registry1.dso.mil/ironbank/*

Description: Trusted images settings

console.trustedImages.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggle deployment and updating of trusted image settings

console.trustedImages.registryMatchesπŸ“œ

Type: list

Default value
- registry1.dso.mil/ironbank/*

Description: List of regex matches for images to trust

console.trustedImages.nameπŸ“œ

Type: string

Default value
"BigBang-Trusted"

Description: Name for the group/rule to display in console

console.trustedImages.defaultEffectπŸ“œ

Type: string

Default value
"alert"

Description: Effect for images that do not match the trusted registry, can be β€œalert” or β€œblock”

defenderπŸ“œ

Type: object

Default value
certCn: ''
clusterName: ''
collectLabels: true
containerRuntime: containerd
dockerListenerType: ''
dockerSocket: ''
enabled: true
image:
  repository: registry1.dso.mil/ironbank/twistlock/defender/defender
  tag: 33.03.138
monitorServiceAccounts: true
priorityClassName: ''
privileged: false
proxy: {}
resources:
  limits:
    cpu: 2
    memory: 2Gi
  requests:
    cpu: 2
    memory: 2Gi
securityCapabilitiesAdd:
- NET_ADMIN
- NET_RAW
- SYS_ADMIN
- SYS_PTRACE
- SYS_CHROOT
- MKNOD
- SETFCAP
- IPC_LOCK
securityCapabilitiesDrop:
- ALL
selinux: true
tolerations: []
uniqueHostName: false

Description: Configuration of Twistlock’s container defenders. This requires init.enabled=true, valid credentials, and a valid license.

defender.imageπŸ“œ

Type: object

Default value
repository: registry1.dso.mil/ironbank/twistlock/defender/defender
tag: 33.03.138

Description: Image for Twistlock defender. Leave blank to use twistlock official repo.

defender.image.repositoryπŸ“œ

Type: string

Default value
"registry1.dso.mil/ironbank/twistlock/defender/defender"

Description: Repository and path for defender image

defender.image.tagπŸ“œ

Type: string

Default value
"33.03.138"

Description: Image tag for defender

defender.clusterNameπŸ“œ

Type: string

Default value
""

Description: Name of cluster

defender.collectLabelsπŸ“œ

Type: bool

Default value
true

Description: Collect Deployment and Namespace labels

defender.containerRuntimeπŸ“œ

Type: string

Default value
"containerd"

Description: Set containerRuntime option for Defenders (β€œdocker”, β€œcontainerd”, or β€œcrio”)

defender.dockerSocketπŸ“œ

Type: string

Default value
""

Description: Path to Docker socket. Leave blank to use /var/run/docker.sock

defender.tolerationsπŸ“œ

Type: list

Default value
[]

Description: List of tolerations to be added to the Defender DaemonSet retrieved during the init script

defender.securityCapabilitiesDropπŸ“œ

Type: list

Default value
- ALL

Description: Sets the container security context dropped capabilities for the defenders

defender.securityCapabilitiesAddπŸ“œ

Type: list

Default value
- NET_ADMIN
- NET_RAW
- SYS_ADMIN
- SYS_PTRACE
- SYS_CHROOT
- MKNOD
- SETFCAP
- IPC_LOCK

Description: Sets the container security context added capabilities for the defenders

defender.dockerListenerTypeπŸ“œ

Type: string

Default value
""

Description: Sets the type of the Docker listener (TCP or NONE)

defender.monitorServiceAccountsπŸ“œ

Type: bool

Default value
true

Description: Monitor service accounts

defender.privilegedπŸ“œ

Type: bool

Default value
false

Description: Run as privileged. If selinux is true, this automatically gets set to false

defender.proxyπŸ“œ

Type: object

Default value
{}

Description: Proxy settings

defender.selinuxπŸ“œ

Type: bool

Default value
true

Description: Deploy with SELinux Policy

defender.uniqueHostNameπŸ“œ

Type: bool

Default value
false

Description: Assign globally unique names to hosts

defender.resourcesπŸ“œ

Type: object

Default value
limits:
  cpu: 2
  memory: 2Gi
requests:
  cpu: 2
  memory: 2Gi

Description: define resource limits and requests for the Defender DaemonSet

defender.priorityClassNameπŸ“œ

Type: string

Default value
""

Description: Priority Class Name to prioritize pod scheduling

policiesπŸ“œ

Type: object

Default value
compliance:
  alertThreshold: medium
  enabled: true
  templates:
  - DISA STIG
  - NIST SP 800-190
enabled: true
name: Default
runtime:
  enabled: true
vulnerabilities:
  alertThreshold: medium
  enabled: true

Description: Configures defender policies. This requires init.enabled=true, valid credentials, and a valid license.

policies.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggles configuration of defender policies

policies.nameπŸ“œ

Type: string

Default value
"Default"

Description: Name to use as prefix to policy rules. NOTE: If you change the name after the initial deployment, you may end up with duplicate policy sets and need to manually cleanup old policies.

policies.vulnerabilitiesπŸ“œ

Type: object

Default value
alertThreshold: medium
enabled: true

Description: Vulnerability policies

policies.vulnerabilities.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggle deployment and updating of vulnerability policies

policies.vulnerabilities.alertThresholdπŸ“œ

Type: string

Default value
"medium"

Description: The minimum severity to alert on

policies.complianceπŸ“œ

Type: object

Default value
alertThreshold: medium
enabled: true
templates:
- DISA STIG
- NIST SP 800-190

Description: Compliance policies

policies.compliance.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggle deployment and updating of compliance policies

policies.compliance.templatesπŸ“œ

Type: list

Default value
- DISA STIG
- NIST SP 800-190

Description: The policy templates to use. Valid values are β€˜GDPR’, β€˜DISA STIG’, β€˜PCI’, β€˜NIST SP 800-190’, or β€˜HIPAA’

policies.compliance.alertThresholdπŸ“œ

Type: string

Default value
"medium"

Description: If template does not apply, set policy to alert using this severity or higher. Valid values are β€˜low’, β€˜medium’, β€˜high’, or β€˜critical’.

policies.runtimeπŸ“œ

Type: object

Default value
enabled: true

Description: Runtime policies

policies.runtime.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggle deployment and updating of runtime policies

initπŸ“œ

Type: object

Default value
enabled: true
image:
  imagePullPolicy: IfNotPresent
  repository: registry1.dso.mil/ironbank/big-bang/base
  tag: 2.1.0
resources:
  limits:
    cpu: 0.5
    memory: 256Mi
  requests:
    cpu: 0.5
    memory: 256Mi

Description: Initialization job. Sets up users, license, container defenders, default policies, and other settings.

init.enabledπŸ“œ

Type: bool

Default value
true

Description: Toggles the initialization on or off

init.imageπŸ“œ

Type: object

Default value
imagePullPolicy: IfNotPresent
repository: registry1.dso.mil/ironbank/big-bang/base
tag: 2.1.0

Description: Initialization job image configuration

init.image.repositoryπŸ“œ

Type: string

Default value
"registry1.dso.mil/ironbank/big-bang/base"

Description: Repository and path to initialization image. Image must contain jq and kubectl

init.image.tagπŸ“œ

Type: string

Default value
"2.1.0"

Description: Initialization image tag

init.image.imagePullPolicyπŸ“œ

Type: string

Default value
"IfNotPresent"

Description: Initialization image pull policy

affinityπŸ“œ

Type: object

Default value
{}

Description: affinity for console pod

nodeSelectorπŸ“œ

Type: object

Default value
{}

Description: nodeSelector for console pod

tolerationsπŸ“œ

Type: list

Default value
[]

Description: tolerations for console pod

podLabelsπŸ“œ

Type: object

Default value
{}

Description: labels for console pod

annotationsπŸ“œ

Type: object

Default value
{}

Description: annotations for console pod

resourcesπŸ“œ

Type: object

Default value
limits:
  cpu: 250m
  memory: 3Gi
requests:
  cpu: 250m
  memory: 3Gi

Description: resources for console pod

openshiftπŸ“œ

Type: bool

Default value
false

Description: Toggle to setup special configuration for OpenShift clusters

bbtests.enabledπŸ“œ

Type: bool

Default value
false

Description: Toggle bbtests on/off for CI/Dev

bbtests.scripts.imageπŸ“œ

Type: string

Default value
"registry1.dso.mil/ironbank/stedolan/jq:1.7.1"

Description: Image to use for script tests

bbtests.scripts.envsπŸ“œ

Type: object

Default value
desired_version: '{{ .Values.console.image.tag }}'
twistlock_host: http://twistlock-console.twistlock.svc.cluster.local:8081

Description: Set envs for use in script tests

bbtests.cypress.resources.requests.cpuπŸ“œ

Type: string

Default value
"2"

bbtests.cypress.resources.requests.memoryπŸ“œ

Type: string

Default value
"2Gi"

bbtests.cypress.resources.limits.cpuπŸ“œ

Type: string

Default value
"2"

bbtests.cypress.resources.limits.memoryπŸ“œ

Type: string

Default value
"2Gi"

bbtests.cypress.artifactsπŸ“œ

Type: bool

Default value
true

bbtests.cypress.envs.cypress_twistlock_urlπŸ“œ

Type: string

Default value
"http://twistlock-console.twistlock.svc.cluster.local:8081"

bbtests.cypress.envs.cypress_userπŸ“œ

Type: string

Default value
"admin"

bbtests.cypress.envs.cypress_passwordπŸ“œ

Type: string

Default value
"change_this_password"

bbtests.cypress.envs.CYPRESS_experimental_Modify_Obstructive_Third_Party_CodeπŸ“œ

Type: string

Default value
"true"

waitJob.enabledπŸ“œ

Type: bool

Default value
true

waitJob.scripts.imageπŸ“œ

Type: string

Default value
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl:v1.30.9"

waitJob.permissions.apiGroupsπŸ“œ

Type: object

Default value
{}

waitJob.permissions.resourcesπŸ“œ

Type: object

Default value
{}