All Projects → ZupIT → horusec-platform

ZupIT / horusec-platform

Licence: other
Horusec Platform is a set of web services that integrate with the Horusec CLI to facilitate the visualization and management of found vulnerabilities.

Programming Languages

go
31211 projects - #10 most used programming language
typescript
32286 projects
javascript
184084 projects - #8 most used programming language
Mustache
554 projects
Makefile
30231 projects
PLpgSQL
1095 projects

Projects that are alternatives of or similar to horusec-platform

opdemo
Kubernetes Operator 快速入门教程(Kubernetes Operator 101)
Stars: ✭ 158 (+393.75%)
Mutual labels:  operator, operator-sdk
Litmus
Litmus helps SREs and developers practice chaos engineering in a Cloud-native way. Chaos experiments are published at the ChaosHub (https://hub.litmuschaos.io). Community notes is at https://hackmd.io/a4Zu_sH4TZGeih-xCimi3Q
Stars: ✭ 2,377 (+7328.13%)
Mutual labels:  operator, operator-sdk
mysql-operator
A Kubernetes Operator for MySQL Community Server
Stars: ✭ 21 (-34.37%)
Mutual labels:  operator, operator-sdk
litmus-helm
Helm Charts for the Litmus Chaos Operator & CRDs
Stars: ✭ 23 (-28.12%)
Mutual labels:  helm, operator
clowder
Operator for operating cloud.redhat.com
Stars: ✭ 21 (-34.37%)
Mutual labels:  operator, operator-sdk
aws-nlb-helper-operator
Simple operator to manage AWS NLB attributes using Kubernetes Service object annotations
Stars: ✭ 23 (-28.12%)
Mutual labels:  operator, operator-sdk
rabbitmq-operator
RabbitMQ Kubernetes operator
Stars: ✭ 16 (-50%)
Mutual labels:  operator, operator-sdk
Helm App Operator Kit
Tool for creating a Kubernetes Operator from a Helm Chart
Stars: ✭ 132 (+312.5%)
Mutual labels:  helm, operator
pulp-operator
Kubernetes Operator for Pulp 3. Under active development.
Stars: ✭ 32 (+0%)
Mutual labels:  operator, operator-sdk
cmak-operator
CMAK (prev. Kafka Manager) for Kubernetes
Stars: ✭ 45 (+40.63%)
Mutual labels:  helm, operator
k8s-notify
Turn kubernetes events into useful notifications & alerts
Stars: ✭ 46 (+43.75%)
Mutual labels:  operator, operator-sdk
spring-data-ldap
Repository abstraction for Spring LDAP
Stars: ✭ 53 (+65.63%)
Mutual labels:  ldap
EmailValidationPascal
Simple Class for Validating Email Address Syntax in Pascal/Delphi
Stars: ✭ 32 (+0%)
Mutual labels:  email
django-des
Django Dynamic Email Settings - Change your email configuration without interrupting service.
Stars: ✭ 28 (-12.5%)
Mutual labels:  email
attachment-downloader
Simple tool for downloading email attachments for all emails in a given folder using an IMAP client
Stars: ✭ 52 (+62.5%)
Mutual labels:  email
devops-notes
My technical documentation in the SRE / DevOps paradigm.
Stars: ✭ 19 (-40.62%)
Mutual labels:  email
twitter-digest
✉️ A netlify lambda function that emails you tweets from a twitter list.
Stars: ✭ 14 (-56.25%)
Mutual labels:  email
emil
Emil is a library for dealing with E-Mail in Scala.
Stars: ✭ 17 (-46.87%)
Mutual labels:  email
egnature
Egnature is an email signature generator tool, which is an open source and free to use.
Stars: ✭ 26 (-18.75%)
Mutual labels:  email
another-ldap-auth
LDAP Authentication for Nginx, Nginx ingress controller (Kubernetes), and HAProxy via a subrequest.
Stars: ✭ 30 (-6.25%)
Mutual labels:  ldap

logo_header

Horusec Platform

Table of contents

1. About

2. Usage

2.1. Requirements

2.2. Installation

3. Features

4. Documentation

5. Issues

6. Contributing

7. License

8. Community

About

Horusec Platform is a set of web services that integrate with Horusec-CLI to make it easier for you to see and manage the vulnerabilities.

Usage

Requirements

See below the requirements to install Horusec-Platform:

Installation

There are several ways to install the Horusec-Platform in your environment. In some of them, we use a make command to simplify the process. If you want to know everything that will be executed, take a look at the Makefile located at the project's root.

Choose what type of installation you want below, but remember to change the default environment variables values to new and secure ones.

1. Install with docker compose

Follow the steps:

Step 1: Run the command:

make install

Step 2: Start the docker compose file compose.yml. It has all services, migrations and the needed dependencies.

  • You can find the compose file in deployments/compose/compose.yaml;
  • You can find migrations in migrations/source.

Step 3: Now the installation is ready with all default values, the latest versions, and the user for tests, see below:

Username: [email protected]
Password: Devpass0*

Docker compose file is configured to perform a standard installation by default.
In the production environments' case, make sure to change the values of the environment variables to new and secure ones.

⚠️ We do not recommend using docker-compose installation in a productive environment.

For more information about Docker compose, check out Docker compose installation section.

2. Install with Helm

Each release contains its own helm files for that specific version, you can find them in the repository and in the folder deployments/helm. In both cases, they will be separated by each service of the architecture.

For more information, check out the installing with Helm section.

3. Install with Horusec-Operator

Horusec-Operator manages Horusec web services and its Kubernetes cluster. It was created based on the community’s idea to have a simpler way to install the services in an environment using Kubernetes.

Features

Horusec-Platform provides several features, see some of them below.

MultiTenancy

It distributes only the necessary permissions according to each user:

multiTenancy

Dashboard

The dashboard shows you several metrics about your workspaces and repositories' vulnerabilities:

dashboard

Vulnerability Management

The vulnerability management screen allows you to identify false positives and accepted risks. You can modify a severity to an appropriate value to the reality of the vulnerability:

vuln-management

Tokens

It creates workspaces or repositories authentication tokens for your pipeline:

tokens

Authentication Types

You can choose which form of authentication you will use with Horusec-Platform.

There are three possibilities:

  • HORUSEC (native)
  • LDAP
  • KEYCLOAK

For more information about authentication types, check out our documentation.

Documentation

For more information about Horusec, please check out the documentation.

Issues

To open or track an issue for this project, in order to better coordinate your discussions, we recommend that you use the Issues tab in the main Horusec repository.

Contributing

If you want to contribute to this repository, access our Contributing Guide.

Developer Certificate of Origin - DCO

This is a security layer for the project and for the developers. It is mandatory.

Follow one of these two methods to add DCO to your commits:

1. Command line Follow the steps: Step 1: Configure your local git environment adding the same name and e-mail configured at your GitHub account. It helps to sign commits manually during reviews and suggestions.

git config --global user.name “Name”
git config --global user.email “[email protected]

Step 2: Add the Signed-off-by line with the '-s' flag in the git commit command:

$ git commit -s -m "This is my commit message"

2. GitHub website You can also manually sign your commits during GitHub reviews and suggestions, follow the steps below:

Step 1: When the commit changes box opens, manually type or paste your signature in the comment box, see the example:

Signed-off-by: Name < e-mail address >

For this method, your name and e-mail must be the same registered on your GitHub account.

License

Apache License 2.0.

Community

Do you have any question about Horusec? Let's chat in our forum.

This project exists thanks to all the contributors. You rock! ❤️🚀

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].