Skip to content

Commit cfddc5a

Browse files
committed
Release 0.8.0
1 parent db29fbf commit cfddc5a

File tree

19 files changed

+92
-132
lines changed

19 files changed

+92
-132
lines changed

README.ja.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,13 +58,13 @@ vArmorポリシーは、**AlwaysAllow、RuntimeDefault、EnhanceProtect、Behavi
5858

5959
### ステップ1. チャートの取得
6060
```
61-
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.7.1
61+
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.8.0
6262
```
6363

6464
### ステップ2. インストール
6565
*中国地域内では、ドメイン`elkeid-cn-beijing.cr.volces.com`を使用できます。*
6666
```
67-
helm install varmor varmor-0.7.1.tgz \
67+
helm install varmor varmor-0.8.0.tgz \
6868
--namespace varmor --create-namespace \
6969
--set image.registry="elkeid-ap-southeast-1.cr.volces.com"
7070
```

docs/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,14 +81,14 @@ The prerequisites required by different enforcers are as shown in the following
8181
### Step 1. Fetch chart
8282

8383
```bash
84-
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.7.1
84+
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.8.0
8585
```
8686

8787
### Step 2. Install
8888
The default configuration enables the AppArmor and Seccomp enforcers. Please refer to the documentation for more [configuration options](getting_started/installation.md#configuration).
8989

9090
```bash
91-
helm install varmor varmor-0.7.1.tgz \
91+
helm install varmor varmor-0.8.0.tgz \
9292
--namespace varmor --create-namespace \
9393
--set image.registry="elkeid-ap-southeast-1.cr.volces.com"
9494
```

docs/README.zh_CN.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,14 +86,14 @@ vArmor 的策略可以运行在五种模式中:*AlwaysAllow, RuntimeDefault, E
8686
### 步骤 1. 拉取 chart 包
8787

8888
```bash
89-
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.7.1
89+
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.8.0
9090
```
9191

9292
### 步骤 2. 安装
9393
vArmor 默认支持 AppArmor 和 Seccomp enforcer。请参照 [配置选项](getting_started/installation.zh_CN.md#配置选项) 查看更多信息。
9494

9595
```bash
96-
helm install varmor varmor-0.7.1.tgz \
96+
helm install varmor varmor-0.8.0.tgz \
9797
--namespace varmor --create-namespace \
9898
--set image.registry="elkeid-cn-beijing-1.cr.volces.com"
9999
```

docs/getting_started/installation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ vArmor can be deployed via a Helm chart which is the recommended and preferred m
1818
In order to install vArmor with Helm, first fetch the chart.
1919

2020
```
21-
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.7.1
21+
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.8.0
2222
```
2323

2424
Then install it with helm optional [configurations](#configuration).
2525

2626
```
27-
helm install varmor varmor-0.7.1.tgz \
27+
helm install varmor varmor-0.8.0.tgz \
2828
--namespace varmor --create-namespace \
2929
--set image.registry="elkeid-ap-southeast-1.cr.volces.com"
3030
```
@@ -157,7 +157,7 @@ You can use the following option to change this behavior. Default: disabled.
157157

158158
You can use helm commands to upgrade, rollback, and perform other operations.
159159
```bash
160-
helm upgrade varmor varmor-0.7.1.tgz \
160+
helm upgrade varmor varmor-0.8.0.tgz \
161161
--namespace varmor --create-namespace \
162162
--set image.registry="elkeid-ap-southeast-1.cr.volces.com" \
163163
--set bpfLsmEnforcer.enabled=true \

docs/getting_started/installation.zh_CN.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@
1616
vArmor 推荐使用 Helm chart 进行部署。通过 Helm 安装前,请先拉取 chart 包。
1717

1818
```
19-
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.7.1
19+
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.8.0
2020
```
2121

2222
然后使用 helm 命令及[配置选项](#配置选项)进行安装和配置。
2323

2424
```
25-
helm install varmor varmor-0.7.1.tgz \
25+
helm install varmor varmor-0.8.0.tgz \
2626
--namespace varmor --create-namespace \
2727
--set image.registry="elkeid-cn-beijing.cr.volces.com"
2828
```
@@ -157,7 +157,7 @@ vArmor 的 Agent 默认运行在独立的网络命名空间中,并在端口 `6
157157

158158
你可以使用 helm 命令进行升级、回滚等操作。
159159
```bash
160-
helm upgrade varmor varmor-0.7.1.tgz \
160+
helm upgrade varmor varmor-0.8.0.tgz \
161161
--namespace varmor --create-namespace \
162162
--set image.registry="elkeid-ap-southeast-1.cr.volces.com" \
163163
--set bpfLsmEnforcer.enabled=true \

docs/guides/policies_and_rules/policy_modes/behavior_modeling.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,6 @@ The requirements for the BehaviorModeling mode are as follows.
2727

2828
* [Optional] Use the `--set "agent.args={--auditLogPaths=FILE_PATH|FILE_PATH}"` argument to specify the audit log file or determine the search order yourself.
2929

30-
```
31-
helm upgrade varmor varmor-0.7.1.tgz \
32-
--namespace varmor --create-namespace \
33-
--set image.registry="elkeid-cn-beijing.cr.volces.com" \
34-
--set behaviorModeling.enabled=true
35-
```
36-
3730
*Note:*
3831
* *vArmor sequentially checks whether the files `/var/log/audit/audit.log` and `/var/log/kern.log` exist, and monitors the first valid file to consume AppArmor and Seccomp audit events for violation auditing and behavioral modeling. If you are using **auditd**, the audit events of AppArmor and Seccomp will be stored by default in `/var/log/audit/audit.log`. Otherwise they will be stored in `/var/log/kern.log`.*
3932

docs/guides/policies_and_rules/policy_modes/behavior_modeling.zh_CN.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,14 +27,6 @@ BehaviorModeling 模式的前置条件如下所示:
2727

2828
* [可选] 使用 `--set "agent.args={--auditLogPaths=FILE_PATH|FILE_PATH}"` 选项来指定系统审计日志或搜索顺序。
2929

30-
```
31-
helm upgrade varmor varmor-0.7.1.tgz \
32-
--namespace varmor --create-namespace \
33-
--set image.registry="elkeid-cn-beijing.cr.volces.com" \
34-
--set behaviorModeling.enabled=true
35-
```
36-
37-
3830
*注意:*
3931
* *vArmor 顺序检查系统审计日志是否存在,并通过监控第一个有效的文件来获取 AppArmor 和 Seccomp 的审计事件,从而用于违规审计和行为建模功能。当您使用 **auditd** 时,AppArmor 和 Seccomp 的审计事件会默认保存在 `/var/log/audit/audit.log` 文件中。否则,他们通常会被保存在 `/var/log/kern.log` 文件中。*
4032

website/docs/getting_started/installation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,13 +21,13 @@ vArmor can be deployed via a Helm chart which is the recommended and preferred m
2121
In order to install vArmor with Helm, first fetch the chart.
2222

2323
```
24-
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.7.1
24+
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.8.0
2525
```
2626

2727
Then install it with helm optional [configurations](#configuration).
2828

2929
```
30-
helm install varmor varmor-0.7.1.tgz \
30+
helm install varmor varmor-0.8.0.tgz \
3131
--namespace varmor --create-namespace \
3232
--set image.registry="elkeid-ap-southeast-1.cr.volces.com"
3333
```
@@ -164,7 +164,7 @@ You can use the following option to change this behavior. Default: disabled.
164164
You can use helm commands to upgrade, rollback, and perform other operations.
165165

166166
```bash
167-
helm upgrade varmor varmor-0.7.1.tgz \
167+
helm upgrade varmor varmor-0.8.0.tgz \
168168
--namespace varmor --create-namespace \
169169
--set image.registry="elkeid-ap-southeast-1.cr.volces.com" \
170170
--set bpfLsmEnforcer.enabled=true \

website/docs/guides/policies_and_rules/policy_modes/behavior_modeling.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -30,27 +30,21 @@ The requirements for the BehaviorModeling mode are as follows.
3030

3131
* [Optional] Use the `--set "agent.args={--auditLogPaths=FILE_PATH|FILE_PATH}"` argument to specify the audit log file or determine the search order yourself.
3232

33-
```bash
34-
helm upgrade varmor varmor-0.7.1.tgz \
35-
--namespace varmor --create-namespace \
36-
--set image.registry="elkeid-cn-beijing.cr.volces.com" \
37-
--set behaviorModeling.enabled=true
38-
```
39-
40-
*Note:*
41-
* *vArmor sequentially checks whether the files `/var/log/audit/audit.log` and `/var/log/kern.log` exist, and monitors the first valid file to consume AppArmor and Seccomp audit events for violation auditing and behavioral modeling. If you are using **auditd**, the audit events of AppArmor and Seccomp will be stored by default in `/var/log/audit/audit.log`. Otherwise they will be stored in `/var/log/kern.log`.*
42-
43-
* *The **varmor-agent** requires additional resources as shown below when the BehaviorModeling feature is enabled. Another component, the **varmor-classifier**, which is used to identify random patterns in the path, will also be deployed.*
44-
45-
```yaml
46-
resources:
47-
limits:
48-
cpu: 2
49-
memory: 2Gi
50-
requests:
51-
cpu: 500m
52-
memory: 500Mi
53-
```
33+
:::note
34+
* *vArmor sequentially checks whether the files `/var/log/audit/audit.log` and `/var/log/kern.log` exist, and monitors the first valid file to consume AppArmor and Seccomp audit events for violation auditing and behavioral modeling. If you are using **auditd**, the audit events of AppArmor and Seccomp will be stored by default in `/var/log/audit/audit.log`. Otherwise they will be stored in `/var/log/kern.log`.*
35+
36+
* *The **varmor-agent** requires additional resources as shown below when the BehaviorModeling feature is enabled. Another component, the **varmor-classifier**, which is used to identify random patterns in the path, will also be deployed.*
37+
38+
```yaml
39+
resources:
40+
limits:
41+
cpu: 2
42+
memory: 2Gi
43+
requests:
44+
cpu: 500m
45+
memory: 500Mi
46+
```
47+
:::
5448
5549
## Usage Instructions
5650

website/docs/introduction.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,14 +85,14 @@ The prerequisites required by different enforcers are as shown in the following
8585
## Quick Start
8686
### Step 1. Fetch chart
8787
```
88-
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.7.1
88+
helm pull oci://elkeid-ap-southeast-1.cr.volces.com/varmor/varmor --version 0.8.0
8989
```
9090

9191
### Step 2. Install
9292
The default configuration enables the AppArmor and Seccomp enforcers. Please refer to the documentation for more [configuration options](getting_started/installation#configuration).
9393

9494
```
95-
helm install varmor varmor-0.7.1.tgz \
95+
helm install varmor varmor-0.8.0.tgz \
9696
--namespace varmor --create-namespace \
9797
--set image.registry="elkeid-ap-southeast-1.cr.volces.com"
9898
```

0 commit comments

Comments
 (0)