Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scancentral SAST not enabled by default on 24.2 - EKS/Helm #32

Open
ruivit opened this issue Aug 14, 2024 · 1 comment
Open

Scancentral SAST not enabled by default on 24.2 - EKS/Helm #32

ruivit opened this issue Aug 14, 2024 · 1 comment
Labels
bug Something isn't working

Comments

@ruivit
Copy link

ruivit commented Aug 14, 2024

Current Behavior

When deploying version 24.2 of SSC and SC with Helm, Scancentral SAST is not enabled by default even when specified on the values file.

Scancentral SAST was enabled by default on version 23.1.

This is an issue since the documentation says that restart of server is required to apply the configuration, and on a deployment in Kubernetes this is not possible.

Expected Behavior

Scancentral SAST should be enabled by default and no restart should be needed.

Steps To Reproduce

  1. Install SSC and SC via helm
    helm install fortify-sc -n fortify fortify/scancentral-sast --values=values.yml
    helm install ssc -n fortify fortify/fortify-ssc --values=values.yml

  2. When going to the settings page, scancentral is not enabled by default
    image

Environment

All Fortify components are on version 24.2
Helm - v3.15.3
Kubernetes - 1.29

Anything else?

It appears that documentation was updated on the last commit but the values files remained the same. I wonder if something changed between version which are not being documented.

@ruivit ruivit added the bug Something isn't working label Aug 14, 2024
@Timpartage1
Copy link

hello team, could you please help on this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants