Merge branch 'main' into patch-2
This commit is contained in:
@@ -79,7 +79,8 @@ This procedure demonstrates how to create the service account for your GKE integ
|
||||
$ gcloud projects add-iam-policy-binding $GKE_PROJECT \
|
||||
--member=serviceAccount:$SA_EMAIL \
|
||||
--role=roles/container.admin \
|
||||
--role=roles/storage.admin
|
||||
--role=roles/storage.admin \
|
||||
--role=roles/container.clusterViewer
|
||||
```
|
||||
{% endraw %}
|
||||
1. Download the JSON keyfile for the service account:
|
||||
@@ -88,7 +89,7 @@ This procedure demonstrates how to create the service account for your GKE integ
|
||||
$ gcloud iam service-accounts keys create key.json --iam-account=$SA_EMAIL
|
||||
```
|
||||
{% endraw %}
|
||||
1. Store the project ID as a secret named `GKE_PROJECT`:
|
||||
1. Store the service account key as a secret named `GKE_SA_KEY`:
|
||||
{% raw %}
|
||||
```
|
||||
$ export GKE_SA_KEY=$(cat key.json | base64)
|
||||
|
||||
@@ -33,6 +33,7 @@ When you enable {% data variables.product.prodname_GH_advanced_security %} for y
|
||||
|
||||
- {% data variables.product.prodname_code_scanning_capc %}, see "[Configuring {% data variables.product.prodname_code_scanning %} for your appliance](/admin/advanced-security/configuring-code-scanning-for-your-appliance#prerequisites-for-code-scanning)."
|
||||
- {% data variables.product.prodname_secret_scanning_caps %}, see "[Configuring {% data variables.product.prodname_secret_scanning %} for your appliance](/admin/advanced-security/configuring-secret-scanning-for-your-appliance#prerequisites-for-secret-scanning)."{% endif %}
|
||||
- {% data variables.product.prodname_dependabot %}, see "[Enabling alerts for vulnerable dependencies on {% data variables.product.prodname_ghe_server %}](/admin/configuration/managing-connections-between-github-enterprise-server-and-github-enterprise-cloud/enabling-alerts-for-vulnerable-dependencies-on-github-enterprise-server)."
|
||||
|
||||
## Checking whether your license includes {% data variables.product.prodname_GH_advanced_security %}
|
||||
|
||||
@@ -72,22 +73,45 @@ When {% data variables.product.product_name %} has finished restarting, you're r
|
||||
|
||||
You can enable or disable features programmatically on {% data variables.product.product_location %}. For more information about the administrative shell and command-line utilities for {% data variables.product.prodname_ghe_server %}, see "[Accessing the administrative shell (SSH)](/admin/configuration/accessing-the-administrative-shell-ssh)" and "[Command-line utilities](/admin/configuration/command-line-utilities#ghe-config)."
|
||||
|
||||
For example, you can enable {% data variables.product.prodname_code_scanning %} with your infrastructure-as-code tooling when you deploy an instance for staging or disaster recovery.
|
||||
For example, you can enable any {% data variables.product.prodname_GH_advanced_security %} feature with your infrastructure-as-code tooling when you deploy an instance for staging or disaster recovery.
|
||||
|
||||
1. SSH into {% data variables.product.product_location %}.
|
||||
1. Enable {% data variables.product.prodname_code_scanning %}.
|
||||
1. Enable features for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
|
||||
- To enable {% data variables.product.prodname_code_scanning_capc %}, enter the following commands.
|
||||
|
||||
```shell
|
||||
ghe-config app.minio.enabled true
|
||||
ghe-config app.code-scanning.enabled true
|
||||
ghe-config app.code-scanning.enabled true
|
||||
```
|
||||
2. Optionally, disable {% data variables.product.prodname_code_scanning %}.
|
||||
- To enable {% data variables.product.prodname_secret_scanning_caps %}, enter the following command.
|
||||
|
||||
```shell
|
||||
ghe-config app.secret-scanning.enabled true
|
||||
```
|
||||
- To enable {% data variables.product.prodname_dependabot %}, enter the following commands.
|
||||
```shell
|
||||
ghe-config app.github.dependency-graph-enabled true
|
||||
ghe-config app.github.vulnerability-alerting-and-settings-enabled true
|
||||
```
|
||||
2. Optionally, disable features for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
|
||||
- To disable {% data variables.product.prodname_code_scanning %}, enter the following commands.
|
||||
```shell
|
||||
ghe-config app.minio.enabled false
|
||||
ghe-config app.code-scanning.enabled false
|
||||
```
|
||||
- To disable {% data variables.product.prodname_secret_scanning %}, enter the following command.
|
||||
```shell
|
||||
ghe-config app.secret-scanning.enabled false
|
||||
```
|
||||
- To disable {% data variables.product.prodname_dependabot %}, enter the following commands.
|
||||
```shell
|
||||
ghe-config app.github.dependency-graph-enabled false
|
||||
ghe-config app.github.vulnerability-alerting-and-settings-enabled false
|
||||
```
|
||||
|
||||
3. Apply the configuration.
|
||||
```shell
|
||||
ghe-config-apply
|
||||
```
|
||||
|
||||
{% ifversion ghes > 2.22 %}To enable and disable {% data variables.product.prodname_secret_scanning %} in the same way, set: `ghe-config app.secret-scanning.enabled` true or false and apply the configuration.{% endif %}
|
||||
ghe-config-apply
|
||||
```
|
||||
|
||||
@@ -1 +1 @@
|
||||
When you use expressions in an `if` conditional, you may omit the expression syntax ({% raw %}`${{ }}`{% endraw %}) because {% data variables.product.prodname_dotcom %} automatically evaluates the `if` conditional as an expression, unless the expression contains any operators. If the expression contains any operators, the expression must be contained within {% raw %}`${{ }}`{% endraw %} to explicitly mark it for evaluation.
|
||||
When you use expressions in an `if` conditional, you may omit the expression syntax ({% raw %}`${{ }}`{% endraw %}) because {% data variables.product.prodname_dotcom %} automatically evaluates the `if` conditional as an expression.
|
||||
|
||||
Reference in New Issue
Block a user