roxctl CLI
roxctl CLI
Abstract
Chapter 1. Installing the roxctl CLI
roxctl
is a command-line interface (CLI) for running commands on Red Hat Advanced Cluster Security for Kubernetes (RHACS). You can install the roxctl
CLI by downloading the binary or you can run the roxctl
CLI from a container image.
1.1. Installing the roxctl CLI by downloading the binary
You can install the roxctl
CLI to interact with RHACS from a command-line interface. You can install roxctl
on Linux, Windows, or macOS.
1.1.1. Installing the roxctl CLI on Linux
You can install the roxctl
CLI binary on Linux by using the following procedure.
roxctl
CLI for Linux is available for amd64
, arm64
, ppc64le
, and s390x
architectures.
Procedure
Determine the
roxctl
architecture for the target operating system:$ arch="$(uname -m | sed "s/x86_64//")"; arch="${arch:+-$arch}"
Download the
roxctl
CLI:$ curl -L -f -o roxctl "https://mirror.openshift.com/pub/rhacs/assets/4.5.5/bin/Linux/roxctl${arch}"
Make the
roxctl
binary executable:$ chmod +x roxctl
Place the
roxctl
binary in a directory that is on yourPATH
:To check your
PATH
, execute the following command:$ echo $PATH
Verification
Verify the
roxctl
version you have installed:$ roxctl version
1.1.2. Installing the roxctl CLI on macOS
You can install the roxctl
CLI binary on macOS by using the following procedure.
roxctl
CLI for macOS is available for amd64
and arm64
architectures.
Procedure
Determine the
roxctl
architecture for the target operating system:$ arch="$(uname -m | sed "s/x86_64//")"; arch="${arch:+-$arch}"
Download the
roxctl
CLI:$ curl -L -f -o roxctl "https://mirror.openshift.com/pub/rhacs/assets/4.5.5/bin/Darwin/roxctl${arch}"
Remove all extended attributes from the binary:
$ xattr -c roxctl
Make the
roxctl
binary executable:$ chmod +x roxctl
Place the
roxctl
binary in a directory that is on yourPATH
:To check your
PATH
, execute the following command:$ echo $PATH
Verification
Verify the
roxctl
version you have installed:$ roxctl version
1.1.3. Installing the roxctl CLI on Windows
You can install the roxctl
CLI binary on Windows by using the following procedure.
roxctl
CLI for Windows is available for the amd64
architecture.
Procedure
Download the
roxctl
CLI:$ curl -f -O https://mirror.openshift.com/pub/rhacs/assets/4.5.5/bin/Windows/roxctl.exe
Verification
Verify the
roxctl
version you have installed:$ roxctl version
1.2. Running the roxctl CLI from a container
The roxctl
client is the default entry point in the RHACS roxctl
image. To run the roxctl
client in a container image:
Prerequisites
- You must first generate an authentication token from the RHACS portal.
Procedure
Log in to the
registry.redhat.io
registry.$ docker login registry.redhat.io
Pull the latest container image for the
roxctl
CLI.$ docker pull registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8:4.5.5
After you install the CLI, you can run it by using the following command:
$ docker run -e ROX_API_TOKEN=$ROX_API_TOKEN \ -it registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8:4.5.5 \ -e $ROX_CENTRAL_ADDRESS <command>
In Red Hat Advanced Cluster Security Cloud Service (RHACS Cloud Service), when using roxctl
commands that require the Central address, use the Central instance address as displayed in the Instance Details section of the Red Hat Hybrid Cloud Console. For example, use acs-ABCD12345.acs.rhcloud.com
instead of acs-data-ABCD12345.acs.rhcloud.com
.
Verification
Verify the
roxctl
version you have installed.$ docker run -it registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8:4.5.5 version
Chapter 2. Using the roxctl CLI
2.1. Prerequisites
You have configured the
ROX_ENDPOINT
environment variable using the following command:$ export ROX_ENDPOINT=<host:port> 1
- 1
- The host and port information that you want to store in the
ROX_ENDPOINT
environment variable.
2.2. Getting authentication information
The following procedure describes how to use the roxctl central whoami
command to retrieve information about your authentication status and user profile in Central. The example output illustrates the data you can expect to see, including user roles, access permissions, and various administrative functions. This step allows you to review your access and roles within Central.
Procedure
Run the following command to get information about your current authentication status and user information in Central:
$ roxctl central whoami
Example output
UserID: <redacted> User name: <redacted> Roles: APIToken creator, Admin, Analyst, Continuous Integration, Network Graph Viewer, None, Sensor Creator, Vulnerability Management Approver, Vulnerability Management Requester, Vulnerability Manager, Vulnerability Report Creator Access: rw Access rw Administration rw Alert rw CVE rw Cluster rw Compliance rw Deployment rw DeploymentExtension rw Detection rw Image rw Integration rw K8sRole rw K8sRoleBinding rw K8sSubject rw Namespace rw NetworkGraph rw NetworkPolicy rw Node rw Secret rw ServiceAccount rw VulnerabilityManagementApprovals rw VulnerabilityManagementRequests rw WatchedImage rw WorkflowAdministration
Review the output to ensure that the authentication and user details are as expected.
2.3. Authenticating by using the roxctl CLI
For authentication, you can use an API token, your administrator password, or the roxctl central login
command.
Follow these guidelines for the effective use of API tokens:
- Use an API token in a production environment with continuous integration (CI). Each token is assigned specific access permissions, providing control over the actions it can perform. In addition, API tokens do not require interactive processes, such as browser-based logins, making them ideal for automated processes. These tokens have a time-to-live (TTL) value of 1 year, providing a longer validity period for seamless integration and operational efficiency.
- Use your administrator password only for testing purposes. Do not use it in the production environment.
-
Use the
roxctl central login
command only for interactive, local uses.
2.3.1. Creating an API token
Procedure
- In the RHACS portal, go to Platform Configuration → Integrations.
- Scroll to the Authentication Tokens category, and then click API Token.
- Click Generate Token.
- Enter a name for the token and select a role that provides the required level of access (for example, Continuous Integration or Sensor Creator).
Click Generate.
ImportantCopy the generated token and securely store it. You will not be able to view it again.
2.3.2. Exporting and saving the API token
Procedure
After you have generated the authentication token, export it as the
ROX_API_TOKEN
variable by entering the following command:$ export ROX_API_TOKEN=<api_token>
(Optional): You can also save the token in a file and use it with the
--token-file
option by entering the following command:$ roxctl central debug dump --token-file <token_file>
Note the following guidelines:
-
You cannot use both the
-password
(-p
) and the--token-file
options simultaneously. -
If you have already set the
ROX_API_TOKEN
variable, and specify the--token-file
option, theroxctl
CLI uses the specified token file for authentication. -
If you have already set the
ROX_API_TOKEN
variable, and specify the--password
option, theroxctl
CLI uses the specified password for authentication.
2.3.3. Using an authentication provider to authenticate with roxctl
You can configure an authentication provider in Central and initiate the login process with the roxctl
CLI. Set the ROX_ENDPOINT
variable, initiate the login process with the roxctl central login
command, select the authentication provider in a browser window, and retrieve the token information from the roxctl
CLI as described in the following procedure.
Prerequisite
- You selected an authentication provider of your choice, such as OpenID Connect (OIDC) with fragment or query mode.
Procedure
Run the following command to set the
ROX_ENDPOINT
variable to Central hostname and port:export ROX_ENDPOINT=<central_hostname:port>
Run the following command to initiate the login process to Central:
$ roxctl central login
-
Within the
roxctl
CLI, a URL is printed as output and you are redirected to a browser window where you can select the authentication provider you want to use. Log in with your authentication provider.
After you have successfully logged in, the browser window indicates that authentication was successful and you can close the browser window.
The
roxctl
CLI displays your token information including details such as the access token, the expiration time of the access token, the refresh token if one has been issued, and notification that these values are stored locally.Example output
Please complete the authorization flow in the browser with an auth provider of your choice. If no browser window opens, please click on the following URL: http://127.0.0.1:xxxxx/login INFO: Received the following after the authorization flow from Central: INFO: Access token: <redacted> 1 INFO: Access token expiration: 2023-04-19 13:58:43 +0000 UTC 2 INFO: Refresh token: <redacted> 3 INFO: Storing these values under $HOME/.roxctl/login… 4
ImportantEnsure that you set the environment to determine the directory where the configuration is stored. By default, the configuration is stored in the
$HOME/.roxctl/roxctl-config
directory.-
If you set the
$ROX_CONFIG_DIR
environment variable, the configuration is stored in the$ROX_CONFIG_DIR/roxctl-config
directory. This option has the highest priority. -
If you set the
$XDG_RUNTIME_DIR
environment variable and the$ROX_CONFIG_DIR
variable is not set, the configuration is stored in the$XDG_RUNTIME_DIR /roxctl-config
directory. -
If you do not set the
$ROX_CONFIG_DIR
or$XDG_RUNTIME_DIR
environment variable, the configuration is stored in the$HOME/.roxctl/roxctl-config
directory.
-
If you set the
2.4. Configuring and using the roxctl CLI in RHACS Cloud Service
Procedure
Export the
ROX_API_TOKEN
by running the following command:$ export ROX_API_TOKEN=<api_token>
Export the
ROX_ENDPOINT
by running the following command:$ export ROX_ENDPOINT=<address>:<port_number>
-
You can use the
--help
option to get more information about the commands. -
In Red Hat Advanced Cluster Security Cloud Service (RHACS Cloud Service), when using
roxctl
commands that require the Central address, use the Central instance address as displayed in the Instance Details section of the Red Hat Hybrid Cloud Console. For example, useacs-ABCD12345.acs.rhcloud.com
instead ofacs-data-ABCD12345.acs.rhcloud.com
.
Chapter 3. Managing secured clusters
To secure a Kubernetes or an OpenShift Container Platform cluster, you must deploy Red Hat Advanced Cluster Security for Kubernetes (RHACS) services into the cluster. You can generate deployment files in the RHACS portal by navigating to the Platform Configuration → Clusters view, or you can use the roxctl
CLI.
3.1. Prerequisites
You have configured the
ROX_ENDPOINT
environment variable using the following command:$ export ROX_ENDPOINT=<host:port> 1
- 1
- The host and port information that you want to store in the
ROX_ENDPOINT
environment variable.
3.2. Generating Sensor deployment files
Generating files for Kubernetes systems
Procedure
Generate the required sensor configuration for your Kubernetes cluster and associate it with your Central instance by running the following command:
$ roxctl sensor generate k8s --name <cluster_name> --central "$ROX_ENDPOINT"
Generating files for OpenShift Container Platform systems
Procedure
Generate the required sensor configuration for your OpenShift Container Platform cluster and associate it with your Central instance by running the following command:
$ roxctl sensor generate openshift --openshift-version <ocp_version> --name <cluster_name> --central "$ROX_ENDPOINT" 1
- 1
- For the
--openshift-version
option, specify the major OpenShift Container Platform version number for your cluster. For example, specify3
for OpenShift Container Platform version3.x
and specify4
for OpenShift Container Platform version4.x
.
Read the
--help
output to see other options that you might need to use depending on your system architecture.Verify that the endpoint you provide for
--central
can be reached from the cluster where you are deploying Red Hat Advanced Cluster Security for Kubernetes services.ImportantIf you are using a non-gRPC capable load balancer, such as HAProxy, AWS Application Load Balancer (ALB), or AWS Elastic Load Balancing (ELB), follow these guidelines:
-
Use the WebSocket Secure (
wss
) protocol. To usewss
, prefix the address withwss://
, and Add the port number after the address, for example:
$ roxctl sensor generate k8s --central wss://stackrox-central.example.com:443
3.3. Installing Sensor by using the sensor.sh script
When you generate the Sensor deployment files, roxctl
creates a directory called sensor-<cluster_name>
in your working directory. The script to install Sensor is located in this directory.
Procedure
Run the sensor installation script to install Sensor:
$ ./sensor-<cluster_name>/sensor.sh
If you get a warning that you do not have the required permissions to install Sensor, follow the on-screen instructions, or contact your cluster administrator for help.
3.4. Downloading Sensor bundles for existing clusters
Procedure
Run the following command to download Sensor bundles for existing clusters by specifying a
cluster name
orID
:$ roxctl sensor get-bundle <cluster_name_or_id>
3.5. Deleting cluster integration
Procedure
Before deleting the cluster, ensure you have the correct cluster name that you want to remove from Central:
$ roxctl cluster delete --name=<cluster_name>
ImportantDeleting the cluster integration does not remove the RHACS services running in the cluster, depending on the installation method. You can remove the services by running the
delete-sensor.sh
script from the Sensor installation bundle.
Chapter 4. Checking policy compliance
You can use the roxctl
CLI to check deployment YAML files and images for policy compliance.
4.1. Prerequisites
You have configured the
ROX_ENDPOINT
environment variable using the following command:$ export ROX_ENDPOINT=<host:port> 1
- 1
- The host and port information that you want to store in the
ROX_ENDPOINT
environment variable.
4.2. Configuring output format
When you check policy compliance by using the roxctl deployment check
or roxctl image check
commands, you can specify the output format by using the -o
option to the command and specifying the format as json
, table
, csv
, or junit
. This option determines how the output of a command is displayed in the terminal.
For example, the following command checks a deployment and then displays the result in csv
format:
$ roxctl deployment check --file =<yaml_filename> -o csv
When you do not specify the -o
option for the output format, the following default behavior is used:
-
The format for the
deployment check
and theimage check
commands istable
. -
The default output format for the
image scan
command isjson
. This is the old JSON format output for compatibility with older versions of the CLI. To get the output in the new JSON format, specify the option with format, as-o json
. Use the old JSON format output when gathering data for troubleshooting purposes.
Different options are available to configure the output. The following table lists the options and the format in which they are available.
Option | Description | Formats |
---|---|---|
| Use this option to display the JSON output in a compact format. |
|
| Use this option to specify custom headers. |
|
| Use this option to omit the header row from the output. |
|
| Use this option to specify GJSON paths to select specific items from the output. For example, to get the Policy name and Severity for a deployment check, use the following command: $ roxctl deployment check --file=<yaml_filename> \ -o table --headers POLICY-NAME,SEVERITY \ --row-jsonpath-expressions="{results..violatedPolicies..name,results..violatedPolicies..severity}" |
|
| Use this options to merge table cells that have the same value. |
|
| Use this option to include the header row as a comment in the output. |
|
| Use this option to specify the name of the JUnit test suite. |
|
4.3. Checking deployment YAML files
Procedure
Run the following command to check the build-time and deploy-time violations of your security policies in YAML deployment files:
$ roxctl deployment check --file=<yaml_filename> \1 --namespace=<cluster_namespace> \2 --cluster=<cluster_name_or_id> \3 --verbose 4
- 1
- For the
<yaml_filename>
, specify the YAML file with one or more deployments to send to Central for policy evaluation. You can also specify multiple YAML files to send to Central for policy evaluation by using the--file
flag, for example--file=<yaml_filename1>
,--file=<yaml_filename2>
, and so on. - 2
- For the
<cluster_namespace>
, specify a namespace to enhance deployments with context information such as network policies, role-based access controls (RBACs) and services for deployments that do not have a namespace in their specification. The namespace defined in the specification is not changed. The default value isdefault
. - 3
- For the
<cluster_name_or_id>
, specify the cluster name or ID that you want to use as the context for the evaluation to enable extended deployments with cluster-specific information. - 4
- By enabling the
--verbose
flag, you receive additional information for each deployment during the policy check. The extended information includes the RBAC permission level and a comprehensive list of network policies that is applied.NoteYou can see the additional information for each deployment in your JSON output, regardless of whether you enable the
--verbose
flag or not.
The format is defined in the API reference. To cause Red Hat Advanced Cluster Security for Kubernetes (RHACS) to re-pull image metadata and image scan results from the associated registry and scanner, add the
--force
option.NoteTo check specific image scan results, you must have a token with both
read
andwrite
permissions for theImage
resource. The default Continuous Integration system role already has the required permissions.This command validates the following items:
- Configuration options in a YAML file, such as resource limits or privilege options
- Aspects of the images used in a YAML file, such as components or vulnerabilities
4.4. Checking images
Procedure
Run the following command to check the build-time violations of your security policies in images:
$ roxctl image check --image=<image_name>
The format is defined in the API reference. To cause Red Hat Advanced Cluster Security for Kubernetes (RHACS) to re-pull image metadata and image scan results from the associated registry and scanner, add the
--force
option.NoteTo check specific image scan results, you must have a token with both
read
andwrite
permissions for theImage
resource. The default Continuous Integration system role already has the required permissions.
Additional resources
4.5. Checking image scan results
You can also check the scan results for specific images.
Procedure
Run the following command to return the components and vulnerabilities found in the image in JSON format:
$ roxctl image scan --image <image_name>
The format is defined in the API reference. To cause Red Hat Advanced Cluster Security for Kubernetes (RHACS) to re-pull image metadata and image scan results from the associated registry and scanner, add the
--force
option.NoteTo check specific image scan results, you must have a token with both
read
andwrite
permissions for theImage
resource. The default Continuous Integration system role already has the required permissions.
Additional resources
Chapter 5. Debugging issues
Central saves information to its container logs.
5.1. Prerequisites
You have configured the
ROX_ENDPOINT
environment variable using the following command:$ export ROX_ENDPOINT=<host:port> 1
- 1
- The host and port information that you want to store in the
ROX_ENDPOINT
environment variable.
5.2. Viewing the logs
You can use either the oc
or kubectl
command to view the logs for the Central pod.
Procedure
To view the logs for the Central pod by using
kubectl
, run the following command :$ kubectl logs -n stackrox <central_pod>
To view the logs for the Central pod by using
oc
, run the following command :$ oc logs -n stackrox <central_pod>
5.3. Viewing the current log level
You can change the log level to see more or less information in Central logs.
Procedure
Run the following command to view the current log level:
$ roxctl central debug log
Additional resources
5.4. Changing the log level
Procedure
Run the following command to change the log level:
$ roxctl central debug log --level=<log_level> 1
- 1
- The acceptable values for
<log_level>
arePanic
,Fatal
,Error
,Warn
,Info
, andDebug
.
Additional resources
5.5. Retrieving debugging information
Procedure
Run the following command to gather the debugging information for investigating issues:
$ roxctl central debug dump
- To generate a diagnostic bundle with the RHACS administrator password or API token and central address, follow the procedure in Generating a diagnostic bundle by using the roxctl CLI.
Additional resources
Chapter 6. Generating build-time network policies
The build-time network policy generator is included in the roxctl
CLI. For the build-time network policy generation feature, roxctl
CLI does not need to communicate with RHACS Central so you can use it in any development environment.
6.1. Using the build-time network policy generator
You can generate network policies by using the built-in network policy generator in the roxctl
CLI.
Prerequisites
-
The build-time network policy generator recursively scans the directory you specify when you run the command. Therefore, before you run the command, you must already have service manifests, config maps, and workload manifests such as
Pod
,Deployment
,ReplicaSet
,Job
,DaemonSet
, andStatefulSet
as YAML files in the specified directory. -
Verify that you can apply these YAML files as-is using the
kubectl apply -f
command. The build-time network policy generator does not work with files that use Helm-style templating. Verify that the service network addresses are not hard-coded. Every workload that needs to connect to a service must specify the service network address as a variable. You can specify this variable by using the workload’s resource environment variable or in a config map.
Service network addresses must match the following official regular expression pattern:
(http(s)?://)?<svc>(.<ns>(.svc.cluster.local)?)?(:<portNum>)? 1
- 1
- In this pattern,
- <svc> is the service name.
- <ns> is the namespace where you defined the service.
- <portNum> is the exposed service port number.
Following are some examples that match the pattern:
-
wordpress-mysql:3306
-
redis-follower.redis.svc.cluster.local:6379
-
redis-leader.redis
-
http://rating-service.
Procedure
Verify that the build-time network policy generation feature is available by running the help command:
$ roxctl netpol generate -h
Generate the policies by using the
netpol generate
command:$ roxctl netpol generate <folder-path> 1
- 1
- Specify the path of the folder that has the Kubernetes manifests.
The roxctl netpol generate
command supports the following options:
| Description |
|
View the help text for the |
| Save the generated policies into a target folder. One file per policy. |
| Save and merge the generated policies into a single YAML file. |
|
Fail on the first encountered error. The default value is |
| Remove the output path if it already exist. |
|
Treat warnings as errors. The default value is |
|
Specify the default DNS port to use in the egress rules of the generated policies. The default value is |
Chapter 7. Image scanning by using the roxctl CLI
You can scan images stored in image registries, including cluster local registries such as the OpenShift Container Platform integrated image registry by using the roxctl
CLI.
7.1. Scanning images by using a remote cluster
By specifying the appropriate cluster in the delegated scanning configuration or through the cluster parameter described in the following procedure, you can scan images from cluster local registries by using a remote cluster.
For more information about how to configure delegated image scanning, see Configuring delegated image scanning.
Procedure
Run the following command to scan the specified image in a remote cluster:
$ roxctl image scan \ --image=<image_registry>/<image_name> \1 --cluster=<cluster_detail> \2 [flags] 3
- 1
- For
<image_registry>
, specify the registry where the image is located, for example,image-registry.openshift-image-registry.svc:5000/
. For<image_name>
, specify the name of the image you want to scan, for example,default/image-stream:latest
. - 2
- For
<cluster_detail>
, specify the name or ID of the remote cluster. For example, specify the nameremote
. - 3
- Optional: For
[flags]
, you can specify parameters to modify the behavior of the command.For more information about optional parameters, see roxctl image scan command options.
Example output
{ "Id": "sha256:3f439d7d71adb0a0c8e05257c091236ab00c6343bc44388d091450ff58664bf9", 1 "name": { 2 "registry": "image-registry.openshift-image-registry.svc:5000", 3 "remote": "default/image-stream", 4 "tag": "latest", 5 "fullName": "image-registry.openshift-image-registry.svc:5000/default/image-stream:latest" 6 }, [...]
- 1
- A unique identifier for the image that serves as a fingerprint for the image. It helps ensure the integrity and authenticity of the image.
- 2
- Contains specific details about the image.
- 3
- The location of the image registry where the image is stored.
- 4
- The remote path to the image.
- 5
- The version or tag associated with this image.
- 6
- The complete name of the image, combining the registry, remote path, and tag.
7.2. roxctl image scan command options
The roxctl image scan
command supports the following options:
Option | Description |
---|---|
| Delegate image scanning to a specific cluster. |
|
Print the JSON output in a compact format. The default value is |
|
Ignore Central’s cache for the scan and force a fresh re-pull from Scanner. The default value is |
|
Print the headers in a tabular format. Default values include |
|
Print the headers as comments in a CSV tabular output. The default value is |
|
View the help text for the |
| Specify the image name and reference you want to scan. |
|
Return both snoozed and unsnoozed common vulnerabilities and exposures (CVEs). The default value is |
|
Merge duplicate cells in a tabular output. The default value is |
|
Do not print headers for tabular format. The default value is |
|
Specify the output format. You can select a format to customize the display of results. Formats include |
|
Set the number of retries before the operation is aborted with an error. The default value is |
|
Set the time in seconds to wait between retries. The default value is |
|
Use the JSON path expressions to create rows from the JSON object. For more details, run the |
Chapter 8. roxctl CLI command reference
8.1. roxctl
Display the available commands and optional parameters for roxctl
CLI. You must have an account with administrator privileges to use these commands.
Usage
$ roxctl [command] [flags]
Command | Description |
---|---|
| Commands related to the Central service. |
| Commands related to a cluster. |
| Commands related to the Collector service. |
| Generate shell completion scripts. |
| Manage declarative configuration. |
| Commands related to deployments. |
| Commands related to Red Hat Advanced Cluster Security for Kubernetes (RHACS) Helm Charts. |
| Commands that you can run on a specific image. |
| Commands related to network policies. |
| Commands related to the Scanner service. |
| Deploy RHACS services in secured clusters. |
| Display the current roxctl version. |
8.1.1. roxctl command options
The roxctl
command supports the following options:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
8.2. roxctl central
Commands related to the Central service.
Usage
$ roxctl central [command] [flags]
Command | Description |
---|---|
| Create a backup of the Red Hat Advanced Cluster Security for Kubernetes (RHACS) database and the certificates. |
| Download the certificate chain for the Central service. |
| Control the database operations. |
| Debug the Central service. |
| Generate the required YAML configuration files containing the orchestrator objects for the deployment of Central. |
| Initialize bundles for Central. |
| Log in to the Central instance to obtain a token. |
| Manage the user certificate authorization providers. |
| Display information about the current user and their authentication method. |
8.2.1. roxctl central command options inherited from the parent command
The roxctl central
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl central
command.
8.2.2. roxctl central backup
Create a backup of the RHACS database and certificates.
Usage
$ roxctl central backup [flags]
Option | Description |
---|---|
|
Specify to only back up the certificates. When using an external database, this option is used to generate a backup bundle with certificates. The default value is |
| Specify where you want to save the backup. The behavior depends on the specified path:
|
|
Specify the timeout for API requests. It represents the maximum duration of a request. The default value is |
8.2.3. roxctl central cert
Download the certificate chain for the Central service.
Usage
$ roxctl central cert [flags]
Option | Description |
---|---|
|
Specify the file name to which you want to save the PEM certificate. You can generate a standard output by using |
|
Specify the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.4. roxctl central login
Login to the Central instance to obtain a token.
Usage
$ roxctl central login [flags]
Option | Description |
---|---|
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.5. roxctl central whoami
Display information about the current user and their authentication method.
Usage
$ roxctl central whoami [flags]
Option | Description |
---|---|
|
Specify the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.6. roxctl central db
Control the database operations.
Usage
$ roxctl central db [flags]
Option | Description |
---|---|
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.6.1. roxctl central db restore
Restore the RHACS database from a previous backup.
Usage
$ roxctl central db restore <file> [flags] 1
- 1
- For
<file>
, specify the database backup file that you want to restore.
Option | Description |
---|---|
|
If set to |
|
If set to |
8.2.6.2. roxctl central db generate
Generate a Central database bundle.
Usage
$ roxctl central db generate [flags]
Option | Description |
---|---|
|
If set to |
|
Specify the path to the Helm templates in your local file system. For more details, run the |
|
If set to |
8.2.6.3. roxctl central db generate k8s
Generate Kubernetes YAML files for deploying Central’s database components.
Usage
$ roxctl central db generate k8s [flags]
Option | Description |
---|---|
|
Specify the Central database image that you want to use. If not specified, a default value corresponding to the |
|
Specify the default settings for container images. It controls the repositories from which the images are downloaded, the image names and the format of the tags. The default value is |
|
Specify the directory to which you want to save the deployment bundle. The default value is |
8.2.6.4. roxctl central db restore cancel
Cancel the ongoing Central database restore process.
Usage
$ roxctl central db restore cancel [flags]
Option | Description |
---|---|
|
If set to |
8.2.6.5. roxctl central db restore status
Display information about the ongoing database restore process.
Usage
$ roxctl central db restore status [flags]
8.2.6.6. roxctl central db generate k8s pvc
Generate Kubernetes YAML files for persistent volume claims (PVCs) in Central.
Usage
$ roxctl central db generate k8s pvc [flags]
Option | Description |
---|---|
|
Specify the external volume name for the Central database. The default value is |
|
Specify the external volume size in gigabytes for the Central database. The default value is |
| Specify the storage class name for the Central database. This is optional if you have a default storage class configured. |
8.2.6.7. roxctl central db generate openshift
Generate an OpenShift YAML manifest for deploying a Central database instance on a Red Hat OpenShift cluster.
Usage
$ roxctl central db generate openshift [flags]
Option | Description |
---|---|
|
Specify the Central database image that you want to use. If not specified, a default value corresponding to the |
|
Specify the default settings for container images. It controls the repositories from which the images are downloaded, the image names and the format of the tags. The default value is |
|
Specify the Red Hat OpenShift major version 3 or 4 for the deployment. The default value is |
|
Specify the directory to which you want to save the deployment bundle. The default value is |
8.2.6.8. roxctl central db generate k8s hostpath
Generate a Kubernetes YAML manifest for a database deployment with a hostpath volume type in Central.
Usage
$ roxctl central db generate k8s hostpath [flags]
Option | Description |
---|---|
|
Specify the path on the host. The default value is |
|
Specify the node selector key. Valid values include |
| Specify the node selector value. |
8.2.6.9. roxctl central db generate openshift pvc
Generate an OpenShift YAML manifest for a database deployment with a persistent volume claim (PVC) in Central.
Usage
$ roxctl central db generate openshift pvc [flags]
Option | Description |
---|---|
--name string |
Specify the external volume name for the Central database. The default value is |
--size uint32 |
Specify the external volume size in gigabytes for the Central database. The default value is |
--storage-class string | Specify the storage class name for the Central database. This is optional if you have a default storage class configured. |
8.2.6.10. roxctl central db generate openshift hostpath
Add a hostpath external volume to the Central database.
Usage
$ roxctl central db generate openshift hostpath [flags]
Option | Description |
---|---|
|
Specify the path on the host. The default value is |
|
Specify the node selector key. Valid values include |
| Specify the node selector value. |
8.2.7. roxctl central debug
Debug the Central service.
Usage
$ roxctl central debug [flags]
8.2.7.1. roxctl central debug db
Control the debugging of the database.
Usage
$ roxctl central debug db [flags]
Option | Description |
---|---|
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.7.2. roxctl central debug log
Retrieve the current log level.
Usage
$ roxctl central debug log [flags]
Option | Description |
---|---|
|
Specify the log level to which you want to set the modules. Valid values include |
| Specify the modules to which you want to apply the command. |
|
Specify the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
|
Specify the timeout for API requests, which is the maximum duration of a request. The default value is |
8.2.7.3. roxctl central debug dump
Download a bundle containing the debug information for Central.
Usage
$ roxctl central debug dump [flags]
Option | Description |
---|---|
|
If set to |
| Specify the output directory for the bundle content. The default value is an automatically generated directory name within the current directory. |
|
Specify the timeout for API requests, which is the maximum duration of a request. The default value is |
8.2.7.4. roxctl central debug db stats
Control the statistics of the Central database.
Usage
$ roxctl central debug db stats [flags]
8.2.7.5. roxctl central debug authz-trace
Enable or disable authorization tracing in Central for debugging purposes.
Usage
$ roxctl central debug authz-trace [flags]
Option | Description |
---|---|
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.7.6. roxctl central debug db stats reset
Reset the statistics of the Central database.
Usage
$ roxctl central debug db stats reset [flags]
8.2.7.7. roxctl central debug download-diagnostics
Download a bundle containing a snapshot of diagnostic information about the platform.
Usage
$ roxctl central debug download-diagnostics [flags]
Option | Description |
---|---|
| Specify a comma-separated list of the Sensor clusters from which you want to collect the logs. |
| Specify the output directory in which you want to save the diagnostic bundle. |
| Specify the timestamp from which you want to collect the logs from the Sensor clusters. |
|
Specify the timeout for API requests, which specifies the maximum duration of a request. The default value is |
8.2.8. roxctl central generate
Generate the required YAML configuration files that contain the orchestrator objects to deploy Central.
Usage
$ roxctl central generate [flags]
Option | Description |
---|---|
| Specify the path to the backup bundle from which you want to restore the keys and certificates. |
|
If set to |
|
Specify the path to Helm templates on your local file system. For more details, run the |
| Specify the PEM certificate bundle file that you want to use as the default. |
| Specify the PEM private key file that you want to use as the default. |
|
If set to |
| Specify the administrator password. The default value is automatically generated. |
| Specify the ports or endpoints you want to use for unencrypted exposure as a comma-separated list. |
8.2.8.1. roxctl central generate k8s
Generate the required YAML configuration files to deploy Central into a Kubernetes cluster.
Usage
$ roxctl central generate k8s [flags]
Option | Description |
---|---|
|
Specify the Central database image you want to use. If not specified, a default value corresponding to the |
| Specify a list of configuration maps that you want to add as declarative configuration mounts in Central. |
| Specify a list of secrets that you want to add as declarative configuration mounts in Central. |
|
Specify whether you want to enable telemetry. The default value is |
|
Specify the default settings for container images. The specified settings control the repositories from which the images are downloaded, the image names and the format of the tags. The default value is |
|
Generate deployment files that support the specified Istio version. Valid values include |
|
Specify the method in which you want to suspend Central. Valid values include |
|
Specify the main image that you want to use. If not specified, a default value corresponding to the |
|
Specify whether you want to run RHACS in offline mode, avoiding a connection to the Internet. The default value is |
|
Specify the directory to which you want to save the deployment bundle. The default value is |
|
Specify the deployment tool that you want to use. Valid values include |
|
Specify the Scanner database image that you want to use. If not specified, a default value corresponding to the |
| Specify the Scanner image that you want to use. If not specified, a default value corresponding to the `--image-defaults" is used. |
8.2.8.2. roxctl central generate k8s pvc
Generate Kubernetes YAML files for persistent volume claims (PVCs) in Central.
Usage
$ roxctl central generate k8s pvc [flags]
Option | Description |
---|---|
|
Specify the external volume name for the Central database. The default value is |
|
Specify the external volume size in gigabytes for the Central database. The default value is |
| Specify the storage class name for the Central database. This is optional if you have a default storage class configured. |
|
Specify the external volume name for Central. The default value is |
|
Specify the external volume size in gigabytes for Central. The default value is |
| Specify the storage class name for Central. This is optional if you have a default storage class configured. |
8.2.8.3. roxctl central generate openshift
Generate the required YAML configuration files to deploy Central in a Red Hat OpenShift cluster.
Usage
$ roxctl central generate openshift [flags]
Option | Description |
---|---|
|
Specify the Central database image that you want to use. If not specified, a default value is created corresponding to the |
| Specify a list of configuration maps that you want to add as declarative configuration mounts in Central. |
| Specify a list of secrets that you want to add as declarative configuration mounts in Central. |
|
Specify whether you want to enable telemetry. The default value is |
|
Specify the default settings for container images. It controls the repositories from which the images are downloaded, the image names and the format of the tags. The default value is |
|
Generate deployment files that support the specified Istio version. Valid values include |
|
Specify the method of exposing Central. Valid values include |
|
Specify the main image that you want to use. If not specified, a default value corresponding to |
|
Specify whether you want to run RHACS in offline mode, avoiding a connection to the Internet. The default value is |
|
Specify integration with Red Hat OpenShift 4 monitoring. The default value is |
| Specify the Red Hat OpenShift major version 3 or 4 for the deployment. |
|
Specify the directory to which you want to save the deployment bundle. The default value is |
|
Specify the deployment tool that you want to use. Valid values include |
|
Specify the Scanner database image that you want to use. If not specified, a default value corresponding to the |
|
Specify the Scanner image that you want to use. If not specified, a default value corresponding to |
8.2.8.4. roxctl central generate interactive
Generate interactive resources in Central.
Usage
$ roxctl central generate interactive [flags]
8.2.8.5. roxctl central generate k8s hostpath
Generate a Kubernetes YAML manifest for deploying a Central instance by using the hostpath volume type.
Usage
$ roxctl central generate k8s hostpath [flags]
Option | Description |
---|---|
|
Specify the path on the host for the Central database. The default value is |
|
Specify the node selector key for the Central database. Valid values include |
| Specify the node selector value for the Central database. |
|
Specify the path on the host. The default value is |
|
Specify the node selector key. Valid values include |
| Specify the node selector value. |
8.2.8.6. roxctl central generate openshift pvc
Generate a OpenShift YAML manifest for deploying a persistent volume claim (PVC) in Central.
Usage
$ roxctl central generate openshift pvc [flags]
Option | Description |
---|---|
|
Specify the external volume name for the Central database. The default value is |
|
Specify the external volume size in gigabytes for the Central database. The default value is |
| Specify the storage class name for the Central database. This is optional if you have a default storage class configured. |
|
Specify the external volume name for Central. The default value is |
|
Specify the external volume size in gigabytes for Central. The default value is |
| Specify the storage class name for Central. This is optional if you have a default storage class configured. |
8.2.8.7. roxctl central generate openshift hostpath
Add a hostpath external volume to the deployment definition in Red Hat OpenShift.
Usage
$ roxctl central generate openshift hostpath [flags]
Option | Description |
---|---|
|
Specify the path on the host for the Central database. The default value is |
|
Specify the node selector key. Valid values include |
| Specify the node selector value for the Central database. |
|
Specify the path on the host. The default value is |
|
Specify the node selector key. Valid values include |
| Specify the node selector value. |
8.2.9. roxctl central init-bundles
Initialize bundles in Central.
Usage
$ roxctl central init-bundles [flag]
Option | Description |
---|---|
|
Specify the timeout after which API requests are retried. A value of |
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.9.1. roxctl central init-bundles list
List the available initialization bundles in Central.
Usage
$ roxctl central init-bundles list [flags]
8.2.9.2. roxctl central init-bundles revoke
Revoke one or more cluster initialization bundles in Central.
Usage
$ roxctl central init-bundles revoke <init_bundle_ID or name> [<init_bundle_ID or name> ...] [flags] 1
- 1
- For
<init_bundle_ID or name>
, specify the ID or the name of the initialization bundle that you want to revoke. You can provide multiple IDs or names separated by using spaces.
8.2.9.3. roxctl central init-bundles fetch-ca
Fetch the certificate authority (CA) bundle from Central.
Usage
$ roxctl central init-bundles fetch-ca [flags]
Option | Description |
---|---|
| Specify the file that you want to use for storing the CA configuration. |
8.2.9.4. roxctl central init-bundles generate
Generate a new cluster initialization bundle.
Usage
$ roxctl central init-bundles generate <init_bundle_name> [flags] 1
- 1
- For
<init_bundle_name>
, specify the name for the initialization bundle you want to generate.
Option | Description |
---|---|
|
Specify the file you want to use for storing the newly generated initialization bundle in the Helm configuration form. You can generate a standard output by using |
|
Specify the file that you want to use for storing the newly generated initialization bundle in Kubernetes secret form. You can generate a standard by using |
8.2.10. roxctl central userpki
Manage the user certificate authorization providers.
Usage
$ roxctl central userpki [flags]
8.2.10.1. roxctl central userpki list
Display all the user certificate authentication providers.
Usage
$ roxctl central userpki list [flags]
Option | Description |
---|---|
|
Enable the JSON output. The default value is |
|
Specify the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.10.2. roxctl central userpki create
Create a new user certificate authentication provider.
Usage
$ roxctl central userpki create name [flags]
Option | Description |
---|---|
| Specify the PEM files of the root CA certificates. You can specify several certificate files. |
|
Specify the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
| Specify the minimum access role for users of this provider. |
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.2.10.3. roxctl central userpki delete
Delete a user certificate authentication provider.
Usage
$ roxctl central userpki delete id|name [flags]
Option | Description |
---|---|
|
If set to |
|
Specify the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
|
Specify the timeout for API requests representing the maximum duration of a request. The default value is |
8.3. roxctl cluster
Commands related to a cluster.
Usage
$ roxctl cluster [command] [flags]
Command | Description |
---|---|
| Remove Sensor from Central. |
Option | Description |
---|---|
|
Set the retry timeout for API requests. A value of zero means the full request duration is awaited without retry. The default value is |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
8.3.1. roxctl cluster command options inherited from the parent command
The roxctl cluster
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl cluster
command.
8.3.2. roxctl cluster delete
Remove Sensor from Central.
Usage
$ roxctl cluster delete [flags]
Option | Description |
---|---|
| Specify the cluster name to delete. |
8.4. roxctl collector
Commands related to the Collector service.
Usage
$ roxctl collector [command] [flags]
Command | Description |
---|---|
| Upload support packages for Collector. |
8.4.1. roxctl collector command options inherited from the parent command
The roxctl collector
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl collector
command.
8.4.2. roxctl collector support-packages
Upload support packages for Collector.
Support packages are deprecated and have no effect on secured clusters running version 4.5 or later. Support package uploads only affect secured clusters on version 4.4 and earlier.
Usage
$ roxctl collector support-packages [flags]
8.4.2.1. roxctl collector support-packages upload
Upload files from a Collector support package to Central.
Usage
$ roxctl collector support-packages upload [flags]
Option | Description |
---|---|
|
Specify whether you want to overwrite existing but different files. The default value is |
|
Set the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
|
Set the timeout for API requests. This option represents the maximum duration of a request. The default value is |
8.5. roxctl completion
Generate shell completion scripts.
Usage
$ roxctl completion [bash|zsh|fish|powershell]
Shell type | Description |
---|---|
| Generate a completion script for the Bash shell. |
| Generate a completion script for the Zsh shell. |
| Generate a completion script for the Fish shell. |
| Generate a completion script for the PowerShell shell. |
8.5.1. roxctl completion command options inherited from the parent command
The roxctl completion
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
8.6. roxctl declarative-config
Manage the declarative configuration.
Usage
$ roxctl declarative-config [command] [flags]
Command | Description |
---|---|
| Create declarative configurations. |
| Lint an existing declarative configuration YAML file. |
8.6.1. roxctl declarative-config command options inherited from the parent command
The roxctl declarative-config
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl declarative-config
command.
8.6.2. roxctl declarative-config lint
Lint an existing declarative configuration YAML file.
Usage
$ roxctl declarative-config lint [flags]
Option | Description |
---|---|
|
Read the declarative configuration from the |
| File containing the declarative configuration in YAML format. |
|
Read the declarative configuration from the |
|
Read the declarative configuration from the specified |
8.6.3. roxctl declarative-config create
Create declarative configurations.
Usage
$ roxctl declarative-config create [flags]
Option | Description |
---|---|
|
Write the declarative configuration YAML in the configuration map. If not specified and the |
| Required if you want to write the declarative configuration YAML to a configuration map or secret. If not specified, the default namespace in the current Kubernetes configuration is used. |
|
Write the declarative configuration YAML in the Secret. You must use secrets for sensitive data. If not specified and the |
8.6.3.1. roxctl declarative-config create role
Create a declarative configuration for a role.
Usage
$ roxctl declarative-config create role [flags]
Option | Description |
---|---|
| By providing the name, you can specify the referenced access scope. |
| Set a description for the role. |
| Specify the name of the role. |
| By providing the name, you can specify the referenced permission set. |
8.6.3.2. roxctl declarative-config create notifier
Create a declarative configuration for a notifier.
Usage
$ roxctl declarative-config create notifier [flags]
Option | Description |
---|---|
| Specify the name of the notifier. |
8.6.3.3. roxctl declarative-config create access-scope
Create a declarative configuration for an access scope.
Usage
$ roxctl declarative-config create access-scope [flags]
Option | Description |
---|---|
|
Specify the criteria for creating a label selector based on the cluster’s labels. The key-value pairs represent requirements, and you can use this flag multiple times to create a combination of requirements. The default value is |
| Set a description for the access scope. |
|
Specify a list of clusters and their namespaces that you want to include in the access scope. The default value is |
| Specify the name of the access scope. |
|
Specify the criteria for creating a label selector based on the namespace’s labels. Similar to the cluster-label-selector, you can use this flag multiple times for the combination of requirements. For more details, run the |
8.6.3.4. roxctl declarative-config create auth-provider
Create a declarative configuration for an authentication provider.
Usage
$ roxctl declarative-config create auth-provider [flags]
Option | Description |
---|---|
|
Specify additional user interface (UI) endpoints from which the authentication provider is used. The expected format is |
|
Set the keys of the groups that you want to add within the authentication provider. The tuples of key, value and role should have the same length. For more details, run the |
|
Set the role of the groups that you want to add within the authentication provider. The tuples of key, value and role should have the same length. For more details, run the |
|
Set the values of the groups that you want to add within the authentication provider. The tuples of key, value and role should have the same length. For more details, run the |
| Set the minimum access role of the authentication provider. You can leave this field empty if you do not want to configure the minimum access role by using the declarative configuration. |
| Specify the name of the authentication provider. |
|
Set a list of attributes that the authentication provider must return during authentication. The default value is |
|
Set the UI endpoint from which the authentication provider is used. This is usually the public endpoint where RHACS is available. The expected format is |
8.6.3.5. roxctl declarative-config create permission-set
Create a declarative configuration for a permission set.
Usage
$ roxctl declarative-config create permission-set [flags]
Option | Description |
---|---|
| Set the description of the permission set. |
| Specify the name of the permission set. |
|
Set a list of resources with their respective access levels. The default value is |
8.6.3.6. roxctl declarative-config create notifier splunk
Create a declarative configuration for a splunk notifier.
Usage
$ roxctl declarative-config create notifier splunk [flags]
Option | Description |
---|---|
|
Enable audit logging. The default value is |
|
Specify Splunk source types as comma-separated |
| Specify the Splunk HTTP endpoint. This is a mandatory option. |
|
Use an insecure connection to Splunk. The default value is |
| Specify the Splunk HTTP token. This is a mandatory option. |
|
Specify the Splunk truncate limit. The default value is |
8.6.3.7. roxctl declarative-config create notifier generic
Create a declarative configuration for a generic notifier.
Usage
$ roxctl declarative-config create notifier generic [flags]
Option | Description |
---|---|
|
Enable audit logging. The default value is |
|
Specify additional fields as comma-separated |
|
Specify headers as comma-separated |
| Specify the file name of the endpoint CA certificate in PEM format. |
| Specify the URL of the webhook endpoint. |
|
Specify the password for basic authentication of the webhook endpoint. No authentication if not specified. Requires |
|
Skip webhook TLS verification. The default value is |
|
Specify the username for basic authentication of the webhook endpoint. No authentication occurs if not specified. Requires |
8.6.3.8. roxctl declarative-config create auth-provider iap
Create a declarative configuration for an authentication provider with the identity-aware proxy (IAP) identifier.
Usage
$ roxctl declarative-config create auth-provider iap [flags]
Option | Description |
---|---|
| Specify the target group that you want to validate. |
8.6.3.9. roxctl declarative-config create auth-provider oidc
Create a declarative configuration for an OpenID Connect (OIDC) authentication provider.
Usage
$ roxctl declarative-config create auth-provider oidc [flags]
Option | Description |
---|---|
|
Specify a list of non-standard claims from the identity provider (IdP) token that you want to include in the authentication provider’s rules. The default value is |
| Specify the client ID of the OIDC client. |
| Specify the client secret of the OIDC client. |
|
Disable the request for the offline_access from the OIDC IdP. You need to use this option if the OIDC IdP limits the number of sessions with the |
| Specify the issuer of the OIDC client. |
|
Specify the callback mode that you want to use. Valid values include |
8.6.3.10. roxctl declarative-config create auth-provider saml
Create a declarative configuration for a SAML authentication provider.
Usage
$ roxctl declarative-config create auth-provider saml [flags]
Option | Description |
---|---|
| Specify the file containing the SAML identity provider (IdP) certificate in PEM format. |
| Specify the issuer of the IdP. |
| Specify the metadata URL of the service provider. |
| Specify the format of the name ID. |
| Specify the issuer of the service provider. |
| Specify the URL of the IdP for single sign-on (SSO). |
8.6.3.11. roxctl declarative-config create auth-provider userpki
Create a declarative configuration for an user PKI authentication provider.
Usage
$ roxctl declarative-config create auth-provider userpki [flags]
Option | Description |
---|---|
| Specify the file containing the certification authorities in PEM format. |
8.6.3.12. roxctl declarative-config create auth-provider openshift-auth
Create a declarative configuration for an OpenShift Container Platform OAuth authentication provider.
Usage
$ roxctl declarative-config create auth-provider openshift-auth [flags]
8.7. roxctl deployment
Commands related to deployments.
Usage
$ roxctl deployment [command] [flags]
Command | Description |
---|---|
| Check the deployments for violations of the deployment time policy. |
Option | Description |
---|---|
|
Set the timeout for API requests. This option represents the maximum duration of a request. The default value is |
8.7.1. roxctl deployment command options inherited from the parent command
The roxctl deployment
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl deployment
command.
8.7.2. roxctl deployment check
Check deployments for violations of the deployment time policy.
Usage
$ roxctl deployment check [flags]
Option | Description |
---|---|
| Define the policy categories that you want to execute. By default, all policy categories are executed. |
| Set the cluster name or ID that you want to use as the context for the evaluation to enable extended deployments with cluster-specific information. |
|
Print the JSON output in compact form. The default value is |
| Specify the YAML files to send to Central for policy evaluation. |
|
Bypass the Central cache for images and force a new pull from Scanner. The default value is |
|
Define headers that you want to print in the tabular output. The default values include |
|
Print headers as comments in the CSV tabular output. The default value is |
|
Set the name of the JUnit test suite. The default value is |
|
Merge duplicate cells in the tabular output. The default value is |
|
Specify a namespace to enhance deployments with context information such as network policies, RBACs and services for deployments that do not have a namespace in their specification. The namespace defined in the specification is not changed. The default value is |
|
Do not print headers for a tabular output. The default value is |
|
Choose the output format. Output formats include |
|
Set the number of retries before exiting as an error. The default value is |
|
Set the time to wait between retries in seconds. The default value is |
|
Define the JSON path expressions to create a row from the JSON object. For more details, run the |
8.8. roxctl helm
Commands related to Red Hat Advanced Cluster Security for Kubernetes (RHACS) Helm Charts.
Usage
$ roxctl helm [command] [flags]
Command | Description |
---|---|
| Derive local Helm values from the cluster configuration. |
| Output a Helm chart. |
8.8.1. roxctl helm command options inherited from the parent command
The roxctl helm
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl helm
command.
8.8.2. roxctl helm output
Output a Helm chart.
Usage
$ roxctl helm output <central_services or secured_cluster_services> [flags] 1
- 1
- For
<central_services or secured_cluster_services>
, specify the path to either the central services or the secured cluster services to generate a Helm chart output.
Option | Description |
---|---|
|
Read templates from the local filesystem. The default value is |
|
Specify the path to the Helm templates on your local filesystem. For more details, run the |
|
Set the default container image settings. Image settings include |
|
Define the path to the output directory for the Helm chart. The default path is |
|
Remove the output directory if it already exists. The default value is |
8.8.3. roxctl helm derive-local-values
Derive local Helm values from the cluster configuration.
Usage
$ roxctl helm derive-local-values --output <path> \1 <central_services> [flags] 2
Option | Description |
---|---|
| Specify the path to the file or directory containing the YAML input. |
| Define the path to the output file. |
| Define the path to the output directory. |
|
Set the timeout after which API requests are retried. The timeout value indicates that the entire request duration is waited for without retrying. The default value is |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
8.9. roxctl image
Commands that you can run on a specific image.
Usage
$ roxctl image [command] [flags]
Command | Description |
---|---|
| Check images for build time policy violations, and report them. |
| Scan the specified image, and return the scan results. |
-t , --timeout duration | Set the timeout for API requests representing the maximum duration of a request. The default value is 10m0s . |
---|
8.9.1. roxctl image command options inherited from the parent command
The roxctl image
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl image
command.
8.9.2. roxctl image scan
Scan the specified image, and return the scan results.
Usage
$ roxctl image scan [flags]
Option | Description |
---|---|
| Specify the cluster name or ID to which you want to delegate the image scan. |
|
Print JSON output in a compact format. The default value is |
|
Fail if vulnerabilities have been found. The default value is |
|
Ignore Central’s cache and force a fresh re-pull from Scanner. The default value is |
|
Specify the headers to print in a tabular output. The default values include |
|
Print headers as comments in a CSV tabular output. The default value is |
|
Specify the image name and reference to scan. For example, |
|
Include snoozed and unsnoozed CVEs in the scan results. The default value is |
|
Merge duplicate cells in a tabular output. The default value is |
|
Do not print headers for a tabular output. The default value is |
|
Specify the output format. Output formats include |
|
Specify the number of retries before exiting as an error. The default value is |
|
Set the time to wait between retries in seconds. The default value is |
|
Specify JSON path expressions to create a row from the JSON object. For more details, run the |
|
List of severities to include in the output. Use this to filter for specific severities. The default values include |
8.9.3. roxctl image check
Check images for build time policy violations, and report them.
Usage
$ roxctl image check [flags]
Option | Description |
---|---|
| List of the policy categories that you want to execute. By default, all the policy categories are used. |
| Define the cluster name or ID that you want to use as the context for evaluation. |
|
Print JSON output in a compact format. The default value is |
|
Bypass the Central cache for the image and force a new pull from the Scanner. The default value is |
|
Define headers to print in a tabular output. The default values include |
|
Print headers as comments in a CSV tabular output. The default value is |
|
Specify the image name and reference. For example, |
|
Set the name of the JUnit test suite. Default value is |
|
Merge duplicate cells in a tabular output. The default value is |
|
Do not print headers for a tabular output. The default value is |
|
Choose the output format. Output formats include |
|
Set the number of retries before exiting as an error. The default value is |
|
Set the time to wait between retries in seconds. The default value is |
|
Create a row from the JSON object by using JSON path expression. For more details, run the |
|
Define whether you want to send notifications in the event of violations. The default value is |
8.10. roxctl netpol
Commands related to the network policies.
Usage
$ roxctl netpol [command] [flags]
Command | Description |
---|---|
| Connectivity analysis of the network policy resources. |
| Recommend network policies based on the deployment information. |
8.10.1. roxctl netpol command options inherited from the parent command
The roxctl netpol
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl netpol
command.
8.10.2. roxctl netpol generate
Recommend network policies based on the deployment information.
Usage
$ roxctl netpol generate <folder_path> [flags] 1
- 1
- For
<folder_path>
, specify the path to the directory containing your Kubernetes deployment and service configuration files.
Option | Description |
---|---|
|
Specify the DNS port that you want to use in the egress rules of synthesized network policies. The default value is |
|
Fail on the first encountered error. The default value is |
| Save generated policies into the target folder. |
| Save and merge generated policies into a single YAML file. |
|
Remove the output path if it already exists. The default value is |
|
Treat warnings as errors. The default value is |
8.10.3. roxctl netpol connectivity
Commands related to the connectivity analysis of the network policy resources.
Usage
$ roxctl netpol connectivity [flags]
8.10.3.1. roxctl netpol connectivity map
Analyze connectivity based on the network policies and other resources.
Usage
$ roxctl netpol connectivity map <folder_path> [flags] 1
- 1
- For
<folder_path>
, specify the path to the directory containing your Kubernetes deployment and service configuration files.
Option | Description |
---|---|
|
Enhance the analysis of permitted connectivity by using exposure analysis. The default value is |
|
Fail on the first encountered error. The default value is |
| Focus on connections of the specified workload name in the output. |
| Save the connections list output into a specific file. |
|
Configure the connections list in a specific format. Supported formats include |
|
Remove the output path if it already exists. The default value is |
|
Define whether you want to save the output of the connection list in the default file. The default value is |
|
Treat warnings as errors. The default value is |
8.10.3.2. roxctl netpol connectivity diff
Report connectivity differences based on two network policy directories and YAML manifests with workload resources.
Usage
$ roxctl netpol connectivity diff [flags]
Option | Description |
---|---|
| Specify the first directory path of the input resources. This value is mandatory. |
| Specify the second directory path of the input resources that you want to compare with the first directory path. This value is mandatory. |
|
Fail on the first encounter. The default value is |
| Save the output of the connectivity difference command into a specific file. |
|
Configure the output of the connectivity difference command in a specific format. Supported formats include |
|
Remove the output path if it already exists. The default value is |
|
Define whether you want to store the output of the connectivity differences in the default file. The default value is |
|
Treat warnings as errors. The default value is |
8.11. roxctl scanner
Commands related to the StackRox Scanner and Scanner V4 services.
Usage
$ roxctl scanner [command] [flags]
Command | Description |
---|---|
| Download the offline vulnerability database for StackRox Scanner and Scanner V4. |
| Generate the required YAML configuration files to deploy the StackRox Scanner and Scanner V4. |
| Upload a vulnerability database for the StackRox Scanner and Scanner V4. |
8.11.1. roxctl scanner command options inherited from the parent command
The roxctl scanner
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl scanner
command.
8.11.2. roxctl scanner generate
Generate the required YAML configuration files to deploy Scanner.
Usage
$ roxctl scanner generate [flags]
Option | Description |
---|---|
|
Specify the type of cluster on which you want to run Scanner. Cluster types include |
|
Create |
|
Generate deployment files that support the specified Istio version. Valid versions include |
| Specify the output directory for the Scanner bundle. Leave blank to use the default value. |
|
Set the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
| Specify the Scanner image that you want to use. Leave blank to use the server default. |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
8.11.3. roxctl scanner upload-db
Upload a vulnerability database for Scanner.
Usage
$ roxctl scanner upload-db [flags]
Option | Description |
---|---|
| Specify the file containing the dumped Scanner definitions DB. |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
8.11.4. roxctl scanner download-db
Download the offline vulnerability database for StackRox Scanner or Scanner V4.
This command downloads version-specific offline vulnerability bundles. The system contacts Central to determine the version if one is not specified. If communication fails, the download defaults to the version embedded within roxctl
.
By default, it will attempt to download the database for the determined version and less-specific variants. For example, if version 4.4.1-extra
is specified, downloads will be attempted for the following version variants:
- 4.4.1-extra
- 4.4.1
- 4.4
Usage
$ roxctl scanner download-db [flags]
Option | Description |
---|---|
|
Force overwriting the output file if it already exists. The default value is |
| Output file to save the vulnerability database to. The default value is the name and path of the remote file that is downloaded. |
|
Do not contact Central when detecting the version. The default value is |
|
Do not attempt to process variants of the determined version. The default value is |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
| Download a specific version or version variant of the vulnerability database. By default, the version is automatically detected. |
8.12. roxctl sensor
Deploy Red Hat Advanced Cluster Security for Kubernetes (RHACS) services in secured clusters.
Usage
$ roxctl sensor [command] [flags]
Command | Description |
---|---|
| Generate files to deploy RHACS services in secured clusters. |
| Download a YAML file with renewed certificates for Sensor, Collector, and Admission controller. |
| Download a bundle with the files to deploy RHACS services in a cluster. |
Option | Description |
---|---|
|
Set the timeout after which API requests are retried. A value of zero means that the entire request duration is waited for without retrying. The default value is |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
8.12.1. roxctl sensor command options inherited from the parent command
The roxctl sensor
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |
These options are applicable to all the sub-commands of the roxctl sensor
command.
8.12.2. roxctl sensor generate
Generate files to deploy RHACS services in secured clusters.
Usage
$ roxctl sensor generate [flags]
Option | Description |
---|---|
|
Disable the bypass annotations for the admission controller. The default value is |
|
Dynamic enable for enforcing on object creation in the admission controller. The default value is |
|
Enable dynamic enforcement of object updates in the admission controller. The default value is |
|
Configure the admission controller webhook to listen to deployment creation. The default value is |
|
Configure the admission controller webhook to listen to deployment updates. The default value is |
|
Get scans inline when using the admission controller. The default value is |
|
Set the timeout in seconds for the admission controller. The default value is |
|
Set the endpoint to which you want to connect Sensor. The default value is |
|
Specify the collection method that you want to use for runtime support. Collection methods include |
|
Set the image repository that you want to use to deploy Collector. If not specified, a default value corresponding to the effective |
|
Continue with downloading the sensor bundle even if the cluster already exists. The default value is |
|
Decide whether to create the upgrader service account with |
|
Disable tolerations for tainted nodes. The default value is |
|
Create |
|
Generate deployment files that support the specified Istio version. Valid versions include |
| Specify the image repository that you want to use to deploy Sensor. If not specified, a default value is used. |
| Set the cluster name to identify the cluster. |
| Set the output directory for the bundle contents. The default value is an automatically generated directory name inside the current directory. |
|
Use Collector-slim in the deployment bundle. Valid values include |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
8.12.2.1. roxctl sensor generate k8s
Generate the required files to deploy RHACS services in a Kubernetes cluster.
Usage
$ roxctl sensor generate k8s [flags]
Option | Description |
---|---|
|
Enable admission controller webhook to listen to Kubernetes events. The default value is |
8.12.2.2. roxctl sensor generate openshift
Generate the required files to deploy RHACS services in a Red Hat OpenShift cluster.
Usage
$ roxctl sensor generate openshift [flags]
Option | Description |
---|---|
`--admission-controller-listen-on-events false | true |
auto[=true]` |
|
`--disable-audit-logs false | true |
auto[=true]` |
Enable or disable audit log collection for runtime detection. The default value is |
| Specify the Red Hat OpenShift major version for which you want to generate the deployment files. |
8.12.3. roxctl sensor get-bundle
Download a bundle with the files to deploy RHACS services into a cluster.
Usage
$ roxctl sensor get-bundle <cluster_details> [flags] 1
- 1
- For
<cluster_details>
, specify the cluster name or ID.
Option | Description |
---|---|
|
Specify whether to create the upgrader service account with |
|
Generate deployment files that support the specified Istio version. Valid versions include |
| Specify the output directory for the bundle contents. The default value is an automatically generated directory name inside the current directory. |
|
Use Collector-slim in the deployment bundle. Valid values include |
|
Set the timeout for API requests representing the maximum duration of a request. The default value is |
8.12.4. roxctl sensor generate-certs
Download a YAML file with renewed certificates for Sensor, Collector, and Admission controller.
Usage
$ roxctl sensor generate-certs <cluster_details> [flags] 1
- 1
- For
<cluster_details>
, specify the cluster name or ID.
Option | Description |
---|---|
|
Specify the output directory for the YAML file. The default value is |
8.13. roxctl version
Display the current roxctl version.
Usage
$ roxctl version [flags]
8.13.1. roxctl version command options
The roxctl version
command supports the following option:
Option | Description |
---|---|
|
Display the extended version information as JSON. The default value is |
8.13.2. roxctl version command options inherited from the parent command
The roxctl version
command supports the following options inherited from the parent roxctl
command:
Option | Description |
---|---|
|
Specify a custom CA certificate file path for secure connections. Alternatively, you can specify the file path by using the |
|
Set |
|
Set the endpoint for the service to contact. Alternatively, you can set the endpoint by using the |
|
Force the use of HTTP/1 for all connections. Alternatively, by setting the |
|
Enable insecure connection options. Alternatively, by setting the |
|
Skip the TLS certificate validation. Alternatively, by setting the |
|
Disable the color output. Alternatively, by setting the |
|
Specify the password for basic authentication. Alternatively, you can set the password by using the |
|
Use an unencrypted connection. Alternatively, by setting the |
|
Set the TLS server name to use for SNI. Alternatively, you can set the server name by using the |
|
Use the API token provided in the specified file for authentication. Alternatively, you can set the token by using the |