Skip to content
This repository has been archived by the owner on Feb 5, 2024. It is now read-only.

Commit

Permalink
- Expose into the chart additional runtime options
Browse files Browse the repository at this point in the history
  • Loading branch information
gadinaor committed Oct 22, 2020
1 parent eefb873 commit 2a0b8d2
Show file tree
Hide file tree
Showing 4 changed files with 26 additions and 7 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ iskan --cluster-context mycluster --api-config myconfig.yaml
--filter-cvss float32 Include CVEs with CVSS score greater or equal than the specified number. Valid values: 0.0-10.0
--filter-fixable-only Include CVEs with which are fixable
--filter-severity string Select which severities to include. Comma seperated MINIMAL,LOW,MEDIUM,HIGH,CRITICAL
-f, --format string Output format. Supported formats: json | yaml | table (default "json")
-f, --format string Output format. Supported formats: json | yaml | (default "json")
-h, --help help for cluster
--namespace-exclude string Namespaces to exclude from the scan (default "kube-system")
--namespace-include string Namespaces to include in the scan (default "*")
Expand Down
9 changes: 7 additions & 2 deletions deploy/charts/iskan/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# iskan

![Version: 1.0.0](https://img.shields.io/badge/Version-1.0.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.0.0](https://img.shields.io/badge/AppVersion-1.0.0-informational?style=flat-square)
![Version: 1.1.0](https://img.shields.io/badge/Version-1.1.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.0.0](https://img.shields.io/badge/AppVersion-1.0.0-informational?style=flat-square)

# Kubernetes Native Image Scanning.

Expand Down Expand Up @@ -28,10 +28,15 @@ Harness your existing Container Image Vulnerability Scanning information to your
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| cronSchedule | string | `"*/1 * * * *"` | |
| export.targets | list | `["file:///path/to/dir","slack://mychannel?apikey=<mykey>[&file-type=json&title=mymsgtitle]","webhook://myserver?x-headers=X-myheader:myval&token-bearer=1234"]` | Export generated report to one or more export targets see: https://github.com/kruzio/exodus#supported-targets |
| export.targets | list | `["file:///path/to/dir","slack://mychannel?apikey=<mykey>[&file-type=json&title=MyClusterVulnReport","webhook://myserver?x-headers=X-myheader:myval&token-bearer=1234"]` | Export generated report to one or more export targets see: https://github.com/kruzio/exodus#supported-targets |
| image.iskan | string | `"alcide/iskan:localscan"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| reportPolicyFile | string | `"config/report-policy.yaml"` | |
| runOptions.namespacesExcluded | string | `"kube-system"` | Comma separated list of namespaces to exclude from the scan or use '-' to avoid exclusion |
| runOptions.namespacesIncluded | string | `"*"` | Comma separated list of namespaces to scan or use '*' for all of them |
| runOptions.reportFormat | string | `"json"` | The report format - json or yaml |
| runOptions.scanApiBurst | int | `100` | The Vulnerability Provider API call burst limit |
| runOptions.scanApiQPS | int | `30` | The Vulnerability Provider API call rate limit (queries-per-sec) |
| vulnProviderCredFile | string | `"config/providers.yaml"` | |

----------------------------------------------
Expand Down
10 changes: 6 additions & 4 deletions deploy/charts/iskan/templates/iskan-cronjob.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -86,10 +86,12 @@ spec:
name: workspace
args:
- cluster
#- --namespace-include=alcide
#- --namespace-exclude=alcide
- --format=json
- --outfile=/outbox/report.json
- --namespace-include={{ .Values.runOptions.namespacesIncluded | quote }}
- --namespace-exclude={{ .Values.runOptions.namespacesExcluded | quote }}
- --format={{ .Values.runOptions.reportFormat }}
- --scan-api-burst={{ .Values.runOptions.scanApiBurst}}
- --scan-api-qps={{ .Values.runOptions.scanApiQPS}}
- --outfile=/outbox/report
- --api-config=/creds/providers.yaml
- --report-config=/config/report-config.yaml
#- -v=7 # Verbose level 10 will print secrets - DO NOT USE THAT
Expand Down
12 changes: 12 additions & 0 deletions deploy/charts/iskan/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,18 @@ vulnProviderCredFile: config/providers.yaml
# The Report Policy configuration
reportPolicyFile: config/report-policy.yaml

runOptions:
# -- Comma separated list of namespaces to scan or use '*' for all of them
namespacesIncluded: "*"
# -- Comma separated list of namespaces to exclude from the scan or use '-' to avoid exclusion
namespacesExcluded: "kube-system"
# -- The Vulnerability Provider API call rate limit (queries-per-sec)
scanApiQPS: 30
# -- The Vulnerability Provider API call burst limit
scanApiBurst: 100
# -- The report format - json or yaml
reportFormat: "json"

export:
# -- Export generated report to one or more export targets
# see: https://github.com/kruzio/exodus#supported-targets
Expand Down

0 comments on commit 2a0b8d2

Please sign in to comment.