Skip to content
This repository was archived by the owner on Feb 5, 2024. It is now read-only.

Commit 2a0b8d2

Browse files
committed
- Expose into the chart additional runtime options
1 parent eefb873 commit 2a0b8d2

File tree

4 files changed

+26
-7
lines changed

4 files changed

+26
-7
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ iskan --cluster-context mycluster --api-config myconfig.yaml
6565
--filter-cvss float32 Include CVEs with CVSS score greater or equal than the specified number. Valid values: 0.0-10.0
6666
--filter-fixable-only Include CVEs with which are fixable
6767
--filter-severity string Select which severities to include. Comma seperated MINIMAL,LOW,MEDIUM,HIGH,CRITICAL
68-
-f, --format string Output format. Supported formats: json | yaml | table (default "json")
68+
-f, --format string Output format. Supported formats: json | yaml | (default "json")
6969
-h, --help help for cluster
7070
--namespace-exclude string Namespaces to exclude from the scan (default "kube-system")
7171
--namespace-include string Namespaces to include in the scan (default "*")

deploy/charts/iskan/README.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# iskan
22

3-
![Version: 1.0.0](https://img.shields.io/badge/Version-1.0.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.0.0](https://img.shields.io/badge/AppVersion-1.0.0-informational?style=flat-square)
3+
![Version: 1.1.0](https://img.shields.io/badge/Version-1.1.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.0.0](https://img.shields.io/badge/AppVersion-1.0.0-informational?style=flat-square)
44

55
# Kubernetes Native Image Scanning.
66

@@ -28,10 +28,15 @@ Harness your existing Container Image Vulnerability Scanning information to your
2828
| Key | Type | Default | Description |
2929
|-----|------|---------|-------------|
3030
| cronSchedule | string | `"*/1 * * * *"` | |
31-
| export.targets | list | `["file:///path/to/dir","slack://mychannel?apikey=<mykey>[&file-type=json&title=mymsgtitle]","webhook://myserver?x-headers=X-myheader:myval&token-bearer=1234"]` | Export generated report to one or more export targets see: https://github.com/kruzio/exodus#supported-targets |
31+
| export.targets | list | `["file:///path/to/dir","slack://mychannel?apikey=<mykey>[&file-type=json&title=MyClusterVulnReport","webhook://myserver?x-headers=X-myheader:myval&token-bearer=1234"]` | Export generated report to one or more export targets see: https://github.com/kruzio/exodus#supported-targets |
3232
| image.iskan | string | `"alcide/iskan:localscan"` | |
3333
| image.pullPolicy | string | `"IfNotPresent"` | |
3434
| reportPolicyFile | string | `"config/report-policy.yaml"` | |
35+
| runOptions.namespacesExcluded | string | `"kube-system"` | Comma separated list of namespaces to exclude from the scan or use '-' to avoid exclusion |
36+
| runOptions.namespacesIncluded | string | `"*"` | Comma separated list of namespaces to scan or use '*' for all of them |
37+
| runOptions.reportFormat | string | `"json"` | The report format - json or yaml |
38+
| runOptions.scanApiBurst | int | `100` | The Vulnerability Provider API call burst limit |
39+
| runOptions.scanApiQPS | int | `30` | The Vulnerability Provider API call rate limit (queries-per-sec) |
3540
| vulnProviderCredFile | string | `"config/providers.yaml"` | |
3641

3742
----------------------------------------------

deploy/charts/iskan/templates/iskan-cronjob.yaml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -86,10 +86,12 @@ spec:
8686
name: workspace
8787
args:
8888
- cluster
89-
#- --namespace-include=alcide
90-
#- --namespace-exclude=alcide
91-
- --format=json
92-
- --outfile=/outbox/report.json
89+
- --namespace-include={{ .Values.runOptions.namespacesIncluded | quote }}
90+
- --namespace-exclude={{ .Values.runOptions.namespacesExcluded | quote }}
91+
- --format={{ .Values.runOptions.reportFormat }}
92+
- --scan-api-burst={{ .Values.runOptions.scanApiBurst}}
93+
- --scan-api-qps={{ .Values.runOptions.scanApiQPS}}
94+
- --outfile=/outbox/report
9395
- --api-config=/creds/providers.yaml
9496
- --report-config=/config/report-config.yaml
9597
#- -v=7 # Verbose level 10 will print secrets - DO NOT USE THAT

deploy/charts/iskan/values.yaml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,18 @@ vulnProviderCredFile: config/providers.yaml
2121
# The Report Policy configuration
2222
reportPolicyFile: config/report-policy.yaml
2323

24+
runOptions:
25+
# -- Comma separated list of namespaces to scan or use '*' for all of them
26+
namespacesIncluded: "*"
27+
# -- Comma separated list of namespaces to exclude from the scan or use '-' to avoid exclusion
28+
namespacesExcluded: "kube-system"
29+
# -- The Vulnerability Provider API call rate limit (queries-per-sec)
30+
scanApiQPS: 30
31+
# -- The Vulnerability Provider API call burst limit
32+
scanApiBurst: 100
33+
# -- The report format - json or yaml
34+
reportFormat: "json"
35+
2436
export:
2537
# -- Export generated report to one or more export targets
2638
# see: https://github.com/kruzio/exodus#supported-targets

0 commit comments

Comments
 (0)