|
1 | 1 | # iskan
|
2 | 2 |
|
3 |
| -   |
| 3 | +   |
4 | 4 |
|
5 | 5 | # Kubernetes Native Image Scanning.
|
6 | 6 |
|
@@ -28,10 +28,15 @@ Harness your existing Container Image Vulnerability Scanning information to your
|
28 | 28 | | Key | Type | Default | Description |
|
29 | 29 | |-----|------|---------|-------------|
|
30 | 30 | | cronSchedule | string | `"*/1 * * * *"` | |
|
31 |
| -| export.targets | list | `["file:///path/to/dir","slack://mychannel?apikey=<mykey>[&file-type=json&title=mymsgtitle]","webhook://myserver?x-headers=X-myheader:myval&token-bearer=1234"]` | Export generated report to one or more export targets see: https://github.com/kruzio/exodus#supported-targets | |
| 31 | +| export.targets | list | `["file:///path/to/dir","slack://mychannel?apikey=<mykey>[&file-type=json&title=MyClusterVulnReport","webhook://myserver?x-headers=X-myheader:myval&token-bearer=1234"]` | Export generated report to one or more export targets see: https://github.com/kruzio/exodus#supported-targets | |
32 | 32 | | image.iskan | string | `"alcide/iskan:localscan"` | |
|
33 | 33 | | image.pullPolicy | string | `"IfNotPresent"` | |
|
34 | 34 | | reportPolicyFile | string | `"config/report-policy.yaml"` | |
|
| 35 | +| runOptions.namespacesExcluded | string | `"kube-system"` | Comma separated list of namespaces to exclude from the scan or use '-' to avoid exclusion | |
| 36 | +| runOptions.namespacesIncluded | string | `"*"` | Comma separated list of namespaces to scan or use '*' for all of them | |
| 37 | +| runOptions.reportFormat | string | `"json"` | The report format - json or yaml | |
| 38 | +| runOptions.scanApiBurst | int | `100` | The Vulnerability Provider API call burst limit | |
| 39 | +| runOptions.scanApiQPS | int | `30` | The Vulnerability Provider API call rate limit (queries-per-sec) | |
35 | 40 | | vulnProviderCredFile | string | `"config/providers.yaml"` | |
|
36 | 41 |
|
37 | 42 | ----------------------------------------------
|
|
0 commit comments