Skip to content

A Giant Swam App for deploying the Aqua Security Trivy operator

License

Notifications You must be signed in to change notification settings

giantswarm/trivy-operator-app

Repository files navigation

CircleCI

Trivy Operator

Giant Swarm offers an app for Aqua Security's Trivy Operator, which can be installed in workload clusters. It is part of our managed security solution, but can also be installed independently.

Trivy Operator is an in-cluster component which runs vulnerability scans, Kubernetes CIS and NSA benchmarks, and other types of policy and best practice validation scans using Trivy. It replaces a previous project, called Starboard, which has now been fully deprecated along with our Starboard App.

The results of these scans are saved in the cluster in the form of Kubernetes custom resources named VulnerabilityReport, ConfigAuditReport, and other types of reports.

Results of each scan type can be retrieved from the cluster, for example using kubectl:

$ kubectl get vulnerabilityreports
NAMESPACE   NAME    REPOSITORY   TAG   SCANNER   AGE
...

You can also export the data from these reports to Prometheus to use in alerts and Grafana dashboards using our starboard-exporter.

This repository contains our packaging and Giant Swarm-specific configuration of the upstream charts.

Installing

There are several ways to install this app onto a workload cluster.

Scanning Backend

To perform vulnerability scans and produce reports, Trivy Operator needs a vulnerability scanner.

If deploying Trivy Operator as part of our managed security bundle, a Trivy server will be automatically installed for you.

If installing Trivy Operator independently, we recommend first installing our Trivy app in your cluster to serve as the vulnerability scanner for Trivy Operator, or using another existing Trivy instance.

Alternatively, you can configure Trivy Operator to use Standalone mode, which creates a new instance of the Trivy scanner per-scan. This is very inefficient and can lead to throttling by the backing vulnerability database. To do it anyway, set trivy.mode to Standalone in values.yaml.

In either case, please note that the Trivy version set by trivy.imageRef must be the same version as your Trivy backend (even if the actual image is not the same), as Trivy Operator uses that value internally to determine the API format to use for Trivy.

Sample App CR and ConfigMap for the management cluster

If you have access to the Kubernetes API on the management cluster, you could create the App CR and ConfigMap directly.

See our full reference on how to configure apps for more details.

Credit