Skip to content

snyk/kubernetes-monitor

staging
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.

Known Vulnerabilities

snyk/kubernetes-monitor

Summary

A containerized application that is deployed with Helm. Monitors the security of a Kubernetes cluster by analyzing container images.

Prerequisites

  • 50 GiB of storage in the form of emptyDir or a PersistentVolumeClaim.
  • External internet access from the Kubernetes cluster to api.snyk.io.
  • 1 CPU, 2 GiB RAM
  • 1 Kubernetes worker node of type linux/amd64 - supported and tested only on the AMD64 CPU architecture

Supported Kubernetes distributions:

  • Any Generally Available Kubernetes Certified distribution, for example: GKE, AKS, EKS, OCP.
  • OCP 4.1+ if running on OpenShift - supported and tested on Generally Available versions

Tested with the following Security Context Constraint on OCP.

Installation with Helm

Please refer to the Helm chart installation instructions.

Documentation

For detailed documentation and support, please refer to the Snyk Kubernetes integration documentation.