All Projects → snyk → kubernetes-monitor

snyk / kubernetes-monitor

Licence: other
Use Snyk to find and fix vulnerabilities in your Kubernetes workloads

Programming Languages

typescript
32286 projects
python
139335 projects - #7 most used programming language
shell
77523 projects
Dockerfile
14818 projects
Makefile
30231 projects
Mustache
554 projects

Known Vulnerabilities

snyk/kubernetes-monitor

Summary

A containerized application that is deployed with Helm. Monitors the security of a Kubernetes cluster by analyzing container images.

Prerequisites

  • 50 GiB of storage in the form of emptyDir or a PersistentVolumeClaim.
  • External internet access from the Kubernetes cluster to kubernetes-upstream.snyk.io.
  • 1 CPU, 2 GiB RAM
  • 1 Kubernetes worker node of type linux/amd64 - supported and tested only on the AMD64 CPU architecture

Supported Kubernetes distributions:

  • Any Generally Available Kubernetes Certified distribution, for example: GKE, AKS, EKS, OCP.
  • OCP 4.1+ if running on OpenShift - supported and tested on Generally Available versions

Tested with the following Security Context Constraint on OCP.

Installation with Helm

Please refer to the Helm chart installation instructions.

Documentation

For detailed documentation and support, please refer to the Snyk Kubernetes integration documentation.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].