You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy/helm/values.yaml
+9-2Lines changed: 9 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,10 @@ operator:
115
115
configAuditScannerScanOnlyCurrentRevisions: true
116
116
# -- batchDeleteDelay the duration to wait before deleting another batch of config audit reports.
117
117
batchDeleteDelay: 10s
118
-
# -- accessGlobalSecretsAndServiceAccount The flag to enable access to global secrets/service accounts to allow `vulnerability scan job` to pull images from private registries
118
+
# -- accessGlobalSecretsAndServiceAccount The flag to enable access to global secrets/service accounts so that
119
+
# `vulnerability scan jobs` may derive and access imagePullSecrets from the pod's or serviceaccount's spec.
120
+
# The setting is mutually exclusive with privateRegistryScanSecretsNames, when true, secrets from privateRegistryScanSecretsNames
121
+
# are not considered when pulling images to scan
119
122
accessGlobalSecretsAndServiceAccount: true
120
123
# -- builtInTrivyServer The flag enables the usage of built-in trivy server in cluster. It also overrides the following trivy params with built-in values
121
124
# trivy.mode = ClientServer and serverURL = http://<serverServiceName>.<trivy operator namespace>:4975
@@ -178,7 +181,11 @@ operator:
178
181
# -- webhookSendDeletedReports the flag to enable sending deleted reports if webhookBroadcastURL is enabled
179
182
webhookSendDeletedReports: false
180
183
181
-
# -- privateRegistryScanSecretsNames is map of namespace:secrets, secrets are comma seperated which can be used to authenticate in private registries in case if there no imagePullSecrets provided example : {"mynamespace":"mySecrets,anotherSecret"}
184
+
# -- privateRegistryScanSecretsNames is a map of namespace:secrets, secrets are comma separated, which can be used to
185
+
# authenticate in private registries in case no imagePullSecrets may be derived from pod's or serviceaccount's spec,
186
+
# example : {"mynamespace":"mySecrets,anotherSecret"}
187
+
# The setting is mutually exclusive with accessGlobalSecretsAndServiceAccount, the former must be set to false for
188
+
# secrets from privateRegistryScanSecretsNames to be considered when pulling images to scan
182
189
privateRegistryScanSecretsNames: {}
183
190
184
191
# -- mergeRbacFindingWithConfigAudit the flag to enable merging rbac finding with config-audit report
Next, we will change the `privateRegistryScanSecretsNames` of the `values.yaml` manifest. For this, we can create a new `values.yaml` manifest with our desired modification. We need to provide desired namespace and secret name. In our example they are `app` and `dockerconfigjson-github-com` accordingly.
219
+
Note that `privateRegistryScanSecretsNames` are evaluated only when `accessGlobalSecretsAndServiceAccount` is set to `false`.
0 commit comments