Optional installation steps for the Snyk Controller with Helm
Use a registry with a self-signed or additional certificate
kubectl create configmap snyk-monitor-certs \
-n snyk-monitor --from-file=<path_to_certs_folder>Use the insecure container registry or a registry that uses unqualified images
[[registry]]
location = "internal-registry-for-example.net/bar"
insecure = truekubectl create configmap snyk-monitor-registries-conf \
-n snyk-monitor \
--from-file=<path_to_registries_conf_file>Use a proxy for outbound connection to Snyk
Change the logging verbosity
Enable a Pod Security Policy
Configure the Snyk Controller with PersistentVolumeClaim (PVC)
Configure the Snyk Controller to exclude specific namespaces
Configure Snyk Controller resources
Configure Snyk Controller workers count
Configure Snyk Controller CPU
Configure Snyk Controller initContainers setting
PreviousInstall the Snyk Controller with Helm (Azure and Google Cloud Platform)NextAuthenticate to private container registries
Last updated
Was this helpful?

