-
Notifications
You must be signed in to change notification settings - Fork 5
Scanning Limitation with private registries #661
Comments
Well, here is a workaround. Definetly not the most elegant way but it does the trick. Just get a docker config, like this:
And encode it with base64:
After this, include this in the ConfigMap “kubeclarity-kubeclarity-scanner-template” within “containers: - name:
It should look like this:
|
Thank you for your contribution! This issue has been automatically marked as |
@uselessidbr do you have any idea how to achieve that if Im installing app via Helm chart? I dont know how to authenticate to ACR (Azure). I have dockerregistry secret on namespace but still Kubeclarity cant pull from private repo |
Is your feature request related to a problem? Please describe.
We are trying to run kubeclarity in a very locked down network environment. All of our image pulls except ones coming from AWS Private registries are force to run through a harbor image proxy, that requires authentication. This image rewrite, and the attaching of the imagePullSecret is done automatically by kyverno for all namespaces except kube-system and kyverno. This means whether I run the scan in the kubeclarity namespace, a custom namespace or let the scan happen in the namespace of the pod it wants to scan, there ends up being situations where kubeclarity does not use the required imagepullsecret
Describe the solution you'd like
It would be preferable to tell kubeclarity to scan in either kubeclarity namespace, or a custom namespace, and to require all images to use an imagepullsecret that would already exist in that namespace
Describe alternatives you've considered
We currently do not scan images in kube-system, or in kyverno's namespaces.
Additional context
This is an EKS environment, in a special part of AWS Govcloud, with no outbound internet access except for AWS endpoints, and a few whitelisted proxies like harbor.
The text was updated successfully, but these errors were encountered: