Pod Configuration for Sidecar Container Scanning¶
This document explains how to configure Kubernetes pods to use the sidecar container scanning approach.
Overview¶
When using the sidecar container approach, you need to configure your pods to include the CINC Auditor scanner container alongside your target container. The two containers share the same pod, allowing the scanner to access the target container's filesystem.
Configuration Requirements¶
To enable sidecar scanning, your pod configuration needs:
- The main application container
- A CINC Auditor scanner container in the same pod
- Shared process namespace between containers
- Appropriate volume mounts for results storage
Example Pod Configuration¶
Here is an example pod configuration with a sidecar scanner:
Using with Deployments and StatefulSets¶
To apply this pattern to Deployments or StatefulSets, add the sidecar configuration to the pod template spec:
Helm Chart Support¶
For simplified deployment using Helm, use the provided sidecar-scanner
chart:
The Helm chart handles the sidecar configuration automatically.
Configuration Parameters¶
Parameter | Description | Default |
---|---|---|
shareProcessNamespace |
Enables process namespace sharing | true |
TARGET_CONTAINER |
Name of the container to scan | None (required) |
PROFILE_PATH |
Path to InSpec profile | /opt/profiles/container-baseline |
RESULT_PATH |
Path to store results | /opt/scan-results |
Next Steps¶
After configuring your pods, learn about:
- Retrieving Results - How to access and use scan results
- Implementation Details - How the sidecar scanning works