Helm Charts Overview¶
Directory Inventory
See the Overview Directory Inventory for a complete listing of files and resources in this directory.
Introduction¶
The Secure Kubernetes Container Scanning solution provides a comprehensive set of Helm charts for deploying container scanning infrastructure in Kubernetes environments. These charts are designed with security, modularity, and enterprise usability in mind.
Our Helm charts implement a layered architecture to support all three container scanning approaches:
- Kubernetes API Approach (standard-scanner): For scanning regular containers via Kubernetes API
- Debug Container Approach (distroless-scanner): For scanning distroless containers using ephemeral debug containers
- Sidecar Container Approach (sidecar-scanner): For universal container scanning using process namespace sharing
The charts are structured to maximize reusability and minimize duplication, with common components extracted into shared charts.
Chart Organization¶
The charts are organized in a hierarchical structure:
Key Features¶
Security-First Design¶
All charts implement security best practices:
- Least-privilege RBAC model
- Short-lived access tokens
- Non-privileged containers
- Resource limitations
- Namespace isolation
Modularity¶
The charts are designed for maximum flexibility:
- Use only the components you need
- Mix and match scanning approaches
- Customize individual chart values
- Extend with your own configurations
Enterprise Integration¶
Built-in support for enterprise environments:
- CI/CD pipeline integration
- Compliance reporting with SAF CLI
- Threshold-based validation
- Multi-team and multi-cluster support
Getting Started¶
To learn more about our Helm Charts:
- See the Architecture page for an overview of chart components and relationships
- Visit the Scanner Types section to learn about different scanning approaches
- Review the Infrastructure section for core RBAC and service account setup
- Follow the Usage & Customization guides for tailoring charts to your environment
- Learn about Security Considerations for important security guidance
- Check the Operations section for troubleshooting and maintenance