This version is under construction, please use an official release version

Trivy Application

Enterprise Edition

What is Trivy?

Trivy is a comprehensive and versatile security scanner. Trivy has scanners that look for security issues, and targets where it can find those issues.

Targets (what Trivy can scan):

  • Container Image
  • Filesystem
  • Git Repository (remote)
  • Virtual Machine Image
  • Kubernetes
  • AWS

Scanners (what Trivy can find there):

  • OS packages and software dependencies in use (SBOM)
  • Known vulnerabilities (CVEs)
  • IaC issues and misconfigurations
  • Sensitive information and secrets
  • Software licenses

Trivy supports most popular programming languages, operating systems, and platforms.

For more information on the Trivy, please refer to the official documentation

How to deploy?

Trivy is available as part of the KKP’s default application catalog. It can be deployed to the user cluster either during the cluster creation or after the cluster is ready(existing cluster) from the Applications tab via UI.

  • Select the Trivy application from the Application Catalog.

Select Trivy Application

  • Under the Settings section, select and provide appropriate details and clck -> Next button.

Settings for Trivy Application

  • Under the Application values page section, check the default values and add values if any required to be configured explicitly. Finally click on the + Add Application to deploy the Trivy application to the user cluster.

To further configure the values.yaml, find more information on the Trivy Helm chart documentation.