You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| targetNamespaces | string |`""`| targetNamespace defines where you want trivy-operator to operate. By default, it's a blank string to select all namespaces, but you can specify another namespace, or a comma separated list of namespaces. |
130
130
| targetWorkloads | string |`"pod,replicaset,replicationcontroller,statefulset,daemonset,cronjob,job"`| targetWorkloads is a comma seperated list of Kubernetes workload resources to be included in the vulnerability and config-audit scans if left blank, all workload resources will be scanned |
131
131
| tolerations | list |`[]`| tolerations set the operator tolerations |
132
-
| trivy.additionalVulnerabilityReportFields | string |`""`| additionalVulnerabilityReportFields is a comma separated list of additional fields which can be added to the VulnerabilityReport. Supported parameters: Description, Links, CVSS, Target, Class, PackagePath and PackageType |
132
+
| trivy.additionalVulnerabilityReportFields | string |`""`| additionalVulnerabilityReportFields is a comma separated list of additional fields which can be added to the VulnerabilityReport. Supported parameters: Description, Links, CVSS, Target, Class, PackagePath and PackageType. Fields can also be removed with a leading minus sign `-`. Supported parameters: -Resource, -InstalledVersion, -FixedVersion, -PublishedDate, -LastModifiedDate, -Severity, -Title, -PrimaryLink, -Score and -PURL.|
133
133
| trivy.clientServerSkipUpdate | bool |`false`| clientServerSkipUpdate is the flag to enable skip databases update for Trivy client. Only applicable in ClientServer mode. |
134
134
| trivy.command | string |`"image"`| command. One of `image`, `filesystem` or `rootfs` scanning, depending on the target type required for the scan. For 'filesystem' and `rootfs` scanning, ensure that the `trivyOperator.scanJobPodTemplateContainerSecurityContext` is configured to run as the root user (runAsUser = 0). |
135
135
| trivy.configFile | string |`nil`| configFile can be used to tell Trivy to use specific options available only in the config file (e.g. Mirror registries). |
Copy file name to clipboardExpand all lines: deploy/helm/values.yaml
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -398,7 +398,8 @@ trivy:
398
398
priorityClassName: ""
399
399
400
400
# -- additionalVulnerabilityReportFields is a comma separated list of additional fields which
401
-
# can be added to the VulnerabilityReport. Supported parameters: Description, Links, CVSS, Target, Class, PackagePath and PackageType
401
+
# can be added to the VulnerabilityReport. Supported parameters: Description, Links, CVSS, Target, Class, PackagePath and PackageType.
402
+
# Fields can also be removed with a leading minus sign `-`. Supported parameters: -Resource, -InstalledVersion, -FixedVersion, -PublishedDate, -LastModifiedDate, -Severity, -Title, -PrimaryLink, -Score and -PURL.
402
403
additionalVulnerabilityReportFields: ""
403
404
404
405
# -- httpProxy is the HTTP proxy used by Trivy to download the vulnerabilities database from GitHub.
Copy file name to clipboardExpand all lines: docs/docs/vulnerability-scanning/trivy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,7 @@ EOF
101
101
|`trivy.javaDbRepository`|`mirror.gcr.io/aquasec/trivy-java-db`| External OCI Registry to download the vulnerability database for Java |
102
102
|`trivy.dbRepositoryInsecure`|`false`| The Flag to enable insecure connection for downloading trivy-db via proxy (air-gaped env) |
103
103
|`trivy.mode`|`Standalone`| Trivy client mode. Either `Standalone` or `ClientServer`. Depending on the active mode other settings might be applicable or required. |
104
-
|`additionalVulnerabilityReportFields`| N/A | A comma separated list of additional fields which can be added to the VulnerabilityReport. Possible values: `Description,Links,CVSS,Target,Class,PackagePath,PackageType`. Description will add more data about vulnerability. Links - all the references to a specific vulnerability. CVSS - data about CVSSv2/CVSSv3 scoring and vectors. Target - vulnerable element. Class - OS or library vulnerability |
104
+
|`additionalVulnerabilityReportFields`| N/A | A comma separated list of additional fields which can be added to the VulnerabilityReport. Possible values: `Description,Links,CVSS,Target,Class,PackagePath,PackageType`. Description will add more data about vulnerability. Links - all the references to a specific vulnerability. CVSS - data about CVSSv2/CVSSv3 scoring and vectors. Target - vulnerable element. Class - OS or library vulnerability. Fields can also be removed with a leading minus sign `-`. Possible values: `Resource,InstalledVersion,FixedVersion,PublishedDate,LastModifiedDate,Severity,Title,PrimaryLink,Score,PURL`|
105
105
|`trivy.command`|`image`| command. One of `image`, `filesystem` or `rootfs` scanning. Depending on the target type required for the scan. |
106
106
|`trivy.slow`|`true`| This flag is to use less CPU/memory for scanning though it takes more time than normal scanning. It fits small-footprint |
107
107
|`trivy.severity`|`UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL`| A comma separated list of severity levels reported by Trivy |
0 commit comments