Using Trivy plugin with insecure registry and / or custom certificate authority #473
Replies: 3 comments 6 replies
-
👋 @awsompankaj Thank you for trying out Starboard and reporting this issue. The last relevant error message in your logs is:
which might indicate registry authentication / authorisation issues. Neglect Docker socket / daemon error reported by Trivy as it's not relevant in this case. (Trivy does not require Docker engine to scan container images at all.) I assume that your Deployment refers to a container image stored in a private Harbor registry and you provided image pull secret at a service account or pod level. Is that correct? Those are the only supported options to scan private container images with Starboard / Trivy. If you're authorising K8s nodes to pull images this option is not supported yet, see #120 |
Beta Was this translation helpful? Give feedback.
-
@danielpacak Thanks for your response. is the issue related to certificated which is used in harbor URL which is selfsigned? any suggestion? |
Beta Was this translation helpful? Give feedback.
-
@danielpacak using trivy binary i am able to scan the image from harbor repo. is there any way to import the CA cert for harbor in trivy job or add environment variable TRIVY_INSECURE=true when we run the starboard scan?
|
Beta Was this translation helpful? Give feedback.
-
Hi, I am running my kubernetes cluster 1.19.3 with containerd runtime, when i run the vulnerabilityreports for any deployment my job fails with below errors, seems it requires only docker daemon to run which is not present in any of the host in cluster.
my images are stored in private harbor repo.
Beta Was this translation helpful? Give feedback.
All reactions