You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Kube Linter | 0.2.1 | Security | Linter and Static analysis tool that checks Kubernetes manifests |
37
+
| Kubeconform | 0.4.7 | Validation | Kubernetes manifests validation tool like Kubeval with CRD support |
38
+
| Kubeaudit | 0.14.0 | Security | Audit clusters or manifest files for security concerns |
39
+
| Datree | 0.1.382 | Policy | Ensure Kubernetes manifests and Helm charts are valid and follow your policies. |
39
40
40
41
Kubeaudit
41
42
---------
@@ -163,6 +164,22 @@ Kube Linter
163
164
164
165
[Kube Linter](https://github.com/stackrox/kube-linter) is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices. KubeLinter accepts YAML files as input and runs a series of checks on them. If it finds any issues, it reports them and returns a non-zero exit code.
165
166
167
+
Datree
168
+
-----------
169
+
170
+
[Datree](https://github.com/datreeio/datree) is a CLI tool that can be used locally or in your CI/CD to ensure Kubernetes manifests and Helm charts follow best practices as well as your organization’s policies. It comes with 30 battle-tested rules to choose from, together with built-in support for YAML and kubernetes schema validation.
171
+
172
+
#### Example with static YAMLs
173
+
```sh
174
+
datree test my-app/*.yaml
175
+
datree test my-app/deployment.yaml
176
+
```
177
+
178
+
#### Example with Helm
179
+
_First, you need to install [Datree's helm plugin](https://hub.datree.io/helm-plugin)_
0 commit comments