Integrating Kondukto with Trivy Operator
- Navigate to your Kondukto instance.
- Select “Integrations” from the left menu panel.
- Click on “Scanners” under the Integrations section.
- Click the “CS” button and Activate Trivy Operator.
Select the Expiry Date for the Webhook Key you want to create and click the Generate button to generate the key.


To set the generated Webhook Key on the Trivy Operator running in Kubernetes, use the following command:
kubectl set env deployment/trivy-operator -n trivy-system
OPERATOR_WEBHOOK_BROADCAST_URL="https://kondukto-server.com/webhook-api/v1/trivy-operator"
OPERATOR_WEBHOOK_BROADCAST_CUSTOM_HEADERS="x-webhook-api-key:111111111-111111-11111-11111-111111111111"
OPERATOR_WEBHOOK_BROADCAST_SKIP_SSL_VERIFY="true"

After running the above command in Kubernetes, click the Test Connection button to verify the connection.
- Navigate to your Kondukto instance.
- Select “Projects” from the left menu panel.
- Click on “Your Project” under the Projects section.
- Select “Settings” on the custom project page.
- Select the “Scanners” category from the list.
- Click the “CS” and choose Trivy Operator.
On the displayed screen, select the CS category, then choose Trivy Operator, and click the Add button.

In the Trivy Operator scan settings, the relevant scopes should be added and saved. In this example, we specified the trivy-system namespace as the scope and saved the configuration.

To verify whether the configured environment variables have been set correctly, use the following command:

kubectl describe deployment trivy-operator -n trivy-system | grep -A10 "Environment:"
Running a Test Scan
To perform a test scan, run the following command to create a deployment with Nginx running on it:
kubectl create deployment nginx-test --image=nginx
Next, use the following command to start a scan on the deployment we created:
kubectl annotate deployment nginx-test trivy.security.aquasec.com/scan=enabled
You can use the following command to check if the vulnerability report has been generated:
kubectl get vulnerabilityreports -n trivy-system
We can verify that the report has been generated if we receive an output similar to the one below after running the command:
REPOSITORY TAG SCANNER AGE
replicaset-nginx-test-574bc578fc-nginx library/nginx latest Trivy
replicaset-trivy-operator-65888c9b-trivy-operator aquasec/trivy-operator 0.23.0 Trivy
You can see the scan results of your created project displayed under the Vulnerabilities tab as shown below.
Updated 5 days ago