Snyk tests and monitors your Kubernetes configurations as stored in your source code repositories, guiding you with advice for how you can better secure your Kubernetes environment - catching misconfigurations before you push to production, and helping you to fix them.
This feature is available to free users with a monthly test limit of 300 and all subscription plans.
Supported Git repositories and file formats
Snyk currently scans your Kubernetes configuration files in JSON and YAML format when imported from your integrated Git repository.
Configure Snyk to scan your Kubernetes configuration files
You must be an administrator for the organization you're configuring in Snyk.
Ensure you’ve already integrated your Git repository; if you haven’t done this yet, check out Git repository (SCM) integrations.
Integrations are managed per organization.
Enable Snyk to detect Kubernetes configuration files by enabling the flag in the Infrastructure as code settings:
If needed, review and adjust your settings from the *Infrastructure as code* settings area: