Admission Controller

This chart deploys the Sysdig Admission Controller in your Kubernetes cluster.

Installing the Chart

Add Sysdig Helm charts repository:

$ helm repo add sysdig

Deploy the scanner adapter

$ helm install --create-namespace -n admission-controller admission-controller -f values.yaml sysdig/admission-controller


The following table lists the configurable parameters of the Sysdig Admission Controller chart and their default values:

Parameter Description Default
sysdig.url The Sysdig URL prefix
sysdig.secureAPIToken API Token to access Sysdig Secure ``
clusterName Cluster Name which appear on Secure UI ``
features.publishOnSecureEventFeed Publish admission events on Secure Event feed (Experimental) false
features.k8sAuditDetections Enable K8s Audit detections with Falco rules false
verifySSL Verify SSL on HTTPS connections to Sysdig Secure true
nameOverride Chart name override ` `
fullnameOverride Chart full name override ` `
serviceAccounts.webhook.create Create the service account true
serviceAccounts.webhook.annotations Extra annotations for serviceAccount {} Use this value as serviceAccount Name ` `
serviceAccounts.scanner.create Create the service account true
serviceAccounts.scanner.annotations Extra annotations for serviceAccount {} Use this value as serviceAccount Name ` ` Service name for Webhook deployment webhook
webhook.replicaCount Amount of replicas for webhook 1
webhook.image.repository Webhook image repository sysdiglabs/admission-controller
webhook.image.pullPolicy PullPolicy for Webhook image Always
webhook.image.tag Webhook image tag master
webhook.service.type Use this type as webhook service ClusterIP
webhook.service.port Configure port for the webhook service 5000
webhook.httpProxy HTTP Proxy settings for webhook ``
webhook.noProxy No proxy these URL’s for webhook kubernetes,
webhook.podAnnotations Webhook pod annotations {"": "true", "": "/metrics", "": "5000", "": "https"}
webhook.podSecurityContext PSP’s for webhook {"fsgroup": 1000}
webhook.securityContext Configure securityContext for webhook {"capabilities": {"drop": ["ALL"]}, "readOnlyRootFilesystem": true, "runAsNonRoot": true, "runAsUser": 1000 }
webhook.imagePullSecrets The image pull secrets for webhook []
webhook.resources Resource limits for webhook {}
webhook.nodeSelector Configure nodeSelector for scheduling for webhook {}
webhook.tolerations Tolerations for scheduling for webhook []
webhook.affinity Configure affinity rules for webhook {}
scanner.enabled Deploy the Inline Scanner Service true Service name for Scanner deployment scanner
scanner.replicaCount Amount of replicas for scanner 1
scanner.image.repository Scanner image repository sysdiglabs/inline-scan-service
scanner.image.pullPolicy PullPolicy for Scanner image Always
scanner.image.tag Scanner image tag 0.0.4
scanner.service.port Configure port for the webhook service 8443
scanner.authWithSecureToken Authenticate with Secure token false
scanner.httpProxy HTTP Proxy settings for scanner ``
scanner.noProxy No proxy these URL’s for scanner kubernetes,
scanner.podAnnotations Scanner pod annotations {"": "true", "": "/metrics", "": "5000", "": "https"}

Specify each parameter using the --set key=value[,key=value] argument to helm install. For example,

$ helm install my-release \
    --set sysdig.secureApiToken=YOUR-KEY-HERE \

Alternatively, a YAML file that specifies the values for the parameters can be provided while installing the chart. For example,

$ helm install my-release -f values.yaml sysdig/admission-controller

On Prem deployment

Use the following command to deploy in an on-prem:

$ helm install  --create-namespace -n sysdig-admission-controller sysdig-admission-controller \
                --set sysdig.url=SECURE_URL \
                --set sysdig.secureAPIToken=SECURE_API_TOKEN \
                --set clusterName=CLUSTER_NAME \
                --set verifySSL=false \

Use verifySLL=false if you are using self signed certificates.