examples
checkov
examples | checkov | |
---|---|---|
11 | 63 | |
6,422 | 7,817 | |
0.6% | 2.1% | |
6.5 | 9.8 | |
10 days ago | 7 days ago | |
Shell | Python | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
examples
-
Show HN: KubeForge – A GUI for Kubernetes YAMLs
3. Reading existing resources from a cluster
3, in particular, is kind of a whole other type of tool, to view/debug existing infra, instead of creating it, but the UI has the right shape to do that extremely well, too.
I agree with other comments that adding a default example to the demo would be nice. I imported this manifest, and it worked pretty well: https://github.com/kubernetes/examples/blob/master/guestbook...
-
Future AI Deployment: Automating Full Lifecycle Management with Rollback Strategies and Cloud Migration
Kubernetes Rollback Examples: GitHub Repository
-
SBOM with Checkov
$ git clone https://github.com/dwmkerr/terraform-consul-cluster.git $ git clone https://github.com/splunk/splunk-aws-cloudformation.git $ git clone https://github.com/webdevops/Dockerfile.git $ git clone https://github.com/softprops/serverless-aws-rust-http.git $ git clone https://github.com/kubernetes/examples.git $ git clone https://github.com/prometheus-community/helm-charts.git
-
Which block storage solution to self host ?
Then for the initators (k8s pods), just reference the builtin iSCSI CSI driver in your deployment's [volume config](https://github.com/kubernetes/examples/blob/master/volumes/iscsi/iscsi.yaml).
-
Automation as key to cloud adoption success
Reference: https://github.com/kubernetes/examples
-
MountVolume.SetUp failed for volume "nfs" : mount failed: exit status 32
I am setting up a kubernetes lab using one node only and learning to setup kubernetes nfs. I am following kubernetes nfs example step by step from the following link: https://github.com/kubernetes/examples/tree/master/staging/volumes/nfs
- I just passed the CKA!! Here are some tips (2022)
-
Any example kubernetes applications I can reference?
It doesn't seem like there are a lot of good open source k8's projects. One I could find was the kubernetes/examples repo.
-
GlusterFS for Kubernetes Volume Storage: Ability to mount directories in volumes?
Kubernetes has a decent example of using GlusterFS for Volume storage: fun documentation link
-
Full Stack Kubernetes with Kong Ingress Controller
Now let's deploy something that will return some results. Kubernetes has multiple example applications available in a Github repo. We are going to deploy the Guestbook App with these commands:
checkov
-
Ditched Terraform for OpenTofu. Why Devs Everywhere Are Making the Same Move (cheatsheet included)
Checkov https://www.checkov.io A static analysis tool to scan infrastructure code for misconfigs, secrets, and best practice violations.
-
Custom Security Checks for AWS Cloud Control Provider with Checkov
PR #6647
-
DevOps in 2025: the future is automated, git-ified, and kinda scary but fun.
Checkov infrastructure-as-code misconfig detection
-
Boas Práticas de Segurança e Qualidade no Terraform.
Link do repo
-
Top Terraform/OpenTofu tools to Use in 2025
Link: https://github.com/bridgecrewio/checkov
-
Terraform Cookbook: Development Environment Recipe
Checkov: static analysis for IaC
-
Building Web Applications Using Amazon EKS : AWS Project
Prior to deploying kubernetes manifest files to EKS Cluster, supplementary steps need to be added to prevent security and misconfiguration issue by using both *Checkov *and Trivy . Also, we will use seperate ArgoCD account from admin user that we’ve used in the previous lab. This will follow ArgoCD RBAC rule to secure ArgoCD and EKS cluster ultimately.
-
Automating Snowflake Resource Deployment using Terraform and GitHub Actions
The workflow also includes a step for infrastructure code scan to scan Terraform code. This uses Checkov action against infrastructure-as-code, open source packages, container images, and CI/CD configurations to identify misconfigurations, vulnerabilities, and license compliance issues.
-
Cloud Security and Resilience: DevSecOps Tools and Practices
1. Checkov: https://github.com/bridgecrewio/checkov Checkov is a static code analysis tool that helps developers prevent cloud misconfigurations during the development phase by scanning Terraform, CloudFormation, Kubernetes, and more.
-
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons
Checkov Owner/Maintainer: Prisma Cloud by Palo Alto Networks (acquired in 2021) Age: First released on GitHub on March 31st, 2021 License: Apache License 2.0
What are some alternatives?
piraeus-operator - The Piraeus Operator manages LINSTOR clusters in Kubernetes.
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
azure-pipelines-yaml - Azure Pipelines YAML examples, templates, and community interaction
kics - Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
aws-cdk-examples - Example projects using the AWS CDK
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.