Getting started

Prevent Kubernetes misconfigurations from reaching production (again 😤 )! The CLI integration provides a policy enforcement solution to run automatic checks for rule violations.

Datree can be used on the command line to run policies against Kubernetes manifests YAML files or Helm charts. The end goal is to include Datree's policy check as part of your CI/CD pipeline or to run it locally before every commit.

No prerequisites to get started!

We don't need access to your cluster, code or anything whatsoever for you to try it out


1. Install Datree's CLI integration

Binary releases can be downloaded from the releases page or can be installed directly

  • Linux / MacOS: curl | /bin/bash
  • Windows: iwr -useb | iex
  • Docker: docker pull datree/datree

Using Helm?

Our Helm plugin can be accessed through the helm CLI!

👉 Read how to use Datree's Helm plugin

2. Test a Kubernetes (demo) manifest

Run Datree to test it against a pre-compiled demo file - k8s-demo.yaml:


You will get the following output in your CLI:

demo file output
demo file output

3. Sign in to configure your policy

Each policy check is running a "default" policy that includes 21 built-in rules. To configure the policy, switch back to your terminal sign up by clicking on the link at the bottom of the execution output:

Document image

signup link in your terminal
signup link in your terminal

The link from the CLI will lead to a sign-up page. To make it easier for you, so you will not need to create a new user, you can sign up with your private GitHub account.

signup page
signup page

After sign-up, you'll be automatically redirected to your Centralized policy to set it according to your needs.

4. All set! 🥳

Your policy is now ready, and you can start running it to test your own Kubernetes manifests files: