Getting started

Prevent Kubernetes misconfigurations from reaching production (again 😤 )! The CLI integration provides a policy enforcement solution to run automatic checks for rule violations.

Datree can be used on the command line to run policies against Kubernetes manifests YAML files or Helm charts. The end goal is to include Datree's policy check as part of your CI/CD pipeline or to run it locally before every commit.

No prerequisites to get started!

We don't need access to your cluster, code or anything whatsoever for you to try it out

Quickstart

1. Install Datree's CLI integration

Binary releases can be downloaded from the releases page or can be installed directly

  • Linux / MacOS: curl https://get.datree.io | /bin/bash
  • Windows: iwr -useb https://get.datree.io/windows_install.ps1 | iex
  • Docker: docker pull datree/datree
Docker
Linux
MacOS
Homebrew
Windows

Using Helm?

Our Helm plugin can be accessed through the helm CLI!

👉 Read how to use Datree's Helm plugin

2. Test a Kubernetes (demo) manifest

Run Datree to test it against a pre-compiled demo file - k8s-demo.yaml:

Docker
Linux
MacOS
PowerShell

You will get the following output in your CLI:

demo file output
demo file output



3. Sign in to configure your policy

Each policy check is running a "default" policy that includes 21 built-in rules. To configure the policy, switch back to your terminal sign up by clicking on the link at the bottom of the execution output:

Document image



signup link in your terminal
signup link in your terminal

The link from the CLI will lead to a sign-up page. To make it easier for you, so you will not need to create a new user, you can sign up with your private GitHub account.

signup page
signup page

After sign-up, you'll be automatically redirected to your Centralized policy to set it according to your needs.

4. All set! 🥳

Your policy is now ready, and you can start running it to test your own Kubernetes manifests files:

Terminal