Skip to main content
Skip table of contents

Kubernetes Integration for Google GKE

Note: This integration is currently in open beta.

Overview

The Mend Kubernetes (K8s) integration can connect with your Google Kubernetes Engine using your provided access and secret keys, enabling you to scan and secure containers running in GKE environments, either in Autopilot or Standard mode.

Prerequisites before you Configure Mend’s Kubernetes Integration for Google GKE

  • Your Mend.io user must be an organization administrator.

  • A Google Cloud service account key file with permissions to access your GKE clusters.

Set up the Kubernetes Integration for Google GKE in the Mend AI Native AppSec Platform UI

As an administrator, navigate to the Integrations page and click the Google GKE integration card:

image-20251226-124051.png

This will spawn the integration setup wizard.

Step 1 - General Details

image-20251226-124810.png
  1. Fill in the desired Display Name (mandatory).

  2. Add a Description (optional).

  3. Select the Environment (Production/Dev/QA/Staging). (Mandatory; multi-selection is supported).

  4. Specify the Address for reaching the GKE cluster endpoint.

Step 2 - Authentication

Upload your Google Cloud service account key file.

image-20251226-125137.png

Once a valid key file is uploaded, the Test Connection button will become clickable. Use it to verify connectivity and proceed to the next step.

image-20250904-065308.png
image-20250904-065112.png
image-20250904-065220.png

Step 3 - Clusters

The summary of detected clusters will be displayed. Click Next to proceed to the next step.

image-20250714-160644.png

Step 4 - Configuration

Fill in the Configuration information to define your scan schedule:

image-20260205-075039.png
  • Enable Schedule - Toggle off to disable scheduling.

  • Scan Time

  • Frequency

  • Scan on Connect - While toggled on, it means a scan will be triggered automatically once the integration setup is completed.

  • Scan System Namespaces: Toggle on to include otherwise skipped Kubernetes namespaces (i.e., kube-system, kube-public and kube-node-lease), which represent Kubernetes system components rather than customer workloads. Disabled by default.

Scheduling Kubernetes image scans is crucial for maintaining the security and integrity of your container images. By default, a scan interval of 7 days will be applied. You can change the scan interval in 1-day increments or select specific days of the week when you wish for scans to be executed.

Note: After the first scan (in which the latest 10 tags are scanned), in every scheduled scan only newly pushed images from the registry or changed images will be scanned. This is because vulnerability and package updates occur automatically in an asynchronous manner, keeping the security information up-to-date without requiring new scans.

Click the Next (image-20240727-113029.png) button at the bottom right to move on to the next step.

Step 5 - Summary

In this step, the summary of your input from the previous steps will be displayed. You can go back to the previous screens of the wizard to make changes, by clicking the ‘Back’ button at the bottom right corner of the screen. If you wish to confirm your configuration and add your registry, click the ‘Done’ button:

image-20240727-114442.png

Update the Configuration for an Existing Integration

After the integration is set up, you can edit its configuration by following these steps:

  • Navigate to your ProfileIntegrationsMy integrations

    image-20260206-072600.png
  • Locate the desired integration and select Edit from the Actions menu on the right.

    image-20260206-072949.png
  • This will take you through the setup wizard, starting from the authentication step.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.