Continuous Compliance for Kubernetes containers.
Documentation ·
Website
Reel captures container state before it disappears. When a pod crashes, scales down, or gets terminated, the evidence is gone. Reel preserves it.
- Filesystem Layers — Diff-based snapshots of container changes
- Security Scanning — SBOM, CBOM, vulnerability and malware detection
- Forensics — Memory, processes, network connections
- Checkpoint — Full process state capture using CRIU
- Scheduling — Annotation-driven automated captures
helm install reel oci://docker.io/getreel/helm -n reel --create-namespaceIncludes a 30-minute trial. For production, request an extended license.
| Component | Version |
|---|---|
| Kubernetes | 1.25+ |
| containerd | 2.0+ |
| Helm | 3.x |
See Requirements for cloud provider notes and full details.
| Parameter | Description | Default |
|---|---|---|
license.token |
License token | "" |
license.secretRef.name |
Secret name for license | "" |
license.secretRef.key |
Key in secret | token |
config.clusterName |
Cluster identifier for S3 paths | "" |
config.logLevel |
debug, info, warn, error | info |
config.logFormat |
json, console | console |
initCriu.enabled |
Install CRIU for checkpointing | true |
initTrivy.enabled |
Pre-load Trivy vulnerability database | true |
clamav.enabled |
ClamAV sidecar for malware scanning | true |
scheduler.enabled |
Annotation-driven scheduled captures | true |
imageCredentials.create |
Create registry secret (for private registries) | — |
imageCredentials.secretName |
Name of registry secret | — |
See S3 Exports for S3 configuration.
helm uninstall reel -n reel