Skip to main content

Configuration options

Here is a list with more detailed information about each application configuration option available in the admin console.


  • URL: This is the domain name for the application. It will be accessible under this domain name.

First user creation#

The following fields are used to created the first administrator user for the application.

  • Username: admin username
  • Email: admin email
  • Password/Confirm password: admin password. This password doesn't have any constraint. It will be reset during first connection.

Changing this after the installation has no effect.


By clicking the Advanced Options button, you will have access to the worker scaling options.

  • Frontend: Scale front-end workers.
  • Worker replicas: Scale workers. Workers handle incremental changes, new commits, etc. These workers are usually processing short running tasks.
  • Scanning worker replicas: Scale scanning workers. Scanning workers handle historical scans. These workers are usually processing long running tasks.

Note: Changing these values doesn't affect the rollout upgrade strategy.

Note: Workers are configured to spread across nodes, if there are multiple nodes. If you have configured your cluster for high availability, do not use less than 2 workers of each type.


Only for existing clusters

On existing cluster, a default ingress is provided. You can disable it and use your own.

The service backend listens only on HTTPS, the ingress needs to be configured for this behaviour. If you are using the nginx ingress controller, this is already done in the included ingress. If you are using another ingress controller, you will probably need to add the appropriate annotations in the text area for this. You will also need to configure this if you bring your own ingress.

The annotation area can also be used to add an ingress class, if you need it.


You need to configure TLS certificates. For now, you can use self-signed certificates or upload your own.


Parameters here should not be changed after installation unless you know what you are doing, as it may result in data losses.


You can use the provided database, or bring your own. The embedded database is not configured for high availability.


You can use the provided database, or bring your own. The embedded database is not configured for high availability.