Skip to content

CLI Reference

The sidereal CLI provides two primary subcommands: discover for scanning a cluster and generating probe configurations, and report for on-demand report generation. The CLI connects to your cluster using the standard kubeconfig resolution order.

sidereal <command> [flags]
Commands:
discover Discover security controls and generate probe configurations
report Generate compliance reports
version Print version information
help Print this help message

Scans the cluster for existing security resources and generates SiderealProbe manifests that would validate those controls. This is the primary onboarding path: run discovery, review the output, and apply the probes you want.

FlagTypeDefaultDescription
--typestring"" (all)Probe type to discover: rbac, netpol, admission, secret, detection. Empty runs all discoverers.
--namespacestring"" (all)Limit discovery to a specific namespace.
--outputstring"" (stdout)Output directory or file for generated YAML. If a directory, each probe is written as a separate file.
--dry-runboolfalseShow what would be discovered without writing files.
--formatstringyamlOutput format: yaml or json.
--kubeconfigstring""Path to kubeconfig file. Defaults to $KUBECONFIG or ~/.kube/config.

Discover all probe types and print to stdout:

Terminal window
sidereal discover

Discover only NetworkPolicy probes in a specific namespace:

Terminal window
sidereal discover --type netpol --namespace production

Preview what would be discovered without generating files:

Terminal window
sidereal discover --dry-run

Write each discovered probe to a separate file in a directory:

Terminal window
sidereal discover --output ./generated-probes/

Generate JSON instead of YAML:

Terminal window
sidereal discover --format json --output probes.json

The CLI runs the same discovery engine used by the controller’s recommendation reconciler. Five discoverers scan for:

  • RBAC: ClusterRoleBindings, RoleBindings, and ServiceAccounts with elevated permissions.
  • NetworkPolicy: existing NetworkPolicy resources and their target namespaces.
  • Admission: Kyverno ClusterPolicies or OPA ConstraintTemplates.
  • Secret: Secrets in non-system namespaces (generates Secret Access probes).
  • Detection: Falco rules or Tetragon TracingPolicies (generates detection probes with ATT&CK technique mappings).

Each discovered resource produces a probe recommendation with a confidence level (high, medium, low) indicating how fully the probe was derivable from the source resource. The CLI converts recommendations directly to SiderealProbe manifests, while the controller creates SiderealProbeRecommendation CRs for the review-and-promote workflow.

Generates compliance reports on-demand from probe result data in the cluster.

FlagTypeDefaultDescription
--typestringrequiredReport type: continuous-monitoring, poam, coverage-matrix, evidence-package, executive-summary.
--formatstringmarkdownOutput format: oscal-json, pdf, markdown, csv, zip.
--outputstring"" (stdout)Output file path. Required for binary formats (pdf, zip).
--frameworksstring"" (all enabled)Comma-separated list of frameworks to include.
--fromstring""Start of reporting period (RFC 3339). Defaults to 30 days ago.
--tostring""End of reporting period (RFC 3339). Defaults to now.
--kubeconfigstring""Path to kubeconfig file.

Generate a continuous monitoring summary in Markdown:

Terminal window
sidereal report --type continuous-monitoring

Generate a POA&M as CSV scoped to specific frameworks:

Terminal window
sidereal report --type poam --format csv --frameworks nist-800-53,cmmc --output poam.csv

Generate an evidence package for a specific time period:

Terminal window
sidereal report --type evidence-package --format zip \
--from 2026-01-01T00:00:00Z --to 2026-03-31T23:59:59Z \
--output q1-evidence.zip

Generate an executive summary in PDF:

Terminal window
sidereal report --type executive-summary --format pdf --output exec-summary.pdf