Images view#
Lens paid subscription feature
The Images view contains a visual summary about vulnerability scanning results and the table that lists the cluster images being scanned. You can click the list items and open the details panel with comprehensive information and various actions. The Namespace drop-down list filters the cluster objects by namespaces. You can also search for a specific item using the Search Images input field.
You can resize and reorder the table columns. Drag the column border in the table header to change the width. To change the column position, drag its header left or right. Also, you can sort objects in ascending or descending order by clicking the header of a column and configure the column visibility. By default, the table consists of the following columns:
Note
The table content can be exported in the CSV
file format.
Column | Description |
---|---|
Name | The name of the image. |
Platforms | The operating system that is used for the image. |
Pods | The current number of pods that run the image. |
Vulnerabilities | The number of vulnerabilities by severity. |
Exposed Secrets | The number of exposed secrets. |
Status | The current scanning status of the image. |
More Actions | The Scan image and Show details options. |
Scanning details#
The scanning details panel contains information about the image, platforms, and vulnerabilities. It consists of the following parts:
Tip
Image vulnerability data is also available when observing pod and image details in the corresponding views.
- Properties
- Image name, identifier (image digest), scanning status, and other parameters.
- Platforms
- The platforms in use and previous platforms. Current platforms are blue. You can click a platform to see its details and history.
- Events
- A list of detected security-related events.
- Vulnerabilities
- A summary and a table of detected image vulnerabilities. The table is interactive, you can click the vulnerability ID to find more information from one of the vulnerability databases. By default, the scanning results are provided by the [Aqua Vulnerability Database](https://avd.aquasec.com/).
Manual scanning#
Tip
Add the following domains to the firewall exceptions to ensure the correct scanning process:
- ghcr.io
- pkg-containers.githubusercontent.com
To perform manual scanning:
- In Navigator, open Security Center > Images.
- From the images list, select an image you need to scan and click Options > Scan image.