Skip to content

Images view#

Lens paid subscription feature

The Images view contains a visual summary about vulnerability scanning results and the table that lists the cluster images being scanned. You can click the list items and open the details panel with comprehensive information and various actions. The Namespace drop-down list filters the cluster objects by namespaces. You can also search for a specific item using the Search Images input field.

You can resize and reorder the table columns. Drag the column border in the table header to change the width. To change the column position, drag its header left or right. Also, you can sort objects in ascending or descending order by clicking the header of a column and configure the column visibility. By default, the table consists of the following columns:

Note

The table content can be exported in the CSV file format.

Column Description
Name The name of the image.
Platforms The operating system that is used for the image.
Pods The current number of pods that run the image.
Vulnerabilities The number of vulnerabilities by severity.
Exposed Secrets The number of exposed secrets.
Status The current scanning status of the image.
More Actions The Scan image and Show details options.

Scanning details#

The scanning details panel contains information about the image, platforms, and vulnerabilities. It consists of the following parts:

Tip

Image vulnerability data is also available when observing pod and image details in the corresponding views.

Properties
Image name, identifier (image digest), scanning status, and other parameters.
Platforms
The platforms in use and previous platforms. Current platforms are blue. You can click a platform to see its details and history.
Events
A list of detected security-related events.
Vulnerabilities
A summary and a table of detected image vulnerabilities. The table is interactive, you can click the vulnerability ID to find more information from one of the vulnerability databases. By default, the scanning results are provided by the [Aqua Vulnerability Database](https://avd.aquasec.com/).

Manual scanning#

Tip

Add the following domains to the firewall exceptions to ensure the correct scanning process:

  • ghcr.io
  • pkg-containers.githubusercontent.com

To perform manual scanning:

  1. In Navigator, open Security Center > Images.
  2. From the images list, select an image you need to scan and click Options > Scan image.