Skip to content

Images view#

Lens paid subscription feature

The Images view contains a visual summary about vulnerability scanning results and the table that lists the cluster images being scanned. You can click the list items and open the details panel with comprehensive information and various actions. The Namespace drop-down list filters the cluster objects by namespaces. You can also search for a specific item using the Search Images input field.

You can resize and reorder the table columns. Drag the column border in the table header to change the width. To change the column position, drag its header left or right. Also, you can sort objects in ascending or descending order by clicking the header of a column and configure the column visibility. By default, the table consists of the following columns:

Note

The table content can be exported in the CSV file format.

Column Description
Name The name of the image.
Platforms The operating system that is used for the image.
Pods The current number of pods that run the image.
Vulnerabilities The number of vulnerabilities by severity.
Exposed Secrets The number of exposed secrets.
Status The current scanning status of the image.
More Actions The Show details button.

Scanning details#

The scanning details panel contains information about the image, platforms, and vulnerabilities. It consists of the following parts:

Tip

Image vulnerability data is also available when observing pod and image details in the corresponding views.

General information
Image name, identifier (image digest), scanning status, and other parameters.
Platforms
The platforms in use and previous platforms. Current platforms are blue. You can click a platform to see its details and history.
Vulnerabilities
A summary and a table of detected image vulnerabilities. The table is interactive, you can click the vulnerability ID to find more information from one of the vulnerability databases. By default, the scanning results are provided by the [Aqua Vulnerability Database](https://avd.aquasec.com/).
Events
A list of detected security-related events.

Scanning in air-gapped environments#

Lens Desktop supports work in air-gapped environments. For vulnerability scanning in an air-gapped environment, you can download the vulnerability database and use it on a machine that does not have internet access.

To download the vulnerability database using Lens Desktop:

  1. On an internet-connected machine, navigate to File > Preferences > Lens Security and click Export Current DB.
  2. Transfer the downloaded lens-vulnerability-db.tar.gz file to an air-gapped machine.
  3. On the air-gapped machine, navigate to File > Preferences > Lens Security and click Import DB.

Note

You can also download the vulnerability database using the Trivy security scanner. For details see Trivy documentation: Air-Gapped Environment .