Images view#
Lens paid subscription feature
The Images view contains a visual summary about vulnerability scanning results and the table that lists the cluster images being scanned. You can click the list items and open the details panel with comprehensive information and various actions. The Namespace drop-down list filters the cluster objects by namespaces. You can also search for a specific item using the Search Images input field.
You can resize and reorder the table columns. Drag the column border in the table header to change the width. To change the column position, drag its header left or right. Also, you can sort objects in ascending or descending order by clicking the header of a column and configure the column visibility. By default, the table consists of the following columns:
Note
The table content can be exported in the CSV
file format.
Column | Description |
---|---|
Name | The name of the image. |
Platforms | The operating system that is used for the image. |
Pods | The current number of pods that run the image. |
Vulnerabilities | The number of vulnerabilities by severity. |
Exposed Secrets | The number of exposed secrets. |
Status | The current scanning status of the image. |
More Actions | The Show details button. |
Scanning details#
The scanning details panel contains information about the image, platforms, and vulnerabilities. It consists of the following parts:
Tip
Image vulnerability data is also available when observing pod and image details in the corresponding views.
- General information
- Image name, identifier (image digest), scanning status, and other parameters.
- Platforms
- The platforms in use and previous platforms. Current platforms are blue. You can click a platform to see its details and history.
- Vulnerabilities
- A summary and a table of detected image vulnerabilities. The table is interactive, you can click the vulnerability ID to find more information from one of the vulnerability databases. By default, the scanning results are provided by the [Aqua Vulnerability Database](https://avd.aquasec.com/).
- Events
- A list of detected security-related events.
Scanning in air-gapped environments#
Lens Desktop supports work in air-gapped environments. For vulnerability scanning in an air-gapped environment, you can download the vulnerability database and use it on a machine that does not have internet access.
To download the vulnerability database using Lens Desktop:
- On an internet-connected machine, navigate to File > Preferences > Lens Security and click Export Current DB.
- Transfer the downloaded
lens-vulnerability-db.tar.gz
file to an air-gapped machine. - On the air-gapped machine, navigate to File > Preferences > Lens Security and click Import DB.
Note
You can also download the vulnerability database using the Trivy security scanner. For details see Trivy documentation: Air-Gapped Environment .