End-of-Life (EoL)

Scan images on OpenShift’s integrated Docker registry

To scan a an OpenShift integrated registry, create a new registry scan setting.
Prerequisites:
  1. Open Console, then go to
    Defend > Vulnerabilities > Registry
    .
  2. Click
    Add registry
    .
  3. In
    Version
    , select
    Red Hat OpenShift
    .
  4. Enter the registry address in the
    Registry
    field.
  5. In
    Repository
    , specify the repository to scan.
    If you leave this field blank or enter a wildcard, Prisma Cloud finds and scans all repositories in the registry.
    If you specify a partial string that ends with a wildcard, Prisma Cloud finds and scans all repositories that start with the partial string.
    If you specify an exact match, Prisma Cloud scans just the specified repository.
  6. Click in the
    Credential
    field, then click
    Add new
    .
    1. Select the
      Basic authentication
      credential type
    2. In
      Username
      , enter any arbitrary value.
    3. In
      Password
      , enter your service account token.
    4. Save your credentials.
  7. In
    OS type
    , specify whether the repo holds
    Linux
    or
    Windows
    images.
  8. In
    Scanner
    , select
    Automatic
    .
    Console automatically selects an available Defender to execute the scan job. Alternatively, you can explicitly select a Defender from the drop-down list. Defenders are listed according to the hosts where they run. For more information, see deployment patterns.
  9. In
    Number of scanners
    , enter the number of Defenders across which scan jobs can be distributed.
  10. Set
    Cap
    to the number of most recent images to scan. Leaving
    Cap
    set to
    5
    will scan the 5 most recent images. Setting this field to
    0
    will scan all images.
  11. Click
    Add
    .
  12. Click the yellow save button.
  13. Verify that the images in the repository are being scanned.
    1. Go to
      Monitor > Vulnerabilities > Registry
      .
      A progress bar shows the status of the current scan. As the scan of each image is completed, its findings are added to the results table.
    2. To get details about the vulnerabilities in an image, click on it.
      To force a specific repository to be scanned again, select it from the drop-down menu on the top right of the results table, then click the
      Scan
      button.

Recommended For You