Find out which clusters host containers with vulnerabilities detected by Runtime Scanning.
Runtime Scanning can detect vulnerabilities in your existing clusters. Once a vulnerability
is detected on a container, the detection displays. Switch between the Kubernetes and Amazon ECS tabs to view the desired results.
NoteRuntime Vulnerability Scanning does not support the deprecated Docker Image Format
v1. Use Docker Image Format v2 and OCI compliant container images.
|
The following table outlines the actions available in the Vulnerabilities tab.
|
Action
|
Description
|
|
Filter the displayed data
|
Use the Filter by and
Severity drop-downs to locate specific
vulnerabilities in the list.
|
|
Locate the affected clusters
|
Click the Cluster link to redirect and locate the cluster in Container Security.
|
|
Export a list of vulnerabilities
|
Click the Export button to create and download a .CSV file listing all the vulnerabilities on the
page.
|
|
View CVE information
|
Select a detection in the list and click the CVE link under the table
to view more information about the CVE in the National Vulnerability Database.
|
