Find out which clusters host containers with vulnerabilities detected by Runtime Scanning.
Runtime Scanning can detect vulnerabilities in your existing clusters. Once a
vulnerability is detected on a container, the detection displays. Switch between the
Kubernetes and ECS tabs to view the
desired results.
NoteRuntime Vulnerability Scanning does not support the deprecated Docker Image Format
v1. Use Docker Image Format v2 and OCI compliant container images.
|
The following table outlines the actions available in the Vulnerabilities tab.
|
Action
|
Description
|
|
Filter the displayed data
|
Use the Filter by and
Severity drop-downs to locate specific
vulnerabilities in the list.
|
|
Locate the affected clusters
|
Click the Cluster link to redirect and locate
the cluster in Container Inventory.
|
|
Export a list of vulnerabilities
|
Click the Export button to create and download a .CSV file listing all the vulnerabilities on the
page.
|
|
View CVE information
|
Select a detection in the list and click the CVE link under the table
to view more information about the CVE in the National Vulnerability Database.
|
