debian-mirror-gitlab/doc/user/clusters/agent/vulnerabilities.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

71 lines
2.9 KiB
Markdown
Raw Normal View History

2022-05-07 20:08:51 +05:30
---
stage: Configure
group: Configure
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2022-05-07 20:08:51 +05:30
---
2022-07-23 23:45:48 +05:30
# Operational Container Scanning **(ULTIMATE)**
2022-05-07 20:08:51 +05:30
2022-10-11 01:57:18 +05:30
> - [Introduced](https://gitlab.com/groups/gitlab-org/-/epics/6346) in GitLab 14.8.
> - [Deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/368828) the starboard directive in GitLab 15.4. The starboard directive will be removed in GitLab 16.0.
2022-05-07 20:08:51 +05:30
To view cluster vulnerabilities, you can view the [vulnerability report](../../application_security/vulnerabilities/index.md).
You can also configure your agent so the vulnerabilities are displayed with other agent information in GitLab.
2022-08-13 15:12:31 +05:30
## Enable operational container scanning **(ULTIMATE)**
2022-05-07 20:08:51 +05:30
2022-08-13 15:12:31 +05:30
You can use operational container scanning
2022-05-07 20:08:51 +05:30
to scan container images in your cluster for security vulnerabilities.
2022-08-27 11:52:29 +05:30
NOTE:
In GitLab 15.0 and later, you do not need to install Starboard operator in the Kubernetes cluster.
2022-10-11 01:57:18 +05:30
To begin scanning all resources in your cluster, add a `container_scanning`
2022-07-16 23:28:13 +05:30
configuration block to your agent configuration with a `cadence` field
containing a CRON expression for when the scans will be run.
2022-05-07 20:08:51 +05:30
```yaml
2022-10-11 01:57:18 +05:30
container_scanning:
2022-07-23 23:45:48 +05:30
cadence: '0 0 * * *' # Daily at 00:00 (Kubernetes cluster time)
2022-05-07 20:08:51 +05:30
```
2022-07-16 23:28:13 +05:30
The `cadence` field is required. GitLab supports the following types of CRON syntax for the cadence field:
2022-05-07 20:08:51 +05:30
2022-07-16 23:28:13 +05:30
- A daily cadence of once per hour at a specified hour, for example: `0 18 * * *`
- A weekly cadence of once per week on a specified day and at a specified hour, for example: `0 13 * * 0`
2022-05-07 20:08:51 +05:30
2022-07-16 23:28:13 +05:30
It is possible that other elements of the CRON syntax will work in the cadence field, however, GitLab does not officially test or support them.
2022-05-07 20:08:51 +05:30
2022-08-13 15:12:31 +05:30
By default, operational container scanning will attempt to scan the workloads in all
2022-07-16 23:28:13 +05:30
namespaces for vulnerabilities. The `vulnerability_report` block has a `namespaces`
field which can be used to restrict which namespaces are scanned. For example,
if you would like to scan only the `development`, `staging`, and `production`
namespaces, you can use this configuration:
2022-05-07 20:08:51 +05:30
```yaml
2022-10-11 01:57:18 +05:30
container_scanning:
2022-07-23 23:45:48 +05:30
cadence: '0 0 * * *'
2022-05-07 20:08:51 +05:30
vulnerability_report:
namespaces:
2022-07-16 23:28:13 +05:30
- development
- staging
- production
2022-05-07 20:08:51 +05:30
```
2022-08-13 15:12:31 +05:30
## View cluster vulnerabilities
Prerequisite:
- You must have at least the Developer role.
To view vulnerability information in GitLab:
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Projects** and find the project that contains the agent configuration file.
2022-08-13 15:12:31 +05:30
1. On the left sidebar, select **Infrastructure > Kubernetes clusters**.
1. Select the **Agent** tab.
1. Select an agent to view the cluster vulnerabilities.
![Cluster agent security tab UI](../img/cluster_agent_security_tab_v14_8.png)
This information can also be found under [operational vulnerabilities](../../../user/application_security/vulnerability_report/index.md#operational-vulnerabilities).