Red Hat Advanced Cluster Security for Kubernetes (RHACS) integrates with vulnerability scanners to enable you to import your container images and watch them for vulnerabilities.
Supported container image registries
Red Hat supports the following container image registries:
-
Amazon Elastic Container Registry (ECR)
-
Generic Docker registries (any generic Docker or Open Container Initiative-compliant image registries, for example, DockerHub, gcr.io
, mcr.microsoft.com
)
-
Google Container Registry
-
Google Artifact Registry
-
IBM Cloud Container Registry
-
JFrog Artifactory
-
Microsoft Azure Container Registry (ACR)
-
Red Hat Quay
-
Red Hat registry (registry.redhat.io
, registry.access.redhat.com
)
-
Sonatype Nexus
This enhanced support gives you greater flexibility and choice in managing your container images in your preferred registry.
Supported Scanners
You can set up RHACS to obtain image vulnerability data from the following commercial container image vulnerability scanners:
Scanners included in RHACS
-
Scanner V4 (Technology Preview): Beginning with RHACS version 4.4, a new scanner is introduced that is built on ClairCore, which also powers the Clair scanner. Scanner V4 supports scanning of language and OS-specific image components. You do not have to create an integration to use this scanner, but you must enable it during or after installation. For version 4.4, if you enable this scanner, you must also enable the StackRox Scanner. For more information about Scanner V4, including links to the installation documentation, see About RHACS Scanner V4.
|
Scanner V4 is a Technology Preview feature only. Technology Preview features
are not supported with Red Hat production service level agreements (SLAs) and
might not be functionally complete. Red Hat does not recommend using them
in production. These features provide early access to upcoming product
features, enabling customers to test functionality and provide feedback during
the development process.
|
-
StackRox Scanner: This scanner is the default scanner in RHACS. It originates from a fork of the Clair v2 open source scanner. If you have Scanner V4 enabled, you must also enable this scanner to provide scanning of RHCOS nodes and platform vulnerabilities such as Red Hat OpenShift, Kubernetes, and Istio. Support for that functionality in Scanner V4 is planned for a future release.
Alternative scanners
-
Clair: As of version 4.4, you can enable Scanner V4 in RHACS to provide functionality provided by ClairCore, which also powers the Clair V4 scanner. However, you can configure Clair V4 as the scanner by configuring an integration.
-
Google Container Analysis
-
Red Hat Quay
|
The StackRox Scanner, in conjunction with Scanner V4 (optional), is the preferred image vulnerability scanner to use with RHACS.
For more information about scanning container images with the StackRox Scanner and Scanner V4, see Scanning images.
|
If you use one of these alternative scanners in your DevOps workflow, you can use the RHACS portal to configure an integration with your vulnerability scanner. After the integration, the RHACS portal shows the image vulnerabilities and you can triage them easily.
If multiple scanners are configured, RHACS tries to use the non-StackRox/RHACS and Clair scanners. If those scanners fail, RHACS tries to use a configured Clair scanner. If that fails, RHACS tries to use Scanner V4, if configured. If Scanner V4 is not configured, RHACS tries to use the StackRox Scanner.