scout: refresh dashboard content and screenshots

Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
This commit is contained in:
David Karlsson 2023-09-21 17:32:15 +02:00
parent b5f0bfdda7
commit 2b3e2cb8d5
11 changed files with 129 additions and 52 deletions

View File

@ -12,50 +12,60 @@ The Docker Scout Dashboard helps you share the analysis of images in an organiza
## Overview
![A screenshot of the Docker Scout vulnerabilities overview](./images/dashboard-overview.png)
![A screenshot of the Docker Scout Dashboard overview](./images/dashboard-overview.webp?border=true)
The **Overview** tab shows the total number of vulnerabilities across all your Docker Scout-enabled repositories, over time. This calculation takes the most recent image in each repository to avoid including old irrelevant images.
The **Overview** tab provides a summary for the repositories in the selected
organization.
## Repository settings
At the top of this page, you can select which **Environment** to view.
By default, the most recently pushed images are shown. To learn more about
environments, see [Environment monitoring](./integrations/environment/_index.md).
Enable Docker Scout analysis on repositories from Docker Hub in the current organization
by selecting the settings icon next to your user profile picture and then the **Repository settings** menu item.
The **Policy** boxes show your current compliance rating for each policy, and a
trend indication for the selected environment. The trend describes the policy
delta for the most recent images compared to the previous version.
For more information about policies, see [Policy Evaluation](./policy/_index.md).
Select the checkboxes for the repositories on which you want to enable Docker Scout analysis and
select **Enable image analysis**.
The vulnerability chart shows the total number of vulnerabilities for images in
the selected environment over time. You can configure the timescale for the
chart using the drop-down menu.
When you enable image analysis for a repository, Docker Scout analyzes new tags
automatically when you push to that repository. Find out more in the [image analysis](./image-analysis.md) documentation.
Use the header menu at the top of the website to access the different main
sections of the Docker Scout Dashboard:
Disable Docker Scout analysis on selected repositories by selecting **Disable image analysis**.
- [Images](#images)
- [Policies](#policies)
- [Vulnerabilities](#vulnerabilities)
- [Base images](#base-images)
- [Packages](#packages)
## Images
The **Images** tab shows a list of images in an organization. You can search for specific repositories using the search box.
The **Images** view shows a list of images in an organization. You can search
for specific repositories using the search box.
Each entry in the list shows the following details:
- The repository name for the image. Selecting the link for the repository opens [the list of tags for the repository](#repository-tag-list).
- The most recent tag of the image and the vulnerabilities for that version. Selecting the link for the base image opens [the image layer view](#image-layer-view).
- The most recent tag of the image in the selected environment. Selecting the link for the base image opens [the image details view](#image-details-view).
- The operating system and architecture of the image.
- The date of the last push for the image.
- The base image and version used by the repository and the vulnerabilities for that version. Clicking the link for the base image opens [the image layer view](#image-layer-view).
> **Note**
>
> Docker Scout detects the base image of an image by matching layer content hashes.
> However, it's possible for multiple images and tags to be associated with these layers. In these cases, Docker Scout's
> base image detection might not be precise and potentially return a different tag to the one used in the Dockerfile.
- The recommended fixes, which can include options such as changing tags or rebuilding an image.
- The predicted improvement to the vulnerabilities if you apply the recommended fixes.
- An action button to show implementable recommended fixes.
- The vulnerabilities for the most recent image version.
- Policy status, including the change for the most recent version, and a link to more details for non-compliant images.
### Repository tag list
![Screenshot of tags for a repository](./images/dashboard-repo-tags.png)
![Screenshot of tags for a repository](./images/dashboard-repo-tags.webp?border=true)
The repository tag list shows all tags for a repository. You can search for specific tag versions using the search box.
There are two tabs on this page:
- The **Policy** tab displays the policy delta for the latest version of the
image.
- The **Tags** tab contains the repository tag list, and shows all tags for the
repository.
In the **Tags** tab, you can filter the list by environment, or by tag or
digest using the search box.
Each entry in the list shows the following details:
@ -66,28 +76,48 @@ Each entry in the list shows the following details:
> Compare two image tags by selecting the checkboxes next to them and selecting the **Compare images** button at the top of the list.
{ .tip }
- The tag version. Clicking the link for version opens [the image layer view](#image-layer-view).
- The tag version or image digest. Clicking the link for version opens [the image layer view](#image-details-view).
- The [environments](./integrations/environment/_index.md) that the image is assigned to.
- The operating system and architecture of the image.
- The vulnerabilities for the tag version.
- The last push for the tag version.
- The base image and version used by the repository and the vulnerabilities for
that version.
- The size of the image tag.
- The base image and version used by the repository and the vulnerabilities for that version.
#### Comparing two tag images
#### Compare images
The top section of the comparison view shows an overview of the two selected image tags.
You can compare two or more images in the list. Mark the image versions that
you want to compare, and select **Compare images**.
The tabs section of the view shows the following:
The top section of the comparison view shows an overview of the two selected
image tags. The tabs section of the view shows the following:
- Select the **Packages** tab to see packages added, removed, or changed in each image. Each entry in the table shows the differences between the versions and vulnerabilities in each image. Select the disclosure triangle next to a package to see more detail on the vulnerabilities changed.
- Select the **Vulnerabilities** tab to see changes to the vulnerabilities present in each image.
### Image layer view
### Image details view
![Screenshot showing Docker Scout image hierarchy](./images/dashboard-hierachy.png)
Selecting an image tag takes you to the image details view. This view contains
two tabs that let you drill down into the details of the composition and
policy compliance for the image: **Policy status** and **Image layers**.
The image layer view shows a breakdown of the Docker Scout analysis, including
{{< tabs >}}
{{< tab name="Policy status" >}}
![Screenshot of the policy tab in the image details view](./images/dashboard-image-policies.webp?border=true)
The policy tab shows you the policy evaluation results for the image. Use the
**View details** and **View fixes** links to the right to view the full
evaluation results, and learn how to improve compliance score for non-compliant
images.
For more information about policy, see [Policy Evaluation](./policy/_index.md).
{{< /tab >}}
{{< tab name="Image layers" >}}
![Screenshot showing Docker Scout image layers](./images/dashboard-image-layers.webp?border=true)
The layer view shows a breakdown of the Docker Scout analysis, including
an overview of the digest Secure Hash Algorithms (SHA), version, the image hierarchy (base images), image
layers, packages, and vulnerabilities.
@ -95,22 +125,24 @@ layers, packages, and vulnerabilities.
>
> You can find more details on the elements in the image layer view in [the image details view docs](./image-details-view.md).
Select the **View recommended fixes** button to see instructions to apply the recommended fixes for the image.
{{< /tab >}}
{{< /tabs >}}
## Packages
## Policies
The **Packages** tab shows all packages across repositories in an organization.
![A screenshot of the Docker Scout policies view](./images/dashboard-policies-view.webp?border=true)
Each entry in the list shows the following details:
The **Policies** view shows a breakdown of policy compliance for all of the
images in the selected organization and environment. You can use the **Image**
drop-down menu to view a policy breakdown for a specific environment.
- The package name.
- The package type.
- The versions of the package used by images in the organization.
- The number of images that use the package.
For more information about policies, see [Policy Evaluation](./policy/_index.md).
## Base images
The **Base images** tab shows all base images used by repositories in an organization.
![A screenshot of the Docker Scout view showing base images used](./images/dashboard-base-images.webp?border=true)
The **Base images** view shows all base images used by repositories in an organization.
Each entry in the list shows the following details:
@ -121,22 +153,33 @@ Each entry in the list shows the following details:
### Images using base image
![A screenshot of the Docker Scout view showing images that use a selected base image](./images/dashboard-images-used-by.png)
The **Images** tab shows all images in an organization that use a specific base image.
Each entry in the list shows the following details:
- The repository name. Selecting the link opens [the list of tags for the repository](#repository-tag-list).
- The most recent tag of the image and its vulnerabilities. Selecting the link for the tag opens [the Image layer detail view](#image-layer-view) for the repository.
- The most recent tag of the image and its vulnerabilities. Selecting the link for the tag opens [the Image layer detail view](#image-details-view) for the repository.
- The operating system and architecture of the image.
- The base image tag used by the repository. Selecting the link opens [the image layer detail view](#image-layer-view) for that version.
- The base image tag used by the repository. Selecting the link opens [the image layer detail view](#image-details-view) for that version.
- The current base image digest for the repository.
- The date of the last push for the repository.
## Packages
The **Packages** view shows all packages across repositories in an organization.
Each entry in the list shows the following details:
- The package name.
- The package type.
- The versions of the package used by images in the organization.
- The number of images that use the package.
## Vulnerabilities
The **Vulnerabilities** tab shows a list of all vulnerabilities from images in the organization. You can sort and filter the list by severity and search for Common Vulnerabilities and Exposures (CVE) ID using the search box.
The **Vulnerabilities** view shows a list of all vulnerabilities from images in
the organization. You can sort and filter the list by severity and search for
Common Vulnerabilities and Exposures (CVE) ID using the search box.
Each entry in the list shows the following details:
@ -156,17 +199,51 @@ Each entry in the list shows the following details:
### Vulnerability details page
The vulnerability details page shows detailed information about a particular CVE. The page shows the following information:
The vulnerability details page shows detailed information about a particular
CVE. This page is a publicly open page. You can share the link to a particular
CVE description with other people even if they're not a member of your Docker
organization.
The page shows the following information:
- The CVE ID and severity.
- A description of the vulnerability.
- The number of packages affected by the vulnerability.
- The vulnerability publish date.
Following this information is a list of all repositories affected by the vulnerability, searchable by image name. Each entry in the list shows the following details:
Following this information is a list of all repositories affected by the
vulnerability, searchable by image name. Each entry in the list shows the
following details:
- The repository name. Selecting the link for the repository name opens [the repository tag list view](#repository-tag-list).
- The current tag version of the image. Selecting the link for the tag name opens [the repository tag list layer view](#image-layer-view).
- The current tag version of the image. Selecting the link for the tag name opens [the repository tag list layer view](#image-details-view).
- The date the image was last pushed.
- The registry where the image is stored.
- The affected package name and version in the image.
## Settings
The settings menu under the drop-down in the website header contains link to go
to the [Integrations](#integrations) page and [Repository
settings](#repository-settings).
### Integrations
The **Integrations** page lets you create and manage your Docker Scout
integrations, such as environment integrations and registry integrations. For
more information on how to get started with integrations, see [Integrating
Docker Scout with other systems](./integrations/_index.md).
### Repository settings
The **Repository settings** is where you enable and disable Docker Scout for
repositories in your organization.
To enable repositories, select the checkboxes for the repositories on which you
want to enable Docker Scout analysis and select **Enable image analysis**.
When you enable image analysis for a repository, Docker Scout analyzes new tags
automatically when you push to that repository.
Disable Docker Scout analysis on selected repositories by selecting **Disable
image analysis**.

Binary file not shown.

After

Width:  |  Height:  |  Size: 123 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 205 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 104 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 65 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 187 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 215 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 82 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 53 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 138 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 35 KiB