Update accessing-vulnerability-data-in-ucp.md

Made all of @ddeyo 's changes except for the license question.
This commit is contained in:
Anne Henmi 2018-09-17 08:27:08 -06:00 committed by GitHub
parent 212753f9f3
commit 57f9050a09
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 14 additions and 11 deletions

View File

@ -4,25 +4,28 @@ description: Learn how to access the vulnerability data from DTR in UCP
keywords: ucp, security, vulnerability, scanning, data, dtr, image keywords: ucp, security, vulnerability, scanning, data, dtr, image
--- ---
This feature displays image vulnerability data from DTR in the UCP web UI. If an image has a vulnerability detected by DTR's image scanning feature, we will show the number of known vulnerabilities in the UCP web UI everywhere that image is shown (e.g. the image list page, on the service details page for any Swarm services that use that image, etc.). As of EE 2.1, UCP displays image vulnerability data from DTR. If DTR's image scanning feature detects a vulnerability
in a Docker image, the image's known vulnerabilities count now appears in the UCP web UI.
Limitations Limitations
* This feature will only work with DTRs that have UCP single sign-on enabled. * This feature will only work with DTRs that have UCP single sign-on enabled
* We do not show vulnerabilities on Kubernetes deployments or daemonsets: they only appear for containers, Swarm services, pods, and images. * UCP only displays vulnerabilities for containers, Swarm services, pods, and images
Requirements Requirements
* You must have an advanced license to use this feature. * An EE advanced license
* DTR must be version 2.6.0 or higher. * DTR version 2.6.0 or higher
To access vulnerability data on UCP, run the following steps: To access vulnerability data on UCP, complete the following steps:
1. Deploy UCP 1. (Deploy UCP)[https://docs.docker.com/ee/ucp/admin/install/]
2. Deploy DTR on the same UCP cluster 2. (Deploy DTR on the same UCP cluster)[https://docs.docker.com/ee/dtr/admin/install/]
3. (Enable single-sign on DTR)[/datacenter/dtr/2.4/guides/admin/configure/enable-single-sign-on.md] 3. (Enable single-sign on DTR)[/datacenter/dtr/2.4/guides/admin/configure/enable-single-sign-on.md]
3. Upload an advanced license in UCP 3. (Upload an advanced license in UCP)[https://docs.docker.com/ee/ucp/admin/configure/license-your-installation/]
4. Push some images to DTR and scan them 4. (Push some images to DTR)[https://docs.docker.com/datacenter/dtr/2.1/guides/repos-and-images/push-an-image/]
5. The UCP web UI will display image vulnerabilities 5. (Scan the images)[https://docs.docker.com/datacenter/dtr/2.2/guides/user/manage-images/scan-images-for-vulnerabilities/]
The UCP web UI will display image vulnerabilities
![example of vulnerability information in UCP](/images/example-of-vuln-data-in-ucp.png) ![example of vulnerability information in UCP](/images/example-of-vuln-data-in-ucp.png)