Greetings my fellow Technology Advocates and Specialists.
In this Session, I will demonstrate how to Scan Docker Images in AZURE CONTAINER REGISTRY with AQUASEC TRIVY using AZURE DEVOPS PIPELINES
I had the Privilege to talk on this topic in THREE Azure Communities:-
NAME OF THE AZURE COMMUNITY
TYPE OF SPEAKER SESSION
Microsoft Azure Zurich User Group
In Person
Microsoft Azure Pakistan Community
Virtual
Cloud Lunch and Learn
Virtual
IN-PERSON SESSION:-
I presented ACR (Architecture and Best Practices) + Scan Images in ACR Using TRIVY and DEVOPS in MICROSOFT AZURE ZURICH USER GROUP Forum/Platform
Event Meetup Announcement:-
Moment Captured with Founder of MICROSOFT AZURE ZURICH USER GROUP "MANUEL MEYER", Co-organizer "THOMAS HAFERMALZ" and Co-Speaker "MOHAMMAD NOFAL":-
VIRTUAL SESSION:-
I presented ACR (Architecture and Best Practices) + Scan Images in ACR Using TRIVY and DEVOPS in MICROSOFT AZURE PAKISTAN COMMUNITY Forum/Platform
Event Meetup Announcement:-
LIVE RECORDED SESSION:-
LIVE DEMO was Recorded as part of my Presentation.
Duration of My Demo = 52 Mins 45 Secs
VIRTUAL SESSION:-
LIVE DEMO was Recorded as part of my Presentation in CLOUD LUNCH AND LEARN Forum/Platform
Duration of My Demo = 44 Mins 16 Secs
REQUIREMENTS:-
Azure Container Registry
Azure Storage Account
Azure Resource Manager Service Connection
Docker Registry (Azure Container Registry) Service Connection
Dockerfile
Sample HTML File
Azure DevOps Pipeline (YAML)
Trivy Ignore file (.trivyignore)
WHAT DOES THE PIPELINE DO:-
#
PIPELINE TASKS
1.
BUILD AND PUSH THE IMAGE IN ACR
2.
DOWNLOAD AND INSTALL AQUASEC TRIVY
3.
EXECUTE TRIVY SCAN AND COPY THE SCAN RESULTS IN ARTIFACTS STAGING DIRECTORY
4.
PUBLISH THE ARTIFACTS
5.
DOWNLOAD THE PUBLISHED ARTIFACTS
6.
COPY THE AQUASEC TRIVY SCAN REPORTS TO BLOB STORAGE CONTAINER WITH DATE TIME STAMP DIRECTORY
WHY IS TRIVY IGNORE FILE (.trivyignore) REQUIRED ?
After Scanning of the Image, we identify LOW, MEDIUM, HIGH and CRITICAL Vulnerabilities. The CVE (Common Vulnerabilities and Exposures) gets listed in the Report. If for some reasons, Application team accepts the risk and wants to skip the LOW and MEDIUM Vulnerabilities from the Scan report, all we have to do is list the respective CVEs in the .trivyignore file and run the pipeline again to scan. The listed CVEs will no longer be in the Scan Report.
Top comments (0)