Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Setiap instance Harbor yang dibuat di Harbor-as-a-Service terhubung ke pemindai kerentanan Trivy untuk membantu Anda mengidentifikasi dan mengatasi risiko keamanan dalam image container Anda. Trivy adalah pemindai default di Harbor versi 2.2 dan yang lebih baru.
Trivy menganalisis konten image container Anda, membandingkannya dengan
database kerentanan yang diketahui, seperti National Vulnerability Database, untuk
mengidentifikasi potensi masalah.Untuk mengetahui informasi selengkapnya, lihat
https://github.com/aquasecurity/trivy.
Sebelum memulai
Anda harus memiliki hal berikut untuk memindai kerentanan:
Project Harbor yang ada. Untuk mengetahui informasi selengkapnya, lihat
Membuat project Harbor.
Anda dapat memindai artefak satu per satu di Harbor, atau mengonfigurasi setelan kerentanan di project Harbor.
Memindai artefak satu per satu di Harbor
Ikuti langkah-langkah berikut untuk memindai artefak individual di Harbor:
Login ke antarmuka Harbor dengan akun yang memiliki peran
ProjectAdmin.
Buka Projects, lalu pilih project.
Klik tab Scanner. Tab Scanner menampilkan pemindai saat ini yang digunakan untuk project ini.
Klik Edit untuk memilih pemindai lain dari daftar pemindai yang terhubung ke instance Harbor ini, lalu klik OK.
Klik tab Repositori, lalu pilih repositori.
Untuk setiap artefak di repositori, kolom Kerentanan menampilkan status pemindaian kerentanan dan informasi terkait.
Pilih artefak, atau gunakan kotak centang di bagian atas untuk memilih semua artefak di repositori, lalu klik Pindai untuk menjalankan pemindaian kerentanan pada artefak ini.
Arahkan kursor ke jumlah kerentanan yang dapat diperbaiki untuk melihat ringkasan laporan kerentanan.
Klik ringkasan artefak untuk melihat laporan kerentanan mendetail.
Mengonfigurasi setelan kerentanan di project Harbor
Integrasikan pemindaian kerentanan ke dalam alur kerja Harbor Anda untuk mengelola keamanan aplikasi dalam container secara proaktif dan melindungi organisasi Anda dari potensi ancaman. Konfigurasi project agar image dengan kerentanan tidak dapat dijalankan, dan agar image dipindai secara otomatis segera setelah dikirim ke project.
Ikuti langkah-langkah berikut untuk mengonfigurasi setelan kerentanan untuk project Harbor:
Login ke antarmuka Harbor dengan akun yang memiliki peran
ProjectAdmin.
Buka Projects, lalu pilih project.
Klik tab Configuration.
Untuk mencegah image yang rentan di project ditarik, centang kotak Cegah image yang rentan agar tidak berjalan.
Pilih tingkat keparahan kerentanan untuk mencegah gambar berjalan.
Untuk mengaktifkan pemindaian kerentanan langsung pada image baru yang di-push ke project, centang kotak Pindai image secara otomatis saat di-push.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eHarbor instances use the Trivy vulnerability scanner to identify security risks in container images by comparing them against known vulnerability databases.\u003c/p\u003e\n"],["\u003cp\u003eTo perform vulnerability scans, you must have Trivy enabled during Harbor installation and possess an account with the \u003ccode\u003eProjectAdmin\u003c/code\u003e role within an existing Harbor project.\u003c/p\u003e\n"],["\u003cp\u003eYou can scan individual artifacts by selecting a project, going to the repositories tab, and clicking scan, or view the scan status and detail in the Vulnerabilities column.\u003c/p\u003e\n"],["\u003cp\u003eYou can scan all artifacts in your Harbor instance by accessing the Interrogation Services within the Administration menu, and clicking "Scan now" in the vulnerability tab.\u003c/p\u003e\n"],["\u003cp\u003eHarbor projects can be configured to prevent vulnerable images from running based on severity level and automatically scan newly pushed images.\u003c/p\u003e\n"]]],[],null,["# Scan for vulnerabilities\n\nEvery Harbor instance created in Harbor-as-a-Service connects to a Trivy\nvulnerability scanner to help you identify and address security risks in your\ncontainer images. Trivy is the default scanner in Harbor versions 2.2 and later.\nTrivy analyzes the contents of your container images, comparing them against\nknown vulnerability databases, like the National Vulnerability Database, to\nidentify potential issues.For more information, see\n\u003chttps://github.com/aquasecurity/trivy\u003e.\n\nBefore you begin\n----------------\n\nYou must have the following to scan for vulnerabilities:\n\n- Trivy. You must have enabled Trivy when you installed your Harbor instance by appending installation options `--with-trivy`. For information about installing Harbor with Trivy, see \u003chttps://goharbor.io/docs/2.8.0/install-config/run-installer-script/\u003e.\n- An account with the `ProjectAdmin` role from Harbor's role-based access controls. For more information, see [Configure access for APIs and within a Harbor instance](/distributed-cloud/hosted/docs/latest/gdch/platform-application/pa-ao-operations/configure-access-control#configure-access-within-harbor-instance).\n- An existing Harbor project. For more information, see [Create Harbor projects](/distributed-cloud/hosted/docs/latest/gdch/platform-application/pa-ao-operations/create-harbor-projects).\n\nYou can scan individual artifacts in Harbor, or configure vulnerability\nsettings in Harbor projects.\n\nScan individual artifacts in Harbor\n-----------------------------------\n\nFollow these steps to scan individual artifacts in Harbor:\n\n1. Sign in to the Harbor interface with an account that has the `ProjectAdmin` role.\n2. Go to **Projects** and select a project.\n3. Click the **Scanner** tab. The **Scanner** tab shows the current scanner in use for this project.\n4. Click **Edit** to select a different scanner from the list of scanners that are connected to this Harbor instance, and click **OK**.\n5. Click the **Repositories** tab and select a repository.\n6. For each artifact in the repository, the **Vulnerabilities** column displays the vulnerability scanning status and related information.\n7. Select an artifact, or use the checkbox at the top to select all\n artifacts in the repository, and click **Scan** to run the\n vulnerability scan on this artifact.\n\n | **Note:** You can start a scan at any time, unless the status is Queued or Scanning.\n8. Hold the pointer over the number of fixable vulnerabilities to see a summary of\n the vulnerability report.\n\n9. Click the artifact digest to see a detailed vulnerability report.\n\nFor more information, see the Harbor documentation:\n\u003chttps://goharbor.io/docs/2.8.0/administration/vulnerability-scanning/scan-individual-artifact/\u003e.\n\nScan all artifacts in Harbor\n----------------------------\n\nFollow these steps to scan all of the artifacts in your Harbor instance:\n\n1. Sign in to the Harbor interface with an account that has the `ProjectAdmin` role.\n2. In the **Administration** menu, click **Interrogation Services**.\n3. To perform a scan of all artifacts in your Harbor instance, select the **Vulnerability** tab and click **Scan now**.\n\n | **Note:** **Scan now** becomes unavailable while the scan is in progress.\n\nFor more information, see the Harbor documentation:\n\u003chttps://goharbor.io/docs/2.8.0/administration/vulnerability-scanning/scan-all-artifacts/\u003e.\n\nConfigure vulnerability settings in Harbor projects\n---------------------------------------------------\n\nIntegrate vulnerability scanning into your Harbor workflow to proactively manage\nthe security of your containerized applications and protect your organization\nfrom potential threats. Configure projects so that images with vulnerabilities\ncannot be run, and to automatically scan images as soon as they are pushed into\nthe project.\n\nFollow these steps to configure vulnerability settings for a Harbor project:\n\n1. Sign in to the Harbor interface with an account that has the `ProjectAdmin` role.\n2. Go to **Projects** and select a project.\n3. Click the **Configuration** tab.\n4. To prevent vulnerable images under the project from being pulled, enable the **Prevent vulnerable images from running** checkbox.\n5. Select the severity level of vulnerabilities to prevent images from running.\n\n | **Note:** Images cannot be pulled if their level is equal to or higher than the selected level of severity. Harbor does not prevent images with a vulnerability severity of negligible from running.\n6. To activate an immediate vulnerability scan on new images that are\n pushed to the project, select the **Automatically scan images on push**\n checkbox.\n\nFor more information, see the Harbor documentation:\n\u003chttps://goharbor.io/docs/2.8.0/working-with-projects/project-configuration/\u003e."]]