The image event feature provides an event line that contains the events of pushing, pulling, and deleting images. The feature helps you analyze security risks, such as abnormal public IP addresses and image content risks. This topic describes how to use the image event feature in Container Registry Enterprise Edition.
Prerequisites
The image event feature is in canary release. To use the feature, submit a ticket.
A Container Registry Enterprise Edition instance is created. For more information, see Create a Container Registry Enterprise Edition instance.
An image is pushed to the Container Registry Enterprise Edition instance. For more information, see Push an image to a Container Registry Enterprise Edition instance and pull an image from the instance.
View the image event line
The image event line helps you track the image operations in real time and identify and handle potential security risks to ensure image security and compliance.
Log on to the Container Registry console.
In the top navigation bar, select a region.
In the left-side navigation pane, click Instances.
On the Instances page, click the Enterprise Edition instance that you want to manage.
In the left-side navigation pane of the instance management pane, choose . On the Image Events page, configure the parameters that are described in the following table to search for the image that you want to manage.
Parameter
Description
Example
Namespaces
The name of the namespace.
test-namespace
Repository
The name of the repository.
test-repository
Tag
The tag of the image.
v1
In the Event line section, configure the filter conditions and the time range and click Search to search for events of the image.
Parameter
Description
Event Filters
The event filter conditions of the image, including
Push
,Pull
, andDelete
.Time range
The time range within which you want to search for the events of the image. Maximum value: 30 days.
In the Event line section, you can view the image event information, such as the event category, network type of the client, public IP address of the client, and event time. The Event Summary field provides a summary of the image event information within the specified time range.
Analyze image usage
Before you analyze image usage, perform the following steps to authorize Container Service for Kubernetes (ACK) clusters to read Container Registry information. After the authorization, you can analyze image usage and view the deployment status of images in ACK clusters.
On the Image Events page, click Complete authorization to obtain and analyze the usage of images in ACK clusters.
In the Cluster Authorization dialog box, find an ACK cluster and click Add authorization in the Actions column. In the message that appears, click OK.
After you perform authorization on the ACK cluster, you can click Search on the Image Analysis tab to analyze the usage of the image and view the deployment status of the image.