All Products
Search
Document Center

Container Registry:Image events

Last Updated:Aug 26, 2024

The image event feature provides an event line that contains the events of pushing, pulling, and deleting images. The feature helps you analyze security risks, such as abnormal public IP addresses and image content risks. This topic describes how to use the image event feature in Container Registry Enterprise Edition.

Prerequisites

Note

The image event feature is in canary release. To use the feature, submit a ticket.

View the image event line

The image event line helps you track the image operations in real time and identify and handle potential security risks to ensure image security and compliance.

  1. Log on to the Container Registry console.

  2. In the top navigation bar, select a region.

  3. In the left-side navigation pane, click Instances.

  4. On the Instances page, click the Enterprise Edition instance that you want to manage.

  5. In the left-side navigation pane of the instance management pane, choose Instances > Image Events. On the Image Events page, configure the parameters that are described in the following table to search for the image that you want to manage.

    Parameter

    Description

    Example

    Namespaces

    The name of the namespace.

    test-namespace

    Repository

    The name of the repository.

    test-repository

    Tag

    The tag of the image.

    v1

  6. In the Event line section, configure the filter conditions and the time range and click Search to search for events of the image.

    Parameter

    Description

    Event Filters

    The event filter conditions of the image, including Push, Pull, and Delete.

    Time range

    The time range within which you want to search for the events of the image. Maximum value: 30 days.

    In the Event line section, you can view the image event information, such as the event category, network type of the client, public IP address of the client, and event time. The Event Summary field provides a summary of the image event information within the specified time range.

Analyze image usage

Before you analyze image usage, perform the following steps to authorize Container Service for Kubernetes (ACK) clusters to read Container Registry information. After the authorization, you can analyze image usage and view the deployment status of images in ACK clusters.

  1. On the Image Events page, click Complete authorization to obtain and analyze the usage of images in ACK clusters.

  2. In the Cluster Authorization dialog box, find an ACK cluster and click Add authorization in the Actions column. In the message that appears, click OK.

    After you perform authorization on the ACK cluster, you can click Search on the Image Analysis tab to analyze the usage of the image and view the deployment status of the image.