diff --git a/docs/.gitbook/assets/configure_integration_Amazon_ecr.png b/docs/.gitbook/assets/configure_integration_Amazon_ecr.png new file mode 100644 index 000000000000..b4f2f9795d33 Binary files /dev/null and b/docs/.gitbook/assets/configure_integration_Amazon_ecr.png differ diff --git a/docs/.gitbook/assets/confirmation_message_connected_docker_hub.png b/docs/.gitbook/assets/confirmation_message_connected_docker_hub.png new file mode 100644 index 000000000000..7aff6dcb5132 Binary files /dev/null and b/docs/.gitbook/assets/confirmation_message_connected_docker_hub.png differ diff --git a/docs/.gitbook/assets/project_page_security_information.png b/docs/.gitbook/assets/project_page_security_information.png new file mode 100644 index 000000000000..e16740be4b29 Binary files /dev/null and b/docs/.gitbook/assets/project_page_security_information.png differ diff --git a/docs/.gitbook/assets/projects_filter_integrations_ecr.png b/docs/.gitbook/assets/projects_filter_integrations_ecr.png new file mode 100644 index 000000000000..6c559bdb5353 Binary files /dev/null and b/docs/.gitbook/assets/projects_filter_integrations_ecr.png differ diff --git a/docs/.gitbook/assets/projects_github_container_registry.png b/docs/.gitbook/assets/projects_github_container_registry.png new file mode 100644 index 000000000000..9fc9da1a495b Binary files /dev/null and b/docs/.gitbook/assets/projects_github_container_registry.png differ diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-add-images-to-snyk.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-add-images-to-snyk.md index 1dd9c324c006..447b20e8b2df 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-add-images-to-snyk.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-add-images-to-snyk.md @@ -23,11 +23,11 @@ Log in to your account and navigate to the relevant Group and Organization you w 5. When the import ends, a notification of success or failure appears at the top of the page. Click **Refresh Page** to view the **Projects** page with the newly imported images.\ Images are grouped by repository and linked individually to a detailed **Projects** page. 6. You can now connect your Git repo to this Project to use your Dockerfile for enriched fix advice.\ - For more information, see [Detect vulnerable base images from your Dockerfile](../../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). + For more information, see [Detect vulnerable base images from your Dockerfile](../../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). You can filter to view only ECR Projects, which are marked with a unique icon. -
ECR Project

ECR Project

+

Filtering by ECR Project

Amazon ECR integration works like other Snyk integration. To continue to monitor, fix, and manage your Projects, see the relevant pages in the Snyk user documentation. diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-configure-your-integration-with-snyk.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-configure-your-integration-with-snyk.md index 60a8417e11dc..b9e4e1b9bb77 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-configure-your-integration-with-snyk.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/amazon-elastic-container-registry-ecr-configure-your-integration-with-snyk.md @@ -20,6 +20,6 @@ An example follows: Snyk tests the connection values, and the page reloads, now displaying Amazon ECR integration details as you entered them. A confirmation message that the details were saved also appears in green at the top of the screen. -
ECR integration was updated

ECR integration was updated

+
Confirmation message

Confirmation message that ECR integration was updated

If the connection to AWS fails, a notification appears under the **Connected to Amazon ECR** section. diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/configure-integration-for-amazon-elastic-container-registry-ecr.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/configure-integration-for-amazon-elastic-container-registry-ecr.md index 63f41a58109e..fab02fe28566 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/configure-integration-for-amazon-elastic-container-registry-ecr.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/configure-integration-for-amazon-elastic-container-registry-ecr.md @@ -10,7 +10,7 @@ This page explains how to enable integration between one Amazon ECR registry and You can establish cross-account access to enable Snyk's Amazon ECR integration as a one-click deployment using an [AWS Quick Start](https://github.com/aws-quickstart/quickstart-snyk-security), This eliminates the need for manual configuration. -
AWS ECR and Snyk integration cross-account IAM role

AWS ECR and Snyk integration cross-account IAM role

+

AWS ECR and Snyk integration cross-account IAM role

You must have your Snyk **Organization ID** and AWS IAM [role ARN](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference\_identifiers.html#identifiers-arns) to complete the integration. The role ARN is provided in the AWS CloudFormation Console's Output tab. diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/enable-snyk-permissions-to-access-amazon-elastic-container-registry-ecr-for-the-first-time.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/enable-snyk-permissions-to-access-amazon-elastic-container-registry-ecr-for-the-first-time.md index 8be95918a38c..321c76bbd5e5 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/enable-snyk-permissions-to-access-amazon-elastic-container-registry-ecr-for-the-first-time.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-amazon-elastic-container-registry-ecr/enable-snyk-permissions-to-access-amazon-elastic-container-registry-ecr-for-the-first-time.md @@ -29,4 +29,4 @@ This process explains how to set up a resource role in AWS and the necessary pol 2. Click **Edit trust relationship**. 3. In the **Policy Document**, select and delete the entire script and then copy and paste the following script as it is displayed from the UI in your Snyk account, in the Harden usability scope field of the Account credentials. -![](../../../../.gitbook/assets/uuid-4b683f44-0a5e-0d13-f369-f7edecf98ce9-en.gif) +
Steps to enable permissions to access Amazon Elastic Container Registry

Enabling Snyk permissions to access Amazon Elastic Container Registry (ECR)

diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-digitalocean.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-digitalocean.md index 326017a7c750..d02902d88d05 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-digitalocean.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-digitalocean.md @@ -21,7 +21,7 @@ This page explains how to set up DigitalOcean integration in Snyk and start mana 2. In the **Account credentials** section, enter your DigitalOcean personal access token as the login credential. You can find detailed instructions for creating the access token on the integration page. 3. To finish, click **Save**. -
DigitalOcean account credentials

DigitalOcean account credentials

+
Account credentials for DigitalOcean

DigitalOcean account credentials

If you are using self-hosted DigitalOcean, contact [Snyk Support](https://support.snyk.io/hc/en-us/requests/new) to provide you with a token. For more information, see [Snyk Container for self-hosted container registries (with Broker)](../../../enterprise-setup/snyk-broker/snyk-broker-container-registry-agent/integrate-with-self-hosted-container-registries-broker.md). @@ -58,12 +58,12 @@ The steps follow to add images from DigitalOcean to Snyk. 6. When the import ends: 1. You can view the newly imported image, marked with a **NEW** tag, on the **Projects** page. Images are grouped by repository and are each linked individually to a detailed **Project** page. 2. An **import log** becomes available; you can reach it at the top of the Projects list. - 3. To enrich the data and get recommendations regarding your base image, under **Settings**, you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). + 3. To enrich the data and get recommendations regarding your base image, under **Settings**, you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). DigitalOcean imports are indicated with a unique icon. You can filter the integration in the **Projects** view to see DigitalOcean Projects only: -
DigitalOcean Projects in Projects listing

DigitalOcean Projects in Projects listing

+
Example of DigitalOcean Projects

DigitalOcean Projects in Projects listing

{% hint style="info" %} -For **application vulnerabilities within container images**, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. For more information, see [Detecting application vulnerabilities in container images](../use-snyk-container/detect-application-vulnerabilities-in-container-images.md). +For application vulnerabilities within container images, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. For more information, see [Detecting application vulnerabilities in container images](../use-snyk-container/detect-application-vulnerabilities-in-container-images.md). {% endhint %} diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-desktop-extension.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-desktop-extension.md index 454da88d3b3f..96528d43db97 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-desktop-extension.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-desktop-extension.md @@ -9,7 +9,7 @@ To install and run the Snyk Docker Desktop Extension: 1. On the Docker Desktop home screen, click the three dots next to **Extensions**, and select **Marketplace**.\ -
Marketplace on Docker Desktop

Marketplace on Docker Desktop

+

Marketplace on Docker Desktop

2. In the **Marketplace** window, navigate to the Snyk Extension and click **Install**.\ @@ -19,11 +19,11 @@ To install and run the Snyk Docker Desktop Extension: 3. After installation, launch the Snyk Extension and click **Settings**. -

Snyk Extension page on Docker Desktop

+
Settings button on Docker Desktop

Snyk Extension page on Docker Desktop

4. In the **Settings** window, add your API token or service account token and click **Save**.\ -
Add authorization token in the Settings window

Add authorization token in the Settings window

+
Save button on the Docker Desktop settings page

Add authorization token in the Settings window

You can now select the local image you want to scan with Snyk by clicking **Test image**. diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/configure-the-integration-with-docker-hub.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/configure-the-integration-with-docker-hub.md index 8aab28d1e398..5a2677277672 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/configure-the-integration-with-docker-hub.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/configure-the-integration-with-docker-hub.md @@ -8,14 +8,14 @@ This page explains how to enable and configure the integration between Docker Hu 2. Click **Docker Hub**. 3. Enter your Docker Hub username and Access Token. For details, see [Generate Docker Hub Access Token](configure-the-integration-with-docker-hub.md#generate-docker-hub-access-token). 4. Click **Save**.\ - The page reloads with new options. The Access Token field is blank.\ + The page reloads with new options. The **Access Token** field is blank.\ A confirmation message that the details were saved also appears in green at the top of the screen. -
Successful connection with Docker Hub

Successful connection with Docker Hub

+

Confirmation message for successful connection to Docker Hub

If the connection to Docker Hub fails, an error notification appears: -
Failed connection, Could not connect to Docker Hub

Failed connection, Could not connect to Docker Hub

+

Error notification that the connection to Docker Hub has failed

## Troubleshooting with the Docker Hub integration diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/docker-hub-add-projects-and-images-to-the-snyk-ui.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/docker-hub-add-projects-and-images-to-the-snyk-ui.md index a53dfde77db6..63400b3c5d17 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/docker-hub-add-projects-and-images-to-the-snyk-ui.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-docker-hub/docker-hub-add-projects-and-images-to-the-snyk-ui.md @@ -11,23 +11,21 @@ Snyk tests and monitors Docker Hub repositories and images by evaluating root fo 1. Log in to your Snyk account and navigate to the relevant Group and Organization you want to manage. 2. Navigate to the **Projects** page and click **Add Projects**.\ - The list of integrations that are already configured on your account opens.\ - The view **Which images do you want to test?** opens, displaying all of the available images for the registry to which you connected, grouped by each of your repositories. -3. Select one or multiple images using any or all of the following methods: + The list of integrations that are already configured on your account opens. +3. The view **Which images do you want to test?** opens, displaying all of the available images for the registry to which you connected, grouped by each of your repositories. +4. Select one or multiple images using any or all of the following methods: * Type the name of a single image for import in the **Image Name** field. * Select any of the repositories if you want to import all of the associated images. * Expand and collapse repositories to select multiple images. -4. Click **Add selected repositories**. +5. Click **Add selected repositories**. On the **Projects** page, a status bar appears at the top of the page as the images are imported; you can continue working in the meantime. -5. When the import ends, a notification of success or failure appears at the top of the **Projects** page.\ +6. When the import ends, a notification of success or failure appears at the top of the **Projects** page.\ Click **Refresh** to view the **Projects** page with the newly imported images.\ Images are grouped by repository and are each linked individually to a detailed **Projects** page. -6. You can now connect your Git repository to this Project in order to use your Dockerfile for enriched fix advice. For more information, see [Detect vulnerable base images from your Dockerfile](../../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). +7. You can now connect your Git repository to this Project in order to use your Dockerfile for enriched fix advice. For more information, see [Detect vulnerable base images from your Dockerfile](../../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). -You can now also filter to view only Docker Hub Projects: - -
Docker Hub projects

Docker Hub projects

+You can also filter to view only Docker Hub Projects. When repositories and images are imported, a confirmation appears in green at the top of the screen. Docker Hub files are indicated with a unique icon . diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-github-container-registry.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-github-container-registry.md index 0bcfc893b86a..fb6ca6709aa6 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-github-container-registry.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-github-container-registry.md @@ -21,8 +21,6 @@ This page explains how to set up GitHub Container registry integration in Snyk a 2. Enter your GitHub Container registry username and password login credentials in the Account credentials section. 3. In the **container registry name** fill in the full URL to the registry you want to integrate with. To finish, click **Save**. -
GitHub Container registry Account credentials

GitHub Container registry Account credentials

- If you are using a self-hosted GitHub Container registry, [contact Snyk Support](https://support.snyk.io/hc/en-us/requests/new) to provide you with a token. For more information, see [Snyk Container for self-hosted container registries (with Broker)](../../../enterprise-setup/snyk-broker/snyk-broker-container-registry-agent/integrate-with-self-hosted-container-registries-broker.md). Snyk tests the connection values, and the page reloads, now displaying GitHub Container registry integration information. The **Add your GitHub container registry images to Snyk** button becomes available. @@ -59,11 +57,11 @@ Follow these steps to add images from the GitHub container registry to Snyk. 7. When the import ends: * You can view the newly imported image, marked with a **NEW** tag, on the **Projects** page. Images are grouped by repository and are each linked individually to a detailed **Project** page. * An **import log** becomes available; you can reach it at the top of the Projects list. - * To enrich the data and get recommendations regarding your base image, you can connect your Dockerfile to the image Project under **Settings**. For more information, see [Adding your Dockerfile and testing your base image](../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). + * To enrich the data and get recommendations regarding your base image, you can connect your Dockerfile to the image Project under **Settings**. For more information, see [Adding your Dockerfile and testing your base image](../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). -GitHub container registry imports are designated with a unique icon. You can filter the integration in the **Projects** view to see GitHub container registry Projects only: +GitHub container registry imports are designated with a unique icon. You can filter the integration in the **Projects** view to see GitHub container registry Projects only. -
GitHub Project in Projects listing

GitHub Project in Projects listing

+

Example of a GitHub Project

{% hint style="info" %} For **application vulnerabilities within container images**, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. For more information, see [Detecting application vulnerabilities in container images](../use-snyk-container/detect-application-vulnerabilities-in-container-images.md). diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-gitlab-container-registry.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-gitlab-container-registry.md index 3744b534485b..446d9a1cc05b 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-gitlab-container-registry.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-gitlab-container-registry.md @@ -22,8 +22,6 @@ This page explains how to set up GitLab Container Registry integration in Snyk a 3. In the **Container registry name** fill in the full URL to the registry you want to integrate with. 4. To finish, click **Save**. -
GitLab Container Registry Account credentials

GitLab Container Registry Account credentials

- If you are using a self-hosted GitLab Container Registry, [contact Snyk Support](https://support.snyk.io/hc/en-us/requests/new) to provide you with a token. For more information, see [Snyk Container for self-hosted container registries (with Broker)](../../../enterprise-setup/snyk-broker/snyk-broker-container-registry-agent/integrate-with-self-hosted-container-registries-broker.md). Snyk tests the connection values, and the page reloads, now displaying GitLab Container Registry integration information. The **Add your GitLab container registry images to Snyk** button becomes available. @@ -58,11 +56,11 @@ The steps follow for adding images from GitLab Container Registry to Snyk. 7. When the import ends: * You can view the newly imported image, marked with a **NEW** tag, on the **Projects** page. Images are grouped by repository and are each linked individually to a detailed **Project** page. * An **import log** becomes available; you can reach it at the top of the Projects list. - * To enrich the data and get recommendations regarding your base image, under **Settings**, you can connect your Dockerfile to the image Project. For more information, see[ Adding your Dockerfile and testing your base image.](../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md) + * To enrich the data and get recommendations regarding your base image, under **Settings**, you can connect your Dockerfile to the image Project. For more information, see[ Adding your Dockerfile and testing your base image.](../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md) GitLab Container Registry imports are designated with a unique icon. You can filter the integration in the **Projects** view to see GitLab Container Registry Projects only. -
GitLab Container Registry Project in Projects listing

GitLab Container Registry Project in Projects listing

+

GitLab Container Registry Project in Projects listing

{% hint style="info" %} For **application vulnerabilities within container images**, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. For more information, see [Detecting application vulnerabilities in container images](../use-snyk-container/detect-application-vulnerabilities-in-container-images.md). diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/add-images-to-snyk-from-acr.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/add-images-to-snyk-from-acr.md index ca5d6fc5595a..e9c31683b419 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/add-images-to-snyk-from-acr.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/add-images-to-snyk-from-acr.md @@ -11,15 +11,13 @@ Snyk tests and monitors Google Container Registry (GCR) container images by eval Log in to your account and navigate to the relevant Group and Organization you want to manage. -Go to **Projects** and click **Add projects**. The list of integrations already configured in your account opens, similar to the following: - -
Integrations configured in a Snyk account

Integrations configured in a Snyk account

+Go to **Projects** and click **Add projects**. The list of integrations already configured in your account opens. Decide which images you want to test. The view displays all of the available images for the registry to which you connected, grouped by each of your repositories, similar to the following: -
All available images for the registry to which you connected

All available images for the registry to which you connected

+

Available images for the registry to which you connected

-Continue by following these steps: +Continue with the following steps: 1. Select single or multiple images by using any or all of the following methods: * Type the name of a single image for import in the **Image Name** field at number one (1), the Image Name field in the preceding image. @@ -29,17 +27,11 @@ Continue by following these steps: A status bar appears at the top of the page as the images are imported; you can continue working while the images are being imported. 3. When the import ends, a notification of success or failure appears at the top of the page. Click **Refresh** to view the **Projects** page with the newly imported images. Images are grouped by repository and are each linked individually to a detailed Projects page. -4. You can now connect your Git repo to this Project in order to use your Dockerfile for enriched fix advice. For more information, see [Adding your Dockerfile and testing your base image](../../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). - -GCR files are indicated with a unique icon. You can now filter to view only those Projects: - -
- -
GCR added to integrations filters

GCR added to integrations filters

+4. You can now connect your Git repo to this Project in order to use your Dockerfile for enriched fix advice. For more information, see [Adding your Dockerfile and testing your base image](../../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). -
+GCR files are indicated with a unique icon. You can now filter to view only those Projects. -
Projects listing with two filters applied

Projects listing with two filters applied

+

Examples of GCR Projects

GCR integration works similarly to other Snyk integrations. To continue to monitor, fix, and manage your Projects, see the relevant pages in the Snyk docs. diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/enable-permissions-to-access-gcr.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/enable-permissions-to-access-gcr.md index 0a29b34675e8..2ce715390d18 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/enable-permissions-to-access-gcr.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-google-container-registry-gcr/enable-permissions-to-access-gcr.md @@ -14,9 +14,9 @@ From the relevant project in Google, ensure you have created a service account f * **Role** - Storage Object Viewer (roles/storage.objectViewer) * **Service account ID** - leave empty * **Key type** - JSON -3. Click **Create** to generate the key for your project. -4. Copy _the entire contents_ of the JSON file, which is similar to the following: +3. Click **Create** to generate the key for your Project. +4. Copy the entire contents of the JSON file, which is similar to the following: -
GCR_key_file_contents

GCR_key_file_contents

+

GCR_key_file_contents

Save the data you copied to paste it when [configuring integration for GCR](configure-integration-for-gcr.md). diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-harbor-container-registry.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-harbor-container-registry.md index ca3ee2050417..d1ad6ab7712a 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-harbor-container-registry.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-harbor-container-registry.md @@ -2,7 +2,7 @@ {% hint style="info" %} **Feature availability**\ -This feature is available with Enterprise plans. See [pricing plans](https://snyk.io/plans/) for more details. +This feature is available only with Enterprise plans. For more information, see [pricing plans](https://snyk.io/plans/). {% endhint %} Snyk integrates with Harbor Container Registry to enable you to import your container images and monitor them for vulnerabilities. @@ -27,18 +27,15 @@ Follow these instructions to set up Harbor integration in Snyk and start managin If you are using a self-hosted Harbor registry, contact Snyk to provide you with a token. For more information, see [Snyk Container for self-hosted container registries (with Broker)](../../../enterprise-setup/snyk-broker/snyk-broker-container-registry-agent/integrate-with-self-hosted-container-registries-broker.md). -
Harbor Account credentials and Container registry name

Harbor Account credentials and Container registry name

- {% hint style="info" %} -**Note:** To set up the integration, the Harbor user should be an admin user. The integration currently uses /v2/\_catalog endpoint for listing repositories. +To set up the integration, the Harbor user should be an admin user. The integration uses /v2/\_catalog endpoint for listing repositories. {% endhint %}
Harbor Account credentials with Broker token

Harbor Account credentials with Broker token

-Snyk tests the connection values, and the page reloads, now displaying Harbor integration information. The **Add your Harbor images to Snyk** button becomes available. If the connection to Harbor fails, a notification appears under the **Connected to Harbor** section.\ - +Snyk tests the connection values, and the page reloads, now displaying Harbor integration information. The **Add your Harbor images to Snyk** button becomes available. If the connection to Harbor fails, a notification appears under the **Connected to Harbor** section. -When the connection is successful, you can use Snyk to scan your images from Harbor. +Once the connection is successful, you can use Snyk to scan your images from Harbor. ## Scan container images from Harbor in Snyk @@ -64,13 +61,13 @@ Follow these instructions to add images from Harbor to Snyk. 7. When the import ends: 1. You can view the newly imported image, marked with a **NEW** tag, on the **Projects** page. Images are grouped by repository and are each linked individually to a detailed Projects page. 2. An **import log** becomes available; you can reach it from the top of the Projects list. - 3. To enrich the data and get recommendations regarding your base image, under **Settings,** you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). + 3. To enrich the data and get recommendations regarding your base image, under **Settings,** you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). Harbor imports are indicated with a unique icon. You can also filter to view only the Harbor Projects:
Harbor Projects in Projects listing

Harbor Projects in Projects listing

{% hint style="info" %} -For **application vulnerabilities within container images**, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. For more information, see [Detecting application vulnerabilities in container images](../use-snyk-container/detect-application-vulnerabilities-in-container-images.md). +For application vulnerabilities within container images, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. For more information, see [Detecting application vulnerabilities in container images](../use-snyk-container/detect-application-vulnerabilities-in-container-images.md). {% endhint %} diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/README.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/README.md index 6152b01a2c67..97965b85cac7 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/README.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/README.md @@ -1,8 +1,8 @@ -# Container security with JFrog Artifactory integration +# Integrate with JFrog Artifactory {% hint style="info" %} **Feature availability**\ -This feature is available with Enterprise plans. See [pricing plans](https://snyk.io/plans/) for more details. +This feature is available only with Enterprise plans. For more information, see [pricing plans](https://snyk.io/plans/). {% endhint %} Snyk integrates with JFrog Artifactory Container Registry to enable you to import your Projects and monitor your containers for vulnerabilities. Snyk tests the Projects you have imported for any known security vulnerabilities found at a frequency you control. diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/add-artifactory-images-to-snyk.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/add-artifactory-images-to-snyk.md index b4f9dc1f5fc6..c639b5a0f404 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/add-artifactory-images-to-snyk.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/add-artifactory-images-to-snyk.md @@ -10,14 +10,8 @@ Snyk tests and monitors your Artifactory container images by evaluating the tags ## **Steps to adding Artifactory images to Snyk** * Log in to your account and navigate to the relevant Group and Organization you want to manage. -* Go to **Projects** and click **Add projects**. The list of integrations already configured on your account opens, similar to the following: - -
Integrations configured on an account

Integrations configured on an account

- -* The view **Which images do you want to test?** opens, displaying all of the available images for the registry to which you connected, grouped by each of your repositories, similar to the following: - -
All available images for the registry to which you connected

All available images for the registry to which you connected

- +* Go to **Projects** and click **Add projects**. The list of integrations already configured on your account opens. +* The view **Which images do you want to test?** opens, displaying all of the available images for the registry to which you connected, grouped by each of your repositories. * Select single or multiple images using any or all of the following methods: * Type the name of a single image for import in the Image Name field (at number 1, the image name field, in the image above), * Select any of the repositories if you want to import all of the associated images (at number 2, the second item listed in the image above). @@ -26,14 +20,14 @@ Snyk tests and monitors your Artifactory container images by evaluating the tags A status bar appears at the top of the page as the images are imported; you can continue working in the meantime. * When the import ends, a notification of success or failure appears at the top of the page. Click Refresh to view the Projects page with the newly imported images. Images are grouped by repository and are each linked individually to a detailed Projects page. -* You can now connect your Git repo to this Project in order to use your Dockerfile for enriched fix advice. For more information, see [Adding your Dockerfile and testing your base image](../../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). +* You can now connect your Git repo to this Project in order to use your Dockerfile for enriched fix advice. For more information, see [Adding your Dockerfile and testing your base image](../../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). -Images are indicated with a unique icon ![Artifactory](<../../../../.gitbook/assets/image (5) (2).png>). You can filter to view only the Artifactory Projects: +Images are indicated with a unique icon. You can filter to view only the Artifactory Projects.
List of Artifactory Projects

List of Artifactory Projects

Artifactory integration works like other Snyk integrations. To continue to monitor, fix and manage your Projects, see the relevant pages in the Snyk user documentation. {% hint style="info" %} -For **application** vulnerabilities within container images, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. See [Detecting application vulnerabilities in container images ](../../use-snyk-container/detect-application-vulnerabilities-in-container-images.md)for more information. +For application vulnerabilities within container images, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. See [Detecting application vulnerabilities in container images ](../../use-snyk-container/detect-application-vulnerabilities-in-container-images.md)for more information. {% endhint %} diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/configuring-your-jfrog-artifactory-container-registry-integration.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/configuring-your-jfrog-artifactory-container-registry-integration.md index 0cba3b78b4aa..8f4c07e0bbef 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/configuring-your-jfrog-artifactory-container-registry-integration.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-jfrog-artifactory/configuring-your-jfrog-artifactory-container-registry-integration.md @@ -18,7 +18,7 @@ The instructions on this page explain how to enable integration between one Arti * **Username and Password -** use your Artifactory login credentials. If you're using SSO configuration, you must generate an access token in Artifactory and use the token details to login. * **Container registry name -** the full registry URL: `.jfrog.io/artifactory/api/docker/` -
Artifactory account credentials

Artifactory account credentials

+

Artifactory account credentials

4. Click **Save Changes**. A confirmation appears. @@ -26,6 +26,4 @@ The instructions on this page explain how to enable integration between one Arti To set up the integration, the Artifactory credentials need, at minimum, read permissions to the relevant Artifactory repository. {% endhint %} -Snyk tests the connection values and the page reloads, now displaying integration details as you entered them. At the top of the screen, a confirmation message in green indicates that the details were saved. If the connection fails, a notification appears. - -
+Snyk tests the connection values and the page reloads, now displaying integration details as you entered them. At the top of the screen, a confirmation message indicates that the details were saved. If the connection fails, a notification appears. diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/add-images-to-snyk-from-acr.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/add-images-to-snyk-from-acr.md index 0dde649a3960..1e272a5a1888 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/add-images-to-snyk-from-acr.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/add-images-to-snyk-from-acr.md @@ -10,16 +10,10 @@ Snyk tests and monitors Microsoft Azure Container Registry (ACR) container image ## Steps to add images to Snyk from ACR 1. Log in to your account and navigate to the relevant Group and Organization you want to manage. -2. Go to **Projects**, and click **Add projects**. The list of integrations already configured on your account opens, similar to the following: - - - -
List of integrations configured in an account

List of integrations configured in an account

+2. Go to **Projects**, and click **Add projects**. The list of integrations already configured on your account opens. The view **Which images do you want to test?** opens, displaying all of the available images for the registry to which you connected, grouped by each of your repositories, similar to the following: -![All available images for the registry to which you connected](<../../../../.gitbook/assets/uuid-bd9cf629-f5fb-b28b-1fc1-40df2367a7f9-en (1) (1) (2) (4) (2) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) ( (22).png>) - 1. Select single or multiple images using any or all of the following methods: 1. Type the name of a single image for import in the **Image Name** field (at number 1, the Image Name field in the image above), 2. Select any of the repositories if you want to import all of the associated images (at number 2, the second item listed in the image above). @@ -30,7 +24,7 @@ The view **Which images do you want to test?** opens, displaying all of the avai 3. When the import ends, a notification of success or failure appears at the top of the page. Click **Refresh** to view the **Projects** page with the newly imported images.\ Images are grouped by repository and linked individually to a detailed Projects page. 4. You can now connect your Git repository to this Project in order to use your Dockerfile for enriched fix advice.\ - For more information, see [Adding your Dockerfile and testing your base image](../../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). + For more information, see [Adding your Dockerfile and testing your base image](../../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). ACR files are indicated with a unique icon ![ACR](../../../../.gitbook/assets/uuid-5d10608d-d674-d4ee-d6c2-6faadd6fc8ea-en.png) . You can filter to view only those Projects: diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/configure-integration-for-acr.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/configure-integration-for-acr.md index 2a65b1745d7f..2c537a5e2fa2 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/configure-integration-for-acr.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-microsoft-azure-container-registry-acr/configure-integration-for-acr.md @@ -14,5 +14,3 @@ Follow these steps: Snyk tests the connection values, and the page reloads, now displaying ACR integration information.\ A confirmation message that the details were saved also appears in green at the top of the screen.\ In addition, if the connection to Azure failed, a notification appears under the **Connected to ACR section**. - -
ACR account credentials

ACR account credentials

diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-nexus-container-registry.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-nexus-container-registry.md index 68558d52156b..293858591f01 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-nexus-container-registry.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-nexus-container-registry.md @@ -24,8 +24,6 @@ This page explains how to set up Nexus Container Registry integration in Snyk an * In the **Account credentials** section, enter your Nexus username and password login credentials. In the **container registry name,** fill in the full URL to the registry you want to integrate with. * To finish, click **Save**. -![Nexus Container Registry Account credentials](../../../.gitbook/assets/mceclip1-20-.png) - If you are using a self-hosted Nexus registry, [contact Snyk Support](https://support.snyk.io/hc/en-us/requests/new) to provide you with a token. For more information, see [Snyk Container for self-hosted container registries (with Broker)](../../../enterprise-setup/snyk-broker/snyk-broker-container-registry-agent/integrate-with-self-hosted-container-registries-broker.md). Snyk tests the connection values, and the page reloads, now displaying Nexus integration information. The **Add your Nexus images to Snyk** button becomes available. @@ -59,7 +57,7 @@ Follow these steps to add images from Nexus to Snyk. 6. When the import ends: 1. You can view the newly imported image, marked with a **NEW** tag, on the **Projects** page. Images are grouped by repository and are each linked individually to a detailed **Project** page. 2. An **import log** becomes available; you can reach it at the top of the Projects list. - 3. To enrich the data and get recommendations regarding your base image, under **Settings,** you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). + 3. To enrich the data and get recommendations regarding your base image, under **Settings,** you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). Nexus imports are indicated with a unique icon, and you can also filter to view only Nexus Projects: diff --git a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-quay-container-registry.md b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-quay-container-registry.md index c5277d25c0cf..044947fa4fa8 100644 --- a/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-quay-container-registry.md +++ b/docs/scan-with-snyk/snyk-container/container-registry-integrations/integrate-with-quay-container-registry.md @@ -18,8 +18,6 @@ Integration with Quay is available for all Snyk users. 1. In your Snyk account, navigate to **Integrations.** Under the **Container Registries** section, find the **Quay** option and click it. 2. In the **Account credentials** section, enter your Quay username and password login credentials. In the **container registry name**, enter the full URL to the registry you want to integrate with. This can be a cloud-based Quay or a private host. To finish, click **Save**. -
Configure Quay integration

Configure Quay integration

- If you are using a self-hosted Quay registry, [contact Snyk Support](https://support.snyk.io/hc/en-us/requests/new) to provide you with a token. For more information, see [Snyk Container for self-hosted container registries (with Broker)](../../../enterprise-setup/snyk-broker/snyk-broker-container-registry-agent/integrate-with-self-hosted-container-registries-broker.md). {% hint style="info" %} @@ -32,8 +30,6 @@ When the connection succeeds, you can use Snyk to scan your images from Quay. Snyk tests and monitors your Quay container images by evaluating the tags in your repositories. After import to Snyk, your image vulnerabilities are identified and can be triaged easily. -To add images from Quay to Snyk: - ## Scan container images from Quay in Snyk ### **Prerequisites** for Quay image scanning @@ -56,7 +52,7 @@ To add images from Quay to Snyk: 7. When the import ends: 1. You can view the newly imported image, marked with a **NEW** tag, on the **Projects** page; Images are grouped by repository and linked individually to a detailed **Project** page.\ An **import log** becomes available; you can reach it at the top of the Projects list. - 2. To enrich the data and get recommendations regarding your base image, from the **Settings** you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../../../scan-with-snyk/snyk-container/scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). + 2. To enrich the data and get recommendations regarding your base image, from the **Settings** you can connect your Dockerfile to the image Project. For more information, see [Adding your Dockerfile and testing your base image](../scan-your-dockerfile/detect-vulnerable-base-images-from-your-dockerfile.md). Quay imports are designated with a unique icon, and you can filter the integration in the **Projects** view to see Quay Projects only as shown: diff --git a/docs/scan-with-snyk/snyk-container/how-snyk-container-works/severity-levels-of-detected-linux-vulnerabilities.md b/docs/scan-with-snyk/snyk-container/how-snyk-container-works/severity-levels-of-detected-linux-vulnerabilities.md index 9c15166552fd..581841336848 100644 --- a/docs/scan-with-snyk/snyk-container/how-snyk-container-works/severity-levels-of-detected-linux-vulnerabilities.md +++ b/docs/scan-with-snyk/snyk-container/how-snyk-container-works/severity-levels-of-detected-linux-vulnerabilities.md @@ -18,7 +18,7 @@ Snyk supports relative importance in Ubuntu, Debian, Red Hat Enterprise Linux (R For each issue, information appears on the Project page, under **Security information**. -
Example of a vulnerability the security rating Unimportant

Example of a vulnerability the security rating Unimportant

+

Security information on a Project page

## External information sources for relative importance @@ -35,4 +35,4 @@ To provide information for the distribution, Snyk uses the following external so To create a report showing only NVD Score and Severity (without the Linux-maintainer rating), add the NVD Score and NVD Severity columns in the Issues Detail report. -
Example of a report with NVD Score and Severity

Example of a report with NVD Score and Severity

+

Example of a report with NVD Score and NVD Severity