Before you can use Security Center to scan images, you must add an image repository to Security Center. This topic describes how to add image repositories to Security Center.
Background information
You can add the following types of image repositories to Security Center: image repositories of Container Registry, Harbor repositories, and Quay repositories. Harbor repositories and Quay repositories are third-party image repositories.
Prerequisites
The feature of container image scan is enabled. For more information, see Enable container image scan.
Add an image repository of Container Registry to Security Center
Container Registry has Enterprise Edition and Personal Edition. You can synchronize the information about the images in the image repositories of both Container Registry Enterprise Edition and Container Registry Personal Edition to Security Center. However, Security Center can scan the images only of Container Registry Enterprise Edition. You can add image repositories of an Container Registry Enterprise Edition instance to Security Center after you configure access to the instance over a virtual private cloud (VPC). For more information, see Configure access over VPCs.
Add a third-party image repository to Security Center
If your third-party image repository is deployed on a hybrid cloud that is composed of VPCs and data centers, you must configure traffic forwarding rules and then add the image repository to Security Center. For more information, see Configure traffic forwarding rules and add image repositories deployed on hybrid clouds.
If you create an access control policy for your image repository, make sure that the access control policy allows access from the IP address pools in the region in which the image repository resides.
Region | Public IP address | Private IP address |
---|---|---|
China (Hangzhou) | 121.41.35.192, 121.41.39.7, 121.41.39.39, 121.41.39.153, and 121.41.38.32 | 100.104.177.0/26 |
China (Shanghai) | 47.103.62.83, 47.103.60.134, 47.103.58.177, 47.103.54.252, and 47.103.49.93 | 100.104.7.192/26 |
China (Qingdao) | 47.104.111.68 | 100.104.87.192/26 |
China (Beijing) | 123.57.55.56, 123.57.55.21, 123.57.55.18, 123.57.55.7, and 123.57.55.6 | 100.104.20.128/26 |
China (Zhangjiakou) | 39.99.229.195 | 100.104.187.64/26 |
China (Hohhot) | 39.104.147.68 | 100.104.36.0/26 |
China (Shenzhen) | 47.106.245.198, 47.107.237.185, 47.107.237.182, 47.107.237.170, and 47.107.237.152 | 100.104.9.192/26 |
China (Hong Kong) | 47.106.245.198, 47.107.237.185, 47.107.237.182, 47.107.237.170, and 47.107.237.152 | 100.104.111.128/26 |
Japan (Tokyo) | 47.74.24.20 | 100.104.69.0/26 |
Singapore | 47.74.238.176, 47.74.238.61, 47.74.237.201, 47.74.237.166, and 47.74.237.91 | 100.104.41.128/26 |
US (Silicon Valley) | 47.254.39.224 | 100.104.145.64/26 |
US (Virginia) | 47.252.4.238 | 100.104.36.0/26 |
Germany (Frankfurt) | 47.254.158.71 | 172.16.0.0/20 |
UK (London) | 8.208.14.12 | 172.16.0.0/20 |
Indonesia (Jakarta) | 149.129.238.99 | 100.104.193.128/26 |
Configure traffic forwarding rules and add image repositories deployed on hybrid clouds
If your third-party image repository is deployed on a hybrid cloud that is composed of VPCs and data centers, you must configure traffic forwarding rules and then add the image repository to Security Center. To configure traffic forwarding rules and add the image repository to Security Center, perform the following steps:
Error codes
Error code | Error message | Solution |
---|---|---|
FailedToVerifyUsernameOrPwd | The error message returned because the username or password is invalid. | Check whether the username and password are correct. |
RegistryVersionError | The error message returned because the version of the image repository is invalid. | Check whether the version of the image repository is valid. |
UserDoesNotHaveAdminRole | The error message returned because you do not have administrative rights. | Log on to the server on which harbor repositories are deployed and obtain administrative rights. |
NetworkConnectError | The error message returned because the network connection timed out. | Check whether the network can be connected and whether port 80 or port 443 is enabled. |
What to do next
After your image repository is added to Security Center, the images in the image repository are protected by Security Center. You can view the information about the images on the the Image tab of the Container page. For more information, see View security information about containers.
You must use Security Center to scan the images in the image repository for risks. For more information, see Scan images.