November 2, 2016 | Written by: Nilton Bila
Categorized: Community | Compute Services
Share this post:
As of May 23rd IBM Bluemix Container Service now provides a native Kubernetes operations experience while removing the burden of maintaining master nodes. Kubernetes itself is based on the Docker engine for managing software images and instantiating containers. Get the details.
We announced the release of the Vulnerability Advisor (VA) service for IBM Containers at DockerCon 2015. Since then, VA has continuously scanned thousands of customer images daily and offered actionable assessments of their vulnerabilities. Customers can now enforce security policies that prevent the deployment of containers with discovered software vulnerabilities or insecure configurations.
That initial version of VA only supported container images built for the x86 platform. As deployment of Docker containers on Power systems has been gaining traction, Power users have begun to demand the same vulnerability assessment capabilities previously only available to x86 customers.
We’ve extended VA with new capabilities that offer automated vulnerability assessment for Power-based Docker images. These are now available publicly on the IBM Bluemix platform. Users of Power-based Docker containers can now push their images to their private Bluemix registry to receive reports, which highlight software vulnerability findings and configurations that don’t conform with best practices.
Test the Vulnerability Advisor with Power-based images
You can test drive the vulnerability assessment capabilities of VA by uploading your own Power-based Docker images or images offered in the Docker Hub PowerPC repository:
In this post, I’ll show you how to obtain a Ubuntu-based Power image from the PowerPC Docker Hub repository and push it to your own private Bluemix registry using the instructions described in “Copying images to your private Bluemix registry from the command line.” Then, I’ll demonstrate how to access your vulnerability report through Bluemix’s web catalog.
Note: To follow these instructions, you must have a Bluemix account (no charge!) and have the IBM Containers plugin installed in your environment, as described in this guide. The steps that follow assume that you’re working from an x86-based client.
- Transfer a Power-based Ubuntu image from Docker Hub to your private Bluemix registry:
cf ic cpi ppc64le/ubuntu registry.ng.bluemix.net/<YOUR_NAMESPACE>/ubuntu-ppc64le:latest
- Verify that the image exists in your private Bluemix registry:
cf ic images
- Logon to Bluemix and go to the Catalog tab. Filter the results to show Compute type and choose IBM Containers. Your new Ubuntu Power image should be listed:
Once you select the ubuntu-ppc64le image, the Create a Container screen will show the vulnerability report for the image:
Select View Report to view a detailed report of the vulnerability assessment of the image:
Get started with Docker and Vulnerability Advisor at no cost
If you already deploy your workloads on Power and are eager to try Docker containers, you can install Docker Engine on your Power workstations where you’ll build your container images. Once you’ve built your images, you can transfer them to Bluemix using the steps described above to receive an assessment of vulnerability issues with your images.
Sign up for Bluemix. It’s free!
Log on to Bluemix today and try out the Vulnerability Advisor capabilities on your Power-based container images!