Bemærk
Adgang til denne side kræver godkendelse. Du kan prøve at logge på eller ændre mapper.
Adgang til denne side kræver godkendelse. Du kan prøve at ændre mapper.
Use Cloud Security Explorer to identify vulnerabilities in your Kubernetes clusters. The following examples show how to build queries to investigate container images and cluster nodes, and can be adapted to filter results based on your requirements.
For an introduction to Cloud Security Explorer queries, see Build queries with Cloud Security Explorer.
Create a query to identify software vulnerabilities in container images
Sign in to the Azure portal.
Go to Microsoft Defender for Cloud > Cloud Security Explorer.
In Query builder, select Select resource types.
Select Container Images.
Select +.
Select condition.
In Application, select Has installed software.
Select Search.
Select View details > for the relevant container image.
In the Result details pane, review Insights - Has installed software.
Create a query to identify vulnerabilities in cluster nodes
Sign in to the Azure portal.
Go to Microsoft Defender for Cloud > Cloud Security Explorer.
In Query builder, select Select resource types.
Under Kubernetes clusters, select Azure Kubernetes Service.
Select Done.
Select +.
Select condition.
In Application, select Maintains.
Select Select resource types > Kubernetes Node Pools.
Select Done.
Select +.
Select condition.
Select Maintains.
Select Select resource types > Virtual machines clusters.
Select Done.
Select +.
Select condition.
In Vulnerabilities, select All vulnerabilities.
Select Search.
Select View details > for the relevant Kubernetes node pool.
In the Result details pane, select the Virtual machine scale set icon to view vulnerabilities.