Now that our automated scanner is in place, we can test it by pushing a Docker container, and check if it scans.
To illustrate the images scanning we will build an example Node.JS application based on the official “hello world” example described in their website.
Go to your Cloud9 Workspace and download and uncompress example container files
wget https://github.com/johnfitzpatrick/hello-world-node-vulnerable/archive/v1.2.zip unzip v1.2.zip cd hello-world-node-vulnerable-1.2
And build and push the image to ECR
export IMAGE=$AWS_ACCOUNT.dkr.ecr.$REGION.amazonaws.com/$ECR_NAME docker build . -t $IMAGE docker push $IMAGE
As soon as the image has been pushed to the registry, a new Amazon CodeBuild pipeline will be automatically created that executes an image scan using the integrated Sysdig Inline Scanner.
If you wish, you can check the CodeBuild pipeline status by visiting: Developer Tools > CodeBuild.
Click on the ‘Sysdig-CloudVision-ScanningCodeBuildStack-*’ build project, then click the build to drill down and tail the logs as the scan proceeds
Once complete the scan will show the status ‘Failed’.
Important This may mean the image has failed the scan, and not that the image scan process itself has failed. Check the CodeBuild pipeline logs to verify.
To see the scan results on Sysdig Secure Dashboard,
Click your new
You’ll see the image have several major vulnerabilities.
With Sysdig Secure you have full visibility of the security and compliance posture across your entire estate, in a single pane of glass, and as a central location for all security profiles and policies.