All Projects → anchore → Anchore Engine

anchore / Anchore Engine

Licence: apache-2.0
A service that analyzes docker images and applies user-defined acceptance policies to allow automated container image validation and certification

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Anchore Engine

Clair
Vulnerability Static Analysis for Containers
Stars: ✭ 8,356 (+601.01%)
Mutual labels:  static-analysis, vulnerabilities, containers
Grype
A vulnerability scanner for container images and filesystems
Stars: ✭ 362 (-69.63%)
Mutual labels:  static-analysis, vulnerabilities, containers
Alpine Erlang
An alpine image with Erlang installed, intended for releases
Stars: ✭ 73 (-93.88%)
Mutual labels:  containers, docker-image
Brakeman
A static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+426.93%)
Mutual labels:  static-analysis, vulnerabilities
Docker Gitlab
Dockerized GitLab
Stars: ✭ 7,084 (+494.3%)
Mutual labels:  containers, docker-image
Huskyci
Performing security tests inside your CI
Stars: ✭ 398 (-66.61%)
Mutual labels:  static-analysis, vulnerabilities
Bitnami Docker Wordpress
Bitnami Docker Image for WordPress
Stars: ✭ 476 (-60.07%)
Mutual labels:  containers, docker-image
Dagda
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
Stars: ✭ 820 (-31.21%)
Mutual labels:  static-analysis, vulnerabilities
Wssat
WEB SERVICE SECURITY ASSESSMENT TOOL
Stars: ✭ 360 (-69.8%)
Mutual labels:  static-analysis, vulnerabilities
Centos7 S2i Nodejs
DEPRECATED OpenShift S2I builder images for Node.js ✨
Stars: ✭ 34 (-97.15%)
Mutual labels:  containers, docker-image
Docker Redmine
Docker Image for Redmine
Stars: ✭ 1,044 (-12.42%)
Mutual labels:  containers, docker-image
Picluster
A Simplified Docker Swarm or Kubernetes Alternative to Container Scheduling and Orchestration
Stars: ✭ 390 (-67.28%)
Mutual labels:  containers, docker-image
Please Contain Yourself
A Docker tutorial written for people who don't actually know Docker already.
Stars: ✭ 385 (-67.7%)
Mutual labels:  containers, docker-image
Docker Squid
Dockerfile to create a Docker container image for Squid proxy server
Stars: ✭ 669 (-43.88%)
Mutual labels:  containers, docker-image
Bitnami Docker Parse
Stars: ✭ 56 (-95.3%)
Mutual labels:  containers, docker-image
Docker Bind
Dockerize BIND DNS server with webmin for DNS administration
Stars: ✭ 769 (-35.49%)
Mutual labels:  containers, docker-image
Bitnami Docker Redis
Bitnami Redis Docker Image
Stars: ✭ 317 (-73.41%)
Mutual labels:  containers, docker-image
Umoci
umoci modifies Open Container images
Stars: ✭ 349 (-70.72%)
Mutual labels:  containers, docker-image
Phpqa
Docker image that provides static analysis tools for PHP
Stars: ✭ 853 (-28.44%)
Mutual labels:  static-analysis, docker-image
Bitnami Docker Tensorflow Serving
Bitnami Docker Image for TensorFlow Serving
Stars: ✭ 49 (-95.89%)
Mutual labels:  containers, docker-image

Anchore Engine CircleCI

For the most up-to-date information on Anchore Engine, Anchore CLI, and other Anchore software, please refer to the Anchore Documentation

The Anchore Engine is an open-source project that provides a centralized service for inspection, analysis, and certification of container images. The Anchore Engine is provided as a Docker container image that can be run standalone or within an orchestration platform such as Kubernetes, Docker Swarm, Rancher, Amazon ECS, and other container orchestration platforms.

The Anchore Engine can be accessed directly through a RESTful API or via the Anchore CLI.

With a deployment of Anchore Engine running in your environment, container images are downloaded and analyzed from Docker V2 compatible container registries and then evaluated against user-customizable policies to perform security, compliance, and best practices enforcement checks.

Anchore Engine can be used in several ways:

  • Standalone or interactively.
  • As a service integrated with your CI/CD to bring security/compliance/best-practice enforcement to your build pipeline
  • As a component integrated into existing container monitoring and control frameworks via integration with its RESTful API.

Anchore Engine is also the OSS foundation for Anchore Enterprise, which adds a graphical UI (providing policy management, user management, a summary dashboard, security and policy evaluation reports, and many other graphical client controls), and other back-end features and modules.

Supported Operating Systems

  • Alpine
  • Amazon Linux 2
  • CentOS
  • Debian
  • Google Distroless
  • Oracle Linux
  • Red Hat Enterprise Linux
  • Red Hat Universal Base Image (UBI)
  • Ubuntu

Supported Packages

  • GEM
  • Java Archive (jar, war, ear)
  • NPM
  • Python (PIP)

Installation

There are several ways to get started with Anchore Engine, for the latest information on quickstart and full production installation with docker-compose, Helm, and other methods, please visit:

The Anchore Engine is distributed as a Docker Image available from DockerHub.

Quick Start (TLDR)

See documentation for the full quickstart guide.

To quickly bring up an installation of Anchore Engine on a system with docker (and docker-compose) installed, follow these simple steps:

curl https://engine.anchore.io/docs/quickstart/docker-compose.yaml > docker-compose.yaml
docker-compose up -d

Once the Engine is up and running, you can begin to interact with the system using the CLI.

Getting Started using the CLI

The Anchore CLI is an easy way to control and interact with the Anchore Engine.

The Anchore CLI can be installed using the Python pip command, or by running the CLI from the Anchore Engine CLI container image. See the Anchore CLI project on Github for code and more installation options and usage.

CLI Quick Start (TLDR)

By default, the Anchore CLI tries to connect to the Anchore Engine at http://localhost:8228/v1 with no authentication. The username, password, and URL for the server can be passed to the Anchore CLI as command-line arguments:

--u   TEXT   Username     eg. admin
--p   TEXT   Password     eg. foobar
--url TEXT   Service URL  eg. http://localhost:8228/v1

Rather than passing these parameters for every call to the tool, they can also be set as environment variables:

ANCHORE_CLI_URL=http://myserver.example.com:8228/v1
ANCHORE_CLI_USER=admin
ANCHORE_CLI_PASS=foobar

Add an image to the Anchore Engine:

anchore-cli image add docker.io/library/debian:latest

Wait for the image to move to the 'analyzed' state:

anchore-cli image wait docker.io/library/debian:latest

List images analyzed by the Anchore Engine:

anchore-cli image list

Get image overview and summary information:

anchore-cli image get docker.io/library/debian:latest

List feeds and wait for at least one vulnerability data feed sync to complete. The first sync can take some time (20-30 minutes) after that syncs will only merge deltas.

anchore-cli system feeds list
anchore-cli system wait

Obtain the results of the vulnerability scan on an image:

anchore-cli image vuln docker.io/library/debian:latest os

List operating system packages present in an image:

anchore-cli image content docker.io/library/debian:latest os

Perform a policy evaluation against an image using the default policy:

anchore-cli evaluate check docker.io/library/debian:latest

View other available policies from the Anchore Policy Hub

anchore-cli policy hub --help
anchore-cli policy hub list

API

For the external API definition (the user-facing service), see External API Swagger Spec. If you have Anchore Engine running, you can also review the Swagger by directing your browser at http://:8228/v1/ui/ (NOTE: the trailing slash is required for the embedded swagger UI browser to be viewed properly).

Each service implements its own API, and all APIs are defined in Swagger/OpenAPI spec. You can find each in the anchore_engine/services/<servicename>/api/swagger directory.

More Information

For further details on the use of the Anchore CLI with the Anchore Engine, please refer to the Anchore Engine Documentation

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].