Skip to content

Latest commit

 

History

History
324 lines (244 loc) · 21.8 KB

registry_at_events.md

File metadata and controls

324 lines (244 loc) · 21.8 KB
copyright lastupdated keywords subcollection
years
2018, 2024
2024-10-09
Track, tracking events, find events, activity tracker for IBM Cloud Container Registry, logging for IBM Cloud Container Registry, IBM Cloud Container Registry events, IBM Cloud Container Registry security, audit logs for IBM Cloud Container Registry, viewing IBM Cloud Container Registry events, IBM Cloud Container Registry events, actions that generate events, request data, request and response data, events, api, actions, data event, request, custom event fields, response data, locations, service events
Registry

{{site.data.keyword.attribute-definition-list}}

Auditing events for {{site.data.keyword.registryshort_notm}}

{: #at_events}

Use {{site.data.keyword.at_full}} to track how users and applications interact with the {{site.data.keyword.registrylong}} service in {{site.data.keyword.cloud_notm}}. {: shortdesc}

The {{site.data.keyword.at_full_notm}} service records user-initiated activities that change the state of a service in the {{site.data.keyword.cloud_notm}}. For more information, see Getting started with {{site.data.keyword.at_full_notm}} and About {{site.data.keyword.at_short}} in {{site.data.keyword.cloud_notm}}.

Locations of service events

{: #at_events_locations}

You can track how users and applications interact with the {{site.data.keyword.registrylong_notm}} service. The following tables list the locations where the automatic collection of {{site.data.keyword.registryshort_notm}} service events is enabled.

Locations in Americas Service events available
Dallas (us-south) Yes
Sao Paulo (br-sao) Yes
Toronto (ca-tor) Yes
{: caption="The automatic collection of {{site.data.keyword.registryshort_notm}} service events in Americas locations" caption-side="bottom"}
{: #table_registry_at_event_collection_americas}
Locations in Asia Pacific Service events available
Osaka (jp-osa) Yes
Sydney (au-syd) Yes
Tokyo (jp-tok) Yes
{: caption="The automatic collection of {{site.data.keyword.registryshort_notm}} service events in Asia Pacific locations" caption-side="bottom"}
{: #table_registry_at_event_collection_ap}
Locations in Europe Service events available
Frankfurt (eu-de) Yes
London (eu-gb) Yes
Madrid (eu-es) Yes
{: caption="The automatic collection of {{site.data.keyword.registryshort_notm}} service events in Europe locations" caption-side="bottom"}
{: #table_registry_at_event_collection_europe}
Location for Global Service events available
Global Yes
{: caption="The automatic collection of {{site.data.keyword.registryshort_notm}} service events for Global" caption-side="bottom"}
{: #table_registry_at_event_collection_global}

For more information about where to see {{site.data.keyword.registryshort_notm}} events, see Where to look for events.

For more information about the locations where {{site.data.keyword.cloud_notm}} services are enabled to automatically collect events, see {{site.data.keyword.cloud_notm}} services that generate {{site.data.keyword.at_short}} events by location.

Where to look for events

{: #ui}

{{site.data.keyword.at_full_notm}} events

{: #ui_at}

The region in which a {{site.data.keyword.registryshort}} or a Vulnerability Advisor event is available corresponds to the region of the {{site.data.keyword.registryshort}} that generated the event, except for ap-south. Events for ap-south show in Tokyo (jp-tok).

The following table shows the location of {{site.data.keyword.at_full_notm}} events.

Region for your account's registry Domain name of your registry Location of {{site.data.keyword.at_full_notm}} events
ap-north jp.icr.io Tokyo (jp-tok)
ap-south au.icr.io Tokyo (jp-tok)
br-sao br.icr.io Sao Paulo (br-sao)
ca-tor ca.icr.io Toronto (ca-tor)
eu-central de.icr.io Frankfurt (eu-de)
eu-es es.icr.io Madrid (eu-es)
jp-osa jp2.icr.io Osaka (jp-osa)
uk-south uk.icr.io London (eu-gb)
us-south us.icr.io Dallas (us-south)
{: caption="Location of {{site.data.keyword.at_full_notm}} events" caption-side="bottom"}
{: #table_registry_at_event_location}

The following table shows the location of global registry {{site.data.keyword.at_full_notm}} events.

Registry Global registry Location of {{site.data.keyword.at_full_notm}} events
Global icr.io Dallas (us-south)
{: caption="Location of global registry {{site.data.keyword.at_full_notm}} events" caption-side="bottom"}
{: #table_registry_at_event_location_global}

API methods

{: #at_events_api_methods}

The following tables list the API methods that generate an event when they are called.

Actions that generate events for authorization

{: #at_events_api_methods_auth}

Action Description Data Event
container-registry.auth.get Check whether the use of public connections is prevented for image pushes or pulls in your account. False
container-registry.auth.set Prevent or allow image pulls or pushes over public network connections for your account. False
{: caption="Actions that generate events for your authorization" caption-side="bottom"}
{: #table_registry_at_event_actions_auth}

Actions that generate events for images

{: #at_events_api_methods_images}

Action Description Data Event
container-registry.image.bulkdelete Delete multiple images from {{site.data.keyword.registryshort}}. If the image is signed, the signature is deleted as well. True
container-registry.image.delete Delete an image from {{site.data.keyword.registryshort}}. If the image is signed, the signature is deleted as well. True
container-registry.image.inspect Display details about an image. False
container-registry.image.list List the images in your {{site.data.keyword.IBM_notm}} account. False
container-registry.image.pull Pull an image from {{site.data.keyword.registryshort}}. True
container-registry.image.push Push an image to {{site.data.keyword.registryshort}}. True
container-registry.image.tag Add a tag that refers to a pre-existing {{site.data.keyword.registryshort}} image. False
container-registry.image.untag Remove a tag, or tags, from each specified image in {{site.data.keyword.registryshort}}. False
container-registry.manifest.inspect View the contents of the manifest for an image. False
{: caption="Actions that generate events for images" caption-side="bottom"}
{: #table_registry_at_event_actions_images}

Actions that generate events for namespaces

{: #at_events_api_methods_namespaces}

Action Description Data Event
container-registry.namespace.create Create a namespace in {{site.data.keyword.registryshort}}. \n \n Assign a {{site.data.keyword.registryshort}} namespace to a resource group. False
container-registry.namespace.delete Delete a namespace from {{site.data.keyword.registryshort}}. False
container-registry.namespace.list List the {{site.data.keyword.registryshort}} namespaces in your {{site.data.keyword.IBM_notm}} account. False
{: caption="Actions that generate events for namespaces" caption-side="bottom"}
{: #table_registry_at_event_actions_namespaces}

Actions that generate events for plans

{: #at_events_api_methods_plan}

Action Description Data Event
container-registry.plan.get Display information about the current pricing plan. False
container-registry.plan.set Upgrade to the standard plan. False
{: caption="Actions that generate events for plans" caption-side="bottom"}
{: #table_registry_at_event_actions_plans}

Actions that generate events for quotas

{: #at_events_api_methods_quota}

Action Description Data Event
container-registry.quota.get Display the current quotas for traffic and storage, and the usage information against those quotas. False
container-registry.quota.set Modify the quotas. Quota settings must be managed separately for your account in each registry instance. You can set quota limits for storage in your free or standard plan. False
{: caption="Actions that generate events for quotas" caption-side="bottom"}
{: #table_registry_at_event_actions_quotas}

Actions that generate events for retention policies

{: #at_events_api_methods_retention}

Action Description Data Event
container-registry.retention.analyze List the images that are deleted if you apply a specific retention policy. False
container-registry.retention.list List the image retention policies for your account. False
container-registry.retention.set Set a policy to retain images in a namespace in {{site.data.keyword.registryshort}} by applying specified criteria. False
{: caption="Actions that generate events for retention policies" caption-side="bottom"}
{: #table_registry_at_event_actions_retention_policy}

Actions that generate events for settings

{: #at_events_api_methods_setting}

Action Description Data Event
container-registry.settings.get Get registry service settings for the targeted account, such as whether platform metrics are enabled. False
container-registry.settings.set Update registry service settings for the targeted account, such as enabling platform metrics. False
{: caption="Actions that generate events for settings" caption-side="bottom"}
{: #table_registry_at_event_actions_settings}

Actions that generate events for signing images

{: #at_events_api_methods_sign}

Action Description Data Event
container-registry.signature.delete Delete a signature from an image in {{site.data.keyword.registryshort}}. True
container-registry.signature.read Read a signature from an image in {{site.data.keyword.registryshort}}. True
container-registry.signature.write Write a signature to an image in {{site.data.keyword.registryshort}}. True
{: caption="Actions that generate events for signing images" caption-side="bottom"}
{: #table_registry_at_event_actions_signing}

Actions that generate events for trash

{: #at_events_api_methods_trash}

Action Description Data Event
container-registry.trash.list Display all the images in the trash in your {{site.data.keyword.cloud_notm}} account. False
container-registry.trash.restore Restore a deleted image from the trash. If the deleted image is signed, the signature is restored too. False
{: caption="Actions that generate events for trash" caption-side="bottom"}
{: #table_registry_at_event_actions_trash}

Actions that generate events for vulnerabilities

{: #at_events_api_methods_vuln}

Action Description Data Event
container-registry.account-vulnerability-report.list View the Vulnerability Advisor reports for images in your {{site.data.keyword.registryshort}} account. \n \n For more information about request data, see Request data for the account vulnerability report. False
container-registry.account-vulnerability-status.list View Vulnerability Advisor security status for images in your {{site.data.keyword.registryshort}} account. \n \n For more information about request data, see Request data for the account vulnerability status. False
container-registry.image-vulnerability-report.read View the Vulnerability Advisor report for an image in {{site.data.keyword.registryshort}}. \n \n For more information about request and response data, see Request and response data for the vulnerability report. False
container-registry.image-vulnerability-status.read View the Vulnerability Advisor security status for an image in {{site.data.keyword.registryshort}}. \n \n For more information about request and response data, see Request and response data for the vulnerability status. False
{: caption="Actions that generate events for vulnerabilities" caption-side="bottom"}
{: #table_registry_at_event_actions_vuln}

Actions that generate events for exemption policies

{: #at_events_api_methods_exemptions}

Action Description Data Event
container-registry.exemption.create Create a Vulnerability Advisor exemption. False
container-registry.exemption.delete Delete a Vulnerability Advisor exemption. False
{: caption="Actions that generate events for Vulnerability Advisor exemption policies" caption-side="bottom"}
{: #table_registry_at_event_actions_va_exemptions}

Analyzing Activity Tracker events

{: #at_events_analyze}

The following fields are populated as described, depending on how you populate the request:

  • target.name shows the image name and, if you request an image name with a tag, a tag. If you request an image name by digest, the digest is shown instead of the tag because the digest might have many tags.

  • target.id shows the image name by digest to represent a searchable unique ID for the image, unless the request is for an image with a tag and the request fails before the digest is discovered. To see all the events for this digest across all tags, you can search by target.id.

  • target.resourceGroupId shows the resource group ID that is associated with a namespace and its resources. For more information, see Set up a namespace.

    Earlier namespaces that aren't migrated to IAM don't have a resource group; therefore, this field is not available. {: note}

Request data for vulnerability events

{: #at_events_vuln_events}

Get the data for vulnerability events in {{site.data.keyword.registryshort_notm}}.

Request data for the account vulnerability report

{: #at_events_analyze_report_list}

Get the vulnerability assessment (container-registry.account-vulnerability-report.list) for the list of registry images that belong to a specific account.

The following table lists the fields that are available through the requestData field in events with the action container-registry.account-vulnerability-report.list.

Custom Event Fields Type Description
requestData.RequestParameters.repository String The name of the repository that you want to see image vulnerability assessments for. For example, us.icr.io/namespace/image.
requestData.RequestParameters.includeIBM String When set to true, the returned list contains {{site.data.keyword.IBM_notm}} public images and the account images. If not set, or set to false, the list contains only the account images.
requestData.RequestParameters.includePrivate String When set to false, the returned list does not contain the private account images. If not set, or set to true, the list contains the private account images.
{: caption="Custom event fields for {{site.data.keyword.registryshort_notm}} account vulnerability reports list" caption-side="bottom"}
{: #table_registry_at_event_va_custom_reports_list}

For more information about the action container-registry.account-vulnerability-report.list, see Get the vulnerability assessment for all images in the API documentation.

Request data for the account vulnerability status

{: #at_events_analyze_status_list}

Get the vulnerability assessment status (container-registry.account-vulnerability-status.list) for the list of registry images that belong to a specific account.

The following table lists the fields that are available through the requestData field in events with the action container-registry.account-vulnerability-status.list.

Custom Event Fields Type Description
requestData.RequestParameters.repository String The name of the repository that you want to see image vulnerability assessments for. For example, us.icr.io/namespace/image.
requestData.RequestParameters.includeIBM String When set to true, the returned list contains {{site.data.keyword.IBM_notm}} public images and the account images. If not set, or set to false, the list contains only the account images.
requestData.RequestParameters.includePrivate String When set to false, the returned list does not contain the private account images. If not set, or set to true, the list contains the private account images.
{: caption="Custom event fields for {{site.data.keyword.registryshort_notm}} account vulnerability status list" caption-side="bottom"}
{: #table_registry_at_event_va_custom_status_list}

For more information about the action container-registry.account-vulnerability-status.list, see Get vulnerability assessment status for all images in the API documentation.

Request and response data for the vulnerability report

{: #at_events_analyze_report_read}

Get the vulnerability assessment (container-registry.image-vulnerability-report.read) for a registry image.

The following table lists the fields that are available through the requestData and responseData fields in events with the action container-registry.image-vulnerability-report.read.

Custom Event Fields Type Description
requestData.RequestParameters.name String The name of the image. For example, us.icr.io/namespace/repository:tag. \n \n The following constraint applies: The value must match the regular expression .*.
responseData.id String The unique ID of the report.
responseData.status String The following values for the overall vulnerability assessment status are available: \n \n OK \n \n WARN \n \n FAIL \n \n UNSUPPORTED \n \n INCOMPLETE \n \n UNSCANNED \n \n For more information about these status codes, see Vulnerability report status codes in the API documentation.
{: caption="Custom event fields for {{site.data.keyword.registryshort_notm}} image vulnerability reports read" caption-side="bottom"}
{: #table_registry_at_event_va_custom_reports_read}

For more information, see Get vulnerability assessment status in the API documentation.

Request and response data for the vulnerability status

{: #at_events_analyze_status_read}

Get the overall vulnerability status (container-registry.image-vulnerability-status.read) for a registry image.

The following table lists the fields that are available through the requestData and responseData fields in events with the action container-registry.image-vulnerability-status.read.

Custom Event Fields Type Description
requestData.RequestParameters.name String The name of the image. For example, us.icr.io/namespace/repository:tag. \n \n The following constraint applies: The value must match the regular expression .*.
responseData.status String The following values for the overall vulnerability assessment status are available: \n \n OK \n \n WARN \n \n FAIL \n \n UNSUPPORTED \n \n INCOMPLETE \n \n UNSCANNED \n \n For more information about these status codes, see Vulnerability report status codes in the API documentation.
{: caption="Custom event fields for {{site.data.keyword.registryshort_notm}} image vulnerability status read" caption-side="bottom"}
{: #table_registry_at_event_va_custom_status_read}

For more information, see Get vulnerability status in the API documentation.

Request data for image signing events

{: #at_events_sign_events}

Get the data for events about image signing in {{site.data.keyword.registryshort_notm}}.

The following table lists the fields that are available through the requestData field in events with the following actions:

  • container-registry.signature.delete
  • container-registry.signature.read
  • container-registry.signature.write
Custom Event Fields Type Description
requestData.RequestParameters.repository String The name of the repository for which you want to see image signing reports. For example, us.icr.io/namespace/image.
requestData.RequestParameters.signatureMethod String Displays the technology that is used to sign the image, such as {{site.data.keyword.redhat_notm}} Signing{: external}.
requestData.RequestParameters.signatureObject String Specifies the object type upon which a signing operation is performed, for example, image.
{: caption="Custom event fields for {{site.data.keyword.registryshort_notm}} signing" caption-side="bottom"}
{: #table_registry_at_event_custom_sign}