Ingest Amazon ECR container vulnerability findings and scan events

Latest Dynatrace Preview

In the following, you'll learn how to ingest container vulnerability findings and scan events from AWS Elastic Container Registry (ECR) into Grail and analyze them on the Dynatrace platform.

Goal

  • Get insights from Dynatrace for Amazon ECR container vulnerability findings.
  • Easily work with your data on the Dynatrace platform.

How it works

how it works

Container image vulnerabilities reported in Amazon ECR are ingested into Dynatrace via a dedicated OpenPipeline security events ingest endpoint, using an Amazon EventBridge event forwarding set up with an AWS CloudFormation template.

The OpenPipeline ingest endpoint processes and maps the security findings according to the Semantic Dictionary conventions.

These are stored in a bucket called default_security_custom_events (for details, see: Built-in Grail buckets).

Prerequisites

Permissions

You need an Admin user to define a custom policy with the app-engine:apps:install permission to install the app. For details, see Dynatrace access.

Get started

  1. In Dynatrace, open Dynatrace Hub.
  2. Look for Amazon ECR and select Install.
  3. Select Open, then select Configure new ingest.
  4. Follow the on-screen instructions to set up the ingestion.

Monitor data

Once you ingest your Amazon ECR data into Grail, you can monitor your data in the app (in Dynatrace, open Amazon ECR).

In Connection overview, you can view

  • A chart of ingested data from all existing connections over time

chart of ingested events

  • A table with information about your connections

connection table

Visualize and analyze findings

You can create your own dashboards or use our templates to visualize and analyze container vulnerability findings.

To use a dashboard template

  1. In Dynatrace, open Amazon ECR.
  2. In the Try our templates section, select the desired dashboard template.

Automate and orchestrate findings

You can create your own workflows or use our templates to automate and orchestrate container vulnerability findings.

To use a workflow template

  1. In Dynatrace, open Amazon ECR.
  2. In the Try our templates section, select the desired workflow template.

Query ingested data

You can query ingested data in Notebooks Notebooks or Security Investigator SI Logo, using the data format in Semantic Dictionary.

To query ingested data

  1. In Dynatrace, open Amazon ECR.
  2. Select Open with .
  3. Select Notebooks or Security Investigator.

Remove connections

To stop sending events to Dynatrace

  1. In Dynatrace, open Amazon ECR.
  2. For the connection you want to delete, select Remove.
  3. Follow the on-screen instructions to delete the resources. If you used values different from those specified in the setup dialog, adjust them accordingly.

This removes the Dynatrace resources created for this integration.

  1. In Dynatrace, open Settings (new).
  2. Select Connections > Amazon ECR.
  3. For the connection you want to delete, select Remove.
  4. Follow the on-screen instructions to delete the resources. If you used values different from those specified in the setup dialog, adjust them accordingly.

This removes the Dynatrace resources created for this integration.

Consumption

For billing information, see Events powered by Grail.

Further references