Onboarding Google Artifact Registry
CloudGuard lets you onboard two types of registries on the Google Cloud Platform:
-
Google Container Registry
(GCR)
-
Google Artifact Registry (GAR)
This topic describes how to onboard your GAR to CloudGuard.
Prerequisites
-
You must have a Kubernetes
cluster onboarded to CloudGuard before you scan your container registry. This hosting cluster environment must have Image Assurance enabled. Otherwise, CloudGuard instructs you to install Image Assurance agents (or to update the agents to the latest version) on that cluster as part of the onboarding process.
-
Before onboarding your Container
Registry to CloudGuard, select an authentication method:
-
GCP Service Account Key - GCP
Service Account key file with the relevant permissions required for the relevant GAR.
-
GCP GKE Internal Authentication - If you have a Google Kubernetes Engine (GKE) cluster, CloudGuard can use the Compute Engine or GKE metadata server to authenticate with GAR.
To use this option, make sure that the service account of the GKE node pool has permissions to access the container registry.
This requirement is met by default when you work in the same project and use the default service account. You must set the required permissions for the service account if:
-
The GKE cluster is in a different project.
-
The cluster uses a different service account.
-
-
|
Note - The option of GKE internal authentication is not supported if GKE is configured with Workload Identity. |
Onboarding
To onboard a Container Registry to CloudGuard:
CloudGuard opens the onboarded registry. For onboarding validation, in the Scanners tab, see the status of the registry and the cluster that scans it.
The related Kubernetes cluster page shows information on the registries that the cluster scans, in the list on Blades > Image Assurance > Image Scan Engine agent.