Integrate with Harbor Container Registry
Feature availability This feature is available with Enterprise plans. See pricing plans for more details.
Snyk integrates with Harbor Container Registry to enable you to import your container images and monitor them for vulnerabilities.
Snyk tests the images you have imported (referred to as Projects) for any known security vulnerabilities, testing them at a frequency you control, and alerts you when new issues are detected.
Follow these instructions to set up Harbor integration in Snyk and start managing image vulnerabilities.
Integrate with Harbor Container Registry
Prerequisites for Harbor integration
You must be an administrator for the Organization you are configuring in Snyk.
Snyk needs user credentials to integrate with Harbor and does not support Harbor when configured for single sign-on (SSO).
Configure Harbor integration
In your Snyk account, navigate to Integrations, and under the Container Registries section, select the Harbor option.
In the Account credentials section, enter your Harbor username and password login credentials.
In the Container registry name fill in the full URL to the registry you want to integrate with.
To finish, select Save.
If you are using a self-hosted Harbor registry, contact Snyk to provide you with a token. For more information, see Snyk Container for self-hosted container registries (with Broker).
Note: To set up the integration, the Harbor user should be an admin user. The integration currently uses /v2/_catalog endpoint for listing repositories.
Snyk tests the connection values, and the page reloads, now displaying Harbor integration information. The Add your Harbor images to Snyk button becomes available. If the connection to Harbor fails, a notification appears under the Connected to Harbor section.
When the connection is successful, you can use Snyk to scan your images from Harbor.
Scan container images from Harbor in Snyk
Snyk tests and monitors your Harbor container images by evaluating the image tags in your repositories. After your container images are imported to Snyk, your image vulnerabilities are identified and can be triaged easily.
Follow these instructions to add images from Harbor to Snyk.
Prerequisites for Harbor image scanning
A Snyk account with access to the relevant Organization authorized by an administrator.
Harbor integration configured; see Integrate with Harbor Container Registry.
Steps in scanning Harbor images
Log in to your account and navigate to the relevant Group and Organization that you want to manage.
Under the Projects tab, click Add project. The list of integrations already configured on your account opens.
Select the Harbor option or Other if Harbor does not appear.
The view Which images do you want to test? opens, displaying all of the available images for your connected registry, grouped by each of your repositories.
Select single or multiple images to be imported to Snyk by choosing a specific image or by selecting an entire repository. You can also search by image name to find specific images to import.
To finish, click Add selected repositories on the top right. A status bar appears at the top of the page as the images are imported; you can continue working in the meantime.
When the import ends:
You can view the newly imported image, marked with a NEW tag, on the Projects page. Images are grouped by repository and are each linked individually to a detailed Projects page.
An import log becomes available; you can reach it from the top of the Projects list.
To enrich the data and get recommendations regarding your base image, under Settings, you can connect your Dockerfile to the image Project. For more information, see Adding your Dockerfile and testing your base image.
Harbor imports are indicated with a unique icon. You can also filter to view only the Harbor Projects:
For application vulnerabilities within container images, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. For more information, see Detecting application vulnerabilities in container images.
Last updated