In Kaspersky Container Security, you can generate reports based on the results of scanning worker nodes in the cluster. Depending on the required level of detail, node reports can be summary reports or detailed reports.
Summary nodes report
The summary report provides a summary of information for the selected worker nodes in the cluster. In the report, the solution indicates the name of the cluster that contains the selected nodes, as well as the date and time when the report was generated. The following information is provided for each cluster:
Name, status, and operating system of the node.
Date and time of the last successful vulnerability scan for the node.
Number of vulnerabilities and malware detected by the scan with severity level of the objects.
A detailed report provides more detailed information about the selected worker node, completed scans, and identified security issues. For each node, the following information is provided:
Lifetime of the node, indicating the date and time when the node was created.
Date and time of the last successful vulnerability scan for the node.
Node labels and annotations.
Web address of the host server and the internal IP address of the node.
Operating system of the node (with OS version and an indication whether this OS is still supported or not).
Kernel version of the node.
Container runtime.
Kubelet version.
States of the node states, with all possible states, statuses of the states ( True/False), and the date and time when they occurred.
Number of open ports and services on the node.
Under Vulnerabilities, you can see a table of all vulnerabilities detected on the node with their IDs, severity levels, and the installed resource. The solution also indicates whether a fix for the vulnerability is available from the vendor.
Under Malware monitoring section, the solution displays a table with the date and time of the first and last detection of malicious objects on the node, the names of the detected malicious objects, the number of malware detection events, the severity level and status of the malicious objects, as well as the paths to the malicious objects.
Under Open ports and services, you can see a table of all open ports on the node, indicating the third-party service and connection protocol.
The detailed nodes report can be generated only in CSV, JSON, and XML formats.