Sortable tokens
The sort parameter in container security APIs allow you to sort the API results as per specific tokens used in the search. For example created:desc. Allowed values are asc or desc.
Here is a list of sortable tokens for each category:
Containers |
Images |
Sensors |
Vulnerabilities |
Software |
Host |
Registries |
Repositories |
Schedules |
---|---|---|---|---|---|---|---|---|
containerId created environment host.hostname host.ipAddress imageId imageSha ipv4 ipv6 label.key label.value lastScanned macAddress name operatingSystem portMapping.hostIp portMapping.hostPort portMapping.port portMapping.protocol drift.software.name drift.software.vulnerabilities.authType drift.software.vulnerabilities.category drift.software.vulnerabilities.customerSeverity drift.software.vulnerabilities.cveids drift.software.vulnerabilities.firstFound drift.software.vulnerabilities.lastFound drift.software.vulnerabilities.risk drift.software.vulnerabilities.severity drift.software.vulnerabilities.qid drift.software.vulnerabilities.title drift.software.vulnerabilities.typeDetected drift.software.vulnerabilities.source drift.software.vulnerabilities.reason drift.software.source drift.software.reason drift.vulnerability.authType drift.vulnerability.category drift.vulnerability.customerSeverity drift.vulnerability.cveids drift.vulnerability.firstFound drift.vulnerability.lastFound drift.vulnerability.risk drift.vulnerability.severity drift.vulnerability.qid drift.vulnerability.title drift.vulnerability.typeDetected drift.vulnerability.software.name drift.vulnerability.source drift.vulnerability.reason software.name software.vulnerabilities.authType software.vulnerabilities.category software.vulnerabilities.customerSeverity software.vulnerabilities.cveids software.vulnerabilities.firstFound software.vulnerabilities.lastFound software.vulnerabilities.risk software.vulnerabilities.severity software.vulnerabilities.qid software.vulnerabilities.title software.vulnerabilities.typeDetected software.vulnerabilities.source software.vulnerabilities.reason stateChanged users vulnerabilities.authType vulnerabilities.category vulnerabilities.customerSeverity vulnerabilities.firstFound vulnerabilities.lastFound vulnerabilities.risk vulnerabilities.severity vulnerabilities.qid vulnerabilities.title vulnerabilities.typeDetected vulnerabilities.software.name services.name services.status |
architecture created host.hostname imageId lastScanned layers.created layers.size layersCount operatingSystem software.name software.vulnerabilities.authType software.vulnerabilities.category software.vulnerabilities.customerSeverity software.vulnerabilities.cveids software.vulnerabilities.firstFound software.vulnerabilities.lastFound software.vulnerabilities.risk software.vulnerabilities.severity software.vulnerabilities.qid software.vulnerabilities.title software.vulnerabilities.typeDetected software.vulnerabilities.source software.vulnerabilities.reason vulnerabilities.firstFound vulnerabilities.fixed vulnerabilities.lastFound vulnerabilities.risk vulnerabilities.severity vulnerabilities.status vulnerabilities.qid vulnerabilities.title vulnerabilities.typeDetected vulnerabilities.software.name author dockerVersion size services.name services.status |
created lastCheckedIn sensorVersion hostname dockerVersion name os registry imageId |
authType category customerSeverity firstFound lastFound risk severity qid title software.name |
name vulnerabilities.authType vulnerabilities.category vulnerabilities.customerSeverity vulnerabilities.cveids vulnerabilities.firstFound vulnerabilities.lastFound vulnerabilities.risk vulnerabilities.severity vulnerabilities.qid vulnerabilities.title vulnerabilities.typeDetected vulnerabilities.source vulnerabilities.reason |
host.hostname host.ipAddress |
created registryType |
repositoryName |
created onDemand status |