HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/394/help/man/man1/gcloud_alpha_container_images_describe.1
.TH "GCLOUD_ALPHA_CONTAINER_IMAGES_DESCRIBE" 1



.SH "NAME"
.HP
gcloud alpha container images describe \- lists container analysis data for a given image



.SH "SYNOPSIS"
.HP
\f5gcloud alpha container images describe\fR \fIIMAGE_NAME\fR [\fB\-\-metadata\-filter\fR=\fIMETADATA_FILTER\fR] [\fB\-\-show\-all\-metadata\fR] [\fB\-\-show\-build\-details\fR] [\fB\-\-show\-deployment\fR] [\fB\-\-show\-image\-basis\fR] [\fB\-\-show\-package\-vulnerability\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

\fB(ALPHA)\fR Lists container analysis data for a valid image.



.SH "EXAMPLES"

Describe the specified image:

.RS 2m
$ gcloud alpha container images describe \e
    gcr.io/myproject/myimage@digest
.RE

.RS 2m
Or:
.RE

.RS 2m
$ gcloud alpha container images describe gcr.io/myproject/myimage:tag
.RE

Find the digest for a tag:

.RS 2m
$ gcloud alpha container images describe \e
    gcr.io/myproject/myimage:tag \e
    \-\-format="value(image_summary.digest)"
.RE

.RS 2m
Or:
.RE

.RS 2m
$ gcloud alpha container images describe \e
    gcr.io/myproject/myimage:tag \e
    \-\-format="value(image_summary.fully_qualified_digest)"
.RE

See package vulnerabilities found by the Container Analysis API for the
specified image:

.RS 2m
$ gcloud alpha container images describe \e
    gcr.io/myproject/myimage@digest \-\-show\-package\-vulnerability
.RE



.SH "POSITIONAL ARGUMENTS"

.RS 2m
.TP 2m
\fIIMAGE_NAME\fR

The fully qualified name(s) of image(s) to describe. The name(s) should be
formatted as *.gcr.io/PROJECT_ID/IMAGE_PATH@sha256:DIGEST or
*.gcr.io/PROJECT_ID/IMAGE_PATH:TAG.


.RE
.sp

.SH "FLAGS"

.RS 2m
.TP 2m
\fB\-\-metadata\-filter\fR=\fIMETADATA_FILTER\fR

Additional filter to fetch metadata for a given fully qualified image reference.

.TP 2m
\fB\-\-show\-all\-metadata\fR

Include all metadata in the output.

.TP 2m
\fB\-\-show\-build\-details\fR

Include build metadata in the output.

.TP 2m
\fB\-\-show\-deployment\fR

Include deployment metadata in the output.

.TP 2m
\fB\-\-show\-image\-basis\fR

Include base image metadata in the output.

.TP 2m
\fB\-\-show\-package\-vulnerability\fR

Include vulnerability metadata in the output.


.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "NOTES"

This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation\-only early access
allowlist. These variants are also available:

.RS 2m
$ gcloud container images describe
.RE

.RS 2m
$ gcloud beta container images describe
.RE