-
Notifications
You must be signed in to change notification settings - Fork 259
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.priority/backlogHigher priority than priority/awaiting-more-evidence.Higher priority than priority/awaiting-more-evidence.target/kubernetesIssues relating to kubernetes cluster scanningIssues relating to kubernetes cluster scanning
Description
in some clusters the vulnerability report produce by 'trivy-operator' is hitting the max request limit of etcd
it is suggested to reduce the amount of fields stored for each vulnerability , that same data already exist in AVD so the data will not be lost.
example of fields that can be removed: title , fixed version and etc
Vulnerability data with fields :
{"vulnerabilityID":"CVE-2022-1304","resource":"libcom","installedVersion":"1.43.4-2+deb9u1","fixedVersion":"","severity":"HIGH","title":"e2fsprogs: out-of-bounds read/write via crafted filesystem","primaryLink":"https://avd.aquasec.com/nvd/cve-2022-1304","links":[],"score":5.8,"target":""}
Vulnerability data without fields :
{"vulnerabilityID":"CVE-2022-1304","resource":"libcom","installedVersion":"1.43.4-2+deb9u1","severity":"HIGH","primaryLink":"https://avd.aquasec.com/nvd/cve-2022-1304\"}
The removed fields can be found in AVD for this CVE-2022-1304 so no data get lost
YvesEarnix, cthtrifork, rtalipov, EsDmitrii, hhamalai and 6 more
Metadata
Metadata
Assignees
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.priority/backlogHigher priority than priority/awaiting-more-evidence.Higher priority than priority/awaiting-more-evidence.target/kubernetesIssues relating to kubernetes cluster scanningIssues relating to kubernetes cluster scanning