Skip to content

Reduce the amount of vulnerability fields stored in the vulnerabilities report #442

@chen-keinan

Description

@chen-keinan

in some clusters the vulnerability report produce by 'trivy-operator' is hitting the max request limit of etcd

it is suggested to reduce the amount of fields stored for each vulnerability , that same data already exist in AVD so the data will not be lost.

example of fields that can be removed: title , fixed version and etc

Vulnerability data with fields :

{"vulnerabilityID":"CVE-2022-1304","resource":"libcom","installedVersion":"1.43.4-2+deb9u1","fixedVersion":"","severity":"HIGH","title":"e2fsprogs: out-of-bounds read/write via crafted filesystem","primaryLink":"https://avd.aquasec.com/nvd/cve-2022-1304","links":[],"score":5.8,"target":""}

Vulnerability data without fields :

{"vulnerabilityID":"CVE-2022-1304","resource":"libcom","installedVersion":"1.43.4-2+deb9u1","severity":"HIGH","primaryLink":"https://avd.aquasec.com/nvd/cve-2022-1304\"}

The removed fields can be found in AVD for this CVE-2022-1304 so no data get lost

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.priority/backlogHigher priority than priority/awaiting-more-evidence.target/kubernetesIssues relating to kubernetes cluster scanning

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions