Uploaded image for project: 'Red Hat Insights Engineering'
  1. Red Hat Insights Engineering
  2. RHINENG-12332

"detail": "inventory_id exists but is not evaluated",

XMLWordPrintable

    • 0
    • Security (Vulnerability)

      ** Note that this is a public ticket, please refrain from adding any sensitive data. **

      Description of Problem

      How reproducible

      (I was down when I ran the automation)  I will try again in the morning.

      Steps to Reproduce

      1. Run my automation to demo automated CVE patching with Insights and Ansible.
      2. [Step 2]
      3. [Step 3]

      Actual Behavior

      Between 6:45 pm phx and 6:52 pm I made 40 api calls to insights to get a list of vulenrabilites.

      { "content": "{\n \"errors\": [\n

      {\n \"detail\": \"inventory_id exists but is not evaluated\",\n \"status\": \"404\"\n }

      \n ]\n}\n", "redirected": false, "url": "https://console.redhat.com/api/vulnerability/v1/systems/1e260fff-4a45-420e-8187-0d86d9ab38e9/cves?limit=30", "status": 404, "server": "openresty", "content_type": "application/vnd.api+json", "x_rh_insights_request_id": "2596576c70a04be3b7e841cd1349d346", "access_control_allow_origin": "*", "access_control_allow_headers": "Content-Type, Access-Control-Allow-Headers, Authorization, X-Requested-With, x-rh-identity", "access_control_allow_methods": "GET, OPTIONS, PATCH, POST", "x_content_type_options": "nosniff", "content_length": "116", "date": "Thu, 05 Sep 2024 01:52:47 GMT", "connection": "close", "set_cookie": "3ba1432eca9ab72ebcff858daecadbf5=75a8783bcfe1e8ae12f8cbd17250dd10; path=/; HttpOnly; Secure; SameSite=None", "x_rh_edge_request_id": "47962210", "x_rh_edge_reference_id": "0.8b6d3e17.1725501166.47962210", "x_rh_edge_cache_status": "NotCacheable from child", "x_frame_options": "SAMEORIGIN", "strict_transport_security": "max-age=31536000; includeSubDomains", "msg": "Status code was 404 and not [200]: HTTP Error 404: Not Found", "elapsed": 0, "changed": false, "json": { "errors": [

      { "detail": "inventory_id exists but is not evaluated", "status": "404" }

      ] }, "invocation": { "module_args":

      { "url": "[https://console.redhat.com/api/vulnerability/v1/systems/1e260fff-4a45-420e-8187-0d86d9ab38e9/cves?limit=30]", "method": "GET", "user": "zigfreed", "password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", "validate_certs": false, "force_basic_auth": true, "status_code": [ "200" ], "return_content": true, "headers": \{ "Content-Type": "application/json" }

      , "unsafe_writes": true, "url_username": "zigfreed", "url_password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", "force": false, "http_agent": "ansible-httpget", "use_proxy": true, "body_format": "raw", "follow_redirects": "safe", "timeout": 30, "follow": false, "client_cert": null, "client_key": null, "dest": null, "body": null, "src": null, "creates": null, "removes": null, "unix_socket": null, "mode": null, "owner": null, "group": null, "seuser": null, "serole": null, "selevel": null, "setype": null, "attributes": null, "content": null, "backup": null, "remote_src": null, "regexp": null, "delimiter": null, "directory_mode": null } }, "_ansible_no_log": false, "attempts": 40 }

      Expected Behavior

      I should get a list of CVE related to the server.

      Business Impact / Additional info

      I use this to do automated cve remediation demos for customers.  I can't do the demo when this happens.  

              psegedy Patrik Segedy
              zigfreed Eric Ames
              Votes:
              0 Vote for this issue
              Watchers:
              9 Start watching this issue

                Created:
                Updated:
                Resolved: