Uploaded image for project: 'Red Hat Advanced Cluster Security'
  1. Red Hat Advanced Cluster Security
  2. ROX-27663

[VM]: Design and Implement the VM Vulnerability Data Model

    • Icon: Epic Epic
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • 4.10.0
    • None
    • None
    • VM VulnMgmt - Persistence
    • Product / Portfolio Work
    • M
    • False
    • Hide

      None

      Show
      None
    • False
    • Not Selected
    • To Do
    • ROX-30216 - TP OpenShift Virtualization Vulnerability Reporting
    • Rox Sprint 4.8G - Global, Rox Sprint 4.8H - Global, Rox Sprint 4.9A - Global, Rox Sprint 4.9B - Global, Rox Sprint 4.9C - Global, Rox Sprint 4.9D - Global, Rox Sprint 4.9E - Global, Rox Sprint 4.9F - Global, Rox Sprint 4.9G - Global, Rox Sprint 4.9H - Global, Rox Sprint 4.10A - Global, Rox Sprint 4.9I - Global
    • 0

      The data model should likely include information about the VMs themselves, similar to platform nodes. There should be a separate table (or tables) to represent components, i.e. packages installed in the VM. And there should be a table (or tables) to represent vulnerabilities identified on the host.

      This assumes that we can't reuse existing tables for this data.

              Unassigned Unassigned
              rh-ee-klape Kyle Lape
              Shubha Badve Shubha Badve
              ACS Core Workflows
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated: