Uploaded image for project: 'Satellite'
  1. Satellite
  2. SAT-40203

Enable/Disable Vulnerability Analysis

XMLWordPrintable

    • Icon: Epic Epic
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • Enable/Disable Vulnerability Analysis
    • To Do
    • SAT-36020 - Satellite works with a Locally installed (GA) version of the vulnerability service
    • False
    • sat-proton
    • None
    • None
    • None

      Overview

       This epic focuses on providing administrators with the ability to enable and disable vulnerability analysis for individual hosts and in bulk from the All Hosts page and Host Details page. This capability is essential for managing which systems are included in vulnerability reporting and allows admins to exclude test systems or other hosts that should not impact security metrics.

       

      Background

      As part of the larger effort to support a locally installed GA version of the Insights Vulnerability service (SAT-36020), administrators need granular control over which hosts undergo vulnerability analysis. Being presented with a large list of CVEs can be overwhelming, especially when test systems or other non-production hosts are included. This feature brings additional management and triage workflows to help admins move from awareness to action in keeping their environments secure.

       

      Goals

      • Enable administrators to quickly identify which hosts have vulnerability analysis enabled or disabled
      • Provide an intuitive interface to enable/disable vulnerability analysis on individual hosts and in bulk
      • Support searching and filtering hosts based on their vulnerability analysis status
      • Integrate CVE search capabilities to help admins find hosts affected by specific vulnerabilities

      User Stories

      Primary User Story: As a RHEL Administrator, I need to opt individual systems out of vulnerability analysis so that my test systems don't negatively impact my security reporting. I should be able to quickly see which hosts have analysis enabled, filter the host list accordingly, and toggle the setting on/off as needed.

      Related User Stories:

      • As an administrator, I want to filter the hosts page to show only hosts where vulnerability analysis is enabled
      • As an administrator, on the host details page I should be able to enable/disable vulnerability analysis
      • As an administrator, I want to use a kebab menu action to enable/disable vulnerability analysis on a specific host
      • As an administrator, I want to enable/disable vulnerability analysis on multiple hosts in bulk
      • As an administrator, I want to search for hosts by CVE ID (SAT-31485)

      In Scope

      • Filter/search capability on All Hosts page to find hosts by vulnerability analysis enabled/disabled status
      • Kebab menu action on All Hosts page to enable/disable vulnerability analysis for individual hosts
      • Bulk action to enable/disable vulnerability analysis on multiple selected hosts
      • Integration with CVE ID search functionality (SAT-31485)
      • Visual indicators showing vulnerability analysis status for each host
      •  

      Acceptance Criteria

       Filter Functionality:

      • AC1: Filter/search option available on All Hosts page to filter by vulnerability analysis status
      • AC2: Filter correctly returns hosts matching the selected status
      • AC3: Filter can be combined with other existing host filters

      Enable/Disable Action (Individual):

      • AC4: Kebab menu action available for each host to enable/disable vulnerability analysis
      • AC5: Action successfully toggles the vulnerability analysis status
      • AC6: Host list immediately reflects the updated status
      • AC7: Appropriate success/error messages displayed
      • AC8: Action only available to users with appropriate permissions

      Enable/Disable Action (Bulk):

      • AC9: Users can select multiple hosts from the All Hosts page
      • AC10: Bulk action menu includes options to enable/disable vulnerability analysis
      • AC11: Bulk action successfully updates all selected hosts
      • AC12: Confirmation dialog shown before executing bulk action
      • AC13: Progress indicator shown during bulk operation
      • AC14: Summary of successful/failed operations displayed after completion
      • AC15: Bulk action only available to users with appropriate permissions

      Host Details Page:

      • AC16: Host Details page displays current vulnerability analysis status
      • AC17: Enable/disable action is available on Host Details page
      • AC18: Action successfully toggles the vulnerability analysis status
      • AC19: Page reflects the updated status immediately
      • AC20: Appropriate success/error messages displayed
      • AC21: Action only available to users with appropriate permissions

      CVE Search Integration:

      • AC22: Users can search for hosts by CVE ID on hosts index page (SAT-31485)
      • AC23: CVE search returns accurate results showing affected hosts
      • AC24: CVE search works with vulnerability analysis status filters

      Visual Indicators:

      • AC25: All Hosts page clearly indicates which hosts have vulnerability analysis enabled/disabled
      • AC26: Host Details page clearly indicates vulnerability analysis status
      • AC27: Status indicators consistent with other Satellite UI patterns

      Performance:

      • AC28: Filter operations complete within acceptable response times
      • AC29: Individual enable/disable actions complete within 5 seconds under normal load
      • AC30: Bulk operations handle large selections (100+ hosts) without timeout

              Unassigned Unassigned
              rhn-engineering-paji Partha Aji
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: