Skip to content

Commit dfb3398

Browse files
committed
RHDEVDOCS-2335: App and images vulnerabilities
1 parent 31bac1e commit dfb3398

4 files changed

+68
-0
lines changed

applications/odc-monitoring-project-and-application-metrics-using-developer-perspective.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,10 @@ include::modules/odc-monitoring-your-project-metrics.adoc[leveloffset=+1]
1818

1919
include::modules/odc-monitoring-your-application-metrics.adoc[leveloffset=+1]
2020

21+
include::modules/odc-image-vulnerabilities-breakdown.adoc[leveloffset=+1]
22+
23+
include::modules/odc-monitoring-your-app-vulnerabilities.adoc[leveloffset=+1]
24+
2125
[role="_additional-resources"]
2226
== Additional resources
2327
* xref:../monitoring/monitoring-overview.adoc#monitoring-overview[Monitoring overview]

images/odc_image_vulnerabilities.png

60.1 KB
Loading
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * applications/odc-monitoring-project-and-application-metrics-using-developer-perspective.adoc
4+
5+
:_content-type: CONCEPT
6+
[id="odc-image-vulnerabilities-breakdown_{context}"]
7+
= Image vulnerabilities breakdown
8+
9+
In the developer perspective, the project dashboard shows the *Image Vulnerabilities* link in the *Status* section. Using this link, you can view the *Image Vulnerabilities breakdown* window, which includes details regarding vulnerable container images and fixable container images. The icon color indicates severity:
10+
11+
* Red: High priority. Fix immediately.
12+
* Orange: Medium priority. Can be fixed after high-priority vulnerabilities.
13+
* Yellow: Low priority. Can be fixed after high and medium-priority vulnerabilities.
14+
15+
Based on the severity level, you can prioritize vulnerabilities and fix them in an organized manner.
16+
17+
.Viewing image vulnerabilities
18+
image::odc_image_vulnerabilities.png[]
19+
20+
<1> Shows the vulnerable container images
21+
<2> Indicates the severity level of the vulnerability
22+
<3> Shows the fixable container images
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * applications/odc-monitoring-project-and-application-metrics-using-developer-perspective.adoc
4+
5+
:_content-type: PROCEDURE
6+
[id="odc-monitoring-your-application-image-vulnerabilities-metrics_{context}"]
7+
= Monitoring your application and image vulnerabilities metrics
8+
9+
After you create applications in your project and deploy them, use the *Developer* perspective in the web console to see the metrics for your application dependency vulnerabilities across your cluster. The metrics help you to analyze the following image vulnerabilities in detail:
10+
11+
* Total count of vulnerable images in a selected project
12+
* Severity-based counts of all vulnerable images in a selected project
13+
* Drilldown into severity to obtain the details, such as count of vulnerabilities, count of fixable vulnerabilities, and number of affected pods for each vulnerable image
14+
15+
.Prerequisites
16+
* You have installed the Red Hat Quay Container Security operator from the Operator Hub.
17+
+
18+
[NOTE]
19+
====
20+
The Red Hat Quay Container Security operator detects vulnerabilities by scanning the images that are in the quay registry.
21+
====
22+
23+
.Procedure
24+
25+
. For a general overview of the image vulnerabilities, on the navigation panel of the *Developer* perspective, click *Project* to see the project dashboard.
26+
27+
. Click *Image Vulnerabilities* in the *Status* section. The window that opens displays details such as *Vulnerable Container Images* and *Fixable Container Images*.
28+
29+
. For a detailed vulnerabilities overview, click the *Vulnerabilities* tab on the project dashboard.
30+
31+
.. To get more detail about an image, click its name.
32+
33+
.. View the default graph with all types of vulnerabilities in the *Details* tab.
34+
35+
.. Optional: Click the toggle button to view a specific type of vulnerability. For example, click *App dependency* to see vulnerabilities specific to application dependency.
36+
37+
.. Optional: You can filter the list of vulnerabilities based on their *Severity* and *Type* or sort them by *Severity*, *Package*, *Type*, *Source*, *Current Version*, and *Fixed in Version*.
38+
39+
.. Click a *Vulnerability* to get its associated details:
40+
+
41+
* *Base image* vulnerabilities display information from a Red Hat Security Advisory (RHSA).
42+
* *App dependency* vulnerabilities display information from the Snyk security application.

0 commit comments

Comments
 (0)