Related to: https://github.com/fleetdm/confidential/issues/7180
Changes:
- Updated the `nativeQueryToFindVulnsWithNoAssociatedRecords` query to
improve the performance of the update-reports script on large
deployments
Related to https://github.com/fleetdm/confidential/issues/7180
Changes:
- Increased the vulnerable wares processing timeout in the
`update-reports` script (45 minutes » 90 minutes)
- Updated the log level of the log message about hosts that could not be
matched to an operating system
Related to https://github.com/fleetdm/confidential/issues/6523
Changes:
- Updated the update-reports batch warnings and surface them after the
script runs.
- Updated logged warning messages to include what the impact of the
warning is.
- Updated the script to only check for duplicate uninstalled vulnerable
install records when it processes vulnerable software.
Related to: https://github.com/fleetdm/confidential/issues/6523
Changes:
- (Vulnerability dashboard) Updated the `update-reports` script to log a
warning and continue running if the Fleet API returns a 404 response
when we expect to receive an array of hosts.
Related to: https://github.com/fleetdm/confidential/issues/6523
Changes:
- Updated the vulnerability dashboard's update-reports script to
continue if a Fleet instance returns a 404 response when a request is
sent to get a filtered array of hosts with a vulnerable software item
installed.
Closes: https://github.com/fleetdm/confidential/issues/4057
Changes:
- Added the contents of the fleet-vulnerability-dashboard repo to
ee/vulnerability-dashboard
- Added a github workflow to deploy the vulnerability dashboard on
Heroku
- Added a github workflow to test changes to the vulnerability-dashboard
- Updated the website's custom configuration to enable
auto-approvals/review requests to files in the
ee/vulnerability-dashboard folder