Back to bug 1404429

Who When What Removed Added
Miroslav Grepl 2017-07-25 08:40:09 UTC Blocks 1469954
Libor Miksik 2017-08-03 09:01:53 UTC Blocks 1477926
Martin Preisler 2017-08-07 16:30:44 UTC Status NEW POST
Matus Marhefka 2017-08-07 16:42:18 UTC CC mmarhefk
Mirek Jahoda 2017-09-11 11:45:57 UTC Blocks 1490343
Watson Yuuma Sato 2017-11-03 13:23:13 UTC Status POST MODIFIED
Fixed In Version scap-security-guide-0.1.36-2.el7
errata-xmlrpc 2017-11-03 13:26:23 UTC Status MODIFIED ON_QA
Watson Yuuma Sato 2017-12-04 10:46:08 UTC Doc Text With this update OpenSCAP scanner can generate Ansible playbooks as remediation script, these playbooks can be generated based on Profiles or scan results. Playbooks based on Profiles contain fixes for all rules, while playbooks based on scan results will contain only fixes for Rules which failed during evaluation.

To better suit your needs, these playbooks can also be generated from a tailored Profile, or tailored directly by editing the values in the playbook.

The tasks contained in playbooks are tagged with metadata from Rule. These tags refer to Rule ID, strategy, complexity, disruption, and references, and they can be used to filter which tasks to apply.
Doc Type If docs needed, set a value Release Note
Mirek Jahoda 2017-12-04 15:50:29 UTC CC mjahoda
Docs Contact mjahoda
Doc Type Release Note Enhancement
Marek Haicman 2017-12-11 13:20:34 UTC Priority unspecified high
Severity unspecified high
Mirek Jahoda 2018-01-05 15:06:20 UTC Doc Text With this update OpenSCAP scanner can generate Ansible playbooks as remediation script, these playbooks can be generated based on Profiles or scan results. Playbooks based on Profiles contain fixes for all rules, while playbooks based on scan results will contain only fixes for Rules which failed during evaluation.

To better suit your needs, these playbooks can also be generated from a tailored Profile, or tailored directly by editing the values in the playbook.

The tasks contained in playbooks are tagged with metadata from Rule. These tags refer to Rule ID, strategy, complexity, disruption, and references, and they can be used to filter which tasks to apply.
*OpenSCAP* can be now integrated into Ansible workflows

With this update, the *OpenSCAP* scanner can generate remediation scripts in form of Ansible Playbooks, either based on profiles or based on scan results. Playbooks based on *OpenSCAP* Profiles contain fixes for all rules and playbooks based on scan results contain only fixes for rules that failed during an evaluation. The user can also generate a playbook from a tailored Profile or customize it directly by editing the values in the playbook. Tags, such as Rule ID, strategy, complexity, disruption, or references, used as metadata for tasks in playbooks serve to filter, which tasks to apply.
Mirek Jahoda 2018-01-08 11:14:04 UTC Doc Text *OpenSCAP* can be now integrated into Ansible workflows

With this update, the *OpenSCAP* scanner can generate remediation scripts in form of Ansible Playbooks, either based on profiles or based on scan results. Playbooks based on *OpenSCAP* Profiles contain fixes for all rules and playbooks based on scan results contain only fixes for rules that failed during an evaluation. The user can also generate a playbook from a tailored Profile or customize it directly by editing the values in the playbook. Tags, such as Rule ID, strategy, complexity, disruption, or references, used as metadata for tasks in playbooks serve to filter, which tasks to apply.
*OpenSCAP* can be now integrated into Ansible workflows

With this update, the *OpenSCAP* scanner can generate remediation scripts in form of Ansible Playbooks, either based on profiles or based on scan results. Playbooks based on SCAP Security Guide Profiles contain fixes for all rules and playbooks based on scan results contain only fixes for rules that failed during an evaluation. The user can also generate a playbook from a tailored Profile or customize it directly by editing the values in the playbook. Tags, such as Rule ID, strategy, complexity, disruption, or references, used as metadata for tasks in playbooks serve to filter, which tasks to apply.
Mirek Jahoda 2018-01-12 14:33:52 UTC Doc Text *OpenSCAP* can be now integrated into Ansible workflows

With this update, the *OpenSCAP* scanner can generate remediation scripts in form of Ansible Playbooks, either based on profiles or based on scan results. Playbooks based on SCAP Security Guide Profiles contain fixes for all rules and playbooks based on scan results contain only fixes for rules that failed during an evaluation. The user can also generate a playbook from a tailored Profile or customize it directly by editing the values in the playbook. Tags, such as Rule ID, strategy, complexity, disruption, or references, used as metadata for tasks in playbooks serve to filter, which tasks to apply.
*OpenSCAP* can be now integrated into Ansible workflows

With this update, the *OpenSCAP* scanner can generate remediation scripts in the form of Ansible Playbooks, either based on profiles or based on scan results. Playbooks based on SCAP Security Guide Profiles contain fixes for all rules, and playbooks based on scan results contain only fixes for rules that fail during an evaluation. The user can also generate a playbook from a tailored Profile, or customize it directly by editing the values in the playbook. Tags, such as Rule ID, strategy, complexity, disruption, or references, used as metadata for tasks in playbooks serve to filter, which tasks to apply.
Pasi Karkkainen 2018-01-24 20:29:54 UTC CC pasik
Matus Marhefka 2018-02-26 10:57:33 UTC QA Contact qe-baseos-security mmarhefk
errata-xmlrpc 2018-02-26 12:06:53 UTC Status ON_QA VERIFIED
errata-xmlrpc 2018-04-10 04:07:57 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2018-04-10 12:20:33 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2018-04-10 08:20:33 UTC
errata-xmlrpc 2018-04-10 12:21:04 UTC Link ID Red Hat Product Errata RHBA-2018:0761

Back to bug 1404429