Bug 1372445 - information on ose container vulnerability analysis
Summary: information on ose container vulnerability analysis
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat CloudForms Management Engine
Classification: Red Hat
Component: Documentation
Version: 5.6.0
Hardware: x86_64
OS: Linux
high
high
Target Milestone: GA
: 5.7.2
Assignee: Dayle Parker
QA Contact: Chris Budzilowicz
URL:
Whiteboard: doc
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-09-01 18:15 UTC by Colin Arnott
Modified: 2020-04-15 14:39 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-04-11 02:04:36 UTC
Category: ---
Cloudforms Team: ---
Target Upstream Version:
dayleparker: needinfo-


Attachments (Terms of Use)

Description Colin Arnott 2016-09-01 18:15:34 UTC
Document URL: https://access.redhat.com/documentation/en/red-hat-cloudforms/4.1/managing-providers/#running_a_smartstate_analysis

Describe the issue: 
While this document mentions the "smart state analysis", we don't find any information on how to activate a vulnerability analysis for the analyzed containers. Can you please point us to the corresponding documentation?

Additional information:

Comment 4 Praveen Varma 2017-01-24 06:54:39 UTC
AXA has been waiting on this for quite a log time and looks like we are yet to see a progress update on the BZ.

I am managing an RME on the same and therefore reaching out here to know if there is any update that we can provide to the customer.

Thanks,
Praveen
Escalation Manager

Comment 5 Andrew Dahms 2017-02-28 05:51:01 UTC
Hi Praveen,

Thank you for your message, and my apologies for the delay in getting back to you.

Unfortunately, due to resourcing concerns, we have had to focus on work for 4.2 features and several other key requests for the last few months, so we have not yet made progress on this bug.

Now assigning to Dayle for review.

Dayle - would you be able to work with Praveen on this request?

Kind regards,

Andrew


Note You need to log in before you can comment on or make changes to this bug.