Create a filter for image for an agent-managed cluster
Why are we doing this work
- users want to see the cluster's vulnerabilities filtered by the image they come from
Relevant links
Non-functional requirements
-
Documentation -
Testing
Implementation plan
-
frontend add the IMAGE
filter to theAGENT
filter preset
diff --git a/ee/app/assets/javascripts/security_dashboard/components/shared/vulnerability_report/constants.js b/ee/app/assets/javascripts/security_dashboard/components/shared/vulnerability_report/constants.js
index da1c4fe864d..e800757de87 100644
--- a/ee/app/assets/javascripts/security_dashboard/components/shared/vulnerability_report/constants.js
+++ b/ee/app/assets/javascripts/security_dashboard/components/shared/vulnerability_report/constants.js
@@ -94,7 +94,7 @@ export const FILTER_PRESETS = {
DEVELOPMENT: [...BASE_FILTERS.START, FILTERS.TOOL_SIMPLE, FILTERS.PROJECT, ...BASE_FILTERS.END],
OPERATIONAL_PROJECT: [...BASE_FILTERS.START, FILTERS.CLUSTER, FILTERS.IMAGE, ...BASE_FILTERS.END],
OPERATIONAL: [...BASE_FILTERS.START, FILTERS.PROJECT, ...BASE_FILTERS.END],
- AGENT: [...BASE_FILTERS.START, ...BASE_FILTERS.END],
+ AGENT: [...BASE_FILTERS.START, FILTERS.IMAGE, ...BASE_FILTERS.END],
};
export const REPORT_TYPE_PRESETS = {
-
frontend update the image_filter.vue
to use an agent-specific graphql filter (one similar toProject.vulnerabilityImages
)
Verification Steps
- Ensure your GDK has a GitLab Ultimate license
- Ensure your GDK is connected to the GitLab Runner
- Follow these docs to set up the kubernetes agent
- Clone test-cis-with-agentid and run the pipeline
- Link the agent to a project
- Run the pipeline to generate vulnerabilities
- Navigate to the Infrastructe => Kubernetes Cluster =>
cis-agent
=> Security tab - Verify the
image
filter
Edited by Alexander Turinske