Fleet version: <!-- Copy this from the "My account" page in the Fleet UI, or run fleetctl --version -->
Web browser and operating system:
💥 Actual behavior
Cloud hosted Fleet offloads vulnerability scanning to a separate service and disables the vulnerability scan in order to conserve resources. This is problematic in QA environments (QAWolf), as some tests rely on up-to-date vulnerability and software host counts.
These tests are currently being skipped, reducing our test coverage.
🧑💻 Steps to reproduce
fleetctl trigger --name vulnerability in a cloud hosted environment, or with the vulnerability cron disabled
🕯️ More info (optional)
The associated QAWolf test will be turned off while this issue is being addressed. We will need to ask them to re-enable the test once this item is completed.
🛠️ To fix
enable the vulnerability trigger even if the cron is disabled
Fleet version: <!-- Copy this from the "My account" page in the Fleet UI, or run
fleetctl --version
-->Web browser and operating system:
💥 Actual behavior
Cloud hosted Fleet offloads vulnerability scanning to a separate service and disables the vulnerability scan in order to conserve resources. This is problematic in QA environments (QAWolf), as some tests rely on up-to-date vulnerability and software host counts.
These tests are currently being skipped, reducing our test coverage.
🧑💻 Steps to reproduce
fleetctl trigger --name vulnerability
in a cloud hosted environment, or with the vulnerability cron disabled🕯️ More info (optional)
🛠️ To fix
enable the vulnerability trigger even if the cron is disabled