Closed noahtalerman closed 2 years ago
Did a minor update on the description.
Turn on vulnerability detection for all existing Fleet users while being loud about the resources needed (CPU, RAM, internet access) for Fleet server.
By loud you mean: Warning message on the logs? Release notes? Docs? (probably loud means all? :)
/cc @noahtalerman
We have to keep in mind the confusion around:
Which brings me to:
Add one configuration option that turns on/off both software inventory and vuln detection features
Where should this new config live?
Same way as in databases_path
where it lives in the two places (config and app) and one takes precedence?
PS: Maybe consider simplifying all the ifs
logic in cronVulnerabilities
.
@lucasmrod Note that in 5.0.0 we'll be able to just rethink the configs altogether as it's not meant to be a backwards compatible release. So we can remove things that are duplicate/confusing, and move things around as we please.
We will have to think about the upgrade process, though, but we can write a conversion script or just document it if it's not super complicated.
By loud you mean: Warning message on the logs? Release notes? Docs? (probably loud means all? :)
@lucasmrod yes, by "loud" I mean some or all of these things you've listed. I don't think we've figured out exactly how to accomplish this.
@mikermcneil heads up, I deprioritized this issue. I don't think we want to turn on vulnerable software for folks that still have this off.
Vulnerable software is on by default for new Fleet instances.
👍
Vulnerable software is on by default for new Fleet instances.
Goal
Enable vulnerability detection to allow all users to easily discover and triage vulnerability software installed on their hosts.
How?
databases_path
,periodicity
, and other optional vuln configuration will be supported.enable_software_inventory
config option