afdesk
afdesk
`kubectl get vulnerabilityreports -n monitoring-karbon -o wide` is empty, right?
> If you want, I can extend the configuration back to all namespaces and chacks and upload the new log. yes, please. I'd like to reproduce it.
@mavo86 thanks for the details, I'll take a look you check `configauditreports`, does that mean `vulnerabilityreports` are also missing?
@mavo86 thanks a lot for your assist, I'll take a look and will update you here.
@mavo86 I took a look at the logs again. at first, there are some known issues here: scan jobs for some images (cilium-agent, mount-bpf-fs, prerequisite-kustomization-wait etc) were brokeb by OOMKilled,...
> [Error_scan.log](https://github.com/user-attachments/files/23000844/Error_scan.log) the scan job couldn't run next command: ```sh $ trivy image hvbg-container-repository.itshessen.hessen.de/github/google/cadvisor:v0.53.0 ``` could you check this image is accessable for Trivy-operator? my suggestion: the same issue is...
im not familiar with `NutanixKubernetsPlatform`, but i'd try to run this image (may be via a new job), or use something like `ssh` / `crictl` to pull it.
@mavo86 I need to think over how I can help you more now. As said @simar7 [here](https://github.com/aquasecurity/trivy-operator/discussions/2464#discussioncomment-12358817) > Trivy operator makes no guarantees on managed Kubernetes flavors, so it's quite...
@mavo86 sorry, missed your message. > how you saw that it's related to/caused by the following command. the logs contain next, so i decided about permession error. ```yaml trivy image...
@evandeaubl thanks for the report! could you share pls an image with r with a massive number of vulnerabilities to add this test case?