-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue with the default Clair configuration and not reporting vulnerabilities #2230
Comments
Thanks for the issue. What is the version of Clair that you are using? |
What are the differences? Please post a JSON-format vulnerability report of an image where you see this behavior, also. |
I'm not sure if it is related, but looking at the logs, I can see recurring messages like: {"level":"error","component":"libvuln/updates/Manager.Start","error":"updating errors:\nrhel-vex: context deadline exceeded\n","message":"errors encountered during updater run","environment":"prod"} {"level":"error","component":"libvuln/updates/Manager.Start","error":"updating errors:\nrhel-vex: error reading tar contents: context deadline exceeded\n","message":"errors encountered during updater run","environment":"prod"} |
To provide additional information, we had Clair version 4.7.4 running in combo mode. When I attempted to update to Clair version 4.8.0, I encountered some issues. It took some time to investigate, so I decided to discard the existing database and start a brand-new instance of Clair 4.8.0. The Clair instance that is not reporting vulnerabilities has been set up from an empty database. |
The errors that you pasted would certainly account for the lack of vulnerabilities, i.e. something failed during an updater run so none of the vulnerabilities were persisted to the DB. Are there any more specific errors in the logs? It looks from this like a timeout is being triggered (possibly when downloading the fully archive of VEX data). This is currently set to 2 minutes and the archive is only pulled down when the application is first init'ed. Recently RH prodsec made a change to include non-RH related CVEs in the VEX data, it is possible that this archive has grown a lot. |
Hi Clair team,
Clair is being used to scan a container for vulnerabilities alongside ACS scannerv4. I have a situation where scanner v4 is reporting vulnerabilities and Clair is showing them as false. We've altered the configuration on for Clair to
ignore_unpatched: false
Even with this configuration clair is not reporting vulnerabilities that Scannerv4 is picking up.
The text was updated successfully, but these errors were encountered: