Este contenido no está disponible en el idioma seleccionado.

Chapter 1. What are importers


An importer in Red Hat Trusted Profile Analyzer (RHTPA) gives you the ability to fetch advisory and vulnerability data, along with Software Bill of Materials (SBOM) documents from different remote sources. Then RHTPA uses this data to give you more insights when analyzing your SBOM and Common Security Advisory Framework (CSAF) documents.

Available importers
By default, RHTPA comes configured with five importer sources: Red Hat CSAFs, Red Hat SBOMs, Common Vulnerability and Exposure (CVE) list version 5, the GitHub advisory database, and Quay. Also by default, we disabled the Red Hat CSAF, Red Hat SBOM, and Quay data importers. These importers can run a long time before finishing, but you can enable any of these data importers at anytime. The Quay data importer scans the Quay registry looking for existing SBOMs for RHTPA to analyze.
Scheduling
By default, the set schedule for each importer source to run is 1 day. This means an enabled importer source runs once a day. After a successful initial running of the importer, the next scheduled run is 24 hours from the time the importer job finished.
Computing resources

Computing resources, and setting limitations on those resources in Red Hat OpenShift Container Platform is important to ensure the application runs stable and performs as expected. The default resource request is 1 CPU and 8 GB of RAM, for both the importer and API server deployments. There are no resource limits by default.

You can either reduce the resource requirements, at the cost of stability, or give more resources to the cluster, supporting the workload. Pods can fail to start, or become stuck in a "Pending" state, if computing requirements are not adequate to support the workload.

Volver arriba
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2025 Red Hat