Este contenido no está disponible en el idioma seleccionado.
Chapter 2. New features and enhancements
A list of all major enhancements, and new features introduced in this release of Red Hat Trusted Profile Analyzer (RHTPA).
The features and enhancements added by this release are:
- Red Hat Trusted Profile Analyzer operator for OpenShift Container Platform is available
With this release, you can deploy the Trusted Profile Analyzer service on Red Hat’s OpenShift Container Platform (RHOCP) by installing the RHTPA operator provided by Red Hat’s Marketplace on the OperatorHub. Installing the RHPTA operator is a Technology Preview feature and is not recommended for running production workloads.
ImportantDeploying the RHTPA operator is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend to use them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. See the support scope for Red Hat Technology Preview features for more details.
- Improvements for handling CVSS scores
With this release, we improved how RHTPA handles Common Vulnerability Scoring System (CVSS) scores for vulnerabilities. To take advantage of these improvements, you must remove, and add the Common Vulnerabilities and Exposures (CVE) importer again.
Using the RHTPA API endpoints, do the following steps:
-
Remove the existing CVE importer:
http DELETE <RHTPA_BASE_URL>/api/v2/importer/cve
-
Add the CVE importer back:
http POST <RHTPA_BASE_URL>/api/v2/importer/cve cve[source]=https://github.com/CVEProject/cvelistV5 cve[disabled]:=false cve[period]=30s cve[description]="CVE List V5"
-
Remove the existing CVE importer:
- Aggregated severity value removed from RHTPA console
- With this release, we removed the Aggregated severity value from the RHTPA console. This value calculated the averages from vulnerability and advisory scores, however this information is not useful to know.
- Collecting metrics and tracing data
With this release, we added the ability to stream metrics and tracing data to the OpenTelemetry collector. By using the OpenTelemetry protocol (OTLP), this helps with observability, and troubleshooting problems as they occur. You can enable metrics and tracing by enabling the following options in the Helm chart or in the Ansible Playbook.
Helm chart
metrics.enabled=true tracing.enabled=true collector.endpoint="<OPENTELEMETRY_COLLECTOR_URL_ENDPOINT>"
metrics.enabled=true tracing.enabled=true collector.endpoint="<OPENTELEMETRY_COLLECTOR_URL_ENDPOINT>"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ansible Playbook
TPA_OTEL_METRICS_ENABLED=true TPA_OTEL_TRACING_ENABLED=true TPA_OTEL_COLLECTOR_ENDPOINT=<OPENTELEMETRY_COLLECTOR_URL_ENDPOINT>
TPA_OTEL_METRICS_ENABLED=true TPA_OTEL_TRACING_ENABLED=true TPA_OTEL_COLLECTOR_ENDPOINT=<OPENTELEMETRY_COLLECTOR_URL_ENDPOINT>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow