Use Elasticsearch for all Vulnerability Report filtering and grouping when ES is available
Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.
Why are we doing this work
Phase 1 of Vulnerability Management utilizing ElasticSearch (&13510 - closed) included using Elasticsearch for filtering and grouping only when Identifier and OWASP 2021 are used. The API auto-selects the datasource (PG or ES) based on the inclusion of these specific query fields.
This issue tracks changing the data resolver to use Elasticsearch aways, when it's available to the instance and the accessAdvancedVulnerabilityManagement ability feature flag is enabled.
Relevant links
Non-functional requirements
-
Documentation: -
Feature flag: -
Performance: -
Testing:
Implementation plan
For both Project and Group Vulnerability Reports
-
backend Update GraphQL resolver for project.vulnerabilitySeverityCount and group.vulnerabilitySeverityCount to use Elasticsearch as the datasource when ES is available and
accessAdvancedVulnerabilityManagementis enabled. -
backend For both APIs, dd a new response field
useFullSeverityCounts:boolwhen the condition above exists. -
frontend When
useFullSeverityCountsistrue, the frontend will display the full, not-fuzzy counts.
Verification steps
Edited by 🤖 GitLab Bot 🤖