Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cloud Node APIs for V2 #838

Closed
jatin-baweja opened this issue Jan 23, 2023 · 0 comments
Closed

Cloud Node APIs for V2 #838

jatin-baweja opened this issue Jan 23, 2023 · 0 comments
Assignees
Labels
enhancement New feature or request needs-triage Indicates that issue is not yet triaged and assigned v2 ThreatMapper revamp based on neo4j integration

Comments

@jatin-baweja
Copy link
Contributor

Adding Cloud Node Register and List APIs:

Flow:

  1. User deploys Deepfence cloud-scanner on the cloud provider of their choice(AWS, GCP, Azure).
  2. Cloud Scanner registers itself on the console(using the cloud nodes register API).
  3. While registering, cloud scanner also checks for pending scans from the console.
  4. Once registered, the cloud node appears on the console under Posture(using the cloud nodes list API)
@jatin-baweja jatin-baweja added enhancement New feature or request needs-triage Indicates that issue is not yet triaged and assigned v2 ThreatMapper revamp based on neo4j integration labels Jan 23, 2023
@jatin-baweja jatin-baweja self-assigned this Jan 23, 2023
gnmahanth pushed a commit that referenced this issue Jan 23, 2023
* Add APIs to register and list cloud nodes

* Add debug logs and total count to cloud node account list

* Remove commented code, cleanup unused code, move cloud provider constant
jatin-baweja added a commit that referenced this issue Feb 8, 2023
* Add ingest scan status and scan status API for cloud compliance scans

* Merge cloud compliance and compliance start scan APIs and make status response for cloud compliance and compliance consistent

* Fix Malware scan request and add linux to node_types for compliance start scan API

* Replace hard coded strings and removing start cloud compliance API from docs
jatin-baweja added a commit that referenced this issue Feb 9, 2023
* Update compliance start request to include filters

* Update golang deepfence sdk to include cloud_account and kubernetes_cluster node types

* Add edge cases for start scan filter conditions

* Add filtered nodes as per updated criteria

* Update get_node_ids response on empty where condition
jatin-baweja added a commit that referenced this issue Feb 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request needs-triage Indicates that issue is not yet triaged and assigned v2 ThreatMapper revamp based on neo4j integration
Projects
None yet
Development

No branches or pull requests

2 participants