Hi Guys, As you may imagine when a vulnerability is discovered in some pod we need to map this pod name to some particular ONAP project which is responsible for it.
Unfortunately not all projects put some hints in the pod name so sometimes we end up searching this manually using wiki and in some cases we can be wrong. That's why I'd like to ask if anyone has some automated or at least semi automated method of doing that kind of mapping? Best regards, -- Krzysztof Opasiak Samsung R&D Institute Poland Samsung Electronics -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#17144): https://lists.onap.org/g/onap-discuss/message/17144 Mute This Topic: https://lists.onap.org/mt/31697270/21656 Group Owner: [email protected] Unsubscribe: https://lists.onap.org/g/onap-discuss/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
