ignore trivy finding for public egress #2919
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Reference Issues or PRs
closes #2882
What does this implement/fix?
This alert is because the security group has an egress rule that allows egress to
0.0.0.0/0
. Reference for the finding is at https://avd.aquasec.com/misconfig/aws/ec2/avd-aws-0104/However, the nature of the type of work done in Nebari means that we need this rule, and since it is an egress rule we choose to accept this risk.
This PR causes trivy to ignore this finding for this resource. It is as narrowly scoped as possible so that if this rule finds other instances we can address them if needed.
Put a
x
in the boxes that applyTesting
How to test this PR?
Merge and check the security table.
Any other comments?