[go: up one dir, main page]

Snyk Integration

Enable Hummingbird AI Analysis for Pipelines

Pipelines are powered by Opsera’s Hummingbird AI, a cutting-edge AI technology introduced by Opsera to leverage the power of generative Al across your software delivery lifecycle. The AI analysis, summarizes the CI/CD pipelines that are executed, enabling users to step back and assess deployment pipelines holistically, rather than getting caught up in isolated step-by-step evaluations when issues arise. To learn more, read here. This feature is enabled on request. To have this enabled for your Pipelines, please get in touch with us at [email protected]

Integrate Snyk tool in Opsera pipelines to scan, prioritize, and identify security vulnerabilities in code, during your deployment. You can include the Snyk task in your pipeline to test for security vulnerabilities. When the testing is done, you can review and work with results directly from the reports generated by the Opsera Pipelines.

In this section

Create Snyk Tool

Register the Snyk tool in Opsera, to use the tool in your Pipeline configuration. For more info, see Snyk Tool Registration.

Configure Pipeline using Snyk

To configure the pipeline step

  1. Login to Opsera and navigate to Pipelines.

  2. Create a new pipeline or open an existing pipeline.

  3. Create a new step

  4. In the Step Setup, enter the step name. Example: Snyk.

  5. Choose the Tool as Snyk.

  6. Click Save.

  7. In the Step Settings popup, enter the following details:

  • Snyk Tool: Select the created Snyk tool from the dropdown.

  • Snyk Products: Choose the scan type.

  • Git Service: Choose the Git tool type.

  • Git Tool ID: Choose the required Git tool from the dropdown.

  • Repository: Choose a repository from the selected account.

  • Git Branch: Choose a branch from the dropdown.

  • Language: Choose the programming language.

  • Language Version: Choose a version for the selected language.

  • Multi Module Project

  • Enable Client Side thresholds: Enable this to set client side thresholds for vulnerabilities. Vulnerability threshold: Critical, High, Medium, Low, No and Unknown. Choose a numeric threshold count.

9. Click Save.

Click the Start Pipeline button to start the execution of the pipeline.

View Pipeline Logs

Once the pipeline is executed, you can view the logs regarding the scans and vulnerabilities identified.

  • To view logs, navigate to the Summary tab of the Pipeline, and scroll down to view Pipeline Logs.

  • To view the report, click Report in the Action column of a step. This shows the information on the type of script, the status, the action and the message.

  • To view the console logs, click Console Report in the Action column of the step.

Last updated

Was this helpful?