This topic describes Supply Chain Choreographer in Tanzu Application Platform GUI.
The Supply Chain Choreographer (SCC) plug-in enables you to visualize the execution of a workload by using any of the installed Out-of-the-Box supply chains. For more information about the Out-of-the-Box (OOTB) supply chains that are available in Tanzu Application Platform, see Supply Chain Choreographer for Tanzu.
To use Supply Chain Choreographer in Tanzu Application Platform GUI you must have:
For more information, see Overview of multicluster Tanzu Application Platform
To enable CVE scan results:
Add this proxy configuration to the tap-gui:
section of tap-values.yaml
:
tap_gui:
app_config:
proxy:
/metadata-store:
target: https://metadata-store-app.metadata-store:8443/api/v1
changeOrigin: true
secure: false
headers:
Authorization: "Bearer ACCESS-TOKEN"
X-Custom-Source: project-star
Where ACCESS-TOKEN
is the token you obtained after creating a read-write service account.
ImportantThe
Authorization
value must start with the wordBearer
.
To enable the supply chain box-and-line diagram to show Approve a Request in the Config Writer stage, set up for GitOps and pull requests. For more information, see GitOps vs. RegistryOps.
Before using the SCC plug-in to visualize a workload, you must create a workload.
The workload must have the app.kubernetes.io/part-of
label specified, whether you manually create the workload or use one supplied with the OOTB supply chains.
Use the left sidebar navigation to access your workload and visualize it in the supply chain that is installed on your cluster.
The example workload described in this topic is named tanzu-java-web-app
.
Click tanzu-java-web-app in the WORKLOADS table to navigate to the visualization of the supply chain.
There are two sections within this view:
This is a sample result of the Build stage for the tanzu-java-web-app
from using Tanzu Build Service:
This is a sample result of the Image Scan stage using Grype, which is only available in the test-scan
OOTB supply chain. For more information, see the View Vulnerability Scan Results section.
When a workload is deployed to a cluster that has the deliverable
package installed, a new section appears in the supply chain that shows Pull Config boxes and Delivery boxes.
When you have a Pull Request
configured in your environment, access the merge request from the supply chain by clicking APPROVE A REQUEST. This button is displayed after you click Config Writer in the supply chain diagram.
In the following example, the merge request is approved, which causes Pull Config and Delivery boxes to appear in the supply chain diagram.
Click the Source Scan stage or Image Scan stage to view vulnerability source scans and image scans for workload builds. The data is from Supply Chain Security Tools - Store.
CVE issues represent any vulnerabilities associated with a package or version found in the source code or image, including vulnerabilities from past scans.
NoteFor example, the
log4shell
package is found in image ABC on 1 January without any CVEs. On 15 January, the log4j CVE issue is found while scanning image DEF. If a user returns to the Image Scan stage for image ABC, the log4j CVE issue appears and is associated with thelog4shell
package.