The only thing harder than finding a critical Common Vulnerabilities and Exposures (CVE) is fixing it across your entire infrastructure. Red Hat Lightspeed simplifies this challenge by enabling you to address advisor recommendations, content advisories, vulnerability CVEs, and failed compliance rules on your connected Red Hat Enterprise Linux (RHEL) systems using Ansible Playbooks—saving up to 86% of manual remediation time.

We heard your requests for a faster, clearer workflow and have overhauled the experience to be simple yet operationally robust. Here is your crash course on the new, streamlined way to patch critical vulnerabilities in RHEL.

Step 1: Select the fix

Everything starts with identification. Once you've registered your systems with Red Hat Lightspeed:

  1. Navigate to Security > Vulnerability > CVEs.
  2. Filter your list by severity (for example, Critical or Important) to focus on the biggest risks.
  3. Click the CVE ID to open the details.
  4. Validate that the Remediation type column indicates a Playbook is available. Note: CVEs without available playbooks are not eligible for automated remediation.
  5. Select the affected systems you want to patch.
  6. Click the Plan remediation button.
The details of a CVE with a playbook "remediation type" for the single impacted system.

Step 2: The new "single-page" creation

The new single-page creation modal that streamlines remediation plan creation within Red Hat Lightspeed.

We have replaced the legacy wizard with a single modal to simplify plan creation by half the number of steps:

  1. Name your plan.
  2. Validate your Auto-reboot setting. Auto-reboot determines whether the remediation plan can automatically reboot your systems after executing. This setting can be changed later.
  3. Optional: Select the Download preview button to inspect your Ansible playbook before you create the plan.
  4. Click Create.

Step 3: Review and refine

You will notice a few workflow changes designed to give you a holistic view of the remediation plan.

Handling multiple resolutions

Sometimes, there are multiple ways to fix a vulnerability (e.g., updating a package vs. applying a mitigation configuration). In the past, you had to decide this upfront. Now, we have moved this decision to the details of a remediation plan so that you can take your time to review the options and select the best fit.

If a CVE in your remediation plan has multiple resolution options, you will see a purple icon next to the action count within the general remediation plan details.

To select a resolution:

  • Navigate to the Planned remediations tab.
  • Review your list of Actions for those with the purple Multiple resolutions label.
  • Click View resolution options to make your selection. Note: The chosen resolution applies to all systems in your remediation plan.
The purple "Multiple resolutions" label and "View resolution options" button on an Action in the remediation plan.

Step 4: Verify execution readiness

Before you execute your remediation plan, you need to know whether the job will run successfully. We have expanded the Execution Readiness section in the plan details to provide a comprehensive pre-flight check.

Hardened reliability and planned remediations

We have engineered the Red Hat Lightspeed backend to offer consistent, reliable execution for your most critical remediation tasks. To enable performance without timeouts or failures, we have established clear scalability guardrails using a system of action points to calculate the relative complexity and performance impact of your remediation plan.

Red Hat Lightspeed assigns a specific point value to each type of issue and calculates the plan's total size against the platform's performance capabilities:

  • Vulnerability: 20 action points per system
  • Advisor: 20 action points per system
  • Compliance: 5 action points per system
  • Patch: 2 action points per system

We now support guaranteed execution reliability for plans up to 1000 action points and 100 systems. You can view a visual representation of your plan's complexity in the new Planned remediations tab of the remediation plan details, which combines the Actions and Systems tabs into a single view.

The graphical representation of a remediation plan's action points and systems found in "Planned remediations".

Need to scale further? Red Hat Lightspeed is optimized for rapid, targeted remediation. However, executing changes across massive infrastructure often requires the advanced orchestration and governance capabilities of Red Hat Ansible Automation Platform.

If your plan exceeds these guardrails, you can seamlessly integrate with Ansible Automation Platform to execute at scale, giving you access to advanced scheduling, role-based access control, and auditing features designed specifically for enterprise-grade execution.

User access permissions

To execute remediation plans on connected remote host systems from within Red Hat Lightspeed, ensure that you have the remediations administrator RBAC role.

You can check your role settings in the console in Settings () > User Access > Groups. You might need to contact your organization administrator to confirm your user access settings and to apply the required permissions.

Remote host configuration manager

To allow users to execute a remediation plan on a remote system from Red Hat Lightspeed, you must configure the Remote Host Configuration Manager settings in the console under Inventory > System Configurations > Remote Host Configuration.

Systems connected to Red Hat Lightspeed

If a system is not reachable by Red Hat Lightspeed, new connection status modals in the Systems table provides specific guidance on how to reconnect them. Click the Not configured or Disconnected connection status to learn more.

Example of new connection status modals for disconnected and not configured systems.

The status may also dislay as Disconnected:

Example of new connection status modals for disconnected and not configured systems.

Step 5: Execute and verify

Once your readiness checks pass, you're ready to execute your remediation plan:

  1. Click Execute.
  2. Navigate to the Execution History tab to watch the progress in real-time. You can see the status for each system and view the logs if something stalls.
  3. Return to the Vulnerability service and verify that the CVE is no longer listed for those systems.

Ready to try it?

These updates are about removing friction. You get the intelligence of Red Hat security data combined with the automation of Ansible Playbooks, now with a user experience that respects your time.

Discover how easily you can act on Red Hat Lightspeed findings by visiting the Remediations page on console.redhat.com. As you explore, let us know how it went using the purple feedback tool embedded within the Hybrid Cloud Console.

Learn more about Red Hat Lightspeed remediations in the official documentation.

产品试用

红帽企业 Linux | 产品试用

此版本的红帽企业 Linux 能够编排硬件资源,并可以在物理系统、云端,或是作为虚拟机监控程序客户机运行。

关于作者

Talia Kaplanian is a Product Manager for Red Hat Lightspeed, focusing on the user journey through data collection, advisor recommendations, and remediation capabilities. Her diverse background spanning software and data engineering, quality assurance, and product management and ownership drives her passion for building holistic and reliable enterprise solutions.

UI_Icon-Red_Hat-Close-A-Black-RGB

按频道浏览

automation icon

自动化

有关技术、团队和环境 IT 自动化的最新信息

AI icon

人工智能

平台更新使客户可以在任何地方运行人工智能工作负载

open hybrid cloud icon

开放混合云

了解我们如何利用混合云构建更灵活的未来

security icon

安全防护

有关我们如何跨环境和技术减少风险的最新信息

edge icon

边缘计算

简化边缘运维的平台更新

Infrastructure icon

基础架构

全球领先企业 Linux 平台的最新动态

application development icon

应用领域

我们针对最严峻的应用挑战的解决方案

Virtualization icon

虚拟化

适用于您的本地或跨云工作负载的企业虚拟化的未来