Ingest vulnerability data
Vulnerability data from your security scanner is ingested when the transformer task runs on the transformer node. See Run the transformer task for details.
Ingesting new scan data is dependent on a new scan having been completed in the scanner prior to running the transformer.