Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Weekly testing [do not close] #330

Open
mpeuster opened this issue Dec 18, 2019 · 7 comments
Open

Weekly testing [do not close] #330

mpeuster opened this issue Dec 18, 2019 · 7 comments

Comments

@mpeuster
Copy link
Collaborator

This issue tracks the results of the weekly pilot tests performed by UPB.

@mpeuster
Copy link
Collaborator Author

mpeuster commented Dec 18, 2019

2019-12-18

Status

  • Tests have been executed up to step 7

Issues

  • cannot delete existing policy because it is enforced
  • sometimes IMMS seems to "hang" after a reconfiguration has happened (worked in second try)
  • Automatic reconfiguration: ip0 metric is not appearing in prometheus

@mpeuster
Copy link
Collaborator Author

mpeuster commented Jan 8, 2020

2020-01-08

Status

  • Instantiation and manual re-configuration using the FMP works

Issues

  • cannot delete existing policy because it is enforced
  • sometimes IMMS seems to "hang" after a reconfiguration has happened (worked in second try)
  • Automatic reconfiguration: ip0 metric is not appearing in prometheus
    • Update: ip0 metric now appears, but is not set to > 0 if intrusion happens
    • There seems to be some issue with the IDS: Kibana is not starting

@mpeuster
Copy link
Collaborator Author

mpeuster commented Jan 15, 2020

2020-01-15

New issues

FMP deployed at UPB as some small glitches:

NS2 IDS:

Kibana server doesn't start: #340

Automated triggering still broken

Fixes

@stefanbschneider
Copy link
Member

stefanbschneider commented Jan 22, 2020

2020-01-22

Issues

Same as last week...

NS2 IDS

Kibana server doesn't start: #340

Automated triggering still broken

IMMS Traffic doesn't arrive in Aveiro platform

  • If deploying NS1 and NS2 on http://sta-sp-ave-2.5gtango.eu , the ip0 metric is shown.
  • When starting the IMMS and connecting to NS2 running in Aveiro, the manufacturing data/traffic only reaches NS1's Grafana/EAE with huge delay. There are over 1min timespans without any change and then jumps of over 100 parts at once (see below)
  • The IMMS' logs suggest that the connection to NS2 works. I don't have access to the Aveiro kubernetes and can't check the other logs...

image

@stefanbschneider
Copy link
Member

stefanbschneider commented Jan 29, 2020

2020-01-29

Tested: (success = check)

  • NS1, NS2, NS3 packaging, on-boarding
  • NS1 instantiation with Tango Portal, NS2 with FMP, connection of IMMS
  • Manual isolation and deisolation with FMP (not on 1st try, see below)
  • NS3 instantiation with FMP
  • Re-instantiation of NS1, NS22 with instantitation params. Creation of Prometheus alert with Policy (after reuploading policy)
  • Intrusion and automatic isolation with IDS and Policies (after fix; not super stable)

New issues

  • Manual isolation with FMP worked fine, but deisolation didn't. Traffic stopped arriving in quarantine, but didn't arrive in normal NS1 either.
    • Seems like it was an issue with the IMMS. The connection thread inside the IMMS was hanging/not printing any logs anymore (just the production thread). Not sure why.
    • After restarting the IMMS, it worked fine again - including isolation and deisolation. Should still try to make IMMS more robust to avoid this in the live review.
  • Again, the policy didn't work and did not create the Prometheus alert when instantiating NS2
    • Works after uploading a new version of the identical policy. Apparently, this is necessary after removing and onboarding NS2. I added this to the documentation.
    • Would be useful if we could at least remove old policies in the Tango portal such that we can simply replace them without having to increment the policy version every time.
  • Intrusion not detected! After trying to trigger an intrusion with smbclient, nothing happens. No intrusion is registered in Kibana or by the monitoring.
    • Fixed the VNFDs, which seems to solve the issue: Fixes: Removed MANO env vars from VNFDs #347
    • New issue: IDS works, reconfiguration works, traffic stops arriving at normal NS1 and starts arriving at quarantine NS1. But: The traffic/number of parts doesn't increase anymore when arriving at quarantine NS1. Not sure if the production thread in the IMMS somehow stopped.
    • Resolved and works fine when IMMS is restarted
    • But: 1st intrusion wasn't detected by IDS. 2nd intrusion everything worked fine
  • Also the monitoring in Prometheus shows the ip0 for some random, non-existing container to be greater than 0:

image

@stefanbschneider
Copy link
Member

2020-02-05

Tested: (success = check)

  • NS1, NS2, NS3 packaging, on-boarding
  • NS1 instantiation with Tango Portal, NS2 with FMP, connection of IMMS
  • Manual isolation and deisolation with FMP
  • NS3 instantiation with FMP
  • Re-instantiation of NS1, NS22 with instantitation params. Creation of Prometheus alert with Policy
  • Intrusion and automatic isolation with IDS and Policies

New issues

  • No new major issues
  • Intrusion detection and reconfiguration of NS2 in UC2 is pretty slow (minutes after intrusion), but it works
  • Kibana logs show more entries that intrusion attempts

@stefanbschneider
Copy link
Member

2020-03-04

  • UC1 with the Docker IMMS worked fine
  • Also manual isolation and deisolation
  • Didn't test UC2 and UC3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants