-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Designing a Comprehensive Testing Environment for Vulnerability Detector Feature Testing #4582
Comments
It is proposed the following environment
Build: https://ci.wazuh.info/job/Wazuh_QA_environment/367/parameters/ |
Is necessary to confirm infrastructure requirements with the management team. Confirming if it is necessary a multi-node approach the the recommended resources. |
Confirmed multinode requirement #4369 (comment) |
New proposed environment:
We have removed one worker regarding #4369 (comment). |
QA Frameowork role does not work for Windows and macOS endpoints. |
The designated testing environment for the System Vulnerability Detector has been finalized and is as follows:
It has been removed the |
@Rebits, I have some doubts:
|
Regarding this comment, it's crucial to note that the Wazuh QA Environment pipeline lacks documentation. We currently have an open issue to address this deficiency: https://github.com/wazuh/wazuh-jenkins/issues/3821. In this comment, we aim to succinctly address some of the questions raised:
The default resource allocation is based on roles. Each role specifies a minimum set of resources required, and instances can use these or more if specified. The complete role list can be found here: https://github.com/wazuh/wazuh-qa/blob/master/provisioning/roles.yaml. If no role is provided, the default service resources, defined in DeploymentData, are used: static final Map DEFAULT_RESOURCES = [
'EC2': [cpu: 2, memory: 4096],
'ECS': [cpu: 1, memory: 2048],
'vagrant': [cpu: 2, memory: 6144]
]
LINUX_BASED_OS Placeholder: LINUX_BASED_OS serves as a placeholder, indicating that any Linux-based instance is suitable for deployment. The specific instance chosen depends on the assigned roles. LINUX_BASED_OS is defined as Environment test:
roles: [custom_role]
os: LINUX_BASED_OS Roles custom_role:
playbook: ./playbooks/apache.yaml
os: [centos, ubuntu]
service: ANY The Wazuh QA Environment will analyze the custom_role requirements and select either centos or ubuntu based on the order of definition.
CUSTOM_PARAMETERS is used to define global parameters that apply to all instances. For instance, you can specify package data through this variable. You can customize these parameters for each host. For example, if you want to deploy a Wazuh manager version 4.6.0 and a Wazuh agent version 4.5.3, you can define the environment as: Environment agent:
roles: [agent]
os: LINUX_BASED_OS
version: 4.5.3
revision: 1
repository: live
manager:
roles: [manager]
os: LINUX_BASED_OS
`` `
With CUSTOM_PARAMETERS:
```yaml
version: 4.6.0
revision: 1
repository: live
It is not included globally in Feel free to ask if you have any further questions or require additional clarification. |
LGTM! |
Description
To ensure effective testing of the Vulnerability Detector Feature, it is imperative to define the specific testing environments in which the evaluations will take place. The proposed environment should provide comprehensive information in the following key areas:
Indexers:
Managers:
Agents:
The proposed testing scenario will be evaluated based on its cost-effectiveness and its impact on overall performance of the tests.
The final description of the testing environment should be presented in YAML format, adhering to the requirements outlined in the Wazuh QA Environment pipeline. This YAML should be included in the
provision/environments
wazuh qa repository path.Lastly, it is highly recommended to conduct a Proof of Concept deployment of the proposed environment in the Wazuh QA Environment pipeline to validate its feasibility and functionality in a real-world scenario.
The text was updated successfully, but these errors were encountered: