-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Increase E2E vulnerability detection scans timeout #5699
Comments
Increased timeout to: PACKAGE_VULNERABILITY_SCAN_TIME = 150
TIMEOUT_PER_AGENT_VULNERABILITY_FIRST_SCAN = PACKAGE_VULNERABILITY_SCAN_TIME * 4 Currently testing new timeout: https://ci.wazuh.info/job/Test_e2e_system/349/ |
On hold due to no macOS are available: wazuh/wazuh#25345 |
Build: https://ci.wazuh.info/job/Test_e2e_system/357/ AnalysisThe issue seems to persist after increasing the timeout to the values specified in #5699 (comment). Regarding the research done in wazuh/wazuh#25363 (comment), this is not a test issue. In order to verify if this is a regressión, it's planned to launch the same tests over the 4.8.2 version. At the same, I will try to debug the environment once the first syscollector scan test fails. Currently On Hold in favor of https://github.com/wazuh/wazuh-jenkins/issues/6910, due to the limitations of macOS instances |
|
Regarding the results in 4.8.2 and 4.9.0, it seems this issue is present in both versions. However, in 4.8.1, this error was not detected: wazuh/wazuh#24594. No change in 4.8.2 can justify this discrepancy. Due to the following evidence queue can determine:
Currently provisioning an environment with only agent1 to perform several analyses over the test and the indexer connector: https://ci.wazuh.info/job/Test_e2e_system/361/ In addition, to fully determine a regression it would be run the tests over 4.8.1https://ci.wazuh.info/job/Test_e2e_system/362/ |
In order to test this development along with #5698 it was created the branch I am currently testing over 4.9.0-rc2. |
ConclusionIt was identified that these tests were failing due to the indexer's limited result window (defaulted to 10,000). In previous versions of the feeds, fewer than 10,000 vulnerabilities were detected in the environment. However, as this number increased, the tests began failing, particularly for agents with a higher number of vulnerabilities (e.g., CentOS 7 agents). To address this issue, it has been proposed to increase the maximum result window before pulling the vulnerabilities. |
Asked some questions in the comments: #5712 (comment) |
Questions resolved successfully. |
Description
In Release 4.9.0 - RC 1 - Vulnerability Detection E2E tests it was detected several errors:
After research (wazuh/wazuh#25363 (comment)) it was concluded that these errors were motivated due to a regression in the times of the indexer and for this reason it's necessary to increase the timeout of the initial tests scans and the timeout for collecting vulnerabilities in the syscollector case for each agent.
Tasks
Increase vulnerability timeouts for initial scans and package syscollector cases.Increase result windowsValidation
Conclusion
#5699 (comment)
The text was updated successfully, but these errors were encountered: