-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 4.10.0 - RC 3 - Vulnerability Detection performance test #27531
Comments
|
High ActivityComparison: #26172 Build: https://ci.wazuh.info/job/CLUSTER-Workload_benchmarks_metrics/838/ Artifacts: Logs 🔴SummaryMaster 🟡
Worker 1 🟢
Worker 2 🔴
Indexer 0 🟡
Known Issue: wazuh/wazuh-indexer#71
Known Issue: opensearch-project/security-analytics#1312
Indexer 1 ⚪No Logs Dashboard ⚪
Metrics and Statistics 🔴Master 🟢
Worker 1 🟢
Worker 2 🔴
Indexer 1 🟢
Indexer 2 🟢
Vulnerabilities State 🟢Alerts 🟢 |
Regarding reported issues from the test evidence perspective
We can confirm the following facts:
Simulate agent logs
However several daemons were working correctly at that time. For example, worker2's last cluster log was at
In addition, it seems like the csv was truncated somehow. For example, the remoted file's last lines are:
The final values for the csv are missing. This could be related to a lack of disk space in the environment |
LGTM |
A new issue has been created to update the test: https://github.com/wazuh/wazuh-qa-automation/issues/673 |
Tests information
Description
The objective is to conduct performance tests to analyze the vulnerability detection module across varying environment loads: high, medium, and low. This comparative analysis will provide a comprehensive understanding of the current status of the vulnerability detection module and will help identify any unexpected behavior.
Methodology
Utilizing the CLUSTER-Workload_benchmarks_metrics pipeline to execute specified test cases automatically. Results will be manually analyzed and shared with the development team for validation adjustments.
Test Cases
Note
Normal and Very High activity cases will not be executed in this RC, as approved by @juliamagan
Test parameters
Parameters
4.10.0
1
pre-release
-v
v4.10.0-rc3
v4.10.0-rc3
v4.10.0-rc3
10800
, 1h ->3600
)elb
TCP
debian10
4.10.0
left empty
0
HYBRID
True
False
left empty
True
False
True
True
10
EC2
auto
auto
Vulnerability
0
0
0
Twice
the number specified in the test cases)0
0
0
0
0
wazuh-analysisd
,wazuh-remoted
,wazuh-db
,wazuh-modulesd
,wazuh-apid
,wazuh_clusterd
,wazuh-authd
,wazuh-dbd
remote
,analysis
,wazuhdb
wazuh-indexer
vulnerabilities
,alerts
wazuh-dashboard
alerts.log
0
0
0
monitord.rotate_log=0
,wazuh_database.max_queued_events=33554431
,wazuh_clusterd.debug=1
(each,
is anew line
)True
Test considerations
Builds and artifacts
Conclusion 🔴
New Issues:
Known issues:
Fail to read queue capacity via reflection
warning in Indexer log wazuh-indexer#71The text was updated successfully, but these errors were encountered: