Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 4.8.0 - RC 2 - Upgrade metrics #23409

Closed
1 task
wazuhci opened this issue May 14, 2024 · 3 comments
Closed
1 task

Release 4.8.0 - RC 2 - Upgrade metrics #23409

wazuhci opened this issue May 14, 2024 · 3 comments

Comments

@wazuhci
Copy link

wazuhci commented May 14, 2024

Packages tests metrics information

Main release stage issue #23405
Main packages metrics issue #23407
Version 4.8.0
Release stage RC 2
Tag https://github.com/wazuh/wazuh/tree/v4.8.0-rc2

Packages used

  • Repository: packages-dev.wazuh.com
  • Package path: pre-release
  • Package revision: 1

Automated tests

Build: https://ci.wazuh.info/job/Test_upgrade_tier/2214/


System 3.13.6 4.6.0 4.7.4
CentOS 8 🟢 🟢 🟢
CentOS 7 🟢 🟢 🟢
CentOS 6 🟢 🟢 🟢
CentOS 5 🟢 🟢 🟢
Debian 12 (bookworm) 🟢 🟢 🟢
Debian 11 (bullseye) 🟢 🟢 🟢
Debian 10 (buster) 🟢 🟢 🟢
Debian 9 (strech) 🟢 🟢 🟢
Fedora 36 🟢 🟢 🟢
Fedora 35 🟢 🟢 🟢
Fedora 34 🟢 🟢 🟢
Fedora 32 🟢 🟢 🟢
Fedora 31 🟢 🟢 🟢
Ubuntu Focal 🟢 🟢 🟢
Ubuntu Bionic 🟢 🟢 🟢
Ubuntu Xenial 🟡 🟢 🟢
Ubuntu Trusty 🟢 🟢 🟢
Amazon Linux 2 🟢 🟢 🟢
Amazon Linux 1 🟢 🟢 🟢
Oracle Linux 8 🟢 🟢 🟢
openSUSE Tumbleweed 🟢 🟢 🟢
Red Hat 6 🟢 🟢 🟢
Red Hat 7 🟢 🟢 🟢
Red Hat 8 🟢 🟢 🟢
Red Hat 9 🟢 🟢 🟢

Manual tests - Upgrade 4.7.4 -> 4.8.0

System MSI Upgrade Logs Alerts
Windows Server 2022
Windows 11

System Upgrade* Upgrade** TCP UDP Alerts Logs User Group PID changed Remove
macOS 13.4 Ventura(intel64)
macOS 14 Sonoma(intel64)
macOS 13.4 Ventura(arm64)
macOS 14 Sonoma(arm64)
  • * Without environment variables
  • ** With environment variables

WPK Upgrade

System WPK 4.7.4 -> 4.8.0 WPK Force 4.8.0 -> 4.8.0
Ubuntu 22.04
Red Hat 9
Windows 11

System Upgrade (WPK) Alerts Logs User Group PID changed Force*
macOS 13.4 Ventura(intel64)
macOS 14 Sonoma(intel64)
macOS 13.4 Ventura(arm64)
macOS 14 Sonoma(arm64)
  • * Must include all other checks again

Status legend:
⚫ Not finished: The tasks haven't been finished yet.
⚪ Skipped: The task has been deemed unnecessary for this stage.
🔴 Completed with failures: Some issues were raised here.
🟡 Completed with accepted known issues: Some issues were raised here, they were deemed non-stopper.
🟢 Completed: Task finished with success. Nothing to do here.


Conclusion 🟡

Known issues


In order to close and proceed with the release or the next candidate version, the following auditors must give the green light to this RC.

  • @wazuh/devel-qa-release

@Rebits
Copy link
Member

Rebits commented May 16, 2024

Ubuntu xenial upgrade test fails: https://ci.wazuh.info/job/Test_upgrade/134841/console
Rerun in https://ci.wazuh.info/job/Test_upgrade/134875/
Known Issue: https://github.com/wazuh/wazuh-jenkins/issues/5859

Full report
============================= test session starts ==============================
platform linux -- Python 3.8.2, pytest-5.4.1, py-1.11.0, pluggy-0.13.1 -- /usr/testing/bin/python3.8
cachedir: .pytest_cache
rootdir: /upgrade_agent
collecting ... collected 11 items

upgrade_agent_test.py::test_check_version PASSED                         [  9%]
upgrade_agent_test.py::test_check_process_modulesd PASSED                [ 18%]
upgrade_agent_test.py::test_check_process_logcollector PASSED            [ 27%]
upgrade_agent_test.py::test_check_process_syscheckd PASSED               [ 36%]
upgrade_agent_test.py::test_check_process_agentd PASSED                  [ 45%]
upgrade_agent_test.py::test_check_process_execd PASSED                   [ 54%]
upgrade_agent_test.py::test_check_log_errors FAILED                      [ 63%]
upgrade_agent_test.py::test_check_system_ossec_conf PASSED               [ 72%]
upgrade_agent_test.py::test_check_ossec_conf PASSED                      [ 81%]
upgrade_agent_test.py::test_check_client_keys_conf PASSED                [ 90%]
upgrade_agent_test.py::test_check_local_internal_options_conf PASSED     [100%]

=================================== FAILURES ===================================
____________________________ test_check_log_errors _____________________________
upgrade_agent_test.py:166: in test_check_log_errors
    assert expected_error_found == True, assert_description['error']['exception_not_detected']
E   AssertionError: An error was found in the log
E   assert False == True
E     +False
E     -True
----------------------------- Captured stdout call -----------------------------
2024/05/15 09:58:13 rootcheck: INFO: Ending rootcheck scan.

2024/05/15 09:59:03 ossec-agentd: INFO: Agent is restarting due to shared configuration changes.

2024/05/15 09:59:05 wazuh-modulesd:syscollector: INFO: Module finished.

2024/05/15 09:59:05 ossec-logcollector: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 09:59:05 ossec-syscheckd: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 09:59:05 ossec-agentd: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 09:59:05 ossec-execd: INFO: (1314): Shutdown received. Deleting responses.

2024/05/15 09:59:05 ossec-execd: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 09:59:06 ossec-execd: INFO: Started (pid: 1626).

2024/05/15 09:59:07 ossec-agentd: INFO: (1410): Reading authentication keys file.

2024/05/15 09:59:07 ossec-agentd: INFO: Using notify time: 10 and max time to reconnect: 60

2024/05/15 09:59:07 ossec-agentd: INFO: Version detected -> Linux |ip-172-31-71-122.ec2.internal |5.10.215-203.850.amzn2.x86_64 |#1 SMP Tue Apr 23 20:32:19 UTC 2024 |x86_64 [Ubuntu|ubuntu: 16.04.7 LTS (Xenial Xerus)] - Wazuh v3.13.6

2024/05/15 09:59:07 ossec-agentd: INFO: Started (pid: 1637).

2024/05/15 09:59:07 ossec-agentd: INFO: Server IP Address: 172.31.67.236

2024/05/15 09:59:07 ossec-agentd: INFO: Using AES as encryption method.

2024/05/15 09:59:07 ossec-agentd: INFO: Trying to connect to server (172.31.67.236:1514/udp).

2024/05/15 09:59:07 ossec-agentd: INFO: (4102): Connected to the server (172.31.67.236:1514/udp).

2024/05/15 09:59:08 ossec-syscheckd: INFO: Started (pid: 1651).

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6003): Monitoring directory/file: '/bin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6003): Monitoring directory/file: '/boot', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6003): Monitoring directory/file: '/etc', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6003): Monitoring directory/file: '/sbin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6003): Monitoring directory/file: '/usr/bin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6003): Monitoring directory/file: '/usr/sbin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/mtab'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/hosts.deny'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/mail/statistics'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/random-seed'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/random.seed'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/adjtime'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/httpd/logs'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/utmpx'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/wtmpx'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/cups/certs'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/dumpdates'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/svc/volatile'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6207): Ignore 'file' sregex '.log$|.swp$'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6004): No diff for file: '/etc/ssl/private.key'

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6000): Starting daemon...

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6010): File integrity monitoring scan frequency: 43200 seconds

2024/05/15 09:59:08 ossec-syscheckd: INFO: (6008): File integrity monitoring scan started.

2024/05/15 09:59:08 rootcheck: INFO: Starting rootcheck scan.

2024/05/15 09:59:09 ossec-logcollector: INFO: Monitoring output of command(360): df -P

2024/05/15 09:59:09 ossec-logcollector: INFO: Monitoring full output of command(360): netstat -tulpn | sed 's/\([[:alnum:]]\+\)\ \+[[:digit:]]\+\ \+[[:digit:]]\+\ \+\(.*\):\([[:digit:]]*\)\ \+\([0-9\.\:\*]\+\).\+\ \([[:digit:]]*\/[[:alnum:]\-]*\).*/\1 \2 == \3 == \4 \5/' | sort -k 4 -g | sed 's/ == \(.*\) ==/:\1/' | sed 1,2d

2024/05/15 09:59:09 ossec-logcollector: INFO: Monitoring full output of command(360): last -n 20

2024/05/15 09:59:09 ossec-logcollector: INFO: (1950): Analyzing file: '/var/ossec/logs/active-responses.log'.

2024/05/15 09:59:09 ossec-logcollector: INFO: (1950): Analyzing file: '/var/log/dpkg.log'.

2024/05/15 09:59:09 ossec-logcollector: INFO: Started (pid: 1664).

2024/05/15 09:59:10 wazuh-modulesd: INFO: Process started.

2024/05/15 09:59:10 wazuh-modulesd:control: INFO: Starting control thread.

2024/05/15 09:59:10 sca: INFO: Module started.

2024/05/15 09:59:10 sca: INFO: Loaded policy '/var/ossec/ruleset/sca/cis_debian9_L1.yml'

2024/05/15 09:59:10 sca: INFO: Loaded policy '/var/ossec/ruleset/sca/cis_debian9_L2.yml'

2024/05/15 09:59:10 sca: INFO: Starting Security Configuration Assessment scan.

2024/05/15 09:59:10 wazuh-modulesd:ciscat: INFO: Module disabled. Exiting...

2024/05/15 09:59:10 wazuh-modulesd:syscollector: INFO: Module started.

2024/05/15 09:59:10 wazuh-modulesd:osquery: INFO: Module disabled. Exiting...

2024/05/15 09:59:10 sca: INFO: Starting evaluation of policy: '/var/ossec/ruleset/sca/cis_debian9_L1.yml'

2024/05/15 09:59:11 wazuh-modulesd:syscollector: INFO: Starting evaluation.

2024/05/15 09:59:12 ossec-syscheckd: INFO: (6009): File integrity monitoring scan ended.

2024/05/15 09:59:14 wazuh-modulesd:syscollector: INFO: Evaluation finished.

2024/05/15 09:59:14 sca: INFO: Evaluation finished for policy '/var/ossec/ruleset/sca/cis_debian9_L1.yml'

2024/05/15 09:59:14 sca: INFO: Starting evaluation of policy: '/var/ossec/ruleset/sca/cis_debian9_L2.yml'

2024/05/15 09:59:17 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 09:59:17 sca: INFO: Evaluation finished for policy '/var/ossec/ruleset/sca/cis_debian9_L2.yml'

2024/05/15 09:59:17 sca: INFO: Security Configuration Assessment scan finished. Duration: 0 seconds.

2024/05/15 09:59:19 rootcheck: INFO: Ending rootcheck scan.

2024/05/15 09:59:25 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 09:59:27 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 09:59:35 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 09:59:37 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 09:59:39 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 09:59:41 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 09:59:45 ossec-agentd: ERROR: (1218): Unable to send message to 'server': Connection refused

2024/05/15 10:00:13 ossec-agentd: WARNING: Server unavailable. Setting lock.

2024/05/15 10:00:13 ossec-agentd: INFO: Closing connection to server (172.31.67.236:1514/udp).

2024/05/15 10:00:13 ossec-agentd: INFO: Trying to connect to server (172.31.67.236:1514/udp).

2024/05/15 10:00:18 ossec-agentd: INFO: Closing connection to server (172.31.67.236:1514/udp).

2024/05/15 10:00:18 ossec-agentd: INFO: Trying to connect to server (172.31.67.236:1514/udp).

2024/05/15 10:00:23 ossec-agentd: INFO: Closing connection to server (172.31.67.236:1514/udp).

2024/05/15 10:00:23 ossec-agentd: INFO: Trying to connect to server (172.31.67.236:1514/udp).

2024/05/15 10:00:28 ossec-agentd: INFO: Closing connection to server (172.31.67.236:1514/udp).

2024/05/15 10:00:28 ossec-agentd: INFO: Trying to connect to server (172.31.67.236:1514/udp).

2024/05/15 10:00:33 ossec-agentd: INFO: Closing connection to server (172.31.67.236:1514/udp).

2024/05/15 10:00:33 ossec-agentd: INFO: Trying to connect to server (172.31.67.236:1514/udp).

2024/05/15 10:00:33 ossec-agentd: INFO: (4102): Connected to the server (172.31.67.236:1514/udp).

2024/05/15 10:00:33 ossec-agentd: INFO: Server responded. Releasing lock.

2024/05/15 10:01:06 wazuh-modulesd:syscollector: INFO: Module finished.

2024/05/15 10:01:06 ossec-agentd: INFO: Agent is restarting due to shared configuration changes.

2024/05/15 10:01:06 ossec-logcollector: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 10:01:06 ossec-syscheckd: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 10:01:06 ossec-agentd: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 10:01:06 ossec-execd: INFO: (1314): Shutdown received. Deleting responses.

2024/05/15 10:01:06 ossec-execd: INFO: (1225): SIGNAL [(15)-(Terminated)] Received. Exit Cleaning...

2024/05/15 10:01:07 ossec-agentd: ERROR: (1103): Could not open file '/queue/ossec/.agent_info' due to [(2)-(No such file or directory)].

2024/05/15 10:01:07 ossec-agentd: ERROR: (4112): Invalid server address found: 'MANAGER_IP'

2024/05/15 10:01:07 ossec-agentd: CRITICAL: (1215): No client configured. Exiting.

2024/05/15 10:01:17 wazuh-execd: INFO: Started (pid: 4397).

2024/05/15 10:01:18 wazuh-agentd: INFO: (1410): Reading authentication keys file.

2024/05/15 10:01:18 wazuh-agentd: INFO: Using notify time: 10 and max time to reconnect: 60

2024/05/15 10:01:18 wazuh-agentd: INFO: Version detected -> Linux |ip-172-31-71-122.ec2.internal |5.10.215-203.850.amzn2.x86_64 |#1 SMP Tue Apr 23 20:32:19 UTC 2024 |x86_64 [Ubuntu|ubuntu: 16.04.7 LTS (Xenial Xerus)] - Wazuh v4.8.0

2024/05/15 10:01:18 wazuh-agentd: INFO: Started (pid: 4408).

2024/05/15 10:01:18 wazuh-agentd: INFO: Using AES as encryption method.

2024/05/15 10:01:18 wazuh-agentd: INFO: Trying to connect to server ([172.31.67.236]:1514/udp).

2024/05/15 10:01:18 wazuh-agentd: INFO: (4102): Connected to the server ([172.31.67.236]:1514/udp).

2024/05/15 10:01:19 wazuh-syscheckd: INFO: Started (pid: 4422).

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6003): Monitoring path: '/bin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6003): Monitoring path: '/boot', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6003): Monitoring path: '/etc', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6003): Monitoring path: '/sbin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6003): Monitoring path: '/usr/bin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6003): Monitoring path: '/usr/sbin', with options 'size | permissions | owner | group | mtime | inode | hash_md5 | hash_sha1 | hash_sha256 | scheduled'.

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/mtab'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/hosts.deny'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/mail/statistics'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/random-seed'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/random.seed'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/adjtime'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/httpd/logs'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/utmpx'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/wtmpx'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/cups/certs'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/dumpdates'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6206): Ignore 'file' entry '/etc/svc/volatile'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6207): Ignore 'file' sregex '.log$|.swp$'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6004): No diff for file: '/etc/ssl/private.key'

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6000): Starting daemon...

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6010): File integrity monitoring scan frequency: 43200 seconds

2024/05/15 10:01:19 wazuh-syscheckd: INFO: (6008): File integrity monitoring scan started.

2024/05/15 10:01:19 rootcheck: INFO: Starting rootcheck scan.

2024/05/15 10:01:20 wazuh-logcollector: INFO: Monitoring output of command(360): df -P

2024/05/15 10:01:20 wazuh-logcollector: INFO: Monitoring full output of command(360): netstat -tulpn | sed 's/\([[:alnum:]]\+\)\ \+[[:digit:]]\+\ \+[[:digit:]]\+\ \+\(.*\):\([[:digit:]]*\)\ \+\([0-9\.\:\*]\+\).\+\ \([[:digit:]]*\/[[:alnum:]\-]*\).*/\1 \2 == \3 == \4 \5/' | sort -k 4 -g | sed 's/ == \(.*\) ==/:\1/' | sed 1,2d

2024/05/15 10:01:20 wazuh-logcollector: INFO: Monitoring full output of command(360): last -n 20

2024/05/15 10:01:20 wazuh-logcollector: INFO: (1950): Analyzing file: '/var/ossec/logs/active-responses.log'.

2024/05/15 10:01:20 wazuh-logcollector: INFO: (1950): Analyzing file: '/var/log/dpkg.log'.

2024/05/15 10:01:20 wazuh-logcollector: INFO: Started (pid: 4437).

2024/05/15 10:01:21 wazuh-modulesd: INFO: Started (pid: 4453).

2024/05/15 10:01:21 wazuh-modulesd:agent-upgrade: INFO: (8153): Module Agent Upgrade started.

2024/05/15 10:01:21 wazuh-modulesd:ciscat: INFO: Module disabled. Exiting...

2024/05/15 10:01:21 wazuh-modulesd:osquery: INFO: Module disabled. Exiting...

2024/05/15 10:01:21 sca: INFO: Module started.

2024/05/15 10:01:21 sca: INFO: Loaded policy '/var/ossec/ruleset/sca/cis_ubuntu16-04.yml'

2024/05/15 10:01:21 sca: INFO: Starting Security Configuration Assessment scan.

2024/05/15 10:01:21 wazuh-modulesd:control: INFO: Starting control thread.

2024/05/15 10:01:21 wazuh-modulesd:syscollector: INFO: Module started.

2024/05/15 10:01:21 wazuh-modulesd:syscollector: INFO: Starting evaluation.

2024/05/15 10:01:21 sca: INFO: Starting evaluation of policy: '/var/ossec/ruleset/sca/cis_ubuntu16-04.yml'

2024/05/15 10:01:21 wazuh-modulesd:syscollector: INFO: Evaluation finished.

2024/05/15 10:01:22 wazuh-syscheckd: INFO: (6009): File integrity monitoring scan ended.

2024/05/15 10:01:22 wazuh-syscheckd: INFO: FIM sync module started.

2024/05/15 10:01:27 sca: INFO: Evaluation finished for policy '/var/ossec/ruleset/sca/cis_ubuntu16-04.yml'

2024/05/15 10:01:27 sca: INFO: Security Configuration Assessment scan finished. Duration: 6 seconds.

2024/05/15 10:01:31 rootcheck: INFO: Ending rootcheck scan.

['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
['UPGRADE_INIT=20240515095901+0000', 'UPGRADE_END=20240515100016+0000']
Error detected as exception.
=========================== short test summary info ============================
FAILED upgrade_agent_test.py::test_check_log_errors - AssertionError: An erro...
========================= 1 failed, 10 passed in 0.08s =========================

Ubuntu Xenial upgrade test passed at the second iteration

@MARCOSD4
Copy link
Member

LGTM

1 similar comment
@juliamagan
Copy link
Member

LGTM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

No branches or pull requests

4 participants