Changes between Initial Version and Version 1 of GENIRacksHome/ExogeniRacks/AcceptanceTestStatus/EG-MON-1


Ignore:
Timestamp:
05/03/12 20:43:37 (12 years ago)
Author:
chaos@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIRacksHome/ExogeniRacks/AcceptanceTestStatus/EG-MON-1

    v1 v1  
     1[[PageOutline]]
     2
     3= Detailed test plan for EG-MON-1: Control Network Software and VLAN Inspection Test =
     4
     5''This page is GPO's working page for performing EG-MON-1.  It is public for informational purposes, but it is not an official status report.  See [wiki:GENIRacksHome/ExogeniRacks/AcceptanceTestStatus] for the current status of ExoGENI acceptance tests.''
     6
     7''Last substantive edit of this page: 2012-05-03''
     8
     9== Page format ==
     10
     11 * The status chart summarizes the state of this test
     12 * The high-level description from test plan contains text copied exactly from the public test plan and acceptance criteria pages.
     13 * The steps contain things i will actually do/verify:
     14   * Steps may be composed of related substeps where i find this useful for clarity
     15   * Each step is either a preparatory step (identified by "(prep)") or a verification step (the default):
     16     * Preparatory steps are just things we have to do.  They're not tests of the rack, but are prerequisites for subsequent verification steps
     17     * Verification steps are steps in which we will actually look at rack output and make sure it is as expected.  They contain a '''Using:''' block, which lists the steps to run the verification, and an '''Expect:''' block which lists what outcome is expected for the test to pass.
     18
     19== Status of test ==
     20
     21Meaning of states:
     22 * [[Color(green,okay)]]: Step is completed and passed (for a verification step), or is completed (for a prep step)
     23 * [[Color(red,failed)]]: Step is completed and failed, and is not being revisited
     24 * in progress: We are currently testing or iterating on this step
     25 * [[Color(orange,waiting)]]: Step is blocked by some other step or activity
     26
     27|| '''Step''' || '''State''' || '''Date completed''' || '''Comments''' ||
     28|| 1A         ||             ||                      ||                ||
     29
     30== High-level description from test plan ==
     31
     32This test inspects the state of the rack control network, infrastructure nodes, and system software.
     33
     34=== Procedure ===
     35
     36 * A site administrator enumerates processes on each of the head node and an !OpenStack worker node which listen for network connections from other nodes, identifies what version of what software package is in use for each, and verifies that we know the source of each piece of software and could get access to its source code.
     37 * A site administrator reviews the configuration of the rack management switch and verifies that each worker node's control interfaces are on the expected VLANs for that worker node's function (!OpenStack or bare metal).
     38 * A site administrator reviews the MAC address table on the management switch, and verifies that all entries are identifiable and expected.
     39
     40=== Criteria to verify as part of this test ===
     41
     42 * VI.09. A public document explains how to identify the software versions and system file configurations running on the rack, and how to get information about recent changes to the rack software and configuration. (F.5)
     43 * VI.11. A public document describes the GENI software running on the rack, and explains how to get access to the source code of each piece of GENI software. (F.6)
     44 * VII.03. Site administrators can understand the expected control and dataplane network behavior of their rack. (F.2)
     45 * VII.04. Site administrators can view and investigate current system and network activity on their rack. (F.2)
     46 * VII.06. A site administrator can verify the control software and configurations on the rack at some point in time. (F.5)
     47 * VII.08. A site administrator can get access to source code for the version of each piece of GENI code installed on their site rack at some point in time. (F.6)
     48 * VII.09. A site administrator can determine the MAC addresses of all physical host interfaces, all network device interfaces, all active experimental VMs, and all recently-terminated experimental VMs. (C.3.f)
     49 * VII.10. A site administrator can locate current and recent CPU and memory utilization for each rack network device, and can find recent changes or errors in a log. (D.6.a)
     50 * VII.12. For each infrastructure and experimental host, a site administrator can locate current and recent uptime, CPU, disk, and memory utilization, interface traffic counters, process counts, and active user counts. (D.6.b)
     51 * VII.13. A site administrator can locate recent syslogs for all infrastructure and experimental hosts. (D.6.b)
     52
     53== Step 1: identify network-listening software on the head node ==
     54
     55'''Using:'''
     56 * Using netstat, enumerate processes on bbn-hn which listen for network connections from outside the node
     57 * For each process found:
     58   * Use the command-line or `/proc` to determine what executable file is running
     59   * Use RPM tools to determine whether the executable file is part of an RPM
     60   * Otherwise, use documentation or iterate with the ExoGENI team to determine the origin of the software
     61 * For each RPM found, identify a location from which a source RPM for that package can be obtained
     62 * For each non-RPM software source found, identify a location from which the source code for that version can be obtained.
     63
     64'''Verify:'''
     65 * The source of each network-listening file can be identified
     66 * RPM source packages can be found for each RPM-sourced package
     67 * The source code and identifiable version (e.g. a git tag) can be found for each non-RPM software source
     68
     69== Step 2: identify network-listening software on an !OpenStack worker node ==
     70
     71'''Using:'''
     72 * Using netstat, enumerate processes on bbn-w1 which listen for network connections from outside the node
     73 * For each process found:
     74   * Use the command-line or `/proc` to determine what executable file is running
     75   * Use RPM tools to determine whether the executable file is part of an RPM
     76   * Otherwise, use documentation or iterate with the ExoGENI team to determine the origin of the software
     77 * For each RPM found, identify a location from which a source RPM for that package can be obtained
     78 * For each non-RPM software source found, identify a location from which the source code for that version can be obtained.
     79
     80'''Verify:'''
     81 * The source of each network-listening file can be identified
     82 * RPM source packages can be found for each RPM-sourced package
     83 * The source code and identifiable version (e.g. a git tag) can be found for each non-RPM software source
     84
     85== Step 3: verify VLANs on the rack management switch ==
     86
     87'''Using:'''
     88 * Establish a privileged login to the 8052 (management) switch
     89 * Obtain the list of all VLAN mappings for all interfaces
     90 * Determine which interfaces connect to worker nodes
     91 * Create a listing of worker node control interfaces to VLANs by interface type
     92
     93'''Verify:'''
     94 * All worker node IMM interfaces are access ports on VLAN 1006
     95 * All worker node iSCSI interfaces are access ports on VLAN 1009
     96 * Control interfaces for all workers in OpenStack mode are access ports on VLAN 1007
     97 * Control interfaces for all workers in bare metal mode are access ports on VLAN 1008
     98
     99== Step 4: verify MAC addresses on the rack management switch ==
     100
     101'''Using:'''
     102 * Establish a privileged login to the 8052 (management) switch
     103 * Obtain a list of the full MAC address table of the node
     104 * Use interface listings on hosts and devices to determine the identities of all MAC addresses
     105
     106'''Verify:'''
     107 * It is possible to identify and classify every MAC address visible on the switch