Table of Contents | ||
---|---|---|
|
...
Hostname | CPU Model | Memory | BMC Firmware | Storage | 1GbE: NIC#, VLAN, (Connected extreme 480 switch) | 10GbE: NIC# VLAN, Network (Connected with IZ1 switch) | 40GbE: NIC# |
---|---|---|---|---|---|---|---|
Jump | Intel 2xE5-2699 | 64GB | 1.46.9995 | 3TB (Sata) | IF0: VLAN 110 (DMZ) | IF2: VLAN 112 (Private) | |
node1 | Intel 2xE5-2699 | 64GB | 1.46.9995 | 3TB (Sata) | IF0: VLAN 110 (DMZ) | IF2: VLAN 112 (Private) | |
node2 | Intel 2xE5-2699 | 64GB | 1.46.9995 | 3TB (Sata) | IF0: VLAN 110 (DMZ) | IF2: VLAN 112 (Private) | IF4: SRIOV |
Virtual deployment
Hostname | CPU Model | Memory | Storage | 1GbE: NIC#, VLAN, (Connected extreme 480 switch) | 10GbE: NIC# VLAN, Network (Connected with IZ1 switch) |
---|---|---|---|---|---|
node1 | Intel 2xE5-2699 | 64GB | 3TB (Sata) | IF0: VLAN 110 (DMZ) | IF2: VLAN 112 (Private) |
Test Framework
All components are tested with end-to-end testing
...
Status as of May 13th 28th 2020:
Layer | Result |
Comments | Nexus |
os/lynis | PASS |
Logs | ||
os/vuls | FAIL: |
141 unfixed vulnerabilities found | 141 unfixed vulnerabilities. Total: 153 (High: |
30 Medium: |
96 Low:27 ?:0), |
12/153 Fixed, |
795 installed, 0 exploits, en: 2, ja: 0 alerts |
Logs | |
k8s/conformance | PASS |
Logs | ||
k8s/kubehunter |
PASS except:
|
Patched system:public-info-viewer to hide /version, otherwise Cluster Remote Scanning would fail too. Need to update KUD scripts to automatically patch system:public-info-viewer.
Important links:
Steps To Implement Security Scan Requirements
...
| Inside-a-Pod Scanning: 1 vulnerability: CAP_NET_RAW. | Logs |
CI logs:
The gerrit comments contains the CI log url. All the CI logs are under this folder ICN : https://jenkins.akraino.org/view/icn/job/icn-master-verify/
...