Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 4.3.5 RC1 - Wazuh UI Manual Testing #4286

Closed
AlexRuiz7 opened this issue Jun 24, 2022 · 7 comments
Closed

Release 4.3.5 RC1 - Wazuh UI Manual Testing #4286

AlexRuiz7 opened this issue Jun 24, 2022 · 7 comments
Assignees

Comments

@AlexRuiz7
Copy link
Member

AlexRuiz7 commented Jun 24, 2022

Wazuh v4.3.5 - Kibana 7.10.2, 7.16.x, 7.17.x - Revision 4306

Test Chrome Safari Firefox Package
Test 1 🟒/πŸ”΄ 🟒/πŸ”΄ 🟒/πŸ”΄ 🟒/πŸ”΄

Status legend:
⚫ - None
πŸ”΄ - Rejected
🟒 - Approved

In the case of πŸ”΄, create and link the issue.

Changelog

Added

  • Added to the interface API messages in the Ruleset test module #4244
  • Added authorization prompt in Mitre > Intelligence #4261

Changed

  • Changed the reference from Manager to Wazuh server in the guide to deploy a new agent #4239
  • Removed the filtered tags because they were not supported by the API endpoint #4267
  • Changed styles in visualizations. #4254

Fixed

  • Fixed type error when changing screen size in agents section #4233
  • Removed a logged error that appeared when the statistics tasks tried to create an index with the same name, causing the second task to fail on the creation of the index because it already exists #4235
  • Fixed a UI crash due to a query with syntax errors in Modules/Security events #4237
  • Fixed an error when generating a module report after changing the selected agent #4240
  • Fixed an unhandled error when a Wazuh API request failed in the dev tools #4266
  • Fixed an error related to API not available when saving the manager configuration and restarting the manager from Management/Configuration/Edit configuration on manager mode #4264
  • Fixed a UI problem that required scrolling to see the logs in Management/Logs and Settings/Logs #4253

Test for #4244

Scenario: An error message should be displayed when a rule is duplicated.

Precondition: It’s needed to have a duplicated rule

 Given: The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
 When: The user navigates to Ruleset Test 
 And: The user enters the test message 
And: The user clicks on the test button
Then: A error message is displayed on the console section  description of the problem

Test comments

To create a duplicated rule:

  1. Navigate to management/rule
  2. Access to any rule
  3. Copy the rule code
  4. Navigate back to management/rules
  5. Create a custom rule
  6. Paste the rule code
  7. Saved the rule

Test for #4261

Scenario: Access denied to a Mitre Module

Precondition: It’s needed to log on to Wazuh Dashboard with a user that was not read permission for mitre

Given: The user without reading permission on mitre  is logged in using Wazuh Dashboard and the Wazuh logo is displayed
When: The user navigates to Mitre Module
Then: The access denied screen is displayed
And: The user can’t access any submodule of mitre

Test comments

All the test steps are described on the associated PR.

Test for #4239

Scenario: Validate the information to add a new Agent Red Hat / CentOS SO from CentOS6 or higher version with armhf architecture

Given: The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
And: navigate on the new deploy agent page
When: the user selects `Red Hat / CentOS SO` from CentOS6 or higher version with `armhf` architecture
Then: the new sixth step is added with a "title", a "description", a "message", a "Wazuh documentation" link, and "console command", and a Copy command button are displayed

        | title | Install and enroll the agent |
        | description | You can use this command to install and enroll the Wazuh agent in one or more hosts. |
        | message | Running this command on a host with an agent already installed upgrades the agent package without enrolling the agent. To enroll in it, see the Wazuh documentation. |
        | Wazuh documentation | https://documentation.Wazuh.com/current/user-manual/registering/index.html |
        | console command | sudo WAZUH_MANAGER='172.19.0.4' yum install https://packages.Wazuh.com/4.x/yum/Wazuh-agent-4.3.0-1.armv7hl.rpm |

And: the new seventh step is added with a "title", the "Systemd" and "SysV init" tabs, a Copy command button, a message, and a "document" link are displayed

        | title |
        | Start the agent |

        | Systemd |
        | sudo systemctl daemon-reload |
        | sudo systemctl enable Wazuh-agent |
        | sudo systemctl start Wazuh-agent |

        | SysV Init |
        | sudo chkconfig --add Wazuh-agent |
        |sudo service Wazuh-agent start |

        | message |
        | To verify the connection with the Wazuh server, please follow this document. |

        | document |
        | https://documentation.Wazuh.com/4.3/user-manual/agents/agent-connection.html |

Scenario: Validate the information to add a new Red Hat / CentOS SO version with armhf architecture

Given: The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
And: navigate on the new deploy agent page
When: the user selects `Red Hat / CentOS SO` from `RedHat6` or higher version with `armhf` architecture
Then: the new sixth step is added with a "title", a "description", a "message", a "Wazuh documentation" link, and "console command", and a Copy command button are displayed

        | title | Install and enroll the agent |
        | description | You can use this command to install and enroll the Wazuh agent in one or more hosts. |
        | message | Running this command on a host with an agent already installed upgrades the agent package without enrolling the agent. To enroll it, see the Wazuh documentation. |
        | Wazuh documentation | https://documentation.Wazuh.com/current/user-manual/registering/index.html |
        | console command | curl -so Wazuh-agent-4.3.0.deb https://packages.Wazuh.com/4.x/apt/pool/main/w/Wazuh-agent/Wazuh-agent_4.3.0-1_armhf.deb && sudo WAZUH_MANAGER='172.19.0.3' dpkg -i ./Wazuh-agent-4.3.0.deb |
- And: the new seventh step is added with a "title", the "Systemd" and "SysV init" tabs, a Copy command button, a message, and a "document" link are displayed

        | title |
        | Start the agent |

        | Systemd |
        | sudo systemctl daemon-reload |
        | sudo systemctl enable Wazuh-agent |
        | sudo systemctl start Wazuh-agent |

        | SysV Init |
        | sudo chkconfig --add Wazuh-agent |
        |sudo service Wazuh-agent start |

        | message |
        | To verify the connection with the Wazuh server, please follow this document. |

        | document |
        | https://documentation.Wazuh.com/4.3/user-manual/agents/agent-connection.html |

Scenario: Validate the information to add a new Agent Debian / Ubuntu SO version with armhf architecture

Given: The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
And: navigate on the new deploy agent page
When: the user selects `Debian / Ubuntu SO` with `armhf` architecture
Then: the new sixth step is added with a "title", a "description", a "message", a "Wazuh documentation" link, and "console command", and a Copy command button are displayed

        | title | Install and enroll the agent |
        | description | You can use this command to install and enroll the Wazuh agent in one or more hosts. |
        | message | Running this command on a host with an agent already installed upgrades the agent package without enrolling the agent. To enroll in it, see the Wazuh documentation. |
        | Wazuh documentation | https://documentation.Wazuh.com/current/user-manual/registering/index.html |
        | console command | curl -so Wazuh-agent-4.3.0.deb https://packages.Wazuh.com/4.x/apt/pool/main/w/Wazuh-agent/Wazuh-agent_4.3.0-1_armhf.deb && sudo WAZUH_MANAGER='172.19.0.3' dpkg -i ./Wazuh-agent-4.3.0.deb |
- And: the new seventh step is added with a "title", the "Systemd" and "SysV init" tabs, a Copy command button, a message, and a "document" link are displayed

        | title |
        | Start the agent |

        | Systemd |
        | sudo systemctl daemon-reload |
        | sudo systemctl enable Wazuh-agent |
        | sudo systemctl start Wazuh-agent |

        | SysV Init |
        | sudo chkconfig --add Wazuh-agent |
        |sudo service Wazuh-agent start |

        | message |
        | To verify the connection with the Wazuh server, please follow this document. |

        | document |
        | https://documentation.Wazuh.com/4.3/user-manual/agents/agent-connection.html |

Test for #4267

Scenario: Filter tags

Precondition: It’s needed to have the GCP integration enabled and set

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
When The user navigates to management/logs
And The user clicks on the log selector
And The user clicks on the GCP bucket log
Then The log message is displayed

Test comments

To integrate GCP module:

  1. Navigate to management/configuration
  2. On the manager, create an empty file named credentials.json on the path ossec/wodles
  3. Add these configuration to the ossec.file
    <gcp-bucket>
    	<run_on_start>yes</run_on_start>
    	<interval>1m</interval>
            <logging>debug</logging>
    	<bucket type="access_logs">
     	 <name>custom</name>
             <credentials_file>wodles/credentials.json</credentials_file>
    	</bucket>
    </gcp-bucket>
  4. Save the changes
  5. Restart the manager

Test for #4254

Scenario:

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
And navigate on the Vulnerabilities modules
When the dashboard with the plots is displayed with an styles
And the user select Agent 
Then the dashboards with plot is displayed with the same styles of vulnerabilities

Test for #4235

Scenario:

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
And  navigate the setting options
When the user select the Log tab
Then the app los message is displayed wit the log file located url `/usr.share/Wazuh-dashboard/data/Wazuh/log/Wazuhapp.log`
And on the log isn’t displayed a error message

Test for #4233

Scenario: Resize Screen

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
When The user navigates to the agent dashboard 
And The user resizes the browser screen
Then  there aren’t errors displayed in the Browser Dev Console

Test for #4237

Scenario: Wrong query search

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
When The user navigates to the <Module Name>
And The user insert a wrong query at the search field
Then a toast should be displayed with an error message 
And The user should not be redirected to an error screen

Test for #4266

Scenario: Wrong query search

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
When The user navigates to the devtools
And The user use an wrong query expression
Then The console should display an friendly error message

Test for #4253

Scenario: Resize Screen - Management - Logs

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
When The user navigates to `Management/Logs`
And The user changes the screen resolution (zoom-in/zoom-out) 
Then the number of lines displayed on the logs screen changes according to the zoom level.

Test for #4240

Scenario: Generate a module report

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
When The user navigates to `Modules/<Module>`
And Select an agent with the Explore agent button 
And generate a module report clicking on the Generate report
And Change the selected agent to another one, and generate a module report
Then This should be done
    Examples:

        | Module               |
        | Security Events      |
        | Integrity Monitoring |
        | System Auditing      |
        | Mitre & Attack       |
        | GDPR                 |
        | HIPAA                |
        | NIST                 |
        | TSC                  |
        | Policy Monitoring    |
        | PCIDSS               |

Test for #4264

Scenario: Generate a module report

Given The Kibana admin user is logged in using xpack and the Wazuh logo is displayed
When The user navigates to `Management > Configuration`
And Click on `Edit configuration`
And Change `vulnerability-detector` to enabled or disabled
And Click save, restart manager button, Wait for it to restart
Then the waiting time to see if the manager is active again
@Desvelao
Copy link
Member

Kibana 7.16.3 (X-Pack)

Test Chrome Safari Firefox Package
4244 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4261 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4239.1 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4239.2 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4239.3 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4267 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4254 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4235 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4233 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4237 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4266 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4253 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4240 🟒 ⚫ 🟒 4.3.5_7.16.3-1
4264 🟒 ⚫ 🟒 4.3.5_7.16.3-1

@AlexRuiz7 AlexRuiz7 removed the type/enhancement Enhancement issue label Jun 24, 2022
@Desvelao
Copy link
Member

Desvelao commented Jun 24, 2022

Kibana 7.10.2 (ODFE)

Test Chrome Safari Firefox Package
4244 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4261 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4239.1 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4239.2 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4239.3 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4267 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4254 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4235 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4233 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4237 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4266 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4253 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4240 🟒 ⚫ 🟒 4.3.5_7.10.2-1
4264 🟒 ⚫ 🟒 4.3.5_7.10.2-1

@yenienserrano
Copy link
Member

yenienserrano commented Jun 24, 2022

Kibana 7.17.4 (X-Pack)

Test Chrome Safari Firefox Package
4244 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4261 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4239.1 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4239.2 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4239.3 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4267 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4254 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4235 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4233 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4237 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4266 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4253 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4240 🟒 ⚫ 🟒 4.3.5_7.17.4-1
4264 🟒 ⚫ 🟒 4.3.5_7.17.4-1

Test for #4244

Screenshot from 2022-06-24 15-19-08

Test for #4261

Screenshot from 2022-06-24 15-42-40

Test for #4239

Screenshot from 2022-06-24 15-45-18

Test for #4267

image (1)

Screenshot from 2022-06-24 16-01-28

Test for #4235

Screenshot from 2022-06-24 16-10-30

Test for #4233

size

Test for #4237

Screenshot from 2022-06-24 16-19-01

Test for #4266

Screenshot from 2022-06-24 16-22-14

Test for #4253

Screenshot from 2022-06-24 16-24-41
Screenshot from 2022-06-24 16-24-27

Test for #4240

Screenshot from 2022-06-24 16-26-56
Screenshot from 2022-06-24 16-27-15

Test for #4264

Screenshot from 2022-06-24 16-31-49

@yenienserrano
Copy link
Member

Kibana 7.17.3 (X-Pack)

Test Chrome Safari Firefox Package
4244 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4261 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4239.1 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4239.2 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4239.3 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4267 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4254 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4235 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4233 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4237 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4266 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4253 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4240 🟒 ⚫ 🟒 4.3.5_7.17.3-1
4264 🟒 ⚫ 🟒 4.3.5_7.17.3-1

@yenienserrano
Copy link
Member

Kibana 7.17.2 (X-Pack)

Test Chrome Safari Firefox Package
4244 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4261 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4239.1 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4239.2 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4239.3 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4267 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4254 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4235 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4233 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4237 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4266 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4253 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4240 🟒 ⚫ 🟒 4.3.5_7.17.2-1
4264 🟒 ⚫ 🟒 4.3.5_7.17.2-1

@Desvelao
Copy link
Member

Desvelao commented Jun 27, 2022

Wazuh dashboard 4.3.5

Test Chrome Safari Firefox Package
4244 🟒 ⚫ 🟒 4.3.5-1
4261 🟒 ⚫ 🟒 4.3.5-1
4239.1 🟒 ⚫ 🟒 4.3.5-1
4239.2 🟒 ⚫ 🟒 4.3.5-1
4239.3 🟒 ⚫ 🟒 4.3.5-1
4267 🟒 ⚫ 🟒 4.3.5-1
4254 🟒 ⚫ 🟒 4.3.5-1
4235 🟒 ⚫ 🟒 4.3.5-1
4233 🟒 ⚫ 🟒 4.3.5-1
4237 🟒 ⚫ 🟒 4.3.5-1
4266 🟒 ⚫ 🟒 4.3.5-1
4253 🟒 ⚫ 🟒 4.3.5-1
4240 🟒 ⚫ 🟒 4.3.5-1
4264 🟒 ⚫ 🟒 4.3.5-1
4244

image

4261

image
image

4239.1

image
image

4239.2

image
image

4239.3

image
image

4267

image
image

4254

image

4235

image

4233

image

4237

image

4266

image

4253

image

4240

image
image

4264

image
image

@AlexRuiz7
Copy link
Member Author

Testing done. No problems found.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants