Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
controller
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
TFS
controller
Merge requests
!93
Updated L3 components + scalability
Code
Review changes
Check out branch
Download
Patches
Plain diff
Merged
Updated L3 components + scalability
l3_scalability
into
develop
Overview
0
Commits
73
Pipelines
0
Changes
31
Merged
Lluis Gifre Renom
requested to merge
l3_scalability
into
develop
2 years ago
Overview
0
Commits
73
Pipelines
0
Changes
31
Expand
Migrated L3 Cybersecurity to TFS Release 2 architecture
Implemented creation of ACL rules when an attack is detected
Improved logic to load AI/ML model
Updated AI/ML model to detect cybersecurity attacks
Added new RPC method to inform the name of the features needs by the model
Added new RPC methods to allow exporting ACL rules created by AM to other components.
Added logic to measure performance of the L3 Cybersecurity framework
Implemented horizontal scalability in L3 Centralized Attack Detector and Attack Mitigator
Added Cybersecurity Grafana dashboard
Added Service Monitors to export metrics to Prometheus
Added multiple helper scripts
Multiple bug fixes and code cleanup
Edited
1 year ago
by
Lluis Gifre Renom
0
0
Merge request reports
Compare
develop
version 10
ab534a6d
1 year ago
version 9
033a8db0
1 year ago
version 8
167c74f1
1 year ago
version 7
f15ff137
1 year ago
version 6
b789ca04
1 year ago
version 5
e8bacda9
1 year ago
version 4
7d86e582
1 year ago
version 3
6d29832c
1 year ago
version 2
bb20847b
2 years ago
version 1
4cec8a5e
2 years ago
develop (base)
and
latest version
latest version
66135558
73 commits,
1 year ago
version 10
ab534a6d
72 commits,
1 year ago
version 9
033a8db0
71 commits,
1 year ago
version 8
167c74f1
70 commits,
1 year ago
version 7
f15ff137
69 commits,
1 year ago
version 6
b789ca04
68 commits,
1 year ago
version 5
e8bacda9
66 commits,
1 year ago
version 4
7d86e582
63 commits,
1 year ago
version 3
6d29832c
62 commits,
1 year ago
version 2
bb20847b
61 commits,
2 years ago
version 1
4cec8a5e
59 commits,
2 years ago
31 files
+
2927
−
185
Side-by-side
Compare changes
Side-by-side
Inline
Show whitespace changes
Show one file at a time
Files
31
Search (e.g. *.vue) (Ctrl+P)
manifests/l3_attackmitigatorservice.yaml
+
59
−
0
Options
@@ -32,6 +32,7 @@ spec:
@@ -32,6 +32,7 @@ spec:
imagePullPolicy
:
Always
imagePullPolicy
:
Always
ports
:
ports
:
-
containerPort
:
10002
-
containerPort
:
10002
-
containerPort
:
9192
env
:
env
:
-
name
:
LOG_LEVEL
-
name
:
LOG_LEVEL
value
:
"
DEBUG"
value
:
"
DEBUG"
@@ -53,11 +54,69 @@ apiVersion: v1
@@ -53,11 +54,69 @@ apiVersion: v1
kind
:
Service
kind
:
Service
metadata
:
metadata
:
name
:
l3-attackmitigatorservice
name
:
l3-attackmitigatorservice
labels
:
app
:
l3-attackmitigatorservice
spec
:
spec
:
type
:
ClusterIP
type
:
ClusterIP
selector
:
selector
:
app
:
l3-attackmitigatorservice
app
:
l3-attackmitigatorservice
ports
:
ports
:
-
name
:
metrics
protocol
:
TCP
port
:
9192
targetPort
:
9192
-
name
:
grpc
-
name
:
grpc
port
:
10002
port
:
10002
targetPort
:
10002
targetPort
:
10002
---
apiVersion
:
autoscaling/v2
kind
:
HorizontalPodAutoscaler
metadata
:
name
:
l3-attackmitigatorservice-hpa
spec
:
scaleTargetRef
:
apiVersion
:
apps/v1
kind
:
Deployment
name
:
l3-attackmitigatorservice
minReplicas
:
1
maxReplicas
:
10
metrics
:
-
type
:
Resource
resource
:
name
:
cpu
target
:
type
:
Utilization
averageUtilization
:
80
behavior
:
scaleDown
:
stabilizationWindowSeconds
:
120
---
apiVersion
:
monitoring.coreos.com/v1
kind
:
ServiceMonitor
metadata
:
name
:
tfs-l3-attackmitigatorservice-metric
labels
:
app
:
l3-attackmitigatorservice
#release: prometheus
#release: prom # name of the release
# ( VERY IMPORTANT: You need to know the correct release name by viewing
# the servicemonitor of Prometheus itself: Without the correct name,
# Prometheus cannot identify the metrics of the Flask app as the target.)
spec
:
selector
:
matchLabels
:
# Target app service
#namespace: tfs
app
:
l3-attackmitigatorservice
# same as above
#release: prometheus # same as above
endpoints
:
-
port
:
metrics
# named port in target app
scheme
:
http
path
:
/metrics
# path to scrape
interval
:
5s
# scrape interval
namespaceSelector
:
any
:
false
matchNames
:
-
tfs
# namespace where the app is running
Loading