Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-06-10 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:  closed
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
-+
Changes (by hiro):

 * status:  needs_information => closed
 * resolution:   => fixed


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-28 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by phw):

 * parent:  #30152 =>


Comment:

 Removing the parent (because we are already monitoring our anti-censorship
 infrastructure).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-28 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by phw):

 Replying to [comment:24 hiro]:
 > I think this does it:
 https://grafana2.torproject.org/d/TVZiAIRGz/bridges?orgId=1
 [[br]]
 This looks good, thanks hiro.

 In the meanwhile, we've set up a monit instance on my VPS, which is now
 monitoring all of our anti-censorship infrastructure. Frankly, this works
 better for us than prometheus: it's simple, effective, and we control it.
 There's some merit in having prometheus monitor our infrastructure but
 given that the sysadmin team is stretched thin, I'm inclined to close this
 ticket as a "wontfix".

 Thoughts?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-12 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 I think this does it:
 https://grafana2.torproject.org/d/TVZiAIRGz/bridges?orgId=1

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-11 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 Ok I see the tcp connect at 0. So that's probably a good indicator in this
 case. Not the others.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-11 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 This is what I see on prometheus:
 https://grafana2.torproject.org/d/NgEq8C0Zz/blackbox-exporter?orgId=1
 blackboxes=All=146.57.248.225:22=5s

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-08 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by phw):

 Replying to [comment:20 hiro]:
 > Hi all,
 > I think this is now working: https://grafana2.torproject.org/d/6shXNz6Wz
 /blackbox-target-availability?orgId=1
 > Can you please confirm?
 [[br]]
 Hi hiro! Hmm, 146.57.248.225:22 is shown as online but it's currently
 offline (its port times out and it doesn't respond to pings).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-08 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 Hi all,
 I think this is now working: https://grafana2.torproject.org/d/6shXNz6Wz
 /blackbox-target-availability?orgId=1
 Can you please confirm?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-06 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-may  |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by hiro):

 * keywords:  tpa-roadmap-february tpa-roadmap-march => tpa-roadmap-may


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-05-06 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 Hi phw.
 I see the hosts online on prometheus. I think the issue is that those
 targets are checking http/https connectivity.
 The blackbox exporter I had configured instead goes on general TCP
 connectivity. Here is an example where the host is clearly online:
 https://grafana2.torproject.org/d/NgEq8C0Zz/blackbox-exporter?orgId=1
 blackboxes=All=216.252.162.21:46089=5s
 Let me see if I can check how those plugin on grafana can monitor TCP and
 not just http/s.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-04-27 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by phw):

 * status:  needs_review => needs_information


Comment:

 Replying to [comment:16 hiro]:
 > I am ok with this if people are happy with the result. I will add it to
 puppet.
 [[br]]
 The blackbox-target-availability plugin looks great and solves this
 problem. However, our default bridges aren't all down (only 146.57.248.225
 is, as of 2020-04-27), so there seems to be an error with the blackbox
 exporter?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-04-27 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 I am ok with this if people are happy with the result. I will add it to
 puppet.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-04-27 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by anarcat):

 * status:  needs_information => needs_review


Comment:

 this is indeed a complex panel to create! i managed to make one using
 "singlestat" - I couldn't figure how to make the "alert list" thing work -
 but it's kind of clunky:

 https://grafana2.torproject.org/d/fC77Nk6Wz/blackbox-probe-state

 now after asking on #prometheus (freenode), i was told there's a Granafa
 plugin specifically for that purpose. it's really heavy on the Javascript,
 but it seems to actually work and provide a much better visualization.
 here's the dashboard I created with the plugin:

 https://grafana2.torproject.org/d/6shXNz6Wz/blackbox-target-availability

 the plugin is:

 https://grafana.com/grafana/plugins/flant-statusmap-panel/installation

 i installed it with:

 {{{
 sudo -u grafana grafana-cli plugins install flant-statusmap-panel
 service grafana-server stop
 service grafana-server start
 }}}

 ... which needs to be added into Puppet if we're happy with the results.

 let me know how that looks for you.

 (and yes, it does seem like all blackbox targets except bridges.tpo are
 down.)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-03-25 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by phw):

 * status:  assigned => needs_information


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-03-18 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by phw):

 Replying to [comment:12 hiro]:
 > This is all configured now. It is quite quick for us to add targets and
 as I mentioned maybe we can give up on using puppet for this and just give
 you the opportunity to edit the configuration file directly. Let's see how
 it goes.
 [[br]]
 Thanks!

 I took a look at the Grafana dashboard and found it difficult to interpret
 the data. For example, 146.57.248.225:22 is currently offline and the
 panels don't reveal that. I understand that one can add panels (I think I
 would like an "Alert List") but I'm struggling with creating one.

 I would like something similar to the following UI. Is this something you
 can help with?

 [[Image(mmonit.png, 70%)]]

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-03-18 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by phw):

 * Attachment "mmonit.png" added.

 mmonit Web UI

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-03-18 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 Hi phw,
 This is all configured now. It is quite quick for us to add targets and as
 I mentioned maybe we can give up on using puppet for this and just give
 you the opportunity to edit the configuration file directly. Let's see how
 it goes.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-03-17 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by phw):

 Replying to [comment:10 hiro]:
 > I can give you access to the machine and we can think a way to do this,
 but it would be better if you could pass me the targets and I add them on
 puppet directly. How does that sound?
 [[br]]
 Hmm, ok.  Note that the entire reason for filing #32679 was that I wanted
 our team to have control over the list of monitoring targets, so we don't
 have to block on others.  But we can go with your plan for now and see how
 it goes.

 The list of default bridges is available in a table on
 [https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/DefaultBridges
 this wiki page]. Please ignore the two last rows in the table, 0.0.2.0:2
 and 0.0.3.0:1. These are two pseudo IP addresses.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-03-04 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 I can give you access to the machine and we can think a way to do this,
 but it would be better if you could pass me the targets and I add them on
 puppet directly. How does that sound?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-02-12 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Old description:

> In the anti-censorship team we currently monitor
> [https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/InfrastructureMonitoring
> several services] with sysmon.  We recently discovered that sysmon
> doesn't seem to follow HTTP 301 redirects. This means that if a web
> service dies but the 301 redirect still works (e.g., BridgeDB is dead but
> its apache reverse proxy still works), sysmon won't notice.
>
> Now that prometheus is running, we should fill this monitoring gap by
> testing the following web sites:
>
> * https://bridges.torproject.org
> * https://snowflake.torproject.org
> * https://gettor.torproject.org
>
> Our test should ensure that these sites serve the content we expect,
> e.g., make sure that bridges.tp.o contains the string "BridgeDB" in its
> HTML. Testing the HTTP status code does not suffice: if BridgeDB is down,
> the reverse proxy may still respond.
>
> I wonder if prometheus could also help us with #12802 by sending an email
> to bridges@tp.o and making sure that it responds with at least one
> bridge?
>
> Checklist:
>
>  1. [ ] monitor services in Nagios: BridgeDB, Snowflake, and GetTor
>  2. [ ] deploy Prometheus's "​blackbox exporter" for default bridges,
> which are external services
>  3. [ ] delegate to (and train) the anti-censorship team the blackbox
> exporter configuration
>  3. [ ] experiment with Prometheus's "alertmanager", which can send
> notifications if a monitoring target goes offline
>  4. [ ] grant the anti-censorship team access to Prometheus's grafana
> dashboard.

New description:

 In the anti-censorship team we currently monitor
 
[https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/InfrastructureMonitoring
 several services] with sysmon.  We recently discovered that sysmon doesn't
 seem to follow HTTP 301 redirects. This means that if a web service dies
 but the 301 redirect still works (e.g., BridgeDB is dead but its apache
 reverse proxy still works), sysmon won't notice.

 Now that prometheus is running, we should fill this monitoring gap by
 testing the following web sites:

 * https://bridges.torproject.org
 * https://snowflake.torproject.org
 * https://gettor.torproject.org

 Our test should ensure that these sites serve the content we expect, e.g.,
 make sure that bridges.tp.o contains the string "BridgeDB" in its HTML.
 Testing the HTTP status code does not suffice: if BridgeDB is down, the
 reverse proxy may still respond.

 I wonder if prometheus could also help us with #12802 by sending an email
 to bridges@tp.o and making sure that it responds with at least one bridge?

 Checklist:

  1. [ ] monitor services in Nagios: BridgeDB, Snowflake, and GetTor
  2. [ ] deploy Prometheus's "​blackbox exporter" for default bridges,
 which are external services
  3. [ ] delegate to (and train) the anti-censorship team the blackbox
 exporter configuration
  3. [ ] experiment with Prometheus's "alertmanager", which can send
 notifications if a monitoring target goes offline
  4. [X] grant the anti-censorship team access to Prometheus's grafana
 dashboard.

--

Comment (by phw):

 Replying to [comment:8 hiro]:
 > Hi,
 > This is now available here: https://prometheus2.torproject.org/targets
 > Grafana: https://grafana2.torproject.org/d/NgEq8C0Zz/blackbox-
 exporter?orgId=1
 > I'll share the password separately.
 [[br]]
 Thanks! I checked the grafana box on our todo list in the ticket
 description because we now have access to it.

 I see that BridgeDB is already being monitored. Are we able to add our own
 targets to Prometheus?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-02-06 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 Hi,
 This is now available here: https://prometheus2.torproject.org/targets
 Grafana: https://grafana2.torproject.org/d/NgEq8C0Zz/blackbox-
 exporter?orgId=1
 I'll share the password separately.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-02-03 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february tpa-roadmap-|  Actual Points:
  march  |
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by gaba):

 * keywords:  tpa-roadmap-february => tpa-roadmap-february tpa-roadmap-march


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2020-01-27 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tpa-roadmap-february |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by gaba):

 * keywords:   => tpa-roadmap-february


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2019-12-18 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  hiro
 Type:  task | Status:
 |  assigned
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by anarcat):

 * owner:  tpa => hiro
 * status:  new => assigned


Old description:

> In the anti-censorship team we currently monitor
> [https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/InfrastructureMonitoring
> several services] with sysmon.  We recently discovered that sysmon
> doesn't seem to follow HTTP 301 redirects. This means that if a web
> service dies but the 301 redirect still works (e.g., BridgeDB is dead but
> its apache reverse proxy still works), sysmon won't notice.
>
> Now that prometheus is running, we should fill this monitoring gap by
> testing the following web sites:
>
> * https://bridges.torproject.org
> * https://snowflake.torproject.org
> * https://gettor.torproject.org
>
> Our test should ensure that these sites serve the content we expect,
> e.g., make sure that bridges.tp.o contains the string "BridgeDB" in its
> HTML. Testing the HTTP status code does not suffice: if BridgeDB is down,
> the reverse proxy may still respond.
>
> I wonder if prometheus could also help us with #12802 by sending an email
> to bridges@tp.o and making sure that it responds with at least one
> bridge?

New description:

 In the anti-censorship team we currently monitor
 
[https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/InfrastructureMonitoring
 several services] with sysmon.  We recently discovered that sysmon doesn't
 seem to follow HTTP 301 redirects. This means that if a web service dies
 but the 301 redirect still works (e.g., BridgeDB is dead but its apache
 reverse proxy still works), sysmon won't notice.

 Now that prometheus is running, we should fill this monitoring gap by
 testing the following web sites:

 * https://bridges.torproject.org
 * https://snowflake.torproject.org
 * https://gettor.torproject.org

 Our test should ensure that these sites serve the content we expect, e.g.,
 make sure that bridges.tp.o contains the string "BridgeDB" in its HTML.
 Testing the HTTP status code does not suffice: if BridgeDB is down, the
 reverse proxy may still respond.

 I wonder if prometheus could also help us with #12802 by sending an email
 to bridges@tp.o and making sure that it responds with at least one bridge?

 Checklist:

  1. [ ] monitor services in Nagios: BridgeDB, Snowflake, and GetTor
  2. [ ] deploy Prometheus's "​blackbox exporter" for default bridges,
 which are external services
  3. [ ] delegate to (and train) the anti-censorship team the blackbox
 exporter configuration
  3. [ ] experiment with Prometheus's "alertmanager", which can send
 notifications if a monitoring target goes offline
  4. [ ] grant the anti-censorship team access to Prometheus's grafana
 dashboard.

--

Comment:

 awesome summary, thanks. i turned that into a checklist and assigned the
 ticket to hiro who, I think, will handle followup on this. hiro, let me
 know if you need help or if any of this is incorrect...

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2019-12-17 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  tpa
 Type:  task | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by phw):

 I closed #32679 as a duplicate of this ticket. Here's a brief summary of
 what we concluded in #32679:
 * We will use Nagios for internal services: BridgeDB, Snowflake, and
 GetTor.
 * We will use Prometheus's
 "[https://github.com/prometheus/blackbox_exporter#prometheus-configuration
 blackbox exporter]" for default bridges, which are external services.
 * Our admins will handle our Nagios config and the anti-censorship team
 will handle Prometheus's black box exporter.
 * We will experiment with Prometheus's "alertmanager", which can send
 notifications if a monitoring target goes offline.
 * The anti-censorship team will also get access to Prometheus's grafana
 dashboard.

 For Nagios, here are our monitoring targets:
 * https://bridges.torproject.org (the page should contain the string "What
 are bridges?")
 * https://gettor.torproject.org (the page should contain the string "What
 is GetTor?")
 * https://snowflake.torproject.org (the page should contain the string
 "Snowflake is a system")
 * https://snowflake-broker.torproject.net/debug (the page should contain
 the string "available")
 * ~~gettor-01.torproject.org (the service should respond to emails; hiro
 already worked on this)~~

 Note that the strings that should be present in the respective pages are
 mere suggestions. Ultimately, we just need a test that guarantees that
 these pages are correctly serving content.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2019-08-13 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  tpa
 Type:  task | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by anarcat):

 Replying to [comment:2 phw]:
 > Replying to [comment:1 hiro]:
 > > There is also another aspect to consider, in the case of a service
 like gettor, monitoring the https endpoint will only give us some info
 about the static html we are serving with apache. Gettor itself (the
 service sending emails) is a twisted service instead.
 > [[br]]
 > Gotcha. We have a similar problem with BridgeDB because it is exposed
 over an Apache reverse proxy and you cannot directly talk to BridgeDB.
 However, if BridgeDB is down, bridges.torproject.org responds with an
 internal server error if I remember correctly, so we can still monitor
 BridgeDB despite the reverse proxy, right?

 Should, yes.

 > To monitor BridgeDB, we need to set up an exporter, right?

 In Prometheus, yes. This could be a simple configuration in a "blackbox
 exporter":

 https://github.com/prometheus/blackbox_exporter/

 > > Maybe we can consider an approach in which services expose an http
 endpoint that we can use to know that the service is alive. Otherwise I
 think we could do some other monitoring via nagios checks.
 >
 > I think we already have that for BridgeDB and snowflake's website but
 not for GetTor.

 From what I can tell, we check bridges.torproject.org:

 {{{
   -
 name: bridges.tpo web service
 nrpe: "/usr/lib/nagios/plugins/check_http -H bridges.torproject.org -S
 --string=bridge"
 hosts: polyanthum
 depends: network service - https
 }}}

 We also check onionoo:

 {{{
  # non-tpa services
  
   -
 name: network service - onionoo backend
 nrpe: "/usr/lib/nagios/plugins/tor-check-onionoo 127.0.0.1:8080"
 hostgroups: onionoo-backend
 depends: "process - haproxy - master"
 contacts: +metrics
   -
 name: network service - onionoo varnish
 nrpe: "/usr/lib/nagios/plugins/tor-check-onionoo 127.0.0.1:6081"
 hostgroups: onionoo-backend
 depends: "process - haproxy - master"
 contacts: +metrics
   -
 name: network service - onionoo haproxy
 nrpe: "/usr/lib/nagios/plugins/tor-check-onionoo -s
 onionoo.torproject.org"
 hostgroups: onionoo-backend
 depends: "process - haproxy - master"
 contacts: +metrics
 }}}

 ... but those are all TPA machines, so they can be monitored by Nagios.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2019-08-12 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  tpa
 Type:  task | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by phw):

 Replying to [comment:1 hiro]:
 > There is also another aspect to consider, in the case of a service like
 gettor, monitoring the https endpoint will only give us some info about
 the static html we are serving with apache. Gettor itself (the service
 sending emails) is a twisted service instead.
 [[br]]
 Gotcha. We have a similar problem with BridgeDB because it is exposed over
 an Apache reverse proxy and you cannot directly talk to BridgeDB.
 However, if BridgeDB is down, bridges.torproject.org responds with an
 internal server error if I remember correctly, so we can still monitor
 BridgeDB despite the reverse proxy, right?

 To monitor BridgeDB, we need to set up an exporter, right?
 [[br]]
 > Maybe we can consider an approach in which services expose an http
 endpoint that we can use to know that the service is alive. Otherwise I
 think we could do some other monitoring via nagios checks.
 [[br]]
 I think we already have that for BridgeDB and snowflake's website but not
 for GetTor.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2019-07-24 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+-
 Reporter:  phw  |  Owner:  tpa
 Type:  task | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:  #30152   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by hiro):

 Hi,

 There are a few things about what you are asking that we might be able to
 do with prometheus, and some others that we can't do at the moment.

 Like we cannot semd an email and parsing the result because Prometheus
 scrapes http endpoints. Also we are not doing alerting yet, only
 monitoring.

 There is also another aspect to consider, in the case of a service like
 gettor, monitoring the https endpoint will only give us some info about
 the static html we are serving with apache. Gettor itself (the service
 sending emails) is a twisted service instead.

 Maybe we can consider an approach in which services expose an http
 endpoint that we can use to know that the service is alive. Otherwise I
 think we could do some other monitoring via nagios checks.

 More about what can be done on prometheus (and the instance I am setting
 up atm) on https://trac.torproject.org/projects/tor/ticket/29863 where we
 discuss the idea of monitoring disk space for snowflake.
 Also https://help.torproject.org/tsa/howto/prometheus/ for some more
 information.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31159 [Internal Services/Tor Sysadmin Team]: Monitor anti-censorship www services with prometheus

2019-07-14 Thread Tor Bug Tracker & Wiki
#31159: Monitor anti-censorship www services with prometheus
-+
 Reporter:  phw  |  Owner:  tpa
 Type:  task | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   |   Keywords:
Actual Points:   |  Parent ID:  #30152
   Points:  1|   Reviewer:
  Sponsor:   |
-+
 In the anti-censorship team we currently monitor
 
[https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/InfrastructureMonitoring
 several services] with sysmon.  We recently discovered that sysmon doesn't
 seem to follow HTTP 301 redirects. This means that if a web service dies
 but the 301 redirect still works (e.g., BridgeDB is dead but its apache
 reverse proxy still works), sysmon won't notice.

 Now that prometheus is running, we should fill this monitoring gap by
 testing the following web sites:

 * https://bridges.torproject.org
 * https://snowflake.torproject.org
 * https://gettor.torproject.org

 Our test should ensure that these sites serve the content we expect, e.g.,
 make sure that bridges.tp.o contains the string "BridgeDB" in its HTML.
 Testing the HTTP status code does not suffice: if BridgeDB is down, the
 reverse proxy may still respond.

 I wonder if prometheus could also help us with #12802 by sending an email
 to bridges@tp.o and making sure that it responds with at least one bridge?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs