Finalize Setup

Introduction

In this section we’ll verify the setup steps you performed and confirm that data is being collected by the different agents you deployed.


Verify AppDynamics Agents

  Use the steps below in your Cloud9 IDE to find your login details for the AppDynamics controller.

  1. On the right-hand navigation tree expand the ‘environment/workshop’ directory
  2. Double-click on the ‘workshop-user-details.txt’ file to open it
  3. Use the ‘Controller URL’ in the file to navigate to the AppDynamics controller in your browser

image

  Enter the Account, Username, and Password found in the file to login to the AppDynamics controller.

image

  Use the steps below to navigate to your TeaStore application.

  1. Click on the ‘Applications’ tab on the top menu
  2. Find your TeaStore application with your lab number in the name and click on its name to open it

image

  Use the steps below to verify that Tiers & Nodes are registering with the controller.

  1. Click on the ‘Tiers & Nodes’ tab on the left menu
  2. Click on the Grid View button
  3. Check to validate that 6 nodes have registered
  4. Click on the Refresh button until you see all 6 nodes

If you don’t see all 6 nodes within ~5 minutes you can move on to the next verification steps and come back after that to check that all 6 nodes have registered.

image

  Use the steps below to verify that the Cluster Agents are registering with the controller.

  1. Click on the ‘Servers’ tab on the top menu
  2. Click on the ‘Clusters’ tab on the left menu
  3. Type in appd-teastore-fso-lab-{your-lab-number} in the search box
  4. Verify that you see 2 Cluster Agents, one for EKS and one for IKS

image


Configure Secure Application Policy

  Use the steps in the previous exercise to navigate to the TeaStore application with your lab number in the name in the AppDynamics controller.

  1. The application should open on the ‘Application Dashboard’ tab
  2. Now click on the ‘Security Health’ link to open the Secure Application UI

image

  Create a new Policy in Secure Application by using the steps below.

  1. Click on the ‘Gear’ icon on the far right of the top menu
  2. Then select ‘Policies’ from the drop-down menu

image

  Enter the details of the new Policy by using the steps below.

  1. Now click on the ‘Create New Policy’ button on the right
  2. Select Network or socket access (NETWORK)
  3. Type in fso-lab-{your-lab-number} in the ‘Application’ box and select your TeaStore Application from the drop-down
    • Example: fso-lab-01
  4. The ‘Tier’ field should be set to All
  5. The ‘Default Action’ field should be set to Detect
  6. In the ‘Rules’ area:
    • Click the + Rule link to add a new rule
    • Select stack trace and contains in the first two fields
    • Enter the string org.apache.logging.log4j.core.lookup.JndiLookup.lookup in the third field
    • Select Block in the fourth field
  7. Click on the Save button

image

  Click on the Save button to confirm you want to create the Block policy.

image


Deploy Log4Shell Exploit

  Use the commands below to deploy a small application that will exploit the Log4Shell vulnerability within the TeaStore application.

cd /opt/fso-lab-devops/provisioners/scripts/common

./deploy_teastore_log4shell_vulnerability_to_kubernetes.sh

The output should look like the image below.

image


Verify IWO Collectors

  Use the credentials for Cisco Intersight provided by your instructor to login to Intersight if you’ve been logged out.

  1. Click on the drop-down menu on the left at the top
  2. Select ‘Workload Optimizer’ from the drop-down menu
  3. Find the Business Application that has your lab number in the name and verify it is in the list
  4. If needed click the ‘Show All’ link to find your Business Application and verify it is in the list

image


Next  

Let’s find out what’s next!