Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support Tool - Discussion & Specs #198

Closed
thebracket opened this issue Jan 16, 2023 · 1 comment
Closed

Support Tool - Discussion & Specs #198

thebracket opened this issue Jan 16, 2023 · 1 comment
Assignees
Milestone

Comments

@thebracket
Copy link
Collaborator

Since we're getting some popularity, we discussed in Matrix that it might be a good idea to have a support tool that gathers useful information and uploads it to us, so we can better help.

There's a lot of things to worry about here, so I'm hoping we can build up some comments to come up with a good, safe, open specification:

  • ShapedDevices.csv contains personally identifiable customer information - but it's also super useful for figuring out what's going on. I'd support sharing it, but with Circuit Name and Device Name scrambled in a one-way hash so that we (or anyone else who reads it) have no way of reversing it. We might anonymize IP addresses for the same reason.
  • Network.json is less personally identifying, but we should scramble the names - using the same one-way hash so that we can still tell that customers are linked (or not) to ShapedDevices - but with no way to say "oh, there's a tasty target"
  • It would be super helpful to grab CPU information, RAM information, Linux version information, NIC information, whether the system is in a VM. Any problems sharing that?
  • /etc/lqos - I don't see anything in there that isn't publicly shareable?
  • ispConfig.py - so this is really useful for diagnosing (especially with the other info), but requires a bunch of sanitization. We'd need to hide all the integration (UISP, influx, etc.) URLs and credentials; we don't want anyone handing out UISP access by mistake.
  • Dump recent usage data, unknown IPs? We'd have to anonymize the IP addresses, but I think it could be useful. A downside of anonymizing IPs is that we can't say "oh, your interfaces are the wrong way around".

I'm thinking that the tool should:

  • Be open source so anyone can build it themselves, and verify that we haven't added anything evil. I'd rather not ask everyone to just trust us.
  • Save a dump in a human-readable form, so you can look through and make sure we aren't taking any data we shouldn't. Again, nobody should have to trust us!
  • Provide an easy way to send the data to us once it's gathered and the user has made sure that we aren't stealing the keys to the kingdom.

Thoughts, everyone?

@dtaht dtaht added this to the v1.5 milestone Jan 16, 2023
@rchac rchac modified the milestones: v1.5 Beta, v1.6 May 30, 2024
@thebracket thebracket modified the milestones: v1.6, v1.5 Beta Jul 9, 2024
@thebracket thebracket self-assigned this Jul 9, 2024
@thebracket
Copy link
Collaborator Author

I'm closing this as "done", because we have a support tool that does this in 1.5 BETA 1.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants