-
-
Notifications
You must be signed in to change notification settings - Fork 12
Pre-work Checklist: DevOps-Security-Member: Mike Waggoner #77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
prework checklists need to be made by the person, not the lead. I am closing this issue as unplanned. |
Notable changes for peer review:
|
@here changing your username is fine but please try to figure out a workaround for updating my role - I do need the ops-leads role :) |
@here It looks like @ale210 asked for a change to your PR #92 (review) on 2025-01-22. Will you be making the change or should close the PR? |
p.s. if you are staying, please add a role label that matches your skill you are working on here, or let us know if no roles match, what you would like to have. |
Please do this
|
closing this issue as abandoned |
Thank you! |
Prerequisite
We are looking forward to having you on our team. Please ensure you have prior experience with the HfLA website team before contributing to our repository.
Overview
As a new member on the HfLA devops-security team, fill in the following fields as you complete each onboarding item.
Special Notes
Action Items
Before starting to work on the below instructions, make sure to join the #ops Slack Channel. And are a member of
devops-security
repository.Self-assign this issue (gear in right side panel).
Add this issue to the Project Board CoP: DevOps: Project Board - under the Projects section (gear in right side panel).
Attend weekly team meeting, Wednesdays 6-8pm PST.
Complete the steps in Creating a personal AWS account and Login as root user & setup MFA.
Read and follow the instructions in Setting up IAM and AWS CLI for:
AdministratorAccess
policy to IAM groupComplete the instructions in AWS Documentation and choose your operating system to install AWS CLI.
Complete the instruction in AWS Documentation to setup the AWS CLI.
Follow the instructions in Creating a backend state to create the S3 bucket and DynamoDB table.
Install Terraform locally by following the instructions of the installation guide mentioned in Installing Terraform
Install Terraform Docs locally by following the instructions of the installation guide mentioned in Installing Terraform docs
Complete the instructions in Clone the repository
Submit a new request to create new AWS user account and then self-assign this issue.
Create a new branch from main by executing the command
Navigate to the
aws-user.tf
file and add your user information to the end of the file following the below template.In your code editor navigate to
terraform
directory.cd terraform
Note: You must be authenticated to your AWS account via the CLI for the next commands to work. The above instructions for setting up the CLI will guide you through this process. To check to see if you are authenticated, run
aws sts get-caller-identity
. You should get a response like:If you are unable to authenticate from your local machine using the CLI, post in the #ops channel in Slack so that the team can help you get unblocked.
terraform init
to initialize terraform in the directory. Address any failures that arise (if any).terraform plan
this will output a plan replicating the same IAM resources as the devops security account. Address any failures that arise (if any).terraform apply
this will create all of the resources that are currently managed by Devops Security. All of the resources created here incur zero cost except for the Dynamo DB installation, which should remain in the free tier. **terraform-docs -c .terraform.docs.yml .
git status
command.git add path/to/file
(you can copy from above output for the file path).git commit -m "brief description of changes"
.git push --set-upstream origin name-of-branch
The text was updated successfully, but these errors were encountered: