-
-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pre-work Checklist: DevOps-Security-Member: drakeredwind01 #36
Comments
look for prerequisites needs a new title and the template needs real prerequisites introWe are looking forward to having you on our team. Please ensure you have prior experience with the HfLA website team before contributing to our repository. features
prerequisites
Action Items
AWS
AWS IAM new user^ part of Getting Started With AWS Cloud | Step-by-Step Guide
AWS CLIHFLA note: maybe this process can be skipped using the following code in cloudshell or local
aws iam create-user --user-name drakeredwind01
aws iam create-login-profile --user-name drakeredwind01 --password Black2BlackHFLA
aws iam create-access-key --user-name drakeredwind01 > drakeredwind01_access_key.json
nano drakeredwind01_access_key.json ^ part of Getting Started With AWS Cloud | Step-by-Step Guide
AWS CLI quick quideaws iam create-group --group-name AdminGroup
aws iam create-user --user-name drakeredwind01
aws iam create-login-profile --user-name drakeredwind01 --password Black2BlackHFLA
aws iam add-user-to-group --group-name AdminGroup --user-name drakeredwind01
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AdministratorAccess --group-name AdminGroup
aws iam create-access-key --user-name drakeredwind01 > drakeredwind01_access_key.json
nano drakeredwind01_access_key.json
|
@drakeredwind01 please make a new issue that outlines the problem like you have done in this issue... but that is specific to the changes that you are suggesting. that way, we can give your issue (this one) back to you and still have an issue specifically for updating the prework template. |
@ExperimentsInHonesty Please let me know if you would prefer to have play-by-play issues instead of final, concrete suggested changes and an overall example, which is what this current method would ultimately provide. I can see the merits of both methods. |
@drakeredwind01 please document all the changes you are suggesting in a comment on this issue. |
zz Pre-work Checklist DevOps-Security-Member drakeredwind01 #3620240626T182821Z Made from Issue: Pre-work Template - DevOps-Security Slack ops channel issue and possible solutions
I think the important part is:
Possible solution:
Extra advice:
AWS supportconnectria
AWS Support plans
|
QUEST COMPLETED! |
Please provide update
|
Just complexly finished the prework checklist and altered the "aws-users.tf" file and pushed, and created a merge request for approval successfully. I am also searching for more CloudShell commands to integrate a more programmatic process for newer members to enhance the cohesion process. |
|
Prerequisite
We are looking forward to having you on our team. Please ensure you have prior experience with the HfLA website team before contributing to our repository.
Overview
As a new member on the HfLA devops-security team, fill in the following fields as you complete each onboarding item.
Special Notes
Action Items
Before starting to work on the below instructions, make sure to join the #ops Slack Channel. And are a member of
devops-security
repository.Self-assign this issue (gear in right side panel).
Add this issue to the Project Board under the Projects section (gear in right side panel).
Attend weekly team meeting, Wednesdays 6-8pm PST.
Complete the steps in Creating a personal AWS account and Login as root user & setup MFA.
Read and follow the instructions in Setting up IAM and AWS CLI for:
AdministratorAccess
policy to IAM groupComplete the instructions in AWS Documentation and choose your operating system to install AWS CLI.
Complete the instruction in AWS Documentation to setup the AWS CLI.
Read follow the instructions in Creating a backend state.
Install Terraform locally by following the instructions of the installation guide mentioned in Installing Terraform
Install Terraform Docs locally by following the instructions of the installation guide mentioned in Installing Terraform docs
Complete the instructions in Clone the repository
Submit a new request to create new AWS user account and then self-assign this issue.
Create a new branch from main by executing the command
Navigate to the
aws-user.tf
file and add your user information and follow the below template.In your code editor navigate to
terraform
directory.cd terraform
Execute the command
terraform init
to initialize terraform in the directory. Address any failures that arise (if any).Execute the command
terraform plan
this will output a plan replicating the same IAM resources as the devops security account. Address any failures that arise (if any).Then execute the command
terraform apply
this will create all of the resources that are currently managed by Devops Security. All of the resources created here incur zero cost except for the Dynamo DB installation, which should remain in the free tier.- [ ] ** If you have cost concerns, Run a Terraform Destroy to take down all of the resources you created (don't worry, you can recreate them just as quickly). **
Once you have tested your changes, stage them in git with
git status
command.git add path/to/file
(you can copy from above output for the file path).Commit the changes by executing
git commit -m "briefly describing the changes"
.Push the changes with
git push --set-upstream origin name-of-branch
The text was updated successfully, but these errors were encountered: