Uploaded image for project: 'IGB'
  1. IGB
  2. IGBF-2307

Investigate: Configure playbooks to ensure control node's IP address is added to the security group for the RDS host

    Details

    • Type: Task
    • Status: Closed (View Workflow)
    • Priority: Major
    • Resolution: Done
    • Affects Version/s: None
    • Fix Version/s: None
    • Labels:
      None

      Description

      Ansible control node needs to run database management commands on the RDS host used by app store instances.

      To enable this, the control node's private IP address must be added to the RDS host's security group. In addition, the app store EC2's private IP address must also be added to the RDS host's security group.

      Currently, this has to be done manually when provisioning the control node.

      For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

      Note: When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host.

        Attachments

          Activity

          ann.loraine Ann Loraine made changes -
          Assignee Ann Loraine [ aloraine ]
          ann.loraine Ann Loraine made changes -
          Resolution Done [ 10000 ]
          Status Post-merge Testing In Progress [ 10003 ] Closed [ 6 ]
          ann.loraine Ann Loraine made changes -
          Status Merged Needs Testing [ 10002 ] Post-merge Testing In Progress [ 10003 ]
          ann.loraine Ann Loraine made changes -
          Rank Ranked higher
          ann.loraine Ann Loraine made changes -
          Sprint Spring 6 : 30 Mar to Apr 10, Spring 7 : 13 Apr to 24 Apr [ 91, 92 ] Spring 6 : 30 Mar to Apr 10, Spring 7 : 13 Apr to 24 Apr, Spring 8 : 24 Apr to 8 May [ 91, 92, 93 ]
          ann.loraine Ann Loraine made changes -
          Assignee Ann Loraine [ aloraine ]
          ann.loraine Ann Loraine made changes -
          Status Reviewing Pull Request [ 10303 ] Merged Needs Testing [ 10002 ]
          ann.loraine Ann Loraine made changes -
          Status Pull Request Submitted [ 10101 ] Reviewing Pull Request [ 10303 ]
          ann.loraine Ann Loraine made changes -
          Status Ready for Pull Request [ 10304 ] Pull Request Submitted [ 10101 ]
          ann.loraine Ann Loraine made changes -
          Status First Level Review in Progress [ 10301 ] Ready for Pull Request [ 10304 ]
          ann.loraine Ann Loraine made changes -
          Status Needs 1st Level Review [ 10005 ] First Level Review in Progress [ 10301 ]
          ann.loraine Ann Loraine made changes -
          Status First Level Review in Progress [ 10301 ] Needs 1st Level Review [ 10005 ]
          ann.loraine Ann Loraine made changes -
          Status Needs 1st Level Review [ 10005 ] First Level Review in Progress [ 10301 ]
          ann.loraine Ann Loraine made changes -
          Status In Progress [ 3 ] Needs 1st Level Review [ 10005 ]
          ann.loraine Ann Loraine made changes -
          Status To-Do [ 10305 ] In Progress [ 3 ]
          cdias1 Chester Dias (Inactive) made changes -
          Assignee Chester Dias [ cdias1 ] Ann Loraine [ aloraine ]
          cdias1 Chester Dias (Inactive) made changes -
          Status First Level Review in Progress [ 10301 ] To-Do [ 10305 ]
          cdias1 Chester Dias (Inactive) made changes -
          Assignee Ann Loraine [ aloraine ] Chester Dias [ cdias1 ]
          cdias1 Chester Dias (Inactive) made changes -
          Assignee Chester Dias [ cdias1 ] Ann Loraine [ aloraine ]
          cdias1 Chester Dias (Inactive) made changes -
          Status Needs 1st Level Review [ 10005 ] First Level Review in Progress [ 10301 ]
          ann.loraine Ann Loraine made changes -
          Comment [ Note: rds.yml is committed to the above branch. ]
          ann.loraine Ann Loraine made changes -
          Comment [ Output of the playbook (on my system) is attached. ]
          ann.loraine Ann Loraine made changes -
          Description Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group.

          Currently, this has to be done before the playbooks can be run.

          For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

          * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml

          When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host.
          Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group. In addition, the app store EC2's private IP address must also be added to the RDS host's security group.

          Currently, this has to be done manually when provisioning the control node.

          For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

          Note: When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host.
          ann.loraine Ann Loraine made changes -
          Attachment output.txt [ 14692 ]
          ann.loraine Ann Loraine made changes -
          Rank Ranked higher
          ann.loraine Ann Loraine made changes -
          Sprint Spring 6 : 30 Mar to Apr 10 [ 91 ] Spring 6 : 30 Mar to Apr 10, Spring 7 : 13 Apr to 24 Apr [ 91, 92 ]
          ann.loraine Ann Loraine made changes -
          Assignee Ann Loraine [ aloraine ] Chester Dias [ cdias1 ]
          ann.loraine Ann Loraine made changes -
          Status In Progress [ 3 ] Needs 1st Level Review [ 10005 ]
          ann.loraine Ann Loraine made changes -
          Assignee Ann Loraine [ aloraine ]
          ann.loraine Ann Loraine made changes -
          Status To-Do [ 10305 ] In Progress [ 3 ]
          ann.loraine Ann Loraine made changes -
          Assignee Chester Dias [ cdias1 ]
          ann.loraine Ann Loraine made changes -
          Status In Progress [ 3 ] To-Do [ 10305 ]
          ann.loraine Ann Loraine made changes -
          Epic Link IGBF-1388 [ 17463 ] IGBF-2323 [ 18477 ]
          cdias1 Chester Dias (Inactive) made changes -
          Status To-Do [ 10305 ] In Progress [ 3 ]
          ann.loraine Ann Loraine made changes -
          Description Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group.

          Currently, this has to be done before the playbooks can be run.

          For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

          * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml

          Challenges:

          * When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host.
          Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group.

          Currently, this has to be done before the playbooks can be run.

          For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

          * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml

          When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host.
          ann.loraine Ann Loraine made changes -
          Description Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group.

          Currently, this has to be done before the playbooks can be run.

          For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

          * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml

          Challenges:

          * When adding a new inbound rule to the security group, we should assign a description to it. The description should be "Ansible Control Node" or something similar so that we can easily recognize it when inspecting security groups for the RDS host.
          Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group.

          Currently, this has to be done before the playbooks can be run.

          For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

          * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml

          Challenges:

          * When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host.
          ann.loraine Ann Loraine made changes -
          Rank Ranked higher
          ann.loraine Ann Loraine made changes -
          Description Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group.

          Currently, this has to be done before the playbooks can be run.

          For this task, investigate what would be required to automate this step. Can this be added as a new task to the file:

          * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml

          Challenges:

          * When adding a new inbound rule to the security group, we should assign a description to it. The description should be "Ansible Control Node" or something similar so that we can easily recognize it when inspecting security groups for the RDS host.
          Ansible control node needs to run database management commands on the RDS host used by app store instances.

          To enable this, the control node's private IP address must be added to the RDS host's security group.

          Currently, this has to be done before the playbooks can be run.

          For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?

          * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml

          Challenges:

          * When adding a new inbound rule to the security group, we should assign a description to it. The description should be "Ansible Control Node" or something similar so that we can easily recognize it when inspecting security groups for the RDS host.
          ann.loraine Ann Loraine made changes -
          Sprint Spring 5 : 30 Mar to Apr 10 [ 91 ]
          ann.loraine Ann Loraine made changes -
          Rank Ranked higher
          ann.loraine Ann Loraine made changes -
          Field Original Value New Value
          Epic Link IGBF-1388 [ 17463 ]
          ann.loraine Ann Loraine created issue -

            People

            • Assignee:
              ann.loraine Ann Loraine
              Reporter:
              ann.loraine Ann Loraine
            • Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: