Details
-
Type:
Task
-
Status: Closed (View Workflow)
-
Priority:
Major
-
Resolution: Done
-
Affects Version/s: None
-
Fix Version/s: None
-
Labels:None
-
Story Points:0.4
-
Epic Link:
-
Sprint:Spring 6 : 30 Mar to Apr 10, Spring 7 : 13 Apr to 24 Apr, Spring 8 : 24 Apr to 8 May
Description
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. In addition, the app store EC2's private IP address must also be added to the RDS host's security group.
Currently, this has to be done manually when provisioning the control node.
For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group?
Note: When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host.
Attachments
Activity
| Field | Original Value | New Value |
|---|---|---|
| Epic Link | IGBF-1388 [ 17463 ] |
| Rank | Ranked higher |
| Sprint | Spring 5 : 30 Mar to Apr 10 [ 91 ] |
| Description |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. Currently, this has to be done before the playbooks can be run. For this task, investigate what would be required to automate this step. Can this be added as a new task to the file: * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml Challenges: * When adding a new inbound rule to the security group, we should assign a description to it. The description should be "Ansible Control Node" or something similar so that we can easily recognize it when inspecting security groups for the RDS host. |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. Currently, this has to be done before the playbooks can be run. For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group? * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml Challenges: * When adding a new inbound rule to the security group, we should assign a description to it. The description should be "Ansible Control Node" or something similar so that we can easily recognize it when inspecting security groups for the RDS host. |
| Rank | Ranked higher |
| Description |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. Currently, this has to be done before the playbooks can be run. For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group? * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml Challenges: * When adding a new inbound rule to the security group, we should assign a description to it. The description should be "Ansible Control Node" or something similar so that we can easily recognize it when inspecting security groups for the RDS host. |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. Currently, this has to be done before the playbooks can be run. For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group? * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml Challenges: * When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host. |
| Description |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. Currently, this has to be done before the playbooks can be run. For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group? * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml Challenges: * When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host. |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. Currently, this has to be done before the playbooks can be run. For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group? * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host. |
| Status | To-Do [ 10305 ] | In Progress [ 3 ] |
| Status | In Progress [ 3 ] | To-Do [ 10305 ] |
| Assignee | Chester Dias [ cdias1 ] |
| Status | To-Do [ 10305 ] | In Progress [ 3 ] |
| Assignee | Ann Loraine [ aloraine ] |
| Status | In Progress [ 3 ] | Needs 1st Level Review [ 10005 ] |
| Assignee | Ann Loraine [ aloraine ] | Chester Dias [ cdias1 ] |
| Sprint | Spring 6 : 30 Mar to Apr 10 [ 91 ] | Spring 6 : 30 Mar to Apr 10, Spring 7 : 13 Apr to 24 Apr [ 91, 92 ] |
| Rank | Ranked higher |
| Attachment | output.txt [ 14692 ] |
| Description |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. Currently, this has to be done before the playbooks can be run. For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group? * appstore-playbooks/Ansible/roles/deployRDS/task/main.yml When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host. |
Ansible control node needs to run database management commands on the RDS host used by app store instances.
To enable this, the control node's private IP address must be added to the RDS host's security group. In addition, the app store EC2's private IP address must also be added to the RDS host's security group. Currently, this has to be done manually when provisioning the control node. For this task, investigate what would be required to automate this step. Could we include the task of adding the control node's private IP address to the RDS's security group? Note: When adding a new inbound rule to the security group, we should assign a description to it. Please use the "Name" tag of the Ansible Control node in the description assigned to the inbound rule so that we can easily recognize it when inspecting security groups for the RDS host. |
| Comment | [ Output of the playbook (on my system) is attached. ] |
| Comment | [ Note: rds.yml is committed to the above branch. ] |
| Status | Needs 1st Level Review [ 10005 ] | First Level Review in Progress [ 10301 ] |
| Assignee | Chester Dias [ cdias1 ] | Ann Loraine [ aloraine ] |
| Assignee | Ann Loraine [ aloraine ] | Chester Dias [ cdias1 ] |
| Status | First Level Review in Progress [ 10301 ] | To-Do [ 10305 ] |
| Assignee | Chester Dias [ cdias1 ] | Ann Loraine [ aloraine ] |
| Status | To-Do [ 10305 ] | In Progress [ 3 ] |
| Status | In Progress [ 3 ] | Needs 1st Level Review [ 10005 ] |
| Status | Needs 1st Level Review [ 10005 ] | First Level Review in Progress [ 10301 ] |
| Status | First Level Review in Progress [ 10301 ] | Needs 1st Level Review [ 10005 ] |
| Status | Needs 1st Level Review [ 10005 ] | First Level Review in Progress [ 10301 ] |
| Status | First Level Review in Progress [ 10301 ] | Ready for Pull Request [ 10304 ] |
| Status | Ready for Pull Request [ 10304 ] | Pull Request Submitted [ 10101 ] |
| Status | Pull Request Submitted [ 10101 ] | Reviewing Pull Request [ 10303 ] |
| Status | Reviewing Pull Request [ 10303 ] | Merged Needs Testing [ 10002 ] |
| Assignee | Ann Loraine [ aloraine ] |
| Sprint | Spring 6 : 30 Mar to Apr 10, Spring 7 : 13 Apr to 24 Apr [ 91, 92 ] | Spring 6 : 30 Mar to Apr 10, Spring 7 : 13 Apr to 24 Apr, Spring 8 : 24 Apr to 8 May [ 91, 92, 93 ] |
| Rank | Ranked higher |
| Status | Merged Needs Testing [ 10002 ] | Post-merge Testing In Progress [ 10003 ] |
| Resolution | Done [ 10000 ] | |
| Status | Post-merge Testing In Progress [ 10003 ] | Closed [ 6 ] |
| Assignee | Ann Loraine [ aloraine ] |
Un-assigning this for now as this task should be done after we finalize workflow for setting up the control node.