Advertisement
Guest User

Untitled

a guest
Oct 15th, 2019
123
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.73 KB | None | 0 0
  1. # General Infrastructure tasks
  2. Common requests that infrastructure handles
  3. ## Active Directory
  4. Varied account maintenance requests
  5. ### AWSPROD domain
  6. * add users and reset passwords (*passcore)
  7. * create groups for VPN
  8. ### AWSDEV domain
  9. * add users (passwords set to never expire but resets are still common because people forget them)
  10. ### Azure AD
  11. * very little so far
  12. ### Misc Servers
  13. * local users on a few non-domain joined servers
  14. ## Linux Admin
  15. * ssh key management
  16. * updates
  17. ## AWS
  18. The majority of requests which are mostly network related
  19. * Security groups
  20. * VPN access
  21. * VPN tunnels
  22. * IAM roles/policies
  23. * Whitelisting IPs for certain locked down resources like Admin reports (SSRS)
  24. * S3 file management (deploy-resources, etc)
  25. ## Gsuite
  26. * New user setup
  27. * SSO changes to IAM role mapping
  28. * Email group maintenance
  29. ## Billing Invoices
  30. So far
  31. * AWS
  32. * Google Cloud
  33. * Start Meeting
  34. * GoDaddy
  35. * MyGet
  36. ## Security Team
  37. A decent amount of requests come in from the security team
  38. * 'interesting' events
  39. * Technology walk throughs (AWS, GSuite, etc)
  40. * Pointing out potential issues infrastructure should take care of
  41. * Vulnerability testing (would like to see a weekly/monthly plan)
  42. ## Salt/Jenkins
  43. putting these in the same category as they are tightly coupled
  44. * plugin updates
  45. * salt-minion management add/remove/rename
  46. * state file updates
  47. * jenkins/salt code troubleshooting when a problem isn't application code related
  48. ## Monitoring
  49. internally generated by infra/qa team for the most part
  50. * Error analytics in New Relic that aren't well understood
  51. * Threshold alerts on monitored sites that aren't investigated
  52. * DataDog alerts (cpu/mem/disk and endpoint checking)
  53. ## Tool Access
  54. * New Relic
  55. * DataDog
  56. * ELK prod/non-prod
  57. ## ELK upgrades
  58. * beat agents (salt)
  59. * backend
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement