Open dougbu opened 1 year ago
from #379: we should remember to clean a few things up before downloading and executing run.sh
:
systemctl
entries and similar for Helix startuphelixbot
and helix-runner
users and the kvm
user groupthere's probably more to think about but this should be a fairly good start
@garath please copy 'n paste what you did for #379 or, if it was scripted, please check the script in somewhere that @riarenas and I can see
@dotnet/dnceng (aka @ilyas1974, @mmitche, @markwilkie, and everyone on Mark's team): Should we create a "Proactive security mitigation" milestone for compliance and security issues that are visible to us but not part of existing mandates❔ for example, this issue might become something we get mandates about if we did a better job reporting what was installed on our on-prem machines (which are all used for Helix testing and maybe some non-Helix performance work).
As discussed in the tactical #379 issue, our artefacts are not up to date on many on-premise machines. This for example means recent changes to helix-scripts/ content were unable to be used on some machines. Now, as part of
Epic: Helix Machines Improvements
, we should fund work to automate as much of this as we can. Running artefact updates on a regular cadence will go a long way toward improving our security stance and avoid problems likely we encountered in the 12 July rollout.The main idea here is to keep artefacts up to date without having to reimage all on-premise machines.
Release Note Category
Release Note Description
We are now automatically keeping configuration and installations up to date on all on-premise machines.