We are looking forward to having you on our team. Please ensure you have prior experience with the HfLA website team before contributing to our repository.
Overview
As a new member on the HfLA devops-security team, fill in the following fields as you complete each onboarding item.
Special Notes
Keep this issue open until you've completed all steps, including learning to provide updates for longer tasks.
Normally, handle one issue at a time, but this one is an exception as it teaches how to manage multiple tasks.
Work on action items sequentially, but proceed if possible. For example, set up your dev environment without waiting for the weekly meeting.
Action Items
[x] Before starting to work on the below instructions, make sure to join the #ops Slack Channel. And are a member of devops-security repository.
[x] Self-assign this issue (gear in right side panel).
[x] Add this issue to the Project Board under the Projects section (gear in right side panel).
[x] Attend weekly team meeting, Wednesdays 6-8pm PST.
[x] Note: There are no meetings on the 1st-7th of every month.
[x] In your code editor navigate to terraform directory. cd terraform
[x] Execute the command terraform init to initialize terraform in the directory. Address any failures that arise (if any).
[x] Execute the command terraform plan this will output a plan replicating the same IAM resources as the devops security account. Address any failures that arise (if any).
[x] Then execute the command terraform apply this will create all of the resources that are currently managed by Devops Security. All of the resources created here incur zero cost except for the Dynamo DB installation, which should remain in the free tier.
[ ] If you have cost concerns, Run a Terraform Destroy to take down all of the resources you created (don't worry, you can recreate them just as quickly).
[ ] Once you have tested your changes, stage them in git with
[ ] git status command.
[ ] then git add path/to/file (you can copy from above output for the file path).
[ ] Commit the changes by executing git commit -m "briefly describing the changes".
[ ] Push the changes with git push --set-upstream origin name-of-branch
Progress: "What is the current status of your project? What have you completed and what is left to do?" The above issue was resolved. But I am stuck when I run the create user script since it says my AWS user already exists.
Blockers: "Difficulties or errors encountered." error saying the "AWS user already exists".
Availability: "How much time will you have this week to work on this issue?" - Need the CoP leads to review and fix the onboarding document.
ETA: "When do you expect this issue to be completed?" in 2 weeks
Pictures or links* (if necessary): "Add any pictures or links that will help illustrate what you are working on."
remember to add links to the top of the issue if they are going to be needed again.
Prerequisite
We are looking forward to having you on our team. Please ensure you have prior experience with the HfLA website team before contributing to our repository.
Overview
As a new member on the HfLA devops-security team, fill in the following fields as you complete each onboarding item.
Special Notes
Action Items
devops-security
repository.AdministratorAccess
policy to IAM group[x] Create a new branch from main by executing the command
[x] Navigate to the
aws-user.tf
file and add your user information and follow the below template.terraform
directory.cd terraform
terraform init
to initialize terraform in the directory. Address any failures that arise (if any).terraform plan
this will output a plan replicating the same IAM resources as the devops security account. Address any failures that arise (if any).terraform apply
this will create all of the resources that are currently managed by Devops Security. All of the resources created here incur zero cost except for the Dynamo DB installation, which should remain in the free tier.git status
command.git add path/to/file
(you can copy from above output for the file path).git commit -m "briefly describing the changes"
.git push --set-upstream origin name-of-branch