Closed bookshelfdave closed 6 years ago
@glogiotatidis I captured the reqs from guigs in this issue.
thanks ben for the requirements capture! does it have to be sql forever? long term can we put it somewhere like tableau or something more user friendly than raw sql? i'm probably dreaming :-) until then i'll continue to use CSV and raw SQL
We are noodling with alternatives, giving folks unfettered access to a r/o version of the DB aint a great idea.
Can you elaborate a little bit more on why it might not be, please. Thank you.
For this month Rachel emailed me the commands, I run them and emailed the results back.
I wrote a script to automate the procedure. It's in sumo-encrypted/data-extract along with instructions.
I's thinking that maybe we can get Kibana access to the SUMO team? Would the data there in combination with the Kibana querying and graphing frontend answer their needs?
@glogiotatidis I've created an issue to look into Kibana
@turtlelovesshoes @rtanglao We're going to work with IT to setup VPN access for you, I'll drop the bugzilla bugs into this issue.
TODO:
Related:
VPN peering request: https://bugzilla.mozilla.org/show_bug.cgi?id=1475002
meeting with Dave Miller on July 18th to discuss networking options.
@jgmize and I met w/ Dave Miller, we're going to use the existing tunnel, but we need a second subnet in order to spin up the RDS replica. You can see progress here.
per https://bugzilla.mozilla.org/show_bug.cgi?id=1475002#c12 a second subnet has been assigned. next actions:
Users to add to VPN group:
We tried creating a read-replica today in us-west-2 using the new "bridge" VPC, but received the following message:
The DB instance and EC2 security group are in different VPCs. The DB instance is in vpc-ee77dc97
and the EC2 security group is in vpc-ea93e58f (Service: AmazonRDS; Status Code: 400; Error
Code: InvalidParameterCombination; Request ID: 426cfe37-a503-46f9-8b11-24032df53738)
An issue has been opened with AWS support.
Per AWS support creating a read replica in a different VPC in the same region as the master is not supported, so we will need to take a different approach.
IT has agreed to use the original approach of routing the Frankfurt subnets along a new VPN tunnel with the understanding that this is an interim solution: https://bugzilla.mozilla.org/show_bug.cgi?id=1475002#c15
additional info to setup the VPN tunnel has been sent to netops as part of https://bugzilla.mozilla.org/show_bug.cgi?id=1475002#c15
new query-only account created and limited to VPN-specific CIDR. I'll forward along the credentials shortly.
creds forwarded to @turtlelovesshoes
@turtlelovesshoes are you able to connect to the database?
Prior to the AWS migration the SUMO team had access to a read only version of the DB. They used this instance for ad-hoc querying. Now that we are in AWS we need to decide if we should:
A. Provide a limited number of users VPN access to the SUMO Frankfurt read-replica DB. (give the team what they had before). B. Provide an alternative (more secure) method to access this data.
Below is some background information from Guigs describing their specific use cases: