Open christinklez opened 4 months ago
Other s3 buckets that can probably be safely deleted:
Waited to turn off
Additional documentation here: https://docs.google.com/document/d/18T655upPe_93W4_026hZhbUb5pXlXngBh8GL6fzInfo/edit
UCI PLODAB / Artist's Books site has been updated, to point to our current thumbnail endpoint (https://thumbnails.calisphere.org/clip/... -> https://calisphere.org/clip/...).
Lambda: arn:aws:lambda:us-west-2:563907706919:function:async-fetch Log Group: /aws/lambda/async-fetch IAM Role: lambda-fetch-to-s3
Lambda: arn:aws:lambda:us-west-2:563907706919:function:async-file-fetch Log Group: /aws/lambda/async-file-fetch IAM Role: lambda-fetch-to-s3 [already deleted]
Lambda: arn:aws:lambda:us-west-2:563907706919:function:start_textract Log Group: /aws/lambda/start_textract IAM Role: lambda-fetch-to-s3 [already deleted] S3 Bucket: s3://rikolti-public/content_files [already deleted] Textract Output: s3://rikolti/textract/ [already deleted]
Lambda: arn:aws:lambda:us-west-2:563907706919:function:get_textract Trigger: SNS: AmazonTextractPachamama Log Group: /aws/lambda/get_textract IAM Role: lambda-fetch-to-s3 [already deleted] SNS Topic: arn:aws:sns:us-west-2:563907706919:AmazonTextractPachamama Textract Role: arn:aws:iam::563907706919:role/TextractRole
Lambda: arn:aws:lambda:us-west-2:563907706919:function:fetch-metadata Test Events: several, deleted Log Group: /aws/lambda/fetch-metadata IAM Role: lambda-fetch-to-s3 [already deleted]
Lambda: arn:aws:lambda:us-west-2:563907706919:function:CreateGoogleLog Test Events: [None] Trigger: S3: ucldc-logs
Lambda: fetch_metadata IAM Role: rikolti-sam-MetadataFetcherFunctionRole-4V944P7D1YAN Lambda: map_metadata IAM Role: rikolti-sam-MetadataMapperMapPageFunctionRole-Y15L7C59VR40 Lambda: shepherd_mappers IAM Role: rikolti-sam-MetadataMapperShepherdFunctionRole-1HWNLJUEO1RPZ Log Group: /aws/lambda/fetch_metadata
Log Group: /aws/lambda/amy-test Log Group: /aws/lambda/async-fetch-test Log Group: /aws/lambda/metadata-mapper-sam-test-MetadataMapperFunction-tSwb2gWZlhs2
Still to delete: Lambda: arn:aws:lambda:us-west-2:563907706919:function:sorldumpGlueTriggerOnS3, though this is a pretty nice model for how we were calculating calisphere.org/collection/<id>/metadata
pages - it's not currently run, but I'd like to document it a bit more before deleting it. The lambda function itself doesn't do much, there's a Glue Crawler that's configured to, on a weekly basis, crawl a named zip file in s3 representing the current production solr index (this named zip file was replaced as part of the deployment process). Cloudwatch Events specified an EventBridge that was triggered any time there was a state change in a Glue Data Catalog. The lambda function would check if the state change happened specifically to the table representing Solr data in the Glue Data Catalog. If so, then the lambda function would trigger the Glue Job 'metadata_summary'.
s3://ucldc-logs can probably be deleted, s3://ucldc-logs/calisphere/ is a bunch of calisphere logs, and s3://ucldc-logs/google/ are those same logs filtered for Google user agents/Google bots (from a time when we were trying to understand how Google crawled our site to increase index coverage); not sure, though, what s3://ucldc-logs/s3logs/ come from.
Discussed that the remaining work to turn off the legacy CSphere infrastructure is of medium priority; we'll return to this later.
Strictly in the PAD-DSC account:
Terminated Beanstalks:
Deleted S3:
Deleted RDS:
Disabled Cloudfront [not deleted]:
E2U9T45UP3ZOJ8
- "real IIIF" - https://d30821mshh5k7n.cloudfront.netE1RSO6N0RTXH8X
- "calisphere.org" - d38sju4wgfi2qq.cloudfront.netEA4P9EMQ9TNK0
- "calisphere-test.cdlib.org" - dj5wl215uj1lm.cloudfront.netEFYNVC47PVHZK
- "Cloudfront on registry to test custom errors" - d1dgt3xa7eo7c3.cloudfront.netE215A3D7QO74OG
- "thumbnails.calisphere.org: Used by UCI: https://www.lib.uci.edu/sites/all/plodab/index.php" - d12st13wriz4j5.cloudfront.netStopped ec2 [not deleted]: