The purpose of this quiz is to allow a new developer of GovWifi to be able to get up and running using the various applications which interact with each other.
Connect to the production read replica sessions database
We logged in to govwifi AWS account via gds-users. Production is in London, DR in Ireland. Found a DB called wifi-production-user-rr, noting the subnets.
Decided we should be able to access the DB via one of the EC2 instances in the same subnets.
Found out we could access the DB via the Wifi Bastion instance, using the primary user’s SSH key which is encrypted (using GNU pass) in alphagov/govwifi-build.
We got the DB credentials from the same password store under secrets-to-copy/terraform/wifi-london/secrets.auto.tfvars.
We found the command for connecting to the DB is in the ubuntu user’s bash history on the Bastion box. Then we used the password from the previous step. The command was something like this, since the DB has a route53 entry:
mysql -h users-rr.<govwifi domain> -u <user>
Remove Kyle Chapman and Adrian Clay’s gpg keys from the system and re-encrypt the secrets. Instruct the GovWifi team on what to do after this is done.
We did a github search for “adrian” and “kyle”.
grep’d for their names across the govwifi repos.
We found a joiner/leaver checklist. This raised some questions that we asked the govwifi team: – Were the AWS accounts for these users created manually? Yes – Do we rotate secrets after removing users? No
We removed Adrian from
We manually deleted Kyle’s AWS account (last activity 73 days ago)
We removed Adrian and Kyle’s GPG key IDs from
Rafal re-encrypted the secrets on a branch and I tested that I could decrypt them: https://github.com/alphagov/govwifi-build/pull/348
Terraform & Build
Run terraform against staging and production for London and Dublin and see that no changes need to be applied.
Working in alphagov/govwifi-build and replacing
staging-londonwith the environment being applied:
Whoever is deploying will need to be able to decrypt secrets in the password store and will need to be logged in with AWS (using
Rotate the Notify API key on STAGING (eg: Notify API key has been compromised)
Log into notify https://www.notifications.service.gov.uk
Generate new key
notify-api-keyvalue with the new key
Apply all the terraforms
Log into notify https://www.notifications.service.gov.uk and revoke old key
Spin up a new pipeline for a feature branch. Then remove it.
fly login -t cd-govwifi -n govwifi -c https://cd.gds-reliability.engineering fly -t cd-govwifi set-pipeline --pipeline <pipeline name>-new --config <path to pipeline yaml>
Apply a new pipeline config to an existing pipeline
Same as above but use the existing pipeline name.
There are self-updating pipelines now, so merging a pipeline change to master should deploy it.
Confirm on one of the STAGING frontend RADIUS servers that the IP address 220.127.116.11 is whitelisted within the config.
aws s3 cp s3://govwifi-staging-admin/ips-and-locations.json - | grep -o 18.104.22.168and make sure you see the IP.
The frontends (FreeRADIUS) didn’t restart last night, how would you go about debugging this?
The infra runs as ECS tasks, so we can go into ECS, pick the wifi-frontend cluster (for production), and look at the logs for the frontend-service-wifi task.
The frontend servers are restarted daily by the wifi-daily-safe-restart CloudWatch event. The task this runs is configured to log to the _wifi-safe-restart-docker-log-group_CloudWatch log group so we should look there for issues.
Restore an RDS backup for the user database and connect to it from your local machine
- We’d go into the RDS snapshots section and pick the one we want to restore. Connecting to the database is as described above.
Many users at location “Stafford Crown Court” are complaining about not being able to connect to GovWifi. Find out why. (Production)
- These might be some useful CloudWatch logs to look at:
The Battersea Dogs & Cats Home wants to offer GovWifi in their building but their organisation name doesn’t appear in the list. Please allow them to signup, (STAGING). The network admin’s email is firstname.lastname@example.org.
The data for Signups by Channel for April 20th 2019 looks incorrect. Please resubmit it. (production)
- Data is in the wifi-london-pp-data bucket. I think it gets there via the horrific inlined bash script in the Bastion EC2 instance user_data in