#5738 Request for new sysadmin group for MBS
Closed 7 years ago Opened 7 years ago by ralph.

Hi!

There are guys on my team that would like to help maintain the MBS: @jkaluza, @fivaldi, and @mprahl.

I would like to add them to the sysadmin group and create a new sysadmin-mbs group. I would like to give them access via rbac-playbook to run the mbs playbooks (and give them rights to commit to the ansible repo).

One important question is: how can they access logs? They do today get emailed tracebacks, but more logs are helpful to debug.

Considerations:

  • If they have ssh access to the mbs nodes, then they will have read access to koji credentials with elevated permissions.
  • If we add them to sysadmin-logs, then they can read logs without accessing koji credentials, but they will have access to lots more logs from other things.

(FWIW, these guys are good and trustworthy, but that's not the point.) They don't currently hang out in #fedora-admin or #fedora-noc, but I'm sure we can make that kind of availability happen.
If I can provide any other information or options, please let me know.


Well, ssh access to the nodes doesn't automatically mean sudo access, so if they could read the logs as their normal users, they wouldn't have access to koji credentials.

Without sudo on the nodes they would need to commit and then run playbooks to do any changes.

Or perhaps sudo could be constrained to just the things they might need to do, and leave the koji credentials still secure?

Anyhow, I am ok to just make the group and add them to it and add privs as they are needed.

This is part of our normal RFR for new applications anyhow to add a group for it and make sure all the folks who know how to maintain the application are added.

Is there any further discussion we want to have here?

:heavy_check_mark:

Or perhaps sudo could be constrained to just the things they might need to do, and leave the koji credentials still secure?

Yeah! The main thing I would want is for them to be able to read logs.. so a sudoers rule just for journalctl should do it. (Although the apache logs require tail in /var/log/httpd/error_log....)

If we are supposed to just read logs, the super-secure way is a chrooted SFTP, and we would access those logfiles with just sftp/sshfs without any bash prompt.

Here's a guide for inspiration:
https://wiki.archlinux.org/index.php/SFTP_chroot

The ChrootDirectory would be for the apache log files directory or some other directory. In case of multiple directories, I used to mount --bind them to one "umbrella" directory chroot,

Well, I don't think we really need to go to extreme measures, just compartmentalize as makes sense.

OK - the groups are created and they have rbac-playbook access now.

I'll educate the new guys on how to access batcave01, etc.

Metadata Update from @ralph:
- Issue status updated to: Closed (was: Open)

7 years ago

Login to comment on this ticket.

Metadata