You are browsing a read-only backup copy of Wikitech. The live site can be found at wikitech.wikimedia.org
 update LDAP permissions based on NDA status  update Phabricator permissions based on NDA status  Check HBase/Haddoop permissions and inform the SRE analytics team  update user in [[https://github.com/wikimedia/puppet/blob/production/modules/admin/data/data.yaml | modules/admin/data/data.yaml]] Additional task for SRE team members  Review access to internal IRC channels  Remove from ops mailing lists (ops and ops-private)  Remove from private Exim aliases  Remove VictorOps user  Remove Icinga user  Remove from pwstore  Remove from Technical Operations group (if part of Core SRE)  Review access to network devices (and potentially remove access)
The following sections needed to be completed for all users regardless of team
Email the user and ask if they wish to remain on as a volunteer, is so ensure they have signed an NDA
Check Users LDAP access
When Off Boarding users in LDAP you have a number of options
- remove the user from privileged groups leave them in all un-privileged groups. This is the default and should be used in most cases.
- convert the user into a volunteer (Requires Signed NDA). This happens in a few select cases.
- completely remove the user. This is for exceptional cases (rogue accounts, malicious users, etc).
The following commands can be run from mwmaint1002.eqiad.wmnet
Remove user from privileged groups
This is the default action if a user does not want to become a Volunteer
offboard-user -l $user
convert user to a Volunteer account
First ensure the user has signed the NDA, if so run
offboard-user --turn-volunteer -l $user
Completely remove user
By default all non-priv LDAP/Phab groups are retained! To completely remove a user we can add
offboard-user --drop-all -l $user
Applying the change
These commands will print create LDIF file to use for removal and the instructions command you need to run e.g.
cat jbond.ldif dn: cn=ops,ou=groups,dc=wikimedia,dc=org changetype: modify delete: member member: uid=jbond,ou=people,dc=wikimedia,dc=org dn: cn=wmf,ou=groups,dc=wikimedia,dc=org changetype: modify delete: member member: uid=jbond,ou=people,dc=wikimedia,dc=org
ldapmodify -h ldap-labs.eqiad.wikimedia.org -p 389 -x -D "cn=scriptuser,ou=profile,dc=wikimedia,dc=org" -W -f jbond.ldif
if you just wish to check a users permission you can run the following command , we will use this for checking haddop permissions later
offboard-user --list-only -l $user
Check Users Phabricator access
If the user is remaining with Wikimedia as a volunteer and their Phabricator account is linked to an LDAP account or their Phabricator account is linked to a mediawiki.org account which does not end in "(WMF)", then they this step can be skipped. Check their profile page in Phabricator to see what their Phab account is linked to.
Search for the username in Phabricator, once you have the user's Phabricator username run the following command (again you can use --list-only to check first)
offboard-user -p $user
If the Phab account is connected only to an WMF SUL/OAuth account on mediawiki.org (see the user profile on Phabricator), then the Phab user account shall get disabled, to make it clear to anyone that the person is not active anymore and to allow searching for tasks still assigned to the person not active anymore. The user cannot log in anyway anymore to Phab in that case, as their SUL/OAuth account on mediawiki.org is also disabled.
Handle Hadoop leftovers
We first run the following script to check if the user has any haddop permissions
offboard-user --list-only -l $user
You need to make a list of all entries that mention hadoop in the following example we need to make a list of the groups statistics-privatedata-users and analytics-privatedata-users
User DN: uid=jbond,ou=people,dc=wikimedia,dc=org Is member of the following unprivileged LDAP groups: cn=project-bastion,ou=groups,dc=wikimedia,dc=org (can be retained) cn=project-deployment-prep,ou=groups,dc=wikimedia,dc=org (can be retained) cn=project-tools,ou=groups,dc=wikimedia,dc=org (can be retained) cn=tools.perflogbot,ou=servicegroups,dc=wikimedia,dc=org (can be retained) Is not a project admin in Nova Is not a member in any privileged group statistics-privatedata-users grants access to Hadoop/Hive, check PII leftovers analytics-privatedata-users grants access to Hadoop/Hive, check PII leftovers
Once you have this information create a new fabricator task and tag it with Analytics and link it to your own Off boarding ticket. you can use the following for the ticket text
$Full_Name ($username) is currently being off-boarded and please check if they left stuff in their home dirs on stat*/notebook*/HDFS since they where part of: statistics-privatedata-users analytics-privatedata-users
Validate shell access to the prod cluster
to remove a shell user we will need to prepare a patch against `modules/admin/data/data.yaml` to perform the following tasks
- add the user to the groups['absent'] at the very top of the file
- remove the user from all other groups
- update the users entry to:
* remove the email entry * blank out the ssh keys i.e. set it to `ssh-keys: ` * mark them as absent
Look at a real patch in phabricator to see what this looks like.
Once this change has been accepted into puppet the user will be removed from all machines in ~30 minutes. It is possible that a user may still have a process running e.g. screen, tmux. in these cases puppet will fail as userdel is unable to remove the user and puppet. We will get an alert for this so monitor #wikimedia-operations for any alerts and intervene manually. If it is obvious the running process is not doing anything useful then just kill it otherwise double check with some one from the users team.
People with higher privileges
Some of these changes require you to edit the private git repo. When doing so ensure you have read the README file in /srv/private. Specifically
- DO NOT EVER rewrite history in this repo. No git commit --amend, no git rebase
- all changes and the git commit need to be performed as root or with sudo
Review access to internal IRC channels
We need to ensure Users are removed from private IRC chat channels. If you are not aware of the private channels or there associated Op please contact a member of the SRE security team
Remove from ops mailing lists (ops and ops-private)
First you can check which lists a user is on with the following command on the mailman server (lists1001.wikimedia.org at time of writing)
sudo /var/lib/mailman/bin/find_member firstname.lastname@example.org
To remove a user from a our mailing lists run the following commands
sudo /var/lib/mailman/bin/remove_members --fromall email@example.com
more information can be found on the Mailman page
Remove from Exim aliases from private.git
Remove the user from all alias files under the following dir
New users will probably only have one entry for firstname.lastname@example.org, however users who have been around for some time may appear in multiple locations
For SRE staff there are additional steps we need to perform.
Remove VictorOps user
Make sure the user has been deleted from https://portal.victorops.com/dash/wikimedia#/users
Remove Icinga user
Create a patch to the puppet repository to remove all instance of the user modules/icinga/files/cgi.cfg. Note the user name shown here is the LDAP (Wikitech wiki) username, which is not necessarily the same as the shell account.
Remove from pwstore
For this you will need to contact Moritz or Daniel and ask them to perform this task. Check the Pwstore page for more information
Remove from Google group for private groups
Email Mark, Faidon or Moritz and ask them to remove the user from the email@example.com Google group
Review access to network devices (and potentially remove access)
Please review whether the user had access to network devices at https://github.com/wikimedia/operations-homer-public/blob/master/config/common.yaml
If so, open a Phabricator task asking for network access to be removed and tag it with "netops"