(no title)
jwestbury | 2 years ago
In a similar vein, you should never generate resources which will expire unless some undocumented action is taken. A common one I've seen is self-signed certs which last for n days, and are re-generated whenever an application is deployed or restarted, under the assumption that the application will never run untouched longer than that. (Spoiler: It probably will, at some point, whether due to unexpected change freezes, going into maintenance mode, or -- in my personal favourite -- being deployed to an environment that just isn't updated as regularly.)
Twirrim|2 years ago
A year long expiry isn't frequent enough that you build automation, and is long enough that the runbook you have is likely out of date before the next time you execute it. If you make it 3 monthly, it's more likely to be fully or mostly automated, and it's more likely you'll remember that certs were recently introduced in a particular service. If you make it monthly, it's pretty much guaranteed that it'll be fully automated.
Almost every week in the weekly AWS-wide ops meetings, one service or another would be talking about something that went wrong that was caused by some certificate expiring, that happened in a place they'd forgotten they had certificates, or had missed when they did the rotation. A number of those failures presented in particularly misleading ways, too, by nature of what role the cert was playing.
dataflow|2 years ago
MichaelZuo|2 years ago
tjoff|2 years ago
m463|2 years ago
That was a long time ago. I wonder if technology/the cloud has changed or they still run those same machines
bluGill|2 years ago
chatmasta|2 years ago
unknown|2 years ago
[deleted]
gorkish|2 years ago
nitwit005|2 years ago
Naturally, they didn't document this.