Intelligent Automation tasks |
1. Create IA Policy and Publish
2. if Incident ID not available in BHOM event, do not execute policy from IA.
if Incident ID available in BHOM event, IA to execute policy and invoke Jenkins pipeline.
|
Remediate issue via Jenkins pipeline |
Jenkins Pipeline inputs
SR_DB hostname
Incident number
-
event_creation_timestamp
Automation Solution design
Fetch Smart_Reporting_DB, event_creation_timestamp and Incident as input from the BHOM alert.
-
Perform Precheck
Fetch Project details based on SR DB hostname COPS API getprojects METHOD
-
Fetch below fields from COPS via API getprojectparams METHOD
DB_TYPE (Aurora/Postgres/Oracle/MSSQL)
SMART_REPORTING_DB_USER
SMART_REPORTING_DB_USER_PASSWORD
DB_TYPE/RW_PORT
AR_SERVER_SR_DB_NAME_CALCULATED
SMART_REPORTING_DB
SMART_REPORTING_DB_INSTANCE_NAME
-
Enable auto-remediation by automating below steps. If successful go
Check DB type and Connect to customer SR database (using AR DB Database Server, AR Database User Name for SmartReporting, AR Database User Password for SmartReporting)
-
Execute below query to check the access attempts. If success got to step 3c, Else abort automation
-
If user is siadmin, execute below query
SELECT ACCESSATTEMPTS FROM IpClass WHERE EmailLeft = 'siadmin';
-
if user is sr service user, execute below query
SELECT ACCESSATTEMPTS FROM IpClass WHERE EmailLeft = 'srserviceuser';
-
If user locked out (ACCESSATTEMPTS >= 3;), Execute below query to unlock accounts via auto remediation. we have to run below query. This will reset ACCESSATTEMPTS to 0. Then system allows to login with old password. If success got to step 4, Else abort automation
-
if 'srserviceuser' account locked then
-
if 'siadmin' account locked then
-
Account unlock status
If account unlock success - proceed to step5
-
If account unlock failed, then
automation will update incident workinfo about the error
CRITICAL alert will remain open in NOC queue
NOC will act using regular process
-
Perform Post-check
-
Validate if access attempts == 0 for the user account
If user is siaadmin, execute -SELECT ACCESSATTEMPTS FROM IpClass WHERE EmailLeft = 'siadmin';
if user is sr service user , execute -SELECT ACCESSATTEMPTS FROM IpClass WHERE EmailLeft = 'srserviceuser';
-
Account unlocked but during post validation if unsuccessful password attempts != 0
-
send email to NOC team to initiate bridge with Monitoring/SRE/Application team for below scenarios
Account unlocked but during post validation if unsuccessful password attempts != 0
If multiple BHOM events created for same customer/user within 2 hours
If issue persists, new BHOM event will be created
Update work info of incident about automation pipeline status(Success/Failure).
Jenkins pipeline status would be available in IA
|