SRE Offboarding

From Wikitech
Jump to navigation Jump to search

Phabricator ticket

[] update LDAP permissions based on NDA status
[] update Phabricator permissions based on NDA status 
[] update [ github] access based on NDA status
[] Check HBase/Haddoop permissions and inform the SRE analytics team
[] update user in [[ | modules/admin/data/data.yaml]]
[] run the logout cookbook
Additional task for SRE team members
[] Review access to internal IRC channels
[] Remove from ops mailing lists (ops and ops-private)
[] Remove from private Exim aliases
[] Remove VictorOps user
[] Remove Icinga user
[] Remove from pwstore
[] Review access to network devices (and potentially remove access)
[] Remove Kerberos principle (if present)

All Users

The following sections needed to be completed for all users regardless of team

Volunteer status

Email the user and ask if they wish to remain on as a volunteer, is so ensure they have signed an NDA

Check Users LDAP access

When Off Boarding users in LDAP you have a number of options

  • remove the user from privileged groups leave them in all un-privileged groups. This is the default and should be used in most cases.
  • convert the user into a volunteer (Requires Signed NDA). This happens in a few select cases.
  • completely remove the user. This is for exceptional cases (rogue accounts, malicious users, etc).

The following commands can be run from mwmaint1002.eqiad.wmnet

Remove user from privileged groups

This is the default action if a user does not want to become a Volunteer

offboard-user -l $user

convert user to a Volunteer account

First ensure the user has signed the NDA, if so run

offboard-user --turn-volunteer -l $user

Completely remove user

By default all non-priv LDAP/Phab groups are retained! To completely remove a user we can add

offboard-user --drop-all -l $user

Applying the change

These commands will print create LDIF file to use for removal and the instructions command you need to run e.g.

 cat jbond.ldif
 dn: cn=ops,ou=groups,dc=wikimedia,dc=org 
 changetype: modify 
 delete: member 
 member: uid=jbond,ou=people,dc=wikimedia,dc=org 

 dn: cn=wmf,ou=groups,dc=wikimedia,dc=org 
 changetype: modify 
 delete: member 

 member: uid=jbond,ou=people,dc=wikimedia,dc=org
 ldapmodify -h -p 389 -x -D "cn=scriptuser,ou=profile,dc=wikimedia,dc=org" -W -f jbond.ldif

if you just wish to check a users permission you can run the following command , we will use this for checking haddop permissions later

offboard-user --list-only -l $user

Check Users Phabricator access

If the user is remaining with Wikimedia as a volunteer and their Phabricator account is linked to an LDAP account or their Phabricator account is linked to a account which does not end in "(WMF)", then they this step can be skipped. Check their profile page in Phabricator to see what their Phab account is linked to.

Search for the username in Phabricator, once you have the user's Phabricator username run the following command (again you can use --list-only to check first)

offboard-user -p $user

if the user is a member of any privileged groups e.g. Security, WMF-NDA you will be prompted to remove them, do so.

If the Phab account is connected only to an WMF SUL/OAuth account on (see the user profile on Phabricator), then the Phab user account shall get disabled, to make it clear to anyone that the person is not active anymore and to allow searching for tasks still assigned to the person not active anymore. The user cannot log in anyway anymore to Phab in that case, as their SUL/OAuth account on is also disabled.

Handle Hadoop leftovers

We first run the following script to check if the user has any haddop permissions

offboard-user --list-only -l $user

You need to make a list of all entries that mention hadoop in the following example we need to make a list of the groups statistics-privatedata-users and analytics-privatedata-users

User DN: uid=jbond,ou=people,dc=wikimedia,dc=org
Is member of the following unprivileged LDAP groups:
  cn=project-bastion,ou=groups,dc=wikimedia,dc=org (can be retained)
  cn=project-deployment-prep,ou=groups,dc=wikimedia,dc=org (can be retained)
  cn=project-tools,ou=groups,dc=wikimedia,dc=org (can be retained)
  cn=tools.perflogbot,ou=servicegroups,dc=wikimedia,dc=org (can be retained)
Is not a project admin in Nova
Is not a member in any privileged group
statistics-privatedata-users grants access to Hadoop/Hive, check PII leftovers
analytics-privatedata-users grants access to Hadoop/Hive, check PII leftovers

Once you have this information create a new Phabricator task and tag it with Analytics and link it to your own Off boarding ticket. you can use the following for the ticket text

$Full_Name ($username) is currently being off-boarded and please check if they left stuff in their home dirs on stat*/notebook*/HDFS since they where part of:


Validate shell access to the prod cluster

to remove a shell user we will need to prepare a patch against `modules/admin/data/data.yaml` to perform the following tasks

  • add the user to the groups['absent'] at the very top of the file
  • remove the user from all other groups
  • update the users entry to:
 * remove the email entry
 * blank out the ssh keys i.e. set it to `ssh-keys: []`
 * mark them as absent

Look at a real patch in phabricator to see what this looks like.

Once this change has been accepted into puppet the user will be removed from all machines in ~30 minutes. It is possible that a user may still have a process running e.g. screen, tmux. in these cases puppet will fail as userdel is unable to remove the user and puppet. We will get an alert for this so monitor #wikimedia-operations for any alerts and intervene manually. If it is obvious the running process is not doing anything useful then just kill it otherwise double check with some one from the users team.

Or one can get the user uid from mwmaint ldap and run the following cumin command

$ sudo cumin '*' 'ps --user  $user_uid_number'

Run the logout cookbook

Once yuo have removed the user from the admin and pupet has run every where you should run the logout cookbook to force all user sessions to terminate

$ cookbook sre.idm.logout -u $user_uid -c $user_cn '*'

Remove user from Github

If the users dose not want to remain as a voluntear then we should also remove them from the github people

This is just a place holder the other is not aware of the specific instructions for this

People with higher privileges

Some of these changes require you to edit the private git repo. When doing so ensure you have read the README file in /srv/private. Specifically

  • DO NOT EVER rewrite history in this repo. No git commit --amend, no git rebase
  • all changes and the git commit need to be performed as root or with sudo

Review access to internal IRC channels

We need to ensure Users are removed from private IRC chat channels. If you are not aware of the private channels or there associated Op please contact a member of the SRE security team. specifically review

  • The ircservserv-config repo
  • remove from sre private team channles e.g. #wikimedia-sre-private
  • check with user team members to ensure they are removed from any team private rooms e.g. #wikimedia-sre-traffic-private

Remove from ops mailing lists (ops and ops-private)

First you can check which lists a user is on with the following command on the mailman server ( at time of writing)

$ sudo mailman findmember

To remove a user from a our mailing lists run the following commands

$ sudo mailman delmembers --fromall --member

more information can be found on the Mailman page

Remove from Exim aliases from private.git

Remove the user from all alias files under the following dir


New users will probably only have one entry for, however users who have been around for some time may appear in multiple locations

SRE Staff

For SRE staff there are additional steps we need to perform.

Remove VictorOps user

Make sure the user has been deleted from

Remove Icinga user

Create a patch to the puppet repository to remove all instance of the user modules/icinga/files/cgi.cfg. Note the user name shown here is the LDAP (Wikitech wiki) username, which is not necessarily the same as the shell account.

Remove from pwstore

For this you will need to contact Moritz or Daniel and ask them to perform this task. Check the Pwstore page for more information

Remove from Google group for private groups

Email Mark, Faidon or Moritz and ask them to remove the user from the Google group

Review access to network devices (and potentially remove access)

Please review whether the user had access to network devices at

If so, open a Phabricator task asking for network access to be removed and tag it with "netops"

Remove Kerberos principle

This is very simple, here an example for user example_user@WIKIMEDIA:

$ sudo delete example_user@WIKIMEDIA

Also see the main page: Data_Engineering/Systems/Kerberos#Delete_a_principal_for_a_real_user