diff --git a/runbooks/source/cloud-platform-alliance.html.md.erb b/runbooks/source/cloud-platform-alliance.html.md.erb index 22a851fe..5c8baa39 100644 --- a/runbooks/source/cloud-platform-alliance.html.md.erb +++ b/runbooks/source/cloud-platform-alliance.html.md.erb @@ -1,7 +1,7 @@ --- title: Cloud Platform Team Alliance weight: 5 -last_reviewed_on: 2024-07-26 +last_reviewed_on: 2024-10-28 review_in: 3 months --- diff --git a/runbooks/source/error-refreshing-state.html.md.erb b/runbooks/source/error-refreshing-state.html.md.erb index d0ca2b8d..d3010fb9 100644 --- a/runbooks/source/error-refreshing-state.html.md.erb +++ b/runbooks/source/error-refreshing-state.html.md.erb @@ -1,7 +1,7 @@ --- title: Terraform state lock - Error refreshing state weight: 200 -last_reviewed_on: 2024-04-26 +last_reviewed_on: 2024-10-28 review_in: 6 months --- diff --git a/runbooks/source/manage-grafana-snapshots.html.md.erb b/runbooks/source/manage-grafana-snapshots.html.md.erb index 5d71c98b..01db98a1 100644 --- a/runbooks/source/manage-grafana-snapshots.html.md.erb +++ b/runbooks/source/manage-grafana-snapshots.html.md.erb @@ -1,7 +1,7 @@ --- title: Manage Published Grafana Dashboard Snapshots weight: 190 -last_reviewed_on: 2024-04-26 +last_reviewed_on: 2024-10-28 review_in: 6 months --- diff --git a/runbooks/source/public-s3-bucket.html.md.erb b/runbooks/source/public-s3-bucket.html.md.erb index 19902658..836192cc 100644 --- a/runbooks/source/public-s3-bucket.html.md.erb +++ b/runbooks/source/public-s3-bucket.html.md.erb @@ -1,13 +1,13 @@ --- title: Make an S3 bucket public weight: 150 -last_reviewed_on: 2024-04-26 +last_reviewed_on: 2024-10-28 review_in: 6 months --- # <%= current_page.data.title %> -There is a [lambda function] in place which runs weekly and revokes public access for all our S3 Buckets. If we want grant public access to S3 buckets they must be [added as exceptions within module definion] followed by `terraform apply`. It should also be followed the instructions described within the [S3 module "Usage" section] +There is a [lambda function] in place which runs weekly and revokes public access for all our S3 Buckets. If we want grant public access to S3 buckets, they must be [added as exceptions within module definion] followed by `terraform apply`. It should also be followed by the instructions described within the [S3 module "Usage" section] [lambda function]: https://github.com/ministryofjustice/cloud-platform-terraform-awsaccounts-baselines/blob/main/modules/lambdas/functions/s3-bucket-block-publicaccess/index.py [added as exceptions within module definion]: https://github.com/ministryofjustice/cloud-platform-terraform-awsaccounts-baselines/blob/main/modules/lambdas/main.tf#L94 diff --git a/runbooks/source/remove-data-from-elasticsearch.html.md.erb b/runbooks/source/remove-data-from-elasticsearch.html.md.erb index 9e87dfa6..7f4fe1bb 100644 --- a/runbooks/source/remove-data-from-elasticsearch.html.md.erb +++ b/runbooks/source/remove-data-from-elasticsearch.html.md.erb @@ -1,7 +1,7 @@ --- title: Remove data from Elasticsearch weight: 190 -last_reviewed_on: 2024-04-26 +last_reviewed_on: 2024-10-28 review_in: 6 months ---