Page MenuHomeMiraheze

Site Reliability EngineeringGroup
ActivePublic

Members (2)

Watchers (1)

Details

Description

Project for:

  • all higher-level tasks affecting Site Reliability Engineering management;
  • tasks requiring pro-active engagement of both the Infrastructure and MediaWiki sub-teams;
  • a funnel point for initial triage if sub-team scope is unknown.

Recent Activity

Mon, Nov 27

Original_Authority closed T11375: [ACCESS REQUEST] New access for Original Authority as Invalid.

Withdrawing this.

Mon, Nov 27, 21:26 · Site Reliability Engineering

Mon, Nov 6

MacFan4000 moved T11375: [ACCESS REQUEST] New access for Original Authority from Radar to Access on the Site Reliability Engineering board.
Mon, Nov 6, 19:27 · Site Reliability Engineering

Sat, Nov 4

Original_Authority added a comment to T11375: [ACCESS REQUEST] New access for Original Authority.

Unfortunately an NDA is required for SRE access, and to my knowledge, we aren't currently in a position to process new ones at the moment.

Sat, Nov 4, 15:09 · Site Reliability Engineering
MacFan4000 updated subscribers of T11375: [ACCESS REQUEST] New access for Original Authority.
Sat, Nov 4, 00:26 · Site Reliability Engineering
MacFan4000 added a comment to T11375: [ACCESS REQUEST] New access for Original Authority.

Unfortunately an NDA is required for SRE access, and to my knowledge, we aren't currently in a position to process new ones at the moment.

Sat, Nov 4, 00:20 · Site Reliability Engineering

Fri, Nov 3

Original_Authority renamed T11375: [ACCESS REQUEST] New access for Original Authority from [ACCESS REQUEST] New/Expanded access for Original Authority to [ACCESS REQUEST] New access for Original Authority.
Fri, Nov 3, 23:35 · Site Reliability Engineering
Original_Authority added a comment to T11375: [ACCESS REQUEST] New access for Original Authority.

Apologies, that's my bad — reading my reply back, it does sound passive aggressive from my side but I did not intend it to come across that way :)

Fri, Nov 3, 22:54 · Site Reliability Engineering
Agent_Isai added a comment to T11375: [ACCESS REQUEST] New access for Original Authority.

Just confirming what position you mean as SRE can mean the group and the role and in this case, the role is what you're applying for.

Fri, Nov 3, 22:52 · Site Reliability Engineering
Original_Authority added a comment to T11375: [ACCESS REQUEST] New access for Original Authority.

@Agent_Isai — SRE as above.

Fri, Nov 3, 22:50 · Site Reliability Engineering
Agent_Isai added a comment to T11375: [ACCESS REQUEST] New access for Original Authority.

What position are you applying for? Site Reliability Engineer? MediaWiki Engineer? Software Engineer?

Fri, Nov 3, 22:47 · Site Reliability Engineering
Original_Authority created T11375: [ACCESS REQUEST] New access for Original Authority.
Fri, Nov 3, 22:46 · Site Reliability Engineering
Original_Authority closed T10981: [Removal of access] for Paladox as Invalid.

No longer necessary, per discussion on Discord. Paladox will re-open the task when needed.

Fri, Nov 3, 22:02 · Site Reliability Engineering

Oct 10 2023

Redmin placed T10926: Consider dropping orain.org domains up for grabs.
Oct 10 2023, 14:04 · Site Reliability Engineering

Oct 9 2023

Original_Authority closed T10926: Consider dropping orain.org domains as Resolved.

Orain.org seems to have been renewed until 2024, so the consensus seems to be in keeping the domain at least for now. Closing this task to clear the backlog until it can be evaluated again.

Oct 9 2023, 21:43 · Site Reliability Engineering

Sep 8 2023

Paladox added a comment to T10939: Removal of access for Agent.

We have a inactivity policy: https://meta.miraheze.org/wiki/Tech:Inactivity_policy

Sep 8 2023, 12:43 · Site Reliability Engineering

Aug 9 2023

Void renamed T10939: Removal of access for Agent from Removal of access for Miraheze to Removal of access for Agent.
Aug 9 2023, 19:22 · Site Reliability Engineering
PlanToSaveNoWork added a comment to T11133: [trash].

**This is the truth Miraheze is burning like a house and the suppoesed firefighters are sitting relaxing having a coffee instead of helping

Aug 9 2023, 17:52 · Trash
PlanToSaveNoWork triaged T11133: [trash] as Unbreak Now! priority.
Aug 9 2023, 17:51 · Trash
PlanToSaveNoWork renamed T10939: Removal of access for Agent from Removal of access for Agent Isai to Removal of access for Miraheze.
Aug 9 2023, 17:45 · Site Reliability Engineering

Aug 1 2023

Paladox updated the task description for T10969: [Removal of access] for Reception123.
Aug 1 2023, 19:56 · Site Reliability Engineering
Paladox updated the task description for T10969: [Removal of access] for Reception123.
Aug 1 2023, 19:56 · Site Reliability Engineering

Jul 2 2023

OrangeStar closed T10935: [ACCESS REQUEST] New access for OrangeStar as Invalid.

I'm withdrawing this request.

Jul 2 2023, 11:06 · Site Reliability Engineering

Jun 27 2023

Void changed the status of T10981: [Removal of access] for Paladox from Open to Stalled.
Jun 27 2023, 20:31 · Site Reliability Engineering
OrangeStar updated the task description for T10981: [Removal of access] for Paladox.
Jun 27 2023, 14:47 · Site Reliability Engineering

Jun 20 2023

AmandaCath closed T10931: [ACCESS REQUEST]: New access for AmandaCath as Invalid.

Unfortunately I'm going to withdraw this request at this time as my RL is becoming exceptionally busy to the point that I don't feel I would have adequate time to be an effective member of SRE. Should things change I may reconsider later on.

Jun 20 2023, 16:13 · Amanda Catherine, Site Reliability Engineering

Jun 19 2023

MacFan4000 added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

I don't think you would need shell access to have merge access to extension repos as those aren't auto-deployed.

Jun 19 2023, 01:18 · Amanda Catherine, Site Reliability Engineering
Dmehus added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

It's for access to Github repos I believe without needing to PR something, as well as have access to all extension repos. Others would know more though.

Jun 19 2023, 00:51 · Amanda Catherine, Site Reliability Engineering

Jun 18 2023

BrandonWM added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

Note that an non-disclosure agreement is a required prerequisite before this request can even be evaluated

Actually per previous discussions with Owen via Discord, an NDA is not required for the Software Engineer position.

Technically, this is true, yes, assuming the Software Engineer is not requesting shell access. This is also true of the MediaWiki Engineer position. However, I do not see much point in this, given the low level of recent GitHub PRs/commits and the fact that any user could do software development for Miraheze without a title.

Jun 18 2023, 22:04 · Amanda Catherine, Site Reliability Engineering
Dmehus moved T10981: [Removal of access] for Paladox from Radar to Access on the Site Reliability Engineering board.
Jun 18 2023, 21:39 · Site Reliability Engineering
Dmehus moved T10969: [Removal of access] for Reception123 from Radar to Access on the Site Reliability Engineering board.
Jun 18 2023, 21:35 · Site Reliability Engineering
Dmehus added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

Note that an non-disclosure agreement is a required prerequisite before this request can even be evaluated

Actually per previous discussions with Owen via Discord, an NDA is not required for the Software Engineer position.

Jun 18 2023, 21:34 · Amanda Catherine, Site Reliability Engineering
BrandonWM added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

Note that an non-disclosure agreement is a required prerequisite before this request can even be evaluated

Jun 18 2023, 18:10 · Amanda Catherine, Site Reliability Engineering
Dmehus added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

Note that an non-disclosure agreement is a required prerequisite before this request can even be evaluated

Jun 18 2023, 17:33 · Amanda Catherine, Site Reliability Engineering
Reception123 added a comment to T10935: [ACCESS REQUEST] New access for OrangeStar.

Even though I don't currently have any roles and am not sure if I will in the future I think the concerns raised by myself and Dmehus should be addressed and not ignored.
Conduct and behavior has been raised as one of the main issue in SRE and the source of people leaving so it really isn't something that can be "swept under the rug" and ignored.

Jun 18 2023, 10:48 · Site Reliability Engineering
OrangeStar added a comment to T10935: [ACCESS REQUEST] New access for OrangeStar.

Public key set, it's the same one I used before resigning.

Jun 18 2023, 10:06 · Site Reliability Engineering
OrangeStar updated the task description for T10935: [ACCESS REQUEST] New access for OrangeStar.
Jun 18 2023, 10:05 · Site Reliability Engineering
OrangeStar changed the status of T10935: [ACCESS REQUEST] New access for OrangeStar from Open to Stalled.

This is going to take a while. At the very least, this is pending on there being someone with both the power and the will to process these requests. So this will probably not happen until Labster and the others deal with the org problems.

Jun 18 2023, 10:03 · Site Reliability Engineering
OrangeStar updated the task description for T10981: [Removal of access] for Paladox.
Jun 18 2023, 09:49 · Site Reliability Engineering
OrangeStar added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

https://meta.miraheze.org/wiki/Miraheze_is_Not_Shutting_Down, while not a guarantee of Miraheze's survival just yet, makes it very clear there at least are a lot people interested in Miraheze's survival, and that there's a plan for it to survive. So I'd say now is the time to do some of the tasks here as Agent said, and show us what you got.

Jun 18 2023, 09:44 · Amanda Catherine, Site Reliability Engineering
Creeper19472 added a comment to T10969: [Removal of access] for Reception123.

So as a long-lasted wiki farm, Miraheze is seemed to be coming to an end by losing so many volunteers in such a short time?

Jun 18 2023, 04:53 · Site Reliability Engineering
BrandonWM updated subscribers of T10935: [ACCESS REQUEST] New access for OrangeStar.

Naleksuh was a generally globally disruptive user (particularly on Meta Wiki and Phabricator), who Stewards should've globally locked as such prior to the events getting out of hand, so I can appreciate they have a tendency to ruffle peoples' feathers and cause them to act with some degree of irrationality. As such, I can partially forgive Orange Star for that irrationality, but at the same time and given the recency of the events, we're handing a lot of significant technical access with the MWE role, it does give me pause as to consider the likelihood for similar actions, either community or technical. So, while I would not necessarily oppose this request, perhaps only weakly, at the same time, I cannot support it, either

Jun 18 2023, 00:04 · Site Reliability Engineering

Jun 17 2023

Dmehus added a comment to T10935: [ACCESS REQUEST] New access for OrangeStar.

Naleksuh was a generally globally disruptive user (particularly on Meta Wiki and Phabricator), who Stewards should've globally locked as such prior to the events getting out of hand, so I can appreciate they have a tendency to ruffle peoples' feathers and cause them to act with some degree of irrationality. As such, I can partially forgive Orange Star for that irrationality, but at the same time and given the recency of the events, we're handing a lot of significant technical access with the MWE role, it does give me pause as to consider the likelihood for similar actions, either community or technical. So, while I would not necessarily oppose this request, perhaps only weakly, at the same time, I cannot support it, either

Jun 17 2023, 18:15 · Site Reliability Engineering
MacFan4000 updated the task description for T10981: [Removal of access] for Paladox.
Jun 17 2023, 12:46 · Site Reliability Engineering

Jun 16 2023

BrandonWM updated subscribers of T10981: [Removal of access] for Paladox.
Jun 16 2023, 18:39 · Site Reliability Engineering
MacFan4000 updated the task description for T10969: [Removal of access] for Reception123.
Jun 16 2023, 18:19 · Site Reliability Engineering
MacFan4000 updated the task description for T10981: [Removal of access] for Paladox.
Jun 16 2023, 18:19 · Site Reliability Engineering
Reception123 added a comment to T10931: [ACCESS REQUEST]: New access for AmandaCath.

Ideally, Amanda should tackle some extension (CreateWiki, ManageWiki, etc.) tasks before being granted any access. I've yet to see them do anything related to coding and I've mostly observed her sorting Phabricator tasks or some basic mw-config changes.

I had been (well, still am) working on T10844, but with the recent decision to terminate the Miraheze project is it even necessary at this point?

Jun 16 2023, 18:12 · Amanda Catherine, Site Reliability Engineering
MacFan4000 updated the task description for T10981: [Removal of access] for Paladox.
Jun 16 2023, 18:07 · Site Reliability Engineering
AmandaCath lowered the priority of T10981: [Removal of access] for Paladox from High to Normal.

Per T10969#221218

Jun 16 2023, 18:05 · Site Reliability Engineering
AmandaCath added a project to T10969: [Removal of access] for Reception123: Site Reliability Engineering.
Jun 16 2023, 18:03 · Site Reliability Engineering