Skip to content

Commit ddf454a

Browse files
committed
Obfuscation
1 parent 1037416 commit ddf454a

22 files changed

+38
-46
lines changed

Diff for: app/app-template.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
runtime: python37
1+
runtime: python39
22

33
service: ${SITE}
44

Diff for: config.toml

-2
Original file line numberDiff line numberDiff line change
@@ -27,5 +27,3 @@ pygmentCodeFences = true
2727
gitlab = "username"
2828
github = "darren-lester-epam"
2929
linkedin = "username"
30-
stackoverflow = "users/XXXXXXX/username"
31-
youtube = "user/username" # or channel/channelname

Diff for: content/epam-lz/Decision Records/_index.md renamed to content/lz/Decision Records/_index.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@ chapter: true
77

88
# {{< param title >}}
99

10-
Decision records relating to the LZiiB platform. This includes various decisions made as part of LZiiB v1 and LZiiB Evolution.
10+
Decision records relating to the LZiiB platform.
1111

1212
{{<children>}}

Diff for: content/epam-lz/_index.md renamed to content/lz/_index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "EPAM LZ-in-a-Box (LZiiB)"
3-
menuTitle: "EPAM LZ-in-a-Box"
2+
title: "Lanzing Zone-in-a-Box (LZiiB)"
3+
menuTitle: "LZ-in-a-Box"
44
weight: 10
55
chapter: true
66
---

Diff for: content/epam-lz/design-overview.md renamed to content/lz/design-overview.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ This allows **management and security policies to be applied top down** at any l
6161

6262
Notes on this hierarchy:
6363

64-
- The standard **naming convention** for a project is `epam-ecp-{tier}-{tenant}-{project_name}`
64+
- The standard **naming convention** for a project is `some-org-ecp-{tier}-{tenant}-{project_name}`
6565
- The `tier` can be one of `prod`, `flex` = i.e. any non-production environment, or `sbox` = sandbox
6666
- Ultimately, all resources in GCP are deployed into Google Cloud `projects`.
6767
- The project is the **basic unit of organisation** of GCP resources.
@@ -89,7 +89,7 @@ Notes on this hierarchy:
8989

9090
LZiiB uses a **hub-and-spoke** network architecture:
9191

92-
- **A _common VPC_ network acts as the _hub_**, and hosts centralised networking and security resources. This includes private IP connectivity, via the SLA-backed, high-bandwidth / low-latency _Interconnect_, to the EPAM on-premises network.
92+
- **A _common VPC_ network acts as the _hub_**, and hosts centralised networking and security resources. This includes private IP connectivity, via the SLA-backed, high-bandwidth / low-latency _Interconnect_, to the some-org on-premises network.
9393
- **Tenant projects will have their own _spoke_ VPC network.** Thus, tenants have full automonmy and control over resources deployed within their own VPC.
9494
- Tenants may be _peered_ to the hub shared VPC network. This is how tenants can:
9595
- Obtain private connectivity to the on-premises network (if appropriate).
@@ -133,7 +133,7 @@ However, deployment across multiple zones within a single region is insufficient
133133

134134
### Outbound Internet Connectivity
135135

136-
Outbound connectivity from Google resources to the Internet is routed through EPAM Zscaler VPN. This allows centralised application of security controls.
136+
Outbound connectivity from Google resources to the Internet is routed through some-org Zscaler VPN. This allows centralised application of security controls.
137137

138138
### Inbound Connectivity from the Internet
139139

File renamed without changes.

Diff for: content/epam-lz/onboarding/cost-management.md renamed to content/lz/onboarding/cost-management.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Here are some general tips for keeping costs under control, when using Google Cl
4848

4949
All deployed Google Cloud resources are attributed to a single project. Consequently, **project costs are accumulated at the project level**. All these projects are ultimately associated with a **billing account** that is the responsibility of the LZiiB Service Owner.
5050

51-
The day-to-day management, analysis and reporting of our billing account is managed by **AppsBroker**, who EPAM have contracted with to provide Financial Operations expertise in GCP.
51+
The day-to-day management, analysis and reporting of our billing account is managed by **AppsBroker**, who some-org have contracted with to provide Financial Operations expertise in GCP.
5252

5353
### Cost Visibility
5454

@@ -61,7 +61,7 @@ The day-to-day management, analysis and reporting of our billing account is mana
6161

6262
### Budget Alert Receivers
6363

64-
In order to receive the programatic budget alerts for a project, users will need to hold the EPAM Budget Alert Receiver role on the relevant project(s). The role now works with inheritance so can either be held on the project itself or inherited from above. The role works with both individual accounts and Google groups.
64+
In order to receive the programatic budget alerts for a project, users will need to hold the some-org Budget Alert Receiver role on the relevant project(s). The role now works with inheritance so can either be held on the project itself or inherited from above. The role works with both individual accounts and Google groups.
6565

6666
A list of budget alert receivers for a project will be gathered as part of the onboarding process but can be updated at any time by contacting the Cloud Team.
6767

@@ -85,10 +85,10 @@ When deploying resources in your tenancy using the _project factory_ and _IaC_,
8585

8686
|Label Name|Description|Possible Values|
8787
|----------|-----------|---------------|
88-
|epam_platform|Which top level platform is in use|LZiiB / Other|
89-
|epam_tenant|Your tenancy|Any|
90-
|epam_service|Project or service|Any|
91-
|responsible|EPAM Cost Centre|Any|
88+
|some-org_platform|Which top level platform is in use|LZiiB / Other|
89+
|some-org_tenant|Your tenancy|Any|
90+
|some-org_service|Project or service|Any|
91+
|responsible|some-org Cost Centre|Any|
9292
|layer|Whether prod, non-prod, or sandbox|prod / flex / sbox|
9393

9494
In addition, you can add your own custom tenant labels to your resources. Specify any labels you want to use when you request your tenancy. For example, you might consider labels such as:
File renamed without changes.
File renamed without changes.

Diff for: content/epam-lz/onboarding/patching.md renamed to content/lz/onboarding/patching.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -51,12 +51,12 @@ This typically refers to IaaS-type products. For example, Google Compute Engine
5151

5252
To ensure that we always use secure, CIS-compliant, patched operating system images, we start by taking a standard [CIS-compliant](https://cloud.google.com/container-optimized-os/docs/how-to/cis-compliance) hardened [Shielded VM image](https://cloud.google.com/compute/shielded-vm/docs/shielded-vm) from Google.
5353

54-
We then apply some additional EPAM configuration, using Hashicorp Packer. The result is a CIS-compliant, EPAM _gold_ image for a given OS.
54+
We then apply some additional some-org configuration, using Hashicorp Packer. The result is a CIS-compliant, some-org _gold_ image for a given OS.
5555

5656
{{<mermaid align="left">}}
5757
graph LR
58-
GImg[Google CIS-Compliant<br /> Shielded VM Image] -- Packer --> EPAMImg[EPAM CIS-Compliant<br />Gold Image]
59-
EPAMImg -- Push --> GImgSt[Google Image Storage]
58+
GImg[Google CIS-Compliant<br /> Shielded VM Image] -- Packer --> some-orgImg[some-org CIS-Compliant<br />Gold Image]
59+
some-orgImg -- Push --> GImgSt[Google Image Storage]
6060

6161
classDef default fill:#2874A6,stroke:#555,color:white;
6262
linkStyle default fill:none,color:black;
@@ -66,11 +66,11 @@ This process is automatic through a CI/CD pipeline, resulting in our images bein
6666

6767
#### Deploying Instances
6868

69-
We are now able to build GCE instances (VMs) from our image. On LZiiB, our security policy will only permit the use of _Shielded VM images_. I.e. Google images that are already in the _Shielded_ category, or EPAM CIS-compliant gold images.
69+
We are now able to build GCE instances (VMs) from our image. On LZiiB, our security policy will only permit the use of _Shielded VM images_. I.e. Google images that are already in the _Shielded_ category, or some-org CIS-compliant gold images.
7070

7171
{{<mermaid align="left">}}
7272
graph LR
73-
GImg[EPAM/Google CIS-Compliant<br /> Shielded VM Image] -- "Deploy<br />instance" --> GCE[GCE Instance]
73+
GImg[some-org/Google CIS-Compliant<br /> Shielded VM Image] -- "Deploy<br />instance" --> GCE[GCE Instance]
7474
GCE -- "Apply<br/> Startup Script" --> GCE_Ans[GCE Instance<br /> registered with Ansible]
7575
GCE_Ans -- "Apply<br/> agents and patches" --> GCE_Go[Instance<br />Ready for Use]
7676

Diff for: content/epam-lz/onboarding/responsibilities.md renamed to content/lz/onboarding/responsibilities.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The Cloud Platform Team will not provide ongoing management, maintenance, patchi
2323
|Provisioning and maintenance of the shared infrastructure, including Shared VPC and Shared (multitenant) GKE clusters.|Cloud Platform Team|Achieved through Landing Zone IaC and pipeline|
2424
|Provisioning and maintenance of any non-GCP hosting, network and connectivity infrastructure (on-premises and SaaS)|Infastructure Platforms & Networking|As with existing non-GCP hosting and networking infrastructure. Includes things like: on-premises firewalls and Zscaler Internet Access proxies|
2525
|Provisioning and maintenance of GCP Zscaler tunnels to Zscaler Internet Access (ZIA)|Cloud Platform Team|Including setting up of GCP VPN configuration and VPC routing tables|
26-
|Provisioning and maintenance of EPAM custom gold OS images|Cloud Platform Team|Using automated Packer pipeline process. Any requests for amendments to existing images, or for new images (e.g. for new operating systems) should be issued to the Cloud Platform Team. Note that maintaining the latest version of existing images is considered BAU activity.|
26+
|Provisioning and maintenance of some-org custom gold OS images|Cloud Platform Team|Using automated Packer pipeline process. Any requests for amendments to existing images, or for new images (e.g. for new operating systems) should be issued to the Cloud Platform Team. Note that maintaining the latest version of existing images is considered BAU activity.|
2727
|Provisioning of sandbox projects for individuals|Cloud Platform Team|Accomplished through the Tenant Factory. Delivers a project used by individuals for familiarisation, learning, experimentation, and PoC work.|
2828
|Requesting a tenancy|Tenant|Through tenant request process.|
2929
|Provisioning of _default_ IAM groups for the new tenant|Cloud Platform Team|The Cloud Platform Team completes an automated request to the Google Workspace Team, which results in the creatin of groups.|

Diff for: content/epam-lz/onboarding/sandbox.md renamed to content/lz/onboarding/sandbox.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ We offer two different flavours of sandbox environment:
2626

2727
|Type|Purpose|Name|
2828
|----|-------|----|
29-
|Individual|Allows individual users to: become familiar with GCP; learn and experiment; develop; test ideas.|epam-ecp-sandbox-{firstname-lastname}
30-
|Tenant|Allows tenants (typically collections of multiple users) to: conduct early PoC work with their applications; develop; experiment; to develop infrastructure-as-code; with relatively unrestricted ability to deploy resources with the Google console.|epam-ecp-sandbox-{tenant}-{project_name}|
29+
|Individual|Allows individual users to: become familiar with GCP; learn and experiment; develop; test ideas.|some-org-ecp-sandbox-{firstname-lastname}
30+
|Tenant|Allows tenants (typically collections of multiple users) to: conduct early PoC work with their applications; develop; experiment; to develop infrastructure-as-code; with relatively unrestricted ability to deploy resources with the Google console.|some-org-ecp-sandbox-{tenant}-{project_name}|
3131

3232
## Considerations
3333

Diff for: content/epam-lz/onboarding/your-tenancy.md renamed to content/lz/onboarding/your-tenancy.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -73,17 +73,17 @@ graph LR
7373
Projects will be named according to the following naming standard:
7474

7575
```text
76-
epam-ecp-{tier}-{tenant}-{project_name}
76+
some-org-ecp-{tier}-{tenant}-{project_name}
7777
```
7878

7979
`{tier}` is one of `prod`, `flex`, or `sbox`.
8080

8181
As an example, your initial project name might look like this:
8282

8383
```text
84-
epam-ecp-prod-pdp-app_foo
85-
epam-ecp-sbox-selling-app_bar
86-
epam-ecp-flex-ordering-sterling_1
84+
some-org-ecp-prod-pdp-app_foo
85+
some-org-ecp-sbox-selling-app_bar
86+
some-org-ecp-flex-ordering-sterling_1
8787
```
8888

8989
## Default Tenant Groups
@@ -92,11 +92,11 @@ New tenants will be given a *default set of groups*, with appropriate roles for
9292

9393
| Group Name | Access to |
9494
|------------|-----------|
95-
|_gcp-epam-ecp-&lt;tenant&gt;-admin|Admin access for all projects in your tenancy|
96-
|_gcp-epam-ecp-prod-&lt;tenant&gt;-viewer|View access for your Prod tenant hierarchy|
97-
|_gcp-epam-ecp-flex-&lt;tenant&gt;-viewer|View access for your Non-Prod (Flex) tenant hierarchy|
98-
|_gcp-epam-ecp-prod-&lt;tenant&gt;-support|Support access (including logging and monitoring access) for your Prod tenant hierarchy|
99-
|_gcp-epam-ecp-flex-&lt;tenant&gt;-support|Support access (including logging and monitoring access) for your Non-Prod (Flex) tenant hierarchy|
95+
|_gcp-some-org-ecp-&lt;tenant&gt;-admin|Admin access for all projects in your tenancy|
96+
|_gcp-some-org-ecp-prod-&lt;tenant&gt;-viewer|View access for your Prod tenant hierarchy|
97+
|_gcp-some-org-ecp-flex-&lt;tenant&gt;-viewer|View access for your Non-Prod (Flex) tenant hierarchy|
98+
|_gcp-some-org-ecp-prod-&lt;tenant&gt;-support|Support access (including logging and monitoring access) for your Prod tenant hierarchy|
99+
|_gcp-some-org-ecp-flex-&lt;tenant&gt;-support|Support access (including logging and monitoring access) for your Non-Prod (Flex) tenant hierarchy|
100100

101101
## Service Account
102102

@@ -124,7 +124,7 @@ If you intend to store sensitive data on your network and require perimeter cont
124124

125125
## Your GitLab and Infrastructure Code
126126

127-
As a new tenant, you will need to store your project's code in GitLab. This includes all the IaC you will use to deploy resources into your LZiiB environments. Within **EPAM's GitLab**, the hiearchy looks like this:
127+
As a new tenant, you will need to store your project's code in GitLab. This includes all the IaC you will use to deploy resources into your LZiiB environments. Within **some-org's GitLab**, the hiearchy looks like this:
128128

129129
{{<mermaid align="left">}}
130130
graph TD
@@ -154,7 +154,7 @@ graph TD
154154

155155
You will need to do the following:
156156

157-
1. Create GitLab user accounts for any users in your team/tenancy that do not yet have a GitLab user account. (Follow guidance [here](https://epam.engineering/how/setting-up-a-gitlab-account/).)
157+
1. Create GitLab user accounts for any users in your team/tenancy that do not yet have a GitLab user account. (Follow guidance [here](https://some-org.engineering/how/setting-up-a-gitlab-account/).)
158158
1. Decide who will be your GitLab **tenancy subgroup owner(s)**.
159159
1. Submit a [request](/ecp/onboarding/getting-started/#how-to-raise-a-tenancy-request) to the _LZiiB (GitLab) owners_ to create your tenancy subgroup. At this time, you will need to inform the _LZiiB owners_ of at least one _tenancy subgroup owner_.
160160

Diff for: content/epam-lz/overview.md renamed to content/lz/overview.md

+2-8
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,10 @@ weight: 5
88

99
- [What is LZiiB?](#what-is-LZiiB)
1010
- [Motivation for LZiiB](#motivation-for-LZiiB)
11-
- [Useful Links](#useful-links)
1211

1312
## What is LZiiB
1413

15-
LZiiB is our reusable **EPAM Landing Zone-in-a-Box**. It is a GCP-based platform, intended for the hosting of cloud-native applications, off-the-shelf products, packages, and as a migration target for existing VM-based on-prem workloads. These workloads can be Internet-facing, internally-facing, or both.
14+
LZiiB is our reusable **some-org Landing Zone-in-a-Box**. It is a GCP-based platform, intended for the hosting of cloud-native applications, off-the-shelf products, packages, and as a migration target for existing VM-based on-prem workloads. These workloads can be Internet-facing, internally-facing, or both.
1615

1716
## Motivation for LZiiB
1817

@@ -31,7 +30,7 @@ Google Cloud Platform offers hundreds of services. There are a staggering numbe
3130
LZiiB wraps these standard Google Cloud services with:
3231

3332
- A **landing zone** and **(Google) project factory**, providing a repeatable and consistent way to deploy cloud services, using standardised tools, monitoring, preferred patterns, and repeatable infrastructure-as-code.
34-
- Default **security policies**, to meet the enterprise needs of EPAM.
33+
- Default **security policies**, to meet the enterprise needs of some-org.
3534
- **Enforced use of automation**, to prevent configuration drift and inconsistency, and to ensure agility.
3635
- Private, SLA-backed high bandwidth, low latency **connectivity** to on-premises data centre networks, for use cases that need it. (E.g. for routine high volume data transfer.)
3736
- **Identity and access management** that is integrated with our existing on-prem master identity provider, Active Directory.
@@ -40,8 +39,3 @@ LZiiB wraps these standard Google Cloud services with:
4039
- A standardised, centralised approach to **operational support**.
4140
- Policy-enforced standardised **CIS-compliant operating system images**.
4241
- Standardised automation to create **single-tenant and multi-tenant Kubernetes** environments, for workloads and packages that can run in containers.
43-
44-
## Useful Links
45-
46-
- [LZiiB Overview](https://docs.google.com/presentation/d/1HOUBPD_6JQYMeknhn6aEf_4BhGBF8qNTw5lMlckiA8I)
47-
- [LZiiB Evolution Project - Overview and Familiarisation](https://docs.google.com/presentation/d/1XZgoScNIjp_BL_j5Ku_1M0lerC_J8arsMLpNFeggPrg)
File renamed without changes.

Diff for: content/epam-lz/patterns/TP001-DR.md renamed to content/lz/patterns/TP001-DR.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,6 @@ TBC.
143143
- [Architecting for DR in Google Cloud](https://cloud.google.com/architecture/disaster-recovery)
144144
- [Google Cloud DR Building Blocks](https://cloud.google.com/architecture/dr-scenarios-building-blocks)
145145
- [DR Scenarios for Data on Google Cloud](https://cloud.google.com/architecture/dr-scenarios-building-blocks)
146-
- [EPAM Availability Tiers - including RTOs and RPOs](https://docs.google.com/presentation/d/1HeJWoiUBGvVUYvidfhjPPELUcIkefG1aXZVkmuDShGc/edit#slide=id.g176b3abaab_4_22)
146+
- [some-org Availability Tiers - including RTOs and RPOs](https://docs.google.com/presentation/d/1HeJWoiUBGvVUYvidfhjPPELUcIkefG1aXZVkmuDShGc/edit#slide=id.g176b3abaab_4_22)
147147

148148

File renamed without changes.
File renamed without changes.

Diff for: src/config.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ params:
2828
editURL: "https://gitlab.com/demo-lz-docs/lz-cloud-team-portal/tree/master/content/"
2929
commitURL: "https://gitlab.com/demo-lz-docs/lz-cloud-team-portal/onboarding/commit/"
3030
author: "Darren Lester"
31-
description: "Documentation for the EPAM LZ-in-a-Box Demo Docs"
31+
description: "Documentation for the some-org LZ-in-a-Box Demo Docs"
3232
showVisitedLinks: true
3333
disableSearch: false
3434
# Javascript and CSS cache are automatically busted when new version of site is generated.

Diff for: src/themes/Learn/layouts/partials/custom-header.html

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
// Cookie code hacked from: https://www.thesitewizard.com/javascripts/cookies.shtml
1010

11-
var style_cookie_name = "epam_docs_style";
11+
var style_cookie_name = "some-org_docs_style";
1212
var style_cookie_duration = 3600;
1313
// {{ $url := urls.Parse .Site.BaseURL }}
1414
// var style_domain = "{{ $url.Hostname }}";

Diff for: themes/Learn/layouts/partials/custom-header.html

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
// Cookie code hacked from: https://www.thesitewizard.com/javascripts/cookies.shtml
1010

11-
var style_cookie_name = "epam_docs_style";
11+
var style_cookie_name = "some-org_docs_style";
1212
var style_cookie_duration = 3600;
1313
// {{ $url := urls.Parse .Site.BaseURL }}
1414
// var style_domain = "{{ $url.Hostname }}";

0 commit comments

Comments
 (0)