Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion codebundles/aws-cloudwatch-overused-ec2/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,6 @@ Check For Overutilized Ec2 Instances
... The following EC2 instances in ${AWS_DEFAULT_REGION} are classified as over-utilized according to the threshold: ${UTILIZATION_THRESHOLD}:\n\n
RW.Core.Add Pre To Report ${util_metrics.stdout}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}


*** Keywords ***
Expand Down
1 change: 0 additions & 1 deletion codebundles/azure-loadbalancer-triage/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,6 @@ Check Activity Logs for Azure Load Balancer `${AZ_LB_NAME}`
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report ${activity_logs_report}
RW.Core.Add Pre To Report Commands Used: ${history}


*** Keywords ***
Expand Down
3 changes: 0 additions & 3 deletions codebundles/curl-gmp-kong-ingress-inspection/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,6 @@ Check If Kong Ingress HTTP Error Rate Violates HTTP Error Threshold in GCP Proje
... env=${env}
... secret_file__gcp_credentials=${gcp_credentials}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}
RW.Core.Add Pre To Report HTTP Error Violation & Details:\n${gmp_rsp.stdout}
RW.Core.Add Pre To Report GMP Json Data:\n${gmp_json.stdout}

Expand Down Expand Up @@ -82,7 +81,6 @@ Check If Kong Ingress HTTP Request Latency Violates Threshold in GCP Project `${
... next_steps=Troubleshoot Namespace `${namespace_name.stdout}` Services and Application Workloads for HTTP-related errors.
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}
RW.Core.Add Pre To Report HTTP Request Latency Within Acceptable Parameters:\n${gmp_rsp.stdout}

Check If Kong Ingress Controller Reports Upstream Errors in GCP Project `${GCP_PROJECT_ID}`
Expand Down Expand Up @@ -126,7 +124,6 @@ Check If Kong Ingress Controller Reports Upstream Errors in GCP Project `${GCP_P
... next_steps=Investigate upstream service health and Kong ingress controller configuration
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}
RW.Core.Add Pre To Report Kong Upstream Healthchecks Enabled:\n${gmp_healthchecks_off_rsp.stdout}
RW.Core.Add Pre To Report Kong Upstream Healthcheck Issues:\n${gmp_healthchecks_rsp.stdout}

Expand Down
2 changes: 0 additions & 2 deletions codebundles/curl-gmp-nginx-ingress-inspection/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,6 @@ Fetch Nginx HTTP Errors From GMP for Ingress `${INGRESS_OBJECT_NAME}`
... Kubernetes Ingress Details include: \n${k8s_ingress_details.stdout}
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}
RW.Core.Add Pre To Report Ingress Info:\n${ingress_info} Ingress Owner:${ingress_owner.stdout}
RW.Core.Add Pre To Report GMP Json Data:\n${gmp_json.stdout}

Expand All @@ -82,7 +81,6 @@ Find Owner and Service Health for Ingress `${INGRESS_OBJECT_NAME}`
... show_in_rwl_cheatsheet=true
... render_in_commandlist=true
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}
RW.Core.Add Pre To Report Ingress Info:\n${k8s_ingress_details.stdout}

*** Keywords ***
Expand Down
1 change: 0 additions & 1 deletion codebundles/curl-http-ok/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,6 @@ Check Single HTTP URL
END
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}

# Add reporting with safe defaults for failed curl commands
IF ${curl_rsp.returncode} == 0
Expand Down
5 changes: 0 additions & 5 deletions codebundles/dns-health/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,6 @@ Check DNS Zone Records
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report === Task Summary ===
RW.Core.Add Pre To Report DNS zone health check completed for all specified zones.
RW.Core.Add Pre To Report Commands Used: ${history}

Detect Broken Record Resolution
[Documentation] Implements repeated DNS checks for multiple FQDNs to detect resolution failures
Expand Down Expand Up @@ -148,7 +147,6 @@ Detect Broken Record Resolution
END

${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}

Test Forward Lookup Zones
[Documentation] Tests forward lookup zones and conditional forwarders for proper resolution
Expand Down Expand Up @@ -219,7 +217,6 @@ Test Forward Lookup Zones
END

${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}

External Resolution Validation
[Documentation] Tests resolution of multiple public domains through multiple resolvers
Expand Down Expand Up @@ -314,7 +311,6 @@ External Resolution Validation
END

${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}

DNS Latency Check
[Documentation] Tests DNS query latency for configured zones
Expand Down Expand Up @@ -401,7 +397,6 @@ DNS Latency Check
END

${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}

*** Keywords ***
Suite Initialization
Expand Down
1 change: 0 additions & 1 deletion codebundles/gcloud-log-inspection/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -103,5 +103,4 @@ Inspect GCP Logs For Common Errors in GCP Project `${GCP_PROJECT_ID}`
RW.Core.Add Pre To Report \n\n
RW.Core.Add Pre To Report Full Logs:\n ${rsp.stdout}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}

7 changes: 0 additions & 7 deletions codebundles/gh-actions-health/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,6 @@ Check Recent Workflow Failures Across Specified Repositories
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Recent Workflow Failures Analysis:\n${workflow_failures.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}

Check Long Running Workflows Across Specified Repositories
[Documentation] Identifies workflows that have been running longer than expected thresholds across the specified repositories
Expand Down Expand Up @@ -106,7 +105,6 @@ Check Long Running Workflows Across Specified Repositories
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Long Running Workflows Analysis:\n${long_running_analysis.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}

Check Repository Health Summary for Specified Repositories
[Documentation] Provides a comprehensive health summary across the specified repositories
Expand Down Expand Up @@ -148,7 +146,6 @@ Check Repository Health Summary for Specified Repositories
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Repository Health Summary:\n${repo_health.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}

Check GitHub Actions Runner Health Across Specified Organizations
[Documentation] Monitors the health and availability of GitHub Actions runners across the specified organizations
Expand Down Expand Up @@ -205,7 +202,6 @@ Check GitHub Actions Runner Health Across Specified Organizations
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Runner Health Analysis:\n${runner_health.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}

Check Security Workflow Status Across Specified Repositories
[Documentation] Monitors security-related workflows and dependency scanning results across the specified repositories
Expand Down Expand Up @@ -261,7 +257,6 @@ Check Security Workflow Status Across Specified Repositories
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Security Workflow Analysis:\n${security_analysis.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}

Check GitHub Actions Billing and Usage Across Specified Organizations
[Documentation] Monitors GitHub Actions usage patterns and potential billing concerns across the specified organizations
Expand Down Expand Up @@ -302,7 +297,6 @@ Check GitHub Actions Billing and Usage Across Specified Organizations
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Billing and Usage Analysis:\n${billing_analysis.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}

Check GitHub API Rate Limits
[Documentation] Monitors GitHub API rate limit usage to prevent throttling during health checks
Expand Down Expand Up @@ -342,7 +336,6 @@ Check GitHub API Rate Limits
END
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report GitHub API Rate Limit Status:\n${rate_limit_check.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}


*** Keywords ***
Expand Down
2 changes: 0 additions & 2 deletions codebundles/k8s-app-troubleshoot/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,6 @@ Get `${CONTAINER_NAME}` Application Logs from Workload `${WORKLOAD_NAME}` in Nam
... secret_file__kubeconfig=${kubeconfig}
RW.Core.Add Pre To Report Workload Logs:\n\n${logs.stdout}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Commands Used: ${history}

Scan `${CONTAINER_NAME}` Application For Misconfigured Environment
[Documentation] Compares codebase to configured infra environment variables and attempts to report missing environment variables in the app
Expand All @@ -40,7 +39,6 @@ Scan `${CONTAINER_NAME}` Application For Misconfigured Environment
... secret_file__kubeconfig=${kubeconfig}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Stdout:\n\n${script_run.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}

Tail `${CONTAINER_NAME}` Application Logs For Stacktraces in Workload `${WORKLOAD_NAME}`
[Documentation] Performs an inspection on container logs for exceptions/stacktraces, parsing them and attempts to find relevant source code information
Expand Down
9 changes: 0 additions & 9 deletions codebundles/k8s-daemonset-healthcheck/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -530,7 +530,6 @@ Inspect DaemonSet Warning Events for `${DAEMONSET_NAME}` in Namespace `${NAMESPA
... observed_at=${issue_timestamp}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Failed to retrieve events:\n\n${events.stderr}
RW.Core.Add Pre To Report Commands Used: ${history}
ELSE
${k8s_daemonset_details}= RW.CLI.Run Cli
... cmd=${KUBERNETES_DISTRIBUTION_BINARY} get daemonset ${DAEMONSET_NAME} -n ${NAMESPACE} --context ${CONTEXT} -o json
Expand All @@ -550,7 +549,6 @@ Inspect DaemonSet Warning Events for `${DAEMONSET_NAME}` in Namespace `${NAMESPA
... observed_at=${issue_timestamp}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Failed to retrieve DaemonSet details:\n\n${k8s_daemonset_details.stderr}
RW.Core.Add Pre To Report Commands Used: ${history}
ELSE
${related_resource_recommendations}= RW.K8sHelper.Get Related Resource Recommendations
... k8s_object=${k8s_daemonset_details.stdout}
Expand Down Expand Up @@ -671,7 +669,6 @@ Inspect DaemonSet Warning Events for `${DAEMONSET_NAME}` in Namespace `${NAMESPA

${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report ${events.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}
END
END

Expand All @@ -698,11 +695,9 @@ Fetch DaemonSet Workload Details For `${DAEMONSET_NAME}` in Namespace `${NAMESPA
... observed_at=${issue_timestamp}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Failed to retrieve DaemonSet manifest:\n\n${daemonset.stderr}
RW.Core.Add Pre To Report Commands Used: ${history}
ELSE
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Snapshot of DaemonSet state:\n\n${daemonset.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}
END

Inspect DaemonSet Status for `${DAEMONSET_NAME}` in namespace `${NAMESPACE}`
Expand Down Expand Up @@ -739,7 +734,6 @@ Inspect DaemonSet Status for `${DAEMONSET_NAME}` in namespace `${NAMESPACE}`
... observed_at=${issue_timestamp}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Failed to retrieve DaemonSet status:\n\n${daemonset_status.stderr}
RW.Core.Add Pre To Report Commands Used: ${history}
ELSE
TRY
${ds_status}= Evaluate json.loads(r'''${daemonset_status.stdout}''') if r'''${daemonset_status.stdout}'''.strip() else {} json
Expand Down Expand Up @@ -804,7 +798,6 @@ Inspect DaemonSet Status for `${DAEMONSET_NAME}` in namespace `${NAMESPACE}`

${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report DaemonSet Status: Ready=${number_ready}/${desired_scheduled}, Unavailable=${number_unavailable}, Misscheduled=${number_misscheduled}
RW.Core.Add Pre To Report Commands Used: ${history}
END

Check Node Affinity and Tolerations for DaemonSet `${DAEMONSET_NAME}` in Namespace `${NAMESPACE}`
Expand Down Expand Up @@ -838,7 +831,6 @@ Check Node Affinity and Tolerations for DaemonSet `${DAEMONSET_NAME}` in Namespa
... observed_at=${issue_timestamp}
${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Failed to retrieve node constraints:\n\n${node_constraints.stderr}
RW.Core.Add Pre To Report Commands Used: ${history}
ELSE
TRY
${constraints}= Evaluate json.loads(r'''${node_constraints.stdout}''') if r'''${node_constraints.stdout}'''.strip() else {} json
Expand Down Expand Up @@ -877,7 +869,6 @@ Check Node Affinity and Tolerations for DaemonSet `${DAEMONSET_NAME}` in Namespa

${history}= RW.CLI.Pop Shell History
RW.Core.Add Pre To Report Node Constraints:\n${node_constraints.stdout}
RW.Core.Add Pre To Report Commands Used: ${history}
END


Expand Down
Loading
Loading