Step 9: Analyze & Edit Playbook Library

Version 11542 — Review playbooks, configure validations, and tune durations

Workflow
How This Step Works

This step lets you review and edit everything about your playbook library and its validation pipeline before MOPs are mapped in Step 10. Follow the sub-workflow below:

9A. Review Playbooks
Expand any playbook to view or edit its YAML source inline. Save changes without leaving this page.
9B. Edit Category Settings
Update descriptions, risk levels, and estimated durations for each category.
9C. Manage Validations
Add, edit, or remove validation modules for each category. Assign them to run after specific playbooks.
9D. Continue to Mapping
Once satisfied, proceed to Step 10 to map MOPs to these categories and playbooks.
Legend
Automated validation (runs without human input)
Manual validation (pauses for operator)
category Category mapping label
high medium low Risk levels
Estimated duration in minutes
Playbook YAML file
9 Playbooks 12 Categories 7 Validation Types Available

87 lines · 2.8 KB

150 lines · 4.7 KB

77 lines · 2.4 KB

138 lines · 4.4 KB

112 lines · 3.5 KB

216 lines · 8.2 KB

126 lines · 3.8 KB

79 lines · 2.3 KB

70 lines · 1.9 KB
patch-linux medium 30 min 1 playbook(s), 2 validation(s)
patch_linux.yml
agent-upgrade medium 45 min 3 playbook(s), 3 validation(s)
edit_yaml.yml
commit_to_git.yml
run_manual_pipeline.yml
pipeline-only low 15 min 1 playbook(s), 2 validation(s)
run_manual_pipeline.yml
git-ops low 20 min 2 playbook(s), 1 validation(s)
edit_yaml.yml
commit_to_git.yml
infrastructure high 60 min 3 playbook(s), 4 validation(s)
edit_yaml.yml
commit_to_git.yml
run_manual_pipeline.yml
terraform high 45 min 1 playbook(s), 3 validation(s)
run_terraform.yml
cert-rotation medium 30 min 1 playbook(s), 2 validation(s)
cert_rotation.yml
service-restart medium 20 min 1 playbook(s), 2 validation(s)
service_restart.yml
db-maintenance high 60 min 1 playbook(s), 3 validation(s)
db_maintenance.yml
security-scan low 15 min 1 playbook(s), 1 validation(s)
security_scan.yml
multi-region-patch high 120 min 1 playbook(s), 2 validation(s)
patch_linux.yml
multi-region-deploy critical 180 min 3 playbook(s), 4 validation(s)
edit_yaml.yml
commit_to_git.yml
run_manual_pipeline.yml
patch-linux 2 validation(s) assigned
Wait for services to restart after patching automated pod_health
10 min
Runs after patch_linux.yml
Verify patch level applied automated cli_command
2 min
Runs after patch_linux.yml
agent-upgrade 3 validation(s) assigned
Wait for pipeline to trigger deployment automated wait_delay
5 min
Runs after run_manual_pipeline.yml
Verify agent pods are running new version automated pod_health
10 min
Runs after run_manual_pipeline.yml
Confirm agent version in monitoring dashboard manual human_approval
10 min
Runs at end of step
pipeline-only 2 validation(s) assigned
Wait for pipeline execution automated wait_delay
5 min
Runs after run_manual_pipeline.yml
Check pipeline completion status automated cli_command
2 min
Runs after run_manual_pipeline.yml
git-ops 1 validation(s) assigned
Verify git commit pushed successfully automated cli_command
2 min
Runs after commit_to_git.yml
infrastructure 4 validation(s) assigned
Wait for deployment to propagate automated wait_delay
5 min
Runs after run_manual_pipeline.yml
Verify services healthy after deployment automated pod_health
10 min
Runs after run_manual_pipeline.yml
Validate Azure resources in expected state automated azure_resource_check
5 min
Runs after run_manual_pipeline.yml
Operator verifies infrastructure change manual human_approval
15 min
Runs at end of step
terraform 3 validation(s) assigned
Verify Terraform state is clean automated cli_command
3 min
Runs after run_terraform.yml
Verify provisioned Azure resources automated azure_resource_check
5 min
Runs after run_terraform.yml
Review Terraform changes in Azure Portal manual human_approval
15 min
Runs at end of step
cert-rotation 2 validation(s) assigned
Verify HTTPS endpoints with new certificate automated http_health_check
5 min
Runs after cert_rotation.yml
Check certificate expiry date automated cli_command
2 min
Runs after cert_rotation.yml
service-restart 2 validation(s) assigned
Wait for all pods to reach Running state automated pod_health
10 min
Runs after service_restart.yml
Verify service health endpoint automated http_health_check
5 min
Runs after service_restart.yml
db-maintenance 3 validation(s) assigned
Verify database connectivity automated cli_command
2 min
Runs after db_maintenance.yml
Check maintenance logs for errors automated log_check
3 min
Runs after db_maintenance.yml
DBA verifies database health manual human_approval
15 min
Runs at end of step
security-scan 1 validation(s) assigned
Review scan results for critical findings automated log_check
3 min
Runs after security_scan.yml
multi-region-patch 2 validation(s) assigned
Verify services restarted in region automated pod_health
10 min
Runs after patch_linux.yml
Confirm region patching complete before next region manual human_approval
10 min
Runs at end of step
multi-region-deploy 4 validation(s) assigned
Wait for deployment rollout automated wait_delay
5 min
Runs after run_manual_pipeline.yml
Verify all pods healthy in region automated pod_health
10 min
Runs after run_manual_pipeline.yml
Verify service endpoints responding automated http_health_check
5 min
Runs after run_manual_pipeline.yml
Confirm region deployment before next region manual human_approval
15 min
Runs at end of step

These are the available validation module types. When adding a validation to a category, choose from these types. Each provides default parameters that you can customize.

Wait for Pods/Services pod_health
automated

Monitor Kubernetes pods and services until they reach a healthy running state

Default: 10 min
Default Parameters
{
  "check_command": "kubectl get pods -n {namespace} -l {label_selector} -o json",
  "expected_ready_count": null,
  "label_selector": "",
  "namespace": "",
  "poll_interval_seconds": 15,
  "timeout_seconds": 600
}
Run CLI/Azure Command cli_command
automated

Execute a custom CLI or Azure CLI command and validate the output matches expectations

Default: 5 min
Default Parameters
{
  "command": "",
  "expected_output": "",
  "fail_on_stderr": false,
  "match_type": "contains",
  "retry_count": 3,
  "retry_delay_seconds": 10,
  "timeout_seconds": 120
}
Azure Resource Validation azure_resource_check
automated

Verify an Azure resource exists and is in the expected provisioning or running state

Default: 5 min
Default Parameters
{
  "az_command": "",
  "expected_state": "Running",
  "poll_interval_seconds": 15,
  "resource_group": "",
  "resource_name": "",
  "resource_type": "",
  "timeout_seconds": 300
}
Human Verification human_approval
manual

Pause execution and wait for a human operator to verify a condition and approve continuation

Default: 15 min
Default Parameters
{
  "checklist": [],
  "escalation_after_minutes": 30,
  "instructions": "",
  "notify_channels": [],
  "required_approvers": 1,
  "timeout_minutes": 60
}
Timed Wait wait_delay
automated

Wait a fixed duration before proceeding, allowing services to stabilize

Default: 5 min
Default Parameters
{
  "reason": "",
  "wait_seconds": 300
}
HTTP Health Check http_health_check
automated

Poll an HTTP endpoint repeatedly until it returns the expected status code

Default: 5 min
Default Parameters
{
  "expected_body_contains": "",
  "expected_status": 200,
  "headers": {},
  "method": "GET",
  "poll_interval_seconds": 10,
  "timeout_seconds": 300,
  "url": ""
}
Log/Output Inspection log_check
automated

Inspect log files or command output for expected patterns or absence of errors

Default: 3 min
Default Parameters
{
  "error_patterns": [],
  "log_path": "",
  "must_contain": [],
  "must_not_contain": [],
  "search_pattern": "",
  "tail_lines": 100,
  "timeout_seconds": 60
}