Skip to content

Infra (Automation Routers)

Infra groups are automation routers — they receive machine-generated messages and fan them out to other groups (typically Alerts or Intake). No humans are direct members. They’re the plumbing that connects noisy systems to the right downstream pipes.

prv-{owner}-infra-{system}[-{scope}][-{env}]-{purpose}@{domain}
  • No human subscribers. Infra groups route to other groups, not to people.
  • Allowlisted senders. Only known systems can post.
  • Moderation. MODERATE_ALL_MESSAGES with allowlist — unknown senders get quarantined, not delivered.
  • Locked. Usually automation-managed (Terraform/GAM).
EmailPurpose
prv-plt-infra-gl-ci-routerGitLab CI event classification and fan-out
prv-plt-infra-tf-plan-notifyTerraform plan/apply notifications
prv-plt-infra-aws-eventbridge-routerAWS EventBridge event routing
prv-plt-infra-bridge-{tenant}Cross-tenant bridge router
  • Who can post: Anyone + MODERATE_ALL_MESSAGES + allowlisted senders
  • Members: Other groups only (Alerts, Intake, Mail). Zero humans.
  • External posting: ON (source systems are often external)
  • External members: ON (for sender allowlisting)
  • Archive: ON
  • Security label: OFF
  • Locked: ON (automation-managed)
  • Subject prefix: Recommended (e.g., [GL-CI], [TF-PLAN])
FlavorWhat It DoesDownstream
Fan-outOne source → multiple destinationsMultiple Alerts or Intake groups
ClassifierOne source → classify by content → route to specific pipeTopic-specific Alerts groups
BridgeCross-tenant routingAnother tenant’s Infra or Alerts
AggregatorMany sources → one destinationSingle Alerts or Intake group
Terraform Cloud → prv-plt-infra-tf-plan-notify
├→ prv-plt-alerts-tf-prd (failures)
└→ prv-plt-intake-tf-audit (all runs)
GitLab → prv-plt-infra-gl-ci-router
├→ prv-sec-alerts-gl-security (security events)
├→ prv-eng-alerts-gl-deploy (deploy failures)
└→ prv-plt-intake-gl-audit (audit trail)
Tenant A system → prv-plt-infra-bridge-pai
└→ pai-plt-alerts-shared-platform
  1. Identify source system(s) and downstream destinations.
  2. Set email/name/description.
  3. Labels: Mailing=ON, Security=OFF, Locked=ON.
  4. Set MODERATE_ALL_MESSAGES + allowlist source senders.
  5. Add downstream groups as members (Alerts, Intake, or other Infra).
  6. Verify zero human members.
  7. Add subject prefix for downstream filtering.
  • Monitor: quarantined messages (new source not yet allowlisted).
  • Quarterly: review downstream routing, add/remove destinations.
  • Verify: no humans have been added as members.
  • Confirm no active sources route to this group.
  • Update downstream groups that referenced this router.
  • Export archive. Delete after hold.
  • Humans as direct members of Infra groups (use downstream Alerts/Mail instead)
  • Infra groups without allowlists (becomes a spam sink)
  • Direct system-to-Alerts without an Infra router when volume is high or classification is needed
  • Infra groups on any ACLs
MetricTarget
Human members in Infra groups0
Quarantined messages (allowlist gap)Investigated within 1 biz day
Downstream routing accuracy100%
Quarterly routing reviewCompleted