# Copyright 2017 Red Hat, Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. # # == Class: tripleo::profile::pacemaker::database::redis_bundle # # Containerized Redis Pacemaker HA profile for tripleo # # === Parameters # # [*redis_docker_image*] # (Optional) The docker image to use for creating the pacemaker bundle # Defaults to hiera('tripleo::profile::pacemaker::redis_bundle::redis_docker_image', undef) # # [*redis_docker_control_port*] # (Optional) The bundle's pacemaker_remote control port on the host # Defaults to hiera('tripleo::profile::pacemaker::redis_bundle::control_port', '3124') # # [*pcs_tries*] # (Optional) The number of times pcs commands should be retried. # Defaults to hiera('pcs_tries', 20) # # [*bootstrap_node*] # (Optional) The hostname of the node responsible for bootstrapping tasks # Defaults to hiera('redis_short_bootstrap_node_name') # # [*step*] # (Optional) The current step in deployment. See tripleo-heat-templates # for more details. # Defaults to hiera('step') # # [*certificate_specs*] # (Optional) The specifications to give to certmonger for the certificate(s) # it will create. # Example with hiera: # redis_certificate_specs: # hostname: # service_certificate: # service_key: # principal: "haproxy/" # Defaults to hiera('redis_certificate_specs', {}). # # [*enable_internal_tls*] # (Optional) Whether TLS in the internal network is enabled or not. # Defaults to hiera('enable_internal_tls', false) # # [*redis_network*] # (Optional) The network name where the redis endpoint is listening on. # This is set by t-h-t. # Defaults to hiera('redis_network', undef) # # [*extra_config_file*] # (Optional) When TLS proxy is in use, name of a host-specific Redis # config file that configures tunnel connection. # This is set by t-h-t. # Defaults to '/etc/redis-tls.conf' # # [*tls_tunnel_local_name*] # (Optional) When TLS proxy is in use, name of the localhost to forward # unencryption Redis traffic to. # This is set by t-h-t. # Defaults to 'localhost' # # [*tls_tunnel_base_port*] # (Optional) When TLS proxy is in use, a base integer value that is used # to generate a unique port number for each peer in the Redis cluster. # Defaults to '6660' # # [*tls_proxy_bind_ip*] # IP on which the TLS proxy will listen on. Required only if # enable_internal_tls is set. # Defaults to undef # # [*tls_proxy_fqdn*] # fqdn on which the tls proxy will listen on. required only used if # enable_internal_tls is set. # defaults to undef # # [*tls_proxy_port*] # port on which the tls proxy will listen on. Only used if # enable_internal_tls is set. # defaults to 6379 # # [*tls_priorities*] # (optional) Sets PCMK_tls_priorities in /etc/sysconfig/pacemaker when set # Defaults to hiera('tripleo::pacemaker::tls_priorities', undef) # class tripleo::profile::pacemaker::database::redis_bundle ( $certificate_specs = hiera('redis_certificate_specs', {}), $enable_internal_tls = hiera('enable_internal_tls', false), $bootstrap_node = hiera('redis_short_bootstrap_node_name'), $redis_docker_image = hiera('tripleo::profile::pacemaker::database::redis_bundle::redis_docker_image', undef), $redis_docker_control_port = hiera('tripleo::profile::pacemaker::database::redis_bundle::control_port', '3124'), $pcs_tries = hiera('pcs_tries', 20), $step = Integer(hiera('step')), $redis_network = hiera('redis_network', undef), $extra_config_file = '/etc/redis-tls.conf', $tls_tunnel_local_name = 'localhost', $tls_tunnel_base_port = 6660, $tls_proxy_bind_ip = undef, $tls_proxy_fqdn = undef, $tls_proxy_port = 6379, $tls_priorities = hiera('tripleo::pacemaker::tls_priorities', undef), ) { if $::hostname == downcase($bootstrap_node) { $pacemaker_master = true } else { $pacemaker_master = false } if $enable_internal_tls { if !$redis_network { fail('redis_network is not set in the hieradata.') } if !$tls_proxy_bind_ip { fail('tls_proxy_bind_ip is not set in the hieradata.') } if !$tls_proxy_fqdn { fail('tls_proxy_fqdn is required if internal TLS is enabled.') } $redis_node_names = hiera('redis_short_node_names', [$::hostname]) $redis_node_ips = hiera('redis_node_ips', [$tls_proxy_bind_ip]) # keep a mapping of [node name, node ip, replication port] $replication_tuples = zip($redis_node_names, $redis_node_ips).map |$index, $pair| { $pair.concat($tls_tunnel_base_port+$index) } } else { $replication_tuples = [] } if $step >= 1 { if $enable_internal_tls { $tls_certfile = $certificate_specs['service_certificate'] $tls_keyfile = $certificate_specs['service_key'] include ::tripleo::stunnel # encrypted endpoint for incoming redis service ::tripleo::stunnel::service_proxy { 'redis': accept_host => $tls_proxy_bind_ip, accept_port => $tls_proxy_port, connect_host => $tls_tunnel_local_name, connect_port => $tls_proxy_port, certificate => $tls_certfile, key => $tls_keyfile, notify => Class['::redis'], } # encrypted endpoints for outgoing redis replication traffic $redis_peers = $replication_tuples.filter |$tuple| {$tuple[1] != $tls_proxy_bind_ip} $redis_peers.each |$tuple| { ::tripleo::stunnel::service_proxy { "redis_peer_${tuple[2]}": client => 'yes', accept_host => $tls_tunnel_local_name, accept_port => $tuple[2], connect_host => $tuple[1], connect_port => $tls_proxy_port, certificate => $tls_certfile, key => $tls_keyfile, notify => Class['::redis'], } } # redis slave advertise itself as running on a specific # that uniquely identifies it. This value is # used by the master as is, and points the the outgoing stunnel # endpoint to target this slave. $local_tuple = $replication_tuples.filter |$tuple| { $tuple[1] == $tls_proxy_bind_ip } if length($local_tuple)!=1 { fail("could not determine local TLS replication port (local ip: '${tls_proxy_bind_ip}', assigned ports: '${replication_tuples}')") } # NOTE: config parameters slave-announce-* are not exposed by # puppet-redis, so for now we configure them via an additional # host-specific config file File {"${extra_config_file}": ensure => present, # owner => $::redis::config_owner, # group => $::redis::config_group, # mode => $::redis::config_file_mode, content => "# Host-specific configuration for TLS slave-announce-ip ${tls_tunnel_local_name} slave-announce-port ${local_tuple[0][2]} ", } } # If the old hiera key exists we use that to set the ulimit in order not to break # operators which set it. We might remove this in a later release (post pike anyway) $old_redis_file_limit = hiera('redis_file_limit', undef) if $old_redis_file_limit != undef { warning('redis_file_limit parameter is deprecated, use redis::ulimit in hiera.') class { '::redis': ulimit => $old_redis_file_limit, } } else { include ::redis } } if $step >= 2 { if $pacemaker_master { $redis_short_node_names = hiera('redis_short_node_names') $redis_nodes_count = count($redis_short_node_names) $redis_short_node_names.each |String $node_name| { pacemaker::property { "redis-role-${node_name}": property => 'redis-role', value => true, tries => $pcs_tries, node => downcase($node_name), before => Pacemaker::Resource::Bundle['redis-bundle'], } } $storage_maps = { 'redis-cfg-files' => { 'source-dir' => '/var/lib/kolla/config_files/redis.json', 'target-dir' => '/var/lib/kolla/config_files/config.json', 'options' => 'ro', }, 'redis-cfg-data-redis' => { 'source-dir' => '/var/lib/config-data/puppet-generated/redis/', 'target-dir' => '/var/lib/kolla/config_files/src', 'options' => 'ro', }, 'redis-hosts' => { 'source-dir' => '/etc/hosts', 'target-dir' => '/etc/hosts', 'options' => 'ro', }, 'redis-localtime' => { 'source-dir' => '/etc/localtime', 'target-dir' => '/etc/localtime', 'options' => 'ro', }, 'redis-lib' => { 'source-dir' => '/var/lib/redis', 'target-dir' => '/var/lib/redis', 'options' => 'rw', }, 'redis-log' => { 'source-dir' => '/var/log/containers/redis', 'target-dir' => '/var/log/redis', 'options' => 'rw', }, 'redis-run' => { 'source-dir' => '/var/run/redis', 'target-dir' => '/var/run/redis', 'options' => 'rw', }, # TODO check whether those tls mappings are necessary 'redis-pki-extracted' => { 'source-dir' => '/etc/pki/ca-trust/extracted', 'target-dir' => '/etc/pki/ca-trust/extracted', 'options' => 'ro', }, 'redis-pki-ca-bundle-crt' => { 'source-dir' => '/etc/pki/tls/certs/ca-bundle.crt', 'target-dir' => '/etc/pki/tls/certs/ca-bundle.crt', 'options' => 'ro', }, 'redis-pki-ca-bundle-trust-crt' => { 'source-dir' => '/etc/pki/tls/certs/ca-bundle.trust.crt', 'target-dir' => '/etc/pki/tls/certs/ca-bundle.trust.crt', 'options' => 'ro', }, 'redis-pki-cert' => { 'source-dir' => '/etc/pki/tls/cert.pem', 'target-dir' => '/etc/pki/tls/cert.pem', 'options' => 'ro', }, 'redis-dev-log' => { 'source-dir' => '/dev/log', 'target-dir' => '/dev/log', 'options' => 'rw', }, } if $enable_internal_tls { $redis_storage_maps_tls = { 'redis-pki-gcomm-key' => { 'source-dir' => '/etc/pki/tls/private/redis.key', 'target-dir' => '/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key', 'options' => 'ro', }, 'redis-pki-gcomm-cert' => { 'source-dir' => '/etc/pki/tls/certs/redis.crt', 'target-dir' => '/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt', 'options' => 'ro', }, } $storage_maps_tls = $redis_storage_maps_tls } else { $storage_maps_tls = {} } if $tls_priorities != undef { $tls_priorities_real = " -e PCMK_tls_priorities=${tls_priorities}" } else { $tls_priorities_real = '' } pacemaker::resource::bundle { 'redis-bundle': image => $redis_docker_image, replicas => $redis_nodes_count, masters => 1, location_rule => { resource_discovery => 'exclusive', score => 0, expression => ['redis-role eq true'], }, container_options => 'network=host', options => "--user=root --log-driver=journald -e KOLLA_CONFIG_STRATEGY=COPY_ALWAYS${tls_priorities_real}", run_command => '/bin/bash /usr/local/bin/kolla_start', network => "control-port=${redis_docker_control_port}", storage_maps => merge($storage_maps, $storage_maps_tls), } if length($replication_tuples)>1 { $tunnel_map = $replication_tuples.map |$tuple| {"${tuple[0]}:${tuple[2]}"} $tunnel_opt = " tunnel_port_map='${tunnel_map.join(';')}' tunnel_host='${tls_tunnel_local_name}'" } else { $tunnel_opt='' } pacemaker::resource::ocf { 'redis': ocf_agent_name => 'heartbeat:redis', resource_params => "wait_last_known_master=true${tunnel_opt}", master_params => '', meta_params => 'notify=true ordered=true interleave=true container-attribute-target=host', op_params => 'start timeout=200s stop timeout=200s', tries => $pcs_tries, location_rule => { resource_discovery => 'exclusive', score => 0, expression => ['redis-role eq true'], }, bundle => 'redis-bundle', require => [Pacemaker::Resource::Bundle['redis-bundle']], } } } }