tripleo-heat-templates/deployment
Cédric Jeanneret 65041ed9d8 Clean unmanaged rules pushed by iptables-services package
As iptables-services injects default rules, we must ensure,
upon upgrade, that none of those unmanaged rules are present
in the firewall, nor in the iptables saved state.

We cannot remove them with puppet nor ansible due to the following
reasons:

- puppetlabs-firewall, the puppet module used in TripleO, manages
  the firewall resources with comments - the comment value is the
  name of the puppet resource. As the default rules have no comment,
  puppet doesn't "see" them as managed resources, and can't affect
  them.

- we can't simply "flush" all the rules and reapply them, because
  puppet does not manage all the rules - some are managed by neutron,
  for example.

- ansible "iptables" module doesn't make a full match of the chain,
  and might drop the unwanted ones, keeping the unmanaged in place.
  Also, it doesn't take care of the saved state.

SecurityImpact
Related: https://bugzilla.redhat.com/show_bug.cgi?id=1667887
Closes-Bug: #1812695
Change-Id: I59733cb9a0323bbce4e20838a78103a70ec0d426
2019-02-04 14:56:08 +01:00
..
aodh flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
cinder flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
database flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
docker Move docker into deployment directory 2019-01-09 22:58:50 +00:00
etcd Flatten etcd configuration 2019-01-22 14:09:02 -07:00
glance flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
haproxy flatten haproxy service configuration 2019-01-29 12:33:16 -05:00
heat Merge "flatten database service MySQL Client" 2019-02-01 00:07:19 +00:00
ironic flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
iscsid flatten the iscsid service 2019-01-29 08:08:06 -05:00
keepalived Ensure logs folder is created in prep hosts tasks. 2019-01-18 09:28:56 +01:00
kernel Move kernel config to deployment directory 2019-01-22 13:43:42 -07:00
keystone flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
login-defs Move login-defs to deployment directory 2019-01-22 13:48:57 -07:00
memcached Merge "Enable memcached debug if Debug param is set" 2019-01-22 00:49:42 +00:00
mistral flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
multipathd Move the multipathd services into deployment 2019-01-29 08:13:40 -05:00
podman Remove configuration for cni0 bridge 2019-01-21 13:43:07 +05:30
sahara flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
securetty Move securetty to deployment dir 2019-01-22 13:45:40 -07:00
selinux Move selinux to deployment folder 2019-01-22 13:21:13 -07:00
snmp Snmp - Use net_cidr_map for firewall rules 2019-01-06 18:21:54 +01:00
sshd Avoid dangling firewall rule for ssh access 2019-01-22 14:49:46 +01:00
time flatten time service configuration 2018-12-18 10:41:15 -05:00
timesync Fix service naming conventions 2018-12-13 08:12:36 -07:00
tripleo-firewall Clean unmanaged rules pushed by iptables-services package 2019-02-04 14:56:08 +01:00
tripleo-packages flatten tripleo-packages service configuration 2018-12-19 09:24:49 -05:00
tuned flatten tuned service configuration 2018-12-14 13:13:40 -05:00
zaqar flatten database service MySQL Client 2019-01-30 09:38:32 -05:00
README.rst Add deployments/README.rst 2018-12-13 10:25:09 -05:00

README.rst

TripleO Deployments

This directory contains files that represent individual service deployments, orchestration tools, and the configuration tools used to deploy them.

Directory Structure

Each logical grouping of services will have a directory. Example: 'timesync'. Within this directory related timesync services would exist to for example configure timesync services on baremetal or via containers.

Filenaming conventions

As a convention each deployments service filename will reflect both the deployment engine (baremetal, or containers) along with the config tool used to deploy that service.

The convention is <service-name>-<engine>-<config management tool>.

Examples:

deployment/aodh/aodh-api-container-puppet.yaml (containerized Aodh service configured with Puppet)

deployment/aodh/aodh-api-container-ansible.yaml (containerized Aodh service configured with Ansible)

deployment/timesync/chrony-baremetal-ansible.yaml (baremetal Chrony service configured with Ansible)

deployment/timesync/chrony-baremetal-puppet.yaml (baremetal Chrony service configured with Puppet)