ff83505e8a
The hiera function is deprecated and does not work with the latest hieradata version 5. It should be replaced by the new lookup function[1]. [1] https://puppet.com/docs/puppet/7/hiera_automatic.html With the lookup function, we can define value type and merge behavior, but these are kept default at this moment to limit scope of this change to just simple replacement. Adding value type might be useful to make sure the value is in expected type (especially when a boolean value is expected), but we will revisit that later. example: lookup(<NAME>, [<VALUE TYPE>], [<MERGE BEHAVIOR>], [<DEFAULT VALUE>]) Change-Id: If5ac88ffccc1bb800d8af33c8896294a57e9b5fb
391 lines
16 KiB
YAML
391 lines
16 KiB
YAML
heat_template_version: wallaby
|
|
|
|
description: >
|
|
Qpid dispatch router service for metrics and monitoring purposes
|
|
|
|
parameters:
|
|
ContainerMetricsQdrImage:
|
|
description: image
|
|
type: string
|
|
tags:
|
|
- role_specific
|
|
ContainerMetricsQdrConfigImage:
|
|
description: The container image to use for the qdrouterd config_volume
|
|
type: string
|
|
tags:
|
|
- role_specific
|
|
ServiceData:
|
|
default: {}
|
|
description: Dictionary packing service data
|
|
type: json
|
|
ServiceNetMap:
|
|
default: {}
|
|
description: Mapping of service_name -> network name. Typically set
|
|
via parameter_defaults in the resource registry. Use
|
|
parameter_merge_strategies to merge it with the defaults.
|
|
type: json
|
|
RoleName:
|
|
default: ''
|
|
description: Role name on which the service is applied
|
|
type: string
|
|
RoleParameters:
|
|
default: {}
|
|
description: Parameters specific to the role
|
|
type: json
|
|
EndpointMap:
|
|
default: {}
|
|
description: Mapping of service endpoint -> protocol. Typically set
|
|
via parameter_defaults in the resource registry.
|
|
type: json
|
|
MonitoringSubscriptionQdr:
|
|
default: 'overcloud-qdr'
|
|
type: string
|
|
MetricsQdrLoggingSource:
|
|
type: json
|
|
default:
|
|
tag: openstack.nova.consoleauth
|
|
file: /var/log/containers/metrics_qdr/metrics_qdr.log
|
|
startmsg.regex: '^[0-9]{4}-[0-9]{2}-[0-9]{2} [0-9]{2}:[0-9]{2}:[0-9]{2}(.[0-9]+ \\+[0-9]+)? [A-Z]+ \\([a-z]+\\) '
|
|
MetricsQdrPort:
|
|
default: 5666
|
|
description: Service name or port number on which the qdrouterd will accept
|
|
connections.
|
|
type: number
|
|
MetricsQdrUsername:
|
|
default: 'guest'
|
|
description: Username which should be used to authenticate to the deployed
|
|
qdrouterd.
|
|
type: string
|
|
MetricsQdrPassword:
|
|
default: 'guest'
|
|
description: Password which should be used to authenticate to the deployed
|
|
qdrouterd.
|
|
type: string
|
|
hidden: true
|
|
MetricsQdrConnectors:
|
|
default: []
|
|
description: Connectors configuration (array of hashes).
|
|
type: json
|
|
MetricsQdrSSLProfiles:
|
|
default:
|
|
- name: sslProfile
|
|
description: SSL Profiles for the connectors (array of hashes).
|
|
type: json
|
|
MetricsQdrAddresses:
|
|
default:
|
|
- prefix: 'collectd'
|
|
distribution: multicast
|
|
- prefix: 'ceilometer/metering.sample'
|
|
distribution: multicast
|
|
- prefix: 'ceilometer/event.sample'
|
|
distribution: multicast
|
|
description: Addresses configuration (array of hashes).
|
|
type: json
|
|
MetricsQdrAutoLinks:
|
|
default: []
|
|
description: AutoLinks for the Configured Addresses
|
|
type: json
|
|
MetricsQdrUseSSL:
|
|
default: false
|
|
description: Set to true if it is required to use SSL or TLS on the connection for
|
|
the local listener. !WARNING! Currently breaks connections from collectd and ceilometer.
|
|
type: boolean
|
|
MetricsQdrUseEncryption:
|
|
default: false
|
|
description: Set to true if it is required to encrypt connection to the peer for
|
|
listener. Not currently implemented, use EnableInternalTLS instead. This option can be ignored.
|
|
type: boolean
|
|
MetricsQdrSaslMechanisms:
|
|
default: 'ANONYMOUS'
|
|
description: List of accepted SASL auth mechanisms for listener in format
|
|
of comma separated list.
|
|
type: string
|
|
MetricsQdrSslCertDb:
|
|
default: '/etc/ipa/ca.crt'
|
|
description: Path to SSL certificate db for listener.
|
|
type: string
|
|
MetricsQdrSslCertFile:
|
|
default: '/etc/pki/tls/certs/metrics_qdr.crt'
|
|
description: Path to SSL certificate file for listener.
|
|
type: string
|
|
MetricsQdrSslKeyFile:
|
|
default: '/etc/pki/tls/private/metrics_qdr.key'
|
|
description: Path to SSL private key file for listener.
|
|
type: string
|
|
MetricsQdrSslPwFile:
|
|
default: ''
|
|
description: Path to SSL password file for certificate key for listener.
|
|
type: string
|
|
MetricsQdrSslPassword:
|
|
default: ''
|
|
description: SSL password to be supplied for listener.
|
|
type: string
|
|
MetricsQdrTrustedCerts:
|
|
default: ''
|
|
description: Path to file containing trusted certificates for listener.
|
|
type: string
|
|
MetricsQdrAuthenticateClient:
|
|
default: false
|
|
description: Authenticate the client using SSL/TLS
|
|
type: boolean
|
|
MetricsQdrExternalEndpoint:
|
|
default: false
|
|
description: Whether QDR should listen on external network interface. To enable
|
|
listening on external network one must deploy QDRs in mesh mode.
|
|
type: boolean
|
|
InternalTLSCAFile:
|
|
default: '/etc/ipa/ca.crt'
|
|
type: string
|
|
description: Specifies the default CA cert to use if TLS is used for
|
|
services in the internal network.
|
|
EnableInternalTLS:
|
|
type: boolean
|
|
default: false
|
|
EnableSTF:
|
|
default: false
|
|
description: Set to true to enable configuration for STF client.
|
|
type: boolean
|
|
CertificateKeySize:
|
|
type: string
|
|
default: '2048'
|
|
description: Specifies the private key size used when creating the
|
|
certificate.
|
|
QdrCertificateKeySize:
|
|
type: string
|
|
default: ''
|
|
description: Override the private key size used when creating the
|
|
certificate for this service
|
|
|
|
conditions:
|
|
key_size_override_set:
|
|
not: {equals: [{get_param: QdrCertificateKeySize}, '']}
|
|
|
|
resources:
|
|
ContainersCommon:
|
|
type: ../containers-common.yaml
|
|
|
|
RoleParametersValue:
|
|
type: OS::Heat::Value
|
|
properties:
|
|
type: json
|
|
value:
|
|
map_replace:
|
|
- map_replace:
|
|
- ContainerMetricsQdrImage: ContainerMetricsQdrImage
|
|
ContainerMetricsQdrConfigImage: ContainerMetricsQdrConfigImage
|
|
- values: {get_param: [RoleParameters]}
|
|
- values:
|
|
ContainerMetricsQdrImage: {get_param: ContainerMetricsQdrImage}
|
|
ContainerMetricsQdrConfigImage: {get_param: ContainerMetricsQdrConfigImage}
|
|
|
|
outputs:
|
|
role_data:
|
|
description: Role data for the metrics Qdr role.
|
|
value:
|
|
service_name: metrics_qdr
|
|
firewall_rules:
|
|
map_merge:
|
|
- '109 metrics qdr':
|
|
dport:
|
|
- {get_param: MetricsQdrPort}
|
|
- map_merge:
|
|
repeat:
|
|
for_each:
|
|
<%net_cidr%>: {get_param: [ServiceData, net_cidr_map, ctlplane]}
|
|
template:
|
|
'109 accept internal metrics qdr ctlplane subnet <%net_cidr%>':
|
|
dport:
|
|
- 5667
|
|
- 5668
|
|
monitoring_subscription: {get_param: MonitoringSubscriptionQdr}
|
|
service_config_settings:
|
|
rsyslog:
|
|
tripleo_logging_sources_metrics_qdr:
|
|
- {get_param: MetricsQdrLoggingSource}
|
|
config_settings:
|
|
map_merge:
|
|
- tripleo::profile::base::metrics::qdr::listener_addr:
|
|
str_replace:
|
|
template:
|
|
"%{lookup('$NETWORK')}"
|
|
params:
|
|
$NETWORK:
|
|
get_param:
|
|
- ServiceNetMap
|
|
- str_replace:
|
|
template: "ROLENAMEMetricsQdrNetwork"
|
|
params:
|
|
ROLENAME: {get_param: RoleName}
|
|
tripleo::haproxy::metrics_qdr: {get_param: MetricsQdrExternalEndpoint}
|
|
tripleo::profile::base::metrics::qdr::listener_port: {get_param: MetricsQdrPort}
|
|
tripleo::profile::base::metrics::qdr::username: {get_param: MetricsQdrUsername}
|
|
tripleo::profile::base::metrics::qdr::password: {get_param: MetricsQdrPassword}
|
|
tripleo::profile::base::metrics::qdr::connectors: {get_param: MetricsQdrConnectors}
|
|
tripleo::profile::base::metrics::qdr::addresses: {get_param: MetricsQdrAddresses}
|
|
tripleo::profile::base::metrics::qdr::autolink_addresses: {get_param: MetricsQdrAutoLinks}
|
|
# ssl support
|
|
tripleo::profile::base::metrics::qdr::listener_require_ssl: {get_param: MetricsQdrUseSSL}
|
|
tripleo::profile::base::metrics::qdr::listener_require_encrypt: {get_param: MetricsQdrUseEncryption}
|
|
tripleo::profile::base::metrics::qdr::listener_sasl_mech: {get_param: MetricsQdrSaslMechanisms}
|
|
tripleo::profile::base::metrics::qdr::listener_ssl_cert_db: {get_param: MetricsQdrSslCertDb}
|
|
tripleo::profile::base::metrics::qdr::listener_ssl_cert_file: {get_param: MetricsQdrSslCertFile}
|
|
tripleo::profile::base::metrics::qdr::listener_ssl_key_file: {get_param: MetricsQdrSslKeyFile}
|
|
tripleo::profile::base::metrics::qdr::listener_ssl_pw_file: {get_param: MetricsQdrSslPwFile}
|
|
tripleo::profile::base::metrics::qdr::listener_ssl_password: {get_param: MetricsQdrSslPassword}
|
|
tripleo::profile::base::metrics::qdr::listener_trusted_certs: {get_param: MetricsQdrTrustedCerts}
|
|
qdr::log_enable: 'info+'
|
|
qdr::log_output: '/var/log/qdrouterd/metrics_qdr.log'
|
|
qdr::listener_auth_peer: {get_param: MetricsQdrAuthenticateClient}
|
|
tripleo::profile::base::metrics::qdr::ssl_profiles:
|
|
if:
|
|
- {get_param: EnableInternalTLS}
|
|
- list_concat:
|
|
- get_param: MetricsQdrSSLProfiles
|
|
- - name: 'tlsProfile'
|
|
certFile: '/etc/pki/tls/certs/metrics_qdr.crt'
|
|
keyFile: '/etc/pki/tls/private/metrics_qdr.key'
|
|
caCertFile: {get_param: InternalTLSCAFile}
|
|
- {get_param: MetricsQdrSSLProfiles}
|
|
- if:
|
|
- {get_param: EnableSTF}
|
|
- tripleo::profile::base::metrics::qdr::interior_mesh_nodes: ''
|
|
tripleo::profile::base::metrics::qdr::router_mode: edge
|
|
metadata_settings:
|
|
if:
|
|
- {get_param: EnableInternalTLS}
|
|
- - service: metrics_qdr
|
|
network:
|
|
get_param:
|
|
- ServiceNetMap
|
|
- str_replace:
|
|
template: "ROLENAMEMetricsQdrNetwork"
|
|
params:
|
|
ROLENAME: {get_param: RoleName}
|
|
type: node
|
|
# BEGIN DOCKER SETTINGS
|
|
puppet_config:
|
|
config_volume: metrics_qdr
|
|
step_config: |
|
|
include tripleo::profile::base::metrics::qdr
|
|
config_image: {get_attr: [RoleParametersValue, value, ContainerMetricsQdrConfigImage]}
|
|
kolla_config:
|
|
/var/lib/kolla/config_files/metrics_qdr.json:
|
|
command: /usr/sbin/qdrouterd -c /etc/qpid-dispatch/qdrouterd.conf
|
|
config_files:
|
|
- source: "/var/lib/kolla/config_files/src/*"
|
|
dest: "/"
|
|
merge: true
|
|
preserve_properties: true
|
|
- source: "/var/lib/kolla/config_files/src-tls/*"
|
|
dest: "/"
|
|
merge: true
|
|
preserve_properties: true
|
|
optional: true
|
|
permissions:
|
|
- path: /var/lib/qdrouterd
|
|
owner: qdrouterd:qdrouterd
|
|
recurse: true
|
|
- path: /etc/pki/tls/certs/metrics_qdr.crt
|
|
owner: qdrouterd:qdrouterd
|
|
optional: true
|
|
- path: /etc/pki/tls/private/metrics_qdr.key
|
|
owner: qdrouterd:qdrouterd
|
|
optional: true
|
|
docker_config:
|
|
step_1:
|
|
metrics_qdr_init_logs:
|
|
start_order: 0
|
|
detach: false
|
|
image: &qdrouterd_image {get_attr: [RoleParametersValue, value, ContainerMetricsQdrImage]}
|
|
net: none
|
|
privileged: false
|
|
user: root
|
|
volumes:
|
|
- /var/log/containers/metrics_qdr:/var/log/qdrouterd:z
|
|
command: ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd']
|
|
metrics_qdr:
|
|
start_order: 1
|
|
image: *qdrouterd_image
|
|
net: host
|
|
user: qdrouterd
|
|
privileged: false
|
|
restart: always
|
|
healthcheck:
|
|
test: /openstack/healthcheck
|
|
volumes:
|
|
list_concat:
|
|
- {get_attr: [ContainersCommon, volumes]}
|
|
-
|
|
- /var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro
|
|
- /var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro
|
|
- /var/lib/metrics_qdr:/var/lib/qdrouterd:z
|
|
- /var/log/containers/metrics_qdr:/var/log/qdrouterd:z
|
|
- if:
|
|
- {get_param: EnableInternalTLS}
|
|
- - /etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro
|
|
- /etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro
|
|
environment:
|
|
KOLLA_CONFIG_STRATEGY: COPY_ALWAYS
|
|
deploy_steps_tasks:
|
|
- name: Certificate generation
|
|
when:
|
|
- step|int == 1
|
|
- enable_internal_tls
|
|
block:
|
|
- include_role:
|
|
name: linux-system-roles.certificate
|
|
vars:
|
|
certificate_requests:
|
|
- name: metrics_qdr
|
|
dns:
|
|
str_replace:
|
|
template: "{{fqdn_NETWORK}}"
|
|
params:
|
|
NETWORK:
|
|
get_param:
|
|
- ServiceNetMap
|
|
- str_replace:
|
|
template: "ROLENAMEMetricsQdrNetwork"
|
|
params:
|
|
ROLENAME: {get_param: RoleName}
|
|
principal:
|
|
str_replace:
|
|
template: "metrics_qdr/{{fqdn_NETWORK}}@{{idm_realm}}"
|
|
params:
|
|
NETWORK:
|
|
get_param:
|
|
- ServiceNetMap
|
|
- str_replace:
|
|
template: "ROLENAMEMetricsQdrNetwork"
|
|
params:
|
|
ROLENAME: {get_param: RoleName}
|
|
run_after: |
|
|
container_name=$({{container_cli}} ps --format=\{\{.Names\}\} | grep metrics_qdr)
|
|
service_crt="/etc/pki/tls/certs/metrics_qdr.crt"
|
|
service_key="/etc/pki/tls/private/metrics_qdr.key
|
|
# Copy the new cert from the mount-point to the real path
|
|
{{container_cli}} exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"
|
|
# Copy the new key from the mount-point to the real path
|
|
{{container_cli}} exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"
|
|
# Set appropriate permissions
|
|
{{container_cli}} exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"
|
|
{{container_cli}} exec "$container_name" chown qdrouterd:qdrouterd "$service_key"
|
|
# Trigger a container restart to read the new certificate
|
|
{{container_cli}} restart "$container_name"
|
|
key_size:
|
|
if:
|
|
- key_size_override_set
|
|
- {get_param: QdrCertificateKeySize}
|
|
- {get_param: CertificateKeySize}
|
|
ca: ipa
|
|
host_prep_tasks:
|
|
- name: create persistent logs directory
|
|
file:
|
|
path: "{{ item.path }}"
|
|
state: directory
|
|
setype: "{{ item.setype }}"
|
|
mode: "{{ item.mode|default(omit) }}"
|
|
with_items:
|
|
- { 'path': /var/log/containers/metrics_qdr, 'setype': container_file_t, 'mode': '0750' }
|
|
- { 'path': /var/lib/metrics_qdr, 'setype': container_file_t }
|