main.yaml 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. ---
  2. # fail is we don't have an endpoint for ES to connect to?
  3. - name: Set default image variables based on openshift_deployment_type
  4. include_vars: "{{ var_file_name }}"
  5. with_first_found:
  6. - "{{ openshift_deployment_type }}.yml"
  7. - "default_images.yml"
  8. loop_control:
  9. loop_var: var_file_name
  10. - name: Ensure that Kibana has nodes to run on
  11. import_role:
  12. name: openshift_master
  13. tasks_from: ensure_nodes_matching_selector.yml
  14. vars:
  15. openshift_master_ensure_nodes_selector: "{{ openshift_logging_kibana_nodeselector | map_to_pairs }}"
  16. openshift_master_ensure_nodes_service: Kibana
  17. - name: Set kibana image facts
  18. set_fact:
  19. openshift_logging_kibana_image_prefix: "{{ openshift_logging_kibana_image_prefix | default(__openshift_logging_kibana_image_prefix) }}"
  20. openshift_logging_kibana_image_version: "{{ openshift_logging_kibana_image_version | default(__openshift_logging_kibana_image_version) }}"
  21. openshift_logging_kibana_proxy_image_prefix: "{{ openshift_logging_kibana_proxy_image_prefix | default(__openshift_logging_kibana_proxy_image_prefix) }}"
  22. openshift_logging_kibana_proxy_image_version: "{{ openshift_logging_kibana_proxy_image_version | default(__openshift_logging_kibana_proxy_image_version) }}"
  23. - include_tasks: determine_version.yaml
  24. # allow passing in a tempdir
  25. - name: Create temp directory for doing work in
  26. command: mktemp -d /tmp/openshift-logging-ansible-XXXXXX
  27. register: mktemp
  28. changed_when: False
  29. - set_fact:
  30. tempdir: "{{ mktemp.stdout }}"
  31. # This may not be necessary in this role
  32. - name: Create templates subdirectory
  33. file:
  34. state: directory
  35. path: "{{ tempdir }}/templates"
  36. mode: 0755
  37. changed_when: False
  38. # we want to make sure we have all the necessary components here
  39. # create service account
  40. - name: Create Kibana service account
  41. oc_serviceaccount:
  42. state: present
  43. name: "aggregated-logging-kibana"
  44. namespace: "{{ openshift_logging_namespace }}"
  45. image_pull_secrets: "{{ openshift_logging_image_pull_secret }}"
  46. when: openshift_logging_image_pull_secret != ''
  47. - name: Create Kibana service account
  48. oc_serviceaccount:
  49. state: present
  50. name: "aggregated-logging-kibana"
  51. namespace: "{{ openshift_logging_namespace }}"
  52. when:
  53. - openshift_logging_image_pull_secret == ''
  54. - set_fact:
  55. kibana_name: "{{ 'logging-kibana' ~ ( (openshift_logging_kibana_ops_deployment | default(false) | bool) | ternary('-ops', '')) }}"
  56. kibana_component: "{{ 'kibana' ~ ( (openshift_logging_kibana_ops_deployment | default(false) | bool) | ternary('-ops', '')) }}"
  57. # Check {{ generated_certs_dir }} for session_secret and oauth_secret
  58. - name: Checking for session_secret
  59. stat: path="{{generated_certs_dir}}/session_secret"
  60. register: session_secret_file
  61. - name: Checking for oauth_secret
  62. stat: path="{{generated_certs_dir}}/oauth_secret"
  63. register: oauth_secret_file
  64. # gen session_secret if necessary
  65. - name: Generate session secret
  66. copy:
  67. content: "{{ 200 | lib_utils_oo_random_word }}"
  68. dest: "{{ generated_certs_dir }}/session_secret"
  69. when:
  70. - not session_secret_file.stat.exists
  71. # gen oauth_secret if necessary
  72. - name: Generate oauth secret
  73. copy:
  74. content: "{{ 64 | lib_utils_oo_random_word }}"
  75. dest: "{{ generated_certs_dir }}/oauth_secret"
  76. when:
  77. - not oauth_secret_file.stat.exists
  78. - name: Retrieving the cert to use when generating secrets for the logging components
  79. slurp:
  80. src: "{{ generated_certs_dir }}/{{ item.file }}"
  81. register: key_pairs
  82. with_items:
  83. - { name: "ca_file", file: "ca.crt" }
  84. - { name: "kibana_internal_key", file: "kibana-internal.key"}
  85. - { name: "kibana_internal_cert", file: "kibana-internal.crt"}
  86. - { name: "server_tls", file: "server-tls.json"}
  87. - { name: "session_secret", file: "session_secret" }
  88. - { name: "oauth_secret", file: "oauth_secret" }
  89. # services
  90. - name: Set {{ kibana_name }} service
  91. oc_service:
  92. state: present
  93. name: "{{ kibana_name }}"
  94. namespace: "{{ openshift_logging_kibana_namespace }}"
  95. selector:
  96. component: "{{ kibana_component }}"
  97. provider: openshift
  98. labels:
  99. logging-infra: 'support'
  100. ports:
  101. - port: 443
  102. targetPort: "oaproxy"
  103. # create routes
  104. # TODO: set up these certs differently?
  105. - set_fact:
  106. kibana_key: "{{ lookup('file', openshift_logging_kibana_key) | b64encode }}"
  107. when: openshift_logging_kibana_key | trim | length > 0
  108. changed_when: false
  109. - set_fact:
  110. kibana_cert: "{{ lookup('file', openshift_logging_kibana_cert) | b64encode }}"
  111. when: openshift_logging_kibana_cert | trim | length > 0
  112. changed_when: false
  113. - set_fact:
  114. kibana_ca: "{{ lookup('file', openshift_logging_kibana_ca) | b64encode }}"
  115. when: openshift_logging_kibana_ca | trim | length > 0
  116. changed_when: false
  117. - set_fact:
  118. kibana_ca: "{{ key_pairs | entry_from_named_pair('ca_file') }}"
  119. when: kibana_ca is not defined
  120. changed_when: false
  121. - name: Generating Kibana route template
  122. template:
  123. src: "{{ __base_file_dir }}/route_reencrypt.j2"
  124. dest: "{{ tempdir }}/templates/kibana-route.yaml"
  125. vars:
  126. obj_name: "{{ kibana_name }}"
  127. route_host: "{{ openshift_logging_kibana_hostname }}"
  128. service_name: "{{ kibana_name }}"
  129. tls_key: "{{ kibana_key | default('') | b64decode }}"
  130. tls_cert: "{{ kibana_cert | default('') | b64decode }}"
  131. tls_ca_cert: "{{ kibana_ca | b64decode }}"
  132. tls_dest_ca_cert: "{{ key_pairs | entry_from_named_pair('ca_file') | b64decode }}"
  133. edge_term_policy: "{{ openshift_logging_kibana_edge_term_policy | default('') }}"
  134. labels:
  135. component: support
  136. logging-infra: support
  137. provider: openshift
  138. changed_when: no
  139. # This currently has an issue if the host name changes
  140. - name: Setting Kibana route
  141. oc_obj:
  142. state: present
  143. name: "{{ kibana_name }}"
  144. namespace: "{{ openshift_logging_namespace }}"
  145. kind: route
  146. files:
  147. - "{{ tempdir }}/templates/kibana-route.yaml"
  148. # preserve list of current hostnames
  149. - name: Get current oauthclient hostnames
  150. oc_obj:
  151. state: list
  152. name: kibana-proxy
  153. namespace: "{{ openshift_logging_namespace }}"
  154. kind: oauthclient
  155. register: oauth_client_list
  156. - set_fact: proxy_hostnames={{ oauth_client_list.results.results[0].redirectURIs | default ([]) + ['https://' ~ openshift_logging_kibana_hostname] }}
  157. # create oauth client
  158. - name: Create oauth-client template
  159. template:
  160. src: "{{ __base_file_dir }}/oauth-client.j2"
  161. dest: "{{ tempdir }}/templates/oauth-client.yml"
  162. vars:
  163. kibana_hostnames: "{{ proxy_hostnames | unique }}"
  164. secret: "{{ key_pairs | entry_from_named_pair('oauth_secret') | b64decode }}"
  165. - name: Set kibana-proxy oauth-client
  166. oc_obj:
  167. state: present
  168. name: "kibana-proxy"
  169. namespace: "{{ openshift_logging_namespace }}"
  170. kind: oauthclient
  171. files:
  172. - "{{ tempdir }}/templates/oauth-client.yml"
  173. delete_after: true
  174. # create Kibana secret
  175. - name: Set Kibana secret
  176. oc_secret:
  177. state: present
  178. name: "logging-kibana"
  179. namespace: "{{ openshift_logging_namespace }}"
  180. files:
  181. - name: ca
  182. path: "{{ generated_certs_dir }}/ca.crt"
  183. - name: key
  184. path: "{{ generated_certs_dir }}/system.logging.kibana.key"
  185. - name: cert
  186. path: "{{ generated_certs_dir }}/system.logging.kibana.crt"
  187. # create Kibana-proxy secret
  188. - name: Set Kibana Proxy secret
  189. oc_secret:
  190. state: present
  191. name: "logging-kibana-proxy"
  192. namespace: "{{ openshift_logging_namespace }}"
  193. # TODO: when possible to have both files and contents for oc_secret use this
  194. #files:
  195. #- name: server-key
  196. # path: "{{ generated_certs_dir }}/kibana-internal.key"
  197. #- name: server-cert
  198. # path: "{{ generated_certs_dir }}/kibana-internal.crt"
  199. #- name: server-tls.json
  200. # path: "{{ generated_certs_dir }}/server-tls.json"
  201. contents:
  202. - path: oauth-secret
  203. data: "{{ key_pairs | entry_from_named_pair('oauth_secret') | b64decode }}"
  204. - path: session-secret
  205. data: "{{ key_pairs | entry_from_named_pair('session_secret') | b64decode }}"
  206. - path: server-key
  207. data: "{{ key_pairs | entry_from_named_pair('kibana_internal_key') | b64decode }}"
  208. - path: server-cert
  209. data: "{{ key_pairs | entry_from_named_pair('kibana_internal_cert') | b64decode }}"
  210. - path: server-tls.json
  211. data: "{{ key_pairs | entry_from_named_pair('server_tls') | b64decode }}"
  212. # create Kibana DC
  213. - name: Generate Kibana DC template
  214. template:
  215. src: "{{ __base_file_dir }}/kibana.j2"
  216. dest: "{{ tempdir }}/templates/kibana-dc.yaml"
  217. vars:
  218. component: "{{ kibana_component }}"
  219. logging_component: kibana
  220. deploy_name: "{{ kibana_name }}"
  221. image: "{{ openshift_logging_kibana_image_prefix }}logging-kibana:{{ openshift_logging_kibana_image_version }}"
  222. proxy_image: "{{ openshift_logging_kibana_proxy_image_prefix }}logging-auth-proxy:{{ openshift_logging_kibana_proxy_image_version }}"
  223. es_host: "{{ openshift_logging_kibana_es_host }}"
  224. es_port: "{{ openshift_logging_kibana_es_port }}"
  225. kibana_cpu_limit: "{{ openshift_logging_kibana_cpu_limit }}"
  226. kibana_cpu_request: "{{ openshift_logging_kibana_cpu_request | min_cpu(openshift_logging_kibana_cpu_limit | default(none)) }}"
  227. kibana_memory_limit: "{{ openshift_logging_kibana_memory_limit }}"
  228. kibana_proxy_cpu_limit: "{{ openshift_logging_kibana_proxy_cpu_limit }}"
  229. kibana_proxy_cpu_request: "{{ openshift_logging_kibana_proxy_cpu_request | min_cpu(openshift_logging_kibana_proxy_cpu_limit | default(none)) }}"
  230. kibana_proxy_memory_limit: "{{ openshift_logging_kibana_proxy_memory_limit }}"
  231. kibana_replicas: "{{ openshift_logging_kibana_replicas | default (1) }}"
  232. kibana_node_selector: "{{ openshift_logging_kibana_nodeselector | default({}) }}"
  233. kibana_env_vars: "{{ openshift_logging_kibana_env_vars | default({}) }}"
  234. - name: Set Kibana DC
  235. oc_obj:
  236. state: present
  237. name: "{{ kibana_name }}"
  238. namespace: "{{ openshift_logging_namespace }}"
  239. kind: dc
  240. files:
  241. - "{{ tempdir }}/templates/kibana-dc.yaml"
  242. delete_after: true
  243. # update master configs?
  244. - name: Delete temp directory
  245. file:
  246. name: "{{ tempdir }}"
  247. state: absent
  248. changed_when: False