main.yaml 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. ---
  2. # fail is we don't have an endpoint for ES to connect to?
  3. - include: determine_version.yaml
  4. # allow passing in a tempdir
  5. - name: Create temp directory for doing work in
  6. command: mktemp -d /tmp/openshift-logging-ansible-XXXXXX
  7. register: mktemp
  8. changed_when: False
  9. - set_fact:
  10. tempdir: "{{ mktemp.stdout }}"
  11. # This may not be necessary in this role
  12. - name: Create templates subdirectory
  13. file:
  14. state: directory
  15. path: "{{ tempdir }}/templates"
  16. mode: 0755
  17. changed_when: False
  18. # we want to make sure we have all the necessary components here
  19. # create service account
  20. - name: Create Kibana service account
  21. oc_serviceaccount:
  22. state: present
  23. name: "aggregated-logging-kibana"
  24. namespace: "{{ openshift_logging_namespace }}"
  25. image_pull_secrets: "{{ openshift_logging_image_pull_secret }}"
  26. when: openshift_logging_image_pull_secret != ''
  27. - name: Create Kibana service account
  28. oc_serviceaccount:
  29. state: present
  30. name: "aggregated-logging-kibana"
  31. namespace: "{{ openshift_logging_namespace }}"
  32. when:
  33. - openshift_logging_image_pull_secret == ''
  34. - set_fact:
  35. kibana_name: "{{ 'logging-kibana' ~ ( (openshift_logging_kibana_ops_deployment | default(false) | bool) | ternary('-ops', '')) }}"
  36. kibana_component: "{{ 'kibana' ~ ( (openshift_logging_kibana_ops_deployment | default(false) | bool) | ternary('-ops', '')) }}"
  37. # Check {{ generated_certs_dir }} for session_secret and oauth_secret
  38. - name: Checking for session_secret
  39. stat: path="{{generated_certs_dir}}/session_secret"
  40. register: session_secret_file
  41. - name: Checking for oauth_secret
  42. stat: path="{{generated_certs_dir}}/oauth_secret"
  43. register: oauth_secret_file
  44. # gen session_secret if necessary
  45. - name: Generate session secret
  46. copy:
  47. content: "{{ 200 | oo_random_word }}"
  48. dest: "{{ generated_certs_dir }}/session_secret"
  49. when:
  50. - not session_secret_file.stat.exists
  51. # gen oauth_secret if necessary
  52. - name: Generate oauth secret
  53. copy:
  54. content: "{{ 64 | oo_random_word }}"
  55. dest: "{{ generated_certs_dir }}/oauth_secret"
  56. when:
  57. - not oauth_secret_file.stat.exists
  58. - name: Retrieving the cert to use when generating secrets for the logging components
  59. slurp:
  60. src: "{{ generated_certs_dir }}/{{ item.file }}"
  61. register: key_pairs
  62. with_items:
  63. - { name: "ca_file", file: "ca.crt" }
  64. - { name: "kibana_internal_key", file: "kibana-internal.key"}
  65. - { name: "kibana_internal_cert", file: "kibana-internal.crt"}
  66. - { name: "server_tls", file: "server-tls.json"}
  67. - { name: "session_secret", file: "session_secret" }
  68. - { name: "oauth_secret", file: "oauth_secret" }
  69. # services
  70. - name: Set {{ kibana_name }} service
  71. oc_service:
  72. state: present
  73. name: "{{ kibana_name }}"
  74. namespace: "{{ openshift_logging_kibana_namespace }}"
  75. selector:
  76. component: "{{ kibana_component }}"
  77. provider: openshift
  78. # pending #4091
  79. #labels:
  80. #- logging-infra: 'support'
  81. ports:
  82. - port: 443
  83. targetPort: "oaproxy"
  84. # create routes
  85. # TODO: set up these certs differently?
  86. - set_fact:
  87. kibana_key: "{{ lookup('file', openshift_logging_kibana_key) | b64encode }}"
  88. when: "{{ openshift_logging_kibana_key | trim | length > 0 }}"
  89. changed_when: false
  90. - set_fact:
  91. kibana_cert: "{{ lookup('file', openshift_logging_kibana_cert) | b64encode }}"
  92. when: "{{ openshift_logging_kibana_cert | trim | length > 0 }}"
  93. changed_when: false
  94. - set_fact:
  95. kibana_ca: "{{ lookup('file', openshift_logging_kibana_ca) | b64encode }}"
  96. when: "{{ openshift_logging_kibana_ca | trim | length > 0 }}"
  97. changed_when: false
  98. - set_fact:
  99. kibana_ca: "{{ key_pairs | entry_from_named_pair('ca_file') }}"
  100. when: kibana_ca is not defined
  101. changed_when: false
  102. - name: Generating Kibana route template
  103. template:
  104. src: route_reencrypt.j2
  105. dest: "{{ tempdir }}/templates/kibana-route.yaml"
  106. vars:
  107. obj_name: "{{ kibana_name }}"
  108. route_host: "{{ openshift_logging_kibana_hostname }}"
  109. service_name: "{{ kibana_name }}"
  110. tls_key: "{{ kibana_key | default('') | b64decode }}"
  111. tls_cert: "{{ kibana_cert | default('') | b64decode }}"
  112. tls_ca_cert: "{{ kibana_ca | b64decode }}"
  113. tls_dest_ca_cert: "{{ key_pairs | entry_from_named_pair('ca_file') | b64decode }}"
  114. edge_term_policy: "{{ openshift_logging_kibana_edge_term_policy | default('') }}"
  115. labels:
  116. component: support
  117. logging-infra: support
  118. provider: openshift
  119. changed_when: no
  120. # This currently has an issue if the host name changes
  121. - name: Setting Kibana route
  122. oc_obj:
  123. state: present
  124. name: "{{ kibana_name }}"
  125. namespace: "{{ openshift_logging_namespace }}"
  126. kind: route
  127. files:
  128. - "{{ tempdir }}/templates/kibana-route.yaml"
  129. # preserve list of current hostnames
  130. - name: Get current oauthclient hostnames
  131. oc_obj:
  132. state: list
  133. name: kibana-proxy
  134. namespace: "{{ openshift_logging_namespace }}"
  135. kind: oauthclient
  136. register: oauth_client_list
  137. - set_fact: proxy_hostnames={{ oauth_client_list.results.results[0].redirectURIs | default ([]) + ['https://' ~ openshift_logging_kibana_hostname] }}
  138. # create oauth client
  139. - name: Create oauth-client template
  140. template:
  141. src: oauth-client.j2
  142. dest: "{{ tempdir }}/templates/oauth-client.yml"
  143. vars:
  144. kibana_hostnames: "{{ proxy_hostnames | unique }}"
  145. secret: "{{ key_pairs | entry_from_named_pair('oauth_secret') | b64decode }}"
  146. - name: Set kibana-proxy oauth-client
  147. oc_obj:
  148. state: present
  149. name: "kibana-proxy"
  150. namespace: "{{ openshift_logging_namespace }}"
  151. kind: oauthclient
  152. files:
  153. - "{{ tempdir }}/templates/oauth-client.yml"
  154. delete_after: true
  155. # create Kibana secret
  156. - name: Set Kibana secret
  157. oc_secret:
  158. state: present
  159. name: "logging-kibana"
  160. namespace: "{{ openshift_logging_namespace }}"
  161. files:
  162. - name: ca
  163. path: "{{ generated_certs_dir }}/ca.crt"
  164. - name: key
  165. path: "{{ generated_certs_dir }}/system.logging.kibana.key"
  166. - name: cert
  167. path: "{{ generated_certs_dir }}/system.logging.kibana.crt"
  168. # create Kibana-proxy secret
  169. - name: Set Kibana Proxy secret
  170. oc_secret:
  171. state: present
  172. name: "logging-kibana-proxy"
  173. namespace: "{{ openshift_logging_namespace }}"
  174. # TODO: when possible to have both files and contents for oc_secret use this
  175. #files:
  176. #- name: server-key
  177. # path: "{{ generated_certs_dir }}/kibana-internal.key"
  178. #- name: server-cert
  179. # path: "{{ generated_certs_dir }}/kibana-internal.crt"
  180. #- name: server-tls.json
  181. # path: "{{ generated_certs_dir }}/server-tls.json"
  182. contents:
  183. - path: oauth-secret
  184. data: "{{ key_pairs | entry_from_named_pair('oauth_secret') | b64decode }}"
  185. - path: session-secret
  186. data: "{{ key_pairs | entry_from_named_pair('session_secret') | b64decode }}"
  187. - path: server-key
  188. data: "{{ key_pairs | entry_from_named_pair('kibana_internal_key') | b64decode }}"
  189. - path: server-cert
  190. data: "{{ key_pairs | entry_from_named_pair('kibana_internal_cert') | b64decode }}"
  191. - path: server-tls.json
  192. data: "{{ key_pairs | entry_from_named_pair('server_tls') | b64decode }}"
  193. # create Kibana DC
  194. - name: Generate Kibana DC template
  195. template:
  196. src: kibana.j2
  197. dest: "{{ tempdir }}/templates/kibana-dc.yaml"
  198. vars:
  199. component: "{{ kibana_component }}"
  200. logging_component: kibana
  201. deploy_name: "{{ kibana_name }}"
  202. image: "{{ openshift_logging_image_prefix }}logging-kibana:{{ openshift_logging_image_version }}"
  203. proxy_image: "{{ openshift_logging_image_prefix }}logging-auth-proxy:{{ openshift_logging_image_version }}"
  204. es_host: "{{ openshift_logging_kibana_es_host }}"
  205. es_port: "{{ openshift_logging_kibana_es_port }}"
  206. kibana_cpu_limit: "{{ openshift_logging_kibana_cpu_limit }}"
  207. kibana_memory_limit: "{{ openshift_logging_kibana_memory_limit }}"
  208. kibana_proxy_cpu_limit: "{{ openshift_logging_kibana_proxy_cpu_limit }}"
  209. kibana_proxy_memory_limit: "{{ openshift_logging_kibana_proxy_memory_limit }}"
  210. replicas: "{{ openshift_logging_kibana_replicas | default (1) }}"
  211. kibana_node_selector: "{{ openshift_logging_kibana_nodeselector | default({}) }}"
  212. - name: Set Kibana DC
  213. oc_obj:
  214. state: present
  215. name: "{{ kibana_name }}"
  216. namespace: "{{ openshift_logging_namespace }}"
  217. kind: dc
  218. files:
  219. - "{{ tempdir }}/templates/kibana-dc.yaml"
  220. delete_after: true
  221. # update master configs?
  222. - name: Delete temp directory
  223. file:
  224. name: "{{ tempdir }}"
  225. state: absent
  226. changed_when: False