openshift_logging_facts.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360
  1. '''
  2. ---
  3. module: openshift_logging_facts
  4. version_added: ""
  5. short_description: Gather facts about the OpenShift logging stack
  6. description:
  7. - Determine the current facts about the OpenShift logging stack (e.g. cluster size)
  8. options:
  9. author: Red Hat, Inc
  10. '''
  11. import copy
  12. import json
  13. # pylint: disable=redefined-builtin, unused-wildcard-import, wildcard-import
  14. from subprocess import * # noqa: F402,F403
  15. # ignore pylint errors related to the module_utils import
  16. # pylint: disable=redefined-builtin, unused-wildcard-import, wildcard-import
  17. from ansible.module_utils.basic import * # noqa: F402,F403
  18. import yaml
  19. EXAMPLES = """
  20. - action: opneshift_logging_facts
  21. """
  22. RETURN = """
  23. """
  24. DEFAULT_OC_OPTIONS = ["-o", "json"]
  25. # constants used for various labels and selectors
  26. COMPONENT_KEY = "component"
  27. LOGGING_INFRA_KEY = "logging-infra"
  28. # selectors for filtering resources
  29. DS_FLUENTD_SELECTOR = LOGGING_INFRA_KEY + "=" + "fluentd"
  30. LOGGING_SELECTOR = LOGGING_INFRA_KEY + "=" + "support"
  31. ROUTE_SELECTOR = "component=support,logging-infra=support,provider=openshift"
  32. # pylint: disable=line-too-long
  33. COMPONENTS = ["kibana", "curator", "elasticsearch", "fluentd", "kibana_ops", "curator_ops", "elasticsearch_ops", "mux", "eventrouter"]
  34. class OCBaseCommand(object):
  35. ''' The base class used to query openshift '''
  36. def __init__(self, binary, kubeconfig, namespace):
  37. ''' the init method of OCBaseCommand class '''
  38. self.binary = binary
  39. self.kubeconfig = kubeconfig
  40. self.user = self.get_system_admin(self.kubeconfig)
  41. self.namespace = namespace
  42. # pylint: disable=no-self-use
  43. def get_system_admin(self, kubeconfig):
  44. ''' Retrieves the system admin '''
  45. with open(kubeconfig, 'r') as kubeconfig_file:
  46. config = yaml.load(kubeconfig_file)
  47. for user in config["users"]:
  48. if user["name"].startswith("system:admin"):
  49. return user["name"]
  50. raise Exception("Unable to find system:admin in: " + kubeconfig)
  51. # pylint: disable=too-many-arguments, dangerous-default-value
  52. def oc_command(self, sub, kind, namespace=None, name=None, add_options=None):
  53. ''' Wrapper method for the "oc" command '''
  54. cmd = [self.binary, sub, kind]
  55. if name is not None:
  56. cmd = cmd + [name]
  57. if namespace is not None:
  58. cmd = cmd + ["-n", namespace]
  59. if add_options is None:
  60. add_options = []
  61. cmd = cmd + ["--user=" + self.user, "--config=" + self.kubeconfig] + DEFAULT_OC_OPTIONS + add_options
  62. try:
  63. process = Popen(cmd, stdout=PIPE, stderr=PIPE) # noqa: F405
  64. out, err = process.communicate(cmd)
  65. if len(err) > 0:
  66. if 'not found' in err:
  67. return {'items': []}
  68. if 'No resources found' in err:
  69. return {'items': []}
  70. raise Exception(err)
  71. except Exception as excp:
  72. err = "There was an exception trying to run the command '" + " ".join(cmd) + "' " + str(excp)
  73. raise Exception(err)
  74. return json.loads(out)
  75. class OpenshiftLoggingFacts(OCBaseCommand):
  76. ''' The class structure for holding the OpenshiftLogging Facts'''
  77. name = "facts"
  78. def __init__(self, logger, binary, kubeconfig, namespace):
  79. ''' The init method for OpenshiftLoggingFacts '''
  80. super(OpenshiftLoggingFacts, self).__init__(binary, kubeconfig, namespace)
  81. self.logger = logger
  82. self.facts = dict()
  83. def default_keys_for(self, kind):
  84. ''' Sets the default key values for kind '''
  85. for comp in COMPONENTS:
  86. self.add_facts_for(comp, kind)
  87. def add_facts_for(self, comp, kind, name=None, facts=None):
  88. ''' Add facts for the provided kind '''
  89. if comp not in self.facts:
  90. self.facts[comp] = dict()
  91. if kind not in self.facts[comp]:
  92. self.facts[comp][kind] = dict()
  93. if name:
  94. self.facts[comp][kind][name] = facts
  95. def facts_for_routes(self, namespace):
  96. ''' Gathers facts for Routes in logging namespace '''
  97. self.default_keys_for("routes")
  98. route_list = self.oc_command("get", "routes", namespace=namespace, add_options=["-l", ROUTE_SELECTOR])
  99. if len(route_list["items"]) == 0:
  100. return None
  101. for route in route_list["items"]:
  102. name = route["metadata"]["name"]
  103. comp = self.comp(name)
  104. if comp is not None:
  105. self.add_facts_for(comp, "routes", name, dict(host=route["spec"]["host"]))
  106. self.facts["agl_namespace"] = namespace
  107. def facts_for_daemonsets(self, namespace):
  108. ''' Gathers facts for Daemonsets in logging namespace '''
  109. self.default_keys_for("daemonsets")
  110. ds_list = self.oc_command("get", "daemonsets", namespace=namespace,
  111. add_options=["-l", LOGGING_INFRA_KEY + "=fluentd"])
  112. if len(ds_list["items"]) == 0:
  113. return
  114. for ds_item in ds_list["items"]:
  115. name = ds_item["metadata"]["name"]
  116. comp = self.comp(name)
  117. spec = ds_item["spec"]["template"]["spec"]
  118. result = dict(
  119. selector=ds_item["spec"]["selector"],
  120. containers=dict(),
  121. nodeSelector=spec["nodeSelector"],
  122. serviceAccount=spec["serviceAccount"],
  123. terminationGracePeriodSeconds=spec["terminationGracePeriodSeconds"]
  124. )
  125. for container in spec["containers"]:
  126. result["containers"][container["name"]] = container
  127. self.add_facts_for(comp, "daemonsets", name, result)
  128. def facts_for_pvcs(self, namespace):
  129. ''' Gathers facts for PVCS in logging namespace'''
  130. self.default_keys_for("pvcs")
  131. pvclist = self.oc_command("get", "pvc", namespace=namespace, add_options=["-l", LOGGING_INFRA_KEY])
  132. if len(pvclist["items"]) == 0:
  133. return
  134. for pvc in pvclist["items"]:
  135. name = pvc["metadata"]["name"]
  136. comp = self.comp(name)
  137. self.add_facts_for(comp, "pvcs", name, dict())
  138. def facts_for_deploymentconfigs(self, namespace):
  139. ''' Gathers facts for DeploymentConfigs in logging namespace '''
  140. self.default_keys_for("deploymentconfigs")
  141. dclist = self.oc_command("get", "deploymentconfigs", namespace=namespace, add_options=["-l", LOGGING_INFRA_KEY])
  142. if len(dclist["items"]) == 0:
  143. return
  144. dcs = dclist["items"]
  145. for dc_item in dcs:
  146. name = dc_item["metadata"]["name"]
  147. comp = self.comp(name)
  148. if comp is not None:
  149. spec = dc_item["spec"]["template"]["spec"]
  150. facts = dict(
  151. name=name,
  152. selector=dc_item["spec"]["selector"],
  153. replicas=dc_item["spec"]["replicas"],
  154. serviceAccount=spec["serviceAccount"],
  155. containers=dict(),
  156. volumes=dict()
  157. )
  158. if "nodeSelector" in spec:
  159. facts["nodeSelector"] = spec["nodeSelector"]
  160. if "supplementalGroups" in spec["securityContext"]:
  161. facts["storageGroups"] = spec["securityContext"]["supplementalGroups"]
  162. facts["spec"] = spec
  163. if "volumes" in spec:
  164. for vol in spec["volumes"]:
  165. clone = copy.deepcopy(vol)
  166. clone.pop("name", None)
  167. facts["volumes"][vol["name"]] = clone
  168. for container in spec["containers"]:
  169. facts["containers"][container["name"]] = container
  170. self.add_facts_for(comp, "deploymentconfigs", name, facts)
  171. def facts_for_services(self, namespace):
  172. ''' Gathers facts for services in logging namespace '''
  173. self.default_keys_for("services")
  174. servicelist = self.oc_command("get", "services", namespace=namespace, add_options=["-l", LOGGING_SELECTOR])
  175. if len(servicelist["items"]) == 0:
  176. return
  177. for service in servicelist["items"]:
  178. name = service["metadata"]["name"]
  179. comp = self.comp(name)
  180. if comp is not None:
  181. self.add_facts_for(comp, "services", name, dict())
  182. # pylint: disable=too-many-arguments
  183. def facts_from_configmap(self, comp, kind, name, config_key, yaml_file=None):
  184. '''Extracts facts in logging namespace from configmap'''
  185. if yaml_file is not None:
  186. if config_key.endswith(".yml") or config_key.endswith(".yaml"):
  187. config_facts = yaml.load(yaml_file)
  188. self.facts[comp][kind][name][config_key] = config_facts
  189. self.facts[comp][kind][name][config_key]["raw"] = yaml_file
  190. def facts_for_configmaps(self, namespace):
  191. ''' Gathers facts for configmaps in logging namespace '''
  192. self.default_keys_for("configmaps")
  193. a_list = self.oc_command("get", "configmaps", namespace=namespace)
  194. if len(a_list["items"]) == 0:
  195. return
  196. for item in a_list["items"]:
  197. name = item["metadata"]["name"]
  198. comp = self.comp(name)
  199. if comp is not None:
  200. self.add_facts_for(comp, "configmaps", name, dict(item["data"]))
  201. if comp in ["elasticsearch", "elasticsearch_ops"]:
  202. for config_key in item["data"]:
  203. self.facts_from_configmap(comp, "configmaps", name, config_key, item["data"][config_key])
  204. def facts_for_oauthclients(self, namespace):
  205. ''' Gathers facts for oauthclients used with logging '''
  206. self.default_keys_for("oauthclients")
  207. a_list = self.oc_command("get", "oauthclients", namespace=namespace, add_options=["-l", LOGGING_SELECTOR])
  208. if len(a_list["items"]) == 0:
  209. return
  210. for item in a_list["items"]:
  211. name = item["metadata"]["name"]
  212. comp = self.comp(name)
  213. if comp is not None:
  214. result = dict(
  215. redirectURIs=item["redirectURIs"]
  216. )
  217. self.add_facts_for(comp, "oauthclients", name, result)
  218. def facts_for_secrets(self, namespace):
  219. ''' Gathers facts for secrets in the logging namespace '''
  220. self.default_keys_for("secrets")
  221. a_list = self.oc_command("get", "secrets", namespace=namespace)
  222. if len(a_list["items"]) == 0:
  223. return
  224. for item in a_list["items"]:
  225. name = item["metadata"]["name"]
  226. comp = self.comp(name)
  227. if comp is not None and item["type"] == "Opaque":
  228. result = dict(
  229. keys=item["data"].keys()
  230. )
  231. self.add_facts_for(comp, "secrets", name, result)
  232. def facts_for_sccs(self):
  233. ''' Gathers facts for SCCs used with logging '''
  234. self.default_keys_for("sccs")
  235. scc = self.oc_command("get", "securitycontextconstraints.v1.security.openshift.io", name="privileged")
  236. if len(scc["users"]) == 0:
  237. return
  238. for item in scc["users"]:
  239. comp = self.comp(item)
  240. if comp is not None:
  241. self.add_facts_for(comp, "sccs", "privileged", dict())
  242. def facts_for_clusterrolebindings(self, namespace):
  243. ''' Gathers ClusterRoleBindings used with logging '''
  244. self.default_keys_for("clusterrolebindings")
  245. role = self.oc_command("get", "clusterrolebindings", name="cluster-readers")
  246. if "subjects" not in role or len(role["subjects"]) == 0:
  247. return
  248. for item in role["subjects"]:
  249. comp = self.comp(item["name"])
  250. if comp is not None and namespace == item.get("namespace"):
  251. self.add_facts_for(comp, "clusterrolebindings", "cluster-readers", dict())
  252. # this needs to end up nested under the service account...
  253. def facts_for_rolebindings(self, namespace):
  254. ''' Gathers facts for RoleBindings used with logging '''
  255. self.default_keys_for("rolebindings")
  256. role = self.oc_command("get", "rolebindings", namespace=namespace, name="logging-elasticsearch-view-role")
  257. if "subjects" not in role or len(role["subjects"]) == 0:
  258. return
  259. for item in role["subjects"]:
  260. comp = self.comp(item["name"])
  261. if comp is not None and namespace == item.get("namespace"):
  262. self.add_facts_for(comp, "rolebindings", "logging-elasticsearch-view-role", dict())
  263. # pylint: disable=no-self-use, too-many-return-statements
  264. def comp(self, name):
  265. ''' Does a comparison to evaluate the logging component '''
  266. if name.startswith("logging-curator-ops"):
  267. return "curator_ops"
  268. elif name.startswith("logging-kibana-ops") or name.startswith("kibana-ops"):
  269. return "kibana_ops"
  270. elif name.startswith("logging-es-ops") or name.startswith("logging-elasticsearch-ops"):
  271. return "elasticsearch_ops"
  272. elif name.startswith("logging-curator"):
  273. return "curator"
  274. elif name.startswith("logging-kibana") or name.startswith("kibana"):
  275. return "kibana"
  276. elif name.startswith("logging-es") or name.startswith("logging-elasticsearch"):
  277. return "elasticsearch"
  278. elif name.startswith("logging-fluentd") or name.endswith("aggregated-logging-fluentd"):
  279. return "fluentd"
  280. elif name.startswith("logging-mux"):
  281. return "mux"
  282. elif name.startswith("logging-eventrouter"):
  283. return "eventrouter"
  284. else:
  285. return None
  286. def build_facts(self):
  287. ''' Builds the logging facts and returns them '''
  288. self.facts_for_routes(self.namespace)
  289. self.facts_for_daemonsets(self.namespace)
  290. self.facts_for_deploymentconfigs(self.namespace)
  291. self.facts_for_services(self.namespace)
  292. self.facts_for_configmaps(self.namespace)
  293. self.facts_for_sccs()
  294. self.facts_for_oauthclients(self.namespace)
  295. self.facts_for_clusterrolebindings(self.namespace)
  296. self.facts_for_rolebindings(self.namespace)
  297. self.facts_for_secrets(self.namespace)
  298. self.facts_for_pvcs(self.namespace)
  299. return self.facts
  300. def main():
  301. ''' The main method '''
  302. module = AnsibleModule( # noqa: F405
  303. argument_spec=dict(
  304. admin_kubeconfig={"default": "/etc/origin/master/admin.kubeconfig", "type": "str"},
  305. oc_bin={"required": True, "type": "str"},
  306. openshift_logging_namespace={"required": True, "type": "str"}
  307. ),
  308. supports_check_mode=False
  309. )
  310. try:
  311. cmd = OpenshiftLoggingFacts(module, module.params['oc_bin'], module.params['admin_kubeconfig'],
  312. module.params['openshift_logging_namespace'])
  313. module.exit_json(
  314. ansible_facts={"openshift_logging_facts": cmd.build_facts()}
  315. )
  316. # ignore broad-except error to avoid stack trace to ansible user
  317. # pylint: disable=broad-except
  318. except Exception as error:
  319. module.fail_json(msg=str(error))
  320. if __name__ == '__main__':
  321. main()