zulip/puppet/kandra/manifests/profile/nagios.pp

178 lines
5.9 KiB
ObjectPascal
Raw Normal View History

class kandra::profile::nagios inherits kandra::profile::base {
include kandra::apache
2024-01-31 19:41:44 +01:00
package { ['nagios4', 'msmtp', 'autossh']: ensure => installed }
$nagios_alert_email = zulipconf('nagios', 'alert_email', undef)
$nagios_test_email = zulipconf('nagios', 'test_email', undef)
$nagios_pager_email = zulipconf('nagios', 'pager_email', undef)
$nagios_mail_domain = zulipconf('nagios', 'mail_domain', undef)
$nagios_mail_host = zulipconf('nagios', 'mail_host', undef)
$nagios_mail_password = zulipsecret('secrets', 'nagios_mail_password', '')
if zulipconf('nagios', 'camo_check_url', undef) =~ /^https:\/\/([^\/]*)(\/.*)$/ {
$nagios_camo_check_host = $1
$nagios_camo_check_path = $2
}
$default_host_domain = zulipconf('nagios', 'default_host_domain', undef)
$hosts_zmirror = split(zulipconf('nagios', 'hosts_zmirror', undef), ',')
$hosts_zmirrorp = split(zulipconf('nagios', 'hosts_zmirrorp', undef), ',')
$hosts_app_prod = split(zulipconf('nagios', 'hosts_app_prod', undef), ',')
$hosts_app_staging = split(zulipconf('nagios', 'hosts_app_staging', undef), ',')
$hosts_postgresql_primary = split(zulipconf('nagios', 'hosts_postgresql_primary', undef), ',')
$hosts_postgresql_replica = split(zulipconf('nagios', 'hosts_postgresql_replica', undef), ',')
$hosts_redis = split(zulipconf('nagios', 'hosts_redis', undef), ',')
$hosts_fullstack = split(zulipconf('nagios', 'hosts_fullstack', undef), ',')
$hosts_smokescreen = split(zulipconf('nagios', 'hosts_smokescreen', undef), ',')
2022-06-14 02:12:01 +02:00
$hosts_other = split(zulipconf('nagios', 'hosts_other', undef), ',')
$hosts = zulipconf_nagios_hosts()
$qualified_hosts = $hosts.map |$h| { if '.' in $h { $h } else { "${h}.${default_host_domain}" }}
Kandra::User_Dotfiles['nagios'] {
keys => 'nagios',
known_hosts => $qualified_hosts,
}
file { '/etc/nagios4/':
recurse => true,
purge => false,
require => Package[nagios4],
owner => 'root',
group => 'root',
mode => '0644',
source => 'puppet:///modules/kandra/nagios4/',
notify => Service['nagios4'],
}
file { '/etc/apache2/sites-available/nagios.conf':
purge => false,
require => Package[apache2],
owner => 'root',
group => 'root',
mode => '0640',
content => template('kandra/nagios_apache_site.conf.template.erb'),
}
apache2site { 'nagios':
ensure => present,
require => [
File['/etc/apache2/sites-available/nagios.conf'],
Apache2mod['headers'], Apache2mod['ssl'],
],
notify => Service['apache2'],
}
kandra::teleport::application{ 'nagios':
2024-01-31 19:41:44 +01:00
description => 'Monitoring: nagios',
port => '3000',
}
file { '/etc/nagios4/conf.d/contacts.cfg':
require => Package[nagios4],
owner => 'root',
group => 'root',
mode => '0644',
content => template('kandra/nagios4/contacts.cfg.template.erb'),
notify => Service['nagios4'],
}
file { '/etc/nagios4/conf.d/hosts.cfg':
require => Package[nagios4],
owner => 'root',
group => 'root',
mode => '0644',
content => template('kandra/nagios4/hosts.cfg.template.erb'),
notify => Service['nagios4'],
}
file { '/etc/nagios4/conf.d/localhost.cfg':
require => Package[nagios4],
owner => 'root',
group => 'root',
mode => '0644',
content => template('kandra/nagios4/localhost.cfg.template.erb'),
notify => Service['nagios4'],
}
file { '/etc/nagios4/cgi.cfg':
require => Package[nagios4],
owner => 'root',
group => 'root',
mode => '0644',
content => template('kandra/nagios4/cgi.cfg.template.erb'),
notify => Service['nagios4'],
}
service { 'nagios4':
ensure => running,
require => Kandra::User_Dotfiles['nagios'],
}
2021-06-02 04:03:53 +02:00
file { [
'/etc/nagios4/conf.d/extinfo_nagios2.cfg',
'/etc/nagios4/conf.d/services_nagios2.cfg',
'/etc/nagios4/conf.d/contacts_nagios2.cfg',
'/etc/nagios4/conf.d/hostgroups_nagios2.cfg',
'/etc/nagios4/conf.d/localhost_nagios2.cfg',
'/etc/nagios4/conf.d/zulip_nagios.cfg',
]:
ensure => absent,
}
2024-01-31 19:41:44 +01:00
file { "${zulip::common::supervisor_conf_dir}/autossh_tunnels.conf":
ensure => file,
require => Package['supervisor', 'autossh'],
mode => '0644',
owner => 'root',
group => 'root',
content => template('kandra/supervisor/conf.d/autossh_tunnels.conf.erb'),
notify => Service['supervisor'],
}
file { '/etc/nagios4/conf.d/zulip_autossh.cfg':
ensure => file,
mode => '0644',
owner => 'root',
group => 'root',
content => template('kandra/nagios_autossh.template.erb'),
notify => Service['nagios4'],
}
file { '/var/lib/nagios/msmtprc':
ensure => file,
mode => '0600',
owner => 'nagios',
group => 'nagios',
content => template('kandra/msmtprc_nagios.template.erb'),
require => File['/var/lib/nagios'],
}
file { '/var/lib/nagios/.ssh/config':
ensure => file,
mode => '0644',
owner => 'nagios',
group => 'nagios',
source => 'puppet:///modules/kandra/nagios_ssh_config',
}
# Disable apparmor for msmtp so it can read the above config file
file { '/etc/apparmor.d/disable/usr.bin.msmtp':
ensure => link,
target => '/etc/apparmor.d/usr.bin.msmtp',
notify => Exec['reload apparmor'],
}
exec {'reload apparmor':
command => '/sbin/apparmor_parser -R /etc/apparmor.d/usr.bin.msmtp',
refreshonly => true,
}
exec { 'fix_nagios_permissions':
command => 'dpkg-statoverride --update --add nagios www-data 2710 /var/lib/nagios4/rw',
unless => 'bash -c "ls -ld /var/lib/nagios4/rw | grep ^drwx--s--- -q"',
notify => Service['nagios4'],
}
exec { 'fix_nagios_permissions2':
command => 'dpkg-statoverride --update --add nagios nagios 751 /var/lib/nagios4',
unless => 'bash -c "ls -ld /var/lib/nagios4 | grep ^drwxr-x--x -q"',
notify => Service['nagios4'],
}
# TODO: Install our API
}