Merge "Removing ELK Server Install"
This commit is contained in:
commit
189da7eb04
@ -15,7 +15,7 @@ Ansible for Browbeat
|
||||
Currently we support Ansible 1.9.4 within browbeat-venv and Ansible 2.0+ for installation.
|
||||
|
||||
Playbooks for:
|
||||
* Installing Browbeat, collectd, ELK stack and clients, graphite, grafana, and grafana dashboards
|
||||
* Installing Browbeat, collectd, elk clients, graphite, grafana, and grafana dashboards
|
||||
* Check overcloud for performance issues
|
||||
* Tune overcloud for performance (Experimental)
|
||||
* Adjust number of workers for cinder/keystone/neutron/nova
|
||||
@ -90,38 +90,6 @@ To Install Kibana Visuals
|
||||
|
||||
# ansible-playbook -i hosts install/kibana-visuals.yml
|
||||
|
||||
Install Generic ELK Stack
|
||||
'''''''''''''''''''''''''
|
||||
Listening ports and other options can be changed in ``install/group_vars/all.yml``
|
||||
as needed. You can also change the logging backend to use fluentd via the
|
||||
``logging_backend:`` variable. For most uses leaving the defaults in place is
|
||||
accceptable. If left unchanged the default is to use logstash.
|
||||
|
||||
You can also install the optional `curator <https://www.elastic.co/guide/en/elasticsearch/client/curator/current/index.html>`_ tool for managing
|
||||
elasticsearch indexes. Set ``install_curator_tool: true`` to enable this optional tool installation.
|
||||
|
||||
If all the variables look ok in ``install/group_vars/all.yml`` you can proceed with deployment.
|
||||
|
||||
::
|
||||
|
||||
ansible-playbook -i hosts install/elk.yml
|
||||
|
||||
Install ELK Stack (on an OpenStack Undercloud)
|
||||
''''''''''''''''''''''''''''''''''''''''''''''
|
||||
Triple-O based OpenStack deployments have a lot of ports already listening on
|
||||
the Undercloud node. You'll need to change the default listening ports for ELK
|
||||
to be deployed without conflict.
|
||||
|
||||
::
|
||||
|
||||
sed -i 's/nginx_kibana_port: 80/nginx_kibana_port: 8888/' install/group_vars/all.yml
|
||||
sed -i 's/elk_server_ssl_cert_port: 8080/elk_server_ssl_cert_port: 9999/' install/group_vars/all.yml
|
||||
|
||||
Now you can proceed with deployment.
|
||||
|
||||
::
|
||||
|
||||
ansible-playbook -i hosts install/elk.yml
|
||||
|
||||
Install Generic ELK Clients
|
||||
'''''''''''''''''''''''''''
|
||||
|
@ -452,10 +452,6 @@ echo " the [graphite] and [grafana] hosts entries are updated with val
|
||||
echo " You will need to have passwordless access to root on these hosts."
|
||||
echo "---------------------------"
|
||||
echo "" | tee -a ${ansible_inventory_file}
|
||||
echo "[elk]" | tee -a ${ansible_inventory_file}
|
||||
echo "## example host entry." | tee -a ${ansible_inventory_file}
|
||||
echo "#host-01" | tee -a ${ansible_inventory_file}
|
||||
echo "" | tee -a ${ansible_inventory_file}
|
||||
echo "[elk-client]" | tee -a ${ansible_inventory_file}
|
||||
echo "## example host entry." | tee -a ${ansible_inventory_file}
|
||||
echo "#host-02" | tee -a ${ansible_inventory_file}
|
||||
@ -464,8 +460,8 @@ echo "[stockpile]" | tee -a ${ansible_inventory_file}
|
||||
echo "undercloud ansible_user=${user}" | tee -a ${ansible_inventory_file}
|
||||
|
||||
echo "---------------------------"
|
||||
echo "IMPORTANT: If you plan on deploying ELK and ELK clients, update hosts and make sure"
|
||||
echo " the [elk] and [elk-client] hosts entries are updated with valid hosts."
|
||||
echo "IMPORTANT: If you plan on deploying ELK clients, update hosts and make sure"
|
||||
echo " the [elk-client] hosts entries are updated with valid hosts."
|
||||
echo " You will need to have passwordless access to root on these hosts."
|
||||
echo "---------------------------"
|
||||
|
||||
|
@ -1,22 +0,0 @@
|
||||
---
|
||||
#
|
||||
# Playbook to install the ELK stack for browbeat
|
||||
#
|
||||
|
||||
- hosts: elk
|
||||
remote_user: root
|
||||
roles:
|
||||
- { role: epel }
|
||||
- { role: elasticsearch }
|
||||
- { role: fluentd, when: (logging_backend == 'fluentd') }
|
||||
- { role: logstash, when: ((logging_backend is none) or (logging_backend == 'logstash')) }
|
||||
- { role: nginx }
|
||||
- { role: curator, when: install_curator_tool }
|
||||
- { role: kibana }
|
||||
environment: "{{proxy_env}}"
|
||||
|
||||
- hosts: localhost
|
||||
connection: local
|
||||
roles:
|
||||
- { role: es-template }
|
||||
environment: "{{proxy_env}}"
|
@ -1,6 +0,0 @@
|
||||
[elk-client]
|
||||
name=Elastic FileBeat Repository
|
||||
baseurl=https://packages.elastic.co/beats/yum/el/$basearch
|
||||
enabled=1
|
||||
gpgkey=https://packages.elastic.co/GPG-KEY-elasticsearch
|
||||
gpgcheck=1
|
@ -1,98 +0,0 @@
|
||||
---
|
||||
#
|
||||
# install/run filebeat elk client for browbeat
|
||||
#
|
||||
|
||||
- name: Copy filebeat yum repo file
|
||||
copy:
|
||||
src=filebeat.repo
|
||||
dest=/etc/yum.repos.d/filebeat.repo
|
||||
owner=root
|
||||
group=root
|
||||
mode=0644
|
||||
when: (logging_backend != 'fluentd')
|
||||
become: true
|
||||
|
||||
- name: Import Filebeat GPG Key
|
||||
become: true
|
||||
rpm_key: key=http://packages.elastic.co/GPG-KEY-elasticsearch
|
||||
state=present
|
||||
when: (logging_backend != 'fluentd')
|
||||
|
||||
- name: Install filebeat rpms
|
||||
package:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
become: true
|
||||
with_items:
|
||||
- filebeat
|
||||
when: (logging_backend != 'fluentd')
|
||||
|
||||
- name: Generate filebeat configuration template
|
||||
template:
|
||||
src=filebeat.yml.j2
|
||||
dest=/etc/filebeat/filebeat.yml
|
||||
owner=root
|
||||
group=root
|
||||
mode=0644
|
||||
become: true
|
||||
when: (logging_backend != 'fluentd')
|
||||
register: filebeat_needs_restart
|
||||
|
||||
- name: Check ELK server SSL client certificate
|
||||
stat: path=/etc/pki/tls/certs/filebeat-forwarder.crt
|
||||
become: true
|
||||
ignore_errors: true
|
||||
register: elk_client_ssl_cert_exists
|
||||
when: (logging_backend != 'fluentd')
|
||||
|
||||
- name: Install ELK server SSL client certificate
|
||||
get_url:
|
||||
url=http://{{ elk_server }}:{{ elk_server_ssl_cert_port }}/filebeat-forwarder.crt
|
||||
dest=/etc/pki/tls/certs/filebeat-forwarder.crt
|
||||
become: true
|
||||
when: ((elk_client_ssl_cert_exists != 0) and (logging_backend != 'fluentd'))
|
||||
|
||||
- name: Start filebeat service
|
||||
systemd:
|
||||
name: filebeat.service
|
||||
state: started
|
||||
when: ((filebeat_needs_restart != 0) and (logging_backend != 'fluentd'))
|
||||
|
||||
- name: Setup filebeat service
|
||||
service: name=filebeat state=started enabled=true
|
||||
become: true
|
||||
when: (logging_backend != 'fluentd')
|
||||
|
||||
- name: Install rsyslogd for fluentd
|
||||
package:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
become: true
|
||||
with_items:
|
||||
- rsyslog
|
||||
when: (logging_backend == 'fluentd')
|
||||
|
||||
- name: Setup rsyslogd for fluentd
|
||||
become: true
|
||||
lineinfile: dest=/etc/rsyslog.conf \
|
||||
line="*.* @{{ elk_server }}:{{ fluentd_syslog_port }}"
|
||||
when: (logging_backend == 'fluentd')
|
||||
register: rsyslog_updated
|
||||
|
||||
- name: Setup common OpenStack rsyslog logging
|
||||
template:
|
||||
src=rsyslog-openstack.conf.j2
|
||||
dest=/etc/rsyslog.d/openstack-logs.conf
|
||||
owner=root
|
||||
group=root
|
||||
mode=0644
|
||||
become: true
|
||||
register: rsyslog_updated
|
||||
when: (logging_backend == 'fluentd')
|
||||
|
||||
- name: Restarting rsyslog for fluentd
|
||||
systemd:
|
||||
name: rsyslog.service
|
||||
state: restarted
|
||||
when: rsyslog_updated != 0
|
@ -1,383 +0,0 @@
|
||||
################### Filebeat Configuration Example #########################
|
||||
|
||||
############################# Filebeat ######################################
|
||||
filebeat:
|
||||
# List of prospectors to fetch data.
|
||||
prospectors:
|
||||
# Each - is a prospector. Below are the prospector specific configurations
|
||||
-
|
||||
# Paths that should be crawled and fetched. Glob based paths.
|
||||
# To fetch all ".log" files from a specific level of subdirectories
|
||||
# /var/log/*/*.log can be used.
|
||||
# For each file found under this path, a harvester is started.
|
||||
# Make sure not file is defined twice as this can lead to unexpected behaviour.
|
||||
paths:
|
||||
- /var/log/*.log
|
||||
- /var/log/messages
|
||||
# foreman
|
||||
- /var/log/foreman/*.log
|
||||
- /var/log/foreman-proxy/*.log
|
||||
# openstack
|
||||
- /var/log/nova/*.log
|
||||
- /var/log/neutron/*.log
|
||||
- /var/log/cinder/*.log
|
||||
- /var/log/keystone/*.log
|
||||
- /var/log/horizon/*.log
|
||||
- /var/log/glance/*.log
|
||||
- /var/log/mariadb/*.log
|
||||
- /var/log/rabbitmq/*.log
|
||||
- /var/log/mongodb/*.log
|
||||
- /var/log/ceilometer/*.log
|
||||
- /var/log/ceph/*.log
|
||||
- /var/log/heat/*.log
|
||||
- /var/log/openvswitch/*.log
|
||||
- /var/log/pcsd/*.log
|
||||
- /var/log/puppet/*.log
|
||||
- /var/log/redis/*.log
|
||||
- /var/log/glusterfs/*.log
|
||||
- /var/log/swift/*.log
|
||||
|
||||
# Configure the file encoding for reading files with international characters
|
||||
# following the W3C recommendation for HTML5 (http://www.w3.org/TR/encoding).
|
||||
# Some sample encodings:
|
||||
# plain, utf-8, utf-16be-bom, utf-16be, utf-16le, big5, gb18030, gbk,
|
||||
# hz-gb-2312, euc-kr, euc-jp, iso-2022-jp, shift-jis, ...
|
||||
#encoding: plain
|
||||
|
||||
# Type of the files. Based on this the way the file is read is decided.
|
||||
# The different types cannot be mixed in one prospector
|
||||
#
|
||||
# Possible options are:
|
||||
# * log: Reads every line of the log file (default)
|
||||
# * stdin: Reads the standard in
|
||||
input_type: log
|
||||
|
||||
# Optional additional fields. These field can be freely picked
|
||||
# to add additional information to the crawled log files for filtering
|
||||
#fields:
|
||||
# level: debug
|
||||
# review: 1
|
||||
|
||||
# Set to true to store the additional fields as top level fields instead
|
||||
# of under the "fields" sub-dictionary. In case of name conflicts with the
|
||||
# fields added by Filebeat itself, the custom fields overwrite the default
|
||||
# fields.
|
||||
#fields_under_root: false
|
||||
|
||||
# Ignore files which were modified more then the defined timespan in the past
|
||||
# Time strings like 2h (2 hours), 5m (5 minutes) can be used.
|
||||
#ignore_older: 24h
|
||||
|
||||
# Type to be published in the 'type' field. For Elasticsearch output,
|
||||
# the type defines the document type these entries should be stored
|
||||
# in. Default: log
|
||||
document_type: syslog
|
||||
|
||||
# Scan frequency in seconds.
|
||||
# How often these files should be checked for changes. In case it is set
|
||||
# to 0s, it is done as often as possible. Default: 10s
|
||||
#scan_frequency: 10s
|
||||
|
||||
# Defines the buffer size every harvester uses when fetching the file
|
||||
#harvester_buffer_size: 16384
|
||||
|
||||
# Setting tail_files to true means filebeat starts readding new files at the end
|
||||
# instead of the beginning. If this is used in combination with log rotation
|
||||
# this can mean that the first entries of a new file are skipped.
|
||||
#tail_files: false
|
||||
|
||||
# Backoff values define how aggressively filebeat crawls new files for updates
|
||||
# The default values can be used in most cases. Backoff defines how long it is waited
|
||||
# to check a file again after EOF is reached. Default is 1s which means the file
|
||||
# is checked every second if new lines were added. This leads to a near real time crawling.
|
||||
# Every time a new line appears, backoff is reset to the initial value.
|
||||
#backoff: 1s
|
||||
|
||||
# Max backoff defines what the maximum backoff time is. After having backed off multiple times
|
||||
# from checking the files, the waiting time will never exceed max_backoff idenependent of the
|
||||
# backoff factor. Having it set to 10s means in the worst case a new line can be added to a log
|
||||
# file after having backed off multiple times, it takes a maximum of 10s to read the new line
|
||||
#max_backoff: 10s
|
||||
|
||||
# The backoff factor defines how fast the algorithm backs off. The bigger the backoff factor,
|
||||
# the faster the max_backoff value is reached. If this value is set to 1, no backoff will happen.
|
||||
# The backoff value will be multiplied each time with the backoff_factor until max_backoff is reached
|
||||
#backoff_factor: 2
|
||||
|
||||
# This option closes a file, as soon as the file name changes.
|
||||
# This config option is recommended on windows only. Filebeat keeps the files it's reading open. This can cause
|
||||
# issues when the file is removed, as the file will not be fully removed until also Filebeat closes
|
||||
# the reading. Filebeat closes the file handler after ignore_older. During this time no new file with the
|
||||
# same name can be created. Turning this feature on the other hand can lead to loss of data
|
||||
# on rotate files. It can happen that after file rotation the beginning of the new
|
||||
# file is skipped, as the reading starts at the end. We recommend to leave this option on false
|
||||
# but lower the ignore_older value to release files faster.
|
||||
#force_close_files: false
|
||||
|
||||
#-
|
||||
# paths:
|
||||
# - /var/log/apache/*.log
|
||||
# type: log
|
||||
#
|
||||
# # Ignore files which are older then 24 hours
|
||||
# ignore_older: 24h
|
||||
#
|
||||
# # Additional fields which can be freely defined
|
||||
# fields:
|
||||
# type: apache
|
||||
# server: localhost
|
||||
#-
|
||||
# type: stdin
|
||||
# paths:
|
||||
# - "-"
|
||||
|
||||
# General filebeat configuration options
|
||||
#
|
||||
# Event count spool threshold - forces network flush if exceeded
|
||||
#spool_size: 1024
|
||||
|
||||
# Defines how often the spooler is flushed. After idle_timeout the spooler is
|
||||
# Flush even though spool_size is not reached.
|
||||
#idle_timeout: 5s
|
||||
|
||||
# Name of the registry file. Per default it is put in the current working
|
||||
# directory. In case the working directory is changed after when running
|
||||
# filebeat again, indexing starts from the beginning again.
|
||||
#registry_file: .filebeat
|
||||
|
||||
# Full Path to directory with additional prospector configuration files. Each file must end with .yml
|
||||
# These config files must have the full filebeat config part inside, but only
|
||||
# the prospector part is processed. All global options like spool_size are ignored.
|
||||
# The config_dir MUST point to a different directory then where the main filebeat config file is in.
|
||||
#config_dir:
|
||||
|
||||
|
||||
###############################################################################
|
||||
############################# Libbeat Config ##################################
|
||||
# Base config file used by all other beats for using libbeat features
|
||||
|
||||
############################# Output ##########################################
|
||||
|
||||
# Configure what outputs to use when sending the data collected by the beat.
|
||||
# Multiple outputs may be used.
|
||||
output:
|
||||
|
||||
### Elasticsearch as output
|
||||
#elasticsearch:
|
||||
logstash:
|
||||
# Array of hosts to connect to.
|
||||
# Scheme and port can be left out and will be set to the default (http and 9200)
|
||||
# In case you specify and additional path, the scheme is required: http://localhost:9200/path
|
||||
# IPv6 addresses should always be defined as: https://[2001:db8::1]:9200
|
||||
hosts: ["{{ elk_server }}:{{ logstash_syslog_port }}"]
|
||||
bulk_max_size: 1024
|
||||
# Optional protocol and basic auth credentials. These are deprecated.
|
||||
#protocol: "https"
|
||||
#username: "admin"
|
||||
#password: "s3cr3t"
|
||||
|
||||
# Number of workers per Elasticsearch host.
|
||||
#worker: 1
|
||||
|
||||
# Optional index name. The default is "filebeat" and generates
|
||||
# [filebeat-]YYYY.MM.DD keys.
|
||||
#index: "filebeat"
|
||||
|
||||
# Optional HTTP Path
|
||||
#path: "/elasticsearch"
|
||||
|
||||
# Proxy server URL
|
||||
# proxy_url: http://proxy:3128
|
||||
|
||||
# The number of times a particular Elasticsearch index operation is attempted. If
|
||||
# the indexing operation doesn't succeed after this many retries, the events are
|
||||
# dropped. The default is 3.
|
||||
#max_retries: 3
|
||||
|
||||
# The maximum number of events to bulk in a single Elasticsearch bulk API index request.
|
||||
# The default is 50.
|
||||
#bulk_max_size: 50
|
||||
|
||||
# Configure http request timeout before failing an request to Elasticsearch.
|
||||
#timeout: 90
|
||||
|
||||
# The number of seconds to wait for new events between two bulk API index requests.
|
||||
# If `bulk_max_size` is reached before this interval expires, addition bulk index
|
||||
# requests are made.
|
||||
#flush_interval: 1
|
||||
|
||||
# Boolean that sets if the topology is kept in Elasticsearch. The default is
|
||||
# false. This option makes sense only for Packetbeat.
|
||||
#save_topology: false
|
||||
|
||||
# The time to live in seconds for the topology information that is stored in
|
||||
# Elasticsearch. The default is 15 seconds.
|
||||
#topology_expire: 15
|
||||
|
||||
# tls configuration. By default is off.
|
||||
tls:
|
||||
# List of root certificates for HTTPS server verifications
|
||||
certificate_authorities: ["/etc/pki/tls/certs/filebeat-forwarder.crt"]
|
||||
|
||||
# Certificate for TLS client authentication
|
||||
#certificate: "/etc/pki/client/cert.pem"
|
||||
|
||||
# Client Certificate Key
|
||||
#certificate_key: "/etc/pki/client/cert.key"
|
||||
|
||||
# Controls whether the client verifies server certificates and host name.
|
||||
# If insecure is set to true, all server host names and certificates will be
|
||||
# accepted. In this mode TLS based connections are susceptible to
|
||||
# man-in-the-middle attacks. Use only for testing.
|
||||
#insecure: true
|
||||
|
||||
# Configure cipher suites to be used for TLS connections
|
||||
#cipher_suites: []
|
||||
|
||||
# Configure curve types for ECDHE based cipher suites
|
||||
#curve_types: []
|
||||
|
||||
# Configure minimum TLS version allowed for connection to logstash
|
||||
#min_version: 1.0
|
||||
|
||||
# Configure maximum TLS version allowed for connection to logstash
|
||||
#max_version: 1.2
|
||||
|
||||
|
||||
### Logstash as output
|
||||
#logstash:
|
||||
# The Logstash hosts
|
||||
#hosts: ["localhost:5044"]
|
||||
|
||||
# Number of workers per Logstash host.
|
||||
#worker: 1
|
||||
|
||||
# Optional load balance the events between the Logstash hosts
|
||||
#loadbalance: true
|
||||
|
||||
# Optional index name. The default index name depends on the each beat.
|
||||
# For Packetbeat, the default is set to packetbeat, for Topbeat
|
||||
# top topbeat and for Filebeat to filebeat.
|
||||
#index: filebeat
|
||||
|
||||
# Optional TLS. By default is off.
|
||||
#tls:
|
||||
# List of root certificates for HTTPS server verifications
|
||||
#certificate_authorities: ["/etc/pki/root/ca.pem"]
|
||||
|
||||
# Certificate for TLS client authentication
|
||||
#certificate: "/etc/pki/client/cert.pem"
|
||||
|
||||
# Client Certificate Key
|
||||
#certificate_key: "/etc/pki/client/cert.key"
|
||||
|
||||
# Controls whether the client verifies server certificates and host name.
|
||||
# If insecure is set to true, all server host names and certificates will be
|
||||
# accepted. In this mode TLS based connections are susceptible to
|
||||
# man-in-the-middle attacks. Use only for testing.
|
||||
#insecure: true
|
||||
|
||||
# Configure cipher suites to be used for TLS connections
|
||||
#cipher_suites: []
|
||||
|
||||
# Configure curve types for ECDHE based cipher suites
|
||||
#curve_types: []
|
||||
|
||||
|
||||
### File as output
|
||||
#file:
|
||||
# Path to the directory where to save the generated files. The option is mandatory.
|
||||
#path: "/tmp/filebeat"
|
||||
|
||||
# Name of the generated files. The default is `filebeat` and it generates files: `filebeat`, `filebeat.1`, `filebeat.2`, etc.
|
||||
#filename: filebeat
|
||||
|
||||
# Maximum size in kilobytes of each file. When this size is reached, the files are
|
||||
# rotated. The default value is 10 MB.
|
||||
#rotate_every_kb: 10000
|
||||
|
||||
# Maximum number of files under path. When this number of files is reached, the
|
||||
# oldest file is deleted and the rest are shifted from last to first. The default
|
||||
# is 7 files.
|
||||
#number_of_files: 7
|
||||
|
||||
|
||||
### Console output
|
||||
# console:
|
||||
# Pretty print json event
|
||||
#pretty: false
|
||||
|
||||
|
||||
############################# Shipper #########################################
|
||||
|
||||
shipper:
|
||||
# The name of the shipper that publishes the network data. It can be used to group
|
||||
# all the transactions sent by a single shipper in the web interface.
|
||||
# If this options is not defined, the hostname is used.
|
||||
#name:
|
||||
|
||||
# The tags of the shipper are included in their own field with each
|
||||
# transaction published. Tags make it easy to group servers by different
|
||||
# logical properties.
|
||||
#tags: ["service-X", "web-tier"]
|
||||
|
||||
# Uncomment the following if you want to ignore transactions created
|
||||
# by the server on which the shipper is installed. This option is useful
|
||||
# to remove duplicates if shippers are installed on multiple servers.
|
||||
#ignore_outgoing: true
|
||||
|
||||
# How often (in seconds) shippers are publishing their IPs to the topology map.
|
||||
# The default is 10 seconds.
|
||||
#refresh_topology_freq: 10
|
||||
|
||||
# Expiration time (in seconds) of the IPs published by a shipper to the topology map.
|
||||
# All the IPs will be deleted afterwards. Note, that the value must be higher than
|
||||
# refresh_topology_freq. The default is 15 seconds.
|
||||
#topology_expire: 15
|
||||
|
||||
# Configure local GeoIP database support.
|
||||
# If no paths are not configured geoip is disabled.
|
||||
#geoip:
|
||||
#paths:
|
||||
# - "/usr/share/GeoIP/GeoLiteCity.dat"
|
||||
# - "/usr/local/var/GeoIP/GeoLiteCity.dat"
|
||||
|
||||
|
||||
############################# Logging #########################################
|
||||
|
||||
# There are three options for the log ouput: syslog, file, stderr.
|
||||
# Under Windos systems, the log files are per default sent to the file output,
|
||||
# under all other system per default to syslog.
|
||||
logging:
|
||||
|
||||
# Send all logging output to syslog. On Windows default is false, otherwise
|
||||
# default is true.
|
||||
#to_syslog: true
|
||||
|
||||
# Write all logging output to files. Beats automatically rotate files if rotateeverybytes
|
||||
# limit is reached.
|
||||
#to_files: false
|
||||
|
||||
# To enable logging to files, to_files option has to be set to true
|
||||
files:
|
||||
# The directory where the log files will written to.
|
||||
#path: /var/log/mybeat
|
||||
|
||||
# The name of the files where the logs are written to.
|
||||
#name: mybeat
|
||||
|
||||
# Configure log file size limit. If limit is reached, log file will be
|
||||
# automatically rotated
|
||||
rotateeverybytes: 10485760 # = 10MB
|
||||
|
||||
# Number of rotated log files to keep. Oldest files will be deleted first.
|
||||
#keepfiles: 7
|
||||
|
||||
# Enable debug output for selected components. To enable all selectors use ["*"]
|
||||
# Other available selectors are beat, publish, service
|
||||
# Multiple selectors can be chained.
|
||||
#selectors: [ ]
|
||||
|
||||
# Sets log level. The default log level is error.
|
||||
# Available log levels are: critical, error, warning, info, debug
|
||||
#level: error
|
@ -1,163 +0,0 @@
|
||||
# This template aggregates common OpenStack logs
|
||||
# via rsyslog. You should edit this file with any
|
||||
# application logs that need to be captured that
|
||||
# are not sent to rsyslog.
|
||||
#
|
||||
# If you enable the ForwardToSyslog option in
|
||||
# journalctl you can send anything logged by systemd
|
||||
# as well:
|
||||
# file: /etc/systemd/journald.conf
|
||||
# parameter: ForwardToSyslog=yes
|
||||
# action: systemctl restart systemd-journald
|
||||
|
||||
$ModLoad imfile
|
||||
|
||||
# Neutron
|
||||
$InputFileName /var/log/neutron/server.log
|
||||
$InputFileTag neutron-server-errors
|
||||
$InputFileStateFile neutron-server-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
# Nova
|
||||
$InputFileName /var/log/nova/nova-api.log
|
||||
$InputFileTag nova-api-errors
|
||||
$InputFileStateFile nova-api-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/nova/nova-cert.log
|
||||
$InputFileTag nova-cert-errors
|
||||
$InputFileStateFile nova-cert-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/nova/nova-conductor.log
|
||||
$InputFileTag nova-conductor-errors
|
||||
$InputFileStateFile nova-conductor-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/nova/nova-consoleauth.log
|
||||
$InputFileTag nova-consoleauth-errors
|
||||
$InputFileStateFile nova-consoleauth-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/nova/nova-manage.log
|
||||
$InputFileTag nova-manage-errors
|
||||
$InputFileStateFile nova-manage-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/nova/nova-novncproxy.log
|
||||
$InputFileTag nova-novncproxy-errors
|
||||
$InputFileStateFile nova-novncproxy-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/nova/nova-scheduler.log
|
||||
$InputFileTag nova-scheduler-errors
|
||||
$InputFileStateFile nova-scheduler-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
# cinder
|
||||
$InputFileName /var/log/cinder/api.log
|
||||
$InputFileTag cinder-api-errors
|
||||
$InputFileStateFile cinder-api-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/cinder/backup.log
|
||||
$InputFileTag cinder-backup-errors
|
||||
$InputFileStateFile cinder-backup-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/cinder/scheduler.log
|
||||
$InputFileTag cinder-scheduler-errors
|
||||
$InputFileStateFile cinder-scheduler-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/cinder/volume.log
|
||||
$InputFileTag cinder-volume-errors
|
||||
$InputFileStateFile cinder-volume-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
# glance
|
||||
$InputFileName /var/log/glance/api.log
|
||||
$InputFileTag glance-api-errors
|
||||
$InputFileStateFile glance-api-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/glance/registry.log
|
||||
$InputFileTag glance-registry-errors
|
||||
$InputFileStateFile glance-registry-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/glance/scrubber.log
|
||||
$InputFileTag glance-scrubber-errors
|
||||
$InputFileStateFile glance-scrubber-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
# keystone
|
||||
$InputFileName /var/log/keystone/keystone.log
|
||||
$InputFileTag keystone-errors
|
||||
$InputFileStateFile keystone-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
# horizon
|
||||
$InputFileName /var/log/horizon/horizon.log
|
||||
$InputFileTag horizon-errors
|
||||
$InputFileStateFile horizon-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/httpd/horizon_error.log
|
||||
$InputFileTag horizon-httpd-errors
|
||||
$InputFileStateFile horizon-httpd-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
$InputFileName /var/log/httpd/horizon_ssl_error.log
|
||||
$InputFileTag horizon-httpd_ssl-errors
|
||||
$InputFileStateFile horizon-httpd_ssl-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
# mariadb
|
||||
$InputFileName /var/log/mariadb/mariadb.log
|
||||
$InputFileTag mariadb-errors
|
||||
$InputFileStateFile mariadb-errors
|
||||
$InputFileSeverity error
|
||||
$InputFileFacility local7
|
||||
$InputRunFileMonitor
|
||||
|
||||
# send to elk_server
|
||||
*.* @{{ elk_server }}:{{ fluentd_syslog_port }}
|
Binary file not shown.
@ -1,6 +0,0 @@
|
||||
[kibana-4.6]
|
||||
name=Kibana repository for 4.6.x packages
|
||||
baseurl=http://packages.elastic.co/kibana/4.6/centos
|
||||
gpgcheck=1
|
||||
gpgkey=http://packages.elastic.co/GPG-KEY-elasticsearch
|
||||
enabled=1
|
@ -1,6 +0,0 @@
|
||||
[logstash-2.2]
|
||||
name=logstash repository for 2.2 packages
|
||||
baseurl=http://packages.elasticsearch.org/logstash/2.2/centos
|
||||
gpgcheck=1
|
||||
gpgkey=http://packages.elasticsearch.org/GPG-KEY-elasticsearch
|
||||
enabled=1
|
@ -1,161 +0,0 @@
|
||||
---
|
||||
#
|
||||
# Install/run kibana for browbeat
|
||||
#
|
||||
|
||||
- name: Copy kibana yum repo file
|
||||
copy:
|
||||
src=kibana.repo
|
||||
dest=/etc/yum.repos.d/kibana.repo
|
||||
owner=root
|
||||
group=root
|
||||
mode=0644
|
||||
become: true
|
||||
|
||||
# We need to insert data to create an initial index, query if it exists
|
||||
- name: Check elasticsearch index for content
|
||||
uri:
|
||||
url=http://localhost:9200/_cat/indices
|
||||
method=GET
|
||||
return_content=yes
|
||||
register: elasticsearch_index
|
||||
|
||||
# Populate elasticsearch with local logs if using logstash
|
||||
- name: Populate elasticsearch index with local logs via logstash
|
||||
shell: cat /var/log/messages | /opt/logstash/bin/logstash -f /etc/logstash/conf.d/10-syslog.conf
|
||||
when: "'logstash-' not in elasticsearch_index.content"
|
||||
ignore_errors: true
|
||||
no_log: true
|
||||
|
||||
- name: Install local rsyslogd for fluentd
|
||||
package:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
become: true
|
||||
with_items:
|
||||
- rsyslog
|
||||
when: (logging_backend == 'fluentd')
|
||||
|
||||
- name: Setup local rsyslogd for fluentd
|
||||
lineinfile: dest=/etc/rsyslog.conf \
|
||||
line="*.* @localhost:{{ fluentd_syslog_port }}"
|
||||
when: (logging_backend == 'fluentd')
|
||||
register: rsyslog_updated
|
||||
|
||||
- name: Populate elasticsearch index with local logs via fluentd
|
||||
systemd:
|
||||
name: rsyslog.service
|
||||
state: restarted
|
||||
ignore_errors: true
|
||||
when: rsyslog_updated != 0
|
||||
|
||||
- name: Install kibana rpms
|
||||
package:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
become: true
|
||||
with_items:
|
||||
- kibana
|
||||
- unzip
|
||||
|
||||
- name: Check kibana filebeat dashboards
|
||||
stat: path=/tmp/filebeat-dashboards.zip
|
||||
ignore_errors: true
|
||||
register: kibana_dashboards_present
|
||||
|
||||
- name: Copy kibana filebeat dashboards
|
||||
copy:
|
||||
src=filebeat-dashboards.zip
|
||||
dest=/tmp/filebeat-dashboards.zip
|
||||
owner=root
|
||||
group=root
|
||||
mode=0644
|
||||
become: true
|
||||
ignore_errors: true
|
||||
when: kibana_dashboards_present != 0
|
||||
|
||||
- name: Install kibana filebeat dashboards
|
||||
unarchive: src=/tmp/filebeat-dashboards.zip dest=/tmp/ copy=no
|
||||
ignore_errors: true
|
||||
when: kibana_dashboards_present != 0
|
||||
|
||||
- name: Validate kibana load.sh script is available for use
|
||||
stat:
|
||||
path: /tmp/beats-dashboards-master/load.sh
|
||||
ignore_errors: true
|
||||
register: kibana_dashboards_load_sh_present
|
||||
|
||||
- name: Configure kibana filebeat dashboards
|
||||
shell: sh /tmp/beats-dashboards-master/load.sh -url "http://localhost:9200" -user "{{kibana_user}}:{{kibana_password}}"
|
||||
ignore_errors: true
|
||||
when: kibana_dashboards_load_sh_present != 0
|
||||
tags:
|
||||
# Skip ANSIBLE0013 Use shell only when shell functionality is required
|
||||
# Shell required here during script execution
|
||||
- skip_ansible_lint
|
||||
|
||||
- name: Check kibana users
|
||||
stat: path=/etc/nginx/htpasswd.users
|
||||
ignore_errors: true
|
||||
register: kibana_user_pwfile_exists
|
||||
|
||||
- name: Create kibana admin user
|
||||
command: htpasswd -b -c /etc/nginx/htpasswd.users {{kibana_user}} {{kibana_password}}
|
||||
ignore_errors: true
|
||||
when: kibana_user_pwfile_exists != 0
|
||||
|
||||
- name: Setup kibana service
|
||||
service: name=kibana state=started enabled=true
|
||||
become: true
|
||||
|
||||
- name: Check Filebeat forwarder SSL certificate
|
||||
stat: path=/etc/pki/tls/certs/filebeat-forwarder.crt
|
||||
ignore_errors: true
|
||||
register: filebeat_forwarder_ssl_exists
|
||||
|
||||
- name: Create client forwarder SSL certificate
|
||||
command: openssl req -subj '/CN={{ ansible_fqdn }}/' -config /etc/pki/tls/openssl_extras.cnf \
|
||||
-x509 -days 3650 -batch -nodes -newkey rsa:2048 -keyout /etc/pki/tls/private/filebeat-forwarder.key \
|
||||
-out /etc/pki/tls/certs/filebeat-forwarder.crt
|
||||
ignore_errors: true
|
||||
when: filebeat_forwarder_ssl_exists != 0
|
||||
|
||||
- name: Check Filebeat forwarder SSL certificate copy
|
||||
stat: path=/usr/share/nginx/html/filebeat-forwarder.crt
|
||||
ignore_errors: true
|
||||
register: filebeat_forwarder_ssl_client_copy_exists
|
||||
|
||||
- name: Copy Filebeat forwarder SSL certificate
|
||||
command: cp /etc/pki/tls/certs/filebeat-forwarder.crt /usr/share/nginx/html/filebeat-forwarder.crt
|
||||
ignore_errors: true
|
||||
when: filebeat_forwarder_ssl_client_copy_exists != 0
|
||||
|
||||
- name: Refresh logstash service
|
||||
systemd:
|
||||
name: logstash.service
|
||||
state: restarted
|
||||
ignore_errors: true
|
||||
when: (logging_backend != 'fluentd')
|
||||
|
||||
- name: Refresh fluentd service
|
||||
systemd:
|
||||
name: td-agent.service
|
||||
state: restarted
|
||||
when: (logging_backend == 'fluentd')
|
||||
become: true
|
||||
|
||||
- name: Print SSL post-setup information
|
||||
debug: msg="Filebeat SSL Certificate available at http://{{ ansible_fqdn }}:{{ elk_server_ssl_cert_port }}/filebeat-forwarder.crt"
|
||||
when: (logging_backend != 'fluentd')
|
||||
|
||||
- name: Print post-setup URL
|
||||
debug: msg="*** ELK Services available at http://{{ ansible_fqdn }}:{{ nginx_kibana_port }} ***"
|
||||
|
||||
- name: Print index creation instructions
|
||||
debug: msg="** 1) Navigate to http://{{ ansible_fqdn }}:{{ nginx_kibana_port }} and login with admin/admin, click 'create' on the green index button ***"
|
||||
|
||||
- name: Print filebeat openstack client setup instructions
|
||||
debug: msg="** 2) Run ansible-playbook -i hosts install/elk-openstack-client.yml --extra-vars 'elk_server={{ ansible_default_ipv4.address }}' to setup OpenStack clients ***"
|
||||
|
||||
- name: Print filebeat client setup instructions
|
||||
debug: msg="** 2) Run ansible-playbook -i hosts install/elk-client.yml --extra-vars 'elk_server={{ ansible_default_ipv4.address }}' to setup clients ***"
|
@ -1,199 +0,0 @@
|
||||
---
|
||||
#
|
||||
# Install/run nginx for browbeat
|
||||
#
|
||||
|
||||
- name: Install nginx, httpd-tools, httplib2, libsemanage-python
|
||||
package:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
become: true
|
||||
with_items:
|
||||
- nginx
|
||||
- httpd-tools
|
||||
- python-httplib2
|
||||
- libsemanage-python
|
||||
|
||||
# SELinux boolean for nginx
|
||||
- name: Apply SELinux boolean httpd_can_network_connect
|
||||
seboolean: name=httpd_can_network_connect state=yes persistent=yes
|
||||
when: "ansible_selinux['status'] == 'enabled'"
|
||||
|
||||
# create /etc/nginx/conf.d/ directory
|
||||
- name: Create nginx directory structure
|
||||
file: path=/etc/nginx/conf.d/
|
||||
state=directory
|
||||
mode=0755
|
||||
|
||||
# deploy kibana.conf with FQDN
|
||||
- name: Setup nginx reverse proxy for kibana
|
||||
template:
|
||||
src=kibana.conf.j2
|
||||
dest=/etc/nginx/conf.d/kibana.conf
|
||||
owner=root
|
||||
group=root
|
||||
mode=0644
|
||||
become: true
|
||||
register: nginx_needs_restart
|
||||
|
||||
# deploy basic nginx.conf 8080 vhost
|
||||
- name: Setup nginx TCP/{{elk_server_ssl_cert_port}} for SSL certificate retrieval
|
||||
template:
|
||||
src=nginx.conf.j2
|
||||
dest=/etc/nginx/nginx.conf
|
||||
owner=root
|
||||
group=root
|
||||
mode=0644
|
||||
become: true
|
||||
|
||||
# start nginx service
|
||||
- name: Start nginx service
|
||||
systemd:
|
||||
name: nginx.service
|
||||
state: restarted
|
||||
ignore_errors: true
|
||||
when: nginx_needs_restart != 0
|
||||
|
||||
- name: Check if nginx is in use
|
||||
shell: systemctl is-enabled nginx.service | egrep -qv 'masked|disabled'
|
||||
register: nginx_in_use
|
||||
ignore_errors: yes
|
||||
tags:
|
||||
# Skip ANSIBLE0012 Commands should not change things if nothing needs doing
|
||||
# Determine if nginx is enabled
|
||||
- skip_ansible_lint
|
||||
|
||||
- name: Set nginx to start on boot
|
||||
systemd:
|
||||
name: nginx.service
|
||||
enabled: yes
|
||||
when: nginx_in_use.rc != 0
|
||||
|
||||
# we need TCP/80 and TCP/8080 open
|
||||
# determine firewall status and take action
|
||||
# 1) use firewall-cmd if firewalld is utilized
|
||||
# 2) insert iptables rule if iptables is used
|
||||
|
||||
# Firewalld
|
||||
- name: Determine if firewalld is in use
|
||||
shell: systemctl is-enabled firewalld.service | egrep -qv 'masked|disabled'
|
||||
ignore_errors: true
|
||||
register: firewalld_in_use
|
||||
no_log: true
|
||||
tags:
|
||||
# Skip ANSIBLE0012 Commands should not change things if nothing needs doing
|
||||
# Need to check if firewall is active
|
||||
- skip_ansible_lint
|
||||
|
||||
- name: Determine if firewalld is active
|
||||
shell: systemctl is-active firewalld.service | grep -vq inactive
|
||||
ignore_errors: true
|
||||
register: firewalld_is_active
|
||||
no_log: true
|
||||
tags:
|
||||
# Skip ANSIBLE0012 Commands should not change things if nothing needs doing
|
||||
# Need to check if firewall is active
|
||||
- skip_ansible_lint
|
||||
|
||||
- name: Determine if TCP/{{nginx_kibana_port}} is already active
|
||||
shell: firewall-cmd --list-ports | egrep -q "^{{nginx_kibana_port}}/tcp"
|
||||
ignore_errors: true
|
||||
register: firewalld_nginx_kibana_port_exists
|
||||
no_log: true
|
||||
tags:
|
||||
# Skip ANSIBLE0012 Commands should not change things if nothing needs doing
|
||||
# Need to check if firewall rule already exists
|
||||
- skip_ansible_lint
|
||||
|
||||
# add firewall rule via firewall-cmd
|
||||
- name: Add firewall rule for TCP/{{nginx_kibana_port}} (firewalld)
|
||||
command: "{{ item }}"
|
||||
with_items:
|
||||
- firewall-cmd --zone=public --add-port={{nginx_kibana_port}}/tcp --permanent
|
||||
- firewall-cmd --reload
|
||||
ignore_errors: true
|
||||
become: true
|
||||
when: firewalld_in_use.rc == 0 and firewalld_is_active.rc == 0 and firewalld_nginx_kibana_port_exists.rc != 0
|
||||
|
||||
# iptables-services
|
||||
- name: check firewall rules for TCP/{{nginx_kibana_port}} (iptables-services)
|
||||
shell: grep "dport {{nginx_kibana_port}} \-j ACCEPT" /etc/sysconfig/iptables | wc -l
|
||||
ignore_errors: true
|
||||
register: iptables_nginx_kibana_port_exists
|
||||
failed_when: iptables_nginx_kibana_port_exists == 127
|
||||
no_log: true
|
||||
tags:
|
||||
# Skip ANSIBLE0012 Commands should not change things if nothing needs doing
|
||||
# Need to check if firewall rule already exists
|
||||
- skip_ansible_lint
|
||||
|
||||
- name: Add firewall rule for TCP/{{nginx_kibana_port}} (iptables-services)
|
||||
lineinfile:
|
||||
dest: /etc/sysconfig/iptables
|
||||
line: '-A INPUT -p tcp -m tcp --dport {{nginx_kibana_port}} -j ACCEPT'
|
||||
regexp: '^INPUT -i lo -j ACCEPT'
|
||||
insertbefore: '-A INPUT -i lo -j ACCEPT'
|
||||
backup: yes
|
||||
when: firewalld_in_use.rc != 0 and firewalld_is_active.rc != 0 and iptables_nginx_kibana_port_exists.stdout|int == 0
|
||||
register: iptables_needs_restart
|
||||
|
||||
- name: Restart iptables-services for TCP/{{nginx_kibana_port}} (iptables-services)
|
||||
shell: systemctl restart iptables.service
|
||||
ignore_errors: true
|
||||
when: iptables_needs_restart != 0 and firewalld_in_use.rc != 0 and firewalld_is_active.rc != 0
|
||||
tags:
|
||||
# Skip ANSIBLE0013 Use shell only when shell functionality is required
|
||||
# No systemctl module available in current stable release (Ansible 2.1)
|
||||
- skip_ansible_lint
|
||||
|
||||
# Firewalld
|
||||
- name: Determine if TCP/{{elk_server_ssl_cert_port}} is already active
|
||||
shell: firewall-cmd --list-ports | egrep -q "^{{elk_server_ssl_cert_port}}/tcp"
|
||||
ignore_errors: true
|
||||
register: firewalld_elk_server_ssl_port_exists
|
||||
no_log: true
|
||||
tags:
|
||||
# Skip ANSIBLE0012 Commands should not change things if nothing needs doing
|
||||
# Need to check if firewall rule already exists
|
||||
- skip_ansible_lint
|
||||
|
||||
# add firewall rule via firewall-cmd
|
||||
- name: Add firewall rule for TCP/{{elk_server_ssl_cert_port}} (firewalld)
|
||||
command: "{{ item }}"
|
||||
with_items:
|
||||
- firewall-cmd --zone=public --add-port={{elk_server_ssl_cert_port}}/tcp --permanent
|
||||
- firewall-cmd --reload
|
||||
ignore_errors: true
|
||||
become: true
|
||||
when: firewalld_in_use.rc == 0 and firewalld_is_active.rc == 0 and firewalld_elk_server_ssl_port_exists.rc != 0
|
||||
|
||||
# iptables-services
|
||||
- name: check firewall rules for TCP/{{elk_server_ssl_cert_port}} (iptables-services)
|
||||
shell: grep "dport {{elk_server_ssl_cert_port}} \-j ACCEPT" /etc/sysconfig/iptables | wc -l
|
||||
ignore_errors: true
|
||||
register: iptables_elk_server_ssl_port_exists
|
||||
failed_when: iptables_elk_server_ssl_port_exists == 127
|
||||
no_log: true
|
||||
tags:
|
||||
# Skip ANSIBLE0012 Commands should not change things if nothing needs doing
|
||||
# Need to check if firewall rule already exists
|
||||
- skip_ansible_lint
|
||||
|
||||
- name: Add firewall rule for TCP/{{elk_server_ssl_cert_port}} (iptables-services)
|
||||
lineinfile:
|
||||
dest: /etc/sysconfig/iptables
|
||||
line: '-A INPUT -p tcp -m tcp --dport {{elk_server_ssl_cert_port}} -j ACCEPT'
|
||||
regexp: '^INPUT -i lo -j ACCEPT'
|
||||
insertbefore: '-A INPUT -i lo -j ACCEPT'
|
||||
backup: yes
|
||||
when: firewalld_in_use.rc != 0 and firewalld_is_active.rc != 0 and iptables_elk_server_ssl_port_exists.stdout|int == 0
|
||||
register: iptables_needs_restart
|
||||
|
||||
- name: Restart iptables-services for TCP/{{elk_server_ssl_cert_port}} (iptables-services)
|
||||
shell: systemctl restart iptables.service
|
||||
ignore_errors: true
|
||||
when: iptables_needs_restart != 0 and firewalld_in_use.rc != 0 and firewalld_is_active.rc != 0
|
||||
tags:
|
||||
# Skip ANSIBLE0013 Use shell only when shell functionality is required
|
||||
# No systemctl module available in current stable release (Ansible 2.1)
|
||||
- skip_ansible_lint
|
@ -1,17 +0,0 @@
|
||||
server {
|
||||
listen {{nginx_kibana_port}};
|
||||
|
||||
server_name {{ansible_hostname}};
|
||||
|
||||
auth_basic "Restricted Access";
|
||||
auth_basic_user_file /etc/nginx/htpasswd.users;
|
||||
|
||||
location / {
|
||||
proxy_pass http://localhost:5601;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection 'upgrade';
|
||||
proxy_set_header Host $host;
|
||||
proxy_cache_bypass $http_upgrade;
|
||||
}
|
||||
}
|
@ -1,55 +0,0 @@
|
||||
# For more information on configuration, see:
|
||||
# * Official English Documentation: http://nginx.org/en/docs/
|
||||
# * Official Russian Documentation: http://nginx.org/ru/docs/
|
||||
|
||||
user nginx;
|
||||
worker_processes auto;
|
||||
error_log /var/log/nginx/error.log;
|
||||
pid /run/nginx.pid;
|
||||
|
||||
events {
|
||||
worker_connections 1024;
|
||||
}
|
||||
|
||||
http {
|
||||
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
|
||||
'$status $body_bytes_sent "$http_referer" '
|
||||
'"$http_user_agent" "$http_x_forwarded_for"';
|
||||
|
||||
access_log /var/log/nginx/access.log main;
|
||||
|
||||
sendfile on;
|
||||
tcp_nopush on;
|
||||
tcp_nodelay on;
|
||||
keepalive_timeout 65;
|
||||
types_hash_max_size 2048;
|
||||
|
||||
include /etc/nginx/mime.types;
|
||||
default_type application/octet-stream;
|
||||
|
||||
# Load modular configuration files from the /etc/nginx/conf.d directory.
|
||||
# See http://nginx.org/en/docs/ngx_core_module.html#include
|
||||
# for more information.
|
||||
include /etc/nginx/conf.d/*.conf;
|
||||
|
||||
server {
|
||||
listen {{elk_server_ssl_cert_port}} default_server;
|
||||
listen [::]:{{elk_server_ssl_cert_port}} default_server;
|
||||
server_name _;
|
||||
root /usr/share/nginx/html;
|
||||
|
||||
# Load configuration files for the default server block.
|
||||
include /etc/nginx/default.d/*.conf;
|
||||
|
||||
location / {
|
||||
}
|
||||
|
||||
error_page 404 /404.html;
|
||||
location = /40x.html {
|
||||
}
|
||||
|
||||
error_page 500 502 503 504 /50x.html;
|
||||
location = /50x.html {
|
||||
}
|
||||
}
|
||||
}
|
@ -603,110 +603,11 @@ monitoring host such that you can see if you hit resource issues with your
|
||||
monitoring host.
|
||||
|
||||
|
||||
Install ELK Host (ElasticSearch/LogStash/Kibana)
|
||||
-------------------------------------------------
|
||||
Install Kibana Visualizations
|
||||
-------------------------------
|
||||
|
||||
An ELK server allows you to publish resulting benchmark data into ElasticSearch
|
||||
which allows you to build querys and dashboards to examine your benchmarking
|
||||
result data over various metadata points.
|
||||
|
||||
Prerequisites
|
||||
~~~~~~~~~~~~~
|
||||
|
||||
Hardware
|
||||
|
||||
* Baremetal or Virtual Machine
|
||||
|
||||
Operating System
|
||||
|
||||
* RHEL 7
|
||||
* CentOS 7
|
||||
|
||||
Repos
|
||||
|
||||
* Red Hat Enterprise Linux 7Server - x86_64 - Server
|
||||
* Red Hat Enterprise Linux 7Server - x86_64 - Server Optional
|
||||
|
||||
RPM
|
||||
|
||||
* epel-release
|
||||
* ansible
|
||||
* git
|
||||
|
||||
Installation
|
||||
~~~~~~~~~~~~
|
||||
|
||||
1. Deploy machine (RHEL7 is used in this example)
|
||||
2. Install RPMS
|
||||
|
||||
::
|
||||
|
||||
[root@dhcp23-93 ~]# yum install -y https://download.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm
|
||||
...
|
||||
[root@dhcp23-93 ~]# yum install -y ansible git
|
||||
|
||||
3. Clone Browbeat
|
||||
|
||||
::
|
||||
|
||||
[root@dhcp23-93 ~]# git clone https://github.com/openstack/browbeat.git
|
||||
Cloning into 'browbeat'...
|
||||
remote: Counting objects: 7533, done.
|
||||
remote: Compressing objects: 100% (38/38), done.
|
||||
remote: Total 7533 (delta 30), reused 36 (delta 23), pack-reused 7469
|
||||
Receiving objects: 100% (7533/7533), 5.26 MiB | 5.79 MiB/s, done.
|
||||
Resolving deltas: 100% (4330/4330), done.
|
||||
|
||||
4. Add a hosts file into ansible directory
|
||||
|
||||
::
|
||||
|
||||
[root@dhcp23-93 ~]# cd browbeat/ansible/
|
||||
[root@dhcp23-93 ansible]# vi hosts
|
||||
|
||||
Content of hosts file should be following
|
||||
|
||||
::
|
||||
|
||||
[elk]
|
||||
localhost
|
||||
|
||||
|
||||
5. Setup SSH config, SSH key and exchange for Ansible
|
||||
|
||||
::
|
||||
|
||||
[root@dhcp23-93 ansible]# touch ssh-config
|
||||
[root@dhcp23-93 ansible]# ssh-keygen
|
||||
Generating public/private rsa key pair.
|
||||
...
|
||||
[root@dhcp23-93 ansible]# ssh-copy-id root@localhost
|
||||
...
|
||||
|
||||
6. Edit install variables
|
||||
|
||||
::
|
||||
|
||||
[root@dhcp23-93 ansible]# vi install/group_vars/all.yml
|
||||
|
||||
Depending on the environment you may need to edit more than just the following
|
||||
variables - es_ip
|
||||
|
||||
If you are deploying using a machine that is not an OSP undercloud, be sure to edit
|
||||
the home_dir/browbeat_path to match its actual path.
|
||||
|
||||
.. note:: If you require a proxy to get outside your network, you must
|
||||
configure http_proxy, https_proxy, no_proxy variables in the proxy_env
|
||||
dictionary in install/group_vars/all.yml
|
||||
|
||||
7. Install ELK via Ansible playbook
|
||||
|
||||
::
|
||||
|
||||
[root@dhcp23-93 ansible]# ansible-playbook -i hosts install/elk.yml
|
||||
...
|
||||
|
||||
8. Install Kibana Visualizations via Ansible playbook
|
||||
1. Update install/group_vars/all.yml (es_ip) to identify your ELK host.
|
||||
2. Install Kibana Visualizations via Ansible playbook
|
||||
|
||||
::
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user