summaryrefslogtreecommitdiffstats
path: root/build/aodh-puppet-tripleo.patch
blob: 819b9061f824f84f2333aa0c79715523afb2a74c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
From 784cd3f4e6481b9c802db25ab379fccdab4bd1c3 Mon Sep 17 00:00:00 2001
From: Emilien Macchi <emilien@redhat.com>
Date: Tue, 3 Nov 2015 17:43:01 -0500
Subject: [PATCH] loadbalancer: add Aodh API support

Add Aodh (Ceilometer Alarming) support in TripleO Loadbalancer config.

Change-Id: I891985da9248a88c6ce2df1dd186881f582605ee
---
 manifests/loadbalancer.pp | 43 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 43 insertions(+)

diff --git a/manifests/loadbalancer.pp b/manifests/loadbalancer.pp
index 16a4f80..2fcfac6 100644
--- a/manifests/loadbalancer.pp
+++ b/manifests/loadbalancer.pp
@@ -130,6 +130,11 @@
 #  When set, enables SSL on the Ceilometer public API endpoint using the specified file.
 #  Defaults to undef
 #
+# [*aodh_certificate*]
+#  Filename of an HAProxy-compatible certificate and key file
+#  When set, enables SSL on the Aodh public API endpoint using the specified file.
+#  Defaults to undef
+#
 # [*swift_certificate*]
 #  Filename of an HAProxy-compatible certificate and key file
 #  When set, enables SSL on the Swift public API endpoint using the specified file.
@@ -198,6 +203,10 @@
 #  (optional) Enable or not Ceilometer API binding
 #  Defaults to false
 #
+# [*aodh*]
+#  (optional) Enable or not Aodh API binding
+#  Defaults to false
+#
 # [*swift_proxy_server*]
 #  (optional) Enable or not Swift API binding
 #  Defaults to false
@@ -262,6 +271,7 @@ class tripleo::loadbalancer (
   $glance_certificate        = undef,
   $nova_certificate          = undef,
   $ceilometer_certificate    = undef,
+  $aodh_certificate          = undef,
   $swift_certificate         = undef,
   $heat_certificate          = undef,
   $horizon_certificate       = undef,
@@ -278,6 +288,7 @@ class tripleo::loadbalancer (
   $nova_metadata             = false,
   $nova_novncproxy           = false,
   $ceilometer                = false,
+  $aodh                      = false,
   $swift_proxy_server        = false,
   $heat_api                  = false,
   $heat_cloudwatch           = false,
@@ -421,6 +432,11 @@ class tripleo::loadbalancer (
   } else {
     $ceilometer_bind_certificate = $service_certificate
   }
+  if $aodh_certificate {
+    $aodh_bind_certificate = $aodh_certificate
+  } else {
+    $aodh_bind_certificate = $service_certificate
+  }
   if $swift_certificate {
     $swift_bind_certificate = $swift_certificate
   } else {
@@ -558,6 +574,19 @@ class tripleo::loadbalancer (
     }
   }
 
+  $aodh_api_vip = hiera('aodh_api_vip', $controller_virtual_ip)
+  if $aodh_bind_certificate {
+    $aodh_bind_opts = {
+      "${aodh_api_vip}:8042" => [],
+      "${public_virtual_ip}:13042" => ['ssl', 'crt', $aodh_bind_certificate],
+    }
+  } else {
+    $aodh_bind_opts = {
+      "${aodh_api_vip}:8042" => [],
+      "${public_virtual_ip}:8042" => [],
+    }
+  }
+
   $swift_proxy_vip = hiera('swift_proxy_vip', $controller_virtual_ip)
   if $swift_bind_certificate {
     $swift_bind_opts = {
@@ -840,6 +869,20 @@ class tripleo::loadbalancer (
     }
   }
 
+  if $aodh {
+    haproxy::listen { 'aodh':
+      bind             => $aodh_bind_opts,
+      collect_exported => false,
+    }
+    haproxy::balancermember { 'aodh':
+      listening_service => 'aodh',
+      ports             => '8042',
+      ipaddresses       => hiera('aodh_api_node_ips', $controller_hosts_real),
+      server_names      => $controller_hosts_names_real,
+      options           => ['check', 'inter 2000', 'rise 2', 'fall 5'],
+    }
+  }
+
   if $swift_proxy_server {
     haproxy::listen { 'swift_proxy_server':
       bind             => $swift_bind_opts,
-- 
1.8.3.1
except: _LOGGER.error('Execution of following code has failed %s', code) return False return True @staticmethod def validate_Exec_Python(result, dummy_code): """ Validate result of python `code' execution """ return result @staticmethod def Exec_Shell(command, regex=None): """ Execute a shell `command' and return its output filtered out by optional `regex' expression. """ try: output = subprocess.check_output(command, shell=True) except OSError: return None output = output.decode(locale.getdefaultlocale()[1]) if regex: return filter_output(output, regex) return output @staticmethod def validate_Exec_Shell(result, dummy_command, dummy_regex=None): """ validate result of shell `command' execution """ return result is not None @staticmethod def Exec_Shell_Background(command): """ Execute a shell `command' at the background and return its PID id """ try: pid = run_background_task(command.split(), _LOGGER, "Background task: {}".format(command)) return pid except OSError: return None @staticmethod def validate_Exec_Shell_Background(result, dummy_command, dummy_regex=None): """ validate result of shell `command' execution on the background """ return result is not None