summaryrefslogtreecommitdiff
path: root/inventory/host_vars/ch-mon.yml
blob: d7cb9aaa3220356d315c88b1851ed1ca511ae3a4 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
---
install_jumphost: ch-jump

system_lvm_volume_size_root: 3G
install:
  vm:
    memory: 8G
    numcpus: 8
    autostart: yes
  disks:
    primary: /dev/sda
    scsi:
      sda:
        type: zfs
        name: root
        size: 10g
      sdb:
        type: zfs
        name: data
        size: 50g
  interfaces:
  - bridge: br-svc
    name: svc0
  - bridge: br-iot
    name: iot0
  - bridge: br-mgmt
    name: mgmt0

network:
  nameservers: "{{ network_zones.svc.dns }}"
  domain: "{{ host_domain }}"
  systemd_link:
    interfaces: "{{ install.interfaces }}"
  primary: &_network_primary_
    name: svc0
    address: "{{ network_zones.svc.prefix | ansible.utils.ipaddr(network_zones.svc.offsets[inventory_hostname]) }}"
    gateway: "{{ network_zones.svc.gateway }}"
    static_routes:
    - destination: "{{ network_zones.lan.prefix }}"
      gateway: "{{ network_zones.svc.prefix | ansible.utils.ipaddr(network_zones.svc.offsets['ch-gw-lan']) | ansible.utils.ipaddr('address') }}"
  interfaces:
  - *_network_primary_
  - name: iot0
    address: "{{ network_zones.iot.prefix | ansible.utils.ipaddr(network_zones.iot.offsets[inventory_hostname]) }}"
  - name: mgmt0
    address: "{{ network_zones.mgmt.prefix | ansible.utils.ipaddr(network_zones.mgmt.offsets[inventory_hostname]) }}"


lvm_groups:
  mondata:
    pvs:
    - /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-0-0-1


spreadspace_apt_repo_components:
  - main
  - prometheus


nftables_base_rules:
  protect-grafana-auth-proxy: |
    table inet filter {
      chain protect-grafana-auth-proxy {
        type filter hook output priority filter; policy accept;
        meta skuid != { root, www-data } tcp dport 3000 counter reject
      }
    }

whawty_nginx_sso_backends:
  chaos-at-home:
    port: 1234
    login_url: https://login.chaos-at-home.org/login

whawty_nginx_sso_auths:
  chaos-at-home:
    config:
      cookie:
        name: __Secure-chaos-at-home-sso
        keys:
        - name: 2023-11
          ed25519:
            public-key-data: |-
              -----BEGIN PUBLIC KEY-----
              MCowBQYDK2VwAyEAawvVwThGnYYBDLjQ0Rs71prAmxQ/tfaPUNZvPWS3Z3U=
              -----END PUBLIC KEY-----
        backend:
          bolt: {}
          sync:
            base-url: "https://{{ network_services.http.addr }}"
            http-host: "login.chaos-at-home.org"
            token: "{{  vault_whawty_nginx_sso_sync_tokens['chaos-at-home'][inventory_hostname] }}"
            tls:
              server-name: "login.chaos-at-home.org"
      web:
        listen: 127.0.0.1:1234


prometheus_server_storage:
  type: lvm
  vg: mondata
  lv: prometheus
  size: 30G
  fs: ext4

prometheus_server_external_labels:
  environment: chaos-at-home
  monitor: "{{ inventory_hostname }}"

prometheus_server_alertmanager:
  url: "127.0.0.1:9093"
  path_prefix: "/alertmanager/"
  basic_auth:
    username: server
    password: "{{ vault_prometheus_alertmanager_auth_user_passwords['server'] }}"

prometheus_server_web_external_url: "http://mon.chaos-at-home.org/prometheus/"

prometheus_server_auth_users:
  server: "{{ vault_prometheus_server_auth_user_passwords['server'] }}"
  grafana: "{{ vault_prometheus_server_auth_user_passwords['grafana'] }}"
  proxy: "{{ vault_prometheus_server_auth_user_passwords['proxy'] }}"

prometheus_server_selfscraping_auth:
  username: server
  password: "{{ vault_prometheus_server_auth_user_passwords['server'] }}"


prometheus_exporters_extra:
  - blackbox
  - nut
  - ssl
  - smokeping


prometheus_exporter_smokeping_targets:
  - hosts:
    - "{{ network_zones.magenta.gateway }}"
    - "{{ network_zones.magenta.dns[0] }}"
    - "{{ network_zones.magenta.dns[1] }}"
    - 9.9.9.9
    - 8.8.8.8
    - 1.1.1.1
    - "{{ hostvars['ch-atlas'].vm_host.network.bridges.public.prefix | ansible.utils.ipaddr(hostvars['ch-atlas'].vm_host.network.bridges.public.offsets['ch-atlas']) | ansible.utils.ipaddr('address') }}"

prometheus_job_multitarget_blackbox__probe:
  ch-mon:
  - instance: "ssh-{{ inventory_hostname }}"
    target: "{{ network_zones.svc.prefix | ansible.utils.ipaddr(network_zones.svc.offsets[inventory_hostname]) | ansible.utils.ipaddr('address') }}:{{ ansible_port | default(22) }}"
    module: ssh_banner
  - instance: "https-mon.chaos-at-home.org"
    target: "https://{{ network_zones.svc.prefix | ansible.utils.ipaddr(network_zones.svc.offsets[inventory_hostname]) | ansible.utils.ipaddr('address') }}/healthz"
    module: http_tls_2xx

prometheus_job_multitarget_ssl__probe:
  ch-mon:
  - instance: "sslcert-prometheus-{{ inventory_hostname }}"
    target: "/etc/ssl/prometheus/**/*.pem"
    module: file

prometheus_server_rules_node_extra:
  - alert: GitFsckMetricsOutdated
    expr: time() - git_fsck_run > 100000
    for: 0m
    labels:
      severity: warning
    annotations:
      summary: Metrics from git-fsck are too old (instance {{ '{{' }} $labels.instance {{ '}}' }})
      description: "The exported values from git-fsck on host {{ '{{' }} $labels.instance {{ '}}' }} are {{ '{{' }} $value {{ '}}' }} seconds old.\n  VALUE = {{ '{{' }} $value {{ '}}' }}\n  LABELS = {{ '{{' }} $labels {{ '}}' }}"

  - alert: GitFsckFailed
    expr: git_fsck_failed != 0
    for: 0m
    labels:
      severity: warning
    annotations:
      summary: git-filesystem check failed (instance {{ '{{' }} $labels.instance {{ '}}' }})
      description: "The git repostory {{ '{{' }} $labels.repository {{ '}}' }}@{{ '{{' }} $labels.gitolite_instance {{ '}}' }} on host {{ '{{' }} $labels.instance {{ '}}' }} is corrupt.\n  VALUE = {{ '{{' }} $value {{ '}}' }}\n  LABELS = {{ '{{' }} $labels {{ '}}' }}"


prometheus_alertmanager_smtp:
  smarthost: "{{ network_zones.lan.prefix | ansible.utils.ipaddr(network_zones.lan.offsets['ch-prometheus-legacy']) | ansible.utils.ipaddr('address') }}:25"
  from: "noreply@chaos-at-home.org"
  require_tls: no

prometheus_alertmanager_web_external_url: "http://mon.chaos-at-home.org/alertmanager/"

prometheus_alertmanager_auth_users:
  server: "{{ vault_prometheus_alertmanager_auth_user_passwords['server'] }}"
  proxy: "{{ vault_prometheus_alertmanager_auth_user_passwords['proxy'] }}"

prometheus_alertmanager_route:
  receiver: empty
  routes:
  - receiver: equinox-mail
    matchers:
    - 'alertname != PrometheusAlertmanagerE2eDeadManSwitch'
    group_by:
    - instance

prometheus_alertmanager_receivers:
  - name: empty
  - name: equinox-mail
    email_configs:
    - to: equinox@chaos-at-home.org
      send_resolved: yes


grafana_secret_key: "{{ vault_grafana_secret_key }}"

grafana_config_auth:
  disable_signout_menu: true

grafana_config_auth_proxy:
  enabled: true
  whitelist: 127.0.0.1

grafana_datasources:
 - name: "Prometheus"
   type: "prometheus"
   access: "proxy"
   url: "http://127.0.0.1:9090/prometheus"
   basicAuth: true
   basicAuthUser: "grafana"
   isDefault: yes
   secureJsonData:
     basicAuthPassword: "{{ vault_prometheus_server_auth_user_passwords['grafana'] }}"
   jsonData:
     manageAlerts: no

grafana_dashboards:
 - file: node-full
   datasource: "Prometheus"
 - file: openwrt
   datasource: "Prometheus"
 - file: chrony
   datasource: "Prometheus"
 - file: environment-sensors
   datasource: "Prometheus"
 - file: blackbox
   datasource: "Prometheus"
 - file: smokeping
   datasource: "Prometheus"
 - file: bind
   datasource: "Prometheus"
 - file: ipmi
   datasource: "Prometheus"
 - file: standalone-kubelet-overview
   datasource: "Prometheus"

grafana_admin_password: "{{ vault_grafana_admin_password }}"



monitoring_landingpage_hostnames:
  - "mon.chaos-at-home.org"
monitoring_landingpage_title: "chaos@home Monitoring Host"
monitoring_landingpage_tls:
  certificate_provider: ownca
  certificate_config:
    mode: "0750"
    owner: root
    group: www-data
    ca:
      key_content: "{{ chaos_at_home_internal_ca_key }}"
      cert_content: "{{ chaos_at_home_internal_ca_cert }}"
    key:
      mode: "0640"
      owner: root
      group: www-data
      type: RSA
      size: 4096
    cert:
      mode: "0644"
      owner: root
      group: www-data
      common_name: "{{ host_name }}"
      san_extra: "{{ ['IP:'] | product(ansible_all_ipv4_addresses) | map('join') | list }}"
      key_usage:
      - digitalSignature
      - keyAgreement
      key_usage_critical: yes
      extended_key_usage:
      - serverAuth
      extended_key_usage_critical: yes
      create_subject_key_identifier: yes
      not_before: +0h
      not_after: +365d
      renew_margin: +70d

monitoring_landingpage_vhost_extra_directives: |
  include snippets/whawty-sso-chaos-at-home.conf;

  location = /healthz {
     auth_request off;
     return 200;
  }

monitoring_landingpage_service_extra_directives:
  prometheus: |
    proxy_set_header Authorization "Basic {{ ('proxy:'~prometheus_server_auth_users['proxy']) | b64encode }}";
  alertmanager: |
    proxy_set_header Authorization "Basic {{ ('proxy:'~prometheus_alertmanager_auth_users['proxy']) | b64encode }}";
  grafana: |
    auth_request_set $username $upstream_http_x_username;
    proxy_set_header X-WEBAUTH-USER $username;
    proxy_set_header Authorization "";