Freeze break request: add rsync for httpd logs

Kevin Fenzi kevin at scrye.com
Tue May 14 16:45:18 UTC 2013


So, first freeze break request. ;) 

I added a number of applications to have log02 pull httpd logs from,
but some of them do not have rsync installed, so pulling logs from them
is failing. I'd like to have them include rsync::server (which by
default only exposes logs to log02 for rsync) and allow that in
firewalls.

It's not urgent, but it would be nice to start collecting these sooner
rather than later. 

kevin
--
diff --git a/manifests/nodes/ask01.phx2.fedoraproject.org.pp b/manifests/nodes/ask01.phx2.fedoraproject.org.pp
index 8a24a68..b85905c 100644
--- a/manifests/nodes/ask01.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/ask01.phx2.fedoraproject.org.pp
@@ -17,7 +17,9 @@ node "ask01.phx2.fedoraproject.org" {
   }
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80 ]
+    tcpPorts => [ 80 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 
   collectd::collectd { 'log02': }
diff --git a/manifests/nodes/ask01.stg.phx2.fedoraproject.org.pp b/manifests/nodes/ask01.stg.phx2.fedoraproject.org.pp
index e1abad9..661f5ac 100644
--- a/manifests/nodes/ask01.stg.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/ask01.stg.phx2.fedoraproject.org.pp
@@ -16,7 +16,9 @@ node "ask01.stg.phx2.fedoraproject.org" {
   }
   
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80, 443, 8888 ]
+    tcpPorts => [ 80, 443, 8888 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
   }
 }
             
diff --git a/manifests/nodes/ask02.phx2.fedoraproject.org.pp b/manifests/nodes/ask02.phx2.fedoraproject.org.pp
index bf7b259..6df2054 100644
--- a/manifests/nodes/ask02.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/ask02.phx2.fedoraproject.org.pp
@@ -17,7 +17,9 @@ node "ask02.phx2.fedoraproject.org" {
   }
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80 ]
+    tcpPorts => [ 80 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
   }
 
   collectd::collectd { 'log02': }
diff --git a/manifests/nodes/blockerbugs01.phx2.fedoraproject.org.pp b/manifests/nodes/blockerbugs01.phx2.fedoraproject.org.pp
index 6647b05..61cf44e 100644
--- a/manifests/nodes/blockerbugs01.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/blockerbugs01.phx2.fedoraproject.org.pp
@@ -12,7 +12,9 @@ node "blockerbugs01.phx2.fedoraproject.org" {
   include blockerbugs::nobalance
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80, 443, 8888 ]
+    tcpPorts => [ 80, 443, 8888 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
   }
   # This points to db01
   host { 'db-blockerbugs':
diff --git a/manifests/nodes/blockerbugs01.stg.phx2.fedoraproject.org.pp b/manifests/nodes/blockerbugs01.stg.phx2.fedoraproject.org.pp
index a034e3d..aa7eb45 100644
--- a/manifests/nodes/blockerbugs01.stg.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/blockerbugs01.stg.phx2.fedoraproject.org.pp
@@ -9,6 +9,8 @@ node "blockerbugs01.stg.phx2.fedoraproject.org" {
   include blockerbugs::nobalance
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80, 443, 8888 ]
+    tcpPorts => [ 80, 443, 8888 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
   }
 }
diff --git a/manifests/nodes/blockerbugs02.phx2.fedoraproject.org.pp b/manifests/nodes/blockerbugs02.phx2.fedoraproject.org.pp
index 61267e7..e558851 100644
--- a/manifests/nodes/blockerbugs02.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/blockerbugs02.phx2.fedoraproject.org.pp
@@ -12,7 +12,9 @@ node "blockerbugs02.phx2.fedoraproject.org" {
 #  include blockerbugs::nobalance
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80, 443, 8888 ]
+    tcpPorts => [ 80, 443, 8888 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
   }
   # This points to db01
   host { 'db-blockerbugs':
diff --git a/manifests/nodes/datagrepper01.phx2.fedoraproject.org.pp b/manifests/nodes/datagrepper01.phx2.fedoraproject.org.pp
index 8198138..a2616d0 100644
--- a/manifests/nodes/datagrepper01.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/datagrepper01.phx2.fedoraproject.org.pp
@@ -11,7 +11,9 @@ node "datagrepper01.phx2.fedoraproject.org" {
     include openvpn::client
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+    tcpPorts => [ 80, 443 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
     }
 
     host { 'db-for-datagrepper':
diff --git a/manifests/nodes/datagrepper01.stg.phx2.fedoraproject.org.pp b/manifests/nodes/datagrepper01.stg.phx2.fedoraproject.org.pp
index c81a938..78e8f8d 100644
--- a/manifests/nodes/datagrepper01.stg.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/datagrepper01.stg.phx2.fedoraproject.org.pp
@@ -12,7 +12,9 @@ node "datagrepper01.stg.phx2.fedoraproject.org" {
     include datagrepper::app
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
     }
 
     host { 'db-for-datagrepper':
diff --git a/manifests/nodes/datagrepper02.phx2.fedoraproject.org.pp b/manifests/nodes/datagrepper02.phx2.fedoraproject.org.pp
index 4a7c423..84b45ec 100644
--- a/manifests/nodes/datagrepper02.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/datagrepper02.phx2.fedoraproject.org.pp
@@ -11,7 +11,9 @@ node "datagrepper02.phx2.fedoraproject.org" {
     include openvpn::client
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
     }
 
     host { 'db-for-datagrepper':
diff --git a/manifests/nodes/fedocal01.phx2.fedoraproject.org.pp b/manifests/nodes/fedocal01.phx2.fedoraproject.org.pp
index 14168c2..9567cec 100644
--- a/manifests/nodes/fedocal01.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/fedocal01.phx2.fedoraproject.org.pp
@@ -9,7 +9,9 @@ node "fedocal01.phx2.fedoraproject.org" {
     include fedocal::nobalance
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
     }
 
     # This points to db01
diff --git a/manifests/nodes/fedocal01.stg.phx2.fedoraproject.org.pp b/manifests/nodes/fedocal01.stg.phx2.fedoraproject.org.pp
index fd13777..3c6adf8 100644
--- a/manifests/nodes/fedocal01.stg.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/fedocal01.stg.phx2.fedoraproject.org.pp
@@ -10,7 +10,9 @@ node "fedocal01.stg.phx2.fedoraproject.org" {
     include fedocal::nobalance
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
     }
 
     # This points to db02.stg
diff --git a/manifests/nodes/fedocal02.phx2.fedoraproject.org.pp b/manifests/nodes/fedocal02.phx2.fedoraproject.org.pp
index 090207c..d224fd1 100644
--- a/manifests/nodes/fedocal02.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/fedocal02.phx2.fedoraproject.org.pp
@@ -10,7 +10,9 @@ node "fedocal02.phx2.fedoraproject.org" {
     #include fedocal::nobalance
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
     }
 
     # This points to db01
diff --git a/manifests/nodes/openid01.phx2.fedoraproject.org.pp b/manifests/nodes/openid01.phx2.fedoraproject.org.pp
index 8db2feb..94daf55 100644
--- a/manifests/nodes/openid01.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/openid01.phx2.fedoraproject.org.pp
@@ -9,7 +9,9 @@ node "openid01.phx2.fedoraproject.org" {
     include openvpn::client
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT", 
+    ]
     }
 
     # This points to db-fas01
diff --git a/manifests/nodes/openid01.stg.phx2.fedoraproject.org.pp b/manifests/nodes/openid01.stg.phx2.fedoraproject.org.pp
index e3527ce..40386d5 100644
--- a/manifests/nodes/openid01.stg.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/openid01.stg.phx2.fedoraproject.org.pp
@@ -9,7 +9,9 @@ node "openid01.stg.phx2.fedoraproject.org" {
     include fas-openid
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
     }
 
     # This points to db-fas01.stg
diff --git a/manifests/nodes/openid02.phx2.fedoraproject.org.pp b/manifests/nodes/openid02.phx2.fedoraproject.org.pp
index 3e95783..81142df 100644
--- a/manifests/nodes/openid02.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/openid02.phx2.fedoraproject.org.pp
@@ -9,7 +9,9 @@ node "openid02.phx2.fedoraproject.org" {
     include openvpn::client
 
     iptables::firewall { 'ipv4':
-        tcpPorts => [ 80, 443 ]
+        tcpPorts => [ 80, 443 ],
+        custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
     }
 
     # This points to db-fas01
diff --git a/manifests/nodes/packages01.dev.fedoraproject.org.pp b/manifests/nodes/packages01.dev.fedoraproject.org.pp
index af87535..bb14b41 100644
--- a/manifests/nodes/packages01.dev.fedoraproject.org.pp
+++ b/manifests/nodes/packages01.dev.fedoraproject.org.pp
@@ -6,6 +6,8 @@ node "packages01.dev" {
   include httpd::mod_wsgi
 
   iptables::firewall { 'ipv4':
-      tcpPorts => [ 80, 443, 6996 ]
+      tcpPorts => [ 80, 443, 6996 ],
+      custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 }
diff --git a/manifests/nodes/packages01.phx2.fedoraproject.org.pp b/manifests/nodes/packages01.phx2.fedoraproject.org.pp
index 39d9036..691c5ed 100644
--- a/manifests/nodes/packages01.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/packages01.phx2.fedoraproject.org.pp
@@ -26,7 +26,9 @@ node "packages01" {
   }
 
   iptables::firewall { 'ipv4':
-      tcpPorts => [ 80, 443, 6996 ]
+      tcpPorts => [ 80, 443, 6996 ],
+      custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 
   glusterfs::server::config { packages:
diff --git a/manifests/nodes/packages01.stg.phx2.fedoraproject.org.pp b/manifests/nodes/packages01.stg.phx2.fedoraproject.org.pp
index b0c2b9d..f96a4bd 100644
--- a/manifests/nodes/packages01.stg.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/packages01.stg.phx2.fedoraproject.org.pp
@@ -25,6 +25,8 @@ node "packages01.stg" {
     netmask => '255.255.255.0',
   }
   iptables::firewall { 'ipv4':
-      tcpPorts => [ 80, 443, 6996 ]
+      tcpPorts => [ 80, 443, 6996 ],
+      custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 }
diff --git a/manifests/nodes/packages02.phx2.fedoraproject.org.pp b/manifests/nodes/packages02.phx2.fedoraproject.org.pp
index f6a5441..a66358b 100644
--- a/manifests/nodes/packages02.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/packages02.phx2.fedoraproject.org.pp
@@ -24,7 +24,9 @@ node "packages02" {
   }
 
   iptables::firewall { 'ipv4':
-      tcpPorts => [ 80, 443, 6996 ]
+      tcpPorts => [ 80, 443, 6996 ],
+      custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 
   glusterfs::server::config { packages:
diff --git a/manifests/nodes/paste01.phx2.fedoraproject.org.pp b/manifests/nodes/paste01.phx2.fedoraproject.org.pp
index 7708415..30d83e6 100644
--- a/manifests/nodes/paste01.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/paste01.phx2.fedoraproject.org.pp
@@ -9,7 +9,9 @@ node "paste01.phx2.fedoraproject.org" {
   collectd::collectd { 'log02': }
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80, 443, 8888 ]
+    tcpPorts => [ 80, 443, 8888 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 
   selboolean { [
diff --git a/manifests/nodes/paste01.stg.fedoraproject.org.pp b/manifests/nodes/paste01.stg.fedoraproject.org.pp
index fa05ef1..ad861b5 100644
--- a/manifests/nodes/paste01.stg.fedoraproject.org.pp
+++ b/manifests/nodes/paste01.stg.fedoraproject.org.pp
@@ -9,7 +9,9 @@ node "paste01.stg.phx2.fedoraproject.org" {
   include sticky-notes
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80, 443, 8888 ]
+    tcpPorts => [ 80, 443, 8888 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 
   selboolean { [
diff --git a/manifests/nodes/paste02.phx2.fedoraproject.org.pp b/manifests/nodes/paste02.phx2.fedoraproject.org.pp
index 091e894..14d694c 100644
--- a/manifests/nodes/paste02.phx2.fedoraproject.org.pp
+++ b/manifests/nodes/paste02.phx2.fedoraproject.org.pp
@@ -9,7 +9,9 @@ node "paste02.phx2.fedoraproject.org" {
   collectd::collectd { 'log02': }
 
   iptables::firewall { 'ipv4':
-    tcpPorts => [ 80, 443, 8888 ]
+    tcpPorts => [ 80, 443, 8888 ],
+    custom => [ "-A INPUT -p tcp -m tcp -s 10.5.126.29 --dport 873 -j ACCEPT",
+    ]
   }
 
   selboolean { [
diff --git a/modules/askbot/manifests/init.pp b/modules/askbot/manifests/init.pp
index 50bb7d2..98afdb0 100644
--- a/modules/askbot/manifests/init.pp
+++ b/modules/askbot/manifests/init.pp
@@ -1,5 +1,6 @@
 class askbot {
     include httpd::mod_wsgi
+    include rsync::server
 
     package { "askbot":
         ensure => installed,
diff --git a/modules/blockerbugs/manifests/init.pp b/modules/blockerbugs/manifests/init.pp
index c841ab4..2636819 100644
--- a/modules/blockerbugs/manifests/init.pp
+++ b/modules/blockerbugs/manifests/init.pp
@@ -19,6 +19,7 @@ class blockerbugs::app {
 
   include httpd::mod_wsgi
   include mod_ssl
+  include rsync::server
 
   selboolean { [
       "httpd_can_network_connect_db",
diff --git a/modules/datagrepper/manifests/init.pp b/modules/datagrepper/manifests/init.pp
index afc9b78..bbd10bc 100644
--- a/modules/datagrepper/manifests/init.pp
+++ b/modules/datagrepper/manifests/init.pp
@@ -19,6 +19,7 @@ class datagrepper::app {
     include httpd::mod_wsgi
     include httpd::mod_ssl
     include fedmsg::config
+    include rsync::server
 
     package { "datagrepper":
         ensure => present,
diff --git a/modules/fas-openid/manifests/init.pp b/modules/fas-openid/manifests/init.pp
index 7c48d0d..3409781 100644
--- a/modules/fas-openid/manifests/init.pp
+++ b/modules/fas-openid/manifests/init.pp
@@ -3,6 +3,7 @@ class fas-openid {
     include httpd::mod_ssl
     include httpd::mod_wsgi
     include hotfix::python-openid
+    include rsync::server
 
     selboolean { [
         "httpd_can_network_connect_db",
diff --git a/modules/fedocal/manifests/init.pp b/modules/fedocal/manifests/init.pp
index 6854c24..31809e5 100644
--- a/modules/fedocal/manifests/init.pp
+++ b/modules/fedocal/manifests/init.pp
@@ -2,6 +2,7 @@ class fedocal {
     include selinux-enforcing
     include httpd::mod_ssl
     include httpd::mod_wsgi
+    include rsync::server
 
     selboolean { [
         "httpd_can_network_connect_db",
diff --git a/modules/packages/manifests/init.pp b/modules/packages/manifests/init.pp
index ede4331..7b211a7 100644
--- a/modules/packages/manifests/init.pp
+++ b/modules/packages/manifests/init.pp
@@ -35,6 +35,7 @@ class fedoracommunity::tagger {
     include httpd::mod_wsgi
     include httpd::mod_ssl
     include fedmsg::config
+    include rsync::server
     fedmsg::certificate { "fedoratagger":
         service => "fedoratagger",
         group => "fedoratagger",
diff --git a/modules/sticky-notes/manifests/init.pp b/modules/sticky-notes/manifests/init.pp
index ed78bf2..6fd8f71 100644
--- a/modules/sticky-notes/manifests/init.pp
+++ b/modules/sticky-notes/manifests/init.pp
@@ -1,6 +1,7 @@
 class sticky-notes {
   include httpd::base
   include httpd::php
+  include rsync::server
 
   package { "sticky-notes":
        ensure => installed,
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: not available
URL: <http://lists.fedoraproject.org/pipermail/infrastructure/attachments/20130514/0841a38c/attachment.sig>


More information about the infrastructure mailing list