soc-ops/global/overlay/etc/puppet/modules/soc/manifests/rsyslog/server.pp

106 lines
2.9 KiB
ObjectPascal
Raw Normal View History

# rsyslog
class soc::rsyslog::server(
$daily_rotation = true,
$syslog_servers = lookup(syslog_servers, undef, undef, []),
$relp_syslog_servers = lookup(relp_syslog_servers, undef, undef, []),
$syslog_enable_remote = lookup('syslog_enable_remote', undef, undef, 'true'),
$udp_port = lookup(udp_port, undef, undef, undef),
$udp_client = lookup('udp_client', undef, undef, 'any'),
$tcp_port = lookup(tcp_port, undef, undef, undef),
$tcp_client = lookup('tcp_client', undef, undef, 'any'),
$relp_port = lookup(relp_port, undef, undef, '2514'),
2025-02-20 14:19:17 +01:00
$relp_client = lookup('relp_client', undef, undef, 'any'),
$traditional_file_format = false,
$hostgroups = $facts['configured_hosts_in_cosmos'],
) {
2025-02-21 12:48:34 +01:00
# Install rsyslog packages
[ 'rsyslog', 'rsyslog-relp', 'rsyslog-openssl' ].each |String $package| {
package { $package:
ensure => latest,
}
}
$do_remote = str2bool($syslog_enable_remote)
2025-02-21 12:48:34 +01:00
file {
'/var/log/remote':
ensure => directory,
;
'/etc/rsyslog.conf':
ensure => file,
mode => '0644',
content => template('soc/rsyslog/rsyslog.conf.erb'),
require => Package['rsyslog'],
notify => Service['rsyslog'],
;
'/etc/rsyslog.d/50-default.conf':
ensure => file,
mode => '0644',
content => template('soc/rsyslog/rsyslog-default.conf.erb'),
require => Package['rsyslog'],
notify => Service['rsyslog'],
;
'/etc/rsyslog.d/60-remote.conf':
ensure => file,
mode => '0644',
content => template('soc/rsyslog/rsyslog-remote.conf.erb'),
require => Package['rsyslog'],
;
}
2025-02-21 12:48:34 +01:00
service { 'rsyslog':
ensure => 'running',
2025-02-21 12:50:19 +01:00
enable => true,
subscribe => File['/etc/rsyslog.d/60-remote.conf'],
}
if ($tcp_port or $udp_port) {
if ($udp_port) {
2025-02-20 13:51:04 +01:00
sunet::nftables::allow { "allow-syslog-udp-${udp_port}":
from => $udp_client,
2025-02-20 13:52:13 +01:00
to => 'any',
proto => 'udp',
port => $udp_port
}
}
if ($tcp_port) {
2025-02-20 13:51:04 +01:00
sunet::nftables::allow { "allow-syslog-tcp-${tcp_port}":
from => $tcp_client,
2025-02-20 13:52:13 +01:00
to => 'any',
proto => 'tcp',
port => $tcp_port
}
}
}
2025-02-20 14:19:17 +01:00
file { '/etc/rsyslog.d/50-local.conf':
ensure => file,
mode => '0644',
2025-02-20 14:58:38 +01:00
content => template('soc/rsyslog/rsyslog-local.conf.erb'),
require => Package['rsyslog'],
notify => Service['rsyslog']
}
}
if ($daily_rotation == true)
{
file { '/etc/logrotate.d/rsyslog':
ensure => file,
mode => '0644',
2025-02-20 14:58:38 +01:00
content => template('soc/rsyslog/rsyslog.logrotate.erb'),
}
}
if 'all' in $hostgroups {
$hostgroups['all'].each |String $hostname| {
$ip_list = dnsLookup($hostname)
$ip_list.each |String $ip| {
sunet::nftables::allow { "allow-rsyslog-relp-${relp_port}":
from => $ip,
port => $relp_port,
}
}
}
}
}