Puppet Class: puppet_operational_dashboards::telegraf::agent

Defined in:
manifests/telegraf/agent.pp

Summary

Installs and configures Telegraf to query hosts in a Puppet infrastructure. Included by the base class

Overview

Examples:

Basic usage

include puppet_operational_dashboards

class {'puppet_operational_dashboards::telegraf::agent':
  token => '<sensitive_telegraf_token>',
}

Parameters:

  • token (Optional[Sensitive[String]]) (defaults to: $puppet_operational_dashboards::telegraf_token)

    Telegraf token in Sensitive format.

  • influxdb_host (String) (defaults to: $puppet_operational_dashboards::influxdb_host)

    FQDN of the InfluxDB host. Defaults to $facts

  • influxdb_port (Integer) (defaults to: $puppet_operational_dashboards::influxdb_port)

    Port used by the InfluxDB service. Defaults to 8086.

  • influxdb_org (String) (defaults to: $puppet_operational_dashboards::initial_org)

    Name of the InfluxDB organization. Defaults to ‘puppetlabs’.

  • influxdb_bucket (String) (defaults to: $puppet_operational_dashboards::initial_bucket)

    Name of the InfluxDB bucket to query. Defaults to ‘puppet_data’.

  • use_ssl (Boolean) (defaults to: $puppet_operational_dashboards::use_ssl)

    Whether to use SSL when querying InfluxDB. Defaults to true

  • manage_ssl (Boolean) (defaults to: true)

    Whether to manage Telegraf ssl configuration. Defaults to true.

  • manage_repo (Boolean)

    Whether to install Telegraf from a repository. Defaults to true on the RedHat family of platforms.

  • manage_archive (Boolean) (defaults to: !$manage_repo)

    Whether to install Telegraf from an archive source. Defaults to true on platforms other than RedHat.

  • manage_user (Boolean) (defaults to: true)

    Whether to manage the telegraf user when installing from archive. Defaults to true.

  • ssl_cert_file (Stdlib::Absolutepath) (defaults to: "/etc/puppetlabs/puppet/ssl/certs/${trusted['certname']}.pem")

    SSL certificate to be used by the telegraf service. Defaults to the agent certificate issued by the Puppet CA for the local machine.

  • ssl_key_file (Stdlib::Absolutepath) (defaults to: "/etc/puppetlabs/puppet/ssl/private_keys/${trusted['certname']}.pem")

    Private key used in the CSR for the certificate specified by $ssl_cert_file. Defaults to the private key of the local machine for generating a CSR for the Puppet CA

  • ssl_ca_file (Stdlib::Absolutepath) (defaults to: '/etc/puppetlabs/puppet/ssl/certs/ca.pem')

    CA certificate issued by the CA which signed the certificate specified by $ssl_cert_file. Defaults to the Puppet CA.

  • puppet_ssl_cert_file (Stdlib::Absolutepath) (defaults to: "/etc/puppetlabs/puppet/ssl/certs/${trusted['certname']}.pem")

    SSL certificate to be used by the telegraf inputs. Defaults to the agent certificate issued by the Puppet CA for the local machine.

  • puppet_ssl_key_file (Stdlib::Absolutepath) (defaults to: "/etc/puppetlabs/puppet/ssl/private_keys/${trusted['certname']}.pem")

    Private key used in the CSR for the certificate specified by $puppet_ssl_cert_file. Defaults to the private key of the local machine for generating a CSR for the Puppet CA

  • puppet_ssl_ca_file (Stdlib::Absolutepath) (defaults to: '/etc/puppetlabs/puppet/ssl/certs/ca.pem')

    CA certificate issued by the CA which signed the certificate specified by $puppet_ssl_cert_file. Defaults to the Puppet CA.

  • insecure_skip_verify (Boolean) (defaults to: true)

    Skip verification of SSL certificate. Defaults to true.

  • version (String)

    Version of the Telegraf package to install. Defaults to ‘1.25.3’.

  • archive_location (String) (defaults to: "https://dl.influxdata.com/telegraf/releases/telegraf-${version.split('-')[0]}_linux_amd64.tar.gz")

    URL containing an archive source for the telegraf package. Defaults to downloading $version from dl.influxdata.com Version of the Telegraf package to install. Defaults to ‘1.25.3’.

  • archive_install_dir (String) (defaults to: '/opt/telegraf')

    Directory to install $archive_location to. Defaults to /opt/telegraf.

  • collection_method (Enum['all', 'local', 'none']) (defaults to: 'all')

    Determines how metrics will be collected. ‘all’ will query all Puppet services across all Puppet infrastructure hosts from the node with this class applied. ‘local’ will query all Puppet services on the node with this class applied. ‘none’ will not query any services from the node with this class applied.

  • collection_interval (String) (defaults to: '10m')

    How frequently to collect metrics. Defaults to ‘10m’.

  • puppetserver_hosts (Array) (defaults to: puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Master'))

    Array of Puppet server hosts to collect metrics from. Defaults to all Puppet server hosts in a PE infrastructure. FOSS users need to supply a list of FQDNs

  • puppetdb_hosts (Array) (defaults to: puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Puppetdb'))

    Array of PuppetDB hosts to collect metrics from. Defaults to all PuppetDB hosts in a PE infrastructure. FOSS users need to supply a list of FQDNs

  • postgres_hosts (Array) (defaults to: puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Database'))

    Array of Postgres hosts to collect metrics from. Defaults to all Postgres in a PE infrastructure. FOSS users need to supply a list of FQDNs.

  • orchestrator_hosts (Array) (defaults to: puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Orchestrator'))

    Array of Orchestrator hosts to collect metrics from. Defaults to all Orchestrator hosts in a PE infrastructure. FOSS users need to supply a list of FQDNs.

  • profiles (Array[String]) (defaults to: puppet_operational_dashboards::pe_profiles_on_host())

    Array of PE profiles on the node with this class applied. Used when collection_method is set to ‘local’. FOSS users can use the $local_services parameter.

  • local_services (Array[String]) (defaults to: [])

    Array of FOSS services to collect from when collection_method is set to ‘local’.

  • token_name (String) (defaults to: $puppet_operational_dashboards::telegraf_token_name)

    Name of the token to retrieve from InfluxDB if not given $token

  • influxdb_token_file (String) (defaults to: $puppet_operational_dashboards::influxdb_token_file)

    Location on disk of an InfluxDB admin token. This token is used in this class in a Deferred function call to retrieve a Telegraf token if $token is unset

  • http_timeout_seconds (Integer[1]) (defaults to: 5)

    Timeout for HTTP Telegraf inputs. Might be usefull in huge environments with slower API responses



82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
# File 'manifests/telegraf/agent.pp', line 82

class puppet_operational_dashboards::telegraf::agent (
  String $version,
  Boolean $manage_repo,
  Optional[Sensitive[String]] $token = $puppet_operational_dashboards::telegraf_token,
  String $token_name = $puppet_operational_dashboards::telegraf_token_name,
  String $influxdb_token_file = $puppet_operational_dashboards::influxdb_token_file,
  String $influxdb_host = $puppet_operational_dashboards::influxdb_host,
  Integer $influxdb_port = $puppet_operational_dashboards::influxdb_port,
  String $influxdb_bucket = $puppet_operational_dashboards::initial_bucket,
  String $influxdb_org = $puppet_operational_dashboards::initial_org,
  Boolean $use_ssl = $puppet_operational_dashboards::use_ssl,
  Boolean $manage_ssl = true,
  Boolean $insecure_skip_verify = true,
  Boolean $manage_archive = !$manage_repo,
  Boolean $manage_user = true,
  Stdlib::Absolutepath  $ssl_cert_file = "/etc/puppetlabs/puppet/ssl/certs/${trusted['certname']}.pem",
  Stdlib::Absolutepath  $ssl_key_file ="/etc/puppetlabs/puppet/ssl/private_keys/${trusted['certname']}.pem",
  Stdlib::Absolutepath  $ssl_ca_file ='/etc/puppetlabs/puppet/ssl/certs/ca.pem',
  Stdlib::Absolutepath  $puppet_ssl_cert_file = "/etc/puppetlabs/puppet/ssl/certs/${trusted['certname']}.pem",
  Stdlib::Absolutepath  $puppet_ssl_key_file = "/etc/puppetlabs/puppet/ssl/private_keys/${trusted['certname']}.pem",
  Stdlib::Absolutepath  $puppet_ssl_ca_file = '/etc/puppetlabs/puppet/ssl/certs/ca.pem',
  # Use the $version parameter to determine the archive link, stripping the '-1' suffix.
  String $archive_location = "https://dl.influxdata.com/telegraf/releases/telegraf-${version.split('-')[0]}_linux_amd64.tar.gz",
  String $archive_install_dir = '/opt/telegraf',
  Enum['all', 'local', 'none'] $collection_method = 'all',
  String $collection_interval = '10m',

  Array $puppetserver_hosts = puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Master'),
  Array $orchestrator_hosts = puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Orchestrator'),
  Array $puppetdb_hosts     = puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Puppetdb'),
  Array $postgres_hosts     = puppet_operational_dashboards::hosts_with_profile('Puppet_enterprise::Profile::Database'),

  Array[String] $profiles = puppet_operational_dashboards::pe_profiles_on_host(),
  Array[String] $local_services = [],
  Integer[1] $http_timeout_seconds = 5,
) {
  unless [$puppetserver_hosts, $puppetdb_hosts, $postgres_hosts, $profiles, $local_services].any |$service| { $service } {
    fail('No services detected on node.')
  }

  exec { 'puppet_telegraf_daemon_reload':
    command     => 'systemctl daemon-reload',
    path        => ['/bin', '/usr/bin'],
    refreshonly => true,
  }

  $protocol = $use_ssl ? {
    true  => 'https',
    false => 'http',
  }
  $influxdb_uri = "${protocol}://${influxdb_host}:${influxdb_port}"

  $influxdb_v2 = $use_ssl ? {
    true  => {
      'influxdb_v2' => [
        {
          'tls_ca'               => '/etc/telegraf/ca.pem',
          'tls_cert'             => '/etc/telegraf/cert.pem',
          'insecure_skip_verify' => $insecure_skip_verify,
          'bucket'               => $influxdb_bucket,
          'organization'         => $influxdb_org,
          'token'                => '$INFLUX_TOKEN',
          'urls'                 => [$influxdb_uri],
        }
      ],
    },
    false => {
      'influxdb_v2' => [
        {
          'bucket'               => $influxdb_bucket,
          'organization'         => $influxdb_org,
          'token'                => '$INFLUX_TOKEN',
          'urls'                 => [$influxdb_uri],
        }
      ],
    },
  }

  Telegraf::Input {
    notify => Service['telegraf'],
  }
  Telegraf::Output {
    notify => Service['telegraf'],
  }

  class { 'telegraf':
    ensure              => $version,
    manage_repo         => $manage_repo,
    manage_archive      => $manage_archive,
    manage_user         => $manage_user,
    archive_location    => $archive_location,
    archive_install_dir => $archive_install_dir,
    interval            => $collection_interval,
    hostname            => '',
    manage_service      => false,
    outputs             => $influxdb_v2,
    notify              => Service['telegraf'],
  }

  if $use_ssl and $manage_ssl {
    file { '/etc/telegraf/cert.pem':
      ensure  => file,
      source  => "file:///${ssl_cert_file}",
      mode    => '0400',
      owner   => 'telegraf',
      require => Class['telegraf::install'],
      notify  => Service['telegraf'],
    }
    file { '/etc/telegraf/puppet_cert.pem':
      ensure  => file,
      source  => "file:///${puppet_ssl_cert_file}",
      mode    => '0400',
      owner   => 'telegraf',
      require => Class['telegraf::install'],
      notify  => Service['telegraf'],
    }
    file { '/etc/telegraf/key.pem':
      ensure  => file,
      source  => "file:///${ssl_key_file}",
      mode    => '0400',
      owner   => 'telegraf',
      require => Class['telegraf::install'],
      notify  => Service['telegraf'],
    }
    file { '/etc/telegraf/puppet_key.pem':
      ensure  => file,
      source  => "file:///${puppet_ssl_key_file}",
      mode    => '0400',
      owner   => 'telegraf',
      require => Class['telegraf::install'],
      notify  => Service['telegraf'],
    }
    file { '/etc/telegraf/ca.pem':
      ensure  => file,
      source  => "file:///${ssl_ca_file}",
      mode    => '0400',
      owner   => 'telegraf',
      require => Class['telegraf::install'],
      notify  => Service['telegraf'],
    }
    file { '/etc/telegraf/puppet_ca.pem':
      ensure  => file,
      source  => "file:///${puppet_ssl_ca_file}",
      mode    => '0400',
      owner   => 'telegraf',
      require => Class['telegraf::install'],
      notify  => Service['telegraf'],
    }
  }

  file { '/etc/systemd/system/telegraf.service.d':
    ensure  => directory,
    owner   => 'telegraf',
    group   => 'telegraf',
    mode    => '0700',
    require => Class['telegraf::install'],
  }

  if $token {
    file { '/etc/systemd/system/telegraf.service.d/override.conf':
      ensure  => file,
      content => inline_epp(file('influxdb/telegraf_environment_file.epp'), { token => $token }),
      notify  => [
        Exec['puppet_telegraf_daemon_reload'],
        Service['telegraf']
      ],
    }
  }
  else {
    $token_vars = {
      token => Sensitive(Deferred('influxdb::retrieve_token', [$influxdb_uri, $token_name, $influxdb_token_file])),
    }
    file { '/etc/systemd/system/telegraf.service.d/override.conf':
      ensure  => file,
      content => Deferred('inline_epp', [file('influxdb/telegraf_environment_file.epp'), $token_vars]),
      notify  => [
        Exec['puppet_telegraf_daemon_reload'],
        Service['telegraf'],
      ],
    }
  }

  service { 'telegraf':
    ensure  => running,
    require => [
      Class['telegraf::install'],
      Exec['puppet_telegraf_daemon_reload'],
    ],
  }

  if $collection_method == 'all' {
    unless $puppetdb_hosts.empty() {
      puppet_operational_dashboards::telegraf::config { ['puppetdb', 'puppetdb_jvm']:
        hosts                => $puppetdb_hosts.sort,
        protocol             => $protocol,
        http_timeout_seconds => $http_timeout_seconds,
        require              => File['/etc/systemd/system/telegraf.service.d/override.conf'],
      }
    }

    unless $puppetserver_hosts.empty() {
      puppet_operational_dashboards::telegraf::config { 'puppetserver':
        hosts                => $puppetserver_hosts.sort,
        protocol             => $protocol,
        http_timeout_seconds => $http_timeout_seconds,
        require              => File['/etc/systemd/system/telegraf.service.d/override.conf'],
      }
    }

    unless $orchestrator_hosts.empty() {
      puppet_operational_dashboards::telegraf::config { 'orchestrator':
        hosts                => $orchestrator_hosts.sort,
        protocol             => $protocol,
        http_timeout_seconds => $http_timeout_seconds,
        require              => File['/etc/systemd/system/telegraf.service.d/override.conf'],
      }
    }

    unless $postgres_hosts.empty() {
      $postgres_hosts.sort.each |$pg_host| {
        $inputs = epp(
          'puppet_operational_dashboards/postgres.epp',
          { certname => $pg_host }
        ).influxdb::from_toml()

        telegraf::input { "postgres_${pg_host}":
          plugin_type => 'postgresql_extensible',
          options     => [$inputs],
        }
      }
    }

    # The port to use for this mbean is 8143 for Orchestrator and 8140 for Puppet server
    if puppet_operational_dashboards::include_pe_metrics {
      $pcp_hosts = $puppetserver_hosts.map |$host| {
        if $host in $orchestrator_hosts {
          "${host}:8143"
        }
        else {
          "${host}:8140"
        }
      }

      unless $pcp_hosts.empty() {
        puppet_operational_dashboards::telegraf::config { 'pcp':
          hosts                => $pcp_hosts.sort,
          protocol             => $protocol,
          http_timeout_seconds => $http_timeout_seconds,
          require              => File['/etc/systemd/system/telegraf.service.d/override.conf'],
        }
      }
    }
  }

  elsif $collection_method == 'local' {
    if 'Puppet_enterprise::Profile::Puppetdb' in $profiles or 'puppetdb' in $local_services {
      puppet_operational_dashboards::telegraf::config { ['puppetdb', 'puppetdb_jvm']:
        hosts                => [$trusted['certname']],
        protocol             => $protocol,
        http_timeout_seconds => $http_timeout_seconds,
        require              => File['/etc/systemd/system/telegraf.service.d/override.conf'],
      }
    }

    if 'Puppet_enterprise::Profile::Master' in $profiles or 'puppetserver' in $local_services {
      puppet_operational_dashboards::telegraf::config { 'puppetserver':
        hosts                => [$trusted['certname']],
        protocol             => $protocol,
        http_timeout_seconds => $http_timeout_seconds,
        require              => File['/etc/systemd/system/telegraf.service.d/override.conf'],
      }
    }

    if 'Puppet_enterprise::Profile::Orchestrator' in $profiles or 'orchestrator' in $local_services {
      puppet_operational_dashboards::telegraf::config { 'orchestrator':
        hosts                => $orchestrator_hosts.sort,
        protocol             => $protocol,
        http_timeout_seconds => $http_timeout_seconds,
        require              => File['/etc/systemd/system/telegraf.service.d/override.conf'],
      }
    }

    if 'Puppet_enterprise::Profile::Database' in $profiles or 'postgres' in $local_services {
      $inputs = epp(
        'puppet_operational_dashboards/postgres.epp',
        { certname => $trusted['certname'] }
      ).influxdb::from_toml()

      telegraf::input { "postgres_${trusted['certname']}":
        plugin_type => 'postgresql_extensible',
        options     => [$inputs],
      }
    }
  }
}