X-Git-Url: https://git.openstreetmap.org/chef.git/blobdiff_plain/39e9c0f23c2c459285df473de8011221f429dbad..2e17bd4b4697423f9c124cfdb802424a58c16d80:/cookbooks/prometheus/resources/exporter.rb diff --git a/cookbooks/prometheus/resources/exporter.rb b/cookbooks/prometheus/resources/exporter.rb index 2d6a7cbc8..66dcd2b29 100644 --- a/cookbooks/prometheus/resources/exporter.rb +++ b/cookbooks/prometheus/resources/exporter.rb @@ -27,13 +27,19 @@ property :port, :kind_of => Integer, :required => [:create] property :listen_switch, :kind_of => String, :default => "web.listen-address" property :listen_type, :kind_of => String, :default => "address" property :user, :kind_of => String +property :group, :kind_of => String property :command, :kind_of => String property :options, :kind_of => [String, Array] property :environment, :kind_of => Hash, :default => {} +property :protect_proc, String property :proc_subset, String +property :capability_bounding_set, [String, Array] +property :ambient_capabilities, [String, Array] property :private_devices, [true, false] +property :private_users, [true, false] property :protect_clock, [true, false] property :restrict_address_families, [String, Array] +property :remove_ipc, [true, false] property :system_call_filter, [String, Array] property :service, :kind_of => String property :scrape_interval, :kind_of => String @@ -49,13 +55,19 @@ action :create do type "simple" user new_resource.user dynamic_user new_resource.user.nil? + group new_resource.group environment new_resource.environment exec_start "#{executable_path} #{new_resource.command} #{executable_options}" sandbox :enable_network => true + protect_proc new_resource.protect_proc if new_resource.property_is_set?(:protect_proc) proc_subset new_resource.proc_subset if new_resource.property_is_set?(:proc_subset) + capability_bounding_set new_resource.capability_bounding_set if new_resource.property_is_set?(:capability_bounding_set) + ambient_capabilities new_resource.ambient_capabilities if new_resource.property_is_set?(:ambient_capabilities) private_devices new_resource.private_devices if new_resource.property_is_set?(:private_devices) + private_users new_resource.private_users if new_resource.property_is_set?(:private_users) protect_clock new_resource.protect_clock if new_resource.property_is_set?(:protect_clock) restrict_address_families new_resource.restrict_address_families if new_resource.property_is_set?(:restrict_address_families) + remove_ipc new_resource.remove_ipc if new_resource.property_is_set?(:remove_ipc) system_call_filter new_resource.system_call_filter if new_resource.property_is_set?(:system_call_filter) end @@ -66,9 +78,9 @@ action :create do firewall_rule "accept-prometheus-#{new_resource.exporter}" do action :accept - source "osm" - dest "fw" - proto "tcp:syn" + context :incoming + protocol :tcp + source :osm dest_ports new_resource.port only_if { node[:prometheus][:mode] == "external" } end @@ -148,9 +160,7 @@ action_class do end def listen_address - if true - "127.0.0.1:#{new_resource.port}" - elsif new_resource.address + if new_resource.address "#{new_resource.address}:#{new_resource.port}" elsif node[:prometheus][:mode] == "wireguard" "[#{node[:prometheus][:address]}]:#{new_resource.port}"