summaryrefslogtreecommitdiff
path: root/puppet/modules/site_check_mk/manifests/server.pp
blob: 67519513f612d6fce00146fc4be3b9fdd541ef6e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
# setup check_mk on the monitoring server
class site_check_mk::server {

  $ssh_hash = hiera('ssh')
  $pubkey   = $ssh_hash['authorized_keys']['monitor']['key']
  $type     = $ssh_hash['authorized_keys']['monitor']['type']
  $seckey   = $ssh_hash['monitor']['private_key']

  $nagios_hiera     = hiera_hash('nagios')
  $hosts            = $nagios_hiera['hosts']

  $all_hosts        = inline_template ('<% @hosts.keys.sort.each do |key| -%><% if @hosts[key]["environment"] != "disabled" %>"<%= @hosts[key]["domain_internal"] %>", <% end -%><% end -%>')
  $domains_internal = $nagios_hiera['domains_internal']
  $environments     = $nagios_hiera['environments']

  package { 'check-mk-server':
    ensure => installed,
  }

  # override paths to use the system check_mk rather than OMD
  class { 'check_mk::config':
    site              => '',
    etc_dir           => '/etc',
    nagios_subdir     => 'nagios3',
    bin_dir           => '/usr/bin',
    host_groups       => undef,
    use_storedconfigs => false,
    require           => Package['check-mk-server']
  }

  Exec['check_mk-reload'] ->
    Exec['check_mk-refresh-inventory-daily'] ->
    Service['nagios']

  file {
    '/etc/check_mk/conf.d/use_ssh.mk':
      content => template('site_check_mk/use_ssh.mk'),
      notify  => Exec['check_mk-refresh'],
      require => Package['check-mk-server'];
    '/etc/check_mk/conf.d/hostgroups.mk':
      content => template('site_check_mk/hostgroups.mk'),
      notify  => Exec['check_mk-refresh'],
      require => Package['check-mk-server'];
    '/etc/check_mk/conf.d/host_contactgroups.mk':
      content => template('site_check_mk/host_contactgroups.mk'),
      notify  => Exec['check_mk-refresh'],
      require => Package['check-mk-server'];
    '/etc/check_mk/conf.d/ignored_services.mk':
      source  => 'puppet:///modules/site_check_mk/ignored_services.mk',
      notify  => Exec['check_mk-refresh'],
      require => Package['check-mk-server'];
    '/etc/check_mk/conf.d/extra_service_conf.mk':
      source  => 'puppet:///modules/site_check_mk/extra_service_conf.mk',
      notify  => Exec['check_mk-refresh'],
      require => Package['check-mk-server'];
    '/etc/check_mk/conf.d/extra_host_conf.mk':
      source  => 'puppet:///modules/site_check_mk/extra_host_conf.mk',
      notify  => Exec['check_mk-refresh'],
      require => Package['check-mk-server'];

    '/etc/check_mk/all_hosts_static':
      content => $all_hosts,
      notify  => Exec['check_mk-refresh'],
      require => Package['check-mk-server'];

    '/etc/check_mk/.ssh':
      ensure  => directory,
      require => Package['check-mk-server'];
    '/etc/check_mk/.ssh/id_rsa':
      content => $seckey,
      owner   => 'nagios',
      mode    => '0600',
      require => Package['check-mk-server'];
    '/etc/check_mk/.ssh/id_rsa.pub':
      content => "${type} ${pubkey} monitor",
      owner   => 'nagios',
      mode    => '0644',
      require => Package['check-mk-server'];

    # check_icmp must be suid root or called by sudo
    # see https://leap.se/code/issues/5171
    '/usr/lib/nagios/plugins/check_icmp':
      mode    => '4755',
      require => Package['nagios-plugins-basic'];
  }

  include check_mk::agent::local_checks
}