2020-03-09 10:11:07 +01:00
|
|
|
#!/usr/bin/python
|
2021-08-08 10:40:22 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
2020-03-09 10:11:07 +01:00
|
|
|
# This file is part of Ansible
|
|
|
|
#
|
|
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: oneandone_monitoring_policy
|
|
|
|
short_description: Configure 1&1 monitoring policy.
|
|
|
|
description:
|
|
|
|
- Create, remove, update monitoring policies
|
|
|
|
(and add/remove ports, processes, and servers).
|
|
|
|
This module has a dependency on 1and1 >= 1.0
|
|
|
|
options:
|
|
|
|
state:
|
|
|
|
description:
|
|
|
|
- Define a monitoring policy's state to create, remove, update.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
default: present
|
|
|
|
choices: [ "present", "absent", "update" ]
|
|
|
|
auth_token:
|
|
|
|
description:
|
|
|
|
- Authenticating API token provided by 1&1.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
api_url:
|
|
|
|
description:
|
|
|
|
- Custom API URL. Overrides the
|
|
|
|
ONEANDONE_API_URL environment variable.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
name:
|
|
|
|
description:
|
|
|
|
- Monitoring policy name used with present state. Used as identifier (id or name) when used with absent state. maxLength=128
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
monitoring_policy:
|
|
|
|
description:
|
|
|
|
- The identifier (id or name) of the monitoring policy used with update state.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
agent:
|
|
|
|
description:
|
|
|
|
- Set true for using agent.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
email:
|
|
|
|
description:
|
|
|
|
- User's email. maxLength=128
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
description:
|
|
|
|
- Monitoring policy description. maxLength=256
|
2020-11-23 21:47:18 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
thresholds:
|
|
|
|
description:
|
|
|
|
- Monitoring policy thresholds. Each of the suboptions have warning and critical,
|
|
|
|
which both have alert and value suboptions. Warning is used to set limits for
|
|
|
|
warning alerts, critical is used to set critical alerts. alert enables alert,
|
|
|
|
and value is used to advise when the value is exceeded.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: dict
|
2020-03-09 10:11:07 +01:00
|
|
|
suboptions:
|
|
|
|
cpu:
|
|
|
|
description:
|
|
|
|
- Consumption limits of CPU.
|
|
|
|
required: true
|
|
|
|
ram:
|
|
|
|
description:
|
|
|
|
- Consumption limits of RAM.
|
|
|
|
required: true
|
|
|
|
disk:
|
|
|
|
description:
|
|
|
|
- Consumption limits of hard disk.
|
|
|
|
required: true
|
|
|
|
internal_ping:
|
|
|
|
description:
|
|
|
|
- Response limits of internal ping.
|
|
|
|
required: true
|
|
|
|
transfer:
|
|
|
|
description:
|
|
|
|
- Consumption limits for transfer.
|
|
|
|
required: true
|
|
|
|
ports:
|
|
|
|
description:
|
|
|
|
- Array of ports that will be monitoring.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: dict
|
2020-03-09 10:11:07 +01:00
|
|
|
suboptions:
|
|
|
|
protocol:
|
|
|
|
description:
|
|
|
|
- Internet protocol.
|
|
|
|
choices: [ "TCP", "UDP" ]
|
|
|
|
required: true
|
|
|
|
port:
|
|
|
|
description:
|
|
|
|
- Port number. minimum=1, maximum=65535
|
|
|
|
required: true
|
|
|
|
alert_if:
|
|
|
|
description:
|
|
|
|
- Case of alert.
|
|
|
|
choices: [ "RESPONDING", "NOT_RESPONDING" ]
|
|
|
|
required: true
|
|
|
|
email_notification:
|
|
|
|
description:
|
|
|
|
- Set true for sending e-mail notifications.
|
|
|
|
required: true
|
|
|
|
processes:
|
|
|
|
description:
|
|
|
|
- Array of processes that will be monitoring.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: dict
|
2020-03-09 10:11:07 +01:00
|
|
|
suboptions:
|
|
|
|
process:
|
|
|
|
description:
|
|
|
|
- Name of the process. maxLength=50
|
|
|
|
required: true
|
|
|
|
alert_if:
|
|
|
|
description:
|
|
|
|
- Case of alert.
|
|
|
|
choices: [ "RUNNING", "NOT_RUNNING" ]
|
|
|
|
required: true
|
|
|
|
add_ports:
|
|
|
|
description:
|
|
|
|
- Ports to add to the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: dict
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
add_processes:
|
|
|
|
description:
|
|
|
|
- Processes to add to the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: dict
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
add_servers:
|
|
|
|
description:
|
|
|
|
- Servers to add to the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: str
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
remove_ports:
|
|
|
|
description:
|
|
|
|
- Ports to remove from the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: str
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
remove_processes:
|
|
|
|
description:
|
|
|
|
- Processes to remove from the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: str
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
remove_servers:
|
|
|
|
description:
|
|
|
|
- Servers to remove from the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: str
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
update_ports:
|
|
|
|
description:
|
|
|
|
- Ports to be updated on the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: dict
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
update_processes:
|
|
|
|
description:
|
|
|
|
- Processes to be updated on the monitoring policy.
|
2020-11-23 21:47:18 +01:00
|
|
|
type: list
|
2021-02-26 11:37:23 +01:00
|
|
|
elements: dict
|
2020-03-09 10:11:07 +01:00
|
|
|
required: false
|
|
|
|
wait:
|
|
|
|
description:
|
|
|
|
- wait for the instance to be in state 'running' before returning
|
|
|
|
required: false
|
|
|
|
default: "yes"
|
|
|
|
type: bool
|
|
|
|
wait_timeout:
|
|
|
|
description:
|
|
|
|
- how long before wait gives up, in seconds
|
2020-11-23 21:47:18 +01:00
|
|
|
type: int
|
2020-03-09 10:11:07 +01:00
|
|
|
default: 600
|
|
|
|
wait_interval:
|
|
|
|
description:
|
|
|
|
- Defines the number of seconds to wait when using the _wait_for methods
|
2020-11-23 21:47:18 +01:00
|
|
|
type: int
|
2020-03-09 10:11:07 +01:00
|
|
|
default: 5
|
|
|
|
|
|
|
|
requirements:
|
|
|
|
- "1and1"
|
|
|
|
- "python >= 2.6"
|
|
|
|
|
|
|
|
author:
|
|
|
|
- "Amel Ajdinovic (@aajdinov)"
|
|
|
|
- "Ethan Devenport (@edevenport)"
|
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Create a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
name: ansible monitoring policy
|
|
|
|
description: Testing creation of a monitoring policy with ansible
|
|
|
|
email: your@emailaddress.com
|
|
|
|
agent: true
|
|
|
|
thresholds:
|
|
|
|
-
|
|
|
|
cpu:
|
|
|
|
warning:
|
|
|
|
value: 80
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 92
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
ram:
|
|
|
|
warning:
|
|
|
|
value: 80
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 90
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
disk:
|
|
|
|
warning:
|
|
|
|
value: 80
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 90
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
internal_ping:
|
|
|
|
warning:
|
|
|
|
value: 50
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 100
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
transfer:
|
|
|
|
warning:
|
|
|
|
value: 1000
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 2000
|
|
|
|
alert: false
|
|
|
|
ports:
|
|
|
|
-
|
|
|
|
protocol: TCP
|
|
|
|
port: 22
|
|
|
|
alert_if: RESPONDING
|
|
|
|
email_notification: false
|
|
|
|
processes:
|
|
|
|
-
|
|
|
|
process: test
|
|
|
|
alert_if: NOT_RUNNING
|
|
|
|
email_notification: false
|
|
|
|
wait: true
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Destroy a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
state: absent
|
|
|
|
name: ansible monitoring policy
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Update a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy
|
|
|
|
name: ansible monitoring policy updated
|
|
|
|
description: Testing creation of a monitoring policy with ansible updated
|
|
|
|
email: another@emailaddress.com
|
|
|
|
thresholds:
|
|
|
|
-
|
|
|
|
cpu:
|
|
|
|
warning:
|
|
|
|
value: 70
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 90
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
ram:
|
|
|
|
warning:
|
|
|
|
value: 70
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 80
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
disk:
|
|
|
|
warning:
|
|
|
|
value: 70
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 80
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
internal_ping:
|
|
|
|
warning:
|
|
|
|
value: 60
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 90
|
|
|
|
alert: false
|
|
|
|
-
|
|
|
|
transfer:
|
|
|
|
warning:
|
|
|
|
value: 900
|
|
|
|
alert: false
|
|
|
|
critical:
|
|
|
|
value: 1900
|
|
|
|
alert: false
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Add a port to a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
add_ports:
|
|
|
|
-
|
|
|
|
protocol: TCP
|
|
|
|
port: 33
|
|
|
|
alert_if: RESPONDING
|
|
|
|
email_notification: false
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Update existing ports of a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
update_ports:
|
|
|
|
-
|
|
|
|
id: existing_port_id
|
|
|
|
protocol: TCP
|
|
|
|
port: 34
|
|
|
|
alert_if: RESPONDING
|
|
|
|
email_notification: false
|
|
|
|
-
|
|
|
|
id: existing_port_id
|
|
|
|
protocol: TCP
|
|
|
|
port: 23
|
|
|
|
alert_if: RESPONDING
|
|
|
|
email_notification: false
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Remove a port from a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
remove_ports:
|
|
|
|
- port_id
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Add a process to a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
add_processes:
|
|
|
|
-
|
|
|
|
process: test_2
|
|
|
|
alert_if: NOT_RUNNING
|
|
|
|
email_notification: false
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Update existing processes of a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
update_processes:
|
|
|
|
-
|
|
|
|
id: process_id
|
|
|
|
process: test_1
|
|
|
|
alert_if: NOT_RUNNING
|
|
|
|
email_notification: false
|
|
|
|
-
|
|
|
|
id: process_id
|
|
|
|
process: test_3
|
|
|
|
alert_if: NOT_RUNNING
|
|
|
|
email_notification: false
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Remove a process from a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
remove_processes:
|
|
|
|
- process_id
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Add server to a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
add_servers:
|
|
|
|
- server id or name
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
|
2020-05-15 12:13:45 +02:00
|
|
|
- name: Remove server from a monitoring policy
|
2021-02-26 11:37:23 +01:00
|
|
|
community.general.oneandone_monitoring_policy:
|
2020-03-09 10:11:07 +01:00
|
|
|
auth_token: oneandone_private_api_key
|
|
|
|
monitoring_policy: ansible monitoring policy updated
|
|
|
|
remove_servers:
|
|
|
|
- server01
|
|
|
|
wait: true
|
|
|
|
state: update
|
|
|
|
'''
|
|
|
|
|
|
|
|
RETURN = '''
|
|
|
|
monitoring_policy:
|
|
|
|
description: Information about the monitoring policy that was processed
|
|
|
|
type: dict
|
|
|
|
sample: '{"id": "92B74394A397ECC3359825C1656D67A6", "name": "Default Policy"}'
|
|
|
|
returned: always
|
|
|
|
'''
|
|
|
|
|
|
|
|
import os
|
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
|
|
|
from ansible_collections.community.general.plugins.module_utils.oneandone import (
|
|
|
|
get_monitoring_policy,
|
|
|
|
get_server,
|
|
|
|
OneAndOneResources,
|
|
|
|
wait_for_resource_creation_completion
|
|
|
|
)
|
|
|
|
|
|
|
|
HAS_ONEANDONE_SDK = True
|
|
|
|
|
|
|
|
try:
|
|
|
|
import oneandone.client
|
|
|
|
except ImportError:
|
|
|
|
HAS_ONEANDONE_SDK = False
|
|
|
|
|
|
|
|
|
|
|
|
def _check_mode(module, result):
|
|
|
|
if module.check_mode:
|
|
|
|
module.exit_json(
|
|
|
|
changed=result
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def _add_ports(module, oneandone_conn, monitoring_policy_id, ports):
|
|
|
|
"""
|
|
|
|
Adds new ports to a monitoring policy.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
monitoring_policy_ports = []
|
|
|
|
|
|
|
|
for _port in ports:
|
|
|
|
monitoring_policy_port = oneandone.client.Port(
|
|
|
|
protocol=_port['protocol'],
|
|
|
|
port=_port['port'],
|
|
|
|
alert_if=_port['alert_if'],
|
|
|
|
email_notification=_port['email_notification']
|
|
|
|
)
|
|
|
|
monitoring_policy_ports.append(monitoring_policy_port)
|
|
|
|
|
|
|
|
if module.check_mode:
|
|
|
|
if monitoring_policy_ports:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.add_port(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
ports=monitoring_policy_ports)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def _delete_monitoring_policy_port(module, oneandone_conn, monitoring_policy_id, port_id):
|
|
|
|
"""
|
|
|
|
Removes a port from a monitoring policy.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
if module.check_mode:
|
|
|
|
monitoring_policy = oneandone_conn.delete_monitoring_policy_port(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
port_id=port_id)
|
|
|
|
if monitoring_policy:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.delete_monitoring_policy_port(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
port_id=port_id)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def _modify_port(module, oneandone_conn, monitoring_policy_id, port_id, port):
|
|
|
|
"""
|
|
|
|
Modifies a monitoring policy port.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
if module.check_mode:
|
|
|
|
cm_port = oneandone_conn.get_monitoring_policy_port(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
port_id=port_id)
|
|
|
|
if cm_port:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy_port = oneandone.client.Port(
|
|
|
|
protocol=port['protocol'],
|
|
|
|
port=port['port'],
|
|
|
|
alert_if=port['alert_if'],
|
|
|
|
email_notification=port['email_notification']
|
|
|
|
)
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.modify_port(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
port_id=port_id,
|
|
|
|
port=monitoring_policy_port)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def _add_processes(module, oneandone_conn, monitoring_policy_id, processes):
|
|
|
|
"""
|
|
|
|
Adds new processes to a monitoring policy.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
monitoring_policy_processes = []
|
|
|
|
|
|
|
|
for _process in processes:
|
|
|
|
monitoring_policy_process = oneandone.client.Process(
|
|
|
|
process=_process['process'],
|
|
|
|
alert_if=_process['alert_if'],
|
|
|
|
email_notification=_process['email_notification']
|
|
|
|
)
|
|
|
|
monitoring_policy_processes.append(monitoring_policy_process)
|
|
|
|
|
|
|
|
if module.check_mode:
|
|
|
|
mp_id = get_monitoring_policy(oneandone_conn, monitoring_policy_id)
|
|
|
|
if (monitoring_policy_processes and mp_id):
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.add_process(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
processes=monitoring_policy_processes)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def _delete_monitoring_policy_process(module, oneandone_conn, monitoring_policy_id, process_id):
|
|
|
|
"""
|
|
|
|
Removes a process from a monitoring policy.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
if module.check_mode:
|
|
|
|
process = oneandone_conn.get_monitoring_policy_process(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
process_id=process_id
|
|
|
|
)
|
|
|
|
if process:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.delete_monitoring_policy_process(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
process_id=process_id)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def _modify_process(module, oneandone_conn, monitoring_policy_id, process_id, process):
|
|
|
|
"""
|
|
|
|
Modifies a monitoring policy process.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
if module.check_mode:
|
|
|
|
cm_process = oneandone_conn.get_monitoring_policy_process(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
process_id=process_id)
|
|
|
|
if cm_process:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy_process = oneandone.client.Process(
|
|
|
|
process=process['process'],
|
|
|
|
alert_if=process['alert_if'],
|
|
|
|
email_notification=process['email_notification']
|
|
|
|
)
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.modify_process(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
process_id=process_id,
|
|
|
|
process=monitoring_policy_process)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def _attach_monitoring_policy_server(module, oneandone_conn, monitoring_policy_id, servers):
|
|
|
|
"""
|
|
|
|
Attaches servers to a monitoring policy.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
attach_servers = []
|
|
|
|
|
|
|
|
for _server_id in servers:
|
|
|
|
server_id = get_server(oneandone_conn, _server_id)
|
|
|
|
attach_server = oneandone.client.AttachServer(
|
|
|
|
server_id=server_id
|
|
|
|
)
|
|
|
|
attach_servers.append(attach_server)
|
|
|
|
|
|
|
|
if module.check_mode:
|
|
|
|
if attach_servers:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.attach_monitoring_policy_server(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
servers=attach_servers)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def _detach_monitoring_policy_server(module, oneandone_conn, monitoring_policy_id, server_id):
|
|
|
|
"""
|
|
|
|
Detaches a server from a monitoring policy.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
if module.check_mode:
|
|
|
|
mp_server = oneandone_conn.get_monitoring_policy_server(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
server_id=server_id)
|
|
|
|
if mp_server:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
monitoring_policy = oneandone_conn.detach_monitoring_policy_server(
|
|
|
|
monitoring_policy_id=monitoring_policy_id,
|
|
|
|
server_id=server_id)
|
|
|
|
return monitoring_policy
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def update_monitoring_policy(module, oneandone_conn):
|
|
|
|
"""
|
|
|
|
Updates a monitoring_policy based on input arguments.
|
|
|
|
Monitoring policy ports, processes and servers can be added/removed to/from
|
|
|
|
a monitoring policy. Monitoring policy name, description, email,
|
|
|
|
thresholds for cpu, ram, disk, transfer and internal_ping
|
|
|
|
can be updated as well.
|
|
|
|
|
|
|
|
module : AnsibleModule object
|
|
|
|
oneandone_conn: authenticated oneandone object
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
monitoring_policy_id = module.params.get('monitoring_policy')
|
|
|
|
name = module.params.get('name')
|
|
|
|
description = module.params.get('description')
|
|
|
|
email = module.params.get('email')
|
|
|
|
thresholds = module.params.get('thresholds')
|
|
|
|
add_ports = module.params.get('add_ports')
|
|
|
|
update_ports = module.params.get('update_ports')
|
|
|
|
remove_ports = module.params.get('remove_ports')
|
|
|
|
add_processes = module.params.get('add_processes')
|
|
|
|
update_processes = module.params.get('update_processes')
|
|
|
|
remove_processes = module.params.get('remove_processes')
|
|
|
|
add_servers = module.params.get('add_servers')
|
|
|
|
remove_servers = module.params.get('remove_servers')
|
|
|
|
|
|
|
|
changed = False
|
|
|
|
|
|
|
|
monitoring_policy = get_monitoring_policy(oneandone_conn, monitoring_policy_id, True)
|
|
|
|
if monitoring_policy is None:
|
|
|
|
_check_mode(module, False)
|
|
|
|
|
|
|
|
_monitoring_policy = oneandone.client.MonitoringPolicy(
|
|
|
|
name=name,
|
|
|
|
description=description,
|
|
|
|
email=email
|
|
|
|
)
|
|
|
|
|
|
|
|
_thresholds = None
|
|
|
|
|
|
|
|
if thresholds:
|
|
|
|
threshold_entities = ['cpu', 'ram', 'disk', 'internal_ping', 'transfer']
|
|
|
|
|
|
|
|
_thresholds = []
|
2021-02-23 23:19:27 +01:00
|
|
|
for threshold in thresholds:
|
|
|
|
key = list(threshold.keys())[0]
|
2020-03-09 10:11:07 +01:00
|
|
|
if key in threshold_entities:
|
|
|
|
_threshold = oneandone.client.Threshold(
|
|
|
|
entity=key,
|
2021-02-23 23:19:27 +01:00
|
|
|
warning_value=threshold[key]['warning']['value'],
|
|
|
|
warning_alert=str(threshold[key]['warning']['alert']).lower(),
|
|
|
|
critical_value=threshold[key]['critical']['value'],
|
|
|
|
critical_alert=str(threshold[key]['critical']['alert']).lower())
|
2020-03-09 10:11:07 +01:00
|
|
|
_thresholds.append(_threshold)
|
|
|
|
|
|
|
|
if name or description or email or thresholds:
|
|
|
|
_check_mode(module, True)
|
|
|
|
monitoring_policy = oneandone_conn.modify_monitoring_policy(
|
|
|
|
monitoring_policy_id=monitoring_policy['id'],
|
|
|
|
monitoring_policy=_monitoring_policy,
|
|
|
|
thresholds=_thresholds)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if add_ports:
|
|
|
|
if module.check_mode:
|
|
|
|
_check_mode(module, _add_ports(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
add_ports))
|
|
|
|
|
|
|
|
monitoring_policy = _add_ports(module, oneandone_conn, monitoring_policy['id'], add_ports)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if update_ports:
|
|
|
|
chk_changed = False
|
|
|
|
for update_port in update_ports:
|
|
|
|
if module.check_mode:
|
|
|
|
chk_changed |= _modify_port(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
update_port['id'],
|
|
|
|
update_port)
|
|
|
|
|
|
|
|
_modify_port(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
update_port['id'],
|
|
|
|
update_port)
|
|
|
|
monitoring_policy = get_monitoring_policy(oneandone_conn, monitoring_policy['id'], True)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if remove_ports:
|
|
|
|
chk_changed = False
|
|
|
|
for port_id in remove_ports:
|
|
|
|
if module.check_mode:
|
|
|
|
chk_changed |= _delete_monitoring_policy_port(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
port_id)
|
|
|
|
|
|
|
|
_delete_monitoring_policy_port(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
port_id)
|
|
|
|
_check_mode(module, chk_changed)
|
|
|
|
monitoring_policy = get_monitoring_policy(oneandone_conn, monitoring_policy['id'], True)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if add_processes:
|
|
|
|
monitoring_policy = _add_processes(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
add_processes)
|
|
|
|
_check_mode(module, monitoring_policy)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if update_processes:
|
|
|
|
chk_changed = False
|
|
|
|
for update_process in update_processes:
|
|
|
|
if module.check_mode:
|
|
|
|
chk_changed |= _modify_process(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
update_process['id'],
|
|
|
|
update_process)
|
|
|
|
|
|
|
|
_modify_process(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
update_process['id'],
|
|
|
|
update_process)
|
|
|
|
_check_mode(module, chk_changed)
|
|
|
|
monitoring_policy = get_monitoring_policy(oneandone_conn, monitoring_policy['id'], True)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if remove_processes:
|
|
|
|
chk_changed = False
|
|
|
|
for process_id in remove_processes:
|
|
|
|
if module.check_mode:
|
|
|
|
chk_changed |= _delete_monitoring_policy_process(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
process_id)
|
|
|
|
|
|
|
|
_delete_monitoring_policy_process(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
process_id)
|
|
|
|
_check_mode(module, chk_changed)
|
|
|
|
monitoring_policy = get_monitoring_policy(oneandone_conn, monitoring_policy['id'], True)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if add_servers:
|
|
|
|
monitoring_policy = _attach_monitoring_policy_server(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
add_servers)
|
|
|
|
_check_mode(module, monitoring_policy)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
if remove_servers:
|
|
|
|
chk_changed = False
|
|
|
|
for _server_id in remove_servers:
|
|
|
|
server_id = get_server(oneandone_conn, _server_id)
|
|
|
|
|
|
|
|
if module.check_mode:
|
|
|
|
chk_changed |= _detach_monitoring_policy_server(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
server_id)
|
|
|
|
|
|
|
|
_detach_monitoring_policy_server(module,
|
|
|
|
oneandone_conn,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
server_id)
|
|
|
|
_check_mode(module, chk_changed)
|
|
|
|
monitoring_policy = get_monitoring_policy(oneandone_conn, monitoring_policy['id'], True)
|
|
|
|
changed = True
|
|
|
|
|
|
|
|
return (changed, monitoring_policy)
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def create_monitoring_policy(module, oneandone_conn):
|
|
|
|
"""
|
|
|
|
Creates a new monitoring policy.
|
|
|
|
|
|
|
|
module : AnsibleModule object
|
|
|
|
oneandone_conn: authenticated oneandone object
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
name = module.params.get('name')
|
|
|
|
description = module.params.get('description')
|
|
|
|
email = module.params.get('email')
|
|
|
|
agent = module.params.get('agent')
|
|
|
|
thresholds = module.params.get('thresholds')
|
|
|
|
ports = module.params.get('ports')
|
|
|
|
processes = module.params.get('processes')
|
|
|
|
wait = module.params.get('wait')
|
|
|
|
wait_timeout = module.params.get('wait_timeout')
|
|
|
|
wait_interval = module.params.get('wait_interval')
|
|
|
|
|
|
|
|
_monitoring_policy = oneandone.client.MonitoringPolicy(name,
|
|
|
|
description,
|
|
|
|
email,
|
|
|
|
agent, )
|
|
|
|
|
|
|
|
_monitoring_policy.specs['agent'] = str(_monitoring_policy.specs['agent']).lower()
|
|
|
|
|
|
|
|
threshold_entities = ['cpu', 'ram', 'disk', 'internal_ping', 'transfer']
|
|
|
|
|
|
|
|
_thresholds = []
|
2021-02-23 23:19:27 +01:00
|
|
|
for threshold in thresholds:
|
|
|
|
key = list(threshold.keys())[0]
|
2020-03-09 10:11:07 +01:00
|
|
|
if key in threshold_entities:
|
|
|
|
_threshold = oneandone.client.Threshold(
|
|
|
|
entity=key,
|
2021-02-23 23:19:27 +01:00
|
|
|
warning_value=threshold[key]['warning']['value'],
|
|
|
|
warning_alert=str(threshold[key]['warning']['alert']).lower(),
|
|
|
|
critical_value=threshold[key]['critical']['value'],
|
|
|
|
critical_alert=str(threshold[key]['critical']['alert']).lower())
|
2020-03-09 10:11:07 +01:00
|
|
|
_thresholds.append(_threshold)
|
|
|
|
|
|
|
|
_ports = []
|
|
|
|
for port in ports:
|
|
|
|
_port = oneandone.client.Port(
|
|
|
|
protocol=port['protocol'],
|
|
|
|
port=port['port'],
|
|
|
|
alert_if=port['alert_if'],
|
|
|
|
email_notification=str(port['email_notification']).lower())
|
|
|
|
_ports.append(_port)
|
|
|
|
|
|
|
|
_processes = []
|
|
|
|
for process in processes:
|
|
|
|
_process = oneandone.client.Process(
|
|
|
|
process=process['process'],
|
|
|
|
alert_if=process['alert_if'],
|
|
|
|
email_notification=str(process['email_notification']).lower())
|
|
|
|
_processes.append(_process)
|
|
|
|
|
|
|
|
_check_mode(module, True)
|
|
|
|
monitoring_policy = oneandone_conn.create_monitoring_policy(
|
|
|
|
monitoring_policy=_monitoring_policy,
|
|
|
|
thresholds=_thresholds,
|
|
|
|
ports=_ports,
|
|
|
|
processes=_processes
|
|
|
|
)
|
|
|
|
|
|
|
|
if wait:
|
|
|
|
wait_for_resource_creation_completion(
|
|
|
|
oneandone_conn,
|
|
|
|
OneAndOneResources.monitoring_policy,
|
|
|
|
monitoring_policy['id'],
|
|
|
|
wait_timeout,
|
|
|
|
wait_interval)
|
|
|
|
|
|
|
|
changed = True if monitoring_policy else False
|
|
|
|
|
|
|
|
_check_mode(module, False)
|
|
|
|
|
|
|
|
return (changed, monitoring_policy)
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def remove_monitoring_policy(module, oneandone_conn):
|
|
|
|
"""
|
|
|
|
Removes a monitoring policy.
|
|
|
|
|
|
|
|
module : AnsibleModule object
|
|
|
|
oneandone_conn: authenticated oneandone object
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
mp_id = module.params.get('name')
|
|
|
|
monitoring_policy_id = get_monitoring_policy(oneandone_conn, mp_id)
|
|
|
|
if module.check_mode:
|
|
|
|
if monitoring_policy_id is None:
|
|
|
|
_check_mode(module, False)
|
|
|
|
_check_mode(module, True)
|
|
|
|
monitoring_policy = oneandone_conn.delete_monitoring_policy(monitoring_policy_id)
|
|
|
|
|
|
|
|
changed = True if monitoring_policy else False
|
|
|
|
|
|
|
|
return (changed, {
|
|
|
|
'id': monitoring_policy['id'],
|
|
|
|
'name': monitoring_policy['name']
|
|
|
|
})
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
module = AnsibleModule(
|
|
|
|
argument_spec=dict(
|
|
|
|
auth_token=dict(
|
2021-02-08 16:33:18 +01:00
|
|
|
type='str', no_log=True,
|
2020-03-09 10:11:07 +01:00
|
|
|
default=os.environ.get('ONEANDONE_AUTH_TOKEN')),
|
|
|
|
api_url=dict(
|
|
|
|
type='str',
|
|
|
|
default=os.environ.get('ONEANDONE_API_URL')),
|
|
|
|
name=dict(type='str'),
|
|
|
|
monitoring_policy=dict(type='str'),
|
|
|
|
agent=dict(type='str'),
|
|
|
|
email=dict(type='str'),
|
|
|
|
description=dict(type='str'),
|
2021-02-26 11:37:23 +01:00
|
|
|
thresholds=dict(type='list', elements="dict", default=[]),
|
|
|
|
ports=dict(type='list', elements="dict", default=[]),
|
|
|
|
processes=dict(type='list', elements="dict", default=[]),
|
|
|
|
add_ports=dict(type='list', elements="dict", default=[]),
|
|
|
|
update_ports=dict(type='list', elements="dict", default=[]),
|
|
|
|
remove_ports=dict(type='list', elements="str", default=[]),
|
|
|
|
add_processes=dict(type='list', elements="dict", default=[]),
|
|
|
|
update_processes=dict(type='list', elements="dict", default=[]),
|
|
|
|
remove_processes=dict(type='list', elements="str", default=[]),
|
|
|
|
add_servers=dict(type='list', elements="str", default=[]),
|
|
|
|
remove_servers=dict(type='list', elements="str", default=[]),
|
2020-03-09 10:11:07 +01:00
|
|
|
wait=dict(type='bool', default=True),
|
|
|
|
wait_timeout=dict(type='int', default=600),
|
|
|
|
wait_interval=dict(type='int', default=5),
|
|
|
|
state=dict(type='str', default='present', choices=['present', 'absent', 'update']),
|
|
|
|
),
|
|
|
|
supports_check_mode=True
|
|
|
|
)
|
|
|
|
|
|
|
|
if not HAS_ONEANDONE_SDK:
|
|
|
|
module.fail_json(msg='1and1 required for this module')
|
|
|
|
|
|
|
|
if not module.params.get('auth_token'):
|
|
|
|
module.fail_json(
|
|
|
|
msg='auth_token parameter is required.')
|
|
|
|
|
|
|
|
if not module.params.get('api_url'):
|
|
|
|
oneandone_conn = oneandone.client.OneAndOneService(
|
|
|
|
api_token=module.params.get('auth_token'))
|
|
|
|
else:
|
|
|
|
oneandone_conn = oneandone.client.OneAndOneService(
|
|
|
|
api_token=module.params.get('auth_token'), api_url=module.params.get('api_url'))
|
|
|
|
|
|
|
|
state = module.params.get('state')
|
|
|
|
|
|
|
|
if state == 'absent':
|
|
|
|
if not module.params.get('name'):
|
|
|
|
module.fail_json(
|
|
|
|
msg="'name' parameter is required to delete a monitoring policy.")
|
|
|
|
try:
|
|
|
|
(changed, monitoring_policy) = remove_monitoring_policy(module, oneandone_conn)
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
elif state == 'update':
|
|
|
|
if not module.params.get('monitoring_policy'):
|
|
|
|
module.fail_json(
|
|
|
|
msg="'monitoring_policy' parameter is required to update a monitoring policy.")
|
|
|
|
try:
|
|
|
|
(changed, monitoring_policy) = update_monitoring_policy(module, oneandone_conn)
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
elif state == 'present':
|
|
|
|
for param in ('name', 'agent', 'email', 'thresholds', 'ports', 'processes'):
|
|
|
|
if not module.params.get(param):
|
|
|
|
module.fail_json(
|
|
|
|
msg="%s parameter is required for a new monitoring policy." % param)
|
|
|
|
try:
|
|
|
|
(changed, monitoring_policy) = create_monitoring_policy(module, oneandone_conn)
|
|
|
|
except Exception as ex:
|
|
|
|
module.fail_json(msg=str(ex))
|
|
|
|
|
|
|
|
module.exit_json(changed=changed, monitoring_policy=monitoring_policy)
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|