Commit Graph

145 Commits

Author SHA1 Message Date
Kevin Fenzi
c4bdfcc897 proxies: block a ip that was hitting release-monitoring.org a lot
This ip had hit release-monitoring.org like 5,000,000 times in the
course of a few hours and swamped it's web pod.

Lets block it for now and see if anyone complains.
If this is you: please add some rate limiting.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2026-02-13 08:48:01 -08:00
Greg Sutcliffe
a72e5b2fbf Zabbix: fix different handling of /apache-status on proxy hosts
Seems like the proxies don't want to handle port 80 nicely, I get
errors in Zabbix for them using localhost:80/apache-status (which
works elsewhere, like sundries). However using https/443 seems to
work, so we'll do that instead.

Signed-off-by: Greg Sutcliffe <fedora@emeraldreverie.org>
2026-01-26 11:39:48 +00:00
Kevin Fenzi
27a81038b9 proxies: block a bunch of networks from an abusive asn
This asn is hammering koji links.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2026-01-25 10:32:48 -08:00
Adam Williamson
37e2d34eb6 proxies: block IP attempting SQL injections on openQA (prod)
My staging effort seems to have worked, so let's do prod too.

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2025-12-30 08:58:11 -08:00
Kevin Fenzi
c4f5d8ea2e proxies / proxies_stg: fix comment about max workers and set to 3200 both places
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-12-14 09:45:38 -08:00
Kevin Fenzi
48d97a929d proxies: increase max workers to 3200
There's no log messages about it, but we have been seeing some odd
connection reset messages and collectd shows we are near the 2500 limit
we had.

So, bump this to 3200 (based on 8 cpus * 300 ).
If we need to bump this more, we probibly need to add cpus.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-12-11 10:21:27 -08:00
Kevin Fenzi
de4be8f8cc proxies: block ip thats hitting a pr endpoint
This ip is posting to /rpms/seahorse/pull-request/5/comment?js=1
about 400k times a day.

It may be a script gone wrong or something.
Remove the block if the user says they fixed it.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-11-16 13:00:20 -08:00
Greg Sutcliffe
8fbbca5daf Zabbix: use vpn to reach zabbix-server for proxies
Signed-off-by: Greg Sutcliffe <fedora@emeraldreverie.org>
2025-08-18 14:06:17 +01:00
Kevin Fenzi
e8da330802 proxies: block another network thats generating a ton of traffic
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-08-14 11:30:27 -07:00
Nils Philippsen
6c85fda0c9 Mass remove/replace iad2 -> rdu3, 10.3. -> 10.16.
Signed-off-by: Nils Philippsen <nils@redhat.com>
2025-07-03 20:05:02 +02:00
Kevin Fenzi
c0180dc19e proxies: drop worker06.vpn as we do not have a 06 anymore
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-07-03 09:48:57 -07:00
Kevin Fenzi
46e93ae29b proxies: block a few more nets
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-28 17:07:23 -07:00
Kevin Fenzi
03656f0288 proxies / rdu3: make most proxies use vpn but rdu3 goes direct
We need this because the cluster needs to be able to access api in order
to pull images, etc. So, in rdu3 proxies we go direct to the cluster
nodes, but in all the other proxies we go via the vpn.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-16 15:42:12 -07:00
Kevin Fenzi
0194b383af proxies: switch rdu3 openshift balancers to use direct path instead of vpn
We need the rdu3 proxies to directly talk to the openshift compute
nodes, as it needs this to work to pull images.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-16 13:56:27 -07:00
Kevin Fenzi
5361223938 openvpn: set ccd files for rdu3 worker nodes, add them to the var so proxies will use them, still need to get openvpn working on workers
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-15 16:57:28 -07:00
Kevin Fenzi
dceab488bd proxies: change the nft rules instead of the no longer used iptables
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-14 14:33:18 -07:00
Kevin Fenzi
e7e6db8d8d proxies: rename ocp4-rdu3 to ocp4_rdu3 to hopefully get jinja2 to leave it alone
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-14 14:30:00 -07:00
Kevin Fenzi
e1132667d3 proxies: add a ocp-rdu3 site/endpoint to get to the new rdu3 prod openshift
We can't use easily the existing hostname/site, as that goes to the
current iad2 cluster, so setup a -rdu3 version for now.
After we switch we can drop this and repoint the main one to the new
cluster.

Hopefully this all works and does the right thing.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-06-14 12:35:20 -07:00
Kevin Fenzi
8172137887 scrapers: block a bunch more abusing networks
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-05-14 18:00:48 -07:00
Kevin Fenzi
8f1550d7ff proxies: block the same things we are blocking on pagure.io on all proxies
This includes some clouds that are just completely hammering us.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-05-14 17:30:41 -07:00
Michal Konecny
6428f8f772 Sunset github2fedmsg and fedmsg
This commit is removing all the fedmsg related stuff from ansible
repository.

Signed-off-by: Michal Konecny <mkonecny@redhat.com>
2025-02-13 10:08:51 +00:00
iamyaash
b3d6a90b9a motd generic template added
migrated notes from infra/hosts

motd changes; excluding CSI infos

removed csi_* vars from group_vars; converted csi_purpose & csi_relationship into notes

fixed merge conflicts

minor changes; var

updating YAMLs & playbooks

udpated YAMLs & playbooks again

updated correctly; buildhw.yml

fixing merge conflicts

dest added in motd.yml
2025-01-28 01:10:14 +00:00
James Antill
80aa4bbbc2 Initial version of iptables to nftables conversion. 2025-01-16 11:28:24 -05:00
Michal Konecny
c609ecb432 Revert "Add IPs to blocked_ips"
This reverts commit d4ee518e5d.
2024-07-01 18:15:00 +02:00
Michal Konečný
d4ee518e5d Add IPs to blocked_ips
There are two IPs hammering pagure.io, so let's stop that.

Signed-off-by: Michal Konečný <michal.konecny@pacse.eu>
2024-07-01 09:29:01 +00:00
David Kirwan
66defc189e zabbix: attach monitoring template to rabbitmq
Signed-off-by: David Kirwan <davidkirwanirl@gmail.com>
2024-05-16 09:22:21 +01:00
Kevin Fenzi
ced9b3cffd proxies: bump maxrequestworkers up to avoid filling up
This has been hitting us on a few proxies (14 and now 3).

There's no particular harm to increasing this, they seem to handle
things just fine.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2024-05-04 13:26:44 -07:00
Kevin Fenzi
f5e74ac2ec proxies: just make them 100G
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2024-05-04 10:35:21 -07:00
David Kirwan
81ffe56f4a zabbix: move https to http for proxies template
Signed-off-by: David Kirwan <davidkirwanirl@gmail.com>
2024-04-25 12:51:32 +01:00
David Kirwan
9d97299285 zabbix: template to handle external hosts
Signed-off-by: David Kirwan <davidkirwanirl@gmail.com>
2024-04-25 11:26:49 +01:00
Kevin Fenzi
5c50f89d73 proxies: just stop exposing 8080 on proxies
This is pretty harmless. It's the haproxy stats page, but
we get questions about it and people don't like that it's
there. There's also no reason to keep it open as we normally
access this via a proxy.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2024-01-24 14:32:28 -08:00
Kevin Fenzi
4fffa25daf proxies are external
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-08-15 11:49:04 -07:00
Kevin Fenzi
b1b0923af0 openshift 3.11: raise a glass!
Our openshift 3.11 cluster(s) served us long and well.

Now we have everything finally moved to the openshift 4 clusters (fas2
was the last holdout). We can finally retire this. :)

🎉🥂

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-11-28 13:08:01 -08:00
Kevin Fenzi
31a6b2d5d0 inventory: try and drop ocp bootstrap entirely
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-09-21 11:23:31 -07:00
Kevin Fenzi
91ccdea73f proxies: Reach ocp4 cluster in prod over vpn instead of sending 421
I think I handled all the special cases here already.
We want to switch non iad2 proxies to reach the oco4 cluster over it's
vpn now that it has one. This should allow us to still keep ipv6
available for applications and not have to change dns for moving from
ocp3 cluster anymore. Will roll this out slowly to one proxy then
another, then the rest if it all looks ok.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-13 10:08:48 -07:00
Kevin Fenzi
849126d89a openvpn: move ocp_nodes var to all, drop node-selector from testing
Putting ocp_nodes in group_vars/all allows both proxies and openvpn
openshift app to use it.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-09 13:51:56 -07:00
Kevin Fenzi
2ff5956ff2 proxies: drop old zanata hack
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-06-01 20:52:46 -07:00
Kevin Fenzi
9eed96e3d6 proxies: open ocp4 api port in both stg and prod
This fixes ticket 10521.

Basically we want to just open the api. It requires auth to do anything
and other openshift instances have it available, so it shouldn't
hopefully expose us to too much risk. With ocp3 the api was part of the
normal port/web flow, but with ocp4 it's a seperate port.

This also adds new workers to haproxy. I can drop that part if it's
controversal, but it should be fine I would think.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-03-03 22:29:37 +00:00
Mark O Brien
ead918a386 ocp4: add proxy settings for worker06
Signed-off-by: Mark O Brien <markobri@redhat.com>
2022-02-10 14:33:19 +00:00
Mark O Brien
07d4e8e713 ocp4: add firewall rule to proxies for worker05
Signed-off-by: Mark O Brien <markobri@redhat.com>
2022-02-07 16:26:56 +00:00
Mark O Brien
ff80837bfb ocp4: add initial config for worker05 prod
Signed-off-by: Mark O Brien <markobri@redhat.com>
2022-02-07 15:35:38 +00:00
Kevin Fenzi
c735bfbc18 proxies / ocp: also add 6443 rule
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-02-04 13:54:24 -08:00
Kevin Fenzi
4e62da042f proxies: add worker04.ocp to be allowed to talk to the int-api endpoint.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-02-04 12:22:24 -08:00
Mark O Brien
aad8ed6be7 ocp4: add worker04 prod node
Signed-off-by: Mark O Brien <markobri@redhat.com>
2022-02-01 14:57:45 +00:00
Kevin Fenzi
99479542bd nagios: stop checking swap on more hosts
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2022-01-31 11:25:33 -08:00
Kevin Fenzi
580cd252c5 Inventory group/host variables: Sort yaml
This was done using yq (
https://mikefarah.gitbook.io/yq/operators/sort-keys )

Doing things this way makes it much easier to see if a variable is set
in a file or if two hosts differ in what variables they set. Hopefully
we can keep things sorted moving forward.

Basically this means just sort a-z anything you add to any host or group
vaiable and it will be in the right place.

Additionally, this enforces 'normal' intent rules for all the variable
files which we should also try and obey. 2 spaces for first level, 3 for
next, etc. When in doubt you can run yq on it.

This should cause NO actual vairable changes, it's all just readability
fixing for humans, ansible parses it exactly the same.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-11-16 13:27:57 -08:00
David Kirwan
7f4fd3ebd8 fcos-pipeline-migration: Permit oc client to connect to ocp4 cluster
from batcave01

Signed-off-by: David Kirwan <dkirwan@redhat.com>
2021-11-08 10:56:56 +00:00
Kevin Fenzi
313674646d proxies: increase max workers
Also add a ssl connection cache.
These changes are live on proxy01/10 and seem to have made them stable
again. Will look at pushing to the rest tomorrow.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-09-21 16:19:14 -07:00
David Kirwan
991da5d981 metrics-for-apps: Renamed tag, added firewall rules for proxies
Signed-off-by: David Kirwan <dkirwan@redhat.com>
2021-09-06 12:36:00 +09:00
David Kirwan
9f39d76e2c metrics-for-apps: Adding inventory/groupvars/changes for ocp prod
Signed-off-by: David Kirwan <dkirwan@redhat.com>
2021-09-02 01:37:34 +00:00