ansible/inventory/group_vars/bugzilla2fedmsg-stg
2017-06-12 03:09:13 +00:00

51 lines
1.8 KiB
Text

---
# Define resources for this group of hosts here.
lvm_size: 20000
mem_size: 1024
num_cpus: 1
# for systems that do not match the above - specify the same parameter in
# the host_vars/$hostname file
tcp_ports: [ 3000, 3001 ]
fas_client_groups: sysadmin-noc,sysadmin-datanommer,sysadmin-veteran
# These are consumed by a task in roles/fedmsg/base/main.yml
fedmsg_certs:
- service: shell
owner: root
group: sysadmin
can_send:
- logger.log
- service: bugzilla2fedmsg
owner: root
group: fedmsg
can_send:
- bugzilla.bug.new
- bugzilla.bug.update
# For the MOTD
csi_security_category: Low
csi_primary_contact: Fedmsg admins - sysadmin-datanommer-members@fedoraproject.org
csi_purpose: Run the bugzilla2fedmsg bridge to forward RH messages onto fedmsg
csi_relationship: |
A 'moksha-hub' daemon is the only thing really running here. (Don't confuse
that with the 'fedmsg-hub' running on most of our other backend machines.)
The bugzilla2fedmsg package provides a plugin to the moksha-hub that
connects out over the STOMP protocol to a 'fabric' of JBOSS FUSE brokers
living in the Red Hat DMZ. We authenticate with a cert/key pair that is
kept in /etc/pki/fedmsg/. Those brokers should push bugzilla events over
STOMP to our moksha-hub daemon. When a message arrives, we query bugzilla
about the change to get some 'more interesting' data to stuff in our
payload, then we sign the message using a fedmsg cert and fire it off to the
rest of our bus.
This service has no database, no memcached usage. It depends on those STOMP
brokers and being able to query bugzilla.rh.com.
STOMP config: /etc/moksha/production.ini
fedmsg config: /etc/fedmsg.d/
certs: /etc/pki/fedmsg
code: /usr/lib/python2.7/site-packages/bugzilla2fedmsg.py