-
Notifications
You must be signed in to change notification settings - Fork 541
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[juju] Add plugin option for Juju state reporting #3803
Conversation
Congratulations! One of the builds has completed. 🍾 You can install the built RPMs by following these steps:
Please note that the RPMs should be used only in a testing environment. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As well as turboturtle comments, can we also look at the flake/pylint issues as well is any updated PR
A couple of very small comments from me. |
@MichaelThamm remember to squash all the commits into one and sign it |
60d0c0e
to
9d36d66
Compare
@arif-ali or @jcastill I imagine that I need to obfuscate some of the following information which is included in the "lxd": {
"user": "admin",
"recent-server": IP:Port,
"uuid": "ac03821c-361e-4daf-83c9-a712cd56b8d4",
"api-endpoints": [IP:Port],
"ca-cert": "-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----",
}, Is there a need to obfuscate these things or is it just passwords, tokens, keys as mentioned in obfuscate? |
@MichaelThamm The IP addresses and endpoints, not so, as they would be typically handled by In terms of the certs, you can get the example of the sunbeam.py plugin, where we just needs |
When I run:
However, I do not see results in the This method does not have a filename parameter either. Not sure how to continue with this? |
You can just specify |
045cef0
to
f389bfa
Compare
I think the PR is almost ready for review, but I noticed we have tests for the Juju plugin. Is there any need to update this since the test for scrubbing seems to be sufficient? I also tested the scrubbing for |
|
||
# Specific models | ||
if self.get_option("models"): | ||
for model in self.get_option("models").split(" "): |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ditto, we prefer plugin options to use :
as a delimiter. We may need to add this to the plugin guide, I'll check this shortly.
@MichaelThamm remember to squash the three commits into one, and to sign the commit (that is what's causing the DCO failure). |
Signed-off-by: Michael Thamm <[email protected]>
9e4c546
to
8ca5479
Compare
You can ignore the EDIT, in-fact if you rebased to |
Disable alert for too-many-positional-arguments Signed-off-by: Jose Castillo <[email protected]>
Starting with containerd 1.6.27 and 1.7.12, warnings are issued for the use of deprecated features. The new `ctr deprecations list` command can be used to retrieve warnings. Closes: sosreport#3786 Signed-off-by: Samuel Karp <[email protected]>
HTTP_PROXY or similar env.variables can contain credentials we must scrub. The variables or directly credentials of a http(s) URL can be specified in several places the commit deals with. Futher, update apt plugin to use the new do_paths_httpp_sub method. Resolves: sosreport#3789 Signed-off-by: Pavel Moravec <[email protected]>
Resolves: sosreport#3788 Signed-off-by: Pablo Fernández Rodríguez<[email protected]> Signed-off-by: Pablo Fernández Rodríguez <[email protected]>
These columns are either empty, containing passwords or some encoded data. Get the *remaining* column names and query for them. If the query for column names fail, failover to current "SELECT *". Relevant: sosreport#3783 Resolves: sosreport#3784 Signed-off-by: Pavel Moravec <[email protected]>
Signed-off-by: Adam Vest <[email protected]>
Capture commands related to nvidia container toolkit. Related: RHEL-58172 Signed-off-by: Jose Castillo <[email protected]>
Signed-off-by: Ponnuvel Palaniyappan <[email protected]>
Closing in favour of: Due to the jumbled CI mess I created. |
This change modifies the Juju plugin to optionally capture Juju state (controllers, models, applications, units) information. The capture assumes that
juju
is installed on the machine wheresos
is called, and that the juju user has superuser privilege to the current (or requested) controllers.This option is disabled by default because, while the information can be very useful, the collection acts on the live Juju state.
Use the plugin with the feature:
sos report --only-plugin juju -k juju.juju-state=True
Run with a specific user (who has access to the controllers specified). This defaults to
ubuntu
:-k juju.juju-user=super_admin
If necessary, you can filter by controllers or models with cluster options.
-k juju.controllers="controller_a controller_b"
-k juju.models="controller_a:model_x controller_b:model_y"
If nothing is supplied for either the controllers or models options, the report will include all state information for them respectively.
Please place an 'X' inside each '[]' to confirm you adhere to our Contributor Guidelines