X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/18e12b0e123fc3e5f344682f884feabc12da0f5a..5c201e54f8add1a7a3e46e0db1c0a8b253a0a21d:/cookbooks/tilecache/recipes/default.rb diff --git a/cookbooks/tilecache/recipes/default.rb b/cookbooks/tilecache/recipes/default.rb index 0d94bcfd2..63de8a529 100644 --- a/cookbooks/tilecache/recipes/default.rb +++ b/cookbooks/tilecache/recipes/default.rb @@ -1,8 +1,8 @@ # -# Cookbook Name:: tilecache +# Cookbook:: tilecache # Recipe:: default # -# Copyright 2011, OpenStreetMap Foundation +# Copyright:: 2011, OpenStreetMap Foundation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -22,6 +22,7 @@ require "ipaddr" include_recipe "ssl" include_recipe "squid" include_recipe "nginx" +include_recipe "fail2ban" package "apache2" do action :remove @@ -51,6 +52,7 @@ tilecaches.each do |cache| dest_ports "3128" source_ports "1024:" end + firewall_rule "accept-squid-icp" do action :accept family "inet" @@ -60,6 +62,7 @@ tilecaches.each do |cache| dest_ports "3130" source_ports "3130" end + firewall_rule "accept-squid-icp-reply" do action :accept family "inet" @@ -69,6 +72,26 @@ tilecaches.each do |cache| dest_ports "3130" source_ports "3130" end + + firewall_rule "accept-squid-htcp" do + action :accept + family "inet" + source "net:#{address}" + dest "fw" + proto "udp" + dest_ports "4827" + source_ports "4827" + end + + firewall_rule "accept-squid-htcp-reply" do + action :accept + family "inet" + source "fw" + dest "net:#{address}" + proto "udp" + dest_ports "4827" + source_ports "4827" + end end end @@ -77,6 +100,8 @@ squid_fragment "tilecache" do variables :caches => tilecaches, :renders => tilerenders end +package "rsync" + template "/etc/logrotate.d/squid" do source "logrotate.squid.erb" owner "root" @@ -84,6 +109,16 @@ template "/etc/logrotate.d/squid" do mode 0o644 end +# Configure cron with lower cpu and IO priority +systemd_service "cron-load" do + service "cron" + dropin "load" + nice 19 + io_scheduling_class "best-effort" + io_scheduling_priority 7 + notifies :restart, "service[cron]" +end + nginx_site "default" do action [:delete] end @@ -113,12 +148,16 @@ ssl_certificate "tile.openstreetmap.org" do domains ["tile.openstreetmap.org", "a.tile.openstreetmap.org", "b.tile.openstreetmap.org", - "c.tile.openstreetmap.org"] + "c.tile.openstreetmap.org", + "tile.osm.org", + "a.tile.osm.org", + "b.tile.osm.org", + "c.tile.osm.org"] notifies :restart, "service[nginx]" end -nginx_site "tile-ssl" do - template "nginx_tile_ssl.conf.erb" +nginx_site "tile" do + template "nginx_tile.conf.erb" variables :caches => tilecaches end @@ -129,6 +168,10 @@ template "/etc/logrotate.d/nginx" do mode 0o644 end +fail2ban_jail "squid" do + maxretry 1000 +end + tilerenders.each do |render| munin_plugin "ping_#{render[:fqdn]}" do target "ping_" @@ -136,7 +179,3 @@ tilerenders.each do |render| conf_variables :host => render[:fqdn] end end - -Dir.glob("/var/log/nginx/access.log*") do |log| - File.unlink(log) -end