aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* [networking] Collect plotnetcfg output.Lee Yarwood2015-07-081-0/+1
| | | | | | | | | | | | | | | | The plotnetcfg tool [1] has recently been packaged for Fedora and provides a useful method for visualising complex host network toplogies. In the case of Openstack hosts this includes Openvswitch devices, flows etc. The resulting file can be used to generate a PDF visualising this with the following command : `cat plotnetcfg | dot -Tpdf > output.pdf` [1] https://github.com/jbenc/plotnetcfg Signed-off-by: Lee Yarwood <lyarwood@redhat.com>
* [last] information about login actionsAlexandru Juncu2015-07-081-0/+33
| | | | | | | | | | | This is useful information to be correlated with shutdown/reboot events in /var/log/messages to identify graceful shutdowns/reboots and lower false positives about system crashes. Resolves #572. Signed-off-by: Alexandru Juncu <alexj@linux.com> Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [kernel, kernelrt] Collect clock source for all kernelsPeter Portante2015-07-082-4/+7
| | | | | | | Resolves #580. Signed-off-by: Peter Portante <peter.portante@redhat.com> Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugins] trim leading '../' from links when sysroot is setBryn M. Reeves2015-07-082-0/+4
| | | | | | | | When SYSROOT is not '/' relative symlinks need to be trimmed to remove the extra leading '../' returned by abspath('/sysroot/...'). Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugins] do not strip SYSROOT when copying link targetsBryn M. Reeves2015-07-081-1/+2
| | | | | | | | The abspath() call in _copy_symlink returns a host-relative path (when SYSROOT is not '/'). Pass this directly to _do_copy_path() without stripping the SYSROOT path component. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [kubernetes] add journal output for kube servicesNeependra Khare2015-07-081-0/+4
| | | | | | | | | | | | Add journalctl output for the following kubernetes units: kube-apiserver kube-controller-manager kube-scheduler kube-proxy Signed-off-by: Neependra Khare <nkhare@redhat.com> Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugins] automatically re-try chroot'ed commands in the hostBryn M. Reeves2015-07-082-5/+12
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [docker] add 'docker' to the package list for Red Hat distrosJeremy Eder2015-07-081-1/+1
| | | | | | | | | The docker package is named 'docker-io' in Fedora and 'docker' in RHEL and other downstream products. Add the 'docker' name to the package list in RedHatDocker to ensure the plugin runs. Signed-off-by: Jeremy Eder <jeder@redhat.com> Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [policies/redhat] add Red Hat Atomic Host policyBryn M. Reeves2015-07-081-1/+38
| | | | | | Add a new policy for the Red Hat Atomic Host. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [policies/redhat] automatically set tmp_dir in containersBryn M. Reeves2015-07-081-2/+5
| | | | | | | | | | | | | Now that policies have the infrastructure to detect that they are running in a container and to use the HOST environment variable if present enable automatic setting of self._tmp_dir in appriate container environments. This causes reports to be automatically written to $HOST/var/tmp when $HOST is set while still allowing users to override the tmp path manually by specificying --tmp-dir=PATH. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [kubernetes] add services and pod logs collectionNeependra Khare2015-07-081-0/+12
| | | | | Signed-off-by: Neependra Khare <nkhare@redhat.com> Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [etcd] split etcd functionality from kubernetes into new pluginNeependra Khare2015-07-082-8/+36
| | | | | Signed-off-by: Neependra Khare <nkhare@redhat.com> Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [sosoptions] ensure '_sysroot' and '_chroot' are initialisedBryn M. Reeves2015-07-081-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Make sure the sysroot and chroot members of the SoSOptions object are initialised to prevent exceptions when these are not set on the command line: sosreport Traceback (most recent call last): File "/usr/sbin/sosreport", line 25, in <module> main(sys.argv[1:]) File "/usr/lib/python2.7/site-packages/sos/sosreport.py", line 1490, in main sos = SoSReport(args) File "/usr/lib/python2.7/site-packages/sos/sosreport.py", line 673, in __init__ self.policy = sos.policies.load(sysroot=self.opts.sysroot) File "/usr/lib/python2.7/site-packages/sos/policies/__init__.py", line 40, in load cache['policy'] = policy(sysroot=sysroot) File "/usr/lib/python2.7/site-packages/sos/policies/redhat.py", line 192, in __init__ super(FedoraPolicy, self).__init__(sysroot=sysroot) File "/usr/lib/python2.7/site-packages/sos/policies/redhat.py", line 58, in __init__ if self.package_manager.all_pkgs()['filesystem']['version'][0] == '3': File "/usr/lib/python2.7/site-packages/sos/policies/__init__.py", line 116, in all_pkgs self.packages = self.get_pkg_list() File "/usr/lib/python2.7/site-packages/sos/policies/__init__.py", line 99, in get_pkg_list pkg_list = shell_out(cmd, chroot=self.chroot).splitlines() File "/usr/lib/python2.7/site-packages/sos/utilities.py", line 191, in shell_out return sos_get_command_output(cmd, chroot=chroot, chdir=runat)['output'] File "/usr/lib/python2.7/site-packages/sos/utilities.py", line 156, in sos_get_command_output raise e OSError: [Errno 1] Operation not permitted: '/' Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [policies] pass --sysroot down to policy classesBryn M. Reeves2015-07-085-17/+22
| | | | | | | | | Policies that don't auto-detect a container environment with a host file system need to pass the value of --sysroot down to the PackageManager class in order to obtain package details from the chroot environment. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [firewalld] work around command hangs in container environmentsBryn M. Reeves2015-07-081-1/+3
| | | | | | | Add a 10s timeout to firewalld-cmd execution to avoid long dbus timeouts in docker containers. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [sosreport] set SYSROOT by policyBryn M. Reeves2015-07-081-3/+10
| | | | | | | | If --sysroot is not given on the command line and Policy.in_container() is True set sysroot automatically if Policy.get_host_sysroot() is not '/'. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [policies] add container support to Red Hat policyBryn M. Reeves2015-07-081-2/+21
| | | | | | | | | | | | | Check for the presence of container-specific environment variables and set _host_sysroot if present: container_uuid=UUID HOST=/path If both a container environment variable and HOST are present run the PackageManager query command in a chroot. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [policies] make PackageManager and Policy sysroot-awareBryn M. Reeves2015-07-081-2/+20
| | | | | | | | | Add methods to Policy to get the host root file system path and to test if sos is running in a container and allow Policy classes to pass a chroot path into the PackageManager constructor in order to obtain package data from the chroot. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [utilities] add chroot support to shell_out()Bryn M. Reeves2015-07-081-2/+3
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [docs] fix documentation of --sysroot parameterBryn M. Reeves2015-07-081-1/+1
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [kubernetes] new pluginNeependra Khare2015-07-081-0/+46
| | | | | | | Add a plugin for Kubernetes support. Signed-off-by: Neependra Khare <nkhare@redhat.com> Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugin] handle ELOOP in _copy_dir()Bryn M. Reeves2015-07-081-4/+12
| | | | | | | | | | | | | | | | | | | | | A problem with systemd's management of the binfmt_misc automount point in Atomic environments causes attempts to access this path to fail with ELOOP: >>> import os >>> os.listdir("/host/proc/sys/fs/binfmt_misc/") Traceback (most recent call last): File "<stdin>", line 1, in <module> OSError: [Errno 2] No such file or directory: '/host/proc/sys/fs/binfmt_misc/' For reasons that are not yet clear this causes the entire sos process to immediately terminate. For now avoid the problem by enclosing the problem os.listdir in a try/except block that explicitly handles the one errno value implicated here. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [docs] add --chroot to sosreport.1Bryn M. Reeves2015-07-081-0/+8
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [lvm2] don't chroot if tmp is not inside sysrootBryn M. Reeves2015-07-081-1/+1
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [logs] fix do_regex_find_all() use for --sysrootBryn M. Reeves2015-07-081-4/+4
| | | | | | | | The logs plugin searches syslog configuration files. When using --sysroot the plugin needs to use join_sysroot() to open the correct path. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [libvirt] use join_sysroot() before calling os.path.existsBryn M. Reeves2015-07-081-1/+1
| | | | | | | The libvirt plugin tests for the presence of files. Use join_sysroot() to ensure the correct path is tested. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [foreman] don't chroot if tmp is not inside sysrootBryn M. Reeves2015-07-081-1/+3
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [dmraid] don't chroot if tmp is not inside sysrootBryn M. Reeves2015-07-081-1/+2
| | | | | | | | To dump metadata dmraid needs to chdir to the temporary archive directory. Don't attempt to chroot into sysroot if the temporary directory is not a subdirectory of it. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [cluster] handle crm_report with --sysrootBryn M. Reeves2015-07-081-2/+3
| | | | | | | Don't attempt to run crm_report in the chroot if tmp is not a subdirectory of sysroot. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugin] enforce forbidden paths when --sysroot is setBryn M. Reeves2015-07-081-3/+7
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugin] add tmp_in_sysroot() methodBryn M. Reeves2015-07-081-0/+4
| | | | | | | | | | | Add a method that plugins can test to determine whether the archive's temporary directory is inside sysroot. This is always true when sysroot is '/'. When sysroot is a subdirectory of root the temporary directory may be inaccessible from the chroot namespace. Plugins can test this method to determine where to write output. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugins] add chroot parameter to callout APIsBryn M. Reeves2015-07-081-21/+29
| | | | | | | | | | | | | Expose sos_get_command_output()'s chroot support to plugins via add_cmd_output(), get_command_output(), call_ext_prog() and related Plugin methods. 'chroot' is a boolean indicating whether the command should run in the chroot (True) or in the host namespace (False). Has no effect when Plugin.use_sysroot() is False. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [sosreport] check for valid CHROOT valuesBryn M. Reeves2015-07-081-3/+13
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugin] fix chrooted symlink handlingBryn M. Reeves2015-07-081-1/+1
| | | | | | | _copy_symlink() needs to strip_sysroot(), not join_sysroot(), on a link target before handing it to _do_copy_path(). Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugins] implement --chroot for command calloutsBryn M. Reeves2015-07-081-2/+6
| | | | | | When --chroot=always is given chroot all commands to SYSROOT. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [sosreport] add --chroot optionBryn M. Reeves2015-07-082-1/+22
| | | | | | | | | | | | | | | | Add a --chroot option to sosreport to control command chrooting. The option takes one of three values: * auto - Allow callers of the API to control chroot behaviour * always - Always chroot external commands to --sysroot * never - Never chroot external commands This is a fairly low-level option and may not be exposed to the user in a final release; for now it will allow tests in container environments to control the chrooting behaviour used for a run. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [utilities] add chroot support to sos_get_command_output()Bryn M. Reeves2015-07-073-12/+22
| | | | | | | Allow callers of sos_get_command_output() to specify a path to chroot into before executing command. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [docs] add -s/--sysroot to sosreport.1Bryn M. Reeves2015-07-071-0/+5
| | | | Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugins] prefix target paths with self.sysrootBryn M. Reeves2015-07-073-29/+81
| | | | | | | | | | Prefix copyspecs with self.sysroot when using an alternate root path. Prefixes are applied before expanding copyspecs and the prefixed paths are stored as the 'srcpath' attribute in the archive. Destination paths in the report archive do not include the prefix. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [plugins] propagate sysroot to Plugin via commonsBryn M. Reeves2015-07-071-0/+6
| | | | | | | | | | Although plugins should generally be unaware that they are being run with an alternate sysroot the generic plugin IO code must peform the appropriate path prefixing when sysroot is not '/'. Propagate sysroot to plugin classes via the commons dictionary. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [sosreport] add --sysroot optionBryn M. Reeves2015-07-071-1/+15
| | | | | | | | | | | | | | | | | | | | | | | Add a --sysroot=SYSROOT option to specify that the root file system to be inspected is mounted at SYSROOT. This allows basic support for container environments where sos is running in a container and inspecting the containing host and its environment ('superspection'). For this to work currently the following conditions must be met: - sos is sufficiently privileged to read and search relevant file system paths within SYSROOT - sos must share the PID and network namespace of the target host - binaries called by sos must be present and executable in the SYSROOT inherited by sos. If PATH includes paths inside SYSROOT appropriate values must be set for LD_LIBRARY_PATH to allow shared executables to be linked. Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [openstack_neutron] Obscure passwords and secretsLee Yarwood2015-07-071-0/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | The following passwords and secrets are now obscured : - rabbit_password - qpid_password - nova_admin_password - xenapi_connection_password - password - connection - admin_password - metadata_proxy_shared_secret - qpid_password - eapi_password - crd_password - primary_l3_host_password - serverauth - ucsm_password - ha_vrrp_auth_password - ssl_key_password - vcenter_password - edge_appliance_password - tenant_admin_password - apic_password Fixes #594 Signed-off-by: Lee Yarwood <lyarwood@redhat.com>
* [devices] New plugin to collect "udevadm info --export-db"Pavel Moravec2015-07-071-0/+28
| | | | | | Partially resolves #570 Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
* [sysvipc] Collect "ipcs -u"Pavel Moravec2015-07-071-1/+4
| | | | | | Partially solves #570 Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
* [process] Collect few "ps" outputsPavel Moravec2015-07-071-1/+8
| | | | | | | | Partially solves $570 Signed-off-by: Pavel Moravec <pmoravec@redhat.com> (edits for readability & line length) Signed-off-by: Bryn M. Reeves <bmr@redhat.com>
* [ptp] Add new plugin for Precision time protocolPavel Moravec2015-07-071-0/+36
| | | | | | Partially resolves #570 Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
* [networking] Collect "ethtool -T $NIC"Pavel Moravec2015-07-071-0/+1
| | | | | | Partially solves #570 Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
* [ntp] Collect "ntpq -p" outputPavel Moravec2015-07-071-1/+4
| | | | | | Partially solves #570 Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
* [services] add "ls /var/lock/subsys"Pavel Moravec2015-07-071-1/+4
| | | | Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
* [startup] rename plugin to 'services'Pavel Moravec2015-07-071-7/+7
| | | | | | | The plugin is supposed to collect information about services rather than about their startup. Signed-off-by: Pavel Moravec <pmoravec@redhat.com>