Greg greg
  • Joined on 2018-11-05
greg merged pull request kosmos/chef#183 2020-06-15 12:39:29 +00:00
Set the Gitea root URL to HTTPS
greg created pull request kosmos/chef#183 2020-06-12 15:24:28 +00:00
Set the Gitea root URL to HTTPS
greg pushed to bugfix/182-gitea_root_url at kosmos/chef 2020-06-12 15:23:59 +00:00
5e483240c3 Set the Gitea root URL to HTTPS
greg commented on pull request kosmos/chef#181 2020-06-12 14:58:11 +00:00
Add PostgreSQL primary support to the kosmos-ejabberd cookbook

However, I don't quite understand why it still has to be searching for every single app. Isn't there an easier way to know that a machine has roles/attributes that require postgres access? If it's not bound to the application, then it can never be out of sync.

I have found a better way. See ee9c241a4d, I have added a postgresql_client role

greg pushed to feature/180-ejabberd_pg_primary at kosmos/chef 2020-06-12 14:57:06 +00:00
ee9c241a4d Add a postgresql_client role
greg commented on pull request kosmos/chef#181 2020-06-11 16:22:21 +00:00
Add PostgreSQL primary support to the kosmos-ejabberd cookbook

Pushed 6f696d7, what do you think?

greg pushed to feature/180-ejabberd_pg_primary at kosmos/chef 2020-06-11 16:21:57 +00:00
6f696d7634 Define access rules in the PostgreSQL primary recipe
greg commented on pull request kosmos/chef#181 2020-06-11 15:30:04 +00:00
Add PostgreSQL primary support to the kosmos-ejabberd cookbook

I'm going to look into it, there has to be a way that looks good in Chef code. Not having to run Chef again on the primary every time we add a new service will be useful

greg commented on pull request kosmos/chef#181 2020-06-11 14:27:11 +00:00
Add PostgreSQL primary support to the kosmos-ejabberd cookbook

Replication is a special right, this is defined here for replicas:

postgresql_access "#{replica[:hostname]} replication" do
access_type "host"
access_db "replication"
access_user "replication"
access_addr "#{replica[:ipaddress]}/32"
access_method "md5"
notifies :reload, "service[#{postgresql_service}]", :immediately
end
.

A server connecting to the PostgreSQL primary as a client is not necessarily a replica, but as you said it could be done for all databases at once. I had the idea of definining each database as we need a recipe anyway to create the postgreSQL user and database for each service. Allowing access to all databases for a server could be done as part of the primary recipe, however it means the list of all services that use PostgreSQL would live there instead of the recipe for the service. I'm not opposed to doing that, I just thought doing it per database was clearer.

greg pushed to feature/180-ejabberd_pg_primary at kosmos/chef 2020-06-11 07:01:25 +00:00
26097a7584 Use the correct database name for the access rights
greg created pull request kosmos/chef#181 2020-06-10 16:45:44 +00:00
Add PostgreSQL primary support to the kosmos-ejabberd cookbook
greg pushed to feature/180-ejabberd_pg_primary at kosmos/chef 2020-06-10 16:44:18 +00:00
1a6ce44758 Create a minimalist ejabberd role for development
2c21d6255b Add PostgreSQL primary support to the kosmos-ejabberd cookbook
091a46e972 Do not pass the pgsql_password variable to ejabberd.yml
greg opened issue kosmos/chef#180 2020-06-10 16:36:05 +00:00
Add PostgreSQL primary server support to the ejabberd cookbook
greg created pull request kosmos/chef#179 2020-06-10 12:44:50 +00:00
Fix PostgreSQL issues with encrypted data directory
greg pushed to bugfix/postgres_issues at kosmos/chef 2020-06-10 12:42:15 +00:00
a0db6adaf2 Pass the data_directory to the postgresql_server_conf resource
e3e726097f Do not enable the postgresql@12-main service
dba6629869 Use the attribute from the encfs recipe for the data directory
229e9cfbd2 Add the kosmos_encfs recipe to centaurus
ef74b28261 Pass the data_directory to the postgresql_server_conf resource
Compare 8 commits »
greg pushed to bugfix/postgres_issues at kosmos/chef 2020-06-08 16:40:39 +00:00
ef74b28261 Pass the data_directory to the postgresql_server_conf resource
9e2b131d99 Do not enable the postgresql@12-main service
Compare 2 commits »
greg pushed to bugfix/postgres_issues at kosmos/chef 2020-06-08 16:23:28 +00:00
94ffd8010a Use the attribute from the encfs recipe for the data directory
greg commented on pull request kosmos/chef#166 2020-06-08 13:38:00 +00:00
Encrypt PostgreSQL data directory

postgresql is a dummy service, it only runs /bin/true. The service to disable is the content of the postgresql_service variable (postgresql@12-main), so this can be moved above

greg commented on issue kosmos/chef#175 2020-06-08 06:43:29 +00:00
Replace andromeda.kosmos.org

Moving everything bit by bit to a new server sounds good.

Regarding the name of the new server, personally I would go with Draco as it the simplest name but the other names are alright too

greg commented on pull request kosmos/chef#166 2020-06-04 17:57:14 +00:00
Encrypt PostgreSQL data directory

I have pushed a proof of concept that creates a /var/lib/local/encrypted_data encfs dir and mounts it to /mnt/data. This is done using a Systemd unit that prompts for the encryption password, and then starts the Postgresql unit. See the last commit