91 lines
2.6 KiB
Markdown
91 lines
2.6 KiB
Markdown
# kosmos-postgresql
|
|
|
|
## Custom resources
|
|
|
|
### `postgresql_custom_server`
|
|
|
|
Usage:
|
|
|
|
(`node['fqdn']`, for example `andromeda.kosmos.org`) is generated using Let's
|
|
Encrypt and copied to the PostgreSQL data directory and added to the
|
|
`postgresql.conf` file
|
|
|
|
#### On the primary:
|
|
|
|
```ruby
|
|
postgresql_custom_server "12" do
|
|
role "primary"
|
|
end
|
|
```
|
|
|
|
#### On a replica:
|
|
|
|
```ruby
|
|
postgresql_custom_server "12" do
|
|
role "replica"
|
|
end
|
|
```
|
|
|
|
After the initial Chef run on the replica, run Chef on the primary to add the
|
|
firewall rules and PostgreSQL access rules, then run Chef again on the replica
|
|
to set up replication.
|
|
|
|
#### Caveat
|
|
|
|
[`firewall_rules`](https://github.com/chef-cookbooks/firewall/issues/134) and
|
|
[`postgresql_access`](https://github.com/sous-chefs/postgresql/issues/648) are
|
|
declared in recipes, not resources because of the way custom resources
|
|
work currently in Chef. See the `default.rb` and `replica.rb` recipes.
|
|
|
|
The primary gives access to the `replication` db to the `replication` user
|
|
connecting from a replica, and replicas to the primary. For more information
|
|
about PostgreSQL client authentication, see the
|
|
[official docs](https://www.postgresql.org/docs/12/auth-pg-hba-conf.html)
|
|
|
|
The primary opens up the PostgreSQL port (5432 TCP) to replicas, and replicas
|
|
to the primary.
|
|
|
|
## TLS self-signed certificate
|
|
|
|
A wildcard (`*.kosmos.org` certificate) was generated with the following
|
|
commands:
|
|
|
|
```
|
|
openssl req -new -nodes -text -out root.csr -keyout root.key \
|
|
-subj "/CN=root.kosmos.org"
|
|
chmod og-rwx root.key
|
|
openssl x509 -req -in root.csr -text -days 3650 \
|
|
-extfile /etc/ssl/openssl.cnf -extensions v3_ca \
|
|
-signkey root.key -out root.crt
|
|
openssl req -new -nodes -text -out server.csr \
|
|
-keyout server.key -subj "/CN=*.kosmos.org"
|
|
chmod og-rwx server.key
|
|
openssl x509 -req -in server.csr -text -days 1825 \
|
|
-CA root.crt -CAkey root.key -CAcreateserial \
|
|
-out server.crt
|
|
```
|
|
|
|
It is valid until May 12 2025.
|
|
|
|
The content of `server.crt`, `server.key` and `root.crt` an stored in the
|
|
`postgresql` encrypted data bag. The root key is stored in LastPass
|
|
("Self-signed TLS root certificate"). `server.crt` & `server.key` are used by
|
|
the PostgreSQL server.
|
|
|
|
The root certificate needs to be deployed to clients so they verify the cert
|
|
can be trusted.
|
|
|
|
For example:
|
|
|
|
```ruby
|
|
postgresql_data_bag_item = data_bag_item('credentials', 'postgresql')
|
|
root_cert_path = "/etc/ssl/certs/root.kosmos.org.crt"
|
|
file root_cert_path do
|
|
content postgresql_data_bag_item['ssl_root_cert']
|
|
mode "0644"
|
|
end
|
|
```
|
|
|
|
`/etc/ssl/certs/root.kosmos.org.crt` can be used as the CA root cert path in
|
|
the client's configuration
|