2 define postgres::backup_cluster(
6 $backup_servers = getfromhash($site::roles, 'postgres_backup_server'),
7 $db_backup_role = 'debian-backup',
8 $db_backup_role_password = hkdf('/etc/puppet/secret', "postgresql-${::hostname}-${$pg_cluster}-${pg_port}-backup_role}"),
12 warning("foo ${backup_servers}")
14 $datadir = "/var/lib/postgresql/${pg_version}/${pg_cluster}"
15 file { "${datadir}/.nobackup":
19 ## XXX - get these from the roles and ldap
21 $backup_servers_addrs = ['5.153.231.12/32', '93.94.130.161/32', '2001:41c8:1000:21::21:12/128', '2a02:158:380:280::161/128']
22 $backup_servers_addrs_joined = join($backup_servers_addrs, ' ')
25 postgresql::server::role { $db_backup_role:
26 password_hash => postgresql_password($db_backup_role, $db_backup_role_password),
31 $backup_servers_addrs.each |String $address| {
32 postgresql::server::pg_hba_rule { "debian_backup-${address}":
33 description => 'Open up PostgreSQL for backups',
35 database => 'replication',
36 user => $db_backup_role,
42 @ferm::rule { "dsa-postgres-${pg_port}":
43 description => 'Allow postgress access from backup host',
45 rule => "&SERVICE_RANGE(tcp, ${pg_port}, ( @ipfilter((${backup_servers_addrs_joined})) ))",
48 postgres::backup_server::register_backup_cluster { "backup-role-${::fqdn}}-${::pg_port}":
50 pg_role => $db_backup_role,
51 pg_password => $db_backup_role_password,
52 pg_cluster => $pg_cluster,
53 pg_version => $pg_version,