Move backup replication hba_entry to backup_cluster
[mirror/dsa-puppet.git] / modules / postgres / manifests / backup_server.pp
1 # postgres backup server
2 class postgres::backup_server {
3   include postgres::backup_server::globals
4
5   $make_base_backups = '/usr/local/bin/postgres-make-base-backups'
6
7   ensure_packages ( [
8     'libhash-merge-simple-perl',
9     'libyaml-perl',
10     'python-yaml',
11     'pigz',
12     'postgresql-client',
13     'postgresql-client-9.6',
14   ], {
15     ensure => 'installed'
16   })
17
18   ####
19   # Regularly pull base backups
20   #
21   concat { $postgres::backup_server::globals::base_backup_clusters:
22     ensure_newline => true,
23   }
24   Concat::Fragment <<| tag == $postgres::backup_server::globals::tag_base_backup |>>
25
26   file { $make_base_backups:
27     mode    => '0555',
28     content => template('postgres/backup_server/postgres-make-base-backups.erb'),
29   }
30   file { '/var/lib/dsa/postgres-make-base-backups':
31     ensure => directory,
32     owner  => $postgres::backup_server::globals::backup_unix_user,
33     mode   => '0755',
34   }
35   concat::fragment { 'puppet-crontab--postgres-make_base_backups':
36     target  => '/etc/cron.d/puppet-crontab',
37     content => @("EOF")
38       */30 * * * * ${postgres::backup_server::globals::backup_unix_user} sleep $(( RANDOM \% 1200 )); chronic ${make_base_backups}
39       | EOF
40   }
41
42   ####
43   # Maintain authorized_keys file on backup servers for WAL shipping
44   #
45   # do not let other hosts directly build our authorized_keys file,
46   # instead go via a script that somewhat validates intput
47   file { '/usr/local/bin/debbackup-ssh-wrap':
48     source => 'puppet:///modules/postgres/backup_server/debbackup-ssh-wrap',
49     mode   => '0555'
50   }
51   file { '/usr/local/bin/postgres-make-one-base-backup':
52     source => 'puppet:///modules/postgres/backup_server/postgres-make-one-base-backup',
53     mode   => '0555'
54   }
55   ssh::authorized_key_collect { 'postgres::backup_server':
56     target_user => $postgres::backup_server::globals::backup_unix_user,
57     collect_tag => $postgres::backup_server::globals::tag_source_sshkey,
58   }
59
60   ####
61   # Maintain /etc/nagios/dsa-check-backuppg.conf
62   #
63   file { '/etc/dsa/postgresql-backup':
64     ensure => 'directory',
65   }
66   file { '/etc/dsa/postgresql-backup/dsa-check-backuppg.conf.d':
67     ensure  => 'directory',
68     purge   => true,
69     force   => true,
70     recurse => true,
71     notify  => Exec['update dsa-check-backuppg.conf'],
72   }
73   file { '/etc/dsa/postgresql-backup/dsa-check-backuppg.conf.d/globals.conf':
74     content => template('postgres/backup_server/dsa-check-backuppg-globals.conf.erb'),
75     notify  => Exec['update dsa-check-backuppg.conf']
76   }
77   File<<| tag == $postgres::backup_server::globals::tag_dsa_check_backupp |>>
78   exec { 'update dsa-check-backuppg.conf':
79     command     => @(EOF),
80         perl -MYAML=LoadFile,Dump -MHash::Merge::Simple=merge -E 'say Dump(merge(map{LoadFile($_)}@ARGV))' /etc/dsa/postgresql-backup/dsa-check-backuppg.conf.d/*.conf > /etc/nagios/dsa-check-backuppg.conf
81         | EOF
82     provider    => shell,
83     refreshonly => true,
84   }
85
86   file { '/etc/sudoers.d/backup-server':
87     mode    => '0440',
88     content => template('postgres/backup_server/sudoers.erb'),
89   }
90
91
92   ####
93   # Maintain .pgpass file on backup servers
94   # #
95   concat { $postgres::backup_server::globals::pgpassfile:
96     owner => $postgres::backup_server::globals::backup_unix_user,
97     group => $postgres::backup_server::globals::backup_unix_group,
98     mode  => '0400'
99   }
100   Concat::Fragment <<| tag == $postgres::backup_server::globals::tag_source_pgpassline |>>
101
102   ####
103   # Let us connect to the clusters we want
104   #
105   # We export this, and the backup clients collect it
106   #
107   # this rule is only needed for clusters that we do not manage
108   # with postgres::cluster.  Hopefully these will go away with time
109   @@ferm::rule::simple { "pg-backup_server::${::fqdn}":
110     tag         => 'postgres::backup_server::to-client',
111     description => 'Allow access access from backup host',
112     chain       => 'pg-backup',
113     saddr       => $base::public_addresses,
114   }
115 }