X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/e7be1b3d379bdb1ee55de0d68f7946ed9f63fc62..6ceead753013521ceffc22bea1cd1bcf5b5ec8d6:/cookbooks/postgresql/recipes/default.rb?ds=inline diff --git a/cookbooks/postgresql/recipes/default.rb b/cookbooks/postgresql/recipes/default.rb index a79cde84d..721cd6bab 100644 --- a/cookbooks/postgresql/recipes/default.rb +++ b/cookbooks/postgresql/recipes/default.rb @@ -17,6 +17,10 @@ # limitations under the License. # +include_recipe "apt::postgresql" +include_recipe "munin" +include_recipe "prometheus" + package "locales-all" package "postgresql-common" @@ -33,36 +37,41 @@ node[:postgresql][:versions].each do |version| source "postgresql.conf.erb" owner "postgres" group "postgres" - mode 0o644 + mode "644" variables :version => version, :defaults => defaults, :settings => settings notifies :reload, "service[postgresql]" + only_if { ::Dir.exist?("/etc/postgresql/#{version}/main") } end template "/etc/postgresql/#{version}/main/pg_hba.conf" do source "pg_hba.conf.erb" owner "postgres" group "postgres" - mode 0o640 + mode "640" variables :early_rules => settings[:early_authentication_rules] || defaults[:early_authentication_rules], :late_rules => settings[:late_authentication_rules] || defaults[:late_authentication_rules] notifies :reload, "service[postgresql]" + only_if { ::Dir.exist?("/etc/postgresql/#{version}/main") } end template "/etc/postgresql/#{version}/main/pg_ident.conf" do source "pg_ident.conf.erb" owner "postgres" group "postgres" - mode 0o640 + mode "640" variables :maps => settings[:user_name_maps] || defaults[:user_name_maps] notifies :reload, "service[postgresql]" + only_if { ::Dir.exist?("/etc/postgresql/#{version}/main") } end link "/var/lib/postgresql/#{version}/main/server.crt" do to "/etc/ssl/certs/ssl-cert-snakeoil.pem" + only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") } end link "/var/lib/postgresql/#{version}/main/server.key" do to "/etc/ssl/private/ssl-cert-snakeoil.key" + only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") } end standby_mode = settings[:standby_mode] || defaults[:standby_mode] @@ -79,17 +88,19 @@ node[:postgresql][:versions].each do |version| source "recovery.conf.erb" owner "postgres" group "postgres" - mode 0o640 + mode "640" variables :standby_mode => standby_mode, :primary_conninfo => primary_conninfo, :restore_command => restore_command, :passwords => passwords notifies :reload, "service[postgresql]" + only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") } end else template "/var/lib/postgresql/#{version}/main/recovery.conf" do action :delete notifies :reload, "service[postgresql]" + only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") } end end end @@ -103,7 +114,7 @@ ohai_plugin "postgresql" do template "ohai.rb.erb" end -package "ptop" +package "pgtop" package "libdbd-pg-perl" clusters = node[:postgresql][:clusters] || [] @@ -149,3 +160,26 @@ clusters.each do |name, details| conf_variables :port => details[:port] end end + +uris = clusters.collect do |_, details| + "postgres@:#{details[:port]}/postgres?host=/run/postgresql" +end + +template "/etc/prometheus/exporters/postgres_queries.yml" do + source "postgres_queries.yml.erb" + owner "root" + group "root" + mode "644" +end + +prometheus_exporter "postgres" do + port 9187 + scrape_interval "1m" + scrape_timeout "1m" + user "postgres" + options "--extend.query-path=/etc/prometheus/exporters/postgres_queries.yml" + environment "DATA_SOURCE_URI" => uris.sort.uniq.first, + "PG_EXPORTER_AUTO_DISCOVER_DATABASES" => "true", + "PG_EXPORTER_EXCLUDE_DATABASES" => "postgres,template0,template1" + subscribes :restart, "template[/etc/prometheus/exporters/postgres_queries.yml]" +end