[mariadb-operator] Mariadb-cluster chart
This PS adds mariadb-cluster chart based on mariadb-operator. Also for some backward compartibility this PS adds mariadb-backup chart and prometheus-mysql-exporter chart as a separate ones. Change-Id: I3f652375cce2e3b45e095e08d2e6f4ae73b8d8f0
This commit is contained in:
parent
3d64d4c832
commit
29f2b616cc
1
.gitignore
vendored
1
.gitignore
vendored
@ -59,6 +59,7 @@ releasenotes/build
|
||||
# Dev tools
|
||||
.idea/
|
||||
.vscode/
|
||||
.devcontainer/
|
||||
**/.vagrant
|
||||
**/*.log
|
||||
|
||||
|
26
mariadb-backup/Chart.yaml
Normal file
26
mariadb-backup/Chart.yaml
Normal file
@ -0,0 +1,26 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
apiVersion: v1
|
||||
appVersion: v10.6.14
|
||||
description: OpenStack-Helm MariaDB backups
|
||||
name: mariadb-backup
|
||||
version: 0.0.1
|
||||
home: https://mariadb.com/kb/en/
|
||||
icon: http://badges.mariadb.org/mariadb-badge-180x60.png
|
||||
sources:
|
||||
- https://github.com/MariaDB/server
|
||||
- https://opendev.org/openstack/openstack-helm
|
||||
maintainers:
|
||||
- name: OpenStack-Helm Authors
|
||||
...
|
19
mariadb-backup/README.rst
Normal file
19
mariadb-backup/README.rst
Normal file
@ -0,0 +1,19 @@
|
||||
openstack-helm/mariadb-backup
|
||||
======================
|
||||
|
||||
By default, this chart creates a mariadb-backup cronjob that runs in a schedule
|
||||
in order to create mysql backups.
|
||||
|
||||
This chart depends on mariadb-cluster chart.
|
||||
|
||||
The backups are stored in a PVC and also are possible to upload then to a remote
|
||||
RGW container.
|
||||
|
||||
You must ensure that your control nodes that should receive mariadb
|
||||
instances are labeled with ``openstack-control-plane=enabled``, or
|
||||
whatever you have configured in values.yaml for the label
|
||||
configuration:
|
||||
|
||||
::
|
||||
|
||||
kubectl label nodes openstack-control-plane=enabled --all
|
18
mariadb-backup/requirements.yaml
Normal file
18
mariadb-backup/requirements.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
dependencies:
|
||||
- name: helm-toolkit
|
||||
repository: file://../helm-toolkit
|
||||
version: ">= 0.1.0"
|
||||
...
|
584
mariadb-backup/templates/bin/_backup_mariadb.sh.tpl
Normal file
584
mariadb-backup/templates/bin/_backup_mariadb.sh.tpl
Normal file
@ -0,0 +1,584 @@
|
||||
#!/bin/bash
|
||||
|
||||
SCOPE=${1:-"all"}
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
source /tmp/backup_main.sh
|
||||
|
||||
# Export the variables required by the framework
|
||||
# Note: REMOTE_BACKUP_ENABLED, STORAGE_POLICY and CONTAINER_NAME are already
|
||||
# exported.
|
||||
export DB_NAMESPACE=${MARIADB_POD_NAMESPACE}
|
||||
export DB_NAME="mariadb"
|
||||
export LOCAL_DAYS_TO_KEEP=${MARIADB_LOCAL_BACKUP_DAYS_TO_KEEP}
|
||||
export REMOTE_DAYS_TO_KEEP=${MARIADB_REMOTE_BACKUP_DAYS_TO_KEEP}
|
||||
export REMOTE_BACKUP_RETRIES=${NUMBER_OF_RETRIES_SEND_BACKUP_TO_REMOTE}
|
||||
export MIN_DELAY_SEND_REMOTE=${MIN_DELAY_SEND_BACKUP_TO_REMOTE}
|
||||
export MAX_DELAY_SEND_REMOTE=${MAX_DELAY_SEND_BACKUP_TO_REMOTE}
|
||||
export ARCHIVE_DIR=${MARIADB_BACKUP_BASE_DIR}/db/${DB_NAMESPACE}/${DB_NAME}/archive
|
||||
|
||||
# Dump all the database files to existing $TMP_DIR and save logs to $LOG_FILE
|
||||
dump_databases_to_directory() {
|
||||
TMP_DIR=$1
|
||||
LOG_FILE=$2
|
||||
SCOPE=${3:-"all"}
|
||||
|
||||
|
||||
MYSQL="mysql \
|
||||
--defaults-file=/etc/mysql/admin_user.cnf \
|
||||
--connect-timeout 10"
|
||||
|
||||
MYSQLDUMP="mysqldump \
|
||||
--defaults-file=/etc/mysql/admin_user.cnf"
|
||||
|
||||
if [[ "${SCOPE}" == "all" ]]; then
|
||||
MYSQL_DBNAMES=( $($MYSQL --silent --skip-column-names -e \
|
||||
"show databases;" | \
|
||||
grep -ivE 'information_schema|performance_schema|mysql|sys') )
|
||||
else
|
||||
if [[ "${SCOPE}" != "information_schema" && "${SCOPE}" != "performance_schema" && "${SCOPE}" != "mysql" && "${SCOPE}" != "sys" ]]; then
|
||||
MYSQL_DBNAMES=( ${SCOPE} )
|
||||
else
|
||||
log ERROR "It is not allowed to backup database ${SCOPE}."
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
|
||||
#check if there is a database to backup, otherwise exit
|
||||
if [[ -z "${MYSQL_DBNAMES// }" ]]
|
||||
then
|
||||
log INFO "There is no database to backup"
|
||||
return 0
|
||||
fi
|
||||
|
||||
#Create a list of Databases
|
||||
printf "%s\n" "${MYSQL_DBNAMES[@]}" > $TMP_DIR/db.list
|
||||
|
||||
if [[ "${SCOPE}" == "all" ]]; then
|
||||
#Retrieve and create the GRANT file for all the users
|
||||
{{- if .Values.manifests.certificates }}
|
||||
SSL_DSN=";mysql_ssl=1"
|
||||
SSL_DSN="$SSL_DSN;mysql_ssl_client_key=/etc/mysql/certs/tls.key"
|
||||
SSL_DSN="$SSL_DSN;mysql_ssl_client_cert=/etc/mysql/certs/tls.crt"
|
||||
SSL_DSN="$SSL_DSN;mysql_ssl_ca_file=/etc/mysql/certs/ca.crt"
|
||||
if ! pt-show-grants --defaults-file=/etc/mysql/admin_user.cnf $SSL_DSN \
|
||||
{{- else }}
|
||||
if ! pt-show-grants --defaults-file=/etc/mysql/admin_user.cnf \
|
||||
{{- end }}
|
||||
2>>"$LOG_FILE" > "$TMP_DIR"/grants.sql; then
|
||||
log ERROR "Failed to create GRANT for all the users"
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
|
||||
#Retrieve and create the GRANT files per DB
|
||||
for db in "${MYSQL_DBNAMES[@]}"
|
||||
do
|
||||
echo $($MYSQL --skip-column-names -e "select concat('show grants for ',user,';') \
|
||||
from mysql.db where ucase(db)=ucase('$db');") | \
|
||||
sed -r "s/show grants for ([a-zA-Z0-9_-]*)/show grants for '\1'/g" | \
|
||||
$MYSQL --silent --skip-column-names 2>>$LOG_FILE > $TMP_DIR/${db}_grant.sql
|
||||
if [ "$?" -eq 0 ]
|
||||
then
|
||||
sed -i 's/$/;/' $TMP_DIR/${db}_grant.sql
|
||||
else
|
||||
log ERROR "Failed to create GRANT files for ${db}"
|
||||
return 1
|
||||
fi
|
||||
done
|
||||
|
||||
#Dumping the database
|
||||
|
||||
SQL_FILE=mariadb.$MARIADB_POD_NAMESPACE.${SCOPE}
|
||||
|
||||
$MYSQLDUMP $MYSQL_BACKUP_MYSQLDUMP_OPTIONS "${MYSQL_DBNAMES[@]}" \
|
||||
> $TMP_DIR/${SQL_FILE}.sql 2>>$LOG_FILE
|
||||
if [[ $? -eq 0 && -s $TMP_DIR/${SQL_FILE}.sql ]]
|
||||
then
|
||||
log INFO "Database(s) dumped successfully. (SCOPE = ${SCOPE})"
|
||||
return 0
|
||||
else
|
||||
log ERROR "Backup failed and need attention. (SCOPE = ${SCOPE})"
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# functions from mariadb-verifier chart
|
||||
|
||||
get_time_delta_secs () {
|
||||
second_delta=0
|
||||
input_date_second=$( date --date="$1" +%s )
|
||||
if [ -n "$input_date_second" ]; then
|
||||
current_date=$( date +"%Y-%m-%dT%H:%M:%SZ" )
|
||||
current_date_second=$( date --date="$current_date" +%s )
|
||||
((second_delta=current_date_second-input_date_second))
|
||||
if [ "$second_delta" -lt 0 ]; then
|
||||
second_delta=0
|
||||
fi
|
||||
fi
|
||||
echo $second_delta
|
||||
}
|
||||
|
||||
|
||||
check_data_freshness () {
|
||||
archive_file=$(basename "$1")
|
||||
archive_date=$(echo "$archive_file" | cut -d'.' -f 4)
|
||||
SCOPE=$2
|
||||
|
||||
if [[ "${SCOPE}" != "all" ]]; then
|
||||
log "Data freshness check is skipped for individual database."
|
||||
return 0
|
||||
fi
|
||||
|
||||
log "Checking for data freshness in the backups..."
|
||||
# Get some idea of which database.table has changed in the last 30m
|
||||
# Excluding the system DBs and aqua_test_database
|
||||
#
|
||||
changed_tables=$(${MYSQL_LIVE} -e "select TABLE_SCHEMA,TABLE_NAME from \
|
||||
information_schema.tables where UPDATE_TIME >= SUBTIME(now(),'00:30:00') AND TABLE_SCHEMA \
|
||||
NOT IN('information_schema', 'mysql', 'performance_schema', 'sys', 'aqua_test_database');" | \
|
||||
awk '{print $1 "." $2}')
|
||||
|
||||
if [ -n "${changed_tables}" ]; then
|
||||
delta_secs=$(get_time_delta_secs "$archive_date")
|
||||
age_offset={{ .Values.conf.backup.validateData.ageOffset }}
|
||||
((age_threshold=delta_secs+age_offset))
|
||||
|
||||
data_freshness=false
|
||||
skipped_freshness=false
|
||||
|
||||
for table in ${changed_tables}; do
|
||||
tab_schema=$(echo "$table" | awk -F. '{print $1}')
|
||||
tab_name=$(echo "$table" | awk -F. '{print $2}')
|
||||
|
||||
local_table_existed=$(${MYSQL_LOCAL_SHORT_SILENT} -e "select TABLE_SCHEMA,TABLE_NAME from \
|
||||
INFORMATION_SCHEMA.TABLES where TABLE_SCHEMA=\"${tab_schema}\" AND TABLE_NAME=\"${tab_name}\";")
|
||||
|
||||
if [ -n "$local_table_existed" ]; then
|
||||
# TODO: If last updated field of a table structure has different
|
||||
# patterns (updated/timstamp), it may be worth to parameterize the patterns.
|
||||
datetime=$(${MYSQL_LOCAL_SHORT_SILENT} -e "describe ${table};" | \
|
||||
awk '(/updated/ || /timestamp/) && /datetime/ {print $1}')
|
||||
|
||||
if [ -n "${datetime}" ]; then
|
||||
data_ages=$(${MYSQL_LOCAL_SHORT_SILENT} -e "select \
|
||||
time_to_sec(timediff(now(),${datetime})) from ${table} where ${datetime} is not null order by 1 limit 10;")
|
||||
|
||||
for age in $data_ages; do
|
||||
if [ "$age" -le $age_threshold ]; then
|
||||
data_freshness=true
|
||||
break
|
||||
fi
|
||||
done
|
||||
|
||||
# As long as there is an indication of data freshness, no need to check further
|
||||
if [ "$data_freshness" = true ] ; then
|
||||
break
|
||||
fi
|
||||
else
|
||||
skipped_freshness=true
|
||||
log "No indicator to determine data freshness for table $table. Skipped data freshness check."
|
||||
|
||||
# Dumping out table structure to determine if enhancement is needed to include this table
|
||||
debug_info=$(${MYSQL_LOCAL} --skip-column-names -e "describe ${table};" | awk '{print $2 " " $1}')
|
||||
log "$debug_info" "DEBUG"
|
||||
fi
|
||||
else
|
||||
log "Table $table doesn't exist in local database"
|
||||
skipped_freshness=true
|
||||
fi
|
||||
done
|
||||
|
||||
if [ "$data_freshness" = true ] ; then
|
||||
log "Database passed integrity (data freshness) check."
|
||||
else
|
||||
if [ "$skipped_freshness" = false ] ; then
|
||||
log "Local backup database restore failed integrity check." "ERROR"
|
||||
log "The backup may not have captured the up-to-date data." "INFO"
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
else
|
||||
log "No tables changed in this backup. Skipped data freshness check as the"
|
||||
log "check should have been performed by previous validation runs."
|
||||
fi
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
|
||||
cleanup_local_databases () {
|
||||
old_local_dbs=$(${MYSQL_LOCAL_SHORT_SILENT} -e 'show databases;' | \
|
||||
grep -ivE 'information_schema|performance_schema|mysql|sys' || true)
|
||||
|
||||
for db in $old_local_dbs; do
|
||||
${MYSQL_LOCAL_SHORT_SILENT} -e "drop database $db;"
|
||||
done
|
||||
}
|
||||
|
||||
list_archive_dir () {
|
||||
archive_dir_content=$(ls -1R "$ARCHIVE_DIR")
|
||||
if [ -n "$archive_dir_content" ]; then
|
||||
log "Content of $ARCHIVE_DIR"
|
||||
log "${archive_dir_content}"
|
||||
fi
|
||||
}
|
||||
|
||||
remove_remote_archive_file () {
|
||||
archive_file=$(basename "$1")
|
||||
token_req_file=$(mktemp --suffix ".json")
|
||||
header_file=$(mktemp)
|
||||
resp_file=$(mktemp --suffix ".json")
|
||||
http_resp="404"
|
||||
|
||||
HEADER_CONTENT_TYPE="Content-Type: application/json"
|
||||
HEADER_ACCEPT="Accept: application/json"
|
||||
|
||||
cat << JSON_EOF > "$token_req_file"
|
||||
{
|
||||
"auth": {
|
||||
"identity": {
|
||||
"methods": [
|
||||
"password"
|
||||
],
|
||||
"password": {
|
||||
"user": {
|
||||
"domain": {
|
||||
"name": "${OS_USER_DOMAIN_NAME}"
|
||||
},
|
||||
"name": "${OS_USERNAME}",
|
||||
"password": "${OS_PASSWORD}"
|
||||
}
|
||||
}
|
||||
},
|
||||
"scope": {
|
||||
"project": {
|
||||
"domain": {
|
||||
"name": "${OS_PROJECT_DOMAIN_NAME}"
|
||||
},
|
||||
"name": "${OS_PROJECT_NAME}"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
JSON_EOF
|
||||
|
||||
http_resp=$(curl -s -X POST "$OS_AUTH_URL/auth/tokens" -H "${HEADER_CONTENT_TYPE}" \
|
||||
-H "${HEADER_ACCEPT}" -d @"${token_req_file}" -D "$header_file" -o "$resp_file" -w "%{http_code}")
|
||||
|
||||
if [ "$http_resp" = "201" ]; then
|
||||
OS_TOKEN=$(grep -i "x-subject-token" "$header_file" | cut -d' ' -f2 | tr -d "\r")
|
||||
|
||||
if [ -n "$OS_TOKEN" ]; then
|
||||
OS_OBJ_URL=$(python3 -c "import json,sys;print([[ep['url'] for ep in obj['endpoints'] if ep['interface']=='public'] for obj in json.load(sys.stdin)['token']['catalog'] if obj['type']=='object-store'][0][0])" < "$resp_file")
|
||||
|
||||
if [ -n "$OS_OBJ_URL" ]; then
|
||||
http_resp=$(curl -s -X DELETE "$OS_OBJ_URL/$CONTAINER_NAME/$archive_file" \
|
||||
-H "${HEADER_CONTENT_TYPE}" -H "${HEADER_ACCEPT}" \
|
||||
-H "X-Auth-Token: ${OS_TOKEN}" -D "$header_file" -o "$resp_file" -w "%{http_code}")
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "$http_resp" == "404" ] ; then
|
||||
log "Failed to cleanup remote backup. Container object $archive_file is not on RGW."
|
||||
return 1
|
||||
fi
|
||||
|
||||
if [ "$http_resp" != "204" ] ; then
|
||||
log "Failed to cleanup remote backup. Cannot delete container object $archive_file" "ERROR"
|
||||
cat "$header_file"
|
||||
cat "$resp_file"
|
||||
fi
|
||||
return 0
|
||||
}
|
||||
|
||||
handle_bad_archive_file () {
|
||||
archive_file=$1
|
||||
|
||||
if [ ! -d "$BAD_ARCHIVE_DIR" ]; then
|
||||
mkdir -p "$BAD_ARCHIVE_DIR"
|
||||
fi
|
||||
|
||||
# Move the file to quarantine directory such that
|
||||
# file won't be used for restore in case of recovery
|
||||
#
|
||||
log "Moving $i to $BAD_ARCHIVE_DIR..."
|
||||
mv "$i" "$BAD_ARCHIVE_DIR"
|
||||
log "Removing $i from remote RGW..."
|
||||
if remove_remote_archive_file "$i"; then
|
||||
log "File $i has been successfully removed from RGW."
|
||||
else
|
||||
log "FIle $i cannot be removed form RGW." "ERROR"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Atmost only three bad files are kept. Deleting the oldest if
|
||||
# number of files exceeded the threshold.
|
||||
#
|
||||
bad_files=$(find "$BAD_ARCHIVE_DIR" -name "*.tar.gz" 2>/dev/null | wc -l)
|
||||
if [ "$bad_files" -gt 3 ]; then
|
||||
((bad_files=bad_files-3))
|
||||
delete_files=$(find "$BAD_ARCHIVE_DIR" -name "*.tar.gz" 2>/dev/null | sort | head --lines=$bad_files)
|
||||
for b in $delete_files; do
|
||||
log "Deleting $b..."
|
||||
rm -f "${b}"
|
||||
done
|
||||
fi
|
||||
return 0
|
||||
}
|
||||
|
||||
cleanup_old_validation_result_file () {
|
||||
clean_files=$(find "$ARCHIVE_DIR" -maxdepth 1 -name "*.passed" 2>/dev/null)
|
||||
for d in $clean_files; do
|
||||
archive_file=${d/.passed}
|
||||
if [ ! -f "$archive_file" ]; then
|
||||
log "Deleting $d as its associated archive file $archive_file nolonger existed."
|
||||
rm -f "${d}"
|
||||
fi
|
||||
done
|
||||
}
|
||||
|
||||
validate_databases_backup () {
|
||||
archive_file=$1
|
||||
SCOPE=${2:-"all"}
|
||||
|
||||
restore_log='/tmp/restore_error.log'
|
||||
tmp_dir=$(mktemp -d)
|
||||
|
||||
rm -f $restore_log
|
||||
cd "$tmp_dir"
|
||||
log "Decompressing archive $archive_file..."
|
||||
if ! tar zxvf - < "$archive_file" 1>/dev/null; then
|
||||
log "Database restore from local backup failed. Archive decompression failed." "ERROR"
|
||||
return 1
|
||||
fi
|
||||
|
||||
db_list_file="$tmp_dir/db.list"
|
||||
if [[ -e "$db_list_file" ]]; then
|
||||
dbs=$(sort < "$db_list_file" | grep -ivE sys | tr '\n' ' ')
|
||||
else
|
||||
dbs=" "
|
||||
fi
|
||||
|
||||
sql_file="${tmp_dir}/mariadb.${MARIADB_POD_NAMESPACE}.${SCOPE}.sql"
|
||||
|
||||
if [[ "${SCOPE}" == "all" ]]; then
|
||||
grant_file="${tmp_dir}/grants.sql"
|
||||
else
|
||||
grant_file="${tmp_dir}/${SCOPE}_grant.sql"
|
||||
fi
|
||||
|
||||
if [[ -f $sql_file ]]; then
|
||||
if $MYSQL_LOCAL < "$sql_file" 2>$restore_log; then
|
||||
local_dbs=$(${MYSQL_LOCAL_SHORT_SILENT} -e 'show databases;' | \
|
||||
grep -ivE 'information_schema|performance_schema|mysql|sys' | sort | tr '\n' ' ')
|
||||
|
||||
if [ "$dbs" = "$local_dbs" ]; then
|
||||
log "Databases restored successful."
|
||||
else
|
||||
log "Database restore from local backup failed. Database mismatched between local backup and local server" "ERROR"
|
||||
log "Databases restored on local server: $local_dbs" "DEBUG"
|
||||
log "Databases in the local backup: $dbs" "DEBUG"
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
log "Database restore from local backup failed. $dbs" "ERROR"
|
||||
cat $restore_log
|
||||
return 1
|
||||
fi
|
||||
|
||||
if [[ -f $grant_file ]]; then
|
||||
if $MYSQL_LOCAL < "$grant_file" 2>$restore_log; then
|
||||
if ! $MYSQL_LOCAL -e 'flush privileges;'; then
|
||||
log "Database restore from local backup failed. Failed to flush privileges." "ERROR"
|
||||
return 1
|
||||
fi
|
||||
log "Databases permission restored successful."
|
||||
else
|
||||
log "Database restore from local backup failed. Databases permission failed to restore." "ERROR"
|
||||
cat "$restore_log"
|
||||
cat "$grant_file"
|
||||
log "Local DBs: $local_dbs" "DEBUG"
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
log "Database restore from local backup failed. There is no permission file available" "ERROR"
|
||||
return 1
|
||||
fi
|
||||
|
||||
if ! check_data_freshness "$archive_file" ${SCOPE}; then
|
||||
# Log has already generated during check data freshness
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
log "Database restore from local backup failed. There is no database file available to restore from" "ERROR"
|
||||
return 1
|
||||
fi
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
# end of functions form mariadb verifier chart
|
||||
|
||||
# Verify all the databases backup archives
|
||||
verify_databases_backup_archives() {
|
||||
SCOPE=${1:-"all"}
|
||||
|
||||
# verification code
|
||||
export DB_NAME="mariadb"
|
||||
export ARCHIVE_DIR=${MARIADB_BACKUP_BASE_DIR}/db/${MARIADB_POD_NAMESPACE}/${DB_NAME}/archive
|
||||
export BAD_ARCHIVE_DIR=${ARCHIVE_DIR}/quarantine
|
||||
export MYSQL_OPTS="--silent --skip-column-names"
|
||||
export MYSQL_LIVE="mysql --defaults-file=/etc/mysql/admin_user.cnf ${MYSQL_OPTS}"
|
||||
export MYSQL_LOCAL_OPTS="--user=root --host=127.0.0.1"
|
||||
export MYSQL_LOCAL_SHORT="mysql ${MYSQL_LOCAL_OPTS} --connect-timeout 2"
|
||||
export MYSQL_LOCAL_SHORT_SILENT="${MYSQL_LOCAL_SHORT} ${MYSQL_OPTS}"
|
||||
export MYSQL_LOCAL="mysql ${MYSQL_LOCAL_OPTS} --connect-timeout 10"
|
||||
|
||||
max_wait={{ .Values.conf.mariadb_server.setup_wait.iteration }}
|
||||
duration={{ .Values.conf.mariadb_server.setup_wait.duration }}
|
||||
counter=0
|
||||
dbisup=false
|
||||
|
||||
log "Waiting for Mariadb backup verification server to start..."
|
||||
|
||||
# During Mariadb init/startup process, a temporary server is startup
|
||||
# and shutdown prior to starting up the normal server.
|
||||
# To avoid prematurely determine server availability, lets snooze
|
||||
# a bit to give time for the process to complete prior to issue
|
||||
# mysql commands.
|
||||
#
|
||||
|
||||
|
||||
while [ $counter -lt $max_wait ]; do
|
||||
if ! $MYSQL_LOCAL_SHORT -e 'select 1' > /dev/null 2>&1 ; then
|
||||
sleep $duration
|
||||
((counter=counter+1))
|
||||
else
|
||||
# Lets sleep for an additional duration just in case async
|
||||
# init takes a bit more time to complete.
|
||||
#
|
||||
sleep $duration
|
||||
dbisup=true
|
||||
counter=$max_wait
|
||||
fi
|
||||
done
|
||||
|
||||
if ! $dbisup; then
|
||||
log "Mariadb backup verification server is not running" "ERROR"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# During Mariadb init process, a test database will be briefly
|
||||
# created and deleted. Adding to the exclusion list for some
|
||||
# edge cases
|
||||
#
|
||||
clean_db=$(${MYSQL_LOCAL_SHORT_SILENT} -e 'show databases;' | \
|
||||
grep -ivE 'information_schema|performance_schema|mysql|test|sys' || true)
|
||||
|
||||
if [[ -z "${clean_db// }" ]]; then
|
||||
log "Clean Server is up and running"
|
||||
else
|
||||
cleanup_local_databases
|
||||
log "Old databases found on the Mariadb backup verification server were cleaned."
|
||||
clean_db=$(${MYSQL_LOCAL_SHORT_SILENT} -e 'show databases;' | \
|
||||
grep -ivE 'information_schema|performance_schema|mysql|test|sys' || true)
|
||||
|
||||
if [[ -z "${clean_db// }" ]]; then
|
||||
log "Clean Server is up and running"
|
||||
else
|
||||
log "Cannot clean old databases on verification server." "ERROR"
|
||||
return 1
|
||||
fi
|
||||
log "The server is ready for verification."
|
||||
fi
|
||||
|
||||
# Starting with 10.4.13, new definer mariadb.sys was added. However, mariadb.sys was deleted
|
||||
# during init mariadb as it was not on the exclusion list. This corrupted the view of mysql.user.
|
||||
# Insert the tuple back to avoid other similar issues with error i.e
|
||||
# The user specified as a definer ('mariadb.sys'@'localhost') does not exist
|
||||
#
|
||||
# Before insert the tuple mentioned above, we should make sure that the MariaDB version is 10.4.+
|
||||
mariadb_version=$($MYSQL_LOCAL_SHORT -e "status" | grep -E '^Server\s+version:')
|
||||
log "Current database ${mariadb_version}"
|
||||
if [[ ! -z ${mariadb_version} && -z $(grep '10.2' <<< ${mariadb_version}}) ]]; then
|
||||
if [[ -z $(grep 'mariadb.sys' <<< $($MYSQL_LOCAL_SHORT mysql -e "select * from global_priv where user='mariadb.sys'")) ]]; then
|
||||
$MYSQL_LOCAL_SHORT -e "insert into mysql.global_priv values ('localhost','mariadb.sys',\
|
||||
'{\"access\":0,\"plugin\":\"mysql_native_password\",\"authentication_string\":\"\",\"account_locked\":true,\"password_last_changed\":0}');"
|
||||
$MYSQL_LOCAL_SHORT -e 'flush privileges;'
|
||||
fi
|
||||
fi
|
||||
|
||||
# Ensure archive dir existed
|
||||
if [ -d "$ARCHIVE_DIR" ]; then
|
||||
# List archive dir before
|
||||
list_archive_dir
|
||||
|
||||
# Ensure the local databases are clean for each restore validation
|
||||
#
|
||||
cleanup_local_databases
|
||||
|
||||
if [[ "${SCOPE}" == "all" ]]; then
|
||||
archive_files=$(find "$ARCHIVE_DIR" -maxdepth 1 -name "*.tar.gz" 2>/dev/null | sort)
|
||||
for i in $archive_files; do
|
||||
archive_file_passed=$i.passed
|
||||
if [ ! -f "$archive_file_passed" ]; then
|
||||
log "Validating archive file $i..."
|
||||
if validate_databases_backup "$i"; then
|
||||
touch "$archive_file_passed"
|
||||
else
|
||||
if handle_bad_archive_file "$i"; then
|
||||
log "File $i has been removed from RGW."
|
||||
else
|
||||
log "File $i cannot be removed from RGW." "ERROR"
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
done
|
||||
else
|
||||
archive_files=$(find "$ARCHIVE_DIR" -maxdepth 1 -name "*.tar.gz" 2>/dev/null | grep "${SCOPE}" | sort)
|
||||
for i in $archive_files; do
|
||||
archive_file_passed=$i.passed
|
||||
if [ ! -f "$archive_file_passed" ]; then
|
||||
log "Validating archive file $i..."
|
||||
if validate_databases_backup "${i}" "${SCOPE}"; then
|
||||
touch "$archive_file_passed"
|
||||
else
|
||||
if handle_bad_archive_file "$i"; then
|
||||
log "File $i has been removed from RGW."
|
||||
else
|
||||
log "File $i cannot be removed from RGW." "ERROR"
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
done
|
||||
fi
|
||||
|
||||
|
||||
# Cleanup passed files if its archive file nolonger existed
|
||||
cleanup_old_validation_result_file
|
||||
|
||||
# List archive dir after
|
||||
list_archive_dir
|
||||
fi
|
||||
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
# Call main program to start the database backup
|
||||
backup_databases ${SCOPE}
|
328
mariadb-backup/templates/bin/_restore_mariadb.sh.tpl
Executable file
328
mariadb-backup/templates/bin/_restore_mariadb.sh.tpl
Executable file
@ -0,0 +1,328 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
{{- $envAll := . }}
|
||||
|
||||
# Capture the user's command line arguments
|
||||
ARGS=("$@")
|
||||
|
||||
if [[ -s /tmp/restore_main.sh ]]; then
|
||||
source /tmp/restore_main.sh
|
||||
else
|
||||
echo "File /tmp/restore_main.sh does not exist."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Export the variables needed by the framework
|
||||
export DB_NAME="mariadb"
|
||||
export DB_NAMESPACE=${MARIADB_POD_NAMESPACE}
|
||||
export ARCHIVE_DIR=${MARIADB_BACKUP_BASE_DIR}/db/${DB_NAMESPACE}/${DB_NAME}/archive
|
||||
|
||||
RESTORE_USER='restoreuser'
|
||||
RESTORE_PW=$(pwgen 16 1)
|
||||
RESTORE_LOG='/tmp/restore_error.log'
|
||||
rm -f $RESTORE_LOG
|
||||
|
||||
# This is for commands which require admin access
|
||||
MYSQL="mysql \
|
||||
--defaults-file=/etc/mysql/admin_user.cnf \
|
||||
--host=$MARIADB_SERVER_SERVICE_HOST \
|
||||
--connect-timeout 10"
|
||||
|
||||
# This is for commands which we want the temporary "restore" user
|
||||
# to execute
|
||||
RESTORE_CMD="mysql \
|
||||
--user=${RESTORE_USER} \
|
||||
--password=${RESTORE_PW} \
|
||||
--host=$MARIADB_SERVER_SERVICE_HOST \
|
||||
{{- if .Values.manifests.certificates }}
|
||||
--ssl-ca=/etc/mysql/certs/ca.crt \
|
||||
--ssl-key=/etc/mysql/certs/tls.key \
|
||||
--ssl-cert=/etc/mysql/certs/tls.crt \
|
||||
{{- end }}
|
||||
--connect-timeout 10"
|
||||
|
||||
# Get a single database data from the SQL file.
|
||||
# $1 - database name
|
||||
# $2 - sql file path
|
||||
current_db_desc() {
|
||||
PATTERN="-- Current Database:"
|
||||
sed -n "/${PATTERN} \`$1\`/,/${PATTERN}/p" $2
|
||||
}
|
||||
|
||||
#Return all database from an archive
|
||||
get_databases() {
|
||||
TMP_DIR=$1
|
||||
DB_FILE=$2
|
||||
|
||||
if [[ -e ${TMP_DIR}/db.list ]]
|
||||
then
|
||||
DBS=$(cat ${TMP_DIR}/db.list | \
|
||||
grep -ivE 'information_schema|performance_schema|mysql|sys' )
|
||||
else
|
||||
DBS=" "
|
||||
fi
|
||||
|
||||
echo $DBS > $DB_FILE
|
||||
}
|
||||
|
||||
# Determine sql file from 2 options - current and legacy one
|
||||
# if current is not found check that there is no other namespaced dump file
|
||||
# before falling back to legacy one
|
||||
_get_sql_file() {
|
||||
TMP_DIR=$1
|
||||
SQL_FILE="${TMP_DIR}/mariadb.${MARIADB_POD_NAMESPACE}.*.sql"
|
||||
LEGACY_SQL_FILE="${TMP_DIR}/mariadb.*.sql"
|
||||
INVALID_SQL_FILE="${TMP_DIR}/mariadb.*.*.sql"
|
||||
if [ -f ${SQL_FILE} ]
|
||||
then
|
||||
echo "Found $(ls ${SQL_FILE})" > /dev/stderr
|
||||
printf ${SQL_FILE}
|
||||
elif [ -f ${INVALID_SQL_FILE} ]
|
||||
then
|
||||
echo "Expected to find ${SQL_FILE} or ${LEGACY_SQL_FILE}, but found $(ls ${INVALID_SQL_FILE})" > /dev/stderr
|
||||
elif [ -f ${LEGACY_SQL_FILE} ]
|
||||
then
|
||||
echo "Falling back to legacy naming ${LEGACY_SQL_FILE}. Found $(ls ${LEGACY_SQL_FILE})" > /dev/stderr
|
||||
printf ${LEGACY_SQL_FILE}
|
||||
fi
|
||||
}
|
||||
|
||||
# Extract all tables of a database from an archive and put them in the requested
|
||||
# file.
|
||||
get_tables() {
|
||||
DATABASE=$1
|
||||
TMP_DIR=$2
|
||||
TABLE_FILE=$3
|
||||
|
||||
SQL_FILE=$(_get_sql_file $TMP_DIR)
|
||||
if [ ! -z $SQL_FILE ]; then
|
||||
current_db_desc ${DATABASE} ${SQL_FILE} \
|
||||
| grep "^CREATE TABLE" | awk -F '`' '{print $2}' \
|
||||
> $TABLE_FILE
|
||||
else
|
||||
# Error, cannot report the tables
|
||||
echo "No SQL file found - cannot extract the tables"
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Extract all rows in the given table of a database from an archive and put
|
||||
# them in the requested file.
|
||||
get_rows() {
|
||||
DATABASE=$1
|
||||
TABLE=$2
|
||||
TMP_DIR=$3
|
||||
ROW_FILE=$4
|
||||
|
||||
SQL_FILE=$(_get_sql_file $TMP_DIR)
|
||||
if [ ! -z $SQL_FILE ]; then
|
||||
current_db_desc ${DATABASE} ${SQL_FILE} \
|
||||
| grep "INSERT INTO \`${TABLE}\` VALUES" > $ROW_FILE
|
||||
return 0
|
||||
else
|
||||
# Error, cannot report the rows
|
||||
echo "No SQL file found - cannot extract the rows"
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Extract the schema for the given table in the given database belonging to
|
||||
# the archive file found in the TMP_DIR.
|
||||
get_schema() {
|
||||
DATABASE=$1
|
||||
TABLE=$2
|
||||
TMP_DIR=$3
|
||||
SCHEMA_FILE=$4
|
||||
|
||||
SQL_FILE=$(_get_sql_file $TMP_DIR)
|
||||
if [ ! -z $SQL_FILE ]; then
|
||||
DB_FILE=$(mktemp -p /tmp)
|
||||
current_db_desc ${DATABASE} ${SQL_FILE} > ${DB_FILE}
|
||||
sed -n /'CREATE TABLE `'$TABLE'`'/,/'--'/p ${DB_FILE} > ${SCHEMA_FILE}
|
||||
if [[ ! (-s ${SCHEMA_FILE}) ]]; then
|
||||
sed -n /'CREATE TABLE IF NOT EXISTS `'$TABLE'`'/,/'--'/p ${DB_FILE} \
|
||||
> ${SCHEMA_FILE}
|
||||
fi
|
||||
rm -f ${DB_FILE}
|
||||
else
|
||||
# Error, cannot report the rows
|
||||
echo "No SQL file found - cannot extract the schema"
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Create temporary user for restoring specific databases.
|
||||
create_restore_user() {
|
||||
restore_db=$1
|
||||
|
||||
# Ensure any old restore user is removed first, if it exists.
|
||||
# If it doesn't exist it may return error, so do not exit the
|
||||
# script if that's the case.
|
||||
delete_restore_user "dont_exit_on_error"
|
||||
|
||||
$MYSQL --execute="GRANT SELECT ON *.* TO ${RESTORE_USER}@'%' IDENTIFIED BY '${RESTORE_PW}';" 2>>$RESTORE_LOG
|
||||
if [[ "$?" -eq 0 ]]
|
||||
then
|
||||
$MYSQL --execute="GRANT ALL ON ${restore_db}.* TO ${RESTORE_USER}@'%' IDENTIFIED BY '${RESTORE_PW}';" 2>>$RESTORE_LOG
|
||||
if [[ "$?" -ne 0 ]]
|
||||
then
|
||||
cat $RESTORE_LOG
|
||||
echo "Failed to grant restore user ALL permissions on database ${restore_db}"
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
cat $RESTORE_LOG
|
||||
echo "Failed to grant restore user select permissions on all databases"
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Delete temporary restore user
|
||||
delete_restore_user() {
|
||||
error_handling=$1
|
||||
|
||||
$MYSQL --execute="DROP USER ${RESTORE_USER}@'%';" 2>>$RESTORE_LOG
|
||||
if [[ "$?" -ne 0 ]]
|
||||
then
|
||||
if [ "$error_handling" == "exit_on_error" ]
|
||||
then
|
||||
cat $RESTORE_LOG
|
||||
echo "Failed to delete temporary restore user - needs attention to avoid a security hole"
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
#Restore a single database
|
||||
restore_single_db() {
|
||||
SINGLE_DB_NAME=$1
|
||||
TMP_DIR=$2
|
||||
|
||||
if [[ -z "$SINGLE_DB_NAME" ]]
|
||||
then
|
||||
echo "Restore single DB called but with wrong parameter."
|
||||
return 1
|
||||
fi
|
||||
|
||||
SQL_FILE=$(_get_sql_file $TMP_DIR)
|
||||
if [ ! -z $SQL_FILE ]; then
|
||||
# Restoring a single database requires us to create a temporary user
|
||||
# which has capability to only restore that ONE database. One gotcha
|
||||
# is that the mysql command to restore the database is going to throw
|
||||
# errors because of all the other databases that it cannot access. So
|
||||
# because of this reason, the --force option is used to prevent the
|
||||
# command from stopping on an error.
|
||||
create_restore_user $SINGLE_DB_NAME
|
||||
if [[ $? -ne 0 ]]
|
||||
then
|
||||
echo "Restore $SINGLE_DB_NAME failed create restore user."
|
||||
return 1
|
||||
fi
|
||||
$RESTORE_CMD --force < $SQL_FILE 2>>$RESTORE_LOG
|
||||
if [[ "$?" -eq 0 ]]
|
||||
then
|
||||
echo "Database $SINGLE_DB_NAME Restore successful."
|
||||
else
|
||||
cat $RESTORE_LOG
|
||||
delete_restore_user "exit_on_error"
|
||||
echo "Database $SINGLE_DB_NAME Restore failed."
|
||||
return 1
|
||||
fi
|
||||
delete_restore_user "exit_on_error"
|
||||
if [[ $? -ne 0 ]]
|
||||
then
|
||||
echo "Restore $SINGLE_DB_NAME failed delete restore user."
|
||||
return 1
|
||||
fi
|
||||
if [ -f ${TMP_DIR}/${SINGLE_DB_NAME}_grant.sql ]
|
||||
then
|
||||
$MYSQL < ${TMP_DIR}/${SINGLE_DB_NAME}_grant.sql 2>>$RESTORE_LOG
|
||||
if [[ "$?" -eq 0 ]]
|
||||
then
|
||||
if ! $MYSQL --execute="FLUSH PRIVILEGES;"; then
|
||||
echo "Failed to flush privileges for $SINGLE_DB_NAME."
|
||||
return 1
|
||||
fi
|
||||
echo "Database $SINGLE_DB_NAME Permission Restore successful."
|
||||
else
|
||||
cat $RESTORE_LOG
|
||||
echo "Database $SINGLE_DB_NAME Permission Restore failed."
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
echo "There is no permission file available for $SINGLE_DB_NAME"
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
echo "There is no database file available to restore from"
|
||||
return 1
|
||||
fi
|
||||
return 0
|
||||
}
|
||||
|
||||
#Restore all the databases
|
||||
restore_all_dbs() {
|
||||
TMP_DIR=$1
|
||||
|
||||
SQL_FILE=$(_get_sql_file $TMP_DIR)
|
||||
if [ ! -z $SQL_FILE ]; then
|
||||
# Check the scope of the archive.
|
||||
SCOPE=$(echo ${SQL_FILE} | awk -F'.' '{print $(NF-1)}')
|
||||
if [[ "${SCOPE}" != "all" ]]; then
|
||||
# This is just a single database backup. The user should
|
||||
# instead use the single database restore option.
|
||||
echo "Cannot use the restore all option for an archive containing only a single database."
|
||||
echo "Please use the single database restore option."
|
||||
return 1
|
||||
fi
|
||||
|
||||
$MYSQL < $SQL_FILE 2>$RESTORE_LOG
|
||||
if [[ "$?" -eq 0 ]]
|
||||
then
|
||||
echo "Databases $( echo $DBS | tr -d '\n') Restore successful."
|
||||
else
|
||||
cat $RESTORE_LOG
|
||||
echo "Databases $( echo $DBS | tr -d '\n') Restore failed."
|
||||
return 1
|
||||
fi
|
||||
if [[ -f ${TMP_DIR}/grants.sql ]]
|
||||
then
|
||||
$MYSQL < ${TMP_DIR}/grants.sql 2>$RESTORE_LOG
|
||||
if [[ "$?" -eq 0 ]]
|
||||
then
|
||||
if ! $MYSQL --execute="FLUSH PRIVILEGES;"; then
|
||||
echo "Failed to flush privileges."
|
||||
return 1
|
||||
fi
|
||||
echo "Databases Permission Restore successful."
|
||||
else
|
||||
cat $RESTORE_LOG
|
||||
echo "Databases Permission Restore failed."
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
echo "There is no permission file available"
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
echo "There is no database file available to restore from"
|
||||
return 1
|
||||
fi
|
||||
return 0
|
||||
}
|
||||
|
||||
# Call the CLI interpreter, providing the archive directory path and the
|
||||
# user arguments passed in
|
||||
cli_main ${ARGS[@]}
|
@ -0,0 +1,28 @@
|
||||
#!/bin/bash -ex
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
log () {
|
||||
msg_default="Need some text to log"
|
||||
level_default="INFO"
|
||||
component_default="Mariadb Backup Verifier"
|
||||
|
||||
msg=${1:-$msg_default}
|
||||
level=${2:-$level_default}
|
||||
component=${3:-"$component_default"}
|
||||
|
||||
echo "$(date +'%Y-%m-%d %H:%M:%S,%3N') - ${component} - ${level} - ${msg}"
|
||||
}
|
||||
|
||||
log "Starting Mariadb server for backup verification..."
|
||||
MYSQL_ALLOW_EMPTY_PASSWORD=1 nohup bash -x docker-entrypoint.sh mysqld --user=nobody 2>&1
|
45
mariadb-backup/templates/configmap-bin.yaml
Normal file
45
mariadb-backup/templates/configmap-bin.yaml
Normal file
@ -0,0 +1,45 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.configmap_bin }}
|
||||
{{- $envAll := . }}
|
||||
{{ if eq .Values.endpoints.oslo_db.auth.admin.username .Values.endpoints.oslo_db.auth.sst.username }}
|
||||
{{ fail "the DB admin username should not match the sst user username" }}
|
||||
{{ end }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: mariadb-backup-bin
|
||||
data:
|
||||
backup_mariadb.sh: |
|
||||
{{ tuple "bin/_backup_mariadb.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
start_verification_server.sh: |
|
||||
{{ tuple "bin/_start_mariadb_verify_server.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
restore_mariadb.sh: |
|
||||
{{ tuple "bin/_restore_mariadb.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
backup_main.sh: |
|
||||
{{ include "helm-toolkit.scripts.db-backup-restore.backup_main" . | indent 4 }}
|
||||
restore_main.sh: |
|
||||
{{ include "helm-toolkit.scripts.db-backup-restore.restore_main" . | indent 4 }}
|
||||
{{- if .Values.images.local_registry.active }}
|
||||
image-repo-sync.sh: |
|
||||
{{- include "helm-toolkit.scripts.image_repo_sync" . | indent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.manifests.job_ks_user }}
|
||||
ks-user.sh: |
|
||||
{{ include "helm-toolkit.scripts.keystone_user" . | indent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
...
|
24
mariadb-backup/templates/configmap-etc.yaml
Normal file
24
mariadb-backup/templates/configmap-etc.yaml
Normal file
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License" );
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.configmap_etc }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: mariadb-backup-etc
|
||||
data:
|
||||
{{- include "helm-toolkit.snippets.values_template_renderer" (dict "envAll" $envAll "template" ( index $envAll.Values.conf.database "my" ) "key" "my.cnf" ) | indent 2 }}
|
||||
{{- end }}
|
226
mariadb-backup/templates/cron-job-backup-mariadb.yaml
Normal file
226
mariadb-backup/templates/cron-job-backup-mariadb.yaml
Normal file
@ -0,0 +1,226 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.cron_job_mariadb_backup }}
|
||||
{{- $envAll := . }}
|
||||
|
||||
{{- $serviceAccountName := "mariadb-backup" }}
|
||||
{{ tuple $envAll "mariadb_backup" $serviceAccountName | include "helm-toolkit.snippets.kubernetes_pod_rbac_serviceaccount" }}
|
||||
---
|
||||
apiVersion: batch/v1
|
||||
kind: CronJob
|
||||
metadata:
|
||||
name: mariadb-backup
|
||||
annotations:
|
||||
{{ tuple $envAll | include "helm-toolkit.snippets.release_uuid" }}
|
||||
labels:
|
||||
{{ tuple $envAll "mariadb-backup" "backup" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
spec:
|
||||
schedule: {{ .Values.jobs.mariadb_backup.cron | quote }}
|
||||
successfulJobsHistoryLimit: {{ .Values.jobs.mariadb_backup.history.success }}
|
||||
failedJobsHistoryLimit: {{ .Values.jobs.mariadb_backup.history.failed }}
|
||||
concurrencyPolicy: Forbid
|
||||
jobTemplate:
|
||||
metadata:
|
||||
labels:
|
||||
{{ tuple $envAll "mariadb-backup" "backup" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 8 }}
|
||||
annotations:
|
||||
{{ dict "envAll" $envAll "podName" "mariadb-backup" "containerNames" (list "init" "backup-perms" "mariadb-backup") | include "helm-toolkit.snippets.kubernetes_mandatory_access_control_annotation" | indent 8 }}
|
||||
spec:
|
||||
{{- if .Values.jobs.mariadb_backup.backoffLimit }}
|
||||
backoffLimit: {{ .Values.jobs.mariadb_backup.backoffLimit }}
|
||||
{{- end }}
|
||||
{{- if .Values.jobs.mariadb_backup.activeDeadlineSeconds }}
|
||||
activeDeadlineSeconds: {{ .Values.jobs.mariadb_backup.activeDeadlineSeconds }}
|
||||
{{- end }}
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
{{ tuple $envAll "mariadb-backup" "backup" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 12 }}
|
||||
spec:
|
||||
{{ dict "envAll" $envAll "application" "mariadb_backup" | include "helm-toolkit.snippets.kubernetes_pod_security_context" | indent 10 }}
|
||||
restartPolicy: OnFailure
|
||||
serviceAccountName: {{ $serviceAccountName }}
|
||||
shareProcessNamespace: true
|
||||
{{ if $envAll.Values.pod.tolerations.mariadb.enabled }}
|
||||
{{ tuple $envAll "mariadb" | include "helm-toolkit.snippets.kubernetes_tolerations" | indent 10 }}
|
||||
{{ end }}
|
||||
nodeSelector:
|
||||
{{ .Values.labels.job.node_selector_key }}: {{ .Values.labels.job.node_selector_value }}
|
||||
initContainers:
|
||||
{{ tuple $envAll "mariadb_backup" list | include "helm-toolkit.snippets.kubernetes_entrypoint_init_container" | indent 12 }}
|
||||
- name: backup-perms
|
||||
{{ tuple $envAll "mariadb_backup" | include "helm-toolkit.snippets.image" | indent 14 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.jobs.mariadb_backup | include "helm-toolkit.snippets.kubernetes_resources" | indent 14 }}
|
||||
{{ dict "envAll" $envAll "application" "mariadb_backup" "container" "backup_perms" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 14 }}
|
||||
command:
|
||||
- chown
|
||||
- -R
|
||||
- "65534:65534"
|
||||
- $(MARIADB_BACKUP_BASE_DIR)
|
||||
env:
|
||||
- name: MARIADB_BACKUP_BASE_DIR
|
||||
value: {{ .Values.conf.backup.base_path | quote }}
|
||||
volumeMounts:
|
||||
- mountPath: /tmp
|
||||
name: pod-tmp
|
||||
- mountPath: {{ .Values.conf.backup.base_path }}
|
||||
name: mariadb-backup-dir
|
||||
- name: verify-perms
|
||||
{{ tuple $envAll "mariadb_backup" | include "helm-toolkit.snippets.image" | indent 14 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.jobs.mariadb_backup | include "helm-toolkit.snippets.kubernetes_resources" | indent 14 }}
|
||||
{{ dict "envAll" $envAll "application" "mariadb_backup" "container" "verify_perms" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 14 }}
|
||||
command:
|
||||
- chown
|
||||
- -R
|
||||
- "65534:65534"
|
||||
- /var/lib/mysql
|
||||
volumeMounts:
|
||||
- mountPath: /tmp
|
||||
name: pod-tmp
|
||||
- mountPath: /var/lib/mysql
|
||||
name: mysql-data
|
||||
containers:
|
||||
- name: mariadb-backup
|
||||
command:
|
||||
- /bin/sh
|
||||
args:
|
||||
- -c
|
||||
- >-
|
||||
/tmp/backup_mariadb.sh;
|
||||
/usr/bin/pkill mysqld
|
||||
env:
|
||||
- name: MARIADB_BACKUP_BASE_DIR
|
||||
value: {{ .Values.conf.backup.base_path | quote }}
|
||||
- name: MYSQL_BACKUP_MYSQLDUMP_OPTIONS
|
||||
value: {{ .Values.conf.backup.mysqldump_options | quote }}
|
||||
- name: MARIADB_LOCAL_BACKUP_DAYS_TO_KEEP
|
||||
value: {{ .Values.conf.backup.days_to_keep | quote }}
|
||||
- name: MARIADB_POD_NAMESPACE
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.namespace
|
||||
- name: REMOTE_BACKUP_ENABLED
|
||||
value: "{{ .Values.conf.backup.remote_backup.enabled }}"
|
||||
{{- if .Values.conf.backup.remote_backup.enabled }}
|
||||
- name: MARIADB_REMOTE_BACKUP_DAYS_TO_KEEP
|
||||
value: {{ .Values.conf.backup.remote_backup.days_to_keep | quote }}
|
||||
- name: CONTAINER_NAME
|
||||
value: {{ .Values.conf.backup.remote_backup.container_name | quote }}
|
||||
- name: STORAGE_POLICY
|
||||
value: "{{ .Values.conf.backup.remote_backup.storage_policy }}"
|
||||
- name: NUMBER_OF_RETRIES_SEND_BACKUP_TO_REMOTE
|
||||
value: {{ .Values.conf.backup.remote_backup.number_of_retries | quote }}
|
||||
- name: MIN_DELAY_SEND_BACKUP_TO_REMOTE
|
||||
value: {{ .Values.conf.backup.remote_backup.delay_range.min | quote }}
|
||||
- name: MAX_DELAY_SEND_BACKUP_TO_REMOTE
|
||||
value: {{ .Values.conf.backup.remote_backup.delay_range.max | quote }}
|
||||
{{- with $env := dict "ksUserSecret" $envAll.Values.secrets.identity.mariadb }}
|
||||
{{- include "helm-toolkit.snippets.keystone_openrc_env_vars" $env | indent 16 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{ tuple $envAll "mariadb_backup" | include "helm-toolkit.snippets.image" | indent 14 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.jobs.mariadb_backup | include "helm-toolkit.snippets.kubernetes_resources" | indent 14 }}
|
||||
{{ dict "envAll" $envAll "application" "mariadb_backup" "container" "mariadb_backup" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 14 }}
|
||||
volumeMounts:
|
||||
- name: pod-tmp
|
||||
mountPath: /tmp
|
||||
- mountPath: /tmp/backup_mariadb.sh
|
||||
name: mariadb-backup-bin
|
||||
readOnly: true
|
||||
subPath: backup_mariadb.sh
|
||||
- mountPath: /tmp/backup_main.sh
|
||||
name: mariadb-backup-bin
|
||||
readOnly: true
|
||||
subPath: backup_main.sh
|
||||
- mountPath: {{ .Values.conf.backup.base_path }}
|
||||
name: mariadb-backup-dir
|
||||
- name: mariadb-backup-secrets
|
||||
mountPath: /etc/mysql/admin_user.cnf
|
||||
subPath: admin_user.cnf
|
||||
readOnly: true
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal "path" "/etc/mysql/certs" | include "helm-toolkit.snippets.tls_volume_mount" | indent 16 }}
|
||||
- name: mariadb-verify-server
|
||||
{{ tuple $envAll "mariadb" | include "helm-toolkit.snippets.image" | indent 14 }}
|
||||
{{ dict "envAll" $envAll "application" "mariadb_backup" "container" "mariadb_verify_server" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 14 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.server | include "helm-toolkit.snippets.kubernetes_resources" | indent 14 }}
|
||||
env:
|
||||
{{- if $envAll.Values.manifests.certificates }}
|
||||
- name: MARIADB_X509
|
||||
value: "REQUIRE X509"
|
||||
{{- end }}
|
||||
- name: MYSQL_HISTFILE
|
||||
value: /dev/null
|
||||
- name: MARIADB_BACKUP_BASE_DIR
|
||||
value: {{ .Values.conf.backup.base_path | quote }}
|
||||
ports:
|
||||
- name: mysql
|
||||
protocol: TCP
|
||||
containerPort: {{ tuple "oslo_db" "direct" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
command:
|
||||
- /tmp/start_verification_server.sh
|
||||
volumeMounts:
|
||||
- name: pod-tmp
|
||||
mountPath: /tmp
|
||||
- name: var-run
|
||||
mountPath: /var/run/mysqld
|
||||
- name: mycnfd
|
||||
mountPath: /etc/mysql/conf.d
|
||||
- name: mariadb-backup-etc
|
||||
mountPath: /etc/mysql/my.cnf
|
||||
subPath: my.cnf
|
||||
readOnly: true
|
||||
- name: mariadb-backup-secrets
|
||||
mountPath: /etc/mysql/admin_user.cnf
|
||||
subPath: admin_user.cnf
|
||||
readOnly: true
|
||||
- name: mysql-data
|
||||
mountPath: /var/lib/mysql
|
||||
- name: mariadb-backup-bin
|
||||
mountPath: /tmp/start_verification_server.sh
|
||||
readOnly: true
|
||||
subPath: start_verification_server.sh
|
||||
volumes:
|
||||
- name: pod-tmp
|
||||
emptyDir: {}
|
||||
- name: mycnfd
|
||||
emptyDir: {}
|
||||
- name: var-run
|
||||
emptyDir: {}
|
||||
- name: mariadb-backup-etc
|
||||
configMap:
|
||||
name: mariadb-backup-etc
|
||||
defaultMode: 0444
|
||||
- name: mysql-data
|
||||
emptyDir: {}
|
||||
- name: mariadb-backup-secrets
|
||||
secret:
|
||||
secretName: mariadb-backup-secrets
|
||||
defaultMode: 420
|
||||
- configMap:
|
||||
defaultMode: 365
|
||||
name: mariadb-backup-bin
|
||||
name: mariadb-backup-bin
|
||||
{{- if and .Values.volume.backup.enabled .Values.manifests.pvc_backup }}
|
||||
- name: mariadb-backup-dir
|
||||
persistentVolumeClaim:
|
||||
claimName: mariadb-backup-data
|
||||
{{- else }}
|
||||
- hostPath:
|
||||
path: {{ .Values.conf.backup.base_path }}
|
||||
type: DirectoryOrCreate
|
||||
name: mariadb-backup-dir
|
||||
{{- end }}
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal | include "helm-toolkit.snippets.tls_volume" | indent 12 }}
|
||||
{{- end }}
|
22
mariadb-backup/templates/job-image-repo-sync.yaml
Normal file
22
mariadb-backup/templates/job-image-repo-sync.yaml
Normal file
@ -0,0 +1,22 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.job_image_repo_sync .Values.images.local_registry.active }}
|
||||
{{- $serviceName := tuple "oslo_db" "server" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
{{- $imageRepoSyncJob := dict "envAll" . "serviceName" $serviceName -}}
|
||||
{{- if .Values.pod.tolerations.mariadb.enabled -}}
|
||||
{{- $_ := set $imageRepoSyncJob "tolerationsEnabled" true -}}
|
||||
{{- end -}}
|
||||
{{ $imageRepoSyncJob | include "helm-toolkit.manifests.job_image_repo_sync" }}
|
||||
{{- end }}
|
24
mariadb-backup/templates/job-ks-user.yaml
Normal file
24
mariadb-backup/templates/job-ks-user.yaml
Normal file
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.job_ks_user }}
|
||||
{{- $backoffLimit := .Values.jobs.ks_user.backoffLimit }}
|
||||
{{- $activeDeadlineSeconds := .Values.jobs.ks_user.activeDeadlineSeconds }}
|
||||
{{- $serviceName := tuple "oslo_db" "server" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
{{- $ksUserJob := dict "envAll" . "serviceName" $serviceName "configMapBin" "mariadb-backup-bin" "backoffLimit" $backoffLimit "activeDeadlineSeconds" $activeDeadlineSeconds -}}
|
||||
{{- if .Values.pod.tolerations.mariadb.enabled -}}
|
||||
{{- $_ := set $ksUserJob "tolerationsEnabled" true -}}
|
||||
{{- end -}}
|
||||
{{ $ksUserJob | include "helm-toolkit.manifests.job_ks_user" }}
|
||||
{{- end }}
|
29
mariadb-backup/templates/mariadb-backup-pvc.yaml
Normal file
29
mariadb-backup/templates/mariadb-backup-pvc.yaml
Normal file
@ -0,0 +1,29 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.volume.backup.enabled .Values.manifests.pvc_backup }}
|
||||
---
|
||||
kind: PersistentVolumeClaim
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: mariadb-backup-data
|
||||
spec:
|
||||
accessModes: ["ReadWriteOnce"]
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .Values.volume.backup.size }}
|
||||
storageClassName: {{ .Values.volume.backup.class_name }}
|
||||
...
|
||||
{{- end }}
|
||||
|
30
mariadb-backup/templates/secret-backup-restore.yaml
Normal file
30
mariadb-backup/templates/secret-backup-restore.yaml
Normal file
@ -0,0 +1,30 @@
|
||||
{{/*
|
||||
This manifest results a secret being created which has the key information
|
||||
needed for backing up and restoring the Mariadb databases.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.conf.backup.enabled .Values.manifests.secret_backup_restore }}
|
||||
|
||||
{{- $envAll := . }}
|
||||
{{- $userClass := "backup_restore" }}
|
||||
{{- $secretName := index $envAll.Values.secrets.mariadb $userClass }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ $secretName }}
|
||||
type: Opaque
|
||||
data:
|
||||
BACKUP_ENABLED: {{ $envAll.Values.conf.backup.enabled | quote | b64enc }}
|
||||
BACKUP_BASE_PATH: {{ $envAll.Values.conf.backup.base_path | b64enc }}
|
||||
LOCAL_DAYS_TO_KEEP: {{ $envAll.Values.conf.backup.days_to_keep | quote | b64enc }}
|
||||
MYSQLDUMP_OPTIONS: {{ $envAll.Values.conf.backup.mysqldump_options | b64enc }}
|
||||
REMOTE_BACKUP_ENABLED: {{ $envAll.Values.conf.backup.remote_backup.enabled | quote | b64enc }}
|
||||
REMOTE_BACKUP_CONTAINER: {{ $envAll.Values.conf.backup.remote_backup.container_name | b64enc }}
|
||||
REMOTE_BACKUP_DAYS_TO_KEEP: {{ $envAll.Values.conf.backup.remote_backup.days_to_keep | quote | b64enc }}
|
||||
REMOTE_BACKUP_STORAGE_POLICY: {{ $envAll.Values.conf.backup.remote_backup.storage_policy | b64enc }}
|
||||
REMOTE_BACKUP_RETRIES: {{ $envAll.Values.conf.backup.remote_backup.number_of_retries | quote | b64enc }}
|
||||
REMOTE_BACKUP_SEND_DELAY_MIN: {{ $envAll.Values.conf.backup.remote_backup.delay_range.min | quote | b64enc }}
|
||||
REMOTE_BACKUP_SEND_DELAY_MAX: {{ $envAll.Values.conf.backup.remote_backup.delay_range.max | quote | b64enc }}
|
||||
...
|
||||
{{- end }}
|
17
mariadb-backup/templates/secret-registry.yaml
Normal file
17
mariadb-backup/templates/secret-registry.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.secret_registry .Values.endpoints.oci_image_registry.auth.enabled }}
|
||||
{{ include "helm-toolkit.manifests.secret_registry" ( dict "envAll" . "registryUser" .Chart.Name ) }}
|
||||
{{- end }}
|
78
mariadb-backup/templates/secret-rgw.yaml
Normal file
78
mariadb-backup/templates/secret-rgw.yaml
Normal file
@ -0,0 +1,78 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
|
||||
|
||||
This manifest results in two secrets being created:
|
||||
1) Keystone "mariadb" secret, which is needed to access the cluster
|
||||
(remote or same cluster) for storing mariadb backups. If the
|
||||
cluster is remote, the auth_url would be non-null.
|
||||
2) Keystone "admin" secret, which is needed to create the
|
||||
"mariadb" keystone account mentioned above. This may not
|
||||
be needed if the account is in a remote cluster (auth_url is non-null
|
||||
in that case).
|
||||
*/}}
|
||||
|
||||
{{- if .Values.conf.backup.remote_backup.enabled }}
|
||||
|
||||
{{- $envAll := . }}
|
||||
{{- $userClass := "mariadb-server" }}
|
||||
{{- $secretName := index $envAll.Values.secrets.identity $userClass }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ $secretName }}
|
||||
type: Opaque
|
||||
data:
|
||||
{{- $identityClass := index .Values.endpoints.identity.auth $userClass }}
|
||||
{{- if $identityClass.auth_url }}
|
||||
OS_AUTH_URL: {{ $identityClass.auth_url | b64enc }}
|
||||
{{- else }}
|
||||
OS_AUTH_URL: {{ tuple "identity" "internal" "api" $envAll | include "helm-toolkit.endpoints.keystone_endpoint_uri_lookup" | b64enc }}
|
||||
{{- end }}
|
||||
OS_REGION_NAME: {{ $identityClass.region_name | b64enc }}
|
||||
OS_INTERFACE: {{ $identityClass.interface | default "internal" | b64enc }}
|
||||
OS_PROJECT_DOMAIN_NAME: {{ $identityClass.project_domain_name | b64enc }}
|
||||
OS_PROJECT_NAME: {{ $identityClass.project_name | b64enc }}
|
||||
OS_USER_DOMAIN_NAME: {{ $identityClass.user_domain_name | b64enc }}
|
||||
OS_USERNAME: {{ $identityClass.username | b64enc }}
|
||||
OS_PASSWORD: {{ $identityClass.password | b64enc }}
|
||||
OS_DEFAULT_DOMAIN: {{ $identityClass.default_domain_id | default "default" | b64enc }}
|
||||
...
|
||||
{{- if .Values.manifests.job_ks_user }}
|
||||
{{- $userClass := "admin" }}
|
||||
{{- $secretName := index $envAll.Values.secrets.identity $userClass }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ $secretName }}
|
||||
type: Opaque
|
||||
data:
|
||||
{{- $identityClass := index .Values.endpoints.identity.auth $userClass }}
|
||||
{{- if $identityClass.auth_url }}
|
||||
OS_AUTH_URL: {{ $identityClass.auth_url | b64enc }}
|
||||
{{- else }}
|
||||
OS_AUTH_URL: {{ tuple "identity" "internal" "api" $envAll | include "helm-toolkit.endpoints.keystone_endpoint_uri_lookup" | b64enc }}
|
||||
{{- end }}
|
||||
OS_REGION_NAME: {{ $identityClass.region_name | b64enc }}
|
||||
OS_INTERFACE: {{ $identityClass.interface | default "internal" | b64enc }}
|
||||
OS_PROJECT_DOMAIN_NAME: {{ $identityClass.project_domain_name | b64enc }}
|
||||
OS_PROJECT_NAME: {{ $identityClass.project_name | b64enc }}
|
||||
OS_USER_DOMAIN_NAME: {{ $identityClass.user_domain_name | b64enc }}
|
||||
OS_USERNAME: {{ $identityClass.username | b64enc }}
|
||||
OS_PASSWORD: {{ $identityClass.password | b64enc }}
|
||||
OS_DEFAULT_DOMAIN: {{ $identityClass.default_domain_id | default "default" | b64enc }}
|
||||
...
|
||||
{{- end }}
|
||||
{{- end }}
|
26
mariadb-backup/templates/secrets-etc.yaml
Normal file
26
mariadb-backup/templates/secrets-etc.yaml
Normal file
@ -0,0 +1,26 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.secret_etc }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: mariadb-backup-secrets
|
||||
type: Opaque
|
||||
data:
|
||||
admin_user.cnf: {{ tuple "secrets/_admin_user.cnf.tpl" . | include "helm-toolkit.utils.template" | b64enc }}
|
||||
admin_user_internal.cnf: {{ tuple "secrets/_admin_user_internal.cnf.tpl" . | include "helm-toolkit.utils.template" | b64enc }}
|
||||
{{- end }}
|
24
mariadb-backup/templates/secrets/_admin_user.cnf.tpl
Normal file
24
mariadb-backup/templates/secrets/_admin_user.cnf.tpl
Normal file
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
[client]
|
||||
user = {{ .Values.endpoints.oslo_db.auth.admin.username }}
|
||||
password = {{ .Values.endpoints.oslo_db.auth.admin.password }}
|
||||
host = {{ tuple "oslo_db" "direct" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
port = {{ tuple "oslo_db" "direct" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
{{- if .Values.manifests.certificates }}
|
||||
ssl-ca = /etc/mysql/certs/ca.crt
|
||||
ssl-key = /etc/mysql/certs/tls.key
|
||||
ssl-cert = /etc/mysql/certs/tls.crt
|
||||
{{- end }}
|
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
[client]
|
||||
user = {{ .Values.endpoints.oslo_db.auth.admin.username }}
|
||||
password = {{ .Values.endpoints.oslo_db.auth.admin.password }}
|
||||
host = {{ tuple "oslo_db" "internal" . | include "helm-toolkit.endpoints.hostname_fqdn_endpoint_lookup" }}
|
||||
port = {{ tuple "oslo_db" "internal" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
{{- if .Values.manifests.certificates }}
|
||||
ssl-ca = /etc/mysql/certs/ca.crt
|
||||
ssl-key = /etc/mysql/certs/tls.key
|
||||
ssl-cert = /etc/mysql/certs/tls.crt
|
||||
{{- end }}
|
383
mariadb-backup/values.yaml
Normal file
383
mariadb-backup/values.yaml
Normal file
@ -0,0 +1,383 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
# Default values for mariadb.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare name/value pairs to be passed into your templates.
|
||||
# name: value
|
||||
|
||||
---
|
||||
release_group: null
|
||||
|
||||
images:
|
||||
tags:
|
||||
mariadb: docker.io/openstackhelm/mariadb:latest-ubuntu_focal
|
||||
ks_user: docker.io/openstackhelm/heat:wallaby-ubuntu_focal
|
||||
dep_check: quay.io/airshipit/kubernetes-entrypoint:v1.0.0
|
||||
mariadb_backup: quay.io/airshipit/porthole-mysqlclient-utility:latest-ubuntu_focal
|
||||
pull_policy: "IfNotPresent"
|
||||
local_registry:
|
||||
active: false
|
||||
exclude:
|
||||
- dep_check
|
||||
|
||||
labels:
|
||||
server:
|
||||
node_selector_key: openstack-control-plane
|
||||
node_selector_value: enabled
|
||||
job:
|
||||
node_selector_key: openstack-control-plane
|
||||
node_selector_value: enabled
|
||||
|
||||
pod:
|
||||
security_context:
|
||||
server:
|
||||
pod:
|
||||
runAsUser: 999
|
||||
container:
|
||||
perms:
|
||||
runAsUser: 0
|
||||
readOnlyRootFilesystem: true
|
||||
init:
|
||||
runAsUser: 0
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: false
|
||||
agent:
|
||||
runAsUser: 0
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: false
|
||||
mariadb:
|
||||
runAsUser: 0
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: false
|
||||
mariadb_backup:
|
||||
pod:
|
||||
runAsUser: 65534
|
||||
container:
|
||||
backup_perms:
|
||||
runAsUser: 0
|
||||
readOnlyRootFilesystem: true
|
||||
verify_perms:
|
||||
runAsUser: 0
|
||||
readOnlyRootFilesystem: true
|
||||
mariadb_backup:
|
||||
runAsUser: 65534
|
||||
readOnlyRootFilesystem: true
|
||||
allowPrivilegeEscalation: false
|
||||
mariadb_verify_server:
|
||||
runAsUser: 65534
|
||||
readOnlyRootFilesystem: true
|
||||
allowPrivilegeEscalation: false
|
||||
tests:
|
||||
pod:
|
||||
runAsUser: 999
|
||||
container:
|
||||
test:
|
||||
runAsUser: 999
|
||||
readOnlyRootFilesystem: true
|
||||
affinity:
|
||||
anti:
|
||||
type:
|
||||
default: preferredDuringSchedulingIgnoredDuringExecution
|
||||
topologyKey:
|
||||
default: kubernetes.io/hostname
|
||||
weight:
|
||||
default: 10
|
||||
tolerations:
|
||||
mariadb:
|
||||
enabled: false
|
||||
tolerations:
|
||||
- key: node-role.kubernetes.io/master
|
||||
operator: Exists
|
||||
effect: NoSchedule
|
||||
- key: node-role.kubernetes.io/control-plane
|
||||
operator: Exists
|
||||
effect: NoSchedule
|
||||
replicas:
|
||||
server: 3
|
||||
prometheus_mysql_exporter: 1
|
||||
lifecycle:
|
||||
upgrades:
|
||||
deployments:
|
||||
revision_history: 3
|
||||
pod_replacement_strategy: RollingUpdate
|
||||
rolling_update:
|
||||
max_unavailable: 1
|
||||
max_surge: 3
|
||||
termination_grace_period:
|
||||
prometheus_mysql_exporter:
|
||||
timeout: 30
|
||||
error_pages:
|
||||
timeout: 10
|
||||
disruption_budget:
|
||||
mariadb:
|
||||
min_available: 0
|
||||
resources:
|
||||
enabled: false
|
||||
server:
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
jobs:
|
||||
tests:
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
image_repo_sync:
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
mariadb_backup:
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
ks_user:
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
|
||||
dependencies:
|
||||
dynamic:
|
||||
common:
|
||||
local_image_registry:
|
||||
jobs:
|
||||
- mariadb-server-image-repo-sync
|
||||
services:
|
||||
- endpoint: node
|
||||
service: local_image_registry
|
||||
static:
|
||||
mariadb_server_ks_user:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: oslo_db
|
||||
mariadb_backup:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: oslo_db
|
||||
image_repo_sync:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: local_image_registry
|
||||
tests:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: oslo_db
|
||||
|
||||
volume:
|
||||
backup:
|
||||
enabled: true
|
||||
class_name: general
|
||||
size: 5Gi
|
||||
|
||||
jobs:
|
||||
mariadb_backup:
|
||||
# activeDeadlineSeconds == 0 means no deadline
|
||||
activeDeadlineSeconds: 0
|
||||
backoffLimit: 6
|
||||
cron: "0 0 * * *"
|
||||
history:
|
||||
success: 3
|
||||
failed: 1
|
||||
ks_user:
|
||||
# activeDeadlineSeconds == 0 means no deadline
|
||||
activeDeadlineSeconds: 0
|
||||
backoffLimit: 6
|
||||
|
||||
conf:
|
||||
mariadb_server:
|
||||
setup_wait:
|
||||
iteration: 30
|
||||
duration: 5
|
||||
database:
|
||||
my: |
|
||||
[mysqld]
|
||||
datadir=/var/lib/mysql
|
||||
basedir=/usr
|
||||
ignore-db-dirs=lost+found
|
||||
|
||||
[client-server]
|
||||
!includedir /etc/mysql/conf.d/
|
||||
backup:
|
||||
enabled: false
|
||||
base_path: /var/backup
|
||||
validateData:
|
||||
ageOffset: 120
|
||||
mysqldump_options: >
|
||||
--single-transaction --quick --add-drop-database
|
||||
--add-drop-table --add-locks --databases
|
||||
days_to_keep: 3
|
||||
remote_backup:
|
||||
enabled: false
|
||||
container_name: mariadb
|
||||
days_to_keep: 14
|
||||
storage_policy: default-placement
|
||||
number_of_retries: 5
|
||||
delay_range:
|
||||
min: 30
|
||||
max: 60
|
||||
|
||||
secrets:
|
||||
identity:
|
||||
admin: keystone-admin-user
|
||||
mariadb-server: mariadb-backup-user
|
||||
mariadb:
|
||||
backup_restore: mariadb-backup-restore
|
||||
oci_image_registry:
|
||||
mariadb: mariadb-oci-image-registry-key
|
||||
tls:
|
||||
oslo_db:
|
||||
server:
|
||||
public: mariadb-tls-server
|
||||
internal: mariadb-tls-direct
|
||||
|
||||
# typically overridden by environmental
|
||||
# values, but should include all endpoints
|
||||
# required by this chart
|
||||
endpoints:
|
||||
cluster_domain_suffix: cluster.local
|
||||
local_image_registry:
|
||||
name: docker-registry
|
||||
namespace: docker-registry
|
||||
hosts:
|
||||
default: localhost
|
||||
internal: docker-registry
|
||||
node: localhost
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
port:
|
||||
registry:
|
||||
node: 5000
|
||||
oci_image_registry:
|
||||
name: oci-image-registry
|
||||
namespace: oci-image-registry
|
||||
auth:
|
||||
enabled: false
|
||||
mariadb:
|
||||
username: mariadb
|
||||
password: password
|
||||
hosts:
|
||||
default: localhost
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
port:
|
||||
registry:
|
||||
default: null
|
||||
oslo_db:
|
||||
namespace: null
|
||||
auth:
|
||||
admin:
|
||||
username: root
|
||||
password: password
|
||||
sst:
|
||||
username: sst
|
||||
password: password
|
||||
audit:
|
||||
username: audit
|
||||
password: password
|
||||
exporter:
|
||||
username: exporter
|
||||
password: password
|
||||
hosts:
|
||||
default: mariadb-server-primary
|
||||
direct: mariadb-server-internal
|
||||
discovery: mariadb-discovery
|
||||
server: mariadb-server
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path: null
|
||||
scheme: mysql+pymysql
|
||||
port:
|
||||
mysql:
|
||||
default: 3306
|
||||
wsrep:
|
||||
default: 4567
|
||||
identity:
|
||||
name: backup-storage-auth
|
||||
namespace: openstack
|
||||
auth:
|
||||
admin:
|
||||
# Auth URL of null indicates local authentication
|
||||
# HTK will form the URL unless specified here
|
||||
auth_url: null
|
||||
region_name: RegionOne
|
||||
username: admin
|
||||
password: password
|
||||
project_name: admin
|
||||
user_domain_name: default
|
||||
project_domain_name: default
|
||||
mariadb:
|
||||
# Auth URL of null indicates local authentication
|
||||
# HTK will form the URL unless specified here
|
||||
auth_url: null
|
||||
role: admin
|
||||
region_name: RegionOne
|
||||
username: mariadb-backup-user
|
||||
password: password
|
||||
project_name: service
|
||||
user_domain_name: service
|
||||
project_domain_name: service
|
||||
hosts:
|
||||
default: keystone
|
||||
internal: keystone-api
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: /v3
|
||||
scheme:
|
||||
default: 'http'
|
||||
port:
|
||||
api:
|
||||
default: 80
|
||||
internal: 5000
|
||||
|
||||
network_policy:
|
||||
mariadb:
|
||||
ingress:
|
||||
- {}
|
||||
egress:
|
||||
- {}
|
||||
|
||||
# Helm hook breaks for helm2.
|
||||
# Set helm3_hook: false in case helm2 is used.
|
||||
helm3_hook: true
|
||||
|
||||
manifests:
|
||||
certificates: false
|
||||
configmap_bin: true
|
||||
configmap_etc: true
|
||||
job_ks_user: false
|
||||
cron_job_mariadb_backup: true
|
||||
pvc_backup: true
|
||||
network_policy: false
|
||||
pod_test: true
|
||||
secret_dbadmin_password: true
|
||||
secret_sst_password: true
|
||||
secret_dbaudit_password: true
|
||||
secret_backup_restore: true
|
||||
secret_etc: true
|
||||
|
||||
...
|
18
mariadb-backup/values_overrides/2023.1-ubuntu_focal.yaml
Normal file
18
mariadb-backup/values_overrides/2023.1-ubuntu_focal.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:2023.1-ubuntu_focal
|
||||
ks_user: docker.io/openstackhelm/heat:2023.1-ubuntu_focal
|
||||
...
|
18
mariadb-backup/values_overrides/2023.2-ubuntu_jammy.yaml
Normal file
18
mariadb-backup/values_overrides/2023.2-ubuntu_jammy.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:2023.2-ubuntu_jammy
|
||||
ks_user: docker.io/openstackhelm/heat:2023.2-ubuntu_jammy
|
||||
...
|
15
mariadb-backup/values_overrides/apparmor.yaml
Normal file
15
mariadb-backup/values_overrides/apparmor.yaml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
pod:
|
||||
mandatory_access_control:
|
||||
type: apparmor
|
||||
mariadb-backup:
|
||||
init: runtime/default
|
||||
mariadb-backup: runtime/default
|
||||
mariadb-verify-server: runtime/default
|
||||
create-sql-user:
|
||||
init: runtime/default
|
||||
exporter-create-sql-user: runtime/default
|
||||
|
||||
manifests:
|
||||
cron_job_mariadb_backup: true
|
||||
...
|
15
mariadb-backup/values_overrides/backups.yaml
Normal file
15
mariadb-backup/values_overrides/backups.yaml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
conf:
|
||||
backup:
|
||||
enabled: true
|
||||
remote_backup:
|
||||
enabled: false
|
||||
volume:
|
||||
backup:
|
||||
enabled: true
|
||||
manifests:
|
||||
pvc_backup: true
|
||||
job_ks_user: false
|
||||
cron_job_mariadb_backup: true
|
||||
secret_backup_restore: true
|
||||
...
|
13
mariadb-backup/values_overrides/tls.yaml
Normal file
13
mariadb-backup/values_overrides/tls.yaml
Normal file
@ -0,0 +1,13 @@
|
||||
---
|
||||
endpoints:
|
||||
oslo_db:
|
||||
host_fqdn_override:
|
||||
default:
|
||||
tls:
|
||||
secretName: mariadb-tls-direct
|
||||
issuerRef:
|
||||
name: ca-issuer
|
||||
kind: ClusterIssuer
|
||||
manifests:
|
||||
certificates: true
|
||||
...
|
19
mariadb-backup/values_overrides/ubuntu_focal.yaml
Normal file
19
mariadb-backup/values_overrides/ubuntu_focal.yaml
Normal file
@ -0,0 +1,19 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
mariadb: docker.io/openstackhelm/mariadb:latest-ubuntu_focal
|
||||
ks_user: docker.io/openstackhelm/heat:wallaby-ubuntu_focal
|
||||
mariadb_backup: quay.io/airshipit/porthole-mysqlclient-utility:latest-ubuntu_focal
|
||||
...
|
21
mariadb-cluster/.helmignore
Normal file
21
mariadb-cluster/.helmignore
Normal file
@ -0,0 +1,21 @@
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
27
mariadb-cluster/Chart.yaml
Normal file
27
mariadb-cluster/Chart.yaml
Normal file
@ -0,0 +1,27 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
apiVersion: v1
|
||||
appVersion: v10.6.14
|
||||
description: OpenStack-Helm MariaDB controlled by mariadb-operator
|
||||
name: mariadb-cluster
|
||||
version: 0.0.1
|
||||
home: https://mariadb.com/kb/en/
|
||||
icon: http://badges.mariadb.org/mariadb-badge-180x60.png
|
||||
sources:
|
||||
- https://github.com/MariaDB/server
|
||||
- https://github.com/mariadb-operator/mariadb-operator
|
||||
- https://opendev.org/openstack/openstack-helm
|
||||
maintainers:
|
||||
- name: OpenStack-Helm Authors
|
||||
...
|
18
mariadb-cluster/README.rst
Normal file
18
mariadb-cluster/README.rst
Normal file
@ -0,0 +1,18 @@
|
||||
openstack-helm/mariadb
|
||||
======================
|
||||
|
||||
By default, this chart creates a 3-member mariadb galera cluster.
|
||||
|
||||
This chart depends on mariadb-operator chart.
|
||||
|
||||
The StatefulSets all leverage PVCs to provide stateful storage to
|
||||
``/var/lib/mysql``.
|
||||
|
||||
You must ensure that your control nodes that should receive mariadb
|
||||
instances are labeled with ``openstack-control-plane=enabled``, or
|
||||
whatever you have configured in values.yaml for the label
|
||||
configuration:
|
||||
|
||||
::
|
||||
|
||||
kubectl label nodes openstack-control-plane=enabled --all
|
18
mariadb-cluster/requirements.yaml
Normal file
18
mariadb-cluster/requirements.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
dependencies:
|
||||
- name: helm-toolkit
|
||||
repository: file://../helm-toolkit
|
||||
version: ">= 0.1.0"
|
||||
...
|
68
mariadb-cluster/templates/bin/_liveness.sh.tpl
Normal file
68
mariadb-cluster/templates/bin/_liveness.sh.tpl
Normal file
@ -0,0 +1,68 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
set -e
|
||||
|
||||
MYSQL="mariadb \
|
||||
--defaults-file=/etc/mysql/admin_user.cnf \
|
||||
--host=localhost \
|
||||
{{- if .Values.manifests.certificates }}
|
||||
--ssl-verify-server-cert=false \
|
||||
--ssl-ca=/etc/mysql/certs/ca.crt \
|
||||
--ssl-key=/etc/mysql/certs/tls.key \
|
||||
--ssl-cert=/etc/mysql/certs/tls.crt \
|
||||
{{- end }}
|
||||
--connect-timeout 2"
|
||||
|
||||
mysql_status_query () {
|
||||
STATUS=$1
|
||||
$MYSQL -e "show status like \"${STATUS}\"" | \
|
||||
awk "/${STATUS}/ { print \$NF; exit }"
|
||||
}
|
||||
|
||||
{{- if eq (int .Values.pod.replicas.server) 1 }}
|
||||
if ! $MYSQL -e 'select 1' > /dev/null 2>&1 ; then
|
||||
exit 1
|
||||
fi
|
||||
|
||||
{{- else }}
|
||||
# if [ -f /var/lib/mysql/sst_in_progress ]; then
|
||||
# # SST in progress, with this node receiving a snapshot.
|
||||
# # MariaDB won't be up yet; avoid killing.
|
||||
# exit 0
|
||||
# fi
|
||||
|
||||
if [ "x$(mysql_status_query wsrep_ready)" != "xON" ]; then
|
||||
# WSREP says the node can receive queries
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ "x$(mysql_status_query wsrep_connected)" != "xON" ]; then
|
||||
# WSREP connected
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ "x$(mysql_status_query wsrep_cluster_status)" != "xPrimary" ]; then
|
||||
# Not in primary cluster
|
||||
exit 1
|
||||
fi
|
||||
|
||||
wsrep_local_state_comment=$(mysql_status_query wsrep_local_state_comment)
|
||||
if [ "x${wsrep_local_state_comment}" != "xSynced" ] && [ "x${wsrep_local_state_comment}" != "xDonor/Desynced" ]; then
|
||||
# WSREP not synced or not sending SST
|
||||
exit 1
|
||||
fi
|
||||
{{- end }}
|
60
mariadb-cluster/templates/bin/_readiness.sh.tpl
Normal file
60
mariadb-cluster/templates/bin/_readiness.sh.tpl
Normal file
@ -0,0 +1,60 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
set -e
|
||||
|
||||
MYSQL="mariadb \
|
||||
--defaults-file=/etc/mysql/admin_user.cnf \
|
||||
--host=localhost \
|
||||
{{- if .Values.manifests.certificates }}
|
||||
--ssl-verify-server-cert=false \
|
||||
--ssl-ca=/etc/mysql/certs/ca.crt \
|
||||
--ssl-key=/etc/mysql/certs/tls.key \
|
||||
--ssl-cert=/etc/mysql/certs/tls.crt \
|
||||
{{- end }}
|
||||
--connect-timeout 2"
|
||||
|
||||
mysql_status_query () {
|
||||
STATUS=$1
|
||||
$MYSQL -e "show status like \"${STATUS}\"" | \
|
||||
awk "/${STATUS}/ { print \$NF; exit }"
|
||||
}
|
||||
|
||||
if ! $MYSQL -e 'select 1' > /dev/null 2>&1 ; then
|
||||
exit 1
|
||||
fi
|
||||
|
||||
{{- if gt (int .Values.pod.replicas.server) 1 }}
|
||||
if [ "x$(mysql_status_query wsrep_ready)" != "xON" ]; then
|
||||
# WSREP says the node can receive queries
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ "x$(mysql_status_query wsrep_connected)" != "xON" ]; then
|
||||
# WSREP connected
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ "x$(mysql_status_query wsrep_cluster_status)" != "xPrimary" ]; then
|
||||
# Not in primary cluster
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ "x$(mysql_status_query wsrep_local_state_comment)" != "xSynced" ]; then
|
||||
# WSREP not synced
|
||||
exit 1
|
||||
fi
|
||||
{{- end }}
|
27
mariadb-cluster/templates/bin/_test.sh.tpl
Normal file
27
mariadb-cluster/templates/bin/_test.sh.tpl
Normal file
@ -0,0 +1,27 @@
|
||||
#!/bin/bash
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
set -ex
|
||||
|
||||
rm -f /tmp/test-success
|
||||
|
||||
mysqlslap \
|
||||
--defaults-file=/etc/mysql/test-params.cnf \
|
||||
{{ include "helm-toolkit.utils.joinListWithSpace" $.Values.conf.tests.params }} -vv \
|
||||
--post-system="touch /tmp/test-success"
|
||||
|
||||
if ! [ -f /tmp/test-success ]; then
|
||||
exit 1
|
||||
fi
|
17
mariadb-cluster/templates/certificates.yaml
Normal file
17
mariadb-cluster/templates/certificates.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.certificates -}}
|
||||
{{ dict "envAll" . "service" "oslo_db" "type" "default" | include "helm-toolkit.manifests.certificates" }}
|
||||
{{- end -}}
|
41
mariadb-cluster/templates/configmap-bin.yaml
Normal file
41
mariadb-cluster/templates/configmap-bin.yaml
Normal file
@ -0,0 +1,41 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.configmap_bin }}
|
||||
{{- $envAll := . }}
|
||||
{{ if eq .Values.endpoints.oslo_db.auth.admin.username .Values.endpoints.oslo_db.auth.sst.username }}
|
||||
{{ fail "the DB admin username should not match the sst user username" }}
|
||||
{{ end }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: mariadb-bin
|
||||
data:
|
||||
{{- if .Values.images.local_registry.active }}
|
||||
image-repo-sync.sh: |
|
||||
{{- include "helm-toolkit.scripts.image_repo_sync" . | indent 4 }}
|
||||
{{- end }}
|
||||
{{- include "helm-toolkit.snippets.values_template_renderer" (dict "envAll" $envAll "template" ( index $envAll.Values.conf.database "init_script" ) "key" "init.sh" ) | indent 2 }}
|
||||
readiness.sh: |
|
||||
{{ tuple "bin/_readiness.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
liveness.sh: |
|
||||
{{ tuple "bin/_liveness.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
test.sh: |
|
||||
{{ tuple "bin/_test.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
{{- if .Values.manifests.job_ks_user }}
|
||||
ks-user.sh: |
|
||||
{{ include "helm-toolkit.scripts.keystone_user" . | indent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
24
mariadb-cluster/templates/configmap-etc.yaml
Normal file
24
mariadb-cluster/templates/configmap-etc.yaml
Normal file
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License" );
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.configmap_etc }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: mariadb-etc
|
||||
data:
|
||||
{{- include "helm-toolkit.snippets.values_template_renderer" (dict "envAll" $envAll "template" ( index $envAll.Values.conf.database "my" ) "key" "my.cnf" ) | indent 2 }}
|
||||
{{- end }}
|
22
mariadb-cluster/templates/job-image-repo-sync.yaml
Normal file
22
mariadb-cluster/templates/job-image-repo-sync.yaml
Normal file
@ -0,0 +1,22 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.job_image_repo_sync .Values.images.local_registry.active }}
|
||||
{{- $serviceName := tuple "oslo_db" "server" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
{{- $imageRepoSyncJob := dict "envAll" . "serviceName" $serviceName -}}
|
||||
{{- if .Values.pod.tolerations.mariadb.enabled -}}
|
||||
{{- $_ := set $imageRepoSyncJob "tolerationsEnabled" true -}}
|
||||
{{- end -}}
|
||||
{{ $imageRepoSyncJob | include "helm-toolkit.manifests.job_image_repo_sync" }}
|
||||
{{- end }}
|
105
mariadb-cluster/templates/job-refresh-statefulset.yaml
Normal file
105
mariadb-cluster/templates/job-refresh-statefulset.yaml
Normal file
@ -0,0 +1,105 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.mariadb }}
|
||||
{{- $envAll := . }}
|
||||
|
||||
{{- $serviceAccountName := "mariadb-cluster-refresh-statefulset" }}
|
||||
{{ tuple $envAll "mariadb_cluster_refresh_statefulset" $serviceAccountName | include "helm-toolkit.snippets.kubernetes_pod_rbac_serviceaccount" }}
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: {{ $serviceAccountName }}
|
||||
namespace: {{ $envAll.Release.Namespace }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
- extensions
|
||||
- batch
|
||||
- apps
|
||||
resources:
|
||||
- statefulsets
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- delete
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: {{ $serviceAccountName }}
|
||||
namespace: {{ $envAll.Release.Namespace }}
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: Role
|
||||
name: {{ $serviceAccountName }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ $serviceAccountName }}
|
||||
namespace: {{ $envAll.Release.Namespace }}
|
||||
---
|
||||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
name: mariadb-cluster-refresh-statefulset
|
||||
labels:
|
||||
{{ tuple $envAll "mariadb-cluster" "refresh-statefulset" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
{{- if .Values.helm3_hook }}
|
||||
annotations:
|
||||
"helm.sh/hook": "post-upgrade"
|
||||
"helm.sh/hook-weight": "5"
|
||||
"helm.sh/hook-delete-policy": "before-hook-creation"
|
||||
{{- end }}
|
||||
spec:
|
||||
backoffLimit: {{ .Values.jobs.mariadb_cluster_refresh_statefulset.backoffLimit }}
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
{{ tuple $envAll "mariadb-cluster" "refresh-statefulset" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 8 }}
|
||||
annotations:
|
||||
{{ tuple $envAll | include "helm-toolkit.snippets.release_uuid" | indent 8 }}
|
||||
{{ dict "envAll" $envAll "podName" "" "containerNames" (list "init" "exporter-create-sql-user") | include "helm-toolkit.snippets.kubernetes_mandatory_access_control_annotation" | indent 8 }}
|
||||
spec:
|
||||
shareProcessNamespace: true
|
||||
serviceAccountName: {{ $serviceAccountName }}
|
||||
{{ dict "envAll" $envAll "application" "job" | include "helm-toolkit.snippets.kubernetes_pod_security_context" | indent 6 }}
|
||||
activeDeadlineSeconds: {{ .Values.jobs.mariadb_cluster_refresh_statefulset.activeDeadlineSeconds }}
|
||||
restartPolicy: OnFailure
|
||||
nodeSelector:
|
||||
{{ .Values.labels.job.node_selector_key }}: {{ .Values.labels.job.node_selector_value }}
|
||||
initContainers:
|
||||
{{ tuple $envAll "mariadb_cluster_refresh_statefulset" list | include "helm-toolkit.snippets.kubernetes_entrypoint_init_container" | indent 8 }}
|
||||
containers:
|
||||
- name: refresh-statefulset
|
||||
{{ tuple $envAll "mariadb_cluster_refresh_statefulset" | include "helm-toolkit.snippets.image" | indent 10 }}
|
||||
{{ dict "envAll" $envAll "application" "mariadb_cluster_refresh_statefulset" "container" "main" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 10 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.jobs.mariadb_cluster_refresh_statefulset | include "helm-toolkit.snippets.kubernetes_resources" | indent 10 }}
|
||||
command: ["/bin/sh", "-c"]
|
||||
args: ["kubectl delete statefulset ${STATEFULSET_NAME} --namespace=${NAMESPACE}"]
|
||||
env:
|
||||
- name: STATEFULSET_NAME
|
||||
value: {{ tuple "oslo_db" "server" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
- name: NAMESPACE
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
apiVersion: v1
|
||||
fieldPath: metadata.namespace
|
||||
volumeMounts:
|
||||
- name: pod-tmp
|
||||
mountPath: /tmp
|
||||
volumes:
|
||||
- name: pod-tmp
|
||||
emptyDir: {}
|
||||
{{- end }}
|
225
mariadb-cluster/templates/mariadb.yaml
Normal file
225
mariadb-cluster/templates/mariadb.yaml
Normal file
@ -0,0 +1,225 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- define "mariadbReadinessProbe" }}
|
||||
exec:
|
||||
command:
|
||||
- /tmp/readiness.sh
|
||||
{{- end }}
|
||||
{{- define "mariadbLivenessProbe" }}
|
||||
exec:
|
||||
command:
|
||||
- /tmp/liveness.sh
|
||||
{{- end }}
|
||||
|
||||
{{- if (.Values.global).subchart_release_name }}
|
||||
{{- $_ := set . "deployment_name" .Chart.Name }}
|
||||
{{- else }}
|
||||
{{- $_ := set . "deployment_name" .Release.Name }}
|
||||
{{- end }}
|
||||
|
||||
{{- if .Values.manifests.mariadb }}
|
||||
{{- $envAll := . }}
|
||||
|
||||
---
|
||||
apiVersion: mariadb.mmontes.io/v1alpha1
|
||||
kind: MariaDB
|
||||
metadata:
|
||||
# NOTE(portdirect): the statefulset name must match the POD_NAME_PREFIX env var for discovery to work
|
||||
name: {{ tuple "oslo_db" "server" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
annotations:
|
||||
{{ tuple $envAll | include "helm-toolkit.snippets.release_uuid" }}
|
||||
mariadb-dbadmin-password-hash: {{ tuple "secret-dbadmin-password.yaml" . | include "helm-toolkit.utils.hash" }}
|
||||
labels:
|
||||
{{ tuple $envAll "mariadb" "server" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
spec:
|
||||
rootPasswordSecretKeyRef:
|
||||
name: mariadb-dbadmin-password
|
||||
key: MYSQL_DBADMIN_PASSWORD
|
||||
|
||||
{{ tuple $envAll "mariadb" | include "helm-toolkit.snippets.image" | indent 2 }}
|
||||
|
||||
initContainers:
|
||||
- command:
|
||||
- /tmp/init.sh
|
||||
{{ tuple $envAll "mariadb" | include "helm-toolkit.snippets.image" | indent 6 }}
|
||||
{{ dict "envAll" $envAll "application" "server" "container" "perms" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 6 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.server | include "helm-toolkit.snippets.kubernetes_resources" | indent 6 }}
|
||||
|
||||
{{ if $envAll.Values.conf.galera.enabled }}
|
||||
galera:
|
||||
enabled: true
|
||||
primary:
|
||||
podIndex: {{ .Values.conf.galera.primary.podIndex }}
|
||||
automaticFailover: {{ .Values.conf.galera.primary.automaticFailover }}
|
||||
sst: {{ .Values.conf.galera.sst }}
|
||||
replicaThreads: {{ .Values.conf.galera.replicaThreads }}
|
||||
agent:
|
||||
{{ tuple $envAll "agent" | include "helm-toolkit.snippets.image" | indent 6 }}
|
||||
{{- dict "envAll" $envAll "application" "server" "container" "agent" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 6 }}
|
||||
args:
|
||||
- '--graceful-shutdown-timeout=5s'
|
||||
- '--recovery-timeout=5m0s'
|
||||
- '-log-dev'
|
||||
- '-log-level=debug'
|
||||
port: {{ .Values.conf.galera.agent.port }}
|
||||
{{- if $envAll.Values.conf.galera.agent.kubernetesAuth.enabled }}
|
||||
kubernetesAuth:
|
||||
enabled: true
|
||||
{{- end }}
|
||||
gracefulShutdownTimeout: {{ .Values.conf.galera.agent.gracefulShutdownTimeout }}
|
||||
{{- if $envAll.Values.conf.galera.recovery.enabled }}
|
||||
recovery:
|
||||
enabled: true
|
||||
clusterHealthyTimeout: {{ .Values.conf.galera.recovery.clusterHealthyTimeout }}
|
||||
clusterBootstrapTimeout: {{ .Values.conf.galera.recovery.clusterBootstrapTimeout }}
|
||||
podRecoveryTimeout: {{ .Values.conf.galera.recovery.podRecoveryTimeout }}
|
||||
podSyncTimeout: {{ .Values.conf.galera.recovery.podSyncTimeout }}
|
||||
{{- end }}
|
||||
initContainer:
|
||||
{{ tuple $envAll "initContainer" | include "helm-toolkit.snippets.image" | indent 6 }}
|
||||
{{- dict "envAll" $envAll "application" "server" "container" "init" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 6 }}
|
||||
args:
|
||||
- '-log-dev'
|
||||
- '-log-level=debug'
|
||||
# galera volume templates
|
||||
volumeClaimTemplate:
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .Values.volume.galera.size }}
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
storageClassName: {{ .Values.volume.galera.class_name }}
|
||||
{{ end }}
|
||||
|
||||
{{ include "helm-toolkit.snippets.values_template_renderer" (dict "envAll" $envAll "template" ( index $envAll.Values.conf.database "galera" ) "key" "myCnf" ) | indent 2 }}
|
||||
|
||||
replicas: {{ .Values.pod.replicas.server }}
|
||||
|
||||
affinity:
|
||||
{{- tuple $envAll "mariadb" "server" | include "helm-toolkit.snippets.kubernetes_pod_anti_affinity" | indent 4 }}
|
||||
|
||||
{{ if $envAll.Values.pod.tolerations.mariadb.enabled }}
|
||||
{{- tuple $envAll "mariadb" | include "helm-toolkit.snippets.kubernetes_tolerations" | indent 2 }}
|
||||
{{- end }}
|
||||
|
||||
updateStrategy:
|
||||
type: {{ .Values.pod.lifecycle.upgrades.deployments.pod_replacement_strategy }}
|
||||
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.server | include "helm-toolkit.snippets.kubernetes_resources" | indent 2 }}
|
||||
{{ dict "envAll" $envAll "application" "server" "container" "mariadb" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 2 }}
|
||||
|
||||
nodeSelector:
|
||||
{{ .Values.labels.server.node_selector_key }}: {{ .Values.labels.server.node_selector_value }}
|
||||
|
||||
podAnnotations:
|
||||
{{- dict "envAll" $envAll "podName" "mariadb-server" "containerNames" (list "init-0" "init" "agent" "mariadb") | include "helm-toolkit.snippets.kubernetes_mandatory_access_control_annotation" | indent 4 }}
|
||||
|
||||
podDisruptionBudget:
|
||||
minAvailable: {{ .Values.pod.lifecycle.disruption_budget.mariadb.min_available }}
|
||||
|
||||
{{ dict "envAll" . "component" "server" "container" "mariadb" "type" "readiness" "probeTemplate" (include "mariadbReadinessProbe" . | fromYaml) | include "helm-toolkit.snippets.kubernetes_probe" | indent 2 }}
|
||||
|
||||
{{ dict "envAll" . "component" "server" "container" "mariadb" "type" "liveness" "probeTemplate" (include "mariadbLivenessProbe" . | fromYaml) | include "helm-toolkit.snippets.kubernetes_probe" | indent 2 }}
|
||||
|
||||
{{ if .Values.monitoring.prometheus.enabled }}
|
||||
metrics:
|
||||
exporter:
|
||||
{{ tuple $envAll "prometheus_mysql_exporter" | include "helm-toolkit.snippets.image" | indent 6 }}
|
||||
{{ dict "envAll" $envAll "application" "prometheus_mysql_exporter" "container" "exporter" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 6 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.prometheus_mysql_exporter | include "helm-toolkit.snippets.kubernetes_resources" | indent 6 }}
|
||||
port: {{ tuple "prometheus_mysql_exporter" "internal" "metrics" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
{{- if $envAll.Values.manifests.certificates }}
|
||||
volumeMounts:
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal "path" "/etc/mysql/certs" | include "helm-toolkit.snippets.tls_volume_mount" | indent 8 }}
|
||||
{{- end }}
|
||||
serviceMonitor:
|
||||
prometheusRelease: prometheus-mysql-exporter
|
||||
interval: 10s
|
||||
scrapeTimeout: 10s
|
||||
{{ end }}
|
||||
|
||||
env:
|
||||
- name: POD_NAMESPACE
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.namespace
|
||||
{{- if $envAll.Values.manifests.certificates }}
|
||||
- name: MARIADB_X509
|
||||
value: "REQUIRE X509"
|
||||
{{- end }}
|
||||
- name: MARIADB_REPLICAS
|
||||
value: {{ .Values.pod.replicas.server | quote }}
|
||||
- name: POD_NAME_PREFIX
|
||||
value: {{ tuple "oslo_db" "server" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
- name: DISCOVERY_DOMAIN
|
||||
value: {{ tuple "oslo_db" "discovery" . | include "helm-toolkit.endpoints.hostname_fqdn_endpoint_lookup" }}
|
||||
- name: DIRECT_SVC_NAME
|
||||
value: {{ tuple "oslo_db" "direct" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
- name: MYSQL_DBADMIN_USERNAME
|
||||
value: {{ .Values.endpoints.oslo_db.auth.admin.username }}
|
||||
- name: MYSQL_DBADMIN_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: mariadb-dbadmin-password
|
||||
key: MYSQL_DBADMIN_PASSWORD
|
||||
- name: MYSQL_HISTFILE
|
||||
value: {{ .Values.conf.database.mysql_histfile }}
|
||||
|
||||
|
||||
volumeMounts:
|
||||
- name: mariadb-secrets
|
||||
mountPath: /etc/mysql/admin_user.cnf
|
||||
subPath: admin_user.cnf
|
||||
readOnly: true
|
||||
- name: mariadb-bin
|
||||
mountPath: /tmp/init.sh
|
||||
subPath: init.sh
|
||||
- name: mariadb-bin
|
||||
mountPath: /tmp/readiness.sh
|
||||
subPath: readiness.sh
|
||||
readOnly: true
|
||||
- name: mariadb-bin
|
||||
mountPath: /tmp/liveness.sh
|
||||
subPath: liveness.sh
|
||||
readOnly: true
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal "path" "/etc/mysql/certs" | include "helm-toolkit.snippets.tls_volume_mount" | indent 4 }}
|
||||
|
||||
volumes:
|
||||
- name: mariadb-bin
|
||||
configMap:
|
||||
name: mariadb-bin
|
||||
defaultMode: 0555
|
||||
- name: mariadb-etc
|
||||
configMap:
|
||||
name: mariadb-etc
|
||||
defaultMode: 0444
|
||||
- name: mariadb-secrets
|
||||
secret:
|
||||
secretName: mariadb-secrets
|
||||
defaultMode: 0444
|
||||
- name: pod-tmp
|
||||
emptyDir: {}
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal | include "helm-toolkit.snippets.tls_volume" | indent 4 }}
|
||||
|
||||
# storage volume templates
|
||||
volumeClaimTemplate:
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .Values.volume.size }}
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
storageClassName: {{ .Values.volume.class_name }}
|
||||
|
||||
{{- end }}
|
17
mariadb-cluster/templates/network_policy.yaml
Normal file
17
mariadb-cluster/templates/network_policy.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
{{- if .Values.manifests.network_policy -}}
|
||||
{{- $netpol_opts := dict "envAll" . "name" "application" "label" "mariadb" -}}
|
||||
{{ $netpol_opts | include "helm-toolkit.manifests.kubernetes_network_policy" }}
|
||||
{{- end -}}
|
86
mariadb-cluster/templates/pod-test.yaml
Normal file
86
mariadb-cluster/templates/pod-test.yaml
Normal file
@ -0,0 +1,86 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if (.Values.global).subchart_release_name }}
|
||||
{{- $_ := set . "deployment_name" .Chart.Name }}
|
||||
{{- else }}
|
||||
{{- $_ := set . "deployment_name" .Release.Name }}
|
||||
{{- end }}
|
||||
|
||||
{{- if .Values.manifests.pod_test }}
|
||||
{{- $envAll := . }}
|
||||
{{- $dependencies := .Values.dependencies.static.tests }}
|
||||
|
||||
{{- $serviceAccountName := print .deployment_name "-test" }}
|
||||
{{ tuple $envAll "tests" $serviceAccountName | include "helm-toolkit.snippets.kubernetes_pod_rbac_serviceaccount" }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
name: "{{.deployment_name}}-test"
|
||||
labels:
|
||||
{{ tuple $envAll "mariadb" "test" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
annotations:
|
||||
"helm.sh/hook": test-success
|
||||
{{ tuple $envAll | include "helm-toolkit.snippets.release_uuid" }}
|
||||
{{ dict "envAll" $envAll "podName" "mariadb-test" "containerNames" (list "init" "mariadb-test") | include "helm-toolkit.snippets.kubernetes_mandatory_access_control_annotation" | indent 4 }}
|
||||
spec:
|
||||
shareProcessNamespace: true
|
||||
serviceAccountName: {{ $serviceAccountName }}
|
||||
{{ dict "envAll" $envAll "application" "tests" | include "helm-toolkit.snippets.kubernetes_pod_security_context" | indent 2 }}
|
||||
{{ if $envAll.Values.pod.tolerations.mariadb.enabled }}
|
||||
{{ tuple $envAll "mariadb" | include "helm-toolkit.snippets.kubernetes_tolerations" | indent 2 }}
|
||||
{{ end }}
|
||||
nodeSelector:
|
||||
{{ .Values.labels.test.node_selector_key }}: {{ .Values.labels.test.node_selector_value }}
|
||||
restartPolicy: Never
|
||||
initContainers:
|
||||
{{ tuple $envAll "tests" list | include "helm-toolkit.snippets.kubernetes_entrypoint_init_container" | indent 4 }}
|
||||
containers:
|
||||
- name: mariadb-test
|
||||
{{ dict "envAll" $envAll "application" "tests" "container" "test" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 6 }}
|
||||
{{ tuple $envAll "scripted_test" | include "helm-toolkit.snippets.image" | indent 6 }}
|
||||
command:
|
||||
- /tmp/test.sh
|
||||
volumeMounts:
|
||||
- name: pod-tmp
|
||||
mountPath: /tmp
|
||||
- name: mariadb-bin
|
||||
mountPath: /tmp/test.sh
|
||||
subPath: test.sh
|
||||
readOnly: true
|
||||
- name: mariadb-secrets
|
||||
mountPath: /etc/mysql/test-params.cnf
|
||||
{{ if eq $envAll.Values.conf.tests.endpoint "internal" }}
|
||||
subPath: admin_user_internal.cnf
|
||||
{{ else if eq $envAll.Values.conf.tests.endpoint "direct" }}
|
||||
subPath: admin_user.cnf
|
||||
{{ else }}
|
||||
{{ fail "Either 'direct' or 'internal' should be specified for .Values.conf.tests.endpoint" }}
|
||||
{{ end }}
|
||||
readOnly: true
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal "path" "/etc/mysql/certs" | include "helm-toolkit.snippets.tls_volume_mount" | indent 8 }}
|
||||
volumes:
|
||||
- name: pod-tmp
|
||||
emptyDir: {}
|
||||
- name: mariadb-bin
|
||||
configMap:
|
||||
name: mariadb-bin
|
||||
defaultMode: 0555
|
||||
- name: mariadb-secrets
|
||||
secret:
|
||||
secretName: mariadb-secrets
|
||||
defaultMode: 0444
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal | include "helm-toolkit.snippets.tls_volume" | indent 4 }}
|
||||
{{- end }}
|
25
mariadb-cluster/templates/secret-dbadmin-password.yaml
Normal file
25
mariadb-cluster/templates/secret-dbadmin-password.yaml
Normal file
@ -0,0 +1,25 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.secret_dbadmin_password }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: mariadb-dbadmin-password
|
||||
type: Opaque
|
||||
data:
|
||||
MYSQL_DBADMIN_PASSWORD: {{ .Values.endpoints.oslo_db.auth.admin.password | b64enc }}
|
||||
{{- end }}
|
25
mariadb-cluster/templates/secret-dbaudit-password.yaml
Normal file
25
mariadb-cluster/templates/secret-dbaudit-password.yaml
Normal file
@ -0,0 +1,25 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.secret_dbaudit_password }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: mariadb-dbaudit-password
|
||||
type: Opaque
|
||||
data:
|
||||
MYSQL_DBAUDIT_PASSWORD: {{ .Values.endpoints.oslo_db.auth.audit.password | b64enc }}
|
||||
{{- end }}
|
17
mariadb-cluster/templates/secret-registry.yaml
Normal file
17
mariadb-cluster/templates/secret-registry.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.secret_registry .Values.endpoints.oci_image_registry.auth.enabled }}
|
||||
{{ include "helm-toolkit.manifests.secret_registry" ( dict "envAll" . "registryUser" .Chart.Name ) }}
|
||||
{{- end }}
|
25
mariadb-cluster/templates/secret-sst-password.yaml
Normal file
25
mariadb-cluster/templates/secret-sst-password.yaml
Normal file
@ -0,0 +1,25 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.secret_sst_password }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: mariadb-dbsst-password
|
||||
type: Opaque
|
||||
data:
|
||||
MYSQL_DBSST_PASSWORD: {{ .Values.endpoints.oslo_db.auth.sst.password | b64enc }}
|
||||
{{- end }}
|
26
mariadb-cluster/templates/secrets-etc.yaml
Normal file
26
mariadb-cluster/templates/secrets-etc.yaml
Normal file
@ -0,0 +1,26 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if .Values.manifests.secret_etc }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: mariadb-secrets
|
||||
type: Opaque
|
||||
data:
|
||||
admin_user.cnf: {{ tuple "secrets/_admin_user.cnf.tpl" . | include "helm-toolkit.utils.template" | b64enc }}
|
||||
admin_user_internal.cnf: {{ tuple "secrets/_admin_user_internal.cnf.tpl" . | include "helm-toolkit.utils.template" | b64enc }}
|
||||
{{- end }}
|
24
mariadb-cluster/templates/secrets/_admin_user.cnf.tpl
Normal file
24
mariadb-cluster/templates/secrets/_admin_user.cnf.tpl
Normal file
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
[client]
|
||||
user = {{ .Values.endpoints.oslo_db.auth.admin.username }}
|
||||
password = {{ .Values.endpoints.oslo_db.auth.admin.password }}
|
||||
host = {{ tuple "oslo_db" "direct" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
port = {{ tuple "oslo_db" "direct" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
{{- if .Values.manifests.certificates }}
|
||||
ssl-ca = /etc/mysql/certs/ca.crt
|
||||
ssl-key = /etc/mysql/certs/tls.key
|
||||
ssl-cert = /etc/mysql/certs/tls.crt
|
||||
{{- end }}
|
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
[client]
|
||||
user = {{ .Values.endpoints.oslo_db.auth.admin.username }}
|
||||
password = {{ .Values.endpoints.oslo_db.auth.admin.password }}
|
||||
host = {{ tuple "oslo_db" "internal" . | include "helm-toolkit.endpoints.hostname_fqdn_endpoint_lookup" }}
|
||||
port = {{ tuple "oslo_db" "internal" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
{{- if .Values.manifests.certificates }}
|
||||
ssl-ca = /etc/mysql/certs/ca.crt
|
||||
ssl-key = /etc/mysql/certs/tls.key
|
||||
ssl-cert = /etc/mysql/certs/tls.crt
|
||||
{{- end }}
|
581
mariadb-cluster/values.yaml
Normal file
581
mariadb-cluster/values.yaml
Normal file
@ -0,0 +1,581 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
# Default values for mariadb.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare name/value pairs to be passed into your templates.
|
||||
# name: value
|
||||
|
||||
---
|
||||
release_group: null
|
||||
|
||||
images:
|
||||
tags:
|
||||
agent: ghcr.io/mariadb-operator/agent:v0.0.3
|
||||
initContainer: ghcr.io/mariadb-operator/init:v0.0.6
|
||||
mariadb: docker.io/openstackhelm/mariadb:latest-ubuntu_focal
|
||||
prometheus_mysql_exporter: docker.io/prom/mysqld-exporter:v0.12.1
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:wallaby-ubuntu_focal
|
||||
dep_check: quay.io/airshipit/kubernetes-entrypoint:v1.0.0
|
||||
image_repo_sync: docker.io/library/docker:17.07.0
|
||||
scripted_test: docker.io/openstackhelm/mariadb:ubuntu_focal-20210415
|
||||
mariadb_cluster_refresh_statefulset: quay.io/airshipit/porthole-mysqlclient-utility:latest-ubuntu_focal
|
||||
pull_policy: "IfNotPresent"
|
||||
local_registry:
|
||||
active: false
|
||||
exclude:
|
||||
- dep_check
|
||||
- image_repo_sync
|
||||
|
||||
labels:
|
||||
server:
|
||||
node_selector_key: openstack-control-plane
|
||||
node_selector_value: enabled
|
||||
job:
|
||||
node_selector_key: openstack-control-plane
|
||||
node_selector_value: enabled
|
||||
test:
|
||||
node_selector_key: openstack-control-plane
|
||||
node_selector_value: enabled
|
||||
|
||||
pod:
|
||||
probes:
|
||||
server:
|
||||
mariadb:
|
||||
readiness:
|
||||
enabled: true
|
||||
params:
|
||||
initialDelaySeconds: 30
|
||||
periodSeconds: 30
|
||||
timeoutSeconds: 15
|
||||
liveness:
|
||||
enabled: true
|
||||
params:
|
||||
initialDelaySeconds: 120
|
||||
periodSeconds: 30
|
||||
timeoutSeconds: 15
|
||||
security_context:
|
||||
server:
|
||||
pod:
|
||||
runAsUser: 0
|
||||
container:
|
||||
init-0:
|
||||
runAsUser: 0
|
||||
readOnlyRootFilesystem: true
|
||||
init:
|
||||
runAsUser: 0
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: false
|
||||
agent:
|
||||
runAsUser: 0
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: false
|
||||
mariadb:
|
||||
runAsUser: 0
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: false
|
||||
mariadb_cluster_refresh_statefulset:
|
||||
pod:
|
||||
runAsUser: 0
|
||||
container:
|
||||
main:
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: true
|
||||
tests:
|
||||
pod:
|
||||
runAsUser: 999
|
||||
container:
|
||||
test:
|
||||
runAsUser: 999
|
||||
readOnlyRootFilesystem: true
|
||||
affinity:
|
||||
anti:
|
||||
type:
|
||||
default: preferredDuringSchedulingIgnoredDuringExecution
|
||||
topologyKey:
|
||||
default: kubernetes.io/hostname
|
||||
weight:
|
||||
default: 10
|
||||
tolerations:
|
||||
mariadb:
|
||||
enabled: false
|
||||
tolerations:
|
||||
- key: node-role.kubernetes.io/master
|
||||
operator: Exists
|
||||
effect: NoSchedule
|
||||
- key: node-role.kubernetes.io/control-plane
|
||||
operator: Exists
|
||||
effect: NoSchedule
|
||||
replicas:
|
||||
server: 3
|
||||
prometheus_mysql_exporter: 1
|
||||
lifecycle:
|
||||
upgrades:
|
||||
deployments:
|
||||
revision_history: 3
|
||||
pod_replacement_strategy: RollingUpdate
|
||||
rolling_update:
|
||||
max_unavailable: 1
|
||||
max_surge: 3
|
||||
termination_grace_period:
|
||||
prometheus_mysql_exporter:
|
||||
timeout: 30
|
||||
disruption_budget:
|
||||
mariadb:
|
||||
min_available: 0
|
||||
resources:
|
||||
enabled: false
|
||||
server:
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
jobs:
|
||||
tests:
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
mariadb_cluster_refresh_statefulset:
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
image_repo_sync:
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
|
||||
dependencies:
|
||||
dynamic:
|
||||
common:
|
||||
local_image_registry:
|
||||
jobs:
|
||||
- mariadb-server-image-repo-sync
|
||||
services:
|
||||
- endpoint: node
|
||||
service: local_image_registry
|
||||
static:
|
||||
image_repo_sync:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: local_image_registry
|
||||
tests:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: oslo_db
|
||||
|
||||
volume:
|
||||
enabled: true
|
||||
class_name: general
|
||||
size: 5Gi
|
||||
backup:
|
||||
enabled: true
|
||||
class_name: general
|
||||
size: 5Gi
|
||||
galera:
|
||||
enabled: true
|
||||
class_name: general
|
||||
size: 300Mi
|
||||
|
||||
jobs:
|
||||
mariadb_cluster_refresh_statefulset:
|
||||
backoffLimit: 87600
|
||||
activeDeadlineSeconds: 3600
|
||||
|
||||
conf:
|
||||
galera:
|
||||
enabled: true
|
||||
primary:
|
||||
podIndex: 0
|
||||
automaticFailover: true
|
||||
sst: mariabackup
|
||||
replicaThreads: 1
|
||||
agent:
|
||||
port: 5555
|
||||
kubernetesAuth:
|
||||
enabled: true
|
||||
gracefulShutdownTimeout: 5s
|
||||
recovery:
|
||||
enabled: true
|
||||
clusterHealthyTimeout: 3m
|
||||
clusterBootstrapTimeout: 10m
|
||||
podRecoveryTimeout: 5m
|
||||
podSyncTimeout: 5m
|
||||
tests:
|
||||
# This may either be:
|
||||
# * internal: which will hit the endpoint exposed by the ingress controller
|
||||
# * direct: which will hit the backends directly via a k8s service ip
|
||||
# Note, deadlocks and failure are to be expected with concurrency if
|
||||
# hitting the `direct` endpoint.
|
||||
endpoint: internal
|
||||
# This is a list of tuning params passed to mysqlslap:
|
||||
params:
|
||||
- --auto-generate-sql
|
||||
- --concurrency=100
|
||||
- --number-of-queries=1000
|
||||
- --number-char-cols=1
|
||||
- --number-int-cols=1
|
||||
mariadb_server:
|
||||
setup_wait:
|
||||
iteration: 30
|
||||
duration: 5
|
||||
database:
|
||||
mysql_histfile: "/dev/null"
|
||||
init_script: |
|
||||
#!/usr/bin/env bash
|
||||
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
set -x
|
||||
|
||||
chown -R "mysql:mysql" /var/lib/mysql;
|
||||
chmod 771 /var/lib/mysql;
|
||||
galera: |
|
||||
[mariadb]
|
||||
bind-address=0.0.0.0
|
||||
default_storage_engine=InnoDB
|
||||
binlog_format=row
|
||||
innodb_autoinc_lock_mode=2
|
||||
max_allowed_packet=256M
|
||||
########################
|
||||
#
|
||||
########################
|
||||
ignore-db-dirs=lost+found
|
||||
|
||||
# Charset
|
||||
character_set_server=utf8
|
||||
collation_server=utf8_general_ci
|
||||
skip-character-set-client-handshake
|
||||
|
||||
# Logging
|
||||
slow_query_log=off
|
||||
slow_query_log_file=/var/log/mysql/mariadb-slow.log
|
||||
log_warnings=2
|
||||
|
||||
# General logging has huge performance penalty therefore is disabled by default
|
||||
general_log=off
|
||||
general_log_file=/var/log/mysql/mariadb-error.log
|
||||
|
||||
long_query_time=3
|
||||
log_queries_not_using_indexes=on
|
||||
|
||||
# Networking
|
||||
bind_address=0.0.0.0
|
||||
port={{ tuple "oslo_db" "direct" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
|
||||
# When a client connects, the server will perform hostname resolution,
|
||||
# and when DNS is slow, establishing the connection will become slow as well.
|
||||
# It is therefore recommended to start the server with skip-name-resolve to
|
||||
# disable all DNS lookups. The only limitation is that the GRANT statements
|
||||
# must then use IP addresses only.
|
||||
skip_name_resolve
|
||||
|
||||
# Tuning
|
||||
user=mysql
|
||||
max_allowed_packet=256M
|
||||
open_files_limit=10240
|
||||
max_connections=8192
|
||||
max-connect-errors=1000000
|
||||
|
||||
# General security settings
|
||||
# Reference: https://dev.mysql.com/doc/mysql-security-excerpt/8.0/en/general-security-issues.html
|
||||
# secure_file_priv is set to '/home' because it is read-only, which will
|
||||
# disable this feature completely.
|
||||
secure_file_priv=/home
|
||||
local_infile=0
|
||||
symbolic_links=0
|
||||
sql_mode="STRICT_ALL_TABLES,STRICT_TRANS_TABLES,ERROR_FOR_DIVISION_BY_ZERO,NO_AUTO_CREATE_USER,NO_ENGINE_SUBSTITUTION"
|
||||
|
||||
|
||||
## Generally, it is unwise to set the query cache to be larger than 64-128M
|
||||
## as the costs associated with maintaining the cache outweigh the performance
|
||||
## gains.
|
||||
## The query cache is a well known bottleneck that can be seen even when
|
||||
## concurrency is moderate. The best option is to disable it from day 1
|
||||
## by setting query_cache_size=0 (now the default on MySQL 5.6)
|
||||
## and to use other ways to speed up read queries: good indexing, adding
|
||||
## replicas to spread the read load or using an external cache.
|
||||
query_cache_size=0
|
||||
query_cache_type=0
|
||||
|
||||
sync_binlog=0
|
||||
thread_cache_size=16
|
||||
table_open_cache=2048
|
||||
table_definition_cache=1024
|
||||
|
||||
#
|
||||
# InnoDB
|
||||
#
|
||||
# The buffer pool is where data and indexes are cached: having it as large as possible
|
||||
# will ensure you use memory and not disks for most read operations.
|
||||
# Typical values are 50..75% of available RAM.
|
||||
# TODO(tomasz.paszkowski): This needs to by dynamic based on available RAM.
|
||||
innodb_buffer_pool_size=1024M
|
||||
innodb_doublewrite=0
|
||||
innodb_file_per_table=1
|
||||
innodb_flush_method=O_DIRECT
|
||||
innodb_io_capacity=500
|
||||
innodb_log_file_size=128M
|
||||
innodb_old_blocks_time=1000
|
||||
innodb_read_io_threads=8
|
||||
innodb_write_io_threads=8
|
||||
|
||||
{{ if .Values.manifests.certificates }}
|
||||
# TLS
|
||||
ssl_ca=/etc/mysql/certs/ca.crt
|
||||
ssl_key=/etc/mysql/certs/tls.key
|
||||
ssl_cert=/etc/mysql/certs/tls.crt
|
||||
# tls_version = TLSv1.2,TLSv1.3
|
||||
{{ end }}
|
||||
|
||||
|
||||
[mysqldump]
|
||||
max-allowed-packet=16M
|
||||
|
||||
[client]
|
||||
default_character_set=utf8
|
||||
protocol=tcp
|
||||
port={{ tuple "oslo_db" "direct" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
{{ if .Values.manifests.certificates }}
|
||||
# TLS
|
||||
ssl_ca=/etc/mysql/certs/ca.crt
|
||||
ssl_key=/etc/mysql/certs/tls.key
|
||||
ssl_cert=/etc/mysql/certs/tls.crt
|
||||
# tls_version = TLSv1.2,TLSv1.3
|
||||
ssl-verify-server-cert
|
||||
{{ end }}
|
||||
|
||||
my: |
|
||||
[mysqld]
|
||||
datadir=/var/lib/mysql
|
||||
basedir=/usr
|
||||
ignore-db-dirs=lost+found
|
||||
|
||||
[client-server]
|
||||
!includedir /etc/mysql/conf.d/
|
||||
|
||||
config_override: null
|
||||
# Any configuration here will override the base config.
|
||||
# config_override: |-
|
||||
# [mysqld]
|
||||
# wsrep_slave_threads=1
|
||||
|
||||
monitoring:
|
||||
prometheus:
|
||||
enabled: false
|
||||
mysqld_exporter:
|
||||
scrape: true
|
||||
|
||||
secrets:
|
||||
identity:
|
||||
admin: keystone-admin-user
|
||||
oci_image_registry:
|
||||
mariadb: mariadb-oci-image-registry-key
|
||||
tls:
|
||||
oslo_db:
|
||||
server:
|
||||
public: mariadb-tls-server
|
||||
internal: mariadb-tls-direct
|
||||
|
||||
# typically overridden by environmental
|
||||
# values, but should include all endpoints
|
||||
# required by this chart
|
||||
endpoints:
|
||||
cluster_domain_suffix: cluster.local
|
||||
local_image_registry:
|
||||
name: docker-registry
|
||||
namespace: docker-registry
|
||||
hosts:
|
||||
default: localhost
|
||||
internal: docker-registry
|
||||
node: localhost
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
port:
|
||||
registry:
|
||||
node: 5000
|
||||
oci_image_registry:
|
||||
name: oci-image-registry
|
||||
namespace: oci-image-registry
|
||||
auth:
|
||||
enabled: false
|
||||
mariadb:
|
||||
username: mariadb
|
||||
password: password
|
||||
hosts:
|
||||
default: localhost
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
port:
|
||||
registry:
|
||||
default: null
|
||||
monitoring:
|
||||
name: prometheus
|
||||
namespace: null
|
||||
hosts:
|
||||
default: prom-metrics
|
||||
public: prometheus
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: null
|
||||
scheme:
|
||||
default: 'http'
|
||||
port:
|
||||
api:
|
||||
default: 9090
|
||||
public: 80
|
||||
prometheus_mysql_exporter:
|
||||
namespace: null
|
||||
hosts:
|
||||
default: mysql-exporter
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: /metrics
|
||||
scheme:
|
||||
default: 'http'
|
||||
port:
|
||||
metrics:
|
||||
default: 9104
|
||||
oslo_db:
|
||||
namespace: null
|
||||
auth:
|
||||
admin:
|
||||
username: root
|
||||
password: password
|
||||
sst:
|
||||
username: sst
|
||||
password: password
|
||||
audit:
|
||||
username: audit
|
||||
password: password
|
||||
exporter:
|
||||
username: exporter
|
||||
password: password
|
||||
hosts:
|
||||
default: mariadb-server-primary
|
||||
direct: mariadb-server-internal
|
||||
discovery: mariadb-discovery
|
||||
server: mariadb-server
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path: null
|
||||
scheme: mysql+pymysql
|
||||
port:
|
||||
mysql:
|
||||
default: 3306
|
||||
wsrep:
|
||||
default: 4567
|
||||
kube_dns:
|
||||
namespace: kube-system
|
||||
name: kubernetes-dns
|
||||
hosts:
|
||||
default: kube-dns
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: null
|
||||
scheme: http
|
||||
port:
|
||||
dns_tcp:
|
||||
default: 53
|
||||
dns:
|
||||
default: 53
|
||||
protocol: UDP
|
||||
identity:
|
||||
name: backup-storage-auth
|
||||
namespace: openstack
|
||||
auth:
|
||||
admin:
|
||||
# Auth URL of null indicates local authentication
|
||||
# HTK will form the URL unless specified here
|
||||
auth_url: null
|
||||
region_name: RegionOne
|
||||
username: admin
|
||||
password: password
|
||||
project_name: admin
|
||||
user_domain_name: default
|
||||
project_domain_name: default
|
||||
mariadb-server:
|
||||
# Auth URL of null indicates local authentication
|
||||
# HTK will form the URL unless specified here
|
||||
auth_url: null
|
||||
role: admin
|
||||
region_name: RegionOne
|
||||
username: mariadb-backup-user
|
||||
password: password
|
||||
project_name: service
|
||||
user_domain_name: service
|
||||
project_domain_name: service
|
||||
hosts:
|
||||
default: keystone
|
||||
internal: keystone-api
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: /v3
|
||||
scheme:
|
||||
default: 'http'
|
||||
port:
|
||||
api:
|
||||
default: 80
|
||||
internal: 5000
|
||||
|
||||
network_policy:
|
||||
mariadb:
|
||||
ingress:
|
||||
- {}
|
||||
egress:
|
||||
- {}
|
||||
|
||||
# Helm hook breaks for helm2.
|
||||
# Set helm3_hook: false in case helm2 is used.
|
||||
helm3_hook: true
|
||||
|
||||
manifests:
|
||||
certificates: false
|
||||
configmap_bin: true
|
||||
configmap_etc: true
|
||||
job_image_repo_sync: true
|
||||
network_policy: false
|
||||
pod_test: true
|
||||
secret_dbadmin_password: true
|
||||
secret_sst_password: true
|
||||
secret_dbaudit_password: true
|
||||
secret_etc: true
|
||||
secret_registry: true
|
||||
service_primary: true
|
||||
mariadb: true
|
||||
...
|
18
mariadb-cluster/values_overrides/2023.1-ubuntu_focal.yaml
Normal file
18
mariadb-cluster/values_overrides/2023.1-ubuntu_focal.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:2023.1-ubuntu_focal
|
||||
ks_user: docker.io/openstackhelm/heat:2023.1-ubuntu_focal
|
||||
...
|
18
mariadb-cluster/values_overrides/2023.2-ubuntu_jammy.yaml
Normal file
18
mariadb-cluster/values_overrides/2023.2-ubuntu_jammy.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:2023.2-ubuntu_jammy
|
||||
ks_user: docker.io/openstackhelm/heat:2023.2-ubuntu_jammy
|
||||
...
|
21
mariadb-cluster/values_overrides/apparmor.yaml
Normal file
21
mariadb-cluster/values_overrides/apparmor.yaml
Normal file
@ -0,0 +1,21 @@
|
||||
---
|
||||
pod:
|
||||
mandatory_access_control:
|
||||
type: apparmor
|
||||
mariadb-server:
|
||||
init-0: runtime/default
|
||||
agent: runtime/default
|
||||
init: runtime/default
|
||||
metrics: runtime/default
|
||||
mariadb: runtime/default
|
||||
mariadb-test:
|
||||
init: runtime/default
|
||||
mariadb-test: runtime/default
|
||||
refresh-statefulset:
|
||||
init: runtime/default
|
||||
mariadb-refresh-statefulset: runtime/default
|
||||
|
||||
monitoring:
|
||||
prometheus:
|
||||
enabled: true
|
||||
...
|
8
mariadb-cluster/values_overrides/downscaled.yaml
Normal file
8
mariadb-cluster/values_overrides/downscaled.yaml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
conf:
|
||||
galera:
|
||||
enabled: false
|
||||
pod:
|
||||
replicas:
|
||||
server: 1
|
||||
...
|
11
mariadb-cluster/values_overrides/local-storage.yaml
Normal file
11
mariadb-cluster/values_overrides/local-storage.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
---
|
||||
pod:
|
||||
replicas:
|
||||
server: 1
|
||||
volume:
|
||||
size: 1Gi
|
||||
class_name: local-storage
|
||||
monitoring:
|
||||
prometheus:
|
||||
enabled: false
|
||||
...
|
84
mariadb-cluster/values_overrides/netpol.yaml
Normal file
84
mariadb-cluster/values_overrides/netpol.yaml
Normal file
@ -0,0 +1,84 @@
|
||||
---
|
||||
manifests:
|
||||
network_policy: true
|
||||
network_policy:
|
||||
mariadb:
|
||||
egress:
|
||||
- to:
|
||||
- ipBlock:
|
||||
cidr: %%%REPLACE_API_ADDR%%%/32
|
||||
ports:
|
||||
- protocol: TCP
|
||||
port: %%%REPLACE_API_PORT%%%
|
||||
ingress:
|
||||
- from:
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: keystone
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: heat
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: glance
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: cinder
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: aodh
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: barbican
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: ceilometer
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: designate
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: horizon
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: ironic
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: magnum
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: mistral
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: nova
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: neutron
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: rally
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: senlin
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: placement
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: prometheus-mysql-exporter
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: mariadb
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
application: mariadb-backup
|
||||
ports:
|
||||
- protocol: TCP
|
||||
port: 3306
|
||||
- protocol: TCP
|
||||
port: 4567
|
||||
- protocol: TCP
|
||||
port: 80
|
||||
- protocol: TCP
|
||||
port: 8080
|
||||
...
|
14
mariadb-cluster/values_overrides/prometheus.yaml
Normal file
14
mariadb-cluster/values_overrides/prometheus.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
---
|
||||
monitoring:
|
||||
prometheus:
|
||||
enabled: true
|
||||
manifests:
|
||||
monitoring:
|
||||
prometheus:
|
||||
configmap_bin: true
|
||||
deployment_exporter: true
|
||||
job_user_create: true
|
||||
secret_etc: true
|
||||
service_exporter: true
|
||||
network_policy_exporter: true
|
||||
...
|
13
mariadb-cluster/values_overrides/tls.yaml
Normal file
13
mariadb-cluster/values_overrides/tls.yaml
Normal file
@ -0,0 +1,13 @@
|
||||
---
|
||||
endpoints:
|
||||
oslo_db:
|
||||
host_fqdn_override:
|
||||
default:
|
||||
tls:
|
||||
secretName: mariadb-tls-direct
|
||||
issuerRef:
|
||||
name: ca-issuer
|
||||
kind: ClusterIssuer
|
||||
manifests:
|
||||
certificates: true
|
||||
...
|
20
mariadb-cluster/values_overrides/ubuntu_focal.yaml
Normal file
20
mariadb-cluster/values_overrides/ubuntu_focal.yaml
Normal file
@ -0,0 +1,20 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
mariadb: docker.io/openstackhelm/mariadb:latest-ubuntu_focal
|
||||
ks_user: docker.io/openstackhelm/heat:wallaby-ubuntu_focal
|
||||
scripted_test: docker.io/openstackhelm/mariadb:ubuntu_focal-20210415
|
||||
mariadb_cluster_refresh_statefulset: quay.io/airshipit/porthole-mysqlclient-utility:latest-ubuntu_focal
|
||||
...
|
8
mariadb-cluster/values_overrides/upscaled.yaml
Normal file
8
mariadb-cluster/values_overrides/upscaled.yaml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
conf:
|
||||
galera:
|
||||
enabled: true
|
||||
pod:
|
||||
replicas:
|
||||
server: 3
|
||||
...
|
@ -15,7 +15,7 @@ apiVersion: v1
|
||||
appVersion: v10.6.7
|
||||
description: OpenStack-Helm MariaDB
|
||||
name: mariadb
|
||||
version: 0.2.34
|
||||
version: 0.2.35
|
||||
home: https://mariadb.com/kb/en/
|
||||
icon: http://badges.mariadb.org/mariadb-badge-180x60.png
|
||||
sources:
|
||||
|
@ -32,4 +32,5 @@ monitoring:
|
||||
|
||||
manifests:
|
||||
cron_job_mariadb_backup: true
|
||||
job_ks_user: false
|
||||
...
|
||||
|
21
prometheus-mysql-exporter/.helmignore
Normal file
21
prometheus-mysql-exporter/.helmignore
Normal file
@ -0,0 +1,21 @@
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
26
prometheus-mysql-exporter/Chart.yaml
Normal file
26
prometheus-mysql-exporter/Chart.yaml
Normal file
@ -0,0 +1,26 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
apiVersion: v1
|
||||
appVersion: v0.12.1
|
||||
description: OpenStack-Helm Prometheus mysql-exporter
|
||||
name: prometheus-mysql-exporter
|
||||
version: 0.0.1
|
||||
home: https://mariadb.com/kb/en/
|
||||
icon: http://badges.mariadb.org/mariadb-badge-180x60.png
|
||||
sources:
|
||||
- https://github.com/MariaDB/server
|
||||
- https://opendev.org/openstack/openstack-helm
|
||||
maintainers:
|
||||
- name: OpenStack-Helm Authors
|
||||
...
|
18
prometheus-mysql-exporter/README.rst
Normal file
18
prometheus-mysql-exporter/README.rst
Normal file
@ -0,0 +1,18 @@
|
||||
openstack-helm/mariadb
|
||||
======================
|
||||
|
||||
By default, this chart creates a 3-member mariadb galera cluster.
|
||||
|
||||
This chart depends on mariadb-operator chart.
|
||||
|
||||
The StatefulSets all leverage PVCs to provide stateful storage to
|
||||
``/var/lib/mysql``.
|
||||
|
||||
You must ensure that your control nodes that should receive mariadb
|
||||
instances are labeled with ``openstack-control-plane=enabled``, or
|
||||
whatever you have configured in values.yaml for the label
|
||||
configuration:
|
||||
|
||||
::
|
||||
|
||||
kubectl label nodes openstack-control-plane=enabled --all
|
18
prometheus-mysql-exporter/requirements.yaml
Normal file
18
prometheus-mysql-exporter/requirements.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
dependencies:
|
||||
- name: helm-toolkit
|
||||
repository: file://../helm-toolkit
|
||||
version: ">= 0.1.0"
|
||||
...
|
@ -0,0 +1,50 @@
|
||||
#!/bin/bash
|
||||
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
set -e
|
||||
|
||||
# SLAVE MONITOR
|
||||
# Grants ability to SHOW SLAVE STATUS, SHOW REPLICA STATUS,
|
||||
# SHOW ALL SLAVES STATUS, SHOW ALL REPLICAS STATUS, SHOW RELAYLOG EVENTS.
|
||||
# New privilege added in MariaDB Enterprise Server 10.5.8-5. Alias for REPLICA MONITOR.
|
||||
#
|
||||
# REPLICATION CLIENT
|
||||
# Grants ability to SHOW MASTER STATUS, SHOW SLAVE STATUS, SHOW BINARY LOGS. In ES10.5,
|
||||
# is an alias for BINLOG MONITOR and the capabilities have changed. BINLOG MONITOR grants
|
||||
# ability to SHOW MASTER STATUS, SHOW BINARY LOGS, SHOW BINLOG EVENTS, and SHOW BINLOG STATUS.
|
||||
|
||||
mariadb_version=$(mysql --defaults-file=/etc/mysql/admin_user.cnf -e "status" | grep -E '^Server\s+version:')
|
||||
echo "Current database ${mariadb_version}"
|
||||
|
||||
if [[ ! -z ${mariadb_version} && -z $(grep -E '10.2|10.3|10.4' <<< ${mariadb_version}) ]]; then
|
||||
# In case MariaDB version is 10.2.x-10.4.x - we use old privileges definitions
|
||||
if ! mysql --defaults-file=/etc/mysql/admin_user.cnf -e \
|
||||
"CREATE OR REPLACE USER '${EXPORTER_USER}'@'%' IDENTIFIED BY '${EXPORTER_PASSWORD}'; \
|
||||
GRANT PROCESS, BINLOG MONITOR, SLAVE MONITOR, SELECT ON *.* TO '${EXPORTER_USER}'@'%' ${MARIADB_X509}; \
|
||||
FLUSH PRIVILEGES;" ; then
|
||||
echo "ERROR: Could not create user: ${EXPORTER_USER}"
|
||||
exit 1
|
||||
fi
|
||||
else
|
||||
# here we use new MariaDB privileges definitions defines since version 10.5
|
||||
if ! mysql --defaults-file=/etc/mysql/admin_user.cnf -e \
|
||||
"CREATE OR REPLACE USER '${EXPORTER_USER}'@'%' IDENTIFIED BY '${EXPORTER_PASSWORD}'; \
|
||||
GRANT PROCESS, REPLICATION CLIENT, SELECT ON *.* TO '${EXPORTER_USER}'@'%' ${MARIADB_X509}; \
|
||||
FLUSH PRIVILEGES;" ; then
|
||||
echo "ERROR: Could not create user: ${EXPORTER_USER}"
|
||||
exit 1
|
||||
fi
|
||||
fi
|
@ -0,0 +1,57 @@
|
||||
#!/bin/sh
|
||||
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
set -ex
|
||||
|
||||
compareVersions() {
|
||||
echo $1 $2 | \
|
||||
awk '{ split($1, a, ".");
|
||||
split($2, b, ".");
|
||||
res = -1;
|
||||
for (i = 1; i <= 3; i++){
|
||||
if (a[i] < b[i]) {
|
||||
res =-1;
|
||||
break;
|
||||
} else if (a[i] > b[i]) {
|
||||
res = 1;
|
||||
break;
|
||||
} else if (a[i] == b[i]) {
|
||||
if (i == 3) {
|
||||
res = 0;
|
||||
break;
|
||||
} else {
|
||||
continue;
|
||||
}
|
||||
}
|
||||
}
|
||||
print res;
|
||||
}'
|
||||
}
|
||||
|
||||
MYSQL_EXPORTER_VER=`/bin/mysqld_exporter --version 2>&1 | grep "mysqld_exporter" | awk '{print $3}'`
|
||||
|
||||
#in versions greater than 0.10.0 different configuration flags are used:
|
||||
#https://github.com/prometheus/mysqld_exporter/commit/66c41ac7eb90a74518a6ecf6c6bb06464eb68db8
|
||||
compverResult=`compareVersions "${MYSQL_EXPORTER_VER}" "0.10.0"`
|
||||
CONFIG_FLAG_PREFIX='-'
|
||||
if [ ${compverResult} -gt 0 ]; then
|
||||
CONFIG_FLAG_PREFIX='--'
|
||||
fi
|
||||
|
||||
exec /bin/mysqld_exporter \
|
||||
${CONFIG_FLAG_PREFIX}config.my-cnf=/etc/mysql/mysql_user.cnf \
|
||||
${CONFIG_FLAG_PREFIX}web.listen-address="${POD_IP}:${LISTEN_PORT}" \
|
||||
${CONFIG_FLAG_PREFIX}web.telemetry-path="$TELEMETRY_PATH"
|
@ -0,0 +1,27 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.monitoring.prometheus.configmap_bin .Values.monitoring.prometheus.enabled }}
|
||||
{{- $envAll := . }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: mysql-exporter-bin
|
||||
data:
|
||||
create-mysql-user.sh: |
|
||||
{{ tuple "bin/_create-mysql-user.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
mysqld-exporter.sh: |
|
||||
{{ tuple "bin/_mysqld-exporter.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
|
||||
{{- end }}
|
103
prometheus-mysql-exporter/templates/exporter-deployment.yaml
Normal file
103
prometheus-mysql-exporter/templates/exporter-deployment.yaml
Normal file
@ -0,0 +1,103 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.monitoring.prometheus.deployment_exporter .Values.monitoring.prometheus.enabled }}
|
||||
{{- $envAll := . }}
|
||||
|
||||
{{- $serviceAccountName := "prometheus-mysql-exporter" }}
|
||||
{{ tuple $envAll "prometheus_mysql_exporter" $serviceAccountName | include "helm-toolkit.snippets.kubernetes_pod_rbac_serviceaccount" }}
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: prometheus-mysql-exporter
|
||||
labels:
|
||||
{{ tuple $envAll "prometheus-mysql-exporter" "exporter" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
spec:
|
||||
replicas: {{ .Values.pod.replicas.prometheus_mysql_exporter }}
|
||||
selector:
|
||||
matchLabels:
|
||||
{{ tuple $envAll "prometheus-mysql-exporter" "exporter" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 6 }}
|
||||
{{ tuple $envAll | include "helm-toolkit.snippets.kubernetes_upgrades_deployment" | indent 2 }}
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
{{ tuple $envAll "prometheus-mysql-exporter" "exporter" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 8 }}
|
||||
namespace: {{ .Values.endpoints.prometheus_mysql_exporter.namespace }}
|
||||
annotations:
|
||||
{{ tuple $envAll | include "helm-toolkit.snippets.release_uuid" | indent 8 }}
|
||||
{{ dict "envAll" $envAll "podName" "prometheus-mysql-exporter" "containerNames" (list "init" "mysql-exporter") | include "helm-toolkit.snippets.kubernetes_mandatory_access_control_annotation" | indent 8 }}
|
||||
spec:
|
||||
shareProcessNamespace: true
|
||||
serviceAccountName: {{ $serviceAccountName }}
|
||||
{{ dict "envAll" $envAll "application" "prometheus_mysql_exporter" | include "helm-toolkit.snippets.kubernetes_pod_security_context" | indent 6 }}
|
||||
nodeSelector:
|
||||
{{ .Values.labels.prometheus_mysql_exporter.node_selector_key }}: {{ .Values.labels.prometheus_mysql_exporter.node_selector_value }}
|
||||
terminationGracePeriodSeconds: {{ .Values.pod.lifecycle.termination_grace_period.prometheus_mysql_exporter.timeout | default "30" }}
|
||||
initContainers:
|
||||
{{ tuple $envAll "prometheus_mysql_exporter" list | include "helm-toolkit.snippets.kubernetes_entrypoint_init_container" | indent 8 }}
|
||||
containers:
|
||||
- name: mysql-exporter
|
||||
{{ tuple $envAll "prometheus_mysql_exporter" | include "helm-toolkit.snippets.image" | indent 10 }}
|
||||
{{ dict "envAll" $envAll "application" "prometheus_mysql_exporter" "container" "exporter" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 10 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.prometheus_mysql_exporter | include "helm-toolkit.snippets.kubernetes_resources" | indent 10 }}
|
||||
command:
|
||||
- /tmp/mysqld-exporter.sh
|
||||
ports:
|
||||
- name: metrics
|
||||
containerPort: {{ tuple "prometheus_mysql_exporter" "internal" "metrics" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
env:
|
||||
- name: EXPORTER_USER
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: mysql-exporter-secrets
|
||||
key: EXPORTER_USER
|
||||
- name: EXPORTER_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: mysql-exporter-secrets
|
||||
key: EXPORTER_PASSWORD
|
||||
- name: POD_IP
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: status.podIP
|
||||
- name: LISTEN_PORT
|
||||
value: {{ tuple "prometheus_mysql_exporter" "internal" "metrics" . | include "helm-toolkit.endpoints.endpoint_port_lookup" | quote }}
|
||||
- name: TELEMETRY_PATH
|
||||
value: {{ tuple "prometheus_mysql_exporter" "internal" "metrics" . | include "helm-toolkit.endpoints.keystone_endpoint_path_lookup" | quote }}
|
||||
volumeMounts:
|
||||
- name: pod-tmp
|
||||
mountPath: /tmp
|
||||
- name: mysql-exporter-secrets
|
||||
mountPath: /etc/mysql/mysql_user.cnf
|
||||
subPath: mysql_user.cnf
|
||||
readOnly: true
|
||||
- name: mysql-exporter-bin
|
||||
mountPath: /tmp/mysqld-exporter.sh
|
||||
subPath: mysqld-exporter.sh
|
||||
readOnly: true
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal "path" "/etc/mysql/certs" | include "helm-toolkit.snippets.tls_volume_mount" | indent 12 }}
|
||||
volumes:
|
||||
- name: pod-tmp
|
||||
emptyDir: {}
|
||||
- name: mysql-exporter-secrets
|
||||
secret:
|
||||
secretName: mysql-exporter-secrets
|
||||
defaultMode: 0444
|
||||
- name: mysql-exporter-bin
|
||||
configMap:
|
||||
name: mysql-exporter-bin
|
||||
defaultMode: 0555
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal | include "helm-toolkit.snippets.tls_volume" | indent 8 }}
|
||||
{{- end }}
|
@ -0,0 +1,98 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.monitoring.prometheus.job_user_create .Values.monitoring.prometheus.enabled }}
|
||||
{{- $envAll := . }}
|
||||
|
||||
{{- $serviceAccountName := "exporter-create-sql-user" }}
|
||||
{{ tuple $envAll "prometheus_create_mysql_user" $serviceAccountName | include "helm-toolkit.snippets.kubernetes_pod_rbac_serviceaccount" }}
|
||||
---
|
||||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
name: exporter-create-sql-user
|
||||
labels:
|
||||
{{ tuple $envAll "prometheus-mysql-exporter" "create-sql-user" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
{{- if .Values.helm3_hook }}
|
||||
annotations:
|
||||
"helm.sh/hook": "post-install,post-upgrade"
|
||||
"helm.sh/hook-weight": "5"
|
||||
"helm.sh/hook-delete-policy": "before-hook-creation"
|
||||
{{- end }}
|
||||
spec:
|
||||
backoffLimit: {{ .Values.jobs.exporter_create_sql_user.backoffLimit }}
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
{{ tuple $envAll "prometheus-mysql-exporter" "create-sql-user" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 8 }}
|
||||
annotations:
|
||||
{{ tuple $envAll | include "helm-toolkit.snippets.release_uuid" | indent 8 }}
|
||||
{{ dict "envAll" $envAll "podName" "create-sql-user" "containerNames" (list "init" "exporter-create-sql-user") | include "helm-toolkit.snippets.kubernetes_mandatory_access_control_annotation" | indent 8 }}
|
||||
spec:
|
||||
shareProcessNamespace: true
|
||||
serviceAccountName: {{ $serviceAccountName }}
|
||||
{{ dict "envAll" $envAll "application" "prometheus_create_mysql_user" | include "helm-toolkit.snippets.kubernetes_pod_security_context" | indent 6 }}
|
||||
activeDeadlineSeconds: {{ .Values.jobs.exporter_create_sql_user.activeDeadlineSeconds }}
|
||||
restartPolicy: OnFailure
|
||||
nodeSelector:
|
||||
{{ .Values.labels.prometheus_mysql_exporter.node_selector_key }}: {{ .Values.labels.prometheus_mysql_exporter.node_selector_value }}
|
||||
initContainers:
|
||||
{{ tuple $envAll "prometheus_create_mysql_user" list | include "helm-toolkit.snippets.kubernetes_entrypoint_init_container" | indent 8 }}
|
||||
containers:
|
||||
- name: exporter-create-sql-user
|
||||
{{ tuple $envAll "prometheus_create_mysql_user" | include "helm-toolkit.snippets.image" | indent 10 }}
|
||||
{{ dict "envAll" $envAll "application" "prometheus_create_mysql_user" "container" "main" | include "helm-toolkit.snippets.kubernetes_container_security_context" | indent 10 }}
|
||||
{{ tuple $envAll $envAll.Values.pod.resources.jobs.prometheus_create_mysql_user | include "helm-toolkit.snippets.kubernetes_resources" | indent 10 }}
|
||||
command:
|
||||
- /tmp/create-mysql-user.sh
|
||||
env:
|
||||
- name: EXPORTER_USER
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: mysql-exporter-secrets
|
||||
key: EXPORTER_USER
|
||||
- name: EXPORTER_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: mysql-exporter-secrets
|
||||
key: EXPORTER_PASSWORD
|
||||
{{- if $envAll.Values.manifests.certificates }}
|
||||
- name: MARIADB_X509
|
||||
value: "REQUIRE X509"
|
||||
{{- end }}
|
||||
volumeMounts:
|
||||
- name: pod-tmp
|
||||
mountPath: /tmp
|
||||
- name: mysql-exporter-bin
|
||||
mountPath: /tmp/create-mysql-user.sh
|
||||
subPath: create-mysql-user.sh
|
||||
readOnly: true
|
||||
- name: mariadb-secrets
|
||||
mountPath: /etc/mysql/admin_user.cnf
|
||||
subPath: admin_user.cnf
|
||||
readOnly: true
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal "path" "/etc/mysql/certs" | include "helm-toolkit.snippets.tls_volume_mount" | indent 12 }}
|
||||
volumes:
|
||||
- name: pod-tmp
|
||||
emptyDir: {}
|
||||
- name: mysql-exporter-bin
|
||||
configMap:
|
||||
name: mysql-exporter-bin
|
||||
defaultMode: 0555
|
||||
- name: mariadb-secrets
|
||||
secret:
|
||||
secretName: mariadb-secrets
|
||||
defaultMode: 0444
|
||||
{{ dict "enabled" $envAll.Values.manifests.certificates "name" $envAll.Values.secrets.tls.oslo_db.server.internal | include "helm-toolkit.snippets.tls_volume" | indent 8 }}
|
||||
{{- end }}
|
@ -0,0 +1,18 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.monitoring.prometheus.network_policy_exporter .Values.monitoring.prometheus.enabled -}}
|
||||
{{- $netpol_opts := dict "envAll" . "name" "application" "label" "prometheus-mysql-exporter" -}}
|
||||
{{ $netpol_opts | include "helm-toolkit.manifests.kubernetes_network_policy" }}
|
||||
{{- end -}}
|
@ -0,0 +1,33 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.monitoring.prometheus.secret_etc .Values.monitoring.prometheus.enabled }}
|
||||
{{- $envAll := . }}
|
||||
|
||||
{{- $exporter_user := .Values.endpoints.oslo_db.auth.exporter.username }}
|
||||
{{- $exporter_password := .Values.endpoints.oslo_db.auth.exporter.password }}
|
||||
{{- $db_host := tuple "oslo_db" "direct" "mysql" $envAll | include "helm-toolkit.endpoints.host_and_port_endpoint_uri_lookup" }}
|
||||
{{- $data_source_name := printf "%s:%s@(%s)/" $exporter_user $exporter_password $db_host }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: mysql-exporter-secrets
|
||||
type: Opaque
|
||||
data:
|
||||
DATA_SOURCE_NAME: {{ $data_source_name | b64enc }}
|
||||
EXPORTER_USER: {{ .Values.endpoints.oslo_db.auth.exporter.username | b64enc }}
|
||||
EXPORTER_PASSWORD: {{ .Values.endpoints.oslo_db.auth.exporter.password | b64enc }}
|
||||
mysql_user.cnf: {{ tuple "secrets/_exporter_user.cnf.tpl" . | include "helm-toolkit.utils.template" | b64enc }}
|
||||
{{- end }}
|
35
prometheus-mysql-exporter/templates/exporter-service.yaml
Normal file
35
prometheus-mysql-exporter/templates/exporter-service.yaml
Normal file
@ -0,0 +1,35 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
{{- if and .Values.manifests.monitoring.prometheus.service_exporter .Values.monitoring.prometheus.enabled }}
|
||||
{{- $envAll := . }}
|
||||
{{- $prometheus_annotations := $envAll.Values.monitoring.prometheus.mysqld_exporter }}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: {{ tuple "prometheus_mysql_exporter" "internal" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" }}
|
||||
labels:
|
||||
{{ tuple $envAll "prometheus-mysql-exporter" "metrics" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
annotations:
|
||||
{{- if .Values.monitoring.prometheus.enabled }}
|
||||
{{ tuple $prometheus_annotations | include "helm-toolkit.snippets.prometheus_service_annotations" | indent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
ports:
|
||||
- name: metrics
|
||||
port: {{ tuple "prometheus_mysql_exporter" "internal" "metrics" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
selector:
|
||||
{{ tuple $envAll "prometheus-mysql-exporter" "exporter" | include "helm-toolkit.snippets.kubernetes_metadata_labels" | indent 4 }}
|
||||
{{- end }}
|
@ -0,0 +1,24 @@
|
||||
{{/*
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/}}
|
||||
|
||||
[client]
|
||||
user = {{ .Values.endpoints.oslo_db.auth.exporter.username }}
|
||||
password = {{ .Values.endpoints.oslo_db.auth.exporter.password }}
|
||||
host = {{ tuple "oslo_db" "internal" . | include "helm-toolkit.endpoints.hostname_fqdn_endpoint_lookup" }}
|
||||
port = {{ tuple "oslo_db" "direct" "mysql" . | include "helm-toolkit.endpoints.endpoint_port_lookup" }}
|
||||
{{- if .Values.manifests.certificates }}
|
||||
ssl-ca = /etc/mysql/certs/ca.crt
|
||||
ssl-key = /etc/mysql/certs/tls.key
|
||||
ssl-cert = /etc/mysql/certs/tls.crt
|
||||
{{- end }}
|
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:2023.1-ubuntu_focal
|
||||
ks_user: docker.io/openstackhelm/heat:2023.1-ubuntu_focal
|
||||
...
|
@ -0,0 +1,18 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
---
|
||||
images:
|
||||
tags:
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:2023.2-ubuntu_jammy
|
||||
ks_user: docker.io/openstackhelm/heat:2023.2-ubuntu_jammy
|
||||
...
|
37
prometheus-mysql-exporter/value_overrides/apparmor.yaml
Normal file
37
prometheus-mysql-exporter/value_overrides/apparmor.yaml
Normal file
@ -0,0 +1,37 @@
|
||||
---
|
||||
pod:
|
||||
mandatory_access_control:
|
||||
type: apparmor
|
||||
mariadb-ingress-error-pages:
|
||||
init: runtime/default
|
||||
ingress-error-pages: runtime/default
|
||||
mariadb-ingress:
|
||||
init: runtime/default
|
||||
ingress: runtime/default
|
||||
mariadb-server:
|
||||
init-0: runtime/default
|
||||
agent: runtime/default
|
||||
init: runtime/default
|
||||
mariadb-perms: runtime/default
|
||||
mariadb: runtime/default
|
||||
mariadb-backup:
|
||||
init: runtime/default
|
||||
mariadb-backup: runtime/default
|
||||
mariadb-verify-server: runtime/default
|
||||
mariadb-test:
|
||||
init: runtime/default
|
||||
mariadb-test: runtime/default
|
||||
prometheus-mysql-exporter:
|
||||
init: runtime/default
|
||||
mysql-exporter: runtime/default
|
||||
create-sql-user:
|
||||
init: runtime/default
|
||||
exporter-create-sql-user: runtime/default
|
||||
|
||||
monitoring:
|
||||
prometheus:
|
||||
enabled: true
|
||||
|
||||
manifests:
|
||||
cron_job_mariadb_backup: true
|
||||
...
|
14
prometheus-mysql-exporter/value_overrides/prometheus.yaml
Normal file
14
prometheus-mysql-exporter/value_overrides/prometheus.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
---
|
||||
monitoring:
|
||||
prometheus:
|
||||
enabled: true
|
||||
manifests:
|
||||
monitoring:
|
||||
prometheus:
|
||||
configmap_bin: true
|
||||
deployment_exporter: true
|
||||
job_user_create: true
|
||||
secret_etc: true
|
||||
service_exporter: true
|
||||
network_policy_exporter: true
|
||||
...
|
13
prometheus-mysql-exporter/value_overrides/tls.yaml
Normal file
13
prometheus-mysql-exporter/value_overrides/tls.yaml
Normal file
@ -0,0 +1,13 @@
|
||||
---
|
||||
endpoints:
|
||||
oslo_db:
|
||||
host_fqdn_override:
|
||||
default:
|
||||
tls:
|
||||
secretName: mariadb-tls-direct
|
||||
issuerRef:
|
||||
name: ca-issuer
|
||||
kind: ClusterIssuer
|
||||
manifests:
|
||||
certificates: true
|
||||
...
|
329
prometheus-mysql-exporter/values.yaml
Normal file
329
prometheus-mysql-exporter/values.yaml
Normal file
@ -0,0 +1,329 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
# Default values for mariadb.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare name/value pairs to be passed into your templates.
|
||||
# name: value
|
||||
|
||||
---
|
||||
release_group: null
|
||||
|
||||
images:
|
||||
tags:
|
||||
prometheus_create_mysql_user: docker.io/library/mariadb:10.5.9-focal
|
||||
prometheus_mysql_exporter: docker.io/prom/mysqld-exporter:v0.12.1
|
||||
prometheus_mysql_exporter_helm_tests: docker.io/openstackhelm/heat:wallaby-ubuntu_focal
|
||||
dep_check: quay.io/airshipit/kubernetes-entrypoint:v1.0.0
|
||||
image_repo_sync: docker.io/library/docker:17.07.0
|
||||
pull_policy: "IfNotPresent"
|
||||
local_registry:
|
||||
active: false
|
||||
exclude:
|
||||
- dep_check
|
||||
- image_repo_sync
|
||||
|
||||
labels:
|
||||
prometheus_mysql_exporter:
|
||||
node_selector_key: openstack-control-plane
|
||||
node_selector_value: enabled
|
||||
job:
|
||||
node_selector_key: openstack-control-plane
|
||||
node_selector_value: enabled
|
||||
|
||||
pod:
|
||||
security_context:
|
||||
prometheus_mysql_exporter:
|
||||
pod:
|
||||
runAsUser: 99
|
||||
container:
|
||||
exporter:
|
||||
runAsUser: 99
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: true
|
||||
prometheus_create_mysql_user:
|
||||
pod:
|
||||
runAsUser: 0
|
||||
container:
|
||||
main:
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: true
|
||||
affinity:
|
||||
anti:
|
||||
type:
|
||||
default: preferredDuringSchedulingIgnoredDuringExecution
|
||||
topologyKey:
|
||||
default: kubernetes.io/hostname
|
||||
weight:
|
||||
default: 10
|
||||
replicas:
|
||||
prometheus_mysql_exporter: 1
|
||||
lifecycle:
|
||||
upgrades:
|
||||
deployments:
|
||||
revision_history: 3
|
||||
pod_replacement_strategy: RollingUpdate
|
||||
rolling_update:
|
||||
max_unavailable: 1
|
||||
max_surge: 3
|
||||
termination_grace_period:
|
||||
prometheus_mysql_exporter:
|
||||
timeout: 30
|
||||
resources:
|
||||
enabled: false
|
||||
prometheus_mysql_exporter:
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "500m"
|
||||
jobs:
|
||||
prometheus_create_mysql_user:
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
image_repo_sync:
|
||||
requests:
|
||||
memory: "128Mi"
|
||||
cpu: "100m"
|
||||
limits:
|
||||
memory: "1024Mi"
|
||||
cpu: "2000m"
|
||||
|
||||
dependencies:
|
||||
dynamic:
|
||||
common:
|
||||
local_image_registry:
|
||||
jobs:
|
||||
- mysql-exporter-image-repo-sync
|
||||
services:
|
||||
- endpoint: node
|
||||
service: local_image_registry
|
||||
static:
|
||||
prometheus_create_mysql_user:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: oslo_db
|
||||
prometheus_mysql_exporter:
|
||||
jobs:
|
||||
- exporter-create-sql-user
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: oslo_db
|
||||
prometheus_mysql_exporter_tests:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: prometheus_mysql_exporter
|
||||
- endpoint: internal
|
||||
service: monitoring
|
||||
image_repo_sync:
|
||||
services:
|
||||
- endpoint: internal
|
||||
service: local_image_registry
|
||||
|
||||
jobs:
|
||||
exporter_create_sql_user:
|
||||
backoffLimit: 87600
|
||||
activeDeadlineSeconds: 3600
|
||||
|
||||
monitoring:
|
||||
prometheus:
|
||||
enabled: false
|
||||
mysqld_exporter:
|
||||
scrape: true
|
||||
|
||||
secrets:
|
||||
identity:
|
||||
admin: keystone-admin-user
|
||||
oci_image_registry:
|
||||
mariadb: mariadb-oci-image-registry-key
|
||||
tls:
|
||||
oslo_db:
|
||||
server:
|
||||
public: mariadb-tls-server
|
||||
internal: mariadb-tls-direct
|
||||
|
||||
# typically overridden by environmental
|
||||
# values, but should include all endpoints
|
||||
# required by this chart
|
||||
endpoints:
|
||||
cluster_domain_suffix: cluster.local
|
||||
local_image_registry:
|
||||
name: docker-registry
|
||||
namespace: docker-registry
|
||||
hosts:
|
||||
default: localhost
|
||||
internal: docker-registry
|
||||
node: localhost
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
port:
|
||||
registry:
|
||||
node: 5000
|
||||
oci_image_registry:
|
||||
name: oci-image-registry
|
||||
namespace: oci-image-registry
|
||||
auth:
|
||||
enabled: false
|
||||
mariadb:
|
||||
username: mariadb
|
||||
password: password
|
||||
hosts:
|
||||
default: localhost
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
port:
|
||||
registry:
|
||||
default: null
|
||||
monitoring:
|
||||
name: prometheus
|
||||
namespace: null
|
||||
hosts:
|
||||
default: prom-metrics
|
||||
public: prometheus
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: null
|
||||
scheme:
|
||||
default: 'http'
|
||||
port:
|
||||
api:
|
||||
default: 9090
|
||||
public: 80
|
||||
prometheus_mysql_exporter:
|
||||
namespace: null
|
||||
hosts:
|
||||
default: mysql-exporter
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: /metrics
|
||||
scheme:
|
||||
default: 'http'
|
||||
port:
|
||||
metrics:
|
||||
default: 9104
|
||||
oslo_db:
|
||||
namespace: null
|
||||
auth:
|
||||
admin:
|
||||
username: root
|
||||
password: password
|
||||
sst:
|
||||
username: sst
|
||||
password: password
|
||||
audit:
|
||||
username: audit
|
||||
password: password
|
||||
exporter:
|
||||
username: exporter
|
||||
password: password
|
||||
hosts:
|
||||
default: mariadb-server-primary
|
||||
direct: mariadb-server-internal
|
||||
discovery: mariadb-discovery
|
||||
server: mariadb-server
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path: null
|
||||
scheme: mysql+pymysql
|
||||
port:
|
||||
mysql:
|
||||
default: 3306
|
||||
wsrep:
|
||||
default: 4567
|
||||
kube_dns:
|
||||
namespace: kube-system
|
||||
name: kubernetes-dns
|
||||
hosts:
|
||||
default: kube-dns
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: null
|
||||
scheme: http
|
||||
port:
|
||||
dns_tcp:
|
||||
default: 53
|
||||
dns:
|
||||
default: 53
|
||||
protocol: UDP
|
||||
identity:
|
||||
name: backup-storage-auth
|
||||
namespace: openstack
|
||||
auth:
|
||||
admin:
|
||||
# Auth URL of null indicates local authentication
|
||||
# HTK will form the URL unless specified here
|
||||
auth_url: null
|
||||
region_name: RegionOne
|
||||
username: admin
|
||||
password: password
|
||||
project_name: admin
|
||||
user_domain_name: default
|
||||
project_domain_name: default
|
||||
mariadb-server:
|
||||
# Auth URL of null indicates local authentication
|
||||
# HTK will form the URL unless specified here
|
||||
auth_url: null
|
||||
role: admin
|
||||
region_name: RegionOne
|
||||
username: mariadb-backup-user
|
||||
password: password
|
||||
project_name: service
|
||||
user_domain_name: service
|
||||
project_domain_name: service
|
||||
hosts:
|
||||
default: keystone
|
||||
internal: keystone-api
|
||||
host_fqdn_override:
|
||||
default: null
|
||||
path:
|
||||
default: /v3
|
||||
scheme:
|
||||
default: 'http'
|
||||
port:
|
||||
api:
|
||||
default: 80
|
||||
internal: 5000
|
||||
|
||||
network_policy:
|
||||
prometheus-mysql-exporter:
|
||||
ingress:
|
||||
- {}
|
||||
egress:
|
||||
- {}
|
||||
|
||||
# Helm hook breaks for helm2.
|
||||
# Set helm3_hook: false in case helm2 is used.
|
||||
helm3_hook: true
|
||||
|
||||
manifests:
|
||||
certificates: false
|
||||
job_image_repo_sync: true
|
||||
monitoring:
|
||||
prometheus:
|
||||
configmap_bin: false
|
||||
deployment_exporter: false
|
||||
job_user_create: false
|
||||
secret_etc: false
|
||||
service_exporter: false
|
||||
network_policy_exporter: false
|
||||
network_policy: false
|
||||
secret_etc: true
|
||||
secret_registry: true
|
||||
...
|
4
releasenotes/notes/mariadb-backup.yaml
Normal file
4
releasenotes/notes/mariadb-backup.yaml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
mariadb-backup:
|
||||
- 0.0.1 Initial Chart
|
||||
...
|
4
releasenotes/notes/mariadb-cluster.yaml
Normal file
4
releasenotes/notes/mariadb-cluster.yaml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
mariadb-cluster:
|
||||
- 0.0.1 Initial Chart
|
||||
...
|
@ -50,4 +50,5 @@ mariadb:
|
||||
- 0.2.32 Prevent liveness probe from killing pods during SST
|
||||
- 0.2.33 Add 2023.1 Ubuntu Focal overrides
|
||||
- 0.2.34 Uplift ingress controller image to 1.8.2
|
||||
- 0.2.35 Update apparmor override
|
||||
...
|
||||
|
4
releasenotes/notes/prometheus-mysql-exporter.yaml
Normal file
4
releasenotes/notes/prometheus-mysql-exporter.yaml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
prometheus-mysql-exporter:
|
||||
- 0.0.1 Initial Chart
|
||||
...
|
@ -31,7 +31,7 @@ kubectl label --overwrite nodes --all ceph-mgr=enabled
|
||||
# and we don't need L2 overlay (will be implemented later).
|
||||
kubectl label --overwrite nodes -l "node-role.kubernetes.io/control-plane" l3-agent=enabled
|
||||
|
||||
for NAMESPACE in ceph openstack osh-infra; do
|
||||
for NAMESPACE in ceph mariadb-operator openstack osh-infra; do
|
||||
tee /tmp/${NAMESPACE}-ns.yaml << EOF
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
|
1
tools/deployment/mariadb-operator-cluster/000-prepare-k8s.sh
Symbolic link
1
tools/deployment/mariadb-operator-cluster/000-prepare-k8s.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../common/prepare-k8s.sh
|
@ -0,0 +1 @@
|
||||
../osh-infra-monitoring/010-deploy-docker-registry.sh
|
1
tools/deployment/mariadb-operator-cluster/012-setup-client.sh
Symbolic link
1
tools/deployment/mariadb-operator-cluster/012-setup-client.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../common/setup-client.sh
|
1
tools/deployment/mariadb-operator-cluster/020-ingress.sh
Symbolic link
1
tools/deployment/mariadb-operator-cluster/020-ingress.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../keystone-auth/020-ingress.sh
|
1
tools/deployment/mariadb-operator-cluster/030-nfs-provisioner.sh
Symbolic link
1
tools/deployment/mariadb-operator-cluster/030-nfs-provisioner.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../osh-infra-monitoring/030-nfs-provisioner.sh
|
1
tools/deployment/mariadb-operator-cluster/040-rabbitmq.sh
Symbolic link
1
tools/deployment/mariadb-operator-cluster/040-rabbitmq.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../keystone-auth/040-rabbitmq.sh
|
71
tools/deployment/mariadb-operator-cluster/045-mariadb-operator-cluster.sh
Executable file
71
tools/deployment/mariadb-operator-cluster/045-mariadb-operator-cluster.sh
Executable file
@ -0,0 +1,71 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
set -xe
|
||||
|
||||
# Specify the Rook release tag to use for the Rook operator here
|
||||
: ${MARIADB_OPERATOR_RELEASE:="0.22.0"}
|
||||
|
||||
# install mariadb-operator
|
||||
helm repo add mariadb-operator https://mariadb-operator.github.io/mariadb-operator
|
||||
helm install mariadb-operator mariadb-operator/mariadb-operator --version ${MARIADB_OPERATOR_RELEASE} -n mariadb-operator
|
||||
|
||||
#NOTE: Wait for deploy
|
||||
./tools/deployment/common/wait-for-pods.sh mariadb-operator
|
||||
|
||||
|
||||
#NOTE: Lint and package chart
|
||||
make mariadb-cluster
|
||||
|
||||
: ${OSH_INFRA_EXTRA_HELM_ARGS_MARIADB_CLUSTER:="$(./tools/deployment/common/get-values-overrides.sh mariadb-cluster)"}
|
||||
|
||||
#NOTE: Deploy command
|
||||
# Deploying downscaled cluster
|
||||
: ${OSH_INFRA_EXTRA_HELM_ARGS:=""}
|
||||
helm upgrade --install mariadb-cluster ./mariadb-cluster \
|
||||
--namespace=openstack \
|
||||
--wait \
|
||||
--timeout 900s \
|
||||
--values mariadb-cluster/values_overrides/downscaled.yaml \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS} \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS_MARIADB_CLUSTER}
|
||||
|
||||
|
||||
#NOTE: Wait for deploy
|
||||
./tools/deployment/common/wait-for-pods.sh openstack
|
||||
|
||||
kubectl get pods --namespace=openstack -o wide
|
||||
|
||||
#NOTE: Deploy command
|
||||
# Upscaling the cluster to 3 instances
|
||||
# mariadb-operator is not handinling changes in appropriate statefulset
|
||||
# so a special job has to delete the statefulset in order
|
||||
# to let mariadb-operator to re-create the sts with new params
|
||||
helm upgrade --install mariadb-cluster ./mariadb-cluster \
|
||||
--namespace=openstack \
|
||||
--wait \
|
||||
--timeout 900s \
|
||||
--values mariadb-cluster/values_overrides/upscaled.yaml \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS} \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS_MARIADB_CLUSTER}
|
||||
|
||||
#NOTE: Wait for deploy
|
||||
./tools/deployment/common/wait-for-pods.sh openstack
|
||||
|
||||
kubectl get pods --namespace=openstack -o wide
|
||||
|
||||
# Delete the test pod if it still exists
|
||||
kubectl delete pods -l application=mariadb,release_group=mariadb-cluster,component=test --namespace=openstack --ignore-not-found
|
||||
#NOTE: Validate the deployment
|
||||
helm test mariadb-cluster --namespace openstack
|
1
tools/deployment/mariadb-operator-cluster/050-memcached.sh
Symbolic link
1
tools/deployment/mariadb-operator-cluster/050-memcached.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../keystone-auth/050-memcached.sh
|
48
tools/deployment/mariadb-operator-cluster/070-keystone.sh
Executable file
48
tools/deployment/mariadb-operator-cluster/070-keystone.sh
Executable file
@ -0,0 +1,48 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
set -xe
|
||||
|
||||
: ${OSH_PATH:="../openstack-helm"}
|
||||
: ${OSH_INFRA_EXTRA_HELM_ARGS:=""}
|
||||
: ${OSH_EXTRA_HELM_ARGS:=""}
|
||||
: ${OSH_EXTRA_HELM_ARGS_KEYSTONE:="$(./tools/deployment/common/get-values-overrides.sh keystone)"}
|
||||
|
||||
# Install LDAP
|
||||
make ldap
|
||||
helm upgrade --install ldap ./ldap \
|
||||
--namespace=openstack \
|
||||
--set pod.replicas.server=1 \
|
||||
--set bootstrap.enabled=true \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS} \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS_LDAP}
|
||||
|
||||
# Install Keystone
|
||||
cd ${OSH_PATH}
|
||||
make keystone
|
||||
cd -
|
||||
helm upgrade --install keystone ${OSH_PATH}/keystone \
|
||||
--namespace=openstack \
|
||||
--values=${OSH_PATH}/keystone/values_overrides/ldap.yaml \
|
||||
--set network.api.ingress.classes.namespace=nginx-openstack \
|
||||
--set endpoints.oslo_db.hosts.default=mariadb-server-primary \
|
||||
${OSH_EXTRA_HELM_ARGS} \
|
||||
${OSH_EXTRA_HELM_ARGS_KEYSTONE}
|
||||
|
||||
./tools/deployment/common/wait-for-pods.sh openstack
|
||||
|
||||
# Testing basic functionality
|
||||
export OS_CLOUD=openstack_helm
|
||||
sleep 30 #NOTE(portdirect): Wait for ingress controller to update rules and restart Nginx
|
||||
openstack endpoint list
|
40
tools/deployment/mariadb-operator-cluster/090-mariadb-backup-test.sh
Executable file
40
tools/deployment/mariadb-operator-cluster/090-mariadb-backup-test.sh
Executable file
@ -0,0 +1,40 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
set -xe
|
||||
|
||||
#NOTE: Lint and package chart
|
||||
make mariadb-backup
|
||||
|
||||
: ${OSH_INFRA_EXTRA_HELM_ARGS_MARIADB_BACKUP:="$(./tools/deployment/common/get-values-overrides.sh mariadb-backup)"}
|
||||
|
||||
#NOTE: Deploy command
|
||||
# Deploying downscaled cluster
|
||||
: ${OSH_INFRA_EXTRA_HELM_ARGS:=""}
|
||||
helm upgrade --install mariadb-backup ./mariadb-backup \
|
||||
--namespace=openstack \
|
||||
--wait \
|
||||
--timeout 900s \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS} \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS_MARIADB_BACKUP}
|
||||
|
||||
|
||||
./tools/deployment/common/wait-for-pods.sh openstack
|
||||
|
||||
|
||||
kubectl create job --from=cronjob/mariadb-backup mariadb-backup-manual-001 -n openstack
|
||||
|
||||
./tools/deployment/common/wait-for-pods.sh openstack
|
||||
|
||||
kubectl logs jobs/mariadb-backup-manual-001 -n openstack
|
@ -0,0 +1,36 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
set -xe
|
||||
|
||||
#NOTE: Lint and package chart
|
||||
make prometheus-mysql-exporter
|
||||
|
||||
: ${OSH_INFRA_EXTRA_HELM_ARGS_MARIADB_MYSQL_EXPORTER:="$(./tools/deployment/common/get-values-overrides.sh prometheus-mysql-exporter)"}
|
||||
|
||||
#NOTE: Deploy command
|
||||
# Deploying downscaled cluster
|
||||
: ${OSH_INFRA_EXTRA_HELM_ARGS:=""}
|
||||
helm upgrade --install prometheus-mysql-exporter ./prometheus-mysql-exporter \
|
||||
--namespace=openstack \
|
||||
--wait \
|
||||
--timeout 900s \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS} \
|
||||
${OSH_INFRA_EXTRA_HELM_ARGS_MARIADB_MYSQL_EXPORTER}
|
||||
|
||||
|
||||
#NOTE: Wait for deploy
|
||||
./tools/deployment/common/wait-for-pods.sh openstack
|
||||
|
||||
kubectl get pods --namespace=openstack -o wide
|
@ -267,4 +267,31 @@
|
||||
- ./tools/deployment/openstack-support/110-openstack-exporter.sh
|
||||
- ./tools/deployment/openstack-support/120-powerdns.sh
|
||||
- ./tools/deployment/openstack-support/130-cinder.sh
|
||||
|
||||
|
||||
- job:
|
||||
name: openstack-helm-infra-mariadb-operator
|
||||
parent: openstack-helm-infra-deploy
|
||||
nodeset: openstack-helm-3nodes-ubuntu_focal
|
||||
vars:
|
||||
osh_params:
|
||||
openstack_release: "2023.1"
|
||||
container_distro_name: ubuntu
|
||||
container_distro_version: focal
|
||||
feature_gates: "prometheus,backups"
|
||||
gate_scripts:
|
||||
- ./tools/deployment/openstack-support/000-prepare-k8s.sh
|
||||
- ./tools/deployment/openstack-support/007-namespace-config.sh
|
||||
- ./tools/deployment/openstack-support/010-ingress.sh
|
||||
- ./tools/deployment/ceph/ceph.sh
|
||||
- ./tools/deployment/openstack-support/025-ceph-ns-activate.sh
|
||||
- ./tools/deployment/mariadb-operator-cluster/012-setup-client.sh
|
||||
- ./tools/deployment/mariadb-operator-cluster/040-rabbitmq.sh
|
||||
- ./tools/deployment/mariadb-operator-cluster/050-memcached.sh
|
||||
- ./tools/deployment/mariadb-operator-cluster/045-mariadb-operator-cluster.sh
|
||||
- ./tools/deployment/mariadb-operator-cluster/070-keystone.sh
|
||||
- ./tools/deployment/mariadb-operator-cluster/090-mariadb-backup-test.sh
|
||||
- ./tools/deployment/mariadb-operator-cluster/095-mariadb-prometheus-mysql-exporter.sh
|
||||
|
||||
|
||||
...
|
||||
|
@ -28,6 +28,7 @@
|
||||
- openstack-helm-infra-openstack-support-rook
|
||||
- openstack-helm-infra-openstack-support-ssl
|
||||
- openstack-helm-infra-metacontroller
|
||||
- openstack-helm-infra-mariadb-operator
|
||||
gate:
|
||||
jobs:
|
||||
- openstack-helm-lint
|
||||
|
Loading…
Reference in New Issue
Block a user