# limitations under the License.
#
+include_recipe "apt::postgresql"
+include_recipe "munin"
+include_recipe "prometheus"
+
+package "locales-all"
package "postgresql-common"
node[:postgresql][:versions].each do |version|
defaults = node[:postgresql][:settings][:defaults] || {}
settings = node[:postgresql][:settings][version] || {}
+ standby_mode = settings[:standby_mode] || defaults[:standby_mode]
+ primary_conninfo = settings[:primary_conninfo] || defaults[:primary_conninfo]
+ restore_command = settings[:restore_command] || defaults[:restore_command]
+
+ passwords = if primary_conninfo
+ data_bag_item(primary_conninfo[:passwords][:bag],
+ primary_conninfo[:passwords][:item])
+ end
+
template "/etc/postgresql/#{version}/main/postgresql.conf" do
source "postgresql.conf.erb"
owner "postgres"
group "postgres"
- mode 0o644
- variables :version => version, :defaults => defaults, :settings => settings
+ mode "644"
+ variables :version => version,
+ :defaults => defaults,
+ :settings => settings,
+ :primary_conninfo => primary_conninfo,
+ :passwords => passwords
notifies :reload, "service[postgresql]"
+ only_if { ::Dir.exist?("/etc/postgresql/#{version}/main") }
end
template "/etc/postgresql/#{version}/main/pg_hba.conf" do
source "pg_hba.conf.erb"
owner "postgres"
group "postgres"
- mode 0o640
+ mode "640"
variables :early_rules => settings[:early_authentication_rules] || defaults[:early_authentication_rules],
:late_rules => settings[:late_authentication_rules] || defaults[:late_authentication_rules]
notifies :reload, "service[postgresql]"
+ only_if { ::Dir.exist?("/etc/postgresql/#{version}/main") }
end
template "/etc/postgresql/#{version}/main/pg_ident.conf" do
source "pg_ident.conf.erb"
owner "postgres"
group "postgres"
- mode 0o640
+ mode "640"
variables :maps => settings[:user_name_maps] || defaults[:user_name_maps]
notifies :reload, "service[postgresql]"
+ only_if { ::Dir.exist?("/etc/postgresql/#{version}/main") }
end
link "/var/lib/postgresql/#{version}/main/server.crt" do
to "/etc/ssl/certs/ssl-cert-snakeoil.pem"
+ only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") }
end
link "/var/lib/postgresql/#{version}/main/server.key" do
to "/etc/ssl/private/ssl-cert-snakeoil.key"
+ only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") }
end
- standby_mode = settings[:standby_mode] || defaults[:standby_mode]
- primary_conninfo = settings[:primary_conninfo] || defaults[:primary_conninfo]
- restore_command = settings[:restore_command] || defaults[:restore_command]
-
- if restore_command || standby_mode == "on"
- passwords = if primary_conninfo
- data_bag_item(primary_conninfo[:passwords][:bag],
- primary_conninfo[:passwords][:item])
- end
-
+ if version.to_f < 12 && (restore_command || standby_mode == "on")
template "/var/lib/postgresql/#{version}/main/recovery.conf" do
source "recovery.conf.erb"
owner "postgres"
group "postgres"
- mode 0o640
+ mode "640"
variables :standby_mode => standby_mode,
:primary_conninfo => primary_conninfo,
:restore_command => restore_command,
:passwords => passwords
notifies :reload, "service[postgresql]"
+ only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") }
end
else
template "/var/lib/postgresql/#{version}/main/recovery.conf" do
action :delete
notifies :reload, "service[postgresql]"
+ only_if { ::Dir.exist?("/var/lib/postgresql/#{version}/main") }
+ end
+ end
+
+ if version.to_f > 11 && standby_mode == "on"
+ file "/var/lib/postgresql/#{version}/main/standby.signal" do
+ owner "postgres"
+ group "postgres"
+ mode "640"
+ end
+ else
+ file "/var/lib/postgresql/#{version}/main/standby.signal" do
+ action :delete
end
end
end
template "ohai.rb.erb"
end
-package "ptop"
+package "pgtop"
package "libdbd-pg-perl"
clusters = node[:postgresql][:clusters] || []
conf_variables :port => details[:port]
end
end
+
+uris = clusters.collect do |_, details|
+ "postgres@:#{details[:port]}/postgres?host=/run/postgresql"
+end
+
+template "/etc/prometheus/exporters/postgres_queries.yml" do
+ source "postgres_queries.yml.erb"
+ owner "root"
+ group "root"
+ mode "644"
+end
+
+prometheus_exporter "postgres" do
+ port 9187
+ scrape_interval "1m"
+ scrape_timeout "1m"
+ user "postgres"
+ options "--extend.query-path=/etc/prometheus/exporters/postgres_queries.yml"
+ environment "DATA_SOURCE_URI" => uris.sort.uniq.first,
+ "PG_EXPORTER_AUTO_DISCOVER_DATABASES" => "true",
+ "PG_EXPORTER_EXCLUDE_DATABASES" => "postgres,template0,template1"
+ restrict_address_families "AF_UNIX"
+ remove_ipc false
+ subscribes :restart, "template[/etc/prometheus/exporters/postgres_queries.yml]"
+end