X-Git-Url: https://git.openstreetmap.org/chef.git/blobdiff_plain/238a31cadd90bb63a5dbdc7f4406aa51d786cc9d..HEAD:/cookbooks/planet/recipes/replication.rb diff --git a/cookbooks/planet/recipes/replication.rb b/cookbooks/planet/recipes/replication.rb index 364e0b814..d719d11ae 100644 --- a/cookbooks/planet/recipes/replication.rb +++ b/cookbooks/planet/recipes/replication.rb @@ -22,9 +22,9 @@ require "yaml" include_recipe "accounts" include_recipe "apt" include_recipe "osmosis" +include_recipe "planet::aws" include_recipe "ruby" include_recipe "tools" -include_recipe "awscli" db_passwords = data_bag_item("db", "passwords") @@ -207,6 +207,8 @@ systemd_service "replication-changesets" do user "planet" exec_start "/usr/local/bin/replicate-changesets /etc/replication/changesets.conf" sandbox :enable_network => true + protect_home "tmpfs" + bind_paths "/home/planet" read_write_paths [ "/run/replication", "/store/planet/replication/changesets" @@ -267,6 +269,8 @@ systemd_service "replication-minutely" do working_directory "/etc/replication" exec_start "/usr/local/bin/replicate-minute" sandbox :enable_network => true + protect_home "tmpfs" + bind_paths "/home/planet" read_write_paths [ "/run/replication", "/store", @@ -310,10 +314,12 @@ end systemd_service "replication-hourly" do description "Hourly replication" user "planet" - exec_start "/usr/local/bin/osmosis -q --merge-replication-files workingDirectory=/var/lib/replication/hour" + exec_start "/usr/local/bin/replicate-hour" environment "LD_PRELOAD" => "/opt/flush/flush.so" sandbox :enable_network => true memory_deny_write_execute false + protect_home "tmpfs" + bind_paths "/home/planet" read_write_paths [ "/store/planet/replication/hour", "/var/lib/replication/hour" @@ -354,10 +360,12 @@ end systemd_service "replication-daily" do description "Daily replication" user "planet" - exec_start "/usr/local/bin/osmosis -q --merge-replication-files workingDirectory=/var/lib/replication/day" + exec_start "/usr/local/bin/replicate-day" environment "LD_PRELOAD" => "/opt/flush/flush.so" sandbox :enable_network => true memory_deny_write_execute false + protect_home "tmpfs" + bind_paths "/home/planet" read_write_paths [ "/store/planet/replication/day", "/var/lib/replication/day"