Merge pull request #24 from enovance/bug/23/sbadia
Re-enable galera cluster httpchk
This commit is contained in:
commit
3e398c76be
@ -17,37 +17,40 @@
|
|||||||
#
|
#
|
||||||
|
|
||||||
class cloud::database::sql (
|
class cloud::database::sql (
|
||||||
$api_eth = $os_params::api_eth,
|
$api_eth = $os_params::api_eth,
|
||||||
$service_provider = sysv,
|
$service_provider = 'sysv',
|
||||||
$galera_nextserver = $os_params::galera_nextserver,
|
$galera_nextserver = $os_params::galera_nextserver,
|
||||||
$galera_master = $os_params::galera_master,
|
$galera_master = $os_params::galera_master,
|
||||||
$mysql_password = $os_params::mysql_password,
|
$keystone_db_host = $os_params::keystone_db_host,
|
||||||
$keystone_db_host = $os_params::keystone_db_host,
|
$keystone_db_user = $os_params::keystone_db_user,
|
||||||
$keystone_db_user = $os_params::keystone_db_user,
|
$keystone_db_password = $os_params::keystone_db_password,
|
||||||
$keystone_db_password = $os_params::keystone_db_password,
|
$keystone_db_allowed_hosts = $os_params::keystone_db_allowed_hosts,
|
||||||
$keystone_db_allowed_hosts = $os_params::keystone_db_allowed_hosts,
|
$cinder_db_host = $os_params::cinder_db_host,
|
||||||
$cinder_db_host = $os_params::cinder_db_host,
|
$cinder_db_user = $os_params::cinder_db_user,
|
||||||
$cinder_db_user = $os_params::cinder_db_user,
|
$cinder_db_password = $os_params::cinder_db_password,
|
||||||
$cinder_db_password = $os_params::cinder_db_password,
|
$cinder_db_allowed_hosts = $os_params::cinder_db_allowed_hosts,
|
||||||
$cinder_db_allowed_hosts = $os_params::cinder_db_allowed_hosts,
|
$glance_db_host = $os_params::glance_db_host,
|
||||||
$glance_db_host = $os_params::glance_db_host,
|
$glance_db_user = $os_params::glance_db_user,
|
||||||
$glance_db_user = $os_params::glance_db_user,
|
$glance_db_password = $os_params::glance_db_password,
|
||||||
$glance_db_password = $os_params::glance_db_password,
|
$glance_db_allowed_hosts = $os_params::glance_db_allowed_hosts,
|
||||||
$glance_db_allowed_hosts = $os_params::glance_db_allowed_hosts,
|
$heat_db_host = $os_params::heat_db_host,
|
||||||
$heat_db_host = $os_params::heat_db_host,
|
$heat_db_user = $os_params::heat_db_user,
|
||||||
$heat_db_user = $os_params::heat_db_user,
|
$heat_db_password = $os_params::heat_db_password,
|
||||||
$heat_db_password = $os_params::heat_db_password,
|
$heat_db_allowed_hosts = $os_params::heat_db_allowed_hosts,
|
||||||
$heat_db_allowed_hosts = $os_params::heat_db_allowed_hosts,
|
$nova_db_host = $os_params::nova_db_host,
|
||||||
$nova_db_host = $os_params::nova_db_host,
|
$nova_db_user = $os_params::nova_db_user,
|
||||||
$nova_db_user = $os_params::nova_db_user,
|
$nova_db_password = $os_params::nova_db_password,
|
||||||
$nova_db_password = $os_params::nova_db_password,
|
$nova_db_allowed_hosts = $os_params::nova_db_allowed_hosts,
|
||||||
$nova_db_allowed_hosts = $os_params::nova_db_allowed_hosts,
|
$neutron_db_host = $os_params::neutron_db_host,
|
||||||
$neutron_db_host = $os_params::neutron_db_host,
|
$neutron_db_user = $os_params::neutron_db_user,
|
||||||
$neutron_db_user = $os_params::neutron_db_user,
|
$neutron_db_password = $os_params::neutron_db_password,
|
||||||
$neutron_db_password = $os_params::neutron_db_password,
|
$neutron_db_allowed_hosts = $os_params::neutron_db_allowed_hosts,
|
||||||
$neutron_db_allowed_hosts = $os_params::neutron_db_allowed_hosts,
|
$mysql_root_password = $os_params::mysql_root_password,
|
||||||
$mysql_password = $os_params::mysql_password,
|
$mysql_sys_maint_user = $os_params::mysql_sys_maint_user,
|
||||||
$mysql_sys_maint = $os_params::mysql_sys_maint
|
$mysql_sys_maint_password = $os_params::mysql_sys_maint_password,
|
||||||
|
$galera_clustercheck_dbuser = $os_params::galera_clustercheck_dbuser,
|
||||||
|
$galera_clustercheck_dbpassword = $os_params::galera_clustercheck_dbuser,
|
||||||
|
$galera_clustercheck_ipaddress = $::ipaddress
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'xinetd'
|
include 'xinetd'
|
||||||
@ -90,7 +93,7 @@ class cloud::database::sql (
|
|||||||
class { 'mysql::server':
|
class { 'mysql::server':
|
||||||
config_hash => {
|
config_hash => {
|
||||||
bind_address => $api_eth,
|
bind_address => $api_eth,
|
||||||
root_password => $mysql_password,
|
root_password => $mysql_root_password,
|
||||||
},
|
},
|
||||||
notify => Service['xinetd'],
|
notify => Service['xinetd'],
|
||||||
}
|
}
|
||||||
@ -144,6 +147,7 @@ class cloud::database::sql (
|
|||||||
allowed_hosts => $heat_db_allowed_hosts,
|
allowed_hosts => $heat_db_allowed_hosts,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
# Monitoring DB
|
# Monitoring DB
|
||||||
warning('Database mapping must be updated to puppetlabs/puppetlabs-mysql >= 2.x (see: https://dev.ring.enovance.com/redmine/issues/4510)')
|
warning('Database mapping must be updated to puppetlabs/puppetlabs-mysql >= 2.x (see: https://dev.ring.enovance.com/redmine/issues/4510)')
|
||||||
|
|
||||||
@ -152,25 +156,50 @@ class cloud::database::sql (
|
|||||||
charset => 'utf8',
|
charset => 'utf8',
|
||||||
require => File['/root/.my.cnf']
|
require => File['/root/.my.cnf']
|
||||||
}
|
}
|
||||||
database_user { 'clustercheckuser@localhost':
|
database_user { "${galera_clustercheck_dbuser}@localhost":
|
||||||
ensure => 'present',
|
ensure => 'present',
|
||||||
# can not change password in clustercheck script
|
# can not change password in clustercheck script
|
||||||
password_hash => mysql_password('clustercheckpassword!'),
|
password_hash => mysql_password($galera_clustercheck_dbpassword),
|
||||||
provider => 'mysql',
|
provider => 'mysql',
|
||||||
require => File['/root/.my.cnf']
|
require => File['/root/.my.cnf']
|
||||||
}
|
}
|
||||||
database_grant { 'clustercheckuser@localhost/monitoring':
|
database_grant { "${galera_clustercheck_dbuser}@localhost/monitoring":
|
||||||
privileges => ['all']
|
privileges => ['all']
|
||||||
}
|
}
|
||||||
|
|
||||||
database_user { 'sys-maint@localhost':
|
database_user { "${mysql_sys_maint_user}@localhost":
|
||||||
ensure => 'present',
|
ensure => 'present',
|
||||||
password_hash => mysql_password($mysql_sys_maint),
|
password_hash => mysql_password($mysql_sys_maint_password),
|
||||||
provider => 'mysql',
|
provider => 'mysql',
|
||||||
require => File['/root/.my.cnf']
|
require => File['/root/.my.cnf']
|
||||||
}
|
}
|
||||||
|
|
||||||
Database_user<<| |>>
|
Database_user<<| |>>
|
||||||
|
|
||||||
|
} # if $::hostname == $galera_master
|
||||||
|
|
||||||
|
# Haproxy http monitoring
|
||||||
|
file_line { 'mysqlchk-in-etc-services':
|
||||||
|
path => '/etc/services',
|
||||||
|
line => 'mysqlchk 9200/tcp',
|
||||||
|
match => '^mysqlchk 9200/tcp$',
|
||||||
|
notify => Service['xinetd'];
|
||||||
|
}
|
||||||
|
|
||||||
|
file {
|
||||||
|
'/etc/xinetd.d/mysqlchk':
|
||||||
|
content => template('cloud/database/mysqlchk.erb'),
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0755',
|
||||||
|
require => File['/usr/bin/clustercheck'],
|
||||||
|
notify => Service['xinetd'];
|
||||||
|
'/usr/bin/clustercheck':
|
||||||
|
ensure => present,
|
||||||
|
content => template('cloud/database/clustercheck.erb'),
|
||||||
|
mode => '0755',
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root';
|
||||||
}
|
}
|
||||||
|
|
||||||
exec{'clean-mysql-binlog':
|
exec{'clean-mysql-binlog':
|
||||||
@ -185,28 +214,15 @@ class cloud::database::sql (
|
|||||||
onlyif => "stat ${::mysql::params::datadir}/ib_logfile0 && test `du -sh ${::mysql::params::datadir}/ib_logfile0 | cut -f1` != '256M'",
|
onlyif => "stat ${::mysql::params::datadir}/ib_logfile0 && test `du -sh ${::mysql::params::datadir}/ib_logfile0 | cut -f1` != '256M'",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
file{'/etc/mysql/sys.cnf':
|
file{'/etc/mysql/sys.cnf':
|
||||||
content => "# Automatically generated. DO NOT TOUCH!
|
ensure => file,
|
||||||
[client]
|
content => template('cloud/database/sys.cnf.erb'),
|
||||||
host = localhost
|
owner => 'root',
|
||||||
user = sys-maint
|
group => 'root',
|
||||||
password = ${mysql_sys_maint}
|
|
||||||
socket = /var/run/mysqld/mysqld.sock
|
|
||||||
[mysql_upgrade]
|
|
||||||
host = localhost
|
|
||||||
user = sys-maint
|
|
||||||
password = ${mysql_sys_maint}
|
|
||||||
socket = /var/run/mysqld/mysqld.sock
|
|
||||||
basedir = /usr
|
|
||||||
",
|
|
||||||
mode => '0600',
|
mode => '0600',
|
||||||
require => Exec['clean-mysql-binlog'],
|
require => Exec['clean-mysql-binlog'],
|
||||||
}
|
}
|
||||||
|
|
||||||
# Disabled because monitor depends on checkmulti which is broken
|
|
||||||
# class { 'monitor::galera::httpsrv': }
|
|
||||||
|
|
||||||
# TODO/WARNING(Gonéri): template changes do not trigger configuration changes
|
# TODO/WARNING(Gonéri): template changes do not trigger configuration changes
|
||||||
mysql::server::config{'basic_config':
|
mysql::server::config{'basic_config':
|
||||||
notify_service => true,
|
notify_service => true,
|
||||||
|
@ -205,7 +205,7 @@ class cloud::loadbalancer(
|
|||||||
options => {
|
options => {
|
||||||
'mode' => 'tcp',
|
'mode' => 'tcp',
|
||||||
'balance' => 'roundrobin',
|
'balance' => 'roundrobin',
|
||||||
'option' => ['tcpka', 'tcplog'],
|
'option' => ['tcpka', 'tcplog', 'httpchk'], #httpchk mandatory expect 200 on port 9000
|
||||||
'timeout client' => '400s',
|
'timeout client' => '400s',
|
||||||
'timeout server' => '400s',
|
'timeout server' => '400s',
|
||||||
}
|
}
|
||||||
|
@ -27,36 +27,42 @@ describe 'cloud::database::sql' do
|
|||||||
end
|
end
|
||||||
|
|
||||||
let :params do
|
let :params do
|
||||||
{ :service_provider => 'sysv',
|
{
|
||||||
:api_eth => '10.0.0.1',
|
:service_provider => 'sysv',
|
||||||
:galera_master => '10.0.0.1',
|
:api_eth => '10.0.0.1',
|
||||||
:galera_nextserver => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
:galera_master => '10.0.0.1',
|
||||||
:mysql_password => 'secrete',
|
:galera_nextserver => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
||||||
:keystone_db_host => '10.0.0.1',
|
:keystone_db_host => '10.0.0.1',
|
||||||
:keystone_db_user => 'keystone',
|
:keystone_db_user => 'keystone',
|
||||||
:keystone_db_password => 'secrete',
|
:keystone_db_password => 'secrete',
|
||||||
:keystone_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
:keystone_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
||||||
:cinder_db_host => '10.0.0.1',
|
:cinder_db_host => '10.0.0.1',
|
||||||
:cinder_db_user => 'cinder',
|
:cinder_db_user => 'cinder',
|
||||||
:cinder_db_password => 'secrete',
|
:cinder_db_password => 'secrete',
|
||||||
:cinder_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
:cinder_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
||||||
:glance_db_host => '10.0.0.1',
|
:glance_db_host => '10.0.0.1',
|
||||||
:glance_db_user => 'glance',
|
:glance_db_user => 'glance',
|
||||||
:glance_db_password => 'secrete',
|
:glance_db_password => 'secrete',
|
||||||
:glance_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
:glance_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
||||||
:heat_db_host => '10.0.0.1',
|
:heat_db_host => '10.0.0.1',
|
||||||
:heat_db_user => 'heat',
|
:heat_db_user => 'heat',
|
||||||
:heat_db_password => 'secrete',
|
:heat_db_password => 'secrete',
|
||||||
:heat_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
:heat_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
||||||
:nova_db_host => '10.0.0.1',
|
:nova_db_host => '10.0.0.1',
|
||||||
:nova_db_user => 'nova',
|
:nova_db_user => 'nova',
|
||||||
:nova_db_password => 'secrete',
|
:nova_db_password => 'secrete',
|
||||||
:nova_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
:nova_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
||||||
:neutron_db_host => '10.0.0.1',
|
:neutron_db_host => '10.0.0.1',
|
||||||
:neutron_db_user => 'neutron',
|
:neutron_db_user => 'neutron',
|
||||||
:neutron_db_password => 'secrete',
|
:neutron_db_password => 'secrete',
|
||||||
:neutron_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
:neutron_db_allowed_hosts => ['10.0.0.1','10.0.0.2','10.0.0.3'],
|
||||||
:mysql_sys_maint => 'sys' }
|
:mysql_root_password => 'secrete',
|
||||||
|
:mysql_sys_maint_user => 'sys-maint',
|
||||||
|
:mysql_sys_maint_password => 'sys',
|
||||||
|
:galera_clustercheck_dbuser => 'clustercheckuser',
|
||||||
|
:galera_clustercheck_dbpassword => 'clustercheckpassword!',
|
||||||
|
:galera_clustercheck_ipaddress => '10.0.0.1'
|
||||||
|
}
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'configure mysql galera server' do
|
it 'configure mysql galera server' do
|
||||||
@ -67,10 +73,25 @@ describe 'cloud::database::sql' do
|
|||||||
)
|
)
|
||||||
|
|
||||||
should contain_class('mysql::server').with(
|
should contain_class('mysql::server').with(
|
||||||
:config_hash => { 'bind_address' => '10.0.0.1', 'root_password' => 'secrete' },
|
:config_hash => { 'bind_address' => '10.0.0.1', 'root_password' => params[:mysql_root_password] },
|
||||||
:notify => 'Service[xinetd]'
|
:notify => 'Service[xinetd]'
|
||||||
)
|
)
|
||||||
end
|
end # configure mysql galera server
|
||||||
|
|
||||||
|
context 'configure mysqlchk http replication' do
|
||||||
|
it { should contain_file_line('mysqlchk-in-etc-services').with(
|
||||||
|
:line => 'mysqlchk 9200/tcp',
|
||||||
|
:path => '/etc/services',
|
||||||
|
:notify => 'Service[xinetd]'
|
||||||
|
)}
|
||||||
|
|
||||||
|
it { should contain_file('/etc/xinetd.d/mysqlchk').with_mode('0755') }
|
||||||
|
it { should contain_file('/usr/bin/clustercheck').with_mode('0755') }
|
||||||
|
it { should contain_file('/usr/bin/clustercheck').with_content(/MYSQL_USERNAME="#{params[:galera_clustercheck_dbuser]}"/)}
|
||||||
|
it { should contain_file('/usr/bin/clustercheck').with_content(/MYSQL_PASSWORD="#{params[:galera_clustercheck_dbpassword]}"/)}
|
||||||
|
it { should contain_file('/etc/xinetd.d/mysqlchk').with_content(/bind = #{params[:galera_clustercheck_ipaddress]}/)}
|
||||||
|
|
||||||
|
end # configure mysqlchk http replication
|
||||||
|
|
||||||
context 'configure databases on the galera master server' do
|
context 'configure databases on the galera master server' do
|
||||||
|
|
||||||
@ -137,23 +158,35 @@ describe 'cloud::database::sql' do
|
|||||||
:ensure => 'present',
|
:ensure => 'present',
|
||||||
:charset => 'utf8'
|
:charset => 'utf8'
|
||||||
)
|
)
|
||||||
should contain_database_user('clustercheckuser@localhost').with(
|
should contain_database_user("#{params[:galera_clustercheck_dbuser]}@localhost").with(
|
||||||
:ensure => 'present',
|
:ensure => 'present',
|
||||||
:password_hash => '*FDC68394456829A7344C2E9D4CDFD43DCE2EFD8F',
|
:password_hash => '*FDC68394456829A7344C2E9D4CDFD43DCE2EFD8F',
|
||||||
:provider => 'mysql'
|
:provider => 'mysql'
|
||||||
)
|
)
|
||||||
should contain_database_grant('clustercheckuser@localhost/monitoring').with(
|
should contain_database_grant("#{params[:galera_clustercheck_dbuser]}@localhost/monitoring").with(
|
||||||
:privileges => 'all'
|
:privileges => 'all'
|
||||||
)
|
)
|
||||||
should contain_database_user('sys-maint@localhost').with(
|
should contain_database_user("#{params[:mysql_sys_maint_user]}@localhost").with(
|
||||||
:ensure => 'present',
|
:ensure => 'present',
|
||||||
:password_hash => '*BE353D0D7826681F8B7C136ED9824915F5B99E7D',
|
:password_hash => '*BE353D0D7826681F8B7C136ED9824915F5B99E7D',
|
||||||
:provider => 'mysql'
|
:provider => 'mysql'
|
||||||
)
|
)
|
||||||
end
|
end # configure monitoring database
|
||||||
end
|
end # configure databases on the galera master server
|
||||||
|
|
||||||
end
|
context 'configure MySQL sys config' do
|
||||||
|
it { should contain_file('/etc/mysql/sys.cnf').with(
|
||||||
|
:mode => '0600',
|
||||||
|
:owner => 'root',
|
||||||
|
:group => 'root',
|
||||||
|
:require => 'Exec[clean-mysql-binlog]'
|
||||||
|
)}
|
||||||
|
|
||||||
|
it { should contain_file('/etc/mysql/sys.cnf').with_content(/password = #{params[:mysql_sys_maint_password]}/)}
|
||||||
|
|
||||||
|
end # configure MySQL sys config
|
||||||
|
|
||||||
|
end # openstack database sql
|
||||||
|
|
||||||
context 'on Debian platforms' do
|
context 'on Debian platforms' do
|
||||||
let :facts do
|
let :facts do
|
||||||
|
38
templates/database/clustercheck.erb
Normal file
38
templates/database/clustercheck.erb
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# Managed by puppet
|
||||||
|
# Module cloud
|
||||||
|
#
|
||||||
|
# Script to make a proxy (ie HAProxy) capable of monitoring Percona XtraDB Cluster nodes properly
|
||||||
|
#
|
||||||
|
# Author: Olaf van Zandwijk olaf.vanzandwijk@nedap.com
|
||||||
|
# Documentation and download: https://github.com/olafz/percona-clustercheck
|
||||||
|
#
|
||||||
|
# Based on the original script from Unai Rodriguez
|
||||||
|
#
|
||||||
|
|
||||||
|
MYSQL_USERNAME="<%= @galera_clustercheck_dbuser %>"
|
||||||
|
MYSQL_PASSWORD="<%= @galera_clustercheck_dbpassword %>"
|
||||||
|
ERR_FILE="/dev/null"
|
||||||
|
AVAILABLE_WHEN_DONOR=0
|
||||||
|
|
||||||
|
#
|
||||||
|
# Perform the query to check the wsrep_local_state
|
||||||
|
#
|
||||||
|
WSREP_STATUS=`mysql --user=${MYSQL_USERNAME} --password=${MYSQL_PASSWORD} -e "SHOW STATUS LIKE 'wsrep_local_state';" 2>${ERR_FILE} | awk '{if (NR!=1){print $2}}' 2>${ERR_FILE}`
|
||||||
|
|
||||||
|
if [[ "${WSREP_STATUS}" == "4" ]] || [[ "${WSREP_STATUS}" == "2" && ${AVAILABLE_WHEN_DONOR} == 1 ]]
|
||||||
|
then
|
||||||
|
# Percona XtraDB Cluster node local state is 'Synced' == return HTTP 200
|
||||||
|
/bin/echo -en "HTTP/1.1 200 OK\r\n"
|
||||||
|
/bin/echo -en "Content-Type: text/plain\r\n"
|
||||||
|
/bin/echo -en "\r\n"
|
||||||
|
/bin/echo -en "Mariadb Cluster Node is synced.\r\n"
|
||||||
|
/bin/echo -en "\r\n"
|
||||||
|
else
|
||||||
|
# Percona XtraDB Cluster node local state is not 'Synced' == return HTTP 503
|
||||||
|
/bin/echo -en "HTTP/1.1 503 Service Unavailable\r\n"
|
||||||
|
/bin/echo -en "Content-Type: text/plain\r\n"
|
||||||
|
/bin/echo -en "\r\n"
|
||||||
|
/bin/echo -en "Mariadb Cluster Node is not synced.\r\n"
|
||||||
|
/bin/echo -en "\r\n"
|
||||||
|
fi
|
23
templates/database/mysqlchk.erb
Normal file
23
templates/database/mysqlchk.erb
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
# Managed by puppet
|
||||||
|
# Module cloud
|
||||||
|
#
|
||||||
|
# default: on
|
||||||
|
# description: mysqlchk
|
||||||
|
service mysqlchk
|
||||||
|
{
|
||||||
|
# this is a config for xinetd, place it in /etc/xinetd.d/
|
||||||
|
disable = no
|
||||||
|
flags = REUSE
|
||||||
|
socket_type = stream
|
||||||
|
port = 9200
|
||||||
|
wait = no
|
||||||
|
user = nobody
|
||||||
|
server = /usr/bin/clustercheck
|
||||||
|
log_on_failure += USERID
|
||||||
|
#FIXME(sbadia) Security: Restrict this parameter to HAProxy pool.
|
||||||
|
only_from = 0.0.0.0/0
|
||||||
|
bind = <%= @galera_clustercheck_ipaddress %>
|
||||||
|
# recommended to put the IPs that need
|
||||||
|
# to connect exclusively (security purposes)
|
||||||
|
per_source = UNLIMITED
|
||||||
|
}
|
14
templates/database/sys.cnf.erb
Normal file
14
templates/database/sys.cnf.erb
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Managed by Puppet
|
||||||
|
# Module cloud::database::sql
|
||||||
|
#
|
||||||
|
[client]
|
||||||
|
host = localhost
|
||||||
|
user = sys-maint
|
||||||
|
password = <%= @mysql_sys_maint_password %>
|
||||||
|
socket = /var/run/mysqld/mysqld.sock
|
||||||
|
[mysql_upgrade]
|
||||||
|
host = localhost
|
||||||
|
user = sys-maint
|
||||||
|
password = <%= @mysql_sys_maint_password %>
|
||||||
|
socket = /var/run/mysqld/mysqld.sock
|
||||||
|
basedir = /usr
|
Loading…
x
Reference in New Issue
Block a user