diff options
author | Quentin <quentin@dufour.io> | 2021-01-18 08:18:21 +0100 |
---|---|---|
committer | Quentin <quentin@dufour.io> | 2021-01-18 08:18:21 +0100 |
commit | ad6017eea058f7cb6fdf078783f992a4f45a3e15 (patch) | |
tree | 6620bcc9e1ea61a5689b763b9ad8280275e35e76 /app/backup/deploy | |
parent | 79b7273ff2a487d6721d393682c8ad3927467a75 (diff) | |
parent | c642370def01f09d966b3b9c643cfe416ea115cf (diff) | |
download | infrastructure-ad6017eea058f7cb6fdf078783f992a4f45a3e15.tar.gz infrastructure-ad6017eea058f7cb6fdf078783f992a4f45a3e15.zip |
Merge pull request 'Reorganize app/ and add script for secret management' (#29) from test_reorganize into master
Reviewed-on: https://git.deuxfleurs.fr/Deuxfleurs/infrastructure/pulls/29
Diffstat (limited to 'app/backup/deploy')
-rw-r--r-- | app/backup/deploy/backup.hcl | 67 |
1 files changed, 67 insertions, 0 deletions
diff --git a/app/backup/deploy/backup.hcl b/app/backup/deploy/backup.hcl new file mode 100644 index 0000000..08fd923 --- /dev/null +++ b/app/backup/deploy/backup.hcl @@ -0,0 +1,67 @@ +job "backup_periodic" { + datacenters = ["dc1"] + + type = "batch" + + periodic { + // Launch every hour + cron = "0 * * * * *" + + // Do not allow overlapping runs. + prohibit_overlap = true + } + + task "backup-consul" { + driver = "docker" + + config { + image = "lxpz/backup_consul:12" + volumes = [ + "secrets/id_ed25519:/root/.ssh/id_ed25519", + "secrets/id_ed25519.pub:/root/.ssh/id_ed25519.pub", + "secrets/known_hosts:/root/.ssh/known_hosts" + ] + network_mode = "host" + } + + env { + CONSUL_HTTP_ADDR = "http://consul.service.2.cluster.deuxfleurs.fr:8500" + } + + template { + data = <<EOH +TARGET_SSH_USER={{ key "secrets/backup/target_ssh_user" }} +TARGET_SSH_PORT={{ key "secrets/backup/target_ssh_port" }} +TARGET_SSH_HOST={{ key "secrets/backup/target_ssh_host" }} +TARGET_SSH_DIR={{ key "secrets/backup/target_ssh_dir" }} +EOH + + destination = "secrets/env_vars" + env = true + } + + template { + data = "{{ key \"secrets/backup/id_ed25519\" }}" + destination = "secrets/id_ed25519" + } + template { + data = "{{ key \"secrets/backup/id_ed25519.pub\" }}" + destination = "secrets/id_ed25519.pub" + } + template { + data = "{{ key \"secrets/backup/target_ssh_fingerprint\" }}" + destination = "secrets/known_hosts" + } + + resources { + memory = 200 + } + + restart { + attempts = 2 + interval = "30m" + delay = "15s" + mode = "fail" + } + } +} |