jetstack / tarmak

A toolkit for Kubernetes cluster provisioning and lifecycle management
Apache License 2.0
269 stars 49 forks source link

Fixes the installation of consul-backinator #799

Closed JoshVanL closed 5 years ago

JoshVanL commented 5 years ago

fixes #798 /assign @simonswine

Fix consul-backinator installation
JoshVanL commented 5 years ago

/test puppet-tarmak-acceptance-ubuntu v1.11 /unassign /assign @simonswine

simonswine commented 5 years ago

/test puppet-tarmak-acceptance-ubuntu v1.11

JoshVanL commented 5 years ago

/test puppet-tarmak-acceptance-ubuntu v1.11

simonswine commented 5 years ago

Have you been successful at backing up:

systemctl start consul-backup.service
May 01 16:02:41 centos-72-x64 systemd[1]: Starting Backup consul KV store...
May 01 16:02:41 centos-72-x64 consul-backup.sh[5067]: 2019/05/01 16:02:41 [Error] Failed to backup key data: No keys found
May 01 16:02:41 centos-72-x64 systemd[1]: consul-backup.service: main process exited, code=exited, status=1/FAILURE
May 01 16:02:41 centos-72-x64 systemd[1]: Failed to start Backup consul KV store.
simonswine commented 5 years ago

I made sure there is something stored in the KV store

simonswine commented 5 years ago

/assign @JoshVanL /unassign

JoshVanL commented 5 years ago

@simonswine Seems fine for me

May 01 14:57:03 ip-10-99-32-10.eu-west-1.compute.internal systemd[1]: Starting Backup consul KV store...
May 01 14:57:03 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: 2019/05/01 14:57:03 [Success] Backed up 234 keys from / to /tmp/consul-backup
May 01 14:57:03 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: 2019/05/01 14:57:03 [Success] Backed up 2 ACL tokens from  to /tmp/consul-backup-acls
May 01 14:57:03 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: Keep your backup and signature files in a safe place.
May 01 14:57:03 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: You will need both to restore your data.
May 01 14:57:04 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: [217B blob data]
May 01 14:57:04 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: [225B blob data]
May 01 14:57:05 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: [227B blob data]
May 01 14:57:05 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[18830]: [235B blob data]
May 01 14:57:05 ip-10-99-32-10.eu-west-1.compute.internal systemd[1]: Started Backup consul KV store.
May 01 16:27:07 ip-10-99-32-10.eu-west-1.compute.internal systemd[1]: Starting Backup consul KV store..
JoshVanL commented 5 years ago

/unassign /assign @simonswine

JoshVanL commented 5 years ago

/assign @MattiasGees

MattiasGees commented 5 years ago

I tested this and it worked properly for me:

-- Logs begin at Tue 2019-05-07 11:31:42 UTC, end at Tue 2019-05-07 12:48:25 UTC. --
May 07 12:44:06 ip-10-99-32-10.eu-west-1.compute.internal systemd[1]: Starting Backup consul KV store...
May 07 12:44:06 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: 2019/05/07 12:44:06 [Success] Backed up 146 keys from /
May 07 12:44:06 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: 2019/05/07 12:44:06 [Success] Backed up 2 ACL tokens fr
May 07 12:44:06 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: Keep your backup and signature files in a safe place.
May 07 12:44:06 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: You will need both to restore your data.
May 07 12:44:07 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: [231B blob data]
May 07 12:44:07 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: [237B blob data]
May 07 12:44:08 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: [239B blob data]
May 07 12:44:08 ip-10-99-32-10.eu-west-1.compute.internal consul-backup.sh[17257]: [247B blob data]
May 07 12:44:08 ip-10-99-32-10.eu-west-1.compute.internal systemd[1]: Started Backup consul KV store.
MattiasGees commented 5 years ago

/approve /lgtm /unassign /assign @JoshVanL

jetstack-bot commented 5 years ago

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: JoshVanL, MattiasGees

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files: - ~~[puppet/OWNERS](https://github.com/jetstack/tarmak/blob/master/puppet/OWNERS)~~ [JoshVanL] Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment