Skip to content

Commit 7861246

Browse files
committed
cleanup
1 parent 15e26e1 commit 7861246

File tree

4 files changed

+10
-144
lines changed

4 files changed

+10
-144
lines changed

pkg/cluster/cluster.go

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -352,12 +352,6 @@ func (c *Cluster) Create() (err error) {
352352
}
353353
c.logger.Info("a TDE secret was successfully created")
354354
}
355-
// if c.Postgresql.Spec.Monitoring != nil {
356-
// if err := c.createMonitoringSecret(); err != nil {
357-
// return fmt.Errorf("could not create the monitoring secret: %v", err)
358-
// }
359-
// c.logger.Info("a monitoring secret was successfully created")
360-
// }
361355

362356
if specHasPgbackrestClone(&c.Postgresql.Spec) {
363357
if err := c.createPgbackrestCloneConfig(); err != nil {
@@ -1012,12 +1006,6 @@ func (c *Cluster) Update(oldSpec, newSpec *cpov1.Postgresql) error {
10121006
syncStatefulSet = true
10131007
}
10141008

1015-
//sync monitoring container
1016-
if !reflect.DeepEqual(oldSpec.Spec.Monitoring, newSpec.Spec.Monitoring) {
1017-
syncStatefulSet = true
1018-
c.syncMonitoringSecret(oldSpec, newSpec)
1019-
}
1020-
10211009
//sync sts when there is a change in the pgbackrest secret, since we need to mount this
10221010
if newSpec.Spec.Backup != nil && oldSpec.Spec.Backup != nil &&
10231011
newSpec.Spec.Backup.Pgbackrest != nil && oldSpec.Spec.Backup.Pgbackrest != nil &&

pkg/cluster/database.go

Lines changed: 1 addition & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -89,51 +89,7 @@ const (
8989
TO {{.pooler_user}};
9090
GRANT USAGE ON SCHEMA {{.pooler_schema}} TO {{.pooler_user}};
9191
`
92-
// CPOmonitoring = `
93-
// GRANT pg_monitor TO cpo_exporter;
94-
// GRANT SELECT ON TABLE pg_authid TO cpo_exporter;
95-
96-
// CREATE SCHEMA IF NOT EXISTS exporter;
97-
// ALTER SCHEMA exporter OWNER TO cpo_exporter;
98-
// CREATE EXTENSION IF NOT EXISTS pgnodemx with SCHEMA exporter;
99-
// alter extension pgnodemx UPDATE;
100-
// CREATE TABLE IF NOT EXISTS exporter.pgbackrestbackupinfo (
101-
// data jsonb NOT NULL,
102-
// data_time timestamp with time zone DEFAULT now() NOT NULL
103-
// )
104-
// WITH (autovacuum_analyze_scale_factor='0', autovacuum_vacuum_scale_factor='0', autovacuum_vacuum_threshold='2', autovacuum_analyze_threshold='2');
105-
// ALTER TABLE exporter.pgbackrestbackupinfo OWNER TO cpo_exporter;
106-
107-
// GRANT pg_execute_server_program TO cpo_exporter;
108-
109-
// CREATE OR REPLACE FUNCTION exporter.update_pgbackrest_info()
110-
// RETURNS VOID AS $$
111-
// DECLARE
112-
// last_entry_timestamp TIMESTAMP;
113-
// record_count INT;
114-
// BEGIN
115-
// SELECT COUNT(*) INTO record_count
116-
// FROM exporter.pgbackrestbackupinfo;
117-
118-
// IF record_count > 0 THEN
119-
// SELECT data_time INTO last_entry_timestamp
120-
// FROM exporter.pgbackrestbackupinfo
121-
// ORDER BY data_time DESC
122-
// LIMIT 1;
123-
124-
// IF last_entry_timestamp < NOW() - INTERVAL '5 minutes' THEN
125-
// DELETE FROM exporter.pgbackrestbackupinfo;
126-
// ELSE
127-
// RETURN;
128-
// END IF;
129-
// END IF;
130-
131-
// EXECUTE format(
132-
// 'COPY exporter.pgbackrestbackupinfo (data) FROM program ''pgbackrest info --output=json'' WITH (FORMAT text, DELIMITER ''|'')'
133-
// );
134-
// END;
135-
// $$ LANGUAGE plpgsql;
136-
// `
92+
13793
cpoMonitoring = `
13894
GRANT pg_monitor TO cpo_exporter;
13995
GRANT SELECT ON TABLE pg_authid TO cpo_exporter;

pkg/cluster/resources.go

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ import (
1515

1616
cpov1 "github.com/cybertec-postgresql/cybertec-pg-operator/pkg/apis/cpo.opensource.cybertec.at/v1"
1717
"github.com/cybertec-postgresql/cybertec-pg-operator/pkg/util"
18-
"github.com/cybertec-postgresql/cybertec-pg-operator/pkg/util/constants"
1918
"github.com/cybertec-postgresql/cybertec-pg-operator/pkg/util/k8sutil"
2019
"github.com/cybertec-postgresql/cybertec-pg-operator/pkg/util/retryutil"
2120
)
@@ -96,15 +95,15 @@ func (c *Cluster) createStatefulSet() (*appsv1.StatefulSet, error) {
9695
}
9796
c.Spec.Sidecars = append(c.Spec.Sidecars, *sidecar) //populate the sidecar spec so that the sidecar is automatically created
9897

99-
//Add monitoring user
100-
flg := cpov1.UserFlags{constants.RoleFlagLogin}
101-
if c.Spec.Users != nil {
102-
c.Spec.Users[monitorUsername] = flg
103-
} else {
104-
users := make(map[string]cpov1.UserFlags)
105-
c.Spec.Users = users
106-
c.Spec.Users[monitorUsername] = flg
107-
}
98+
// //Add monitoring user
99+
// flg := cpov1.UserFlags{constants.RoleFlagLogin}
100+
// if c.Spec.Users != nil {
101+
// c.Spec.Users[monitorUsername] = flg
102+
// } else {
103+
// users := make(map[string]cpov1.UserFlags)
104+
// c.Spec.Users = users
105+
// c.Spec.Users[monitorUsername] = flg
106+
// }
108107
}
109108

110109
statefulSetSpec, err := c.generateStatefulSet(&c.Spec)

pkg/cluster/sync.go

Lines changed: 0 additions & 77 deletions
Original file line numberDiff line numberDiff line change
@@ -192,11 +192,6 @@ func (c *Cluster) Sync(newSpec *cpov1.Postgresql) error {
192192
return fmt.Errorf("error refreshing restore configmap: %v", err)
193193
}
194194

195-
// sync monitoring
196-
if err = c.syncMonitoringSecret(&oldSpec, newSpec); err != nil {
197-
return fmt.Errorf("could not sync monitoring: %v", err)
198-
}
199-
200195
if err = c.initUsers(); err != nil {
201196
err = fmt.Errorf("could not init users: %v", err)
202197
return err
@@ -1689,37 +1684,6 @@ func (c *Cluster) createTDESecret() error {
16891684
return nil
16901685
}
16911686

1692-
func (c *Cluster) createMonitoringSecret() error {
1693-
c.logger.Info("creating Monitoring secret")
1694-
c.setProcessName("creating Monitoring secret")
1695-
generatedKey := make([]byte, 16)
1696-
rand.Read(generatedKey)
1697-
1698-
generatedSecret := v1.Secret{
1699-
ObjectMeta: metav1.ObjectMeta{
1700-
Name: c.getMonitoringSecretName(),
1701-
Namespace: c.Namespace,
1702-
Labels: c.labelsSet(true),
1703-
},
1704-
Type: v1.SecretTypeOpaque,
1705-
Data: map[string][]byte{
1706-
"username": []byte(monitorUsername),
1707-
"password": []byte(fmt.Sprintf("%x", generatedKey)),
1708-
},
1709-
}
1710-
secret, err := c.KubeClient.Secrets(generatedSecret.Namespace).Create(context.TODO(), &generatedSecret, metav1.CreateOptions{})
1711-
if err == nil {
1712-
c.Secrets[secret.UID] = secret
1713-
c.logger.Debugf("created new secret %s, namespace: %s, uid: %s", util.NameFromMeta(secret.ObjectMeta), generatedSecret.Namespace, secret.UID)
1714-
} else {
1715-
if !k8sutil.ResourceAlreadyExists(err) {
1716-
return fmt.Errorf("could not create secret for Monitoring %s: in namespace %s: %v", util.NameFromMeta(secret.ObjectMeta), generatedSecret.Namespace, err)
1717-
}
1718-
}
1719-
1720-
return nil
1721-
}
1722-
17231687
// delete monitoring secret
17241688
func (c *Cluster) deleteMonitoringSecret() (err error) {
17251689
// Repeat the same for the secret object
@@ -1739,47 +1703,6 @@ func (c *Cluster) deleteMonitoringSecret() (err error) {
17391703
return nil
17401704
}
17411705

1742-
// Sync monitoring
1743-
// In case of monitoring is added/deleted, we need to
1744-
// 1. Update sts to in/exclude the exporter contianer
1745-
// 2. Add/Delete the respective user
1746-
// 3. Add/Delete the respective secret
1747-
func (c *Cluster) syncMonitoringSecret(oldSpec, newSpec *cpov1.Postgresql) error {
1748-
c.logger.Info("syncing Monitoring secret")
1749-
c.setProcessName("syncing Monitoring secret")
1750-
1751-
if newSpec.Spec.Monitoring != nil && oldSpec.Spec.Monitoring == nil {
1752-
// Create monitoring secret
1753-
if err := c.createMonitoringSecret(); err != nil {
1754-
return fmt.Errorf("could not create the monitoring secret: %v", err)
1755-
} else {
1756-
flags := []string{constants.RoleFlagLogin}
1757-
monitorUser := map[string]spec.PgUser{
1758-
monitorUsername: {
1759-
Origin: spec.RoleOriginInfrastructure,
1760-
Name: monitorUsername,
1761-
Namespace: c.Namespace,
1762-
Flags: flags,
1763-
},
1764-
}
1765-
c.pgUsers[monitorUsername] = monitorUser[monitorUsername]
1766-
}
1767-
c.logger.Info("monitoring secret was successfully created")
1768-
} else if newSpec.Spec.Monitoring == nil && oldSpec.Spec.Monitoring != nil {
1769-
// Delete the monitoring secret
1770-
if err := c.deleteMonitoringSecret(); err != nil {
1771-
return fmt.Errorf("could not delete the monitoring secret: %v", err)
1772-
} else {
1773-
// Delete the monitoring user
1774-
monitorUser := c.pgUsers[monitorUsername]
1775-
monitorUser.Deleted = true
1776-
c.pgUsers[monitorUsername] = monitorUser
1777-
}
1778-
c.logger.Info("monitoring secret was successfully deleted")
1779-
}
1780-
return nil
1781-
}
1782-
17831706
func generateRootCertificate(
17841707
privateKey *ecdsa.PrivateKey, serialNumber *big.Int,
17851708
) (*x509.Certificate, error) {

0 commit comments

Comments
 (0)