You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -248,7 +248,7 @@ Do this for all of the instances.
248
248
### Setting up Database network interfaces.
249
249
* Make sure that `assethost` is present in the inventory file with the correct `ansible_host` (and `ip` values if required)
250
250
* Make sure that `cassandra_network_interface` is set to the name of the network interface on which the kubenodes should talk to cassandra and on which the cassandra nodes
251
-
should communicate among each other. Run `ip addr` on one of the cassandra nodes to determine the network interface names, and which networks they correspond to. In Ubuntu 22.04 for example, interface names are predictable and individualized, eg. `enp41s0`.
251
+
should communicate among each other. Run `ip addr` on one of the cassandra nodes to determine the network interface names, and which networks they correspond to. In Ubuntu 22.04 for example, interface names are predictable and individualized, eg. `enp41s0`.
252
252
* Similarly `elasticsearch_network_interface` and `minio_network_interface` should be set to the network interface names you want elasticsearch and minio to communicate with kubernetes with, as well.
253
253
254
254
@@ -295,7 +295,7 @@ ansible_user = demo
295
295
cassandra_network_interface = enp1s0
296
296
cassandra_backup_enabled = False
297
297
cassandra_incremental_backup_enabled = False
298
-
# cassandra_backup_s3_bucket =
298
+
# cassandra_backup_s3_bucket =
299
299
300
300
[elasticsearch:vars]
301
301
elasticsearch_network_interface = enp1s0
@@ -364,8 +364,8 @@ Minio and coturn services have shared secrets with the `wire-server` helm chart.
Once K8ssandra is deployed, change the host address in `values/wire-server/values.yaml` to the K8ssandra service address, i.e.
561
561
```
562
562
sed -i 's/cassandra-external/k8ssandra-cluster-datacenter-1-service.database/g' ./values/wire-server/values.yaml
563
563
```
564
564
565
+
#### Update postgresql secret
566
+
567
+
If postgresql is part of the deployment, you need to update the postgresql credential in the `values/wire-server/secrets.yaml` file like following as the secrets are stored in the k8s environment.
568
+
569
+
```bash
570
+
For manual deployments or troubleshooting, use the generic sync script:
571
+
572
+
```bash
573
+
d bash
574
+
# Sync PostgreSQL password from K8s secret to secrets.yaml
575
+
./bin/sync-k8s-secret-to-wire-secrets.sh \
576
+
wire-postgresql-external-secret \
577
+
password \
578
+
values/wire-server/secrets.yaml \
579
+
.brig.secrets.pgPassword \
580
+
.galley.secrets.pgPassword
581
+
```
582
+
583
+
Check the details in the [Postgresql Cluster setup documentation](postgresql-cluster.md#manual-password-synchronization)
565
584
566
585
#### Deploying Wire-Server
567
586
@@ -851,7 +870,7 @@ d kubectl uncordon kubenode1
851
870
Then run:
852
871
853
872
```
854
-
d helm upgrade --install nginx-ingress-services charts/nginx-ingress-services -f values/nginx-ingress-services/values.yaml
873
+
d helm upgrade --install nginx-ingress-services charts/nginx-ingress-services -f values/nginx-ingress-services/values.yaml
855
874
```
856
875
857
876
In order to acquire SSL certificates from letsencrypt, outgoing traffic needs from VMs needs to be enabled temporarily.
@@ -895,7 +914,7 @@ For full docs with details and explanations please see https://github.com/wireap
895
914
First, make sure you have a certificate for `sftd.<yourdomain>`, or you are using letsencrypt certificate.
896
915
for bring-your-own-certificate, this could be the same wildcard or SAN certificate you used at previous steps.
897
916
898
-
Next, copy `values/sftd/prod-values.example.yaml` to `values/sftd/values.yaml`, and change the contents accordingly.
917
+
Next, copy `values/sftd/prod-values.example.yaml` to `values/sftd/values.yaml`, and change the contents accordingly.
899
918
900
919
* If your turn servers can be reached on their public IP by the SFT service, Wire recommends you enable cooperation between turn and SFT. add a line reading `turnDiscoveryEnabled: true` to `values/sftd/values.yaml`.
### 🆕 Manual Standby Clone and Registration (New Node Setup)
445
445
446
+
Note: You can always run the ansible playbook for a clean HA postgresql cluster setup. It won't remove the existing Postgresql Wire database. It will reset the repmgr to make sure a HA postgresql cluster is available.
447
+
446
448
When you need to manually clone and register a standby from scratch (corrupted data, new node, or complete rebuild):
447
449
448
450
**Step 1: Prepare the Node**
@@ -821,6 +823,7 @@ For manual deployments or troubleshooting, use the generic sync script within th
821
823
For manual deployments or troubleshooting, use the generic sync script:
822
824
823
825
```bash
826
+
d bash
824
827
# Sync PostgreSQL password from K8s secret to secrets.yaml
0 commit comments