Skip to content

backup: copy the dali snapshots to the azure's backup vm

  • support the --no-sync-snap to only transfer the snapshot created by sanoid
  • support the target dataset override because it's not possible to put a / in the yaml key

Related to T3889

Test Plan

  • dali:
    • only collected ressources not detected by octocatalog-diff
*** Running octocatalog-diff on host dali.internal.admin.swh.network
I, [2022-02-24T09:07:23.834782 #4106756]  INFO -- : Catalogs compiled for dali.internal.admin.swh.network
I, [2022-02-24T09:07:24.176202 #4106756]  INFO -- : Diffs computed for dali.internal.admin.swh.network
I, [2022-02-24T09:07:24.176239 #4106756]  INFO -- : No differences
*** End octocatalog-diff on dali.internal.admin.swh.network
  • backup01:
diff origin/production/backup01.euwest.azure.internal.softwareheritage.org current/backup01.euwest.azure.internal.softwareheritage.org
*******************************************
  Apt::Setting[list-backports] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # backports
      -deb http://deb.debian.org/debian/ bullseye-backports main
      +deb http://deb.debian.org/debian/ bullseye-backports main contrib non-free
*******************************************
  Apt::Setting[list-debian-security] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # debian-security
      -deb http://deb.debian.org/debian-security/ bullseye-security main
      +deb http://deb.debian.org/debian-security/ bullseye-security main contrib non-free
*******************************************
  Apt::Setting[list-debian-updates] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # debian-updates
      -deb http://deb.debian.org/debian/ bullseye-updates main
      +deb http://deb.debian.org/debian/ bullseye-updates main contrib non-free
*******************************************
  Apt::Setting[list-debian] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # debian
      -deb http://deb.debian.org/debian/ bullseye main
      +deb http://deb.debian.org/debian/ bullseye main contrib non-free
*******************************************
  Apt::Source[backports] =>
   parameters =>
     repos =>
      - main
      + main contrib non-free
*******************************************
  Apt::Source[debian-security] =>
   parameters =>
     repos =>
      - main
      + main contrib non-free
*******************************************
  Apt::Source[debian-updates] =>
   parameters =>
     repos =>
      - main
      + main contrib non-free
*******************************************
  Apt::Source[debian] =>
   parameters =>
     repos =>
      - main
      + main contrib non-free
*******************************************
  File[/etc/apt/sources.list.d/backports.list] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # backports
      -deb http://deb.debian.org/debian/ bullseye-backports main
      +deb http://deb.debian.org/debian/ bullseye-backports main contrib non-free
*******************************************
  File[/etc/apt/sources.list.d/debian-security.list] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # debian-security
      -deb http://deb.debian.org/debian-security/ bullseye-security main
      +deb http://deb.debian.org/debian-security/ bullseye-security main contrib non-free
*******************************************
  File[/etc/apt/sources.list.d/debian-updates.list] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # debian-updates
      -deb http://deb.debian.org/debian/ bullseye-updates main
      +deb http://deb.debian.org/debian/ bullseye-updates main contrib non-free
*******************************************
  File[/etc/apt/sources.list.d/debian.list] =>
   parameters =>
     content =>
      @@ -1,3 +1,3 @@
       # This file is managed by Puppet. DO NOT EDIT.
       # debian
      -deb http://deb.debian.org/debian/ bullseye main
      +deb http://deb.debian.org/debian/ bullseye main contrib non-free
*******************************************
+ File[/etc/systemd/system/syncoid-dali-postgresql.service] =>
   parameters =>
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "ensure": "file",
     "group": "root",
     "mode": "0444",
     "notify": "Class[Systemd::Systemctl::Daemon_reload]",
     "owner": "root",
     "show_diff": true
*******************************************
+ File[/etc/systemd/system/syncoid-dali-postgresql.timer] =>
   parameters =>
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "ensure": "file",
     "group": "root",
     "mode": "0444",
     "notify": [
       "Class[Systemd::Systemctl::Daemon_reload]",
       "Service[syncoid-dali-postgresql.timer]"
     ],
     "owner": "root",
     "show_diff": true
*******************************************
+ File[/etc/systemd/system/syncoid-dali-postgresql_wal.service] =>
   parameters =>
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "ensure": "file",
     "group": "root",
     "mode": "0444",
     "notify": "Class[Systemd::Systemctl::Daemon_reload]",
     "owner": "root",
     "show_diff": true
*******************************************
+ File[/etc/systemd/system/syncoid-dali-postgresql_wal.timer] =>
   parameters =>
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "ensure": "file",
     "group": "root",
     "mode": "0444",
     "notify": [
       "Class[Systemd::Systemctl::Daemon_reload]",
       "Service[syncoid-dali-postgresql_wal.timer]"
     ],
     "owner": "root",
     "show_diff": true
*******************************************
+ File[/root/.ssh/id_ed25519.syncoid_backup01-azure] =>
   parameters =>
     "content": "syncoid::ssh_key::backup01-azure",
     "ensure": "present",
     "group": "root",
     "mode": "0600",
     "owner": "root"
*******************************************
+ Package[linux-headers-cloud-amd64] =>
   parameters =>
     "ensure": "present"
*******************************************
+ Package[sanoid] =>
   parameters =>
     "ensure": "installed"
*******************************************
+ Package[zfs-dkms] =>
   parameters =>
     "ensure": "present"
*******************************************
+ Service[syncoid-dali-postgresql.timer] =>
   parameters =>
     "enable": true,
     "ensure": true,
     "provider": "systemd"
*******************************************
+ Service[syncoid-dali-postgresql_wal.timer] =>
   parameters =>
     "enable": true,
     "ensure": true,
     "provider": "systemd"
*******************************************
+ Systemd::Timer[syncoid-dali-postgresql.timer] =>
   parameters =>
     "active": true,
     "enable": true,
     "ensure": "present",
     "group": "root",
     "mode": "0444",
     "owner": "root",
     "path": "/etc/systemd/system",
     "service_content": "# Managed by puppet class profile::sanoid::syncoid_desti...
     "service_unit": "syncoid-dali-postgresql.service",
     "show_diff": true,
     "timer_content": "# Managed by puppet class profile::sanoid::syncoid_destina...
*******************************************
+ Systemd::Timer[syncoid-dali-postgresql_wal.timer] =>
   parameters =>
     "active": true,
     "enable": true,
     "ensure": "present",
     "group": "root",
     "mode": "0444",
     "owner": "root",
     "path": "/etc/systemd/system",
     "service_content": "# Managed by puppet class profile::sanoid::syncoid_desti...
     "service_unit": "syncoid-dali-postgresql_wal.service",
     "show_diff": true,
     "timer_content": "# Managed by puppet class profile::sanoid::syncoid_destina...
*******************************************
+ Systemd::Unit_file[syncoid-dali-postgresql.service] =>
   parameters =>
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "ensure": "present",
     "group": "root",
     "mode": "0444",
     "owner": "root",
     "path": "/etc/systemd/system",
     "show_diff": true
*******************************************
+ Systemd::Unit_file[syncoid-dali-postgresql.timer] =>
   parameters =>
     "active": true,
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "enable": true,
     "ensure": "present",
     "group": "root",
     "mode": "0444",
     "owner": "root",
     "path": "/etc/systemd/system",
     "show_diff": true
*******************************************
+ Systemd::Unit_file[syncoid-dali-postgresql_wal.service] =>
   parameters =>
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "ensure": "present",
     "group": "root",
     "mode": "0444",
     "owner": "root",
     "path": "/etc/systemd/system",
     "show_diff": true
*******************************************
+ Systemd::Unit_file[syncoid-dali-postgresql_wal.timer] =>
   parameters =>
     "active": true,
     "content": "# Managed by puppet class profile::sanoid::syncoid_destination\n...
     "enable": true,
     "ensure": "present",
     "group": "root",
     "mode": "0444",
     "owner": "root",
     "path": "/etc/systemd/system",
     "show_diff": true
*******************************************
*** End octocatalog-diff on backup01.euwest.azure.internal.softwareheritage.org
  • db1.staging:
    • just a new space due to the optional parameter
diff origin/production/db1.internal.staging.swh.network current/db1.internal.staging.swh.network
*******************************************
  File[/etc/systemd/system/syncoid-storage1-kafka.service] =>
   parameters =>
     content =>
      @@ -11,5 +11,5 @@
       User=root
       Group=root
      -ExecStart=syncoid --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/kafka data/sync/storage1/kafka
      +ExecStart=syncoid  --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/kafka data/sync/storage1/kafka
       Restart=on-failure
       RestartSec=1s
*******************************************
  File[/etc/systemd/system/syncoid-storage1-objects.service] =>
   parameters =>
     content =>
      @@ -11,5 +11,5 @@
       User=root
       Group=root
      -ExecStart=syncoid --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/objects data/sync/storage1/objects
      +ExecStart=syncoid  --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/objects data/sync/storage1/objects
       Restart=on-failure
       RestartSec=1s
*******************************************
  Systemd::Timer[syncoid-storage1-kafka.timer] =>
   parameters =>
     service_content =>
      @@ -11,5 +11,5 @@
       User=root
       Group=root
      -ExecStart=syncoid --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/kafka data/sync/storage1/kafka
      +ExecStart=syncoid  --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/kafka data/sync/storage1/kafka
       Restart=on-failure
       RestartSec=1s
*******************************************
  Systemd::Timer[syncoid-storage1-objects.timer] =>
   parameters =>
     service_content =>
      @@ -11,5 +11,5 @@
       User=root
       Group=root
      -ExecStart=syncoid --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/objects data/sync/storage1/objects
      +ExecStart=syncoid  --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/objects data/sync/storage1/objects
       Restart=on-failure
       RestartSec=1s
*******************************************
  Systemd::Unit_file[syncoid-storage1-kafka.service] =>
   parameters =>
     content =>
      @@ -11,5 +11,5 @@
       User=root
       Group=root
      -ExecStart=syncoid --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/kafka data/sync/storage1/kafka
      +ExecStart=syncoid  --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/kafka data/sync/storage1/kafka
       Restart=on-failure
       RestartSec=1s
*******************************************
  Systemd::Unit_file[syncoid-storage1-objects.service] =>
   parameters =>
     content =>
      @@ -11,5 +11,5 @@
       User=root
       Group=root
      -ExecStart=syncoid --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/objects data/sync/storage1/objects
      +ExecStart=syncoid  --sshkey /root/.ssh/id_ed25519.syncoid_db1 root@storage1.internal.staging.swh.network:data/objects data/sync/storage1/objects
       Restart=on-failure
       RestartSec=1s
*******************************************
*** End octocatalog-diff on db1.internal.staging.swh.network

Migrated from D7235 (view on Phabricator)

Merge request reports

Loading