mirror of
https://github.com/matter-labs/ansible-en-role.git
synced 2025-12-06 10:59:56 +00:00
Compare commits
33 Commits
13ef869339
...
v4.1.0
| Author | SHA1 | Date | |
|---|---|---|---|
| 103d80f2dc | |||
| 5d8aaa769d | |||
| 17d9ecd1ce | |||
| 5071bb3423 | |||
| fa4f00a62d | |||
| f3ce6ce204 | |||
| cd5df40065 | |||
| 4bd3805af1 | |||
| 8006ed9328 | |||
| c497fc0982 | |||
| 57f3fb74e4 | |||
| aa018348d8 | |||
| b8e3b89cf5 | |||
| d276d7b290 | |||
| 60333c40da | |||
| 2eb2b1f6d4 | |||
| 69777ac4e8 | |||
| 46e2a6e0e4 | |||
| c5ab63672b | |||
| 22a1d06ef7 | |||
| 655b461ba5 | |||
| 45feed1069 | |||
| 5298e9f87d | |||
| 576f8eb252 | |||
| b672d803f0 | |||
| 5e8657ac3b | |||
| 4f1b6a37ab | |||
| 9034dc5fd4 | |||
| dac0b0cc80 | |||
| 10ea272736 | |||
| 3fa5c8622b | |||
| 64198202a5 | |||
| 0d1717f38a |
@ -99,10 +99,10 @@ Basic auth secret can be generated by `htpasswd` and `sed` for interpolation:
|
||||
2. Prepare the latest database backup on your host. you can download it from our public GCS buckets:
|
||||
Skip this step if you are recovering from a snapshot!
|
||||
|
||||
* [Era Mainnet latest dump](https://storage.googleapis.com/zksync-era-mainnet-external-node-backups/external_node_latest.pgdump)
|
||||
* [Era Mainnet latest dump](https://en-backups.matterlabs.dev/)
|
||||
* [Era Sepolia Testnet latest dump](https://storage.googleapis.com/zksync-era-testnet-sepolia-external-node-backups/external_node_latest.pgdump)
|
||||
|
||||
Downloaded dump file should be placed into `{{ storage_directory }}/pg_backups` directory (`/usr/src/en/pg_backups` by default)
|
||||
Downloaded dump, if needed, should be unarchived and named `external_node_latest.pgdump`. File should be placed into `{{ storage_directory }}/pg_backups` directory (`/usr/src/en/pg_backups` by default).
|
||||
|
||||
3. **OPTIONAL**: If you already have running node, you can copy its tree and state directory to a new host's `{{ storage_directory }}/db`. (`/usr/src/en/db` by default)
|
||||
Skip this step if you are recovering from a snapshot!
|
||||
|
||||
@ -11,7 +11,7 @@ docker_compose_version: "v2.23.0"
|
||||
# Versions of External Node and 3rd party components
|
||||
traefik_version: 2.11
|
||||
postgres_version: 14
|
||||
external_node_version: 24.26.0
|
||||
external_node_version: 28.2.1
|
||||
external_node_raw_docker_tag: ""
|
||||
vmagent_version: 1.100.1
|
||||
cadvisor_version: 0.47.2
|
||||
@ -59,8 +59,14 @@ postgres_arguments:
|
||||
enable_postgres_replication: false
|
||||
# IP address of the interface replication
|
||||
postgres_replications_arguments: []
|
||||
postgres_replica_user_name: ""
|
||||
postgres_replica_user_password: ""
|
||||
postgres_replica_auth_method: "scram-sha-256"
|
||||
postgres_replication_bind_address: ""
|
||||
postgres_replica_address: ""
|
||||
backup_db_user: ""
|
||||
backup_db_password: ""
|
||||
backup_db_name: ""
|
||||
|
||||
# Enable TLS for traefik
|
||||
enable_tls: false
|
||||
@ -83,6 +89,10 @@ enable_consensus: false
|
||||
consensus_secrets_file: ""
|
||||
consensus_port: 3054
|
||||
consensus_outbound: []
|
||||
consensus_debug_port: 5000
|
||||
enable_consensus_debug_port: false
|
||||
expose_consensus_debug_port: false
|
||||
consensus_debug_port_path_prefix: "/consensus_debug"
|
||||
|
||||
# External Node and database options
|
||||
database_name: ""
|
||||
|
||||
@ -8,16 +8,16 @@ To run this playbook, first install dependencies
|
||||
|
||||
```shell
|
||||
ansible-galaxy install -r requirements.yml
|
||||
```
|
||||
```
|
||||
|
||||
and then you can run the playbook using
|
||||
|
||||
```shell
|
||||
ansible-playbook playbook.yml -i hosts.ini -K
|
||||
```
|
||||
```
|
||||
|
||||
To see logs you can use
|
||||
|
||||
```shell
|
||||
docker logs en-external_node-1
|
||||
```
|
||||
docker logs en-external_node-1
|
||||
```
|
||||
|
||||
@ -8,5 +8,10 @@ roles:
|
||||
version: "v3.3.0"
|
||||
|
||||
collections:
|
||||
- name: community.docker
|
||||
version: 4.5.2
|
||||
- name: community.general
|
||||
version: 8.4.0
|
||||
# Collection for the replication only.
|
||||
- name: community.postgresql
|
||||
version: 3.7.0
|
||||
|
||||
8
handlers/main.yml
Normal file
8
handlers/main.yml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
- name: Restart external-node service
|
||||
community.docker.docker_compose_v2:
|
||||
project_src: "{{ configuration_directory }}"
|
||||
files: "{{ docker_compose_files }}"
|
||||
state: restarted
|
||||
services:
|
||||
- external_node
|
||||
@ -9,3 +9,7 @@
|
||||
|
||||
- name: Prepare configs
|
||||
ansible.builtin.include_tasks: provision.yml
|
||||
|
||||
- name: Configure replication on main instance
|
||||
ansible.builtin.include_tasks: replication.yml
|
||||
when: enable_postgres_replication
|
||||
|
||||
@ -36,7 +36,7 @@
|
||||
when: enable_postgres_replication
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- required_var != ""
|
||||
- postgress_replication_required_var != ""
|
||||
fail_msg: "{{ postgress_replication_required_var }} needs to be set for the role for postgres replication to work"
|
||||
success_msg: "Required variable for postgres replication {{ postgress_replication_required_var }} isn't empty"
|
||||
loop_control:
|
||||
@ -46,12 +46,21 @@
|
||||
- postgres_replication_bind_address
|
||||
- postgres_replica_address
|
||||
- postgres_replications_arguments
|
||||
- postgres_replica_user_name
|
||||
- postgres_replica_user_password
|
||||
|
||||
- name: Check required en vars empty
|
||||
ansible.builtin.fail:
|
||||
msg: "Variable '{{ item }}' is empty"
|
||||
when: vars[item] == ""
|
||||
with_items: "{{ en_required_variables }}"
|
||||
- name: "Verify consensus debug port configuration"
|
||||
ansible.builtin.fail:
|
||||
msg: "Cannot expose consensus debug port (expose_consensus_debug_port=true) if it is not enabled (enable_consensus_debug_port=false)."
|
||||
when:
|
||||
- enable_consensus
|
||||
- expose_consensus_debug_port
|
||||
- not enable_consensus_debug_port
|
||||
|
||||
- name: Create main configs
|
||||
ansible.builtin.template:
|
||||
@ -65,6 +74,8 @@
|
||||
dest: "{{ configuration_directory }}/external_node.env"
|
||||
- src: "templates/postgres.env.j2"
|
||||
dest: "{{ configuration_directory }}/postgres.env"
|
||||
loop_control:
|
||||
label: "{{ item.dest }}"
|
||||
|
||||
- name: Create restore script
|
||||
register: restore_dump_script
|
||||
@ -97,6 +108,7 @@
|
||||
src: "templates/consensus_config.yaml.j2"
|
||||
dest: "{{ configuration_directory }}/consensus_config.yaml"
|
||||
mode: '0644'
|
||||
notify: Restart external-node service
|
||||
|
||||
- name: Decrypt consensus_secrets
|
||||
when: enable_consensus
|
||||
@ -105,24 +117,17 @@
|
||||
dest: "{{ configuration_directory }}/consensus_secrets.yaml"
|
||||
decrypt: true
|
||||
mode: '0600'
|
||||
notify: Restart external-node service
|
||||
|
||||
- name: Run docker-compose without monitoring
|
||||
when: not enable_monitoring
|
||||
ansible.builtin.shell:
|
||||
cmd: nohup docker compose -f docker-compose.yaml up -d </dev/null >/dev/null 2>&1 &
|
||||
chdir: "{{ configuration_directory }}"
|
||||
changed_when: false
|
||||
- name: Set docker compose files list
|
||||
ansible.builtin.set_fact:
|
||||
docker_compose_files: "{{ ['docker-compose.yaml'] + (['monitoring.yaml'] if enable_monitoring else []) }}"
|
||||
|
||||
- name: Run docker-compose with monitoring
|
||||
when: enable_monitoring and (not restore_dump_script.changed)
|
||||
ansible.builtin.shell:
|
||||
cmd: nohup docker compose -f monitoring.yaml -f docker-compose.yaml up -d </dev/null >/dev/null 2>&1 &
|
||||
chdir: "{{ configuration_directory }}"
|
||||
changed_when: false
|
||||
|
||||
- name: Run docker-compose with monitoring with recreation
|
||||
when: enable_monitoring and restore_dump_script.changed
|
||||
ansible.builtin.shell:
|
||||
cmd: nohup docker compose -f monitoring.yaml -f docker-compose.yaml up -d --force-recreate </dev/null >/dev/null 2>&1 &
|
||||
chdir: "{{ configuration_directory }}"
|
||||
changed_when: false
|
||||
- name: Run docker compose services (non-blocking)
|
||||
community.docker.docker_compose_v2:
|
||||
project_src: "{{ configuration_directory }}"
|
||||
files: "{{ docker_compose_files }}"
|
||||
state: present
|
||||
pull: "{{ docker_pull_policy | default('missing') }}"
|
||||
recreate: "{{ 'always' if restore_dump_script.changed else 'auto' }}"
|
||||
wait: false
|
||||
|
||||
60
tasks/replication.yml
Normal file
60
tasks/replication.yml
Normal file
@ -0,0 +1,60 @@
|
||||
---
|
||||
|
||||
- name: Install libpq-dev packages
|
||||
ansible.builtin.apt:
|
||||
update_cache: true
|
||||
name: libpq-dev
|
||||
|
||||
- name: Install psycopg2 python package
|
||||
ansible.builtin.pip:
|
||||
name: psycopg2
|
||||
|
||||
- name: Grant user replication access for replication.
|
||||
community.postgresql.postgresql_pg_hba:
|
||||
dest: "{{ storage_directory }}/postgres/pg_hba.conf"
|
||||
contype: host
|
||||
users: "{{ postgres_replica_user_name }}"
|
||||
source: "{{ postgres_replica_address }}/32"
|
||||
databases: replication
|
||||
method: "{{ postgres_replica_auth_method }}"
|
||||
|
||||
- name: Create postgres replication user
|
||||
community.postgresql.postgresql_user:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
name: "{{ postgres_replica_user_name }}"
|
||||
password: "{{ postgres_replica_user_password }}"
|
||||
role_attr_flags: "REPLICATION"
|
||||
|
||||
- name: Create replication slot if doesn't exist
|
||||
community.postgresql.postgresql_slot:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
slot_name: replica
|
||||
|
||||
- name: Reload postgres configuration
|
||||
community.postgresql.postgresql_query:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
query: "SELECT pg_reload_conf()"
|
||||
|
||||
- name: Create postgres backup user
|
||||
community.postgresql.postgresql_user:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
name: "{{ backup_db_user }}"
|
||||
password: "{{ backup_db_password }}"
|
||||
|
||||
- name: Grant role pg_read_all_data to backup user
|
||||
community.postgresql.postgresql_membership:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
group: pg_read_all_data
|
||||
target_roles:
|
||||
- "{{ backup_db_user }}"
|
||||
state: present
|
||||
@ -1,9 +1,13 @@
|
||||
server_addr: '0.0.0.0:3054'
|
||||
public_addr: '{{ ansible_default_ipv4.address }}:{{ consensus_port }}'
|
||||
max_payload_size: 5000000
|
||||
gossip_dynamic_inbound_limit: 100
|
||||
gossip_static_outbound:
|
||||
{% for item in consensus_outbound %}
|
||||
- key: {{ item.key }}
|
||||
addr: {{ item.addr }}
|
||||
{% endfor %}
|
||||
gossip_dynamic_inbound_limit: 200
|
||||
{% if enable_consensus_debug_port %}
|
||||
debug_page_addr: "0.0.0.0:{{ consensus_debug_port }}"
|
||||
{% endif %}
|
||||
rpc_config:
|
||||
get_block_rate:
|
||||
burst: 5
|
||||
refresh: # 0.2s
|
||||
seconds: 0
|
||||
nanos: 200000000
|
||||
|
||||
@ -44,10 +44,8 @@ services:
|
||||
env_file:
|
||||
- postgres.env
|
||||
{% if enable_postgres_replication %}
|
||||
environment:
|
||||
POSTGRES_HOST_AUTH_METHOD: "host replication replicator {{ postgres_replica_address }}/32 md5"
|
||||
ports:
|
||||
- "{{ postgres_replication_interface }}:5432:5432"
|
||||
- "{{ postgres_replication_bind_address }}:5432:5432"
|
||||
{% endif %}
|
||||
command:
|
||||
- postgres
|
||||
@ -82,7 +80,6 @@ services:
|
||||
- "traefik.http.routers.external_node_main.entrypoints=web"
|
||||
{% endif %}
|
||||
- "traefik.http.routers.external_node_main.service=external_node_main"
|
||||
|
||||
- "traefik.http.services.external_node_health.loadbalancer.server.port={{ healthcheck_port }}"
|
||||
- "traefik.http.routers.external_node_health.rule=PathPrefix(`/`)"
|
||||
- "traefik.http.routers.external_node_health.entrypoints=external_node_health"
|
||||
@ -96,6 +93,20 @@ services:
|
||||
- "traefik.tcp.routers.external_node_consensus.rule=HostSNI(`*`)"
|
||||
- "traefik.tcp.routers.external_node_consensus.entrypoints=external_node_consensus"
|
||||
- "traefik.tcp.routers.external_node_consensus.service=external_node_consensus"
|
||||
{% endif %}
|
||||
{% if enable_consensus and expose_consensus_debug_port %}
|
||||
- "traefik.http.services.external_node_consensus_debug.loadbalancer.server.port={{ consensus_debug_port }}"
|
||||
- "traefik.http.routers.external_node_consensus_debug.rule=PathPrefix(`{{ consensus_debug_port_path_prefix }}`)"
|
||||
{% if enable_tls %}
|
||||
- "traefik.http.routers.external_node_consensus_debug.entrypoints=websecure"
|
||||
- "traefik.http.routers.external_node_consensus_debug.tls.certresolver=myresolver"
|
||||
{% else %}
|
||||
- "traefik.http.routers.external_node_consensus_debug.entrypoints=web"
|
||||
{% endif %}
|
||||
- "traefik.http.routers.external_node_consensus_debug.service=external_node_consensus_debug"
|
||||
{% if enable_basic_auth %}
|
||||
- "traefik.http.routers.external_node_consensus_debug.middlewares=external_node_auth"
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
expose:
|
||||
- {{ rpc_http_port }}
|
||||
@ -104,6 +115,9 @@ services:
|
||||
- {{ metrics_port }}
|
||||
{% if enable_consensus %}
|
||||
- {{ consensus_port }}
|
||||
{% if expose_consensus_debug_port %}
|
||||
- {{ consensus_debug_port }}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
environment:
|
||||
ZKSYNC_HOME: "/"
|
||||
|
||||
Reference in New Issue
Block a user