mirror of
https://github.com/matter-labs/ansible-en-role.git
synced 2025-12-06 19:09:55 +00:00
Compare commits
40 Commits
v3.7.1
...
4bd3805af1
| Author | SHA1 | Date | |
|---|---|---|---|
| 4bd3805af1 | |||
| 8006ed9328 | |||
| c497fc0982 | |||
| 57f3fb74e4 | |||
| aa018348d8 | |||
| b8e3b89cf5 | |||
| d276d7b290 | |||
| 60333c40da | |||
| 2eb2b1f6d4 | |||
| 69777ac4e8 | |||
| 46e2a6e0e4 | |||
| c5ab63672b | |||
| 22a1d06ef7 | |||
| 655b461ba5 | |||
| 45feed1069 | |||
| 5298e9f87d | |||
| 576f8eb252 | |||
| b672d803f0 | |||
| 5e8657ac3b | |||
| 4f1b6a37ab | |||
| 9034dc5fd4 | |||
| dac0b0cc80 | |||
| 10ea272736 | |||
| 3fa5c8622b | |||
| 64198202a5 | |||
| 0d1717f38a | |||
| 13ef869339 | |||
| cfbaed74f0 | |||
| 6f1e025785 | |||
| f347a9173e | |||
| 2bf98e9273 | |||
| dde435ca95 | |||
| 8d085aa960 | |||
| b85a7d5c65 | |||
| 6a3c8cb263 | |||
| ed4feb99bc | |||
| 605525c7ba | |||
| 5bdeb0fcfa | |||
| bf186104d4 | |||
| 493e5ceffc |
@ -99,10 +99,10 @@ Basic auth secret can be generated by `htpasswd` and `sed` for interpolation:
|
|||||||
2. Prepare the latest database backup on your host. you can download it from our public GCS buckets:
|
2. Prepare the latest database backup on your host. you can download it from our public GCS buckets:
|
||||||
Skip this step if you are recovering from a snapshot!
|
Skip this step if you are recovering from a snapshot!
|
||||||
|
|
||||||
* [Era Mainnet latest dump](https://storage.googleapis.com/zksync-era-mainnet-external-node-backups/external_node_latest.pgdump)
|
* [Era Mainnet latest dump](https://en-backups.matterlabs.dev/)
|
||||||
* [Era Sepolia Testnet latest dump](https://storage.googleapis.com/zksync-era-testnet-sepolia-external-node-backups/external_node_latest.pgdump)
|
* [Era Sepolia Testnet latest dump](https://storage.googleapis.com/zksync-era-testnet-sepolia-external-node-backups/external_node_latest.pgdump)
|
||||||
|
|
||||||
Downloaded dump file should be placed into `{{ storage_directory }}/pg_backups` directory (`/usr/src/en/pg_backups` by default)
|
Downloaded dump, if needed, should be unarchived and named `external_node_latest.pgdump`. File should be placed into `{{ storage_directory }}/pg_backups` directory (`/usr/src/en/pg_backups` by default).
|
||||||
|
|
||||||
3. **OPTIONAL**: If you already have running node, you can copy its tree and state directory to a new host's `{{ storage_directory }}/db`. (`/usr/src/en/db` by default)
|
3. **OPTIONAL**: If you already have running node, you can copy its tree and state directory to a new host's `{{ storage_directory }}/db`. (`/usr/src/en/db` by default)
|
||||||
Skip this step if you are recovering from a snapshot!
|
Skip this step if you are recovering from a snapshot!
|
||||||
|
|||||||
@ -11,7 +11,7 @@ docker_compose_version: "v2.23.0"
|
|||||||
# Versions of External Node and 3rd party components
|
# Versions of External Node and 3rd party components
|
||||||
traefik_version: 2.11
|
traefik_version: 2.11
|
||||||
postgres_version: 14
|
postgres_version: 14
|
||||||
external_node_version: 24.16.0
|
external_node_version: 24.26.0
|
||||||
external_node_raw_docker_tag: ""
|
external_node_raw_docker_tag: ""
|
||||||
vmagent_version: 1.100.1
|
vmagent_version: 1.100.1
|
||||||
cadvisor_version: 0.47.2
|
cadvisor_version: 0.47.2
|
||||||
@ -56,6 +56,17 @@ postgres_arguments:
|
|||||||
- max_parallel_maintenance_workers=4
|
- max_parallel_maintenance_workers=4
|
||||||
- -c
|
- -c
|
||||||
- checkpoint_timeout=1800
|
- checkpoint_timeout=1800
|
||||||
|
enable_postgres_replication: false
|
||||||
|
# IP address of the interface replication
|
||||||
|
postgres_replications_arguments: []
|
||||||
|
postgres_replica_user_name: ""
|
||||||
|
postgres_replica_user_password: ""
|
||||||
|
postgres_replica_auth_method: "scram-sha-256"
|
||||||
|
postgres_replication_bind_address: ""
|
||||||
|
postgres_replica_address: ""
|
||||||
|
backup_db_user: ""
|
||||||
|
backup_db_password: ""
|
||||||
|
backup_db_name: ""
|
||||||
|
|
||||||
# Enable TLS for traefik
|
# Enable TLS for traefik
|
||||||
enable_tls: false
|
enable_tls: false
|
||||||
|
|||||||
@ -10,3 +10,6 @@ roles:
|
|||||||
collections:
|
collections:
|
||||||
- name: community.general
|
- name: community.general
|
||||||
version: 8.4.0
|
version: 8.4.0
|
||||||
|
# Collection for the replication only.
|
||||||
|
- name: community.postgresql
|
||||||
|
version: 3.7.0
|
||||||
|
|||||||
@ -49,6 +49,23 @@
|
|||||||
source: "{{ loadbalancer_ip | mandatory }}"
|
source: "{{ loadbalancer_ip | mandatory }}"
|
||||||
jump: ACCEPT
|
jump: ACCEPT
|
||||||
|
|
||||||
|
- name: Allow consensus port traffic from any IP
|
||||||
|
when: enable_consensus
|
||||||
|
ansible.builtin.iptables:
|
||||||
|
chain: INPUT
|
||||||
|
protocol: tcp
|
||||||
|
destination_port: "{{ consensus_port }}"
|
||||||
|
jump: ACCEPT
|
||||||
|
|
||||||
|
- name: Allow postgres replication traffic from replica only
|
||||||
|
when: enable_postgres_replication
|
||||||
|
ansible.builtin.iptables:
|
||||||
|
chain: INPUT
|
||||||
|
protocol: tcp
|
||||||
|
destination_port: 5432
|
||||||
|
source: "{{ postgres_replica_address }}"
|
||||||
|
jump: ACCEPT
|
||||||
|
|
||||||
- name: Set default policy to DROP
|
- name: Set default policy to DROP
|
||||||
ansible.builtin.iptables:
|
ansible.builtin.iptables:
|
||||||
chain: INPUT
|
chain: INPUT
|
||||||
|
|||||||
@ -9,3 +9,7 @@
|
|||||||
|
|
||||||
- name: Prepare configs
|
- name: Prepare configs
|
||||||
ansible.builtin.include_tasks: provision.yml
|
ansible.builtin.include_tasks: provision.yml
|
||||||
|
|
||||||
|
- name: Configure replication on main instance
|
||||||
|
ansible.builtin.include_tasks: replication.yml
|
||||||
|
when: enable_postgres_replication
|
||||||
|
|||||||
@ -32,6 +32,23 @@
|
|||||||
- l2_chain_id
|
- l2_chain_id
|
||||||
- l1_chain_id
|
- l1_chain_id
|
||||||
|
|
||||||
|
- name: "Verify that required variables for replication is set"
|
||||||
|
when: enable_postgres_replication
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- postgress_replication_required_var != ""
|
||||||
|
fail_msg: "{{ postgress_replication_required_var }} needs to be set for the role for postgres replication to work"
|
||||||
|
success_msg: "Required variable for postgres replication {{ postgress_replication_required_var }} isn't empty"
|
||||||
|
loop_control:
|
||||||
|
loop_var: postgress_replication_required_var
|
||||||
|
with_items:
|
||||||
|
- enable_postgres_replication
|
||||||
|
- postgres_replication_bind_address
|
||||||
|
- postgres_replica_address
|
||||||
|
- postgres_replications_arguments
|
||||||
|
- postgres_replica_user_name
|
||||||
|
- postgres_replica_user_password
|
||||||
|
|
||||||
- name: Check required en vars empty
|
- name: Check required en vars empty
|
||||||
ansible.builtin.fail:
|
ansible.builtin.fail:
|
||||||
msg: "Variable '{{ item }}' is empty"
|
msg: "Variable '{{ item }}' is empty"
|
||||||
|
|||||||
60
tasks/replication.yml
Normal file
60
tasks/replication.yml
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Install libpq-dev packages
|
||||||
|
ansible.builtin.apt:
|
||||||
|
update_cache: true
|
||||||
|
name: libpq-dev
|
||||||
|
|
||||||
|
- name: Install psycopg2 python package
|
||||||
|
ansible.builtin.pip:
|
||||||
|
name: psycopg2
|
||||||
|
|
||||||
|
- name: Grant user replication access for replication.
|
||||||
|
community.postgresql.postgresql_pg_hba:
|
||||||
|
dest: "{{ storage_directory }}/postgres/pg_hba.conf"
|
||||||
|
contype: host
|
||||||
|
users: "{{ postgres_replica_user_name }}"
|
||||||
|
source: "{{ postgres_replica_address }}/32"
|
||||||
|
databases: replication
|
||||||
|
method: "{{ postgres_replica_auth_method }}"
|
||||||
|
|
||||||
|
- name: Create postgres replication user
|
||||||
|
community.postgresql.postgresql_user:
|
||||||
|
login_host: "{{ postgres_replication_bind_address }}"
|
||||||
|
login_user: "{{ database_username }}"
|
||||||
|
login_password: "{{ database_password }}"
|
||||||
|
name: "{{ postgres_replica_user_name }}"
|
||||||
|
password: "{{ postgres_replica_user_password }}"
|
||||||
|
role_attr_flags: "REPLICATION"
|
||||||
|
|
||||||
|
- name: Create replication slot if doesn't exist
|
||||||
|
community.postgresql.postgresql_slot:
|
||||||
|
login_host: "{{ postgres_replication_bind_address }}"
|
||||||
|
login_user: "{{ database_username }}"
|
||||||
|
login_password: "{{ database_password }}"
|
||||||
|
slot_name: replica
|
||||||
|
|
||||||
|
- name: Reload postgres configuration
|
||||||
|
community.postgresql.postgresql_query:
|
||||||
|
login_host: "{{ postgres_replication_bind_address }}"
|
||||||
|
login_user: "{{ database_username }}"
|
||||||
|
login_password: "{{ database_password }}"
|
||||||
|
query: "SELECT pg_reload_conf()"
|
||||||
|
|
||||||
|
- name: Create postgres backup user
|
||||||
|
community.postgresql.postgresql_user:
|
||||||
|
login_host: "{{ postgres_replication_bind_address }}"
|
||||||
|
login_user: "{{ database_username }}"
|
||||||
|
login_password: "{{ database_password }}"
|
||||||
|
name: "{{ backup_db_user }}"
|
||||||
|
password: "{{ backup_db_password }}"
|
||||||
|
|
||||||
|
- name: Grant role pg_read_all_data to backup user
|
||||||
|
community.postgresql.postgresql_membership:
|
||||||
|
login_host: "{{ postgres_replication_bind_address }}"
|
||||||
|
login_user: "{{ database_username }}"
|
||||||
|
login_password: "{{ database_password }}"
|
||||||
|
group: pg_read_all_data
|
||||||
|
target_roles:
|
||||||
|
- "{{ backup_db_user }}"
|
||||||
|
state: present
|
||||||
@ -1,9 +1,10 @@
|
|||||||
server_addr: '0.0.0.0:3054'
|
server_addr: '0.0.0.0:3054'
|
||||||
public_addr: '{{ ansible_default_ipv4.address }}:{{ consensus_port }}'
|
public_addr: '{{ ansible_default_ipv4.address }}:{{ consensus_port }}'
|
||||||
max_payload_size: 5000000
|
max_payload_size: 5000000
|
||||||
gossip_dynamic_inbound_limit: 100
|
gossip_dynamic_inbound_limit: 200
|
||||||
gossip_static_outbound:
|
rpc_config:
|
||||||
{% for item in consensus_outbound %}
|
get_block_rate:
|
||||||
- key: {{ item.key }}
|
burst: 5
|
||||||
addr: {{ item.addr }}
|
refresh: # 0.2s
|
||||||
{% endfor %}
|
seconds: 0
|
||||||
|
nanos: 200000000
|
||||||
|
|||||||
@ -8,10 +8,13 @@ services:
|
|||||||
- "--log.level=INFO"
|
- "--log.level=INFO"
|
||||||
- "--providers.docker=true"
|
- "--providers.docker=true"
|
||||||
- "--providers.docker.exposedbydefault=false"
|
- "--providers.docker.exposedbydefault=false"
|
||||||
- "--entrypoints.web.address=:80"
|
- "--entryPoints.web.address=:80"
|
||||||
- "--entrypoints.external_node_health.address=:3080"
|
- "--entryPoints.external_node_health.address=:3080"
|
||||||
|
{% if enable_consensus %}
|
||||||
|
- "--entryPoints.external_node_consensus.address=:{{ consensus_port }}"
|
||||||
|
{% endif %}
|
||||||
{% if enable_tls %}
|
{% if enable_tls %}
|
||||||
- "--entrypoints.websecure.address=:443"
|
- "--entryPoints.websecure.address=:443"
|
||||||
- "--certificatesresolvers.en_resolver.acme.tlschallenge=true"
|
- "--certificatesresolvers.en_resolver.acme.tlschallenge=true"
|
||||||
- "--certificatesresolvers.en_resolver.acme.storage=/letsencrypt/acme.json"
|
- "--certificatesresolvers.en_resolver.acme.storage=/letsencrypt/acme.json"
|
||||||
- "--certificatesresolvers.myresolver.acme.email={{ acme_email }}"
|
- "--certificatesresolvers.myresolver.acme.email={{ acme_email }}"
|
||||||
@ -40,12 +43,21 @@ services:
|
|||||||
- ./restore_dump.sh:/docker-entrypoint-initdb.d/restore_dump.sh
|
- ./restore_dump.sh:/docker-entrypoint-initdb.d/restore_dump.sh
|
||||||
env_file:
|
env_file:
|
||||||
- postgres.env
|
- postgres.env
|
||||||
|
{% if enable_postgres_replication %}
|
||||||
|
ports:
|
||||||
|
- "{{ postgres_replication_bind_address }}:5432:5432"
|
||||||
|
{% endif %}
|
||||||
command:
|
command:
|
||||||
- postgres
|
- postgres
|
||||||
- -c
|
- -c
|
||||||
{% for argument in postgres_arguments %}
|
{% for argument in postgres_arguments %}
|
||||||
- {{ argument }}
|
- {{ argument }}
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
{% if enable_postgres_replication %}
|
||||||
|
{% for repl_argument in postgres_replications_arguments %}
|
||||||
|
- {{ repl_argument }}
|
||||||
|
{% endfor %}
|
||||||
|
{% endif %}
|
||||||
external_node:
|
external_node:
|
||||||
{% if not external_node_raw_docker_tag %}
|
{% if not external_node_raw_docker_tag %}
|
||||||
image: "matterlabs/external-node:v{{ external_node_version }}"
|
image: "matterlabs/external-node:v{{ external_node_version }}"
|
||||||
@ -76,6 +88,12 @@ services:
|
|||||||
{% if enable_basic_auth %}
|
{% if enable_basic_auth %}
|
||||||
- "traefik.http.routers.external_node_main.middlewares=external_node_auth"
|
- "traefik.http.routers.external_node_main.middlewares=external_node_auth"
|
||||||
- "traefik.http.middlewares.external_node_auth.basicauth.users={{ basic_auth_secret }}"
|
- "traefik.http.middlewares.external_node_auth.basicauth.users={{ basic_auth_secret }}"
|
||||||
|
{% endif %}
|
||||||
|
{% if enable_consensus %}
|
||||||
|
- "traefik.tcp.services.external_node_consensus.loadbalancer.server.port={{ consensus_port }}"
|
||||||
|
- "traefik.tcp.routers.external_node_consensus.rule=HostSNI(`*`)"
|
||||||
|
- "traefik.tcp.routers.external_node_consensus.entrypoints=external_node_consensus"
|
||||||
|
- "traefik.tcp.routers.external_node_consensus.service=external_node_consensus"
|
||||||
{% endif %}
|
{% endif %}
|
||||||
expose:
|
expose:
|
||||||
- {{ rpc_http_port }}
|
- {{ rpc_http_port }}
|
||||||
@ -101,7 +119,7 @@ services:
|
|||||||
RUST_LOG: {{ rust_log }}
|
RUST_LOG: {{ rust_log }}
|
||||||
{% if enable_consensus %}
|
{% if enable_consensus %}
|
||||||
EN_CONSENSUS_CONFIG_PATH: /etc/consensus_config.yaml
|
EN_CONSENSUS_CONFIG_PATH: /etc/consensus_config.yaml
|
||||||
EN_CONSENSUS_SECRETS_PATH: /run/secrets/consensus_secrets.yaml
|
EN_CONSENSUS_SECRETS_PATH: /run/secrets/consensus_secrets
|
||||||
{% endif %}
|
{% endif %}
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: [ "CMD", "curl", "-f", "http://localhost:{{ healthcheck_port }}/health" ]
|
test: [ "CMD", "curl", "-f", "http://localhost:{{ healthcheck_port }}/health" ]
|
||||||
@ -112,15 +130,12 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- "{{ storage_directory }}/db:/db"
|
- "{{ storage_directory }}/db:/db"
|
||||||
{% if enable_consensus %}
|
{% if enable_consensus %}
|
||||||
- "consensus_config.yaml:/etc/consensus_config.yaml"
|
- "{{ configuration_directory }}/consensus_config.yaml:/etc/consensus_config.yaml"
|
||||||
{% endif %}
|
{% endif %}
|
||||||
env_file:
|
env_file:
|
||||||
- "external_node.env"
|
- "external_node.env"
|
||||||
- "postgres.env"
|
- "postgres.env"
|
||||||
command:
|
command:
|
||||||
{% if enable_snapshots_recovery %}
|
|
||||||
- --enable-snapshots-recovery
|
|
||||||
{% endif %}
|
|
||||||
{% if enable_consensus %}
|
{% if enable_consensus %}
|
||||||
- --enable-consensus
|
- --enable-consensus
|
||||||
secrets:
|
secrets:
|
||||||
|
|||||||
Reference in New Issue
Block a user