diff --git a/jobs/services/privatebin-backup.hcl b/jobs/services/privatebin-backup.hcl new file mode 100644 index 0000000..17ab780 --- /dev/null +++ b/jobs/services/privatebin-backup.hcl @@ -0,0 +1,50 @@ +job "privatebin-backup" { + datacenters = ["aperture"] + type = "batch" + + periodic { + crons = ["0 */3 * * * *"] + prohibit_overlap = true + } + + group "db-backup" { + task "postgres-backup" { + driver = "raw_exec" + + config { + command = "/bin/bash" + args = ["local/script.sh"] + } + + template { + data = < "${file}" + +find /storage/backups/nomad/privatebin/postgresql-privatebin* -ctime +3 -exec rm {} \; || true + +if [ -s "$file" ]; then # check if file exists and is not empty + echo "Backup successful" + exit 0 +else + rm $file + curl -H "Content-Type: application/json" -d \ + '{"content": "<@&585512338728419341> `PostgreSQL` backup for **'"${job_name}"'** has just **FAILED**\nFile name: `'"$file"'`\nDate: `'"$(TZ=Europe/Dublin date)"'`\nTurn off this script with `nomad job stop '"${job_name}"'` \n\n## Remember to restart this backup job when fixed!!!"}' \ + {{ key "postgres/webhook/discord" }} +fi +EOH + destination = "local/script.sh" + } + } + } +} + diff --git a/jobs/services/privatebin.hcl b/jobs/services/privatebin.hcl index b43f42d..639c96e 100644 --- a/jobs/services/privatebin.hcl +++ b/jobs/services/privatebin.hcl @@ -28,7 +28,7 @@ job "privatebin" { tags = [ "traefik.enable=true", - "traefik.http.routers.privatebin.rule=Host(`paste.redbrick.dcu.ie`)", + "traefik.http.routers.privatebin.rule=Host(`paste.redbrick.dcu.ie`) || Host(`paste.rb.dcu.ie`)", "traefik.http.routers.privatebin.entrypoints=web,websecure", "traefik.http.routers.privatebin.tls.certresolver=lets-encrypt", ] @@ -183,7 +183,7 @@ batchsize = 10 [model] class = Database [model_options] -dsn = "pgsql:host=postgres.service.consul;dbname={{ key "privatebin/db/name" }}" +dsn = "pgsql:host={{ env "NOMAD_ADDR_db" }};dbname={{ key "privatebin/db/name" }}" tbl = "{{ key "privatebin/db/name" }}" ; table prefix usr = "{{ key "privatebin/db/user" }}" pwd = "{{ key "privatebin/db/password" }}"