Interpret KUBERNETES_SERVICE_HOST as hostname if not parsed as IP address (#2285)
* Interpret KUBERNETES_SERVICE_HOST as hostname if not parsed as IP address This allows correctly connecting to the Kubernetes API when the service host is set as a hostname. This is at least the case on gardener.cloud . I'm running the patched version in production. Related to #2047 which describes the same problem I had. * Reindent logical-backup/dump.sh --------- Co-authored-by: Nick Douma <nick.douma@cyso.com>
This commit is contained in:
parent
ec701f6d30
commit
3f4e44de82
|
|
@ -12,14 +12,18 @@ DUMP_SIZE_COEFF=5
|
||||||
ERRORCOUNT=0
|
ERRORCOUNT=0
|
||||||
|
|
||||||
TOKEN=$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)
|
TOKEN=$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)
|
||||||
|
KUBERNETES_SERVICE_PORT=${KUBERNETES_SERVICE_PORT:-443}
|
||||||
if [ "$KUBERNETES_SERVICE_HOST" != "${KUBERNETES_SERVICE_HOST#*[0-9].[0-9]}" ]; then
|
if [ "$KUBERNETES_SERVICE_HOST" != "${KUBERNETES_SERVICE_HOST#*[0-9].[0-9]}" ]; then
|
||||||
echo "IPv4"
|
echo "IPv4"
|
||||||
K8S_API_URL=https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT/api/v1
|
K8S_API_URL=https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT/api/v1
|
||||||
elif [ "$KUBERNETES_SERVICE_HOST" != "${KUBERNETES_SERVICE_HOST#*:[0-9a-fA-F]}" ]; then
|
elif [ "$KUBERNETES_SERVICE_HOST" != "${KUBERNETES_SERVICE_HOST#*:[0-9a-fA-F]}" ]; then
|
||||||
echo "IPv6"
|
echo "IPv6"
|
||||||
K8S_API_URL=https://[$KUBERNETES_SERVICE_HOST]:$KUBERNETES_SERVICE_PORT/api/v1
|
K8S_API_URL=https://[$KUBERNETES_SERVICE_HOST]:$KUBERNETES_SERVICE_PORT/api/v1
|
||||||
|
elif [ -n "$KUBERNETES_SERVICE_HOST" ]; then
|
||||||
|
echo "Hostname"
|
||||||
|
K8S_API_URL=https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT/api/v1
|
||||||
else
|
else
|
||||||
echo "Unrecognized IP format '$KUBERNETES_SERVICE_HOST'"
|
echo "KUBERNETES_SERVICE_HOST was not set"
|
||||||
fi
|
fi
|
||||||
echo "API Endpoint: ${K8S_API_URL}"
|
echo "API Endpoint: ${K8S_API_URL}"
|
||||||
CERT=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
CERT=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
||||||
|
|
@ -59,42 +63,42 @@ function aws_delete_objects {
|
||||||
export -f aws_delete_objects
|
export -f aws_delete_objects
|
||||||
|
|
||||||
function aws_delete_outdated {
|
function aws_delete_outdated {
|
||||||
if [[ -z "$LOGICAL_BACKUP_S3_RETENTION_TIME" ]] ; then
|
if [[ -z "$LOGICAL_BACKUP_S3_RETENTION_TIME" ]] ; then
|
||||||
echo "no retention time configured: skip cleanup of outdated backups"
|
echo "no retention time configured: skip cleanup of outdated backups"
|
||||||
return 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
# define cutoff date for outdated backups (day precision)
|
|
||||||
cutoff_date=$(date -d "$LOGICAL_BACKUP_S3_RETENTION_TIME ago" +%F)
|
|
||||||
|
|
||||||
# mimic bucket setup from Spilo
|
|
||||||
prefix="spilo/"$SCOPE$LOGICAL_BACKUP_S3_BUCKET_SCOPE_SUFFIX"/logical_backups/"
|
|
||||||
|
|
||||||
args=(
|
|
||||||
"--no-paginate"
|
|
||||||
"--output=text"
|
|
||||||
"--prefix=$prefix"
|
|
||||||
"--bucket=$LOGICAL_BACKUP_S3_BUCKET"
|
|
||||||
)
|
|
||||||
|
|
||||||
[[ ! -z "$LOGICAL_BACKUP_S3_ENDPOINT" ]] && args+=("--endpoint-url=$LOGICAL_BACKUP_S3_ENDPOINT")
|
|
||||||
[[ ! -z "$LOGICAL_BACKUP_S3_REGION" ]] && args+=("--region=$LOGICAL_BACKUP_S3_REGION")
|
|
||||||
|
|
||||||
# list objects older than the cutoff date
|
|
||||||
aws s3api list-objects "${args[@]}" --query="Contents[?LastModified<='$cutoff_date'].[Key]" > /tmp/outdated-backups
|
|
||||||
|
|
||||||
# spare the last backup
|
|
||||||
sed -i '$d' /tmp/outdated-backups
|
|
||||||
|
|
||||||
count=$(wc -l < /tmp/outdated-backups)
|
|
||||||
if [[ $count == 0 ]] ; then
|
|
||||||
echo "no outdated backups to delete"
|
|
||||||
return 0
|
return 0
|
||||||
fi
|
fi
|
||||||
echo "deleting $count outdated backups created before $cutoff_date"
|
|
||||||
|
|
||||||
# deleted outdated files in batches with 100 at a time
|
# define cutoff date for outdated backups (day precision)
|
||||||
tr '\n' '\0' < /tmp/outdated-backups | xargs -0 -P1 -n100 bash -c 'aws_delete_objects "$@"' _
|
cutoff_date=$(date -d "$LOGICAL_BACKUP_S3_RETENTION_TIME ago" +%F)
|
||||||
|
|
||||||
|
# mimic bucket setup from Spilo
|
||||||
|
prefix="spilo/"$SCOPE$LOGICAL_BACKUP_S3_BUCKET_SCOPE_SUFFIX"/logical_backups/"
|
||||||
|
|
||||||
|
args=(
|
||||||
|
"--no-paginate"
|
||||||
|
"--output=text"
|
||||||
|
"--prefix=$prefix"
|
||||||
|
"--bucket=$LOGICAL_BACKUP_S3_BUCKET"
|
||||||
|
)
|
||||||
|
|
||||||
|
[[ ! -z "$LOGICAL_BACKUP_S3_ENDPOINT" ]] && args+=("--endpoint-url=$LOGICAL_BACKUP_S3_ENDPOINT")
|
||||||
|
[[ ! -z "$LOGICAL_BACKUP_S3_REGION" ]] && args+=("--region=$LOGICAL_BACKUP_S3_REGION")
|
||||||
|
|
||||||
|
# list objects older than the cutoff date
|
||||||
|
aws s3api list-objects "${args[@]}" --query="Contents[?LastModified<='$cutoff_date'].[Key]" > /tmp/outdated-backups
|
||||||
|
|
||||||
|
# spare the last backup
|
||||||
|
sed -i '$d' /tmp/outdated-backups
|
||||||
|
|
||||||
|
count=$(wc -l < /tmp/outdated-backups)
|
||||||
|
if [[ $count == 0 ]] ; then
|
||||||
|
echo "no outdated backups to delete"
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
echo "deleting $count outdated backups created before $cutoff_date"
|
||||||
|
|
||||||
|
# deleted outdated files in batches with 100 at a time
|
||||||
|
tr '\n' '\0' < /tmp/outdated-backups | xargs -0 -P1 -n100 bash -c 'aws_delete_objects "$@"' _
|
||||||
}
|
}
|
||||||
|
|
||||||
function aws_upload {
|
function aws_upload {
|
||||||
|
|
@ -137,14 +141,14 @@ function get_pods {
|
||||||
declare -r SELECTOR="$1"
|
declare -r SELECTOR="$1"
|
||||||
|
|
||||||
curl "${K8S_API_URL}/namespaces/${POD_NAMESPACE}/pods?$SELECTOR" \
|
curl "${K8S_API_URL}/namespaces/${POD_NAMESPACE}/pods?$SELECTOR" \
|
||||||
--cacert $CERT \
|
--cacert $CERT \
|
||||||
-H "Authorization: Bearer ${TOKEN}" | jq .items[].status.podIP -r
|
-H "Authorization: Bearer ${TOKEN}" | jq .items[].status.podIP -r
|
||||||
}
|
}
|
||||||
|
|
||||||
function get_current_pod {
|
function get_current_pod {
|
||||||
curl "${K8S_API_URL}/namespaces/${POD_NAMESPACE}/pods?fieldSelector=metadata.name%3D${HOSTNAME}" \
|
curl "${K8S_API_URL}/namespaces/${POD_NAMESPACE}/pods?fieldSelector=metadata.name%3D${HOSTNAME}" \
|
||||||
--cacert $CERT \
|
--cacert $CERT \
|
||||||
-H "Authorization: Bearer ${TOKEN}"
|
-H "Authorization: Bearer ${TOKEN}"
|
||||||
}
|
}
|
||||||
|
|
||||||
declare -a search_strategy=(
|
declare -a search_strategy=(
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue