1 {%- from "influxdb/map.jinja" import server with context %}
2 {% from "linux/map.jinja" import system with context %}
4 {%- if server.enabled %}
8 - pkgs: {{ system.pkgs }}
15 - names: {{ server.pkgs }}
19 - name: /etc/influxdb/influxdb.conf
20 - source: salt://influxdb/files/influxdb.conf
23 - pkg: influxdb_packages
27 - name: /etc/default/influxdb
28 - source: salt://influxdb/files/default
31 - pkg: influxdb_packages
36 - name: {{ server.service }}
37 # This delay is needed before being able to send data to server to create
38 # users and databases.
40 {%- if grains.get('noservices') %}
44 - file: influxdb_config
45 - file: influxdb_default
47 {% set url_for_query = "http://{}:{}/query".format(server.http.bind.address, server.http.bind.port) %}
48 {% set admin_created = false %}
50 {%- if server.admin.get('user', {}).get('enabled', False) %}
51 {% set query_create_admin = "--data-urlencode \"q=CREATE USER {} WITH PASSWORD '{}' WITH ALL PRIVILEGES\"".format(server.admin.user.name, server.admin.user.password) %}
52 {% set admin_url = "http://{}:{}/query?u={}&p={}".format(server.http.bind.address, server.http.bind.port, server.admin.user.name, server.admin.user.password) %}
53 influxdb_create_admin:
55 - name: curl -f -S -POST "{{ url_for_query }}" {{ query_create_admin }} || curl -f -S -POST "{{ admin_url }}" {{ query_create_admin }}
57 - service: influxdb_service
58 {% set url_for_query = admin_url %}
59 {% set admin_created = true %}
62 # An admin must exist before creating others users
63 {%- if admin_created %}
64 {%- for user_name, user in server.get('user', {}).iteritems() %}
65 {%- if user.get('enabled', False) %}
66 {%- if user.get('admin', False) %}
67 {% set query_create_user = "--data-urlencode \"q=CREATE USER {} WITH PASSWORD '{}' WITH ALL PRIVILEGES\"".format(user.name, user.password) %}
69 {% set query_create_user = "--data-urlencode \"q=CREATE USER {} WITH PASSWORD '{}'\"".format(user.name, user.password) %}
71 influxdb_create_user_{{user.name}}:
73 - name: curl -f -S -POST "{{ url_for_query }}" {{ query_create_user }}
75 - cmd: influxdb_create_admin
76 # TODO: manage user deletion
81 {%- for db_name, db in server.get('database', {}).iteritems() %}
82 {%- if db.get('enabled', False) %}
83 {% set query_create_db = "--data-urlencode \"q=CREATE DATABASE {}\"".format(db.name) %}
84 influxdb_create_db_{{db.name}}:
86 - name: curl -f -S -POST "{{ url_for_query }}" {{ query_create_db }}
87 {%- if admin_created %}
89 - cmd: influxdb_create_admin
91 # TODO: manage database deletion
93 {% for rp in db.get('retention_policy', []) %}
94 {% set rp_name = rp.get('name', 'autogen') %}
95 {% if rp.get('is_default') %}
96 {% set is_default = 'DEFAULT' %}
98 {% set is_default = '' %}
100 {% set duration = rp.get('duration', 'INF') %}
101 {% set replication = rp.get('replication', '1') %}
102 {% if rp.get('shard_duration') %}
103 {% set shard_duration = 'SHARD DURATION {}'.format(rp.shard_duration) %}
105 {% set shard_duration = '' %}
107 {% set query_retention_policy = 'RETENTION POLICY {} ON {} DURATION {} REPLICATION {} {} {}'.format(
108 rp_name, db.name, duration, replication, shard_duration, is_default)
110 influxdb_retention_policy_{{db.name}}_{{ rp_name }}:
113 - name: curl -s -S -POST "{{ url_for_query }}" --data-urlencode "q=CREATE {{ query_retention_policy }}"|grep -v "policy already exists" || curl -s -S -POST "{{ url_for_query }}" --data-urlencode "q=ALTER {{ query_retention_policy }}"
115 - cmd: influxdb_create_db_{{db.name}}
120 # An admin must exist to manage grants, otherwise there is no user.
121 {%- if admin_created %}
122 {%- for grant_name, grant in server.get('grant', {}).iteritems() %}
123 {%- if grant.get('enabled', False) %}
124 {% set query_grant_user_access = "--data-urlencode \"q=GRANT {} ON {} TO {}\"".format(grant.privilege, grant.database, grant.user) %}
125 influxdb_grant_{{grant_name}}:
127 - name: curl -f -S -POST "{{ url_for_query }}" {{ query_grant_user_access }}
129 - cmd: influxdb_create_db_{{grant.database}}
130 - cmd: influxdb_create_user_{{grant.user}}
131 - cmd: influxdb_create_admin
132 # TODO: manage grant deletion (if needed)