kopia lustrzana https://github.com/Ovski4/docker-borgbackup-cron
Add support for elasticsearch snapshots
rodzic
8fe55c95f1
commit
ba06fa892e
|
@ -4,6 +4,7 @@ FROM ovski/ansible:v2.9.6
|
|||
RUN git clone https://github.com/Ovski4/ansible-playbook-mysql-dump.git /var/mysql-dump-playbook
|
||||
RUN git clone https://github.com/Ovski4/ansible-playbook-mongo-dump.git /var/mongo-dump-playbook
|
||||
RUN git clone https://github.com/Ovski4/ansible-playbook-borg-backup.git /var/borg-backup-playbook
|
||||
RUN git clone https://github.com/Ovski4/ansible-playbook-elasticsearch-snapshot.git /var/elasticsearch-snapshot-playbook
|
||||
|
||||
# Install borg
|
||||
RUN apt install -y \
|
||||
|
|
11
README.md
11
README.md
|
@ -59,6 +59,17 @@ docker run \
|
|||
ovski/borgbackup-cron
|
||||
```
|
||||
|
||||
With elasticsearch snapshot
|
||||
|
||||
```bash
|
||||
docker run \
|
||||
# ... other options
|
||||
-e ELASTICSEARCH_PORT=9200 \
|
||||
-e ELASTICSEARCH_HOST=elasticsearch \
|
||||
-e ELASTICSEARCH_REPOSITORY=backup \
|
||||
ovski/borgbackup-cron
|
||||
```
|
||||
|
||||
You can also use secrets in a stack to store sensitive information.
|
||||
Instead of specifiying environment variables, create the following secrets in /var/secrets (default location):
|
||||
|
||||
|
|
|
@ -19,6 +19,13 @@ if [[ ! -z "$MONGO_HOST" && ! -z "$MONGO_DATABASE" && ! -z "$MONGO_PORT" ]]; the
|
|||
-e "db_name=$MONGO_DATABASE"
|
||||
fi
|
||||
|
||||
if [[ ! -z "$ELASTICSEARCH_HOST" && ! -z "$ELASTICSEARCH_REPOSITORY" && ! -z "$ELASTICSEARCH_PORT" ]]; then
|
||||
ansible-playbook /var/elasticsearch-snapshot-playbook/main.yml \
|
||||
-e "elasticsearch_port=$ELASTICSEARCH_PORT" \
|
||||
-e "elasticsearch_host=$ELASTICSEARCH_HOST" \
|
||||
-e "elasticsearch_repository=$ELASTICSEARCH_REPOSITORY"
|
||||
fi
|
||||
|
||||
ansible-playbook /var/borg-backup-playbook/main.yml \
|
||||
-e "ssh_connection=$SSH_CONNECTION" \
|
||||
-e "private_key_path=$PRIVATE_KEY_PATH" \
|
||||
|
|
Ładowanie…
Reference in New Issue