Building a profile from your current deployment ¶
PingDirectory is built for GitOps through native tools for building profiles. To find the latest tools and profiles, search for "DevOps" in PingDirectory Docs. You can find details of the server profile structure there.
A well-formed PingDirectory profile includes all the configuration details needed for starting up a server in a new or existing replication topology as a representation of what is actually running.
Use this guide to build a PingDirectory profile from a running instance.
Before you begin ¶
You must:
- Complete Get Started
- Have a running PingDirectory instance of 8.0.0.0 or later with shell access on the machine or in the container
- Understand Product Container Anatomy
You should:
- Review Customizing Server Profiles
Start Building ¶
Generating a profile ¶
To generate a profile, run manage-profile generate-profile
.
This can be called on a running container in Kubernetes like so:
## kubectl exec -it <pod-name> \
## -- manage-profile generate-profile \
## --profileRoot /tmp/pd.profile
kubectl exec -it pingdirectory-0 \
-- manage-profile generate-profile \
--profileRoot /tmp/pd.profile
The Name Matters
Although you don't have to name your profile pd.profile
, the default location (the variable PD_PROFILE
) that PingDirectory looks at is PD_PROFILE="/opt/staging/pd.profile"
.
Sample Output:
Defaulted container "pingdirectory" out of: pingdirectory, telegraf, vault-agent-init (init)
Generating server profile
...
Variables such as PING_INSTANCE_NAME in setup-arguments.txt and in any other
files in the profile will need to be provided through environment variables or
through a profile variables file when using the generated profile with the
manage-profile tool. The PING_SERVER_ROOT and PING_PROFILE_ROOT variables are
provided by manage-profile
Some changes may need to be made to the generated profile. Any desired LDIF
files will need to be added to the profile. Any additional server root files,
server SDK extensions, and dsconfig commands can be manually added, and
variables-ignore.txt can be updated to ignore certain files during variable
substitution. See the README file at /tmp/pd.profile/misc-files/README for
more information on the manual steps that must be taken for the generated
profile to be used with the manage-profile tool
The following files and directories in the server root were excluded from the
generated profile, and can be manually added if necessary. These files can
also be included by generate-profile with the --includePath argument:
config/truststore
config/ads-truststore
config/encryption-settings.pin
config/tools.properties.orig
config/encryption-settings/encryption-settings-db
config/keystore.p12
config/tools.properties
config/encryption-settings/encryption-settings-db.old
config/keystore.pin
config/keystore
config/ads-truststore.pin
config/truststore.p12
config/truststore.pin
The generated profile can be found at /tmp/pd.profile
Note other paths that are not included
The manage-profile generate-profile
command outputs valuable information about what is and isn't included in the generated profile.
Don't put secrets in your profile!
Secrets should not be included in your profile, so they are not included in the profile generation by default.
However, if you have not already added encryption secrets or keystores to your environment, you can use the --includePath
argument to collect items from the running server. These items should then be provided to the server on its next restart through some secrets management tool.
Extracting the generated profile ¶
Following the Kubernetes example, you can copy out the generated profile with:
kubectl cp pingdirectory-0:/tmp/pd.profile pd.profile
Sample output:
% tree
.
└── pd.profile
├── dsconfig
│ └── 00-config.dsconfig
├── ldif
│ └── userRoot
├── misc-files
│ └── README
├── server-root
│ ├── post-setup
│ └── pre-setup
│ ├── PingDirectory.lic
│ ├── README.md
│ └── config
│ ├── encryption-settings.pin ## Added via --includePath
│ ├── keystore.pin ## Added via --includePath
│ └── schema
│ ├── 80-format-counter-metrics.ldif
│ ├── 87-local-identities.ldif
│ ├── 88-grants.ldif
│ ├── 89-sessions.ldif
│ └── 90-oauth-clients.ldif
├── server-sdk-extensions
├── setup-arguments.txt ## REMOVE this
└── variables-ignore.txt
11 directories, 13 files
setup-arguments.txt
is generated by our Docker image at startup and isn't needed in the profile, so you should remove it from the profile.
rm pd.profile/setup-arguments.txt
userRoot data is not included
You might notice that userRoot data (i.e. users) isn't included. Profiles should contain configuration only, not data.
Storing a profile ¶
To store the profile, at the root of your profile:
Choose from:
- For an unmounted profile, add to
pd.profile
. - For a mounted profile, add to
/opt/in/pd.profile
.
Including other files ¶
In addition to what's generated with manage-profile generate-profile
, you might want to include other files. These files should be siblings to pd.profile
at the root of the profile.
For an example structure, see baseline.
Profile structure ¶
"A good PingDirectory profile includes all the configuration needed for starting up a server in a new or existing replication topology."
Review the following elements to see what to include in your profile.
dsconfig commands
Because this is how the PingDirectory server is configured, dsconfig commands belong in your profile.
manage-profile generate-profile
outputs all of the dsconfig commands of a running server into one file:00-config.dsconfig
.
Keeping dsconfig commands in one file makes sense because they are ingested together but run in order by the server's inherent dependency knowledge of itself. You can work on PingDirectory in a dev environment and make many changes while working toward your desired configuration.
generate-profile
exports a representation of your work.
Multiple files
You might see multiple files containing dsconfig commands in our profiles, which serves to show logical separation in our demos. Additionally, our demos might be built of multiple layers coming form different repositories so this prevents overwriting.
users
Data is expected to change at runtime, so this information does not belong in your profile structure.
There is built-in protection to enforce this. ldif/userRoot/*
is only imported on GENESIS
- The first start of the first PingDirectory in a topology.
The exceptions to this rule are ephemeral dev and demo environments. This is why you see user files in our sample profiles. These files are intended for bootstrapping demo and test instances.
If you are in this category and wanted to include users, you could use:
kubectl exec -it pingdirectory-0 \
-- export-ldif \
--backendID userRoot \
--ldifFile /tmp/userRoot.ldif \
--doNotEncrypt
kubectl cp pingdirectory-0:/tmp/userRoot.ldif \
pd.profile/ldif/userRoot/00-users.ldif
schema
Schema belongs in your profile structure because you might want to manage your schema as code, and pd.profile/server-root/pre-setup/config/schema
is where to do that.
java.properties
The config/java.properties
file in the server root is used by PingDirectory to manage arguments passed to Java for the server process and for any command-line utilities. If you need to set any custom values in this file, provide the entire file in your server profile at instance/config/java.properties
. Note that this is outside of the pd.profile
folder.
encryption keys, keystores, truststores, and other secrets
Any and all secrets should be provided by some sort of secrets management (Vault, bitnami sealed secrets, or at least kubernetes secrets), and as such, these do not belong in your profile structure.
PingDirectory allows you to define file paths to secrets so they don't need to be in the profile.