Skip to content

Building a profile from your current deployment

PingDirectory is built for GitOps through native tools for building profiles. To find the latest tools and profiles, search for "DevOps" in PingDirectory Docs. You can find details of the server profile structure there.

A well-formed PingDirectory profile includes all the configuration details needed for starting up a server in a new or existing replication topology as a representation of what is actually running.

Use this guide to build a PingDirectory profile from a running instance.

Before you begin

You must:

You should:

Start Building

Generating a profile

To generate a profile, run manage-profile generate-profile.

This can be called on a running container in Kubernetes like so:

## kubectl exec -it <pod-name> \
##  -- manage-profile generate-profile \
##  --profileRoot /tmp/pd.profile

kubectl exec -it pingdirectory-0 \
  -- manage-profile generate-profile \
  --profileRoot /tmp/pd.profile

The Name Matters

Although you don't have to name your profile pd.profile, the default location (the variable PD_PROFILE) that PingDirectory looks at is PD_PROFILE="/opt/staging/pd.profile".

Sample Output:

Defaulted container "pingdirectory" out of: pingdirectory, telegraf, vault-agent-init (init)
Generating server profile

...

Variables such as PING_INSTANCE_NAME in setup-arguments.txt and in any other
files in the profile will need to be provided through environment variables or
through a profile variables file when using the generated profile with the
manage-profile tool. The PING_SERVER_ROOT and PING_PROFILE_ROOT variables are
provided by manage-profile

Some changes may need to be made to the generated profile. Any desired LDIF
files will need to be added to the profile. Any additional server root files,
server SDK extensions, and dsconfig commands can be manually added, and
variables-ignore.txt can be updated to ignore certain files during variable
substitution. See the README file at /tmp/pd.profile/misc-files/README for
more information on the manual steps that must be taken for the generated
profile to be used with the manage-profile tool

The following files and directories in the server root were excluded from the
generated profile, and can be manually added if necessary. These files can
also be included by generate-profile with the --includePath argument:
config/truststore
config/ads-truststore
config/encryption-settings.pin
config/tools.properties.orig
config/encryption-settings/encryption-settings-db
config/keystore.p12
config/tools.properties
config/encryption-settings/encryption-settings-db.old
config/keystore.pin
config/keystore
config/ads-truststore.pin
config/truststore.p12
config/truststore.pin

The generated profile can be found at /tmp/pd.profile

Note other paths that are not included

The manage-profile generate-profile command outputs valuable information about what is and isn't included in the generated profile.

Don't put secrets in your profile!

Secrets should not be included in your profile, so they are not included in the profile generation by default. However, if you have not already added encryption secrets or keystores to your environment, you can use the --includePath argument to collect items from the running server. These items should then be provided to the server on its next restart through some secrets management tool.

Extracting the generated profile

Following the Kubernetes example, you can copy out the generated profile with:

kubectl cp pingdirectory-0:/tmp/pd.profile pd.profile

Sample output:

% tree
.
└── pd.profile
    ├── dsconfig
    │   └── 00-config.dsconfig
    ├── ldif
    │   └── userRoot
    ├── misc-files
    │   └── README
    ├── server-root
    │   ├── post-setup
    │   └── pre-setup
    │       ├── PingDirectory.lic
    │       ├── README.md
    │       └── config
    │           ├── encryption-settings.pin ## Added via --includePath
    │           ├── keystore.pin ## Added via --includePath
    │           └── schema
    │               ├── 80-format-counter-metrics.ldif
    │               ├── 87-local-identities.ldif
    │               ├── 88-grants.ldif
    │               ├── 89-sessions.ldif
    │               └── 90-oauth-clients.ldif
    ├── server-sdk-extensions
    ├── setup-arguments.txt ## REMOVE this
    └── variables-ignore.txt

11 directories, 13 files

setup-arguments.txt is generated by our Docker image at startup and isn't needed in the profile, so you should remove it from the profile.

rm pd.profile/setup-arguments.txt

userRoot data is not included

You might notice that userRoot data (i.e. users) isn't included. Profiles should contain configuration only, not data.

Storing a profile

To store the profile, at the root of your profile:

Choose from:

  • For an unmounted profile, add to pd.profile.
  • For a mounted profile, add to /opt/in/pd.profile.

Including other files

In addition to what's generated with manage-profile generate-profile, you might want to include other files. These files should be siblings to pd.profile at the root of the profile.

For an example structure, see baseline.

Profile structure

"A good PingDirectory profile includes all the configuration needed for starting up a server in a new or existing replication topology."

Review the following elements to see what to include in your profile.

dsconfig commands

Because this is how the PingDirectory server is configured, dsconfig commands belong in your profile.

  • manage-profile generate-profile outputs all of the dsconfig commands of a running server into one file: 00-config.dsconfig.

Keeping dsconfig commands in one file makes sense because they are ingested together but run in order by the server's inherent dependency knowledge of itself. You can work on PingDirectory in a dev environment and make many changes while working toward your desired configuration.

  • generate-profile exports a representation of your work.

Multiple files

You might see multiple files containing dsconfig commands in our profiles, which serves to show logical separation in our demos. Additionally, our demos might be built of multiple layers coming form different repositories so this prevents overwriting.

users

Data is expected to change at runtime, so this information does not belong in your profile structure.

There is built-in protection to enforce this. ldif/userRoot/* is only imported on GENESIS - The first start of the first PingDirectory in a topology.

The exceptions to this rule are ephemeral dev and demo environments. This is why you see user files in our sample profiles. These files are intended for bootstrapping demo and test instances.

If you are in this category and wanted to include users, you could use:

kubectl exec -it pingdirectory-0 \
  -- export-ldif \
  --backendID userRoot \
  --ldifFile /tmp/userRoot.ldif \
  --doNotEncrypt

kubectl cp pingdirectory-0:/tmp/userRoot.ldif \
  pd.profile/ldif/userRoot/00-users.ldif

schema

Schema belongs in your profile strcuture because you might want to manage your schema as code, and pd.profile/server-root/pre-setup/config/schema is where to do that.

encryption keys, keystores, truststores, and other secrets

Any and all secrets should be provided by some sort of secrets management (Vault, bitnami sealed secrets, or at least kubernetes secrets), and as such, these do not belong in your profile structure.

PingDirectory allows you to define file paths to secrets so they don't need to be in the profile.