Skip to content

Latest commit

 

History

History
119 lines (90 loc) · 5.29 KB

database-configuration.md

File metadata and controls

119 lines (90 loc) · 5.29 KB

Database Configuration

PostgreSQL Version

The default PostgreSQL version for the version of EDA bundled with the latest version of the eda-server-operator is PostgreSQL 15. You can find this default for a given version by at the default value for supported_pg_version.

We only have coverage for the default version of PostgreSQL. Newer versions of PostgreSQL will likely work, but should only be configured as an external database. If your database is managed by the operator (default if you don't specify a database.database_secret), then you should not override the default version as this may cause issues when operator tries to upgrade your postgresql pod.

External PostgreSQL Service

To configure EDA to use an external database, the Custom Resource needs to know about the connection details. To do this, create a k8s secret with those connection details and specify the name of the secret as database.database_secret at the CR spec level.

The secret should be formatted as follows:

---
apiVersion: v1
kind: Secret
metadata:
  name: <resourcename>-postgres-configuration
  namespace: <target namespace>
stringData:
  host: <external ip or url resolvable by the cluster>
  port: <external port, this usually defaults to 5432>
  database: <desired database name>
  username: <username to connect as>
  password: <password to connect with>
  sslmode: prefer
  type: unmanaged
type: Opaque

Please ensure that the value for the variable password should not contain single or double quotes (', ") or backslashes (\) to avoid any issues during deployment, backup or restoration.

It is possible to set a specific username, password, port, or database, but still have the database managed by the operator. In this case, when creating the postgres-configuration secret, the type: managed field should be added.

Note: The variable sslmode is valid for external databases only. The allowed values are: prefer, disable, allow, require, verify-ca, verify-full.

Once the secret is created, you can specify it on your spec:

---
spec:
  ...
  database:
    database_secret: <name-of-your-secret>

Managed PostgreSQL Service

If you don't have access to an external PostgreSQL service, the EDA operator can deploy one for you along side the EDA instance itself.

The following variables are customizable for the managed PostgreSQL service

Name Description Default
postgres_image Path of the image to pull quay.io/sclorg/postgresql-15-c9s
postgres_image_version Image version to pull c9s
database.resource_requirements PostgreSQL container resource requirements requests: {cpu: 50m, memory: 100Mi}
database.storage_requirements PostgreSQL container storage requirements requests: {storage: 8Gi}
database.postgres_storage_class PostgreSQL PV storage class Empty string
database.priority_class Priority class used for PostgreSQL pod Empty string
database.postgres_data_volume_init Initialize PostgreSQL data directory with the correct permissions false

Example of customization could be:

---
spec:
  ...
  database:
    resource_requirements:
      requests:
        cpu: 500m
        memory: 2Gi
      limits:
        cpu: '1'
        memory: 4Gi
    storage_requirements:
      requests:
        storage: 8Gi
    postgres_storage_class: fast-ssd
    postgres_data_volume_init: true
    postgres_extra_args:
      - '-c'
      - 'max_connections=1000'

Note: If database.postgres_storage_class is not defined, PostgreSQL will store it's data on a volume using the default storage class for your cluster.

Note about overriding the postgres image

We recommend you use the default image sclorg image. If you override the postgres image to use a custom postgres image like postgres:15 for example, the default data directory path may be different. These images cannot be used interchangeably.

You can no longer configure a custom postgres_data_path because it is hardcoded in the quay.io/sclorg/postgresql-15-c9s image.

Note about Postgres data volume initialization

When using a hostPath backed PVC and some other storage classes like longhorn storage, the postgres data directory needs to be accessible by the user in the postgres pod (UID 26).

To initialize this directory with the correct permissions, add database.postgres_data_volume_init: true to EDA instance.

spec:
  database:
    postgres_data_volume_init: true

Should you need to modify the init container commands, there is an example below.

spec:
  database:
    postgres_data_volume_init: true
    postgres_init_container_commands: |
      chown 26:0 /var/lib/pgsql/data
      chmod 700 /var/lib/pgsql/data