* Add hacking/ directory to .gitignore as it is commonly used for dev scripts * Add postgres_extra_settings * Add postgres_configuration_secret checksum to DB statefulset * Docs for postgres_extra_settings, CI coverage, and examples --------- Co-authored-by: Christian M. Adams <chadams@redhat.com>
9.1 KiB
Database Configuration
PostgreSQL Version
The default PostgreSQL version for the version of AWX bundled with the latest version of the awx-operator is PostgreSQL 15. You can find this default for a given version by at the default value for supported_pg_version.
We only have coverage for the default version of PostgreSQL. Newer versions of PostgreSQL will likely work, but should only be configured as an external database. If your database is managed by the awx-operator (default if you don't specify a postgres_configuration_secret), then you should not override the default version as this may cause issues when awx-operator tries to upgrade your postgresql pod.
External PostgreSQL Service
To configure AWX to use an external database, the Custom Resource needs to know about the connection details. To do this, create a k8s secret with those connection details and specify the name of the secret as postgres_configuration_secret at the CR spec level.
The secret should be formatted as follows:
---
apiVersion: v1
kind: Secret
metadata:
name: <resourcename>-postgres-configuration
namespace: <target namespace>
stringData:
host: <external ip or url resolvable by the cluster>
port: <external port, this usually defaults to 5432>
database: <desired database name>
username: <username to connect as>
password: <password to connect with>
sslmode: prefer
target_session_attrs: read-write
type: unmanaged
type: Opaque
!!! warning
Please ensure that the value for the variable password should not contain single or double quotes (', ") or backslashes (\) to avoid any issues during deployment, backup or restoration.
!!! tip
It is possible to set a specific username, password, port, or database, but still have the database managed by the operator. In this case, when creating the postgres-configuration secret, the type: managed field should be added.
!!! note
The variable sslmode is valid for external databases only. The allowed values are: prefer, disable, allow, require, verify-ca, verify-full.
The variable `target_session_attrs` is only useful for `clustered external` databases. The allowed values are: `any` (default), `read-write`, `read-only`, `primary`, `standby` and `prefer-standby`, whereby only `read-write` and `primary` really make sense in AWX use, as you want to connect to a database node that offers write support.
Once the secret is created, you can specify it on your spec:
---
spec:
...
postgres_configuration_secret: <name-of-your-secret>
Migrating data from an old AWX instance
For instructions on how to migrate from an older version of AWX, see migration.md.
Managed PostgreSQL Service
If you don't have access to an external PostgreSQL service, the AWX operator can deploy one for you along side the AWX instance itself.
The following variables are customizable for the managed PostgreSQL service
| Name | Description | Default |
|---|---|---|
| postgres_image | Path of the image to pull | quay.io/sclorg/postgresql-15-c9s |
| postgres_image_version | Image version to pull | latest |
| postgres_resource_requirements | PostgreSQL container (and initContainer) resource requirements | requests: {cpu: 10m, memory: 64Mi} |
| postgres_storage_requirements | PostgreSQL container storage requirements | requests: {storage: 8Gi} |
| postgres_storage_class | PostgreSQL PV storage class | Empty string |
| postgres_priority_class | Priority class used for PostgreSQL pod | Empty string |
| postgres_extra_settings | PostgreSQL configuration settings to be added to postgresql.conf | [] |
Example of customization could be:
---
spec:
...
postgres_resource_requirements:
requests:
cpu: 500m
memory: 2Gi
limits:
cpu: '1'
memory: 4Gi
postgres_storage_requirements:
requests:
storage: 8Gi
limits:
storage: 50Gi
postgres_storage_class: fast-ssd
postgres_extra_settings:
- setting: max_connections
value: "1000"
!!! note
If postgres_storage_class is not defined, PostgreSQL will store it's data on a volume using the default storage class for your cluster.
PostgreSQL Extra Settings
!!! warning "Deprecation Notice"
The postgres_extra_args parameter is deprecated and should no longer be used. Use postgres_extra_settings instead for configuring PostgreSQL parameters. The postgres_extra_args parameter will be removed in a future version of the AWX operator.
You can customize PostgreSQL configuration by adding settings to the postgresql.conf file using the postgres_extra_settings parameter. This allows you to tune PostgreSQL performance, security, and behavior according to your specific requirements.
The postgres_extra_settings parameter accepts an array of setting objects, where each object contains a setting name and its corresponding value.
!!! note
The postgres_extra_settings parameter replaces the deprecated postgres_extra_args parameter and provides a more structured way to configure PostgreSQL settings.
Configuration Format
spec:
postgres_extra_settings:
- setting: max_connections
value: "499"
- setting: ssl_ciphers
value: "HIGH:!aNULL:!MD5"
Common PostgreSQL settings you might want to configure:
| Setting | Description | Example Value |
|---|---|---|
max_connections |
Maximum number of concurrent connections | "200" |
ssl_ciphers |
SSL cipher suites to use | "HIGH:!aNULL:!MD5" |
shared_buffers |
Amount of memory for shared memory buffers | "256MB" |
effective_cache_size |
Planner's assumption about effective cache size | "1GB" |
work_mem |
Amount of memory for internal sort operations | "4MB" |
maintenance_work_mem |
Memory for maintenance operations | "64MB" |
checkpoint_completion_target |
Target for checkpoint completion | "0.9" |
wal_buffers |
Amount of memory for WAL buffers | "16MB" |
Important Notes
!!! warning
- Changes to postgres_extra_settings require a PostgreSQL pod restart to take effect.
- Some settings may require specific PostgreSQL versions or additional configuration.
- Always test configuration changes in a non-production environment first.
!!! tip - String values should be quoted in the YAML configuration. - Numeric values can be provided as strings or numbers. - Boolean values should be provided as strings ("on"/"off" or "true"/"false").
For a complete list of available PostgreSQL configuration parameters, refer to the PostgreSQL documentation.
Verification:
You can verify that your settings have been applied by connecting to the PostgreSQL database and running:
kubectl exec -it <postgres-pod-name> -n <namespace> -- psql
Then run the following query:
SELECT name, setting FROM pg_settings;
Note about overriding the postgres image
We recommend you use the default image sclorg image. If you are coming from a deployment using the old postgres image from dockerhub (postgres:13), upgrading from awx-operator version 2.12.2 and below to 2.15.0+ will handle migrating your data to the new postgresql image (postgresql-15-c9s).
You can no longer configure a custom postgres_data_path because it is hardcoded in the quay.io/sclorg/postgresql-15-c9s image.
If you override the postgres image to use a custom postgres image like postgres:15 for example, the default data directory path may be different. These images cannot be used interchangeably.
Initialize Postgres data volume
When using a hostPath backed PVC and some other storage classes like longhorn storagfe, the postgres data directory needs to be accessible by the user in the postgres pod (UID 26).
To initialize this directory with the correct permissions, configure the following setting, which will use an init container to set the permissions in the postgres volume.
spec:
postgres_data_volume_init: true
Should you need to modify the init container commands, there is an example below.
postgres_init_container_commands: |
chown 26:0 /var/lib/pgsql/data
chmod 700 /var/lib/pgsql/data