You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
New to KubeDB? Please start here.
RBAC Permissions for Postgres
If RBAC is enabled in clusters, some PostgreSQL specific RBAC permissions are required.
These permissions are required for Leader Election process of PostgreSQL clustering.
Here is the list of additional permissions required by StatefulSet of Postgres:
Kubernetes Resource | Resource Names | Permission required |
---|---|---|
statefulsets | {postgres-name} | get |
pods | list, patch | |
configmaps | create | |
configmaps | {postgres-name}-leader-lock | get, update |
Before You Begin
At first, you need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. If you do not already have a cluster, you can create one by using minikube.
Now, install KubeDB cli on your workstation and KubeDB operator in your cluster following the steps here.
To keep things isolated, this tutorial uses a separate namespace called demo
throughout this tutorial.
$ kubectl create ns demo
namespace "demo" created
$ kubectl get ns demo
NAME STATUS AGE
demo Active 5s
Note: Yaml files used in this tutorial are stored in docs/examples/postgres folder in github repository kubedb/cli.
Create a PostgreSQL database
Below is the Postgres object created in this tutorial.
apiVersion: kubedb.com/v1alpha1
kind: Postgres
metadata:
name: quick-postgres
namespace: demo
spec:
version: "9.6"
doNotPause: true
storage:
storageClassName: "standard"
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 50Mi
Create above Postgres object with following command
$ kubedb create -f https://raw.githubusercontent.com/kubedb/cli/0.8.0/docs/examples/postgres/quickstart/quick-postgres.yaml
postgres "quick-postgres" created
When this Postgres object is created, KubeDB operator creates Role, ServiceAccount and RoleBinding with the matching PostgreSQL name and uses that ServiceAccount name in the corresponding StatefulSet.
Lets see what KubeDB operator has created for additional RBAC permission
Role
KubeDB operator create a Role object quick-postgres
in same namespace as Postgres object.
$ kubectl get role -n demo quick-postgres -o yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
creationTimestamp: 2018-02-22T07:38:25Z
name: quick-postgres
namespace: demo
resourceVersion: "261"
selfLink: /apis/rbac.authorization.k8s.io/v1/namespaces/demo/roles/quick-postgres
uid: 5e0418a4-17a3-11e8-8c13-08002723772b
rules:
- apiGroups:
- apps
resourceNames:
- quick-postgres
resources:
- statefulsets
verbs:
- get
- apiGroups:
- ""
resources:
- pods
verbs:
- list
- patch
- apiGroups:
- ""
resources:
- configmaps
verbs:
- create
- apiGroups:
- ""
resourceNames:
- quick-postgres-leader-lock
resources:
- configmaps
verbs:
- get
- update
ServiceAccount
KubeDB operator create a ServiceAccount object quick-postgres
in same namespace as Postgres object.
$ kubectl get serviceaccount -n demo quick-postgres -o yaml
apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: 2018-02-22T07:38:25Z
name: quick-postgres
namespace: demo
resourceVersion: "265"
selfLink: /api/v1/namespaces/demo/serviceaccounts/quick-postgres
uid: 5e0b5c1c-17a3-11e8-8c13-08002723772b
secrets:
- name: quick-postgres-token-s7c48
This ServiceAccount is used in StatefulSet created for Postgres object.
RoleBinding
KubeDB operator create a RoleBinding object quick-postgres
in same namespace as Postgres object.
$ kubectl get rolebinding -n demo quick-postgres -o yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
creationTimestamp: 2018-02-22T07:38:26Z
name: quick-postgres
namespace: demo
resourceVersion: "264"
selfLink: /apis/rbac.authorization.k8s.io/v1/namespaces/demo/rolebindings/quick-postgres
uid: 5e13ade9-17a3-11e8-8c13-08002723772b
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: quick-postgres
subjects:
- kind: ServiceAccount
name: quick-postgres
namespace: demo
This object binds Role quick-postgres
with ServiceAccount quick-postgres
.
Leader Election process get access to Kubernetes API using this RBAC permissions.
Cleaning up
To cleanup the Kubernetes resources created by this tutorial, run:
$ kubectl patch -n demo pg/quick-postgres -p '{"spec":{"doNotPause":false}}' --type="merge"
$ kubectl delete -n demo pg/quick-postgres
$ kubectl patch -n demo drmn/quick-postgres -p '{"spec":{"wipeOut":true}}' --type="merge"
$ kubectl delete -n demo drmn/quick-postgres
$ kubectl delete ns demo