You are looking at the documentation of a prior release. To read the documentation of the latest release, please visit here.
New to KubeDB? Please start here.
PgBouncer is a Kubernetes
Custom Resource Definitions (CRD). It provides declarative configuration for PgBouncer in a Kubernetes native way. You only need to describe the desired configurations in a
PgBouncer object, and the KubeDB operator will create Kubernetes resources in the desired state for you.
Like any official Kubernetes resource, a
PgBouncer object has
Below is an example PgBouncer object.
apiVersion: kubedb.com/v1alpha2 kind: PgBouncer metadata: name: pgbouncer-server namespace: demo spec: version: "1.8.1" replicas: 2 databases: - alias: "postgres" databaseName: "postgres" databaseRef: name: "quick-postgres" databaseSecretRef: - "one-specific-user" - alias: "tmpdb" databaseName: "mydb" databaseRef: name: "quick-postgres" connectionPool: maxClientConnections: 20 reservePoolSize: 5 adminUsers: - admin userListSecretRef: name: db-user-pass monitor: agent: prometheus.io/operator prometheus: serviceMonitor: labels: k8s-app: prometheus interval: 10s
spec.version is a required field that specifies the name of the PgBouncerVersion crd where the docker images are specified. Currently, when you install KubeDB, it creates the following
spec.replicas specifies the total number of available pgbouncer server nodes for each crd. KubeDB uses
PodDisruptionBudget to ensure that majority of the replicas are available during voluntary disruptions.
spec.databases specifies an array of postgres databases that pgbouncer should add to its connection pool. It contains three
required fields and two
optional fields for each database connection.
spec.databases.alias: specifies an alias for the target database located in a postgres server specified by an appbinding.
spec.databases.databaseName: specifies the name of the target database.
spec.databases.databaseRef: specifies the name and namespace of the AppBinding that contains the path to a PostgreSQL server where the target database can be found.
spec.databases.databaseSecretRef(optional): points to a secret that contains the credentials (username and password) of an existing user of this database. It is used to bind a single user to this specific database connection..
ConnectionPool is used to configure pgbouncer connection-pool. All the fields here are accompanied by default values and can be left unspecified if no customisation is required by the user.
spec.connectionPool.listenPort: specifies the port on which pgbouncer should listen to connect with clients. The default is 5432.
spec.connectionPool.listenAddress: specifies the adress from which pgbouncer should allow client connection from. The default is
* (all addresses).
spec.connectionPool.adminUsers: specifies the values of admin_users. Comma seperated names of admin users are listed here.
spec.connectionPool.poolMode: specifies the value of pool_mode. Specifies when a server connection can be reused by other clients.
Server is released back to pool after client disconnects. Default.
Server is released back to pool after transaction finishes.
Server is released back to pool after query finishes. Long transactions spanning multiple statements are disallowed in this mode.
spec.connectionPool.maxClientConnections: specifies the value of max_client_conn. When increased then the file descriptor limits should also be increased. Note that actual number of file descriptors used is more than max_client_conn. Theoretical maximum used is:
max_client_conn + (max pool_size * total databases * total users)
if each user connects under its own username to server. If a database user is specified in connect string (all users connect under same username), the theoretical maximum is:
max_client_conn + (max pool_size * total databases)
The theoretical maximum should be never reached, unless somebody deliberately crafts special load for it. Still, it means you should set the number of file descriptors to a safely high number.
ulimit in your favorite shell man page. Note:
ulimit does not apply in a Windows environment.
spec.connectionPool.defaultPoolSize: specifies the value of default_pool_size. Used to determine how many server connections to allow per user/database pair. Can be overridden in the per-database configuration.
spec.connectionPool.minPoolSize: specifies the value of min_pool_size. PgBouncer adds more server connections to pool if below this number. Improves behavior when usual load comes suddenly back after period of total inactivity.
Default: 0 (disabled)
spec.connectionPool.reservePoolSize: specifies the value of reserve_pool_size. Used to determine how many additional connections to allow to a pool. 0 disables.
Default: 0 (disabled)
spec.connectionPool.reservePoolTimeout: specifies the value of reserve_pool_timeout. If a client has not been serviced in this many seconds, pgbouncer enables use of additional connections from reserve pool. 0 disables.
spec.connectionPool.maxDbConnections: specifies the value of max_db_connections. PgBouncer does not allow more than this many connections per-database (regardless of pool - i.e. user). It should be noted that when you hit the limit, closing a client connection to one pool will not immediately allow a server connection to be established for another pool, because the server connection for the first pool is still open. Once the server connection closes (due to idle timeout), a new server connection will immediately be opened for the waiting pool.
spec.connectionPool.maxUserConnections: specifies the value of max_user_connections. PgBouncer does not allow more than this many connections per-user (regardless of pool - i.e. user). It should be noted that when you hit the limit, closing a client connection to one pool will not immediately allow a server connection to be established for another pool, because the server connection for the first pool is still open. Once the server connection closes (due to idle timeout), a new server connection will immediately be opened for the waiting pool.
spec.connectionPool.statsPeriod: sets how often the averages shown in various
SHOW commands are updated and how often aggregated statistics are written to the log.
spec.connectionPool.authType: specifies how to authenticate users. PgBouncer supports several authentication methods including pam, md5, scram-sha-256, trust , or any. However hba, and cert are not supported.
spec.connectionPool.authUser: looks up any user not specified in auth_file from pg_shadow.
Default: not set.
spec.connectionPool.IgnoreStartupParameters: specifies comma-separated startup parameters that pgbouncer knows are handled by admin and it can ignore them.
UserList field is used to specify a secret that contains the list of authorised users along with their passwords. Basically this secret is created from the standard pgbouncer userlist file.
spec.userList.userListSecretRef.name: specifies the name of the secret containing userlist. Has to be created in the same namespace as the PgBouncer crd.
PgBouncer managed by KubeDB can be monitored with builtin-Prometheus and Prometheus operator out-of-the-box. To learn more,
KubeDB allows providing a template for pgbouncer pods through
spec.podTemplate. KubeDB operator will pass the information provided in
spec.podTemplate to the StatefulSet created for PgBouncer server
KubeDB accept following fields to set in
Usage of some fields in
spec.podTemplate is described below,
spec.podTemplate.spec.env is an optional field that specifies the environment variables to pass to the PgBouncer docker image. To know about supported environment variables, please visit here.
Also, note that KubeDB does not allow updates to the environment variables as updating them does not have any effect once the server is created. If you try to update environment variables, KubeDB operator will reject the request with following error,
Error from server (BadRequest): error when applying patch: ... for: "./pgbouncer.yaml": admission webhook "pgbouncer.validators.kubedb.com" denied the request: precondition failed for: ... At least one of the following was changed: apiVersion kind name namespace spec.podTemplate.spec.nodeSelector
spec.podTemplate.spec.imagePullSecrets is an optional field that points to secrets to be used for pulling docker image if you are using a private docker registry. For more details on how to use private docker registry, please visit here.
spec.podTemplate.spec.nodeSelector is an optional field that specifies a map of key-value pairs. For the pod to be eligible to run on a node, the node must have each of the indicated key-value pairs as labels (it can have additional labels as well). To learn more, see here .
spec.podTemplate.spec.resources is an optional field. This can be used to request compute resources required by the database pods. To learn more, visit here.
KubeDB creates a service for each PgBouncer instance. The service has the same name as the
pgbouncer.name and points to pgbouncer pods.
You can provide template for this service using
spec.serviceTemplate. This will allow you to set the type and other properties of the service. If
spec.serviceTemplate is not provided, KubeDB will create a service of type
ClusterIP with minimal settings.
KubeDB allows the following fields to set in
See here to understand these fields in detail.