PostgreSQL stands out as a dynamic and versatile relational database service, delivering scalability and efficiency. This solution facilitates the effortless deployment, administration, and scaling of PostgreSQL databases in diverse cloud settings.
Below you can find the Aembit configuration required to work with PostgreSQL as a Server Workload using PostgreSQL-compatible CLI, application, or a library.
Prerequisites
Section titled “Prerequisites”Before proceeding with the configuration, ensure you have access to a Kubernetes cluster. Modify the example YAML file according to your specific configurations, and then deploy it to your Kubernetes cluster.
Example Postgres Yaml File
Section titled “Example Postgres Yaml File”apiVersion: apps/v1kind: Deploymentmetadata: name: postgresqlspec: selector: matchLabels: app: postgresql strategy: type: Recreate template: metadata: labels: app: postgresql spec: containers: - image: postgres:16.0 name: postgresql env: - name: POSTGRES_DB value: <database name> - name: POSTGRES_USER value: <master user name> - name: POSTGRES_PASSWORD value: "<master password>" ports: - containerPort: 5432 name: postgresql---# ServiceapiVersion: v1kind: Servicemetadata: name: postgresql annotations:spec: type: NodePort ports: - name: postgresql port: 5432 targetPort: 5432 selector: app: postgresql
:warning: Before running the command, ensure you have replaced the master user name, master password and database name in the configuration file with your desired values.
Use the following command to deploy this file to your Kubernetes cluster.
kubectl apply -f ./postgres.yaml
Server Workload Configuration
Section titled “Server Workload Configuration”- Create a new Server Workload.
- Name - Choose a user-friendly name.
- Configure the service endpoint:
- Host -
postgres.default.svc.cluster.local
- Application Protocol - Postgres
- Port - 5432
- Forward to Port - 5432
- Authentication method - Password Authentication
- Authentication scheme - Password
Credential Provider Configuration
Section titled “Credential Provider Configuration”- Create a new Credential Provider.
- Name - Choose a user-friendly name.
- Credential Type - Username & Password
- Username - Provide the database login ID for the PostgreSQL master user.
- Password - Provide the master password associated with the PostgreSQL database credentials.
Client Workload Configuration
Section titled “Client Workload Configuration”Aembit now handles the credentials required to access the Server Workload, eliminating the need for you to manage them directly. You can safely remove any previously used credentials from the Client Workload.
If you access the Server Workload through an SDK or library, it is possible that the SDK/library may still require credentials to be present for initialization purposes. In this scenario, you can provide placeholder credentials. Aembit will overwrite these placeholder credentials with the appropriate ones during the access process.
Access Policy
Section titled “Access Policy”- Create an access policy for a Client Workload to access the MySQL Server Workload and assign the newly created Credential Provider to it.