Deploy and Manage PgBouncer in Amazon Elastic Kubernetes Service (Amazon EKS) Using KubeDB

Deploy and Manage PgBouncer in Amazon Elastic Kubernetes Service (Amazon EKS) Using KubeDB

Overview

KubeDB is the Kubernetes Native Database Management Solution which simplifies and automates routine database tasks such as Provisioning, Monitoring, Upgrading, Patching, Scaling, Volume Expansion, Backup, Recovery, Failure detection, and Repair for various popular databases on private and public clouds. The databases that KubeDB supports are MySQL, MongoDB, MariaDB, Elasticsearch, Redis, PostgreSQL, ProxySQL, Percona XtraDB, Memcached and PgBouncer. You can find the guides to all the supported databases in?KubeDB?. In this tutorial we will deploy and manage PgBouncer in Amazon Elastic Kubernetes Service (Amazon EKS). We will cover the following steps:

  1. Install KubeDB
  2. Deploy PostgreSQL Clustered Database
  3. Deploy PgBouncer Cluster
  4. Read/Write through PgBouncer

Install KubeDB

We will follow the steps to install KubeDB.

Get Cluster ID

We need the cluster ID to get the KubeDB License. To get cluster ID we can run the following command:

$ kubectl get ns kube-system -o jsonpath='{.metadata.uid}'
8e336615-0dbb-4ae8-b72f-2e7ec34c399d         

Get License

Go to?Appscode License Server?to get the license.txt file. For this tutorial we will use KubeDB Enterprise Edition.

No alt text provided for this image

Install KubeDB

We will use helm to install KubeDB. Please install helm?here?if it is not already installed. Now, let’s install?KubeDB.

$ helm repo add appscode https://charts.appscode.com/stable/
$ helm repo update

$ helm search repo appscode/kubedb
NAME                              	CHART VERSION	APP VERSION	DESCRIPTION                                       
appscode/kubedb                   	v2022.12.28  	v2022.12.28	KubeDB by AppsCode - Production ready databases...
appscode/kubedb-autoscaler        	v0.15.0      	v0.15.0    	KubeDB Autoscaler by AppsCode - Autoscale KubeD...
appscode/kubedb-catalog           	v2022.12.28  	v2022.12.28	KubeDB Catalog by AppsCode - Catalog for databa...
appscode/kubedb-community         	v0.24.2      	v0.24.2    	KubeDB Community by AppsCode - Community featur...
appscode/kubedb-crds              	v2022.12.28  	v2022.12.28	KubeDB Custom Resource Definitions                
appscode/kubedb-dashboard         	v0.6.0       	v0.6.0     	KubeDB Dashboard by AppsCode                      
appscode/kubedb-enterprise        	v0.11.2      	v0.11.2    	KubeDB Enterprise by AppsCode - Enterprise feat...
appscode/kubedb-grafana-dashboards	v2022.12.28  	v2022.12.28	A Helm chart for kubedb-grafana-dashboards by A...
appscode/kubedb-metrics           	v2022.12.28  	v2022.12.28	KubeDB State Metrics                              
appscode/kubedb-ops-manager       	v0.17.0      	v0.17.0    	KubeDB Ops Manager by AppsCode - Enterprise fea...
appscode/kubedb-opscenter         	v2022.12.28  	v2022.12.28	KubeDB Opscenter by AppsCode                      
appscode/kubedb-provisioner       	v0.30.0      	v0.30.0    	KubeDB Provisioner by AppsCode - Community feat...
appscode/kubedb-schema-manager    	v0.6.0       	v0.6.0     	KubeDB Schema Manager by AppsCode                 
appscode/kubedb-ui                	v2022.06.14  	0.3.26     	A Helm chart for Kubernetes                       
appscode/kubedb-ui-server         	v2021.12.21  	v2021.12.21	A Helm chart for kubedb-ui-server by AppsCode     
appscode/kubedb-webhook-server    	v0.6.0       	v0.6.0     	KubeDB Webhook Server by AppsCode  

# Install KubeDB Enterprise operator chart
$ helm install kubedb appscode/kubedb \
  --version v2022.12.28 \
  --namespace kubedb --create-namespace \
  --set kubedb-provisioner.enabled=true \
  --set kubedb-ops-manager.enabled=true \
  --set kubedb-autoscaler.enabled=true \
  --set kubedb-dashboard.enabled=true \
  --set kubedb-schema-manager.enabled=true \
  --set-file global.license=/path/to/the/license.txt        

Let’s verify the installation:

$ watch kubectl get pods --all-namespaces -l "app.kubernetes.io/instance=kubedb"
NAMESPACE   NAME                                            READY   STATUS    RESTARTS   AGE
kubedb      kubedb-kubedb-autoscaler-c44c66449-6l9vb        1/1     Running   0          92s
kubedb      kubedb-kubedb-dashboard-666897b7b8-jmvsl        1/1     Running   0          92s
kubedb      kubedb-kubedb-ops-manager-bc85d9fb9-fdc88       1/1     Running   0          92s
kubedb      kubedb-kubedb-provisioner-6bf689b479-zzptr      1/1     Running   0          92s
kubedb      kubedb-kubedb-schema-manager-d4bb5999-xpfpr     1/1     Running   0          92s
kubedb      kubedb-kubedb-webhook-server-6cd9d766d7-fn8xt   1/1     Running   0          92s        

We can list the CRD Groups that have been registered by the operator by running the following command:

$ kubectl get crd -l app.kubernetes.io/name=kubedb
NAME                                              CREATED AT
elasticsearchautoscalers.autoscaling.kubedb.com   2023-01-16T05:54:53Z
elasticsearchdashboards.dashboard.kubedb.com      2023-01-16T05:54:53Z
elasticsearches.kubedb.com                        2023-01-16T05:54:53Z
elasticsearchopsrequests.ops.kubedb.com           2023-01-16T05:54:58Z
elasticsearchversions.catalog.kubedb.com          2023-01-16T05:42:26Z
etcds.kubedb.com                                  2023-01-16T05:54:57Z
etcdversions.catalog.kubedb.com                   2023-01-16T05:42:27Z
kafkas.kubedb.com                                 2023-01-16T05:55:11Z
kafkaversions.catalog.kubedb.com                  2023-01-16T05:42:28Z
mariadbautoscalers.autoscaling.kubedb.com         2023-01-16T05:54:53Z
mariadbdatabases.schema.kubedb.com                2023-01-16T05:54:59Z
mariadbopsrequests.ops.kubedb.com                 2023-01-16T05:55:19Z
mariadbs.kubedb.com                               2023-01-16T05:54:58Z
mariadbversions.catalog.kubedb.com                2023-01-16T05:42:29Z
memcacheds.kubedb.com                             2023-01-16T05:54:58Z
memcachedversions.catalog.kubedb.com              2023-01-16T05:42:30Z
mongodbautoscalers.autoscaling.kubedb.com         2023-01-16T05:54:53Z
mongodbdatabases.schema.kubedb.com                2023-01-16T05:54:55Z
mongodbopsrequests.ops.kubedb.com                 2023-01-16T05:55:02Z
mongodbs.kubedb.com                               2023-01-16T05:54:56Z
mongodbversions.catalog.kubedb.com                2023-01-16T05:42:40Z
mysqlautoscalers.autoscaling.kubedb.com           2023-01-16T05:54:53Z
mysqldatabases.schema.kubedb.com                  2023-01-16T05:54:55Z
mysqlopsrequests.ops.kubedb.com                   2023-01-16T05:55:16Z
mysqls.kubedb.com                                 2023-01-16T05:54:55Z
mysqlversions.catalog.kubedb.com                  2023-01-16T05:42:41Z
perconaxtradbautoscalers.autoscaling.kubedb.com   2023-01-16T05:54:53Z
perconaxtradbopsrequests.ops.kubedb.com           2023-01-16T05:55:34Z
perconaxtradbs.kubedb.com                         2023-01-16T05:55:08Z
perconaxtradbversions.catalog.kubedb.com          2023-01-16T05:42:42Z
pgbouncers.kubedb.com                             2023-01-16T05:55:08Z
pgbouncerversions.catalog.kubedb.com              2023-01-16T05:42:43Z
postgresautoscalers.autoscaling.kubedb.com        2023-01-16T05:54:53Z
postgresdatabases.schema.kubedb.com               2023-01-16T05:54:58Z
postgreses.kubedb.com                             2023-01-16T05:54:59Z
postgresopsrequests.ops.kubedb.com                2023-01-16T05:55:28Z
postgresversions.catalog.kubedb.com               2023-01-16T05:42:44Z
proxysqlautoscalers.autoscaling.kubedb.com        2023-01-16T05:54:54Z
proxysqlopsrequests.ops.kubedb.com                2023-01-16T05:55:31Z
proxysqls.kubedb.com                              2023-01-16T05:55:10Z
proxysqlversions.catalog.kubedb.com               2023-01-16T05:42:45Z
publishers.postgres.kubedb.com                    2023-01-16T05:55:45Z
redisautoscalers.autoscaling.kubedb.com           2023-01-16T05:54:54Z
redises.kubedb.com                                2023-01-16T05:55:10Z
redisopsrequests.ops.kubedb.com                   2023-01-16T05:55:23Z
redissentinelautoscalers.autoscaling.kubedb.com   2023-01-16T05:54:54Z
redissentinelopsrequests.ops.kubedb.com           2023-01-16T05:55:38Z
redissentinels.kubedb.com                         2023-01-16T05:55:10Z
redisversions.catalog.kubedb.com                  2023-01-16T05:42:51Z
subscribers.postgres.kubedb.com                   2023-01-16T05:55:48Z        

Deploy PostgreSQL Clustered Database

Now, we are going to Deploy PostgreSQL Clustered Database using KubeDB. First, let’s create a Namespace in which we will deploy the server.

$ kubectl create ns demo
namespace/demo created        

Here, is the yaml of the PostgreSQL CRO we are going to use:

apiVersion: kubedb.com/v1alpha2 
kind: Postgres
metadata:
  name: postgres
  namespace: demo
spec:
  version: "13.2"
  replicas: 3 
  standbyMode: Hot 
  storageType: Durable 
  storage:
    storageClassName: "gp2" 
    accessModes:
    - ReadWriteOnce
    resources:
      requests:
        storage: 1Gi 
  terminationPolicy: WipeOut        

Let’s save this yaml configuration into?postgres.yaml?Then create the above PostgreSQL CRO

$ kubectl create -f postgres.yaml
postgres.kubedb.com/postgres created        

In this yaml,

  • spec.version?field specifies the version of PostgreSQL. Here, we are using PostgreSQL?version 13.2. You can list the KubeDB supported versions of PostgreSQL by running?$ kubectl get postgresversions?command.
  • spec.standby?is an optional field that specifies the standby mode?hot?or?warm?to use for standby replicas. In?hot?standby mode, standby replicas can accept connection and run read-only queries. In?warm?standby mode, standby replicas can’t accept connection and only used for replication purpose.
  • spec.storage?specifies PVC spec that will be dynamically allocated to store data for this database. This storage spec will be passed to the StatefulSet created by KubeDB operator to run database pods. You can specify any StorageClass available in your cluster with appropriate resource requests.
  • And the?spec.terminationPolicy?field is?Wipeout?means that the database will be deleted without restrictions. It can also be “Halt”, “Delete” and “DoNotTerminate”. Learn More about these?HERE?.

Let’s check if the server is ready to use,

$ kubectl get postgres -n demo postgres
NAME       VERSION   STATUS   AGE
postgres   13.2      Ready    2m17s        

Create Database, User & Grant Privileges

Here, we are going to create a database with a couple of users and grant them all privileges to the database.

$ kubectl exec -it postgres-0 -n demo -- bash
Defaulted container "postgres" out of: postgres, pg-coordinator, postgres-init-container (init)

$ psql -c "create database test" && psql -c "create role roy with login password '12345'" && psql -c "grant all privileges on database test to roy"
CREATE DATABASE
CREATE ROLE
GRANT
CREATE ROLE
GRANT        

Create Secret

Now, we’ll create a secret that includes the?User?and?Password?that we created as Postgres roles above.

apiVersion: v1
stringData:
  password: "12345"
  username: roy
kind: Secret
metadata:
  name: db-user-pass
  namespace: demo
type: kubernetes.io/basic-auth        

Let’s save this yaml configuration into?db-user-pass.yaml?Then create the above Secret

$ kubectl create -f db-user-pass.yaml 
secret/db-user-pass created        

Create AppBinding

Now, we are going to create a AppBinding which we will connect as a database reference to PgBouncer,

apiVersion: appcatalog.appscode.com/v1alpha1
kind: AppBinding
metadata:
  name: pg-appbinding
  namespace: demo
  labels:
    app.kubernetes.io/component: database
    app.kubernetes.io/instance: pg-appbinding
    app.kubernetes.io/managed-by: kubedb.com
    app.kubernetes.io/name: postgreses.kubedb.com
spec:
  appRef:
    apiGroup: kubedb.com
    kind: Postgres
    name: postgres
    namespace: demo
  clientConfig:
    service:
      name: postgres
      path: /
      port: 5432
      query: sslmode=disable
      scheme: postgresql
  parameters:
    apiVersion: appcatalog.appscode.com/v1alpha1
    kind: StashAddon
    stash:
      addon:
        backupTask:
          name: postgres-backup-13.1
        restoreTask:
          name: postgres-restore-13.1
  secret:
    name: db-user-pass
  type: kubedb.com/postgres
  version: "13.2"        

Let’s save this yaml configuration into?pg-appbinding.yaml?Then create the above AppBinding

$ kubectl apply -f pg-appbinding.yaml 
appbinding.appcatalog.appscode.com/pg-appbinding created        

In this yaml,

  • spec.appRef?refers to the underlying application. It contains the information of 4 fields named?apiGroup,?kind,?name?&?namespace.
  • spec.clientConfig.service?If you are running the database inside the Kubernetes cluster, you can use Kubernetes service to connect with the database. You have to specify the following fields like?name,?scheme,?port?in?spec.clientConfig.service?section if you manually create an?AppBinding?object.

Deploy PgBouncer Cluster

We are going to Deploy PgBouncer cluster using KubeDB. Here, is the yaml of the PgBouncer CRO we are going to use:

apiVersion: kubedb.com/v1alpha2
kind: PgBouncer
metadata:
  name: pgbouncer
  namespace: demo
spec:
  version: "1.18.0"
  replicas: 3
  databases:
  - alias: "testdb"
    databaseName: "test"
    databaseRef:
      name: "pg-appbinding"
      namespace: demo
  connectionPool:
    port: 5432
    poolMode: session
    authType: md5
  terminationPolicy: WipeOut        

Let’s save this yaml configuration into?pgbouncer.yaml?Then create the above PgBouncer CRO

$ kubectl create -f pgbouncer.yaml
pgbouncer.kubedb.com/pgbouncer created        

In this yaml,

  • spec.version?field specifies the version of PgBouncer. Here, we are using PgBouncer?1.18.0. You can list the KubeDB supported versions of PgBouncer by running?$ kubectl get pgbouncerversions?command.
  • spec.databaseName?contains the name of PostgreSQL database which is?test?in this case.
  • spec.databaseRef.name?contains the name of the appbinding which is?pg-appbinding?in this case.
  • spec.databaseRef.namespace?contains the namespace information of backend server.
  • spec.connectionPool.poolMode?specifies when a server connection can be reused by other clients.?session?defines Server is released back to pool after client disconnects.
  • spec.connectionPool.authType?specifies client authentication type.
  • And the?spec.terminationPolicy?field is?Wipeout?means that the database will be deleted without restrictions. It can also be “Halt”, “Delete” and “DoNotTerminate”.

Let’s check if the server is ready to use,

$ kubectl get pgbouncer -n demo pgbouncer
NAME        VERSION   STATUS   AGE
pgbouncer   1.18.0    Ready    4m12s        

Once all of the above things are handled correctly then you will see that the following objects are created:

$ kubectl get all -n demo
NAME              READY   STATUS    RESTARTS   AGE
pod/pgbouncer-0   1/1     Running   0          2m13s
pod/pgbouncer-1   1/1     Running   0          2m9s
pod/pgbouncer-2   1/1     Running   0          2m3s
pod/postgres-0    2/2     Running   0          3h10m
pod/postgres-1    2/2     Running   0          3h9m
pod/postgres-2    2/2     Running   0          3h8m

NAME                       TYPE        CLUSTER-IP       EXTERNAL-IP   PORT(S)                      AGE
service/pgbouncer          ClusterIP   10.100.229.156   <none>        5432/TCP                     2m15s
service/pgbouncer-pods     ClusterIP   None             <none>        5432/TCP                     2m15s
service/postgres           ClusterIP   10.100.160.183   <none>        5432/TCP,2379/TCP            3h10m
service/postgres-pods      ClusterIP   None             <none>        5432/TCP,2380/TCP,2379/TCP   3h10m
service/postgres-standby   ClusterIP   10.100.182.68    <none>        5432/TCP                     3h10m

NAME                         READY   AGE
statefulset.apps/pgbouncer   3/3     2m18s
statefulset.apps/postgres    3/3     3h10m

NAME                                               TYPE                   VERSION   AGE
appbinding.appcatalog.appscode.com/pg-appbinding   kubedb.com/postgres    13.2      20m
appbinding.appcatalog.appscode.com/pgbouncer       kubedb.com/pgbouncer   1.18.0    2m27s
appbinding.appcatalog.appscode.com/postgres        kubedb.com/postgres    13.2      3h10m

NAME                           VERSION   STATUS   AGE
postgres.kubedb.com/postgres   13.2      Ready    3h10m

NAME                             VERSION   STATUS   AGE
pgbouncer.kubedb.com/pgbouncer   1.18.0    Ready    3m21s        

We have successfully deployed PgBouncer in Amazon EKS. Now, we can exec into the container to use the database.

Insert Sample Data

Now, let’s exec to the PgBouncer Pod to enter into PostgreSQL server using previously created user credentials to write and read some sample data to the database,

$ kubectl exec -it -n demo pgbouncer-0 -- sh
Defaulted container "pgbouncer" out of: pgbouncer, pgbouncer-init-container (init)

$ psql -d "host=localhost user=roy password=12345 dbname=testdb"
psql (14.2, server 13.2)
Type "help" for help.

testdb=> create table Music(id int, artist varchar, name varchar);
CREATE TABLE

testdb=> insert into Music values(1, 'Bon Jovi', 'Its My Life');
INSERT 0 1

testdb=> select * from music;
 id |  artist  |    name     
----+----------+-------------
  1 | Bon Jovi | Its My Life
(1 row)

testdb=> exit
$ exit        

Verify Data in PostgreSQL

Here, we are going to exec into PostgreSQL pod to verify the inserted data through PgBouncer.

$ kubectl exec -it -n demo postgres-0 -- bash
Defaulted container "postgres" out of: postgres, pg-coordinator, postgres-init-container (init)

$ psql
psql (13.2)
Type "help" for help.

postgres=# \l
                                   List of databases
     Name      |  Owner   | Encoding |  Collate   |   Ctype    |   Access privileges   
---------------+----------+----------+------------+------------+-----------------------
 kubedb_system | postgres | UTF8     | en_US.utf8 | en_US.utf8 | 
 postgres      | postgres | UTF8     | en_US.utf8 | en_US.utf8 | 
 template0     | postgres | UTF8     | en_US.utf8 | en_US.utf8 | =c/postgres          +
               |          |          |            |            | postgres=CTc/postgres
 template1     | postgres | UTF8     | en_US.utf8 | en_US.utf8 | =c/postgres          +
               |          |          |            |            | postgres=CTc/postgres
 test          | postgres | UTF8     | en_US.utf8 | en_US.utf8 | =Tc/postgres         +
               |          |          |            |            | postgres=CTc/postgres+
               |          |          |            |            | roy=CTc/postgres
(5 rows)

postgres=# \c test
You are now connected to database "test" as user "postgres".

test=# \dt
       List of relations
 Schema | Name  | Type  | Owner 
--------+-------+-------+-------
 public | music | table | roy
(1 row)

test=# select * from music;
 id |  artist  |    name     
----+----------+-------------
  1 | Bon Jovi | Its My Life
(1 row)

test=# exit
$ exit        

We’ve successfully access our PostgreSQL database through PgBouncer. Click?Run & Manage Production-Grade PgBouncer on Kubernetes?for more detailed information.

We have made an in depth tutorial on PostgreSQL Connection Pooling In Kubernetes Using KubeDB PGBouncer. You can have a look into the video below:

Support

To speak with us, please leave a message on?our website?.

To receive product announcements, follow us on?Twitter?.

To watch tutorials of various Production-Grade Kubernetes Tools Subscribe our?YouTube?channel.

More about?PgBouncer in Kubernetes

If you have found a bug with KubeDB or want to request for new features, please?file an issue?.

PS: This article was initially published on?ByteBuilders Blog

要查看或添加评论,请登录

AppsCode Inc.的更多文章

社区洞察

其他会员也浏览了