update docs and move parts from README to index.md
This commit is contained in:
		
							parent
							
								
									c1d7d0623f
								
							
						
					
					
						commit
						44aef63766
					
				
							
								
								
									
										63
									
								
								README.md
								
								
								
								
							
							
						
						
									
										63
									
								
								README.md
								
								
								
								
							|  | @ -8,40 +8,25 @@ | |||
| 
 | ||||
| <img src="docs/diagrams/logo.png" width="200"> | ||||
| 
 | ||||
| ## Introduction to the Postgres Operator | ||||
| The Postgres operator manages PostgreSQL clusters on Kubernetes. Configuration | ||||
| happens only via manifests. Therefore, it integrates easily in automated CI/CD | ||||
| pipelines with no access to Kubernetes directly. | ||||
| 
 | ||||
| The Postgres [operator](https://coreos.com/blog/introducing-operators.html) | ||||
| manages PostgreSQL clusters on Kubernetes: | ||||
| 
 | ||||
| 1. The operator watches additions, updates, and deletions of PostgreSQL cluster | ||||
|    manifests and changes the running clusters accordingly. For example, when a | ||||
|    user submits a new manifest, the operator spawns a new Postgres cluster with | ||||
|    necessary entities such as StatefulSets, Services, and also Postgres roles. See this | ||||
|    [Postgres cluster manifest](manifests/complete-postgres-manifest.yaml) | ||||
|    for settings that a manifest may contain. | ||||
| 
 | ||||
| 2. The operator also watches updates to [its own configuration](manifests/configmap.yaml) | ||||
|    and alters running Postgres clusters if necessary.  For instance, if a pod | ||||
|    Docker image is changed, the operator carries out the rolling update. That | ||||
|    is, the operator re-spawns one-by-one pods of each StatefulSet it manages | ||||
|    with the new Docker image. | ||||
| 
 | ||||
| 3. Finally, the operator periodically synchronizes the actual state of each | ||||
|    Postgres cluster with the desired state defined in the cluster's manifest. | ||||
| 
 | ||||
| 4. The operator aims to be hands free and configuration happens only via manifests and its own config. | ||||
|    This enables easy integration in automated deploy pipelines with no access to Kubernetes directly. | ||||
| By default, the operator is building up on two other Open Source projects | ||||
| developed at Zalando. [Spilo](https://github.com/zalando/spilo) provides the | ||||
| Docker image that contains PostgreSQL incl. some pre-compiled extensions. Spilo | ||||
| also includes [Patroni]((https://github.com/zalando/spilo), to manage highly | ||||
| available Postgres cluster powered by streaming replication. | ||||
| 
 | ||||
| # Getting started | ||||
| 
 | ||||
| For a quick first impression follow the instructions of [this](docs/quickstart.md) | ||||
| tutorial. | ||||
| 
 | ||||
| # Google Summer of Code | ||||
| # Documentation | ||||
| 
 | ||||
| The Postgres Operator made it to the [Google Summer of Code 2019](https://summerofcode.withgoogle.com/)! As a brand new mentoring organization, we are now looking for our first mentees. Check [our ideas](https://github.com/zalando/postgres-operator/blob/master/docs/gsoc-2019/ideas.md#google-summer-of-code-2019) and start discussion in [the issue tracker](https://github.com/zalando/postgres-operator/issues). And don't forget to spread a word about our GSoC participation to attract even more students. | ||||
| 
 | ||||
| ## Table of contents | ||||
| There is a browser-friendly version of this documentation at | ||||
| [postgres-operator.readthedocs.io](https://postgres-operator.readthedocs.io) | ||||
| 
 | ||||
| * [concepts](docs/index.md) | ||||
| * [user documentation](docs/user.md) | ||||
|  | @ -51,26 +36,16 @@ The Postgres Operator made it to the [Google Summer of Code 2019](https://summer | |||
| * [cluster manifest reference](docs/reference/cluster_manifest.md) | ||||
| * [command-line options and environment variables](docs/reference/command_line_and_environment.md) | ||||
| 
 | ||||
| The rest of this document is a tutorial to get you up and running locally with the operator on Minikube. | ||||
| # Google Summer of Code | ||||
| 
 | ||||
| ## Overview of involved entities | ||||
| The Postgres Operator made it to the [Google Summer of Code 2019](https://summerofcode.withgoogle.com/)! | ||||
| As a brand new mentoring organization, we are now looking for our first mentees. | ||||
| Check [our ideas](https://github.com/zalando/postgres-operator/blob/master/docs/gsoc-2019/ideas.md#google-summer-of-code-2019) | ||||
| and start discussion in [the issue tracker](https://github.com/zalando/postgres-operator/issues). | ||||
| And don't forget to spread a word about our GSoC participation to attract even | ||||
| more students. | ||||
| 
 | ||||
| Here is a diagram, that summarizes what would be created by the operator, when a | ||||
| new Postgres cluster CRD is submitted: | ||||
| 
 | ||||
|  | ||||
| 
 | ||||
| This picture is not complete without an overview of what is inside a single cluster pod, so | ||||
| let's zoom in: | ||||
| 
 | ||||
|  | ||||
| 
 | ||||
| These two diagrams should help you to understand the basics of what kind of | ||||
| functionality the operator provides. | ||||
| 
 | ||||
| There is a browser-friendly version of this documentation at [postgres-operator.readthedocs.io](https://postgres-operator.readthedocs.io) | ||||
| 
 | ||||
| ## Community       | ||||
| # Community       | ||||
| 
 | ||||
| There are two places to get in touch with the community: | ||||
| 1. The [GitHub issue tracker](https://github.com/zalando/postgres-operator/issues) | ||||
|  |  | |||
|  | @ -1,4 +1,7 @@ | |||
| # How to configure PostgreSQL operator | ||||
| # Administrator Guide | ||||
| 
 | ||||
| Learn how to configure and manage the Postgres Operator in your Kubernetes | ||||
| environment. | ||||
| 
 | ||||
| ## Select the namespace to deploy to | ||||
| 
 | ||||
|  | @ -120,13 +123,17 @@ data: | |||
| ``` | ||||
| 
 | ||||
| Note that the Kubernetes version 1.13 brings [taint-based eviction](https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/#taint-based-evictions) to the beta stage and enables it by default. | ||||
| Postgres pods by default receive tolerations for `unreachable` and `noExecute` taints with the timeout of `5m`. | ||||
| Depending on your setup, you may want to adjust these parameters to prevent master pods from being evicted by the Kubernetes runtime. | ||||
| To prevent eviction completely, specify the toleration by leaving out the `tolerationSeconds` value (similar to how Kubernetes' own DaemonSets are configured) | ||||
| Postgres pods by default receive tolerations for `unreachable` and `noExecute` | ||||
| taints with the timeout of `5m`. Depending on your setup, you may want to adjust | ||||
| these parameters to prevent master pods from being evicted by the Kubernetes | ||||
| runtime. To prevent eviction completely, specify the toleration by leaving out | ||||
| the `tolerationSeconds` value (similar to how Kubernetes' own DaemonSets are | ||||
| configured) | ||||
| 
 | ||||
| ### Enable pod anti affinity | ||||
| 
 | ||||
| To ensure Postgres pods are running on different topologies, you can use [pod anti affinity](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/) | ||||
| To ensure Postgres pods are running on different topologies, you can use | ||||
| [pod anti affinity](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/) | ||||
| and configure the required topology in the operator ConfigMap. | ||||
| 
 | ||||
| Enable pod anti affinity by adding following line to the operator ConfigMap: | ||||
|  | @ -140,9 +147,10 @@ data: | |||
|   enable_pod_antiaffinity: "true" | ||||
| ``` | ||||
| 
 | ||||
| By default the topology key for the pod anti affinity is set to `kubernetes.io/hostname`, | ||||
| you can set another topology key e.g. `failure-domain.beta.kubernetes.io/zone` by adding following line | ||||
| to the operator ConfigMap, see [built-in node labels](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#interlude-built-in-node-labels) for available topology keys: | ||||
| By default the topology key for the pod anti affinity is set to | ||||
| `kubernetes.io/hostname`, you can set another topology key e.g. | ||||
| `failure-domain.beta.kubernetes.io/zone` by adding following line to the | ||||
| operator ConfigMap, see [built-in node labels](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#interlude-built-in-node-labels) for available topology keys: | ||||
| 
 | ||||
| ```yaml | ||||
| apiVersion: v1 | ||||
|  | @ -157,9 +165,9 @@ data: | |||
| ### Add cluster-specific labels | ||||
| 
 | ||||
| In some cases, you might want to add `labels` that are specific to a given | ||||
| postgres cluster, in order to identify its child objects. | ||||
| The typical use case is to add labels that identifies the `Pods` created by the | ||||
| operator, in order to implement fine-controlled `NetworkPolicies`. | ||||
| postgres cluster, in order to identify its child objects. The typical use case | ||||
| is to add labels that identifies the `Pods` created by the operator, in order | ||||
| to implement fine-controlled `NetworkPolicies`. | ||||
| 
 | ||||
| **OperatorConfiguration** | ||||
| 
 | ||||
|  | @ -292,28 +300,62 @@ report success as a result of the last operation applied to them. | |||
| The operator is capable of maintaining roles of multiple kinds within a | ||||
| Postgres database cluster: | ||||
| 
 | ||||
| * **System roles** are roles necessary for the proper work of Postgres itself such as a replication role or the initial superuser role. The operator delegates creating such roles to Patroni and only establishes relevant secrets. | ||||
| * **System roles** are roles necessary for the proper work of Postgres itself | ||||
| such as a replication role or the initial superuser role. The operator delegates | ||||
| creating such roles to Patroni and only establishes relevant secrets. | ||||
| 
 | ||||
| * **Infrastructure roles** are roles for processes originating from external systems, e.g. monitoring robots. The operator creates such roles in all Postgres clusters it manages assuming that Kubernetes secrets with the relevant credentials exist beforehand. | ||||
| * **Infrastructure roles** are roles for processes originating from external | ||||
| systems, e.g. monitoring robots. The operator creates such roles in all Postgres | ||||
| clusters it manages assuming that Kubernetes secrets with the relevant | ||||
| credentials exist beforehand. | ||||
| 
 | ||||
| * **Per-cluster robot users** are also roles for processes originating from external systems but defined for an individual Postgres cluster in its manifest. A typical example is a role for connections from an application that uses the database. | ||||
| * **Per-cluster robot users** are also roles for processes originating from | ||||
| external systems but defined for an individual Postgres cluster in its manifest. | ||||
| A typical example is a role for connections from an application that uses the | ||||
| database. | ||||
| 
 | ||||
| * **Human users** originate from the Teams API that returns a list of the team members given a team id. The operator differentiates between (a) product teams that own a particular Postgres cluster and are granted admin rights to maintain it, and (b) Postgres superuser teams that get the superuser access to all Postgres databases running in a Kubernetes cluster for the purposes of maintaining and troubleshooting. | ||||
| * **Human users** originate from the Teams API that returns a list of the team | ||||
| members given a team id. The operator differentiates between (a) product teams | ||||
| that own a particular Postgres cluster and are granted admin rights to maintain | ||||
| it, and (b) Postgres superuser teams that get the superuser access to all | ||||
| Postgres databases running in a Kubernetes cluster for the purposes of | ||||
| maintaining and troubleshooting. | ||||
| 
 | ||||
| ## Understanding rolling update of Spilo pods | ||||
| 
 | ||||
| The operator logs reasons for a rolling update with the `info` level and a diff between the old and new StatefulSet specs with the `debug` level. To benefit from numerous escape characters in the latter log entry, view it in CLI with `echo -e`. Note that the resultant message will contain some noise because the `PodTemplate` used by the operator is yet to be updated with the default values used internally in Kubernetes. | ||||
| The operator logs reasons for a rolling update with the `info` level and a diff | ||||
| between the old and new StatefulSet specs with the `debug` level. To benefit | ||||
| from numerous escape characters in the latter log entry, view it in CLI with | ||||
| `echo -e`. Note that the resultant message will contain some noise because the | ||||
| `PodTemplate` used by the operator is yet to be updated with the default values | ||||
| used internally in Kubernetes. | ||||
| 
 | ||||
| ## Logical backups | ||||
| 
 | ||||
| The operator can manage k8s cron jobs to run logical backups of Postgres clusters. The cron job periodically spawns a batch job that runs a single pod. The backup script within this pod's container can connect to a DB for a logical backup. The operator updates cron jobs during Sync if the job schedule changes; the job name acts as the job identifier. These jobs are to be enabled for each indvidual Postgres cluster by setting `enableLogicalBackup: true` in its manifest. Notes: | ||||
| The operator can manage k8s cron jobs to run logical backups of Postgres | ||||
| clusters. The cron job periodically spawns a batch job that runs a single pod. | ||||
| The backup script within this pod's container can connect to a DB for a logical | ||||
| backup. The operator updates cron jobs during Sync if the job schedule changes; | ||||
| the job name acts as the job identifier. These jobs are to be enabled for each | ||||
| individual Postgres cluster by setting `enableLogicalBackup: true` in its | ||||
| manifest. Notes: | ||||
| 
 | ||||
| 1. The [example image](../docker/logical-backup/Dockerfile) implements the backup via `pg_dumpall` and upload of compressed and encrypted results to an S3 bucket; the default image ``registry.opensource.zalan.do/acid/logical-backup`` is the same image built with the Zalando-internal CI pipeline. `pg_dumpall` requires a `superuser` access to a DB and runs on the replica when possible.   | ||||
| 1. The [example image](../docker/logical-backup/Dockerfile) implements the | ||||
| backup via `pg_dumpall` and upload of compressed and encrypted results to an S3 | ||||
| bucket; the default image ``registry.opensource.zalan.do/acid/logical-backup`` | ||||
| is the same image built with the Zalando-internal CI pipeline. `pg_dumpall` | ||||
| requires a `superuser` access to a DB and runs on the replica when possible.   | ||||
| 
 | ||||
| 2. Due to the [limitation of Kubernetes cron jobs](https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#cron-job-limitations) it is highly advisable to set up additional monitoring for this feature; such monitoring is outside of the scope of operator responsibilities. | ||||
| 2. Due to the [limitation of Kubernetes cron jobs](https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#cron-job-limitations) | ||||
| it is highly advisable to set up additional monitoring for this feature; such | ||||
| monitoring is outside of the scope of operator responsibilities. | ||||
| 
 | ||||
| 3. The operator does not remove old backups. | ||||
| 
 | ||||
| 4. You may use your own image by overwriting the relevant field in the operator configuration. Any such image must ensure the logical backup is able to finish [in presence of pod restarts](https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/#handling-pod-and-container-failures) and [simultaneous invocations](https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#cron-job-limitations) of the backup cron job. | ||||
| 4. You may use your own image by overwriting the relevant field in the operator | ||||
| configuration. Any such image must ensure the logical backup is able to finish | ||||
| [in presence of pod restarts](https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/#handling-pod-and-container-failures) and [simultaneous invocations](https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#cron-job-limitations) of the backup cron job. | ||||
| 
 | ||||
| 5. For that feature to work, your RBAC policy must enable operations on the `cronjobs` resource from the `batch` API group for the operator service account. See [example RBAC](../manifests/operator-service-account-rbac.yaml) | ||||
| 5. For that feature to work, your RBAC policy must enable operations on the | ||||
| `cronjobs` resource from the `batch` API group for the operator service account. | ||||
| See [example RBAC](../manifests/operator-service-account-rbac.yaml) | ||||
|  |  | |||
|  | @ -20,6 +20,10 @@ manages PostgreSQL clusters on Kubernetes: | |||
| 3. Finally, the operator periodically synchronizes the actual state of each | ||||
|    Postgres cluster with the desired state defined in the cluster's manifest. | ||||
| 
 | ||||
| 4. The operator aims to be hands free and configuration happens only via | ||||
|    manifests and its own config. This enables easy integration in automated | ||||
|    deploy pipelines with no access to Kubernetes directly. | ||||
| 
 | ||||
| ## Concepts | ||||
| 
 | ||||
| ### Scope | ||||
|  | @ -37,6 +41,22 @@ experience. | |||
| Monitoring of clusters is not in scope, for this good tools already exist from | ||||
| ZMON to Prometheus and more Postgres specific options. | ||||
| 
 | ||||
| ## Overview of involved entities | ||||
| 
 | ||||
| Here is a diagram, that summarizes what would be created by the operator, when a | ||||
| new Postgres cluster CRD is submitted: | ||||
| 
 | ||||
|  | ||||
| 
 | ||||
| This picture is not complete without an overview of what is inside a single | ||||
| cluster pod, so let's zoom in: | ||||
| 
 | ||||
|  | ||||
| 
 | ||||
| These two diagrams should help you to understand the basics of what kind of | ||||
| functionality the operator provides. | ||||
| 
 | ||||
| 
 | ||||
| ### Status | ||||
| 
 | ||||
| This project is currently in active development. It is however already | ||||
|  |  | |||
							
								
								
									
										59
									
								
								docs/user.md
								
								
								
								
							
							
						
						
									
										59
									
								
								docs/user.md
								
								
								
								
							|  | @ -1,12 +1,11 @@ | |||
| # User Guide | ||||
| 
 | ||||
| Learn how to work with the Postgres Operator in a production Kubernetes | ||||
| environment. | ||||
| Learn how to work with the Postgres Operator in a Kubernetes environment. | ||||
| 
 | ||||
| ## Create a manifest for a new PostgreSQL cluster | ||||
| 
 | ||||
| As an example you can take this | ||||
| [minimal example](https://github.com/zalando/postgres-operator/blob/master/manifests/minimal-postgres-manifest.yaml): | ||||
| Make sure you have [set up](quickstart.md) the operator. Then you can create a | ||||
| new Postgres cluster by applying manifest like this [minimal example](https://github.com/zalando/postgres-operator/blob/master/manifests/minimal-postgres-manifest.yaml): | ||||
| 
 | ||||
| ```yaml | ||||
| apiVersion: "acid.zalan.do/v1" | ||||
|  | @ -34,7 +33,8 @@ spec: | |||
|     version: "10" | ||||
| ``` | ||||
| 
 | ||||
| ## Create a new Spilo cluster | ||||
| If you have clone the Postgres Operator [repository](https://github.com/zalando/postgres-operator) | ||||
| you can find this example also in the manifests folder: | ||||
| 
 | ||||
| ```bash | ||||
| $ kubectl create -f manifests/minimal-postgres-manifest.yaml | ||||
|  | @ -52,8 +52,8 @@ $ kubectl get pods -w --show-labels | |||
| $ kubectl create -f manifests/user-facing-clusterroles.yaml | ||||
| ``` | ||||
| 
 | ||||
| Creates zalando-postgres-operator:users:view, :edit and :admin clusterroles that are | ||||
| aggregated into the default roles. | ||||
| Creates zalando-postgres-operator:users:view, :edit and :admin clusterroles that | ||||
| are aggregated into the default roles. | ||||
| 
 | ||||
| ## Connect to PostgreSQL | ||||
| 
 | ||||
|  | @ -83,11 +83,13 @@ $ psql -U postgres -p 6432 | |||
| Postgres Operator allows defining roles to be created in the resulting database | ||||
| cluster. It covers three use-cases: | ||||
| 
 | ||||
| * `manifest roles`: create application roles specific to the cluster described in the manifest. | ||||
| * `infrastructure roles`: create application roles that should be automatically created on every | ||||
| * `manifest roles`: create application roles specific to the cluster described | ||||
| in the manifest. | ||||
| * `infrastructure roles`: create application roles that should be automatically | ||||
| created on every | ||||
|   cluster managed by the operator. | ||||
| * `teams API roles`: automatically create users for every member of the team owning the database | ||||
|   cluster. | ||||
| * `teams API roles`: automatically create users for every member of the team | ||||
| owning the database cluster. | ||||
| 
 | ||||
| In the next sections, we will cover those use cases in more details. | ||||
| 
 | ||||
|  | @ -99,8 +101,11 @@ for an example of `zalando` role, defined with `superuser` and `createdb` | |||
| flags. | ||||
| 
 | ||||
| Manifest roles are defined as a dictionary, with a role name as a key and a | ||||
| list of role options as a value. For a role without any options it is best to supply the empty | ||||
| list `[]`. It is also possible to leave this field empty as in our example manifests, but in certain cases such empty field may removed by Kubernetes [due to the `null` value it gets](https://kubernetes.io/docs/concepts/overview/object-management-kubectl/declarative-config/#how-apply-calculates-differences-and-merges-changes) (`foobar_user:` is equivalent to `foobar_user: null`). | ||||
| list of role options as a value. For a role without any options it is best to | ||||
| supply the empty list `[]`. It is also possible to leave this field empty as in | ||||
| our example manifests, but in certain cases such empty field may removed by | ||||
| Kubernetes [due to the `null` value it gets](https://kubernetes.io/docs/concepts/overview/object-management-kubectl/declarative-config/#how-apply-calculates-differences-and-merges-changes) | ||||
| (`foobar_user:` is equivalent to `foobar_user: null`). | ||||
| 
 | ||||
| The operator accepts the following options:  `superuser`, `inherit`, `login`, | ||||
| `nologin`, `createrole`, `createdb`, `replication`, `bypassrls`. | ||||
|  | @ -268,7 +273,8 @@ metadata: | |||
| Note that timezone is required for `timestamp`. Otherwise, offset is relative | ||||
| to UTC, see [RFC 3339 section 5.6) 3339 section 5.6](https://www.ietf.org/rfc/rfc3339.txt). | ||||
| 
 | ||||
| For non AWS S3 following settings can be set to support cloning from other S3 implementations: | ||||
| For non AWS S3 following settings can be set to support cloning from other S3 | ||||
| implementations: | ||||
| 
 | ||||
| ```yaml | ||||
| apiVersion: "acid.zalan.do/v1" | ||||
|  | @ -288,8 +294,9 @@ spec: | |||
| 
 | ||||
| ## Sidecar Support | ||||
| 
 | ||||
| Each cluster can specify arbitrary sidecars to run. These containers could be used for | ||||
| log aggregation, monitoring, backups or other tasks. A sidecar can be specified like this: | ||||
| Each cluster can specify arbitrary sidecars to run. These containers could be | ||||
| used for log aggregation, monitoring, backups or other tasks. A sidecar can be | ||||
| specified like this: | ||||
| 
 | ||||
| ```yaml | ||||
| apiVersion: "acid.zalan.do/v1" | ||||
|  | @ -314,21 +321,22 @@ spec: | |||
|           value: "any-k8s-env-things" | ||||
| ``` | ||||
| 
 | ||||
| In addition to any environment variables you specify, the following environment variables | ||||
| are always passed to sidecars: | ||||
| In addition to any environment variables you specify, the following environment | ||||
| variables are always passed to sidecars: | ||||
| 
 | ||||
|   - `POD_NAME` - field reference to `metadata.name` | ||||
|   - `POD_NAMESPACE` - field reference to `metadata.namespace` | ||||
|   - `POSTGRES_USER` - the superuser that can be used to connect to the database | ||||
|   - `POSTGRES_PASSWORD` - the password for the superuser | ||||
| 
 | ||||
| The PostgreSQL volume is shared with sidecars and is mounted at `/home/postgres/pgdata`. | ||||
| The PostgreSQL volume is shared with sidecars and is mounted at | ||||
| `/home/postgres/pgdata`. | ||||
| 
 | ||||
| 
 | ||||
| ## InitContainers Support | ||||
| 
 | ||||
| Each cluster can specify arbitrary init containers to run. These containers can be | ||||
| used to run custom actions before any normal and sidecar containers start. | ||||
| Each cluster can specify arbitrary init containers to run. These containers can | ||||
| be used to run custom actions before any normal and sidecar containers start. | ||||
| An init container can be specified like this: | ||||
| 
 | ||||
| ```yaml | ||||
|  | @ -393,4 +401,11 @@ If you add | |||
| ``` | ||||
|   enableLogicalBackup: true | ||||
| ``` | ||||
| to the cluster manifest, the operator will create and sync a k8s cron job to do periodic logical backups of this particular Postgres cluster. Due to the [limitation of Kubernetes cron jobs](https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#cron-job-limitations) it is highly advisable to set up additional monitoring for this feature; such monitoring is outside of the scope of operator responsibilities. See [configuration reference](reference/cluster_manifest.md) and [administrator documentation](administrator.md) for details on how backups are executed. | ||||
| to the cluster manifest, the operator will create and sync a k8s cron job to do | ||||
| periodic logical backups of this particular Postgres cluster. Due to the | ||||
| [limitation of Kubernetes cron jobs](https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#cron-job-limitations) | ||||
| it is highly advisable to set up additional monitoring for this feature; such | ||||
| monitoring is outside of the scope of operator responsibilities. See | ||||
| [configuration reference](reference/cluster_manifest.md) and | ||||
| [administrator documentation](administrator.md) for details on how backups are | ||||
| executed. | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue