How to Run HA PostgreSQL on IBM Cloud Private

This post is part of our ongoing series on running PostgreSQL on Kubernetes.  We’ve published a number of articles about running PostgreSQL on Kubernetes for specific platforms and for specific use cases.  If you are looking for a specific Kubernetes platform, check out these related articles.

Running HA PostgreSQL on Amazon Elastic Container Service for Kubernetes (EKS)

Running HA PostgreSQL on Google Kubernetes Engine (GKE)

Running HA PostgreSQL on Azure Kubernetes Service (AKS)

Running HA PostgreSQL on Red Hat OpenShift

Running HA PostgreSQL on IBM Cloud Kubernetes Service (IKS)

Running HA PostgreSQL with Rancher Kubernetes Engine (RKE)

And now, onto the post…
 
IBM Cloud Private is an application platform for developing and managing on-premises, containerized applications. It is an integrated environment for managing containers that includes the container orchestrator Kubernetes, a private image registry, a management console, and monitoring frameworks.
 
Portworx is a cloud native storage platform to run persistent workloads deployed on a variety of orchestration engines including Kubernetes. With Portworx, customers can manage the database of their choice on any infrastructure using any container scheduler. It provides a single data management layer for all stateful services, no matter where they run.
 

This tutorial is a walk-through of the steps involved in deploying and managing a highly available PostgreSQL database on an IBM Cloud Private Cluster (ICP).

  1. Setup and configure ICP environment
  2. Install a cloud native storage solution like Portworx as a DaemonSet on Kubernetes
  3. Create a storage class defining your storage requirements like replication factor, snapshot policy, and performance profile
  4. Deploy PgSQL using Kubernetes
  5. Test failover by killing or cordoning nodes in your cluster
  6. Perform storage operations such as expanding volumes
  7. Backup volumes and restore them through snapshots

 

How to install IBM Cloud Private

IBM Cloud Private facilitates the development of applications in a shared, multitenant environment and supports both Linux x86_64 on x86 and Linux on Power (ppc64le) architectures. This deployment is based on ICP running in x86 architecture. For a detailed walkthrough of setting up ICP, refer to the official IBM documentation.
 
By the end of this step, you should have a Kubernetes cluster with one master and three worker nodes.
 
$ kubectl get nodes
 

Installing Portworx in Kubernetes

Installing Portworx on ICP is not different from installing it on a Kubernetes cluster setup through Kops. Portworx documentation has the steps involved in running the Portworx cluster in a Kubernetes environment.
 
Ensure that Portworx storage cluster is installed and available as a DaemonSet.
 
$ kubectl get pods -n=kube-system -l name=portworx
 

Creating a Postgres storage class

Through Storage Class objects, an admin can define different classes of Portworx volumes that are offered in a cluster. These classes will be used during the dynamic provisioning of volumes. The Storage Class defines the replication factor, IO profile (e.g. for a database or a CMS), and priority (e.g. SSD or HDD). These parameters impact the availability and throughput of workload and can be specified for each volume. This is important because a production database will have different requirements than a development Jenkins cluster.
 
In this example, the Storage Class that we deploy has a replication factor of 3 with IO profile set to “db”, and priority set to “high”. This means that the storage will be optimized for low latency database workloads like Postgres and automatically placed on the highest performance storage available in the cluster.
 

$ kubectl create -f https://raw.githubusercontent.com/fmrtl73/katacoda-scenarios-1/master/px-k8s-postgres-all-in-one/assets/px-repl3-sc.yaml
storageclass "px-repl3-sc" created

 

Creating a Postgres PVC

We can now create a Persistent Volume Claim (PVC) based on the Storage Class. Thanks to dynamic provisioning, the claims will be created without explicitly provisioning Persistent Volume (PV).
 

$ kubectl create -f https://raw.githubusercontent.com/fmrtl73/katacoda-scenarios-1/master/px-k8s-postgres-all-in-one/assets/px-postgres-pvc.yaml 
persistentvolumeclaim "px-postgres-pvc" created

 
The password for PostgreSQL will be created as a secret. Run the following commands to create the secret in the correct format.
 

$ echo postgres123 > password.txt
$ tr -d '\n' .strippedpassword.txt && mv .strippedpassword.txt password.txt
$ kubectl create secret generic postgres-pass --from-file=password.txt
secret "postgres-pass" created

 

Deploying PostgreSQL on Kubernetes

Finally, let’s create a PostgreSQL instance as a Kubernetes deployment object. For simplicity sake, we will just be deploying a single Postgres pod. Because Portworx provides synchronous replication for high availability, a single Postgres instance might be the best deployment option for your Postgres database. Portworx can also provide backing volumes for multi-node Postgres deployments. The choice is yours.
 

$ kubectl create -f https://raw.githubusercontent.com/fmrtl73/katacoda-scenarios-1/master/px-k8s-postgres-all-in-one/assets/postgres-app.yaml 
deployment "postgres" created

 
Make sure that the Postgres pods are in Running state.
 
$ kubectl get pods -l app=postgres
 
We can inspect the Portworx volume by accessing the pxctl tool running with the Postgres pod.
 

$ VOL=`kubectl get pvc | grep px-postgres-pvc | awk '{print $3}'`
$ PX_POD=$(kubectl get pods -l name=portworx -n kube-system -o jsonpath='{.items[0].metadata.name}')
$ kubectl exec -it $PX_POD -n kube-system -- /opt/pwx/bin/pxctl volume inspect ${VOL}

 
$ kubectl exec -it $PX_POD -n kube-system -- /opt/pwx/bin/pxctl volume inspect ${VOL}
 
The output from the above command confirms the creation of volumes that are backing the PostgreSQL database instance.
 

Failing over PostgreSQL

Let’s populate the database will 5 million rows of sample data.
 
We will first find the pod that’s running PostgreSQL to access the shell.
 

$ POD=`kubectl get pods -l app=postgres | grep Running | grep 1/1 | awk '{print $1}'`
$ kubectl exec -it $POD bash

 
Now that we are inside the pod, we can connect to Postgres and create a database.
 

# psql
pgbench=# create database pxdemo;
pgbench=# \l
pgbench=# \q

 
pgbench=# create database pxdemo;
 
By default, pgbench> will create 4 tables (pgbench_branches, pgbench_tellers, pgbench_accounts, and pgbench_history) with 100,000 rows in the main pgbench_accounts table. This creates a simple 16MB database.
 
The -s option is used for multiplying the number of rows entered into each table. In the command below, we enter a “scaling” option of 50. This tells pgbench to create a database with 50 times the default size.
 
What this means is our pgbench_accounts table now has 5,000,000 records. It also means our database size is now 800MB (50 x 16MB).
 

# pgbench -i -s 50 pxdemo;

 
Wait for pgbench to finish populating the table. After that’s done, let’s verify that the pgbench_accounts is populated by 5 million rows.
 

# psql pxdemo
\dt
select count(*) from pgbench_accounts;
\q
exit

 
root@postgres-556994cbd4-b6ghn:/# psql demo
 
pxdemo=# select count(*) from pgbench_accounts;
 
Now, let’s simulate the node failure by cordoning off the node on which PostgreSQL is running.
 

$ NODE=`kubectl get pods -l app=postgres -o wide | grep -v NAME | awk '{print $7}'`
$ kubectl cordon ${NODE}
node/70.0.60.174 cordoned

 
Executing kubectl get nodes confirms that scheduling is disabled for one of the nodes.
 

$ kubectl get nodes
NAME          STATUS                     ROLES    AGE   VERSION
70.0.60.171   Ready                         15d   v1.10.0+icp
70.0.60.173   Ready                         15d   v1.10.0+icp
70.0.60.174   Ready,SchedulingDisabled      15d   v1.10.0+icp

 
We will now go ahead and delete the PostgreSQL pod.
 

$ POD=`kubectl get pods -l app=postgres -o wide | grep -v NAME | awk '{print $1}'`
$ kubectl delete pod ${POD}
pod "postgres-654848f4ff-cbmsg" deleted

 
As soon is it deleted, Portworx STorage ORchestrator for Kubernetes (STORK) relocates the pod to make one of the nodes that has a replica of the data.
 
As soon as the pod is deleted, it is relocated to the node with the replicated data. STorage ORchestrator for Kubernetes (STORK), Portworx’s custom storage scheduler allows co-locating the pod on the exact node where the data is stored. It ensures that an appropriate node is selected for scheduling the pod.
 
Let’s verify this by running the below command. We will notice that a new pod has been created and scheduled in a different node.
 

$ kubectl get pods -l app=postgres
NAME                        READY   STATUS    RESTARTS   AGE
postgres-654848f4ff-5mrph   1/1     Running   0          34s

 
Let’s uncordon the node to bring it back to action.
 

$ kubectl uncordon ${NODE}
node/70.0.60.174 uncordoned

 
Finally, let’s verify that the data is still available.
 
Let’s find the pod name and exec into the container.
 

$ POD=`kubectl get pods -l app=postgres | grep Running | grep 1/1 | awk '{print $1}'`
$ kubectl exec -it $POD bash

 
Now use psql to make sure our data is still there.
 

# psql pxdemo
pxdemo=# \dt
pxdemo=# select count(*) from pgbench_accounts;
pxdemo=# \q
pxdemo=# exit

 
pxdemo=# \dt
 
Observe that the database table is still there and all the content intact!
 

Performing Storage Operations on Postgres

After testing end-to-end failover of the database, let’s perform StorageOps on our Kubernetes cluster.
 

Expanding the Volume with no downtime

 
We will now run a bigger benchmark to run out of space to show how easy it is to add space to a volume dynamically.
 
Open a shell inside the container.
 

$ POD=`kubectl get pods -l app=postgres | grep Running | awk '{print $1}'`
$ kubectl exec -it $POD bash

 
Let’s use pgbench to run a baseline transaction benchmark which will try to grow the volume to more than 1 Gib and fail.
 

$ pgbench -c 10 -j 2 -t 10000 pxdemo
$ exit

 
Expanding the Volume with no downtime
 
There may be multiple errors during the execution of the above command. The first error indicates that Pod is running out of space.
 

PANIC:  could not write to file "pg_xlog/xlogtemp.73": No space left on device

 
Since Kubernetes doesn’t support modifying the PVC after creation, we perform this operation directly on Portworx with the pxctl CLI tool.
 
Let’s get the volume name and inspect it through the pxctl tool.
 
If you have access, SSH into one of the nodes and run the following command.
 

$ VOL=`kubectl get pvc | grep px-postgres-pvc  | awk '{print $3}'`
$ PX_POD=$(kubectl get pods -l name=portworx -n kube-system -o jsonpath='{.items[0].metadata.name}')
$ kubectl exec -it $PX_POD -n kube-system -- /opt/pwx/bin/pxctl volume inspect ${VOL}

 
$ kubectl exec -it $PX_POD -n kube-system -- /opt/pwx/bin/pxctl volume inspect ${VOL}
 
Notice that the volume is within 10% of being full. Let’s expand it using the following command.
 

$ VOL=`kubectl get pvc | grep px-postgres-pvc  | awk '{print $3}'`
$ PX_POD=$(kubectl get pods -l name=portworx -n kube-system -o jsonpath='{.items[0].metadata.name}')
$ kubectl exec -it $PX_POD -n kube-system -- /opt/pwx/bin/pxctl volume update ${VOL} --size=2
Update Volume: Volume update successful for volume pvc-d8255cd1-6f3f-11e9-8bbc-000c29549a08

 
$ kubectl exec -it $PX_POD -n kube-system -- /opt/pwx/bin/pxctl volume inspect ${VOL}
 

Taking Snapshots of a volume and restoring the Database

Portworx supports creating snapshots for Kubernetes PVCs.
 
Let’s create a snapshot of the PVC we created for Postgres.
 

$ kubectl create -f https://github.com/fmrtl73/katacoda-scenarios-1/raw/master/px-k8s-postgres-all-in-one/assets/px-snap.yaml

volumesnapshot "px-postgres-snapshot" created

 
You can see all the snapshots using the below command.
 

$ kubectl get volumesnapshot,volumesnapshotdata
NAME                                                                         CREATED AT
volumesnapshot.volumesnapshot.external-storage.k8s.io/px-postgres-snapshot   15s

NAME                                                                                                                 CREATED AT
volumesnapshotdata.volumesnapshot.external-storage.k8s.io/k8s-volume-snapshot-17330d94-6f43-11e9-b550-b2b1f4a305d8   13s

 
With the snapshot in place, let’s go ahead and delete the database.
 

$ POD=`kubectl get pods -l app=postgres | grep Running | grep 1/1 | awk '{print $1}'`
$ kubectl exec -it $POD bash
$ psql
drop database pxdemo;
\l
\q
exit

 
Since snapshots are just like volumes, we can use it to start a new instance of PostgreSQL. Let’s create a new instance of PostgreSQL by restoring the snapshot data.
 

$ kubectl create -f https://raw.githubusercontent.com/fmrtl73/katacoda-scenarios-1/master/px-k8s-postgres-all-in-one/assets/px-snap-pvc.yaml 
persistentvolumeclaim "px-postgres-snap-clone" created

 
From the new PVC, we will create a PostgreSQL pod.
 

$ kubectl create -f https://raw.githubusercontent.com/fmrtl73/katacoda-scenarios-1/master/px-k8s-postgres-all-in-one/assets/postgres-app-restore.yaml 

deployment "postgres-snap" created

 
Verify that the new pod is in Running state.
 

$ kubectl get pods -l app=postgres-snap

NAME                             READY   STATUS    RESTARTS   AGE
postgres-snap-7546b5b9c4-72knw   1/1     Running   0          7s

 
Finally, let’s access the data created by the benchmark tool earlier in the walk-through.
 

$ POD=`kubectl get pods -l app=postgres-snap | grep Running | grep 1/1 | awk '{print $1}'`
$ kubectl exec -it $POD bash

$ psql pxdemo
\dt
select count(*) from pgbench_accounts;
\q
exit

 
Notice that the table is still there with the data intact. We can also push the snapshot to Amazon S3 if we want to create a Disaster Recovery backup in another Amazon region. Portworx snapshots also work with any S3 compatible object storage, so the backup can go to a different cloud or even an on-premises data center.

Janakiram MSV

Contributor | Certified Kubernetes Administrator (CKA) and Developer (CKAD)

Share Share on Facebook Tweet about this on Twitter Share on LinkedIn



Back to Blog