KubeBlocks
BlogsKubeBlocks Cloud
⌘K
​
Overview
Quickstart

Operations

Lifecycle Management
Vertical Scaling
Horizontal Scaling
Volume Expansion
Manage PostgreSQL Services
Minor Version Upgrade
Modify PostgreSQL Parameters
PostgreSQL Switchover
Decommission PostgreSQL Replica
Recovering PostgreSQL Replica

Backup And Restores

Create BackupRepo
Create Full Backup
Scheduled Backups
Scheduled Continuous Backup
Restore PostgreSQL Cluster
Restore with PITR

Custom Secret

Custom Password
Custom Password Policy

TLS

PostgreSQL Cluster with TLS
PostgreSQL Cluster with Custom TLS

Monitoring

Observability for PostgreSQL Clusters
FAQs

tpl

  1. Prerequisites
  2. Deploy a PostgreSQL Cluster
  3. Verifying the Deployment
  4. View Network Services
  5. Expose PostgreSQL Service
    1. Service Types Comparison
    2. Verify the Exposed Service
    3. Wait for DNS Propagation
  6. Connect to PostgreSQL Externally
    1. Retrieve Credentials
    2. Connect Using PostgreSQL Client
  7. Disable External Exposure
    1. Verify Service Removal
  8. Expose PgBouncer Service
  9. Cleanup
  10. Summary

Manage PostgreSQL Services Using the Declarative Cluster API in KubeBlocks

This guide provides step-by-step instructions for exposing PostgreSQL services managed by KubeBlocks, both externally and internally. You'll learn to configure external access using cloud provider LoadBalancer services, manage internal services, and properly disable external exposure when no longer needed.

Prerequisites

    Before proceeding, ensure the following:

    • Environment Setup:
      • A Kubernetes cluster is up and running.
      • The kubectl CLI tool is configured to communicate with your cluster.
      • KubeBlocks CLI and KubeBlocks Operator are installed. Follow the installation instructions here.
    • Namespace Preparation: To keep resources isolated, create a dedicated namespace for this tutorial:
    kubectl create ns demo namespace/demo created

    Deploy a PostgreSQL Cluster

      KubeBlocks uses a declarative approach for managing PostgreSQL clusters. Below is an example configuration for deploying a PostgreSQL cluster with 2 replicas (1 primary, 1 replicas).

      Apply the following YAML configuration to deploy the cluster:

      apiVersion: apps.kubeblocks.io/v1 kind: Cluster metadata: name: pg-cluster namespace: demo spec: terminationPolicy: Delete clusterDef: postgresql topology: replication componentSpecs: - name: postgresql serviceVersion: 16.4.0 disableExporter: true replicas: 2 resources: limits: cpu: "0.5" memory: "0.5Gi" requests: cpu: "0.5" memory: "0.5Gi" volumeClaimTemplates: - name: data spec: accessModes: - ReadWriteOnce resources: requests: storage: 20Gi

      Verifying the Deployment

        Monitor the cluster status until it transitions to the Running state:

        kubectl get cluster pg-cluster -n demo -w

        Expected Output:

        NAME CLUSTER-DEFINITION TERMINATION-POLICY STATUS AGE pg-cluster postgresql Delete Creating 50s pg-cluster postgresql Delete Running 4m2s

        Once the cluster status becomes Running, your PostgreSQL cluster is ready for use.

        TIP

        If you are creating the cluster for the very first time, it may take some time to pull images before running.

        View Network Services

        List the Services created for the PostgreSQL cluster:

        kubectl get service -l app.kubernetes.io/instance=pg-cluster -n demo

        Example Services:

        NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE pg-cluster-postgresql-postgresql ClusterIP 10.96.19.237 <none> 5432/TCP,6432/TCP 157m
        NOTE

        There are two ports here 5432 and 6432, where 5432 is for postgresql and 6432 for PgBouncer.

        Expose PostgreSQL Service

        External service addresses enable public internet access to PostgreSQL, while internal service addresses restrict access to the user's VPC.

        Service Types Comparison

        TypeUse CaseCloud CostSecurity
        ClusterIPInternal service communicationFreeHighest
        NodePortDevelopment/testingLowModerate
        LoadBalancerProduction external accessHighManaged via security groups

        Option 1: Using OpsRequest

        To expose the PostgreSQL service externally using a LoadBalancer, create an OpsRequest resource:

        apiVersion: operations.kubeblocks.io/v1alpha1 kind: OpsRequest metadata: name: pg-cluster-expose-enable-ops namespace: demo spec: type: Expose clusterName: pg-cluster expose: - componentName: postgresql services: - name: internet # Determines how the Service is exposed. Defaults to 'ClusterIP'. # Valid options are 'ClusterIP', 'NodePort', and 'LoadBalancer'. serviceType: LoadBalancer # Contains cloud provider related parameters if ServiceType is LoadBalancer. # Following is an example for AWS EKS annotations: service.beta.kubernetes.io/aws-load-balancer-type: nlb service.beta.kubernetes.io/aws-load-balancer-internal: "false" # or "true" for an internal VPC IP # Specifies a role to target with the service. # If specified, the service will only be exposed to pods with the matching # role. roleSelector: primary switch: Enable

        Wait for the OpsRequest to complete:

        kubectl get ops pg-cluster-expose-enable-ops -n demo

        Example Output:

        NAME TYPE CLUSTER STATUS PROGRESS AGE pg-cluster-expose-enable-ops Expose pg-cluster Succeed 1/1 31s

        Option 2: Using Cluster API

        Alternatively, update the spec.services section in the Cluster resource to include a LoadBalancer service:

        apiVersion: apps.kubeblocks.io/v1 kind: Cluster metadata: name: pg-cluster namespace: demo spec: terminationPolicy: Delete clusterDef: postgresql topology: replication # expose a external service services: - annotations: service.beta.kubernetes.io/aws-load-balancer-type: nlb # Use Network Load Balancer service.beta.kubernetes.io/aws-load-balancer-internal: "false" # or "true" for an internal VPC IP componentSelector: postgresql name: postgresql-internet serviceName: postgresql-internet roleSelector: primary spec: ipFamilyPolicy: PreferDualStack ports: - name: tcp-postgresql port: 5432 protocol: TCP targetPort: tcp-postgresql type: LoadBalancer componentSpecs: - name: postgresql serviceVersion: 16.4.0 disableExporter: true replicas: 2 resources: limits: cpu: "0.5" memory: "0.5Gi" requests: cpu: "0.5" memory: "0.5Gi" volumeClaimTemplates: - name: data spec: accessModes: - ReadWriteOnce resources: requests: storage: 20Gi

        The YAML configuration above adds a new external service under the services section. This LoadBalancer service includes annotations for AWS Network Load Balancer (NLB).

        NOTE

        Cloud Provider Annotations

        When using a LoadBalancer service, you must include the appropriate annotations specific to your cloud provider. Below is a list of commonly used annotations for different cloud providers:

        • AWS
        service.beta.kubernetes.io/aws-load-balancer-type: nlb # Use Network Load Balancer service.beta.kubernetes.io/aws-load-balancer-internal: "true" # Use "false" for internet-facing LoadBalancer
        • Azure
        service.beta.kubernetes.io/azure-load-balancer-internal: "true" # Use "false" for internet-facing LoadBalancer
        • GCP
        networking.gke.io/load-balancer-type: "Internal" # Restricts the LoadBalancer to internal VPC access only. Defaults to internet-facing if not specified. cloud.google.com/l4-rbs: "enabled" # Optimization for internet-facing LoadBalancer
        • Alibaba Cloud
        service.beta.kubernetes.io/alibaba-cloud-loadbalancer-address-type: "internet" # Use "intranet" for internal-facing LoadBalancer
        NOTE

        The service.beta.kubernetes.io/aws-load-balancer-internal annotation controls whether the LoadBalancer is internal or internet-facing. Note that this annotation cannot be modified dynamically after service creation.

        service.beta.kubernetes.io/aws-load-balancer-internal: "false" # Use "true" for internal VPC IPs

        If you change this annotation from "false" to "true" after the Service is created, the annotation may update in the Service object, but the LoadBalancer will still retain its public IP.

        To properly modify this behavior:

        • First, delete the existing LoadBalancer service.
        • Recreate the service with the updated annotation (service.beta.kubernetes.io/aws-load-balancer-internal: "true").
        • Wait for the new LoadBalancer to be provisioned with the correct internal or external IP.

        Wait for the Cluster status to transition to Running using the following command:

        kubectl get cluster pg-cluster -n demo -w
        NAME         CLUSTER-DEFINITION   TERMINATION-POLICY   STATUS    AGE
        pg-cluster   postgresql           Delete               Running   18m
        

        Verify the Exposed Service

        Check the service details to confirm the LoadBalancer service is created:

        kubectl get service -l app.kubernetes.io/instance=pg-cluster -n demo

        Example Output:

        NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE pg-cluster-postgresql-postgresql ClusterIP 10.96.19.237 <none> 5432/TCP,6432/TCP 33m pg-cluster-postgresql-internet LoadBalancer 172.20.60.24 <EXTERNAL-IP> 5432:31243/TCP 1m

        Wait for DNS Propagation

        The LoadBalancer DNS name may take 2-5 minutes to become resolvable. Verify the resolution status:

        nslookup <EXTERNAL-IP> # replace <EXTERNAL-IP> with the real IP from previous output.

        Connect to PostgreSQL Externally

        Retrieve Credentials

        KubeBlocks automatically creates a Secret containing the PostgreSQL postgres credentials. Retrieve the PostgreSQL postgres credentials:

        NAME=`kubectl get secrets -n demo pg-cluster-postgresql-account-postgres -o jsonpath='{.data.username}' | base64 -d` PASSWD=`kubectl get secrets -n demo pg-cluster-postgresql-account-postgres -o jsonpath='{.data.password}' | base64 -d`

        Connect Using PostgreSQL Client

        You can now connect to the PostgreSQL database externally (e.g., from your laptop or EC2):

        psql -h <EXTERNAL_IP> -U${NAME} -W

        Disable External Exposure

        Option 1: Using OpsRequest

        To disable external access, create an OpsRequest:

        apiVersion: operations.kubeblocks.io/v1alpha1 kind: OpsRequest metadata: name: pg-cluster-expose-disable-ops namespace: demo spec: clusterName: pg-cluster expose: - componentName: postgresql services: - name: internet roleSelector: primary serviceType: LoadBalancer switch: Disable preConditionDeadlineSeconds: 0 type: Expose

        Wait for the OpsRequest to complete:

        kubectl get ops pg-cluster-expose-disable-ops -n demo

        Example Output:

        NAME TYPE CLUSTER STATUS PROGRESS AGE pg-cluster-expose-disable-ops Expose pg-cluster Succeed 1/1 12s

        Option 2: Using Cluster API

        Alternatively, remove the spec.services field from the Cluster resource:

        kubectl patch cluster pg-cluster -n demo --type=json -p='[ { "op": "remove", "path": "/spec/services" } ]'

        Monitor the cluster status until it is Running:

        kubectl get cluster pg-cluster -n demo -w
        NAME         CLUSTER-DEFINITION   TERMINATION-POLICY   STATUS    AGE
        pg-cluster   postgresql           Delete               Running   23m
        

        Verify Service Removal

        Ensure that the 'pg-cluster-postgresql-internet' Service is removed:

        kubectl get service -n demo

        Expected Result: The 'pg-cluster-postgresql-internet' Service should be removed.

        Expose PgBouncer Service

        PostgreSQL uses a multi-process architecture that creates a separate backend process for each connection. Excessive connections consume significant memory, reducing database throughput and stability. KubeBlocks addresses this with PgBouncer, a connection pool for PostgreSQL clusters.

        To expose PgBouncer Service, just update ports information with that of pgbouncer as following:

        apiVersion: apps.kubeblocks.io/v1 kind: Cluster spec: services: - annotations: service.beta.kubernetes.io/aws-load-balancer-type: nlb service.beta.kubernetes.io/aws-load-balancer-internal: "false" componentSelector: postgresql name: postgresql-internet serviceName: postgresql-internet roleSelector: primary spec: ipFamilyPolicy: PreferDualStack ports: - name: tcp-pgbouncer port: 6432 protocol: TCP targetPort: tcp-pgbouncer type: LoadBalancer componentSpecs: - name: postgresql ...

        Cleanup

        To remove all created resources, delete the PostgreSQL cluster along with its namespace:

        kubectl delete cluster pg-cluster -n demo kubectl delete ns demo

        Summary

        This guide demonstrated how to:

        • Expose a PostgreSQL service externally or internally using KubeBlocks.
        • Configure LoadBalancer services with cloud provider-specific annotations.
        • Manage external access by enabling or disabling services via OpsRequest or direct updates to the Cluster API.

        KubeBlocks provides flexibility and simplicity for managing MySQL services in Kubernetes environments. simplicity for managing PostgreSQL services in Kubernetes environments.

        © 2025 ApeCloud PTE. Ltd.