Secure PostgreSQL : Patroni, Etcd, Pgbackrest Included
Step by step guide for securing your PostgreSQL Database Environment
I’ve moved my blog from https://insanedba.blogspot.com to https://dincosman.com
Please update your bookmarks and follow/subscribe at the new address for all the latest updates and content. More up-to-date content of this post may be available there.
In today's world, keeping data secure is absolutely crucial. As companies depend more and more on databases to handle all sorts of sensitive information, making sure those databases are locked down tight is a top priority.
Ensuring the overall security of PostgreSQL is a multifaceted task that involves implementing various measures to protect the database from potential threats. Many measures may be taken in every layer of the database environment. I will explain some in detail and summarize others in one sentence.
Lets start with the database itself.
Secure PostgreSQL Database:
1. Authentication and Authorization : Use RBAC (role based access control), different schemas for apps, use advanced authentication methods like LDAP, Kerberos, and client certificate authentication.
2. Encryption : Utilize encryption for both data in transit and data at rest. There are some encryption options in PostgreSQL but not at file level. Securing data at rest is generally achieved through Transparent Data Encryption (TDE). TDE is available on EDB Postgres, as of May 2024, but not yet available on the community edition. Percona is also developing an open-source extension, pg_tde, for this purpose, but it still has a long way to go.
- Securing data at transit is accomplished with using SSL certificates, I will provide a quick implementation. Since my organization has its own certification authority, I do not use self-signed certificates. Please prepare your request according to your server's DNS names and also the DNS name used for the load-balancing solution (such as HAProxy, F5 etc.) that clients are using to connect your patroni cluster.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[postgres@posvt01 ~]# vi csr_details.txt | |
[ req ] | |
default_bits = 2048 | |
default_md = sha256 | |
req_extensions = v3_req | |
distinguished_name = dn | |
prompt = no | |
[ dn ] | |
C = TR | |
ST = Ankara | |
L = Cankaya | |
OU = BJKIT | |
O = BJK | |
CN = pgcluster.localdomain | |
[ v3_req ] | |
subjectAltName = @alt_names | |
[ alt_names ] | |
DNS.1 = pgcluster.localdomain | |
DNS.2 = posvt01.localdomain | |
DNS.3 = posvt02.localdomain | |
IP.1 = 192.168.60.101 | |
IP.2 = 192.168.60.102 | |
[postgres@posvt01 ~]$ openssl req -newkey rsa:2048 -sha256 -nodes -keyout keys/server.key -config csr_details.txt -out certs/server.csr | |
Generating a 2048 bit RSA private key | |
................................................................................................................++ | |
................................................................................................................++ | |
writing new private key to 'keys/server.key' | |
----- | |
#-- We delivered our request server.csr to Certification Authority. | |
#-- After certification authority signed it, put it in under /etc/ssl/postgres directory with root certificate. | |
#-- If you have also intermediate certificates between your server and root certificates. Make a bundle certificate for root containing intermediate. | |
[root@posvt01 ~]# cat intermediate.cer > /etc/ssl/postgres/root.crt | |
[root@posvt01 ~]# cat root.cer >> /etc/ssl/postgres/root.crt | |
[postgres@posvt01 ~]$ cd certs | |
[postgres@posvt01 certs]$ mv server.crt /etc/ssl/postgres/server.crt | |
[postgres@posvt01 ~]$ cd ../keys | |
[postgres@posvt01 keys]$ mv server.key /etc/ssl/postgres/server.key | |
[root@posvt01 postgres]# cd /etc/ssl/postgres | |
[root@posvt01 postgres]# ls -ls | |
total 16 | |
8 -rw-r--r-- 1 postgres postgres 4542 May 12 10:24 root.crt | |
4 -rw-r--r-- 1 postgres postgres 2384 May 12 10:24 server.crt | |
4 -rw------- 1 postgres postgres 1704 May 12 10:24 server.key | |
[postgres@posvt01 ~]$ chmod 0600 /etc/ssl/postgres/server.key | |
[postgres@posvt01 postgres]$ scp /etc/ssl/postgres/* postgres@posvt02:/etc/ssl/postgres/ | |
#-- Configure ssl related parameters | |
[postgres@s001posvt01 keys]$ patronictl -c /etc/patroni.yml edit-config | |
... | |
ssl: on | |
ssl_cert_file: /etc/ssl/postgres/server.crt | |
ssl_key_file: /etc/ssl/postgres/server.key | |
... | |
#-- Configure your pg_hba.conf to force ssl_certificate for clients, edit all your current application access rules to use hostssl | |
[postgres@s001posvt01 ~]$ vi $PGDATA/pg_hba.conf | |
... | |
local all postgres peer | |
local replication replicator trust | |
hostnossl all all 0.0.0.0/0 reject | |
hostssl replication replicator 127.0.0.1/32 scram-sha-256 | |
hostssl replication replicator 192.168.60.0/24 scram-sha-256 | |
hostssl all all 127.0.0.1/32 scram-sha-256 | |
hostssl all all 192.168.60.0/24 scram-sha-256 | |
hostssl all all 192.168.64.0/24 scram-sha-256 | |
... | |
#-- Reload config on only production server | |
postgres=# SELECT pg_reload_conf(); | |
#-- Reload config on all cluster nodes | |
[postgres@posvt01 keys]$ patronictl -c /etc/patroni.yml reload pgcluster | |
#-- Check ssl used or not | |
SQL> SELECT datname,usename, ssl, client_addr | |
FROM pg_stat_ssl | |
JOIN pg_stat_activity | |
ON pg_stat_ssl.pid = pg_stat_activity.pid; |
3. Auditing and Logging: Enable auditing (pgaudit) and logging features in PostgreSQL to monitor database activity and detect potential security breaches. This includes logging database events, such as login attempts, queries, and modifications, as well as setting up audit trails to track changes to sensitive data.
4. Parameter Hardening: PostgreSQL provides a wide range of configuration parameters that can be adjusted to enhance security. Administrators should review and adjust these parameters according to best practices and security requirements. This includes settings related to authentication, encryption, resource usage and connection settings. For example, use scram-sha-256 for password_enryption method , use a non standard port for connections different than 5432.
5. Patch Management: Keep PostgreSQL up to date with the latest security patches and updates and regularly monitor for new releases and apply patches in a timely manner to ensure the database remains secure.
6. Network Security: Secure the network infrastructure surrounding PostgreSQL database. This includes implementing firewalls, intrusion detection/prevention systems, and network segmentation to limit access to the database server and prevent unauthorized connections.
7. Backup and Disaster Recovery: Implement robust backup strategies and disaster recovery procedures to ensure data availability and integrity in the event of a security incident or system failure. I strongly advise to use pgbackrest as a backup solution.
By addressing these key aspects of PostgreSQL security, organizations can create a strong defense against potential threats and safeguard their valuable data assets. It's important to approach security as an ongoing process, regularly reviewing and updating security measures to adapt to evolving threats and vulnerabilities.
Secure Patroni:
Running a single instance of PostgreSQL may not suffice for high availability and fault tolerance requirements. Hence, organizations often opt for a clustered approach, where multiple instances of PostgreSQL are synchronized to ensure data redundancy and availability. Here comes the Patroni, a powerful tool designed to automate PostgreSQL high availability and failover management. Patroni simplifies the deployment and management of PostgreSQL clusters by orchestrating tasks such as leader election, replication, and automatic failover.
There are also some important steps should be taken to secure patroni REST APIs. Such as using non-default ports, using SSL and password authentication for unsafe RESTAPI endpoint calls, limiting access to Patroni REST APIs . Here is a short implementation provided below.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#-- Some security related parameters -- set on all postgresql servers | |
[postgres@posvt01 ~]$ vi /etc/patroni.yml | |
... | |
restapi: | |
listen: posvt01.localdomain:3308 | |
connect_address: posvt01.localdomain:3308 | |
certfile: /etc/ssl/postgres/server.crt | |
keyfile: /etc/ssl/postgres/server.key | |
cafile: /etc/ssl/postgres/root.crt | |
authentication: | |
username: patroni_admin | |
password: patroni | |
allowlist: ['192.168.60.0/24'] | |
allowlist_include_members: true | |
verify_client: required | |
... | |
ctl: | |
insecure: false | |
certfile: /etc/ssl/postgres/server.crt | |
cacert: /etc/ssl/postgres/root.crt | |
keyfile: /etc/ssl/postgres/server.key | |
... | |
# -- Example of GET rest api call | |
[postgres@posvt01 pgdata]$ curl -sv https://posvt01.localdomain:3308/master --cacert /etc/ssl/postgres/root.crt --cert /etc/ssl/postgres/server.crt --key /etc/ssl/postgres/server.key | |
# -- Add the root certificate to the trusted authorities | |
[root@posvt01 anchors]# cp /etc/ssl/postgres/root.crt /etc/pki/ca-trust/source/anchors/ | |
[root@posvt01 anchors]# update-ca-trust | |
# -- Example of POST rest api call -- requires password authentication also, otherwise HTTP/1.0 401 Unauthorized | |
[root@posvt02 ~]# curl -sv https://patroni_admin:patroni@posvt02.localdomain:3308/reload -XPOST --cacert /etc/ssl/postgres/root.crt --cert /etc/ssl/postgres/server.crt --key /etc/ssl/postgres/server.key |
Once you've configured Patroni REST APIs to utilize SSL, it's essential to also set up your load balancing solution (such as HAProxy or F5) to communicate with Patroni REST APIs securely over SSL. Below, I've included a sample configuration for your reference. To ensure proper functionality, you'll need to add the 'verify none' and 'check-ssl' attributes to your existing configuration. Note that for the 'check-ssl' attribute to work, HAProxy must be compiled with the OpenSSL library during installation. You can achieve this by executing the following command during installation: 'make TARGET=linux-glibc USE_PCRE=1 USE_OPENSSL=1 USE_ZLIB=1 USE_CRYPT_H=1 USE_LIBCRYPT=1'. If your current installation does not include OpenSSL, you'll need to reinstall HAProxy after compiling it with the 'use_openssl=1' option.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@etcd02 ~]# cat /etc/ssl/etcd/server.crt /etc/ssl/etcd/server.key >> /etc/ssl/etcd/haproxy_combined.crt | |
[root@etcd02 ~]# vi /etc/haproxy/haproxy.cfg | |
global | |
maxconn 4096 | |
defaults | |
log global | |
mode tcp | |
timeout client 30m | |
timeout connect 4s | |
timeout server 30m | |
timeout check 5s | |
listen stats | |
mode http | |
bind *:7000 | |
stats enable | |
stats uri / | |
listen primary | |
bind 192.168.60.120:3500 | |
option httpchk OPTIONS/master | |
http-check expect status 200 | |
default-server inter 3s fall 3 rise 2 on-marked-down shutdown-sessions | |
server postgresql_192.168.60.101_3531 posvt01.localdomain:3531 verify none maxconn 100 check check-ssl port 8008 crt /etc/ssl/etcd/haproxy_combined.crt ca-file /etc/ssl/etcd/root.crt | |
server postgresql_192.168.60.102_3531 posvt02.localdomain:3531 verify none maxconn 100 check check-ssl port 8008 crt /etc/ssl/etcd/haproxy_combined.crt ca-file /etc/ssl/etcd/root.crt | |
listen standby | |
bind 192.168.60.120:3501 | |
option httpchk OPTIONS/replica | |
http-check expect status 200 | |
default-server inter 3s fall 3 rise 2 on-marked-down shutdown-sessions | |
server postgresql_192.168.60.101_3531 posvt01.localdomain:3531 verify none maxconn 100 check check-ssl port 8008 crt /etc/ssl/etcd/haproxy_combined.crt ca-file /etc/ssl/etcd/root.crt | |
server postgresql_192.168.60.102_3531 posvt02.localdomain:3531 verify none maxconn 100 check check-ssl port 8008 crt /etc/ssl/etcd/haproxy_combined.crt ca-file /etc/ssl/etcd/root.crt |
Additionally, there is a notorious Authenticated Remote Code Execution (RCE) vulnerability, which allows remote attackers to execute arbitrary code by modifying the PostgreSQL configuration file through the Patroni HTTP REST API. Caution is required in dealing with this vulnerability. Considering that the local configuration section of the patroni.yml file always takes precedence over global configuration, it's important to note that OS-related parameters (restore_command, archive_command) provided below should be set in the local configuration section of the Patroni configuration against this vulnerability.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[postgres@posvt01 ~]$ vi /etc/patroni.yml | |
... | |
postgresql | |
... | |
connect_address: posvt01.localdomain:3535 | |
... | |
parameters: | |
unix_socket_directories: '/var/run/postgresql' | |
archive_command: "pgbackrest --stanza=pg-cluster1 archive-push %p" | |
restore_command: "pgbackrest --stanza=pg-cluster1 archive-get %f %p" | |
... |
Secure Etcd:
To further enhance the reliability and security of the PostgreSQL cluster, etcd is employed as a distributed key-value store. Etcd serves as the centralized configuration store for Patroni, storing critical information such as cluster state, configuration parameters, and leader election metadata. By utilizing etcd, Patroni ensures consistency and coordination across the PostgreSQL cluster, enabling seamless failover and recovery procedures.
Etcd's endpoints also should be configured with SSL and non-default ports should be used. You may configure it as follows:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@etcd01 ~]# cd /etc/ssl/ | |
[root@etcd01 ~]# mkdir etcd | |
[root@etcd01 ~]# cd etcd | |
[root@etcd01 ~]# cat csr_details.txt | |
[ req ] | |
default_bits = 2048 | |
default_md = sha256 | |
req_extensions = v3_req | |
distinguished_name = dn | |
prompt = no | |
[ dn ] | |
C = TR | |
ST = Ankara | |
L = Cankaya | |
OU = BJKIT | |
O = BJK | |
CN = etcd01.localdomain | |
[ v3_req ] | |
subjectAltName = @alt_names | |
[ alt_names ] | |
DNS.1 = etcd01.localdomain | |
DNS.2 = etcd02.localdomain | |
DNS.3 = etcd03.localdomain | |
IP.1 = 192.168.60.111 | |
IP.2 = 192.168.60.112 | |
IP.3 = 192.168.60.113 | |
[root@etcd01 ~]# openssl req -newkey rsa:2048 -sha256 -nodes -keyout /etc/ssl/etcd/server.key -config csr_details.txt -out /etc/ssl/etcd/server.csr | |
Generating a 2048 bit RSA private key | |
................................................+++ | |
...........+++ | |
writing new private key to 'server.key' | |
----- | |
#-- We delivered our request server.csr to Certifcation Authority. | |
#-- Certificate is signed by Certification Authority and returned to us as server.crt | |
# -- Root.crt is the bundle of the intermediate and root certificates | |
[root@etcd01 etcd]# mv /etc/ssl/other/intermediate.cer /etc/ssl/etcd/root.crt | |
[root@etcd01 etcd]# cat /etc/ssl/other/parentroot.crt >> /etc/ssl/etcd/root.crt | |
[root@etcd01 etcd]# ls | |
root.crt server.crt server.key | |
root@s001etcd01 etcd]# cd .. | |
[root@etcd01 ssl]# chown -R etcd:etcd etcd | |
[root@etcd01 ssl]# cd etcd | |
[root@etcd01 etcd]# ls -ls | |
total 12 | |
4 -rw-r----- 1 etcd etcd 1781 May 2 22:17 root.crt | |
4 -rw-r--r-- 1 etcd etcd 1663 May 2 22:17 server.crt | |
4 -rw-r--r-- 1 etcd etcd 1704 May 2 22:17 server.key | |
-- Configure all 3 nodes (etcd01,etcd02 and etcd03) according to the below config -- change ip and dns addresses. | |
[root@etcd01 etcd]# vi /etc/etcd.env | |
ETCD_NAME=etcd1 | |
ETCD_DATA_DIR=/mnt/etcd_data | |
ETCD_INITIAL_ADVERTISE_PEER_URLS=https://etcd01.localdomain:3380 | |
ETCD_LISTEN_PEER_URLS=https://192.168.60.101:3380 | |
ETCD_LISTEN_CLIENT_URLS=https://192.168.60.101:3379 | |
ETCD_ADVERTISE_CLIENT_URLS=https://etcd01.localdomain:3379 | |
ETCD_INITIAL_CLUSTER_TOKEN="etcd-cluster-1" | |
ETCD_INITIAL_CLUSTER=etcd1=https://etcd01.localdomain:3380,etcd2=https://etcd02.localdomain:3380,etcd3=https://etcd03.localdomain:3380 | |
ETCD_INITIAL_CLUSTER_STATE=new | |
#SSL Configuration | |
ETCD_CLIENT_CERT_AUTH=true | |
ETCD_TRUSTED_CA_FILE=/etc/ssl/etcd/root.crt | |
ETCD_CERT_FILE=/etc/ssl/etcd/server.crt | |
ETCD_KEY_FILE=/etc/ssl/etcd/server.key | |
ETCD_PEER_CLIENT_CERT_AUTH=true | |
ETCD_PEER_TRUSTED_CA_FILE=/etc/ssl/etcd/root.crt | |
ETCD_PEER_CERT_FILE=/etc/ssl/etcd/server.crt | |
ETCD_PEER_KEY_FILE=/etc/ssl/etcd/server.key | |
ETCD_QUOTA_BACKEND_BYTES=8589934592 | |
ETCD_AUTO_COMPACTION_MODE=periodic | |
ETCD_AUTO_COMPACTION_RETENTION="72" | |
ETCD_HEARTBEAT_INTERVAL=1000 | |
ETCD_ELECTION_TIMEOUT=5000 | |
[root@etcd01 etc]# vi /etc/systemd/system/etcd.service | |
[Unit] | |
Description=etcd service | |
After=network.target | |
[Service] | |
User=etcd | |
Type=notify | |
EnvironmentFile=/etc/etcd.env | |
ExecStart=/usr/local/bin/etcd | |
Restart=always | |
RestartSec=10s | |
LimitNOFILE=40000 | |
[Install] | |
WantedBy=multi-user.target | |
~ |
Secure Pgbackrest:
PGBackrest is a top-notch backup and restore tool for PostgreSQL databases. It's known for its speed, efficiency, and versatility, offering features like parallel processing and incremental backups. PGBackrest operates independently, making it easy to manage backups in diverse environments. It's a must-have for PostgreSQL database administrators looking for reliable data protection.
Securing PGBackrest endpoints with TLS is crucial for protecting sensitive data during backup processes. TLS encryption ensures that communications between PGBackrest and clients are secure, preventing unauthorized access and tampering. By implementing TLS, you safeguard your data integrity, maintain confidentiality, enhance overall security, and comply with regulations. Additionally, enabling TLS can increase the speed of backups. It's worth noting that TLS 3.0 is supported starting from pgBackrest version 2.37 and later.
I utilize a separate dedicated server for the pgBackrest repository. Below are the steps you can follow to enable TLS on pgBackrest.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@posbckp01 ~]# cd /etc/ssl/ | |
[root@posbckp01 ssl]# mkdir pgbackrest | |
[root@posbckp01 ssl]# cd pgbackrest/ | |
[root@posbckp01 ~]# cat csr_details.txt | |
[ req ] | |
default_bits = 2048 | |
default_md = sha256 | |
req_extensions = v3_req | |
distinguished_name = dn | |
prompt = no | |
[ dn ] | |
C = TR | |
ST = Ankara | |
L = Cankaya | |
OU = BJKIT | |
O = BJK | |
CN = posbckp01.localdomain | |
[ v3_req ] | |
subjectAltName = @alt_names | |
[ alt_names ] | |
DNS.1 = posbckp01.localdomain | |
IP.1 = 192.168.60.180 | |
[root@posbckp01 pgbackrest]# openssl req -newkey rsa:2048 -sha256 -nodes -keyout /etc/ssl/pgbackrest/server.key -config csr_details.txt -out /etc/ssl/pgbackrest/server.csr | |
Generating a 2048 bit RSA private key | |
...............+++ | |
............................................................+++ | |
writing new private key to '/etc/ssl/pgbackrest/server.key' | |
----- | |
[root@posbckp01 pgbackrest]# ls | |
csr_details.txt server.csr server.key | |
#-- We delivered our request server.csr to Certifcation Authority. | |
#-- Certificate is signed by Certification Authority and returned to us as serverbckp.cer | |
[root@posbckp01 pgbackrest]# ls | |
root.cer serverbckp.cer serverbckp.key | |
[root@posbckp01 pgbackrest]# mv serverbckp.cer serverbckp.crt | |
[root@posbckp01 pgbackrest]# mv root.cer root.crt | |
[root@posbckp01 ssl]# chown -R pgbackrest:pgbackrest pgbackrest/ | |
[root@posbckp01 ssl]# cd pgbackrest/ | |
[root@posbckp01 pgbackrest]# ls | |
root.crt serverbckp.crt serverbckp.key | |
[root@posbckp01 pgbackrest]# chmod 600 ./* | |
[root@posbckp01 pgbackrest]# ls | |
root.crt serverbckp.crt serverbckp.key | |
[root@posbckp01 pgbackrest]# ls -ls | |
total 16 | |
8 -rw------- 1 pgbackrest pgbackrest 4542 May 10 14:00 root.crt | |
4 -rw------- 1 pgbackrest pgbackrest 2266 May 5 15:38 serverbckp.crt | |
4 -rw------- 1 pgbackrest pgbackrest 1704 May 5 13:58 serverbckp.key | |
#-- Below is the sample backup configuration on pgbackrest repository server | |
[root@posbckp01 pgbackrest]# vi /etc/pgbackrest/pgbackrest.conf | |
[pgcluster] | |
pg1-host=posvt01.localdomain | |
pg1-path=/mnt/postgres/pgdata | |
pg1-port=3531 | |
pg1-socket-path=/var/run/postgresql | |
pg2-host=posvt02.localdomain | |
pg2-path=/mnt/postgres/pgdata | |
pg2-port=3531 | |
pg2-socket-path=/var/run/postgresql | |
#tls client options | |
pg1-host-type=tls | |
pg1-host-user=postgres | |
pg1-host-cert-file=/etc/ssl/pgbackrest/serverbckp.crt | |
pg1-host-key-file=/etc/ssl/pgbackrest/serverbckp.key | |
pg1-host-ca-file=/etc/ssl/pgbackrest/root.crt | |
pg2-host-type=tls | |
pg2-host-user=postgres | |
pg2-host-cert-file=/etc/ssl/pgbackrest/serverbckp.crt | |
pg2-host-key-file=/etc/ssl/pgbackrest/serverbckp.key | |
pg2-host-ca-file=/etc/ssl/pgbackrest/root.crt | |
[global] | |
#backup-standby=y | |
process-max=4 | |
repo1-path=/mnt/pgbackrest | |
repo1-retention-full-type=time | |
repo1-retention-full=28 | |
repo1-retention-diff=3 | |
log-level-file=detail | |
log-level-console=info | |
start-fast=y | |
delta=y | |
# tls server options | |
tls-server-address=posbckp01.localdomain | |
tls-server-cert-file=/etc/ssl/pgbackrest/serverbckp.crt | |
tls-server-key-file=/etc/ssl/pgbackrest/serverbckp.key | |
tls-server-ca-file=/etc/ssl/pgbackrest/root.crt | |
tls-server-auth=posvt01.localdomain=pgcluster | |
tls-server-auth=posvt02.localdomain=pgcluster | |
tls-server-auth=pgcluster.localdomain=pgcluster | |
#-- Below is the sample backup configuration on postgresql database servers. Do it in both nodes | |
[root@posvt01 pgbackrest]# vi /etc/pgbackrest/pgbackrest.conf | |
[pgcluster] | |
pg1-path=/mnt/postgres/pgdata | |
pg1-port=3531 | |
pg1-socket-path=/var/run/postgresql | |
[global] | |
archive-async=y | |
archive-push-queue-max=48GB | |
log-level-file=detail | |
log-level-console=info | |
spool-path=/var/spool/pgbackrest | |
repo1-host=posbckp01.localdomain | |
repo1-path=/mnt/pgbackrest | |
process-max=4 | |
delta=y | |
repo1-host-type=tls | |
repo1-host-cert-file=/etc/ssl/postgres/server.crt | |
repo1-host-key-file=/etc/ssl/postgres/server.key | |
repo1-host-ca-file=/etc/ssl/postgres/root.crt | |
# tls server options | |
tls-server-address=posvt01.localdomain | |
tls-server-cert-file=/etc/ssl/postgres/server.crt | |
tls-server-key-file=/etc/ssl/postgres/server.key | |
tls-server-ca-file=/etc/ssl/postgres/root.crt | |
tls-server-auth=posbckp01.localdomain=pgcluster | |
#-- Turning pgbackrest to a service and enable it on across reboots | |
[root@posbckp01 pgbackrest]# vi /etc/systemd/system/pgbackrest.service | |
[Unit] | |
Description=pgBackRest Server | |
After=network.target | |
StartLimitIntervalSec=0 | |
[Service] | |
Type=simple | |
User=pgbackrest | |
Restart=always | |
RestartSec=1 | |
ExecStart=/usr/bin/pgbackrest server | |
ExecReload=kill -HUP $MAINPID | |
[Install] | |
WantedBy=multi-user.target | |
#-- Turning pgbackrest to a service and enable it on across reboots on postgresql database servers. -- Do it on both nodes | |
[root@posvt01 pgbackrest]# vi /etc/systemd/system/pgbackrest.service | |
[Unit] | |
Description=pgBackRest Server | |
After=network.target | |
StartLimitIntervalSec=0 | |
[Service] | |
Type=simple | |
User=postgres | |
Restart=always | |
RestartSec=1 | |
ExecStart=/usr/bin/pgbackrest server | |
ExecReload=kill -HUP $MAINPID | |
[Install] | |
WantedBy=multi-user.target | |
[root@posvt01 pgbackrest]# systemctl daemon-reload | |
[root@posvt01 pgbackrest]# systemctl enable pgbackrest | |
[root@posvt01 pgbackrest]# systemctl start pgbackrest | |
[root@posvt01 pgbackrest]# pgbackrest server-ping | |
[root@posbckp01 pgbackrest]# systemctl daemon-reload | |
[root@posbckp01 pgbackrest]# systemctl enable pgbackrest | |
[root@posbckp01 pgbackrest]# systemctl start pgbackrest | |
#-- Test connection | |
[root@posbckp01 pgbackrest]# pgbackrest server-ping | |
#-- Check stanza | |
[postgres@posvt01 ~]$ pgbackrest --stanza=pgcluster check |
Having ensured the comprehensive security of the entire PostgreSQL database environment, the DBA can now enjoy a well-deserved peace of mind.
Hope it helps.
Comments
Post a Comment