User / Database Management
PGO comes with some out-of-the-box conveniences for managing users and databases in your Postgres cluster. However, you may have requirements where you need to create additional users, adjust user privileges or add additional databases to your cluster.
For detailed information for how user and database management works in PGO, please see the User Management section of the architecture guide.
Creating a New User
You can create a new user with the following snippet in the postgrescluster custom resource. Let’s add this to our hippo database:
spec:
users:
- name: rhino
You can now apply the changes and see that the new user is created. Note the following:
- The user would only be able to connect to the default
postgresdatabase. - The user will not have any connection credentials populated into the
hippo-pguser-rhinoSecret. - The user is unprivileged.
Let’s create a new database named zoo that we will let the rhino user access:
spec:
users:
- name: rhino
databases:
- zoo
Inspect the hippo-pguser-rhino Secret. You should now see that the dbname and uri fields are now populated!
We can set role privileges by using the standard role attributes that Postgres provides and adding them to the spec.users.options. Let’s say we want the rhino to become a superuser (be careful about doling out Postgres superuser privileges!). You can add the following to the spec:
spec:
users:
- name: rhino
databases:
- zoo
options: "SUPERUSER"
There you have it: we have created a Postgres user named rhino with superuser privileges that has access to the rhino database (though a superuser has access to all databases!).
Adjusting Privileges
Let’s say you want to revoke the superuser privilege from rhino. You can do so with the following:
spec:
users:
- name: rhino
databases:
- zoo
options: "NOSUPERUSER"
If you want to add multiple privileges, you can add each privilege with a space between them in options, e.g:
spec:
users:
- name: rhino
databases:
- zoo
options: "CREATEDB CREATEROLE"
Managing the postgres User
By default, PGO does not give you access to the postgres user. However, you can get access to this account by doing the following:
spec:
users:
- name: postgres
This will create a Secret of the pattern <clusterName>-pguser-postgres that contains the credentials of the postgres account. For our hippo cluster, this would be hippo-pguser-postgres.
Deleting a User
As mentioned earlier, PGO does not let you delete a user automatically: if you remove the user from the spec, it will still exist in your cluster. To remove a user and all of its objects, as a superuser you will need to run DROP OWNED in each database the user has objects in, and DROP ROLE
in your Postgres cluster.
For example, with the above rhino user, you would run the following:
DROP OWNED BY rhino;
DROP ROLE rhino;
Note that you may need to run DROP OWNED BY rhino CASCADE; based upon your object ownership structure – be very careful with this command!
Once you have removed the user in the database, you can remove the user from the custom resource.
Deleting a Database
As mentioned earlier, PGO does not let you delete a database automatically: if you remove all instances of the database from the spec, it will still exist in your cluster. To completely remove the database, you must run the DROP DATABASE
command as a Postgres superuser.
For example, to remove the zoo database, you would execute the following:
DROP DATABASE zoo;
Once you have removed the database, you can remove any references to the database from the custom resource.
Next Steps
You now know how to manage users and databases in your cluster and have now a well-rounded set of tools to support your “Day 1” operations. Let’s start looking at some of the “Day 2” work you can do with PGO, such as updating to the next Postgres version, in the next section.