Certificate Management
This chart leverages cert-manager to create a self-signed CA and issue client certificates for a set of managed users on each node:
app: a user for application connectionsadmin: a superuser for administrative purposespgedge: used for multi-active replication connections between nodesstreaming_replica: used for physical replication connections between nodes
Using a self-signed certificate makes it easier to get started with pgEdge, but you may want to use your own CA when you move to production. To use a managed certificate, disable the self-signed CA creation and certificate issuance by setting pgEdge.provisionCerts to false, and issue certificates with cert-manager or a similar tool.
These can then be plugged into your clusterSpec accordingly:
pgEdge:
appName: pgedge
provisionCerts: false
nodes:
- name: n1
hostname: pgedge-n1-rw
- name: n2
hostname: pgedge-n2-rw
- name: n3
hostname: pgedge-n3-rw
clusterSpec:
storage:
size: 1Gi
certificates:
clientCASecret: <secret-containing-client-ca>
replicationTLSSecret: <secret-containing-replication-tls-cert>