Failover Manager with EDB PgBouncer v4
You can use Failover Manager and EDB PgBouncer to provide high availability in an on-premises setup as well as in a cloud setup. EDB PgBouncer is a popular connection pooler, but it is not enough to achieve PostgreSQL high availability by itself as it doesn't have multi-host configuration, failover, or detection.
Failover Manager with EDB PgBouncer on premises
For an on-premises setup, use the connection libraries to provide high availability by using a connection string with multiple hosts.
Failover Manager with EDB PgBouncer in the cloud
For a cloud setup, use a network load balancer (NLB) to balance the traffic on both instances of EDB PgBouncer.
EDB does not support this architecture with EDB PgBouncer and Failover Manager/PostgreSQL running on the same machines:
A restriction with cloud network load balancers Azure doesn't route traffic properly when source and destination reside on the same machines.
In a mixed architecture, traffic between EDB PgBouncer and Postgres can become unbalanced (sometimes local, sometimes networked).
EDB PgBouncer and PostgreSQL compete for resources.
A master failure impacts both routing (EDB PgBouncer) and database when these two components are combined on the same machines.
Using Failover Manager with PgBouncer
Installing
Install and configure Advanced Server database, Failover Manager, and EDB PgBouncer on AWS virtual machines as follows:
Systems | Components |
---|---|
PgDB srv 1, 2, 3 | Primary / standby node running Advanced Server 13 and Failover Manager 4.2 |
PgBouncer srv 1, 2 | PgBouncer node running EDB PgBouncer 1.15. Register these two nodes as targets in the target group. Two is the minimum and is sufficient for most cases. |
Configuring Failover Manager
Use the instructions provided in the Failover Manager documentation to configure Failover Manager. Perform the following steps in addition to those instructions:
- Create an integration script that connects to every (remote)
EDB PgBouncer host and runs the redirect script. Locate the script at
/usr/edb/efm-4.2/bin/efm_pgbouncer_functions
. Make sure the user efm can execute the script, which has the following contents:
- On each database node, set
script.load.balancer.attach
to the custom script in theefm
properties file:
<pgbs1>
is the hostname or IP address for PgBouncer server 1 and <pgbs2>
is the hostname or IP address for PgBouncer server 2.
Configuring PostgreSQL
During normal operation, traffic is balanced across both PgBouncer instances, and both open connections to PostgreSQL.
Therefore, make sure that in PostgreSQL the max_connections
parameter is compensated to accept enough connections from both instances.
Configuring EDB PgBouncer
You can use the instructions provided in the EDB PgBouncer documentation to configure EDB PgBouncer. Perform the following steps in addition to those instructions:
- Append the following line to the
edb-pgbouncer-1.15.ini
file:
- In the
edb-pgbouncer-1.15.ini
file, set the value oflisten_addr
to *:
Leave the [databases] section empty in the
edb-pgbouncer-1.15.ini
file, and configure this section in a separate file/etc/edb/pgbouncer1.15/edb-pgbouncer-databases.ini
. Ensure that this extra config file is readable and writable by enterprisedb.The following is an example of the bash commands to create the file:
- Create a script
/usr/edb/pgbouncer1.15/bin/redirect.sh
to use to reconfigure the databases chapter and reload pgbouncer. Make sure the script is owned by root and that user/group/other (0755) has read and execute access. The script has the following content:
Configuring passwordless ssh
For the EDB PgBouncer integration, passwordless ssh
access is required. There are multiple ways
to configure ssh
. Follow your organization's recommended process to
configure the passwordless ssh
. For a quick start, you can also follow this example for configuring passwordless ssh
.
The user efm user must be able to ssh as the user running PgBouncer; for example, enterprisedb.
Configure on EDB PgBouncer hosts
On every EDB PgBouncer host, temporarily set a password for the enterprisedb user. As root, run
passwd enterprisedb
and enter the temporary password twice.Make sure that passwordless
ssh
is enabled. You can check with the following command:Make sure it is set to
yes
. If needed, change it and restartssh
.
Configure on Failover Manager/PostgreSQL hosts
On every Failover Manager/postgres host, as the efm user:
- Run the following command:
- For every EDB PgBouncer host, copy the
ssh
key with the following command:The default home directory for theenterprisedb
user is/var/lib/edb
. If this directory is not already present, create it manually. As a sudo user, run the following commands on each EDB PgBouncer host:
Resetting temporary passwords on EDB PgBouncer hosts
You can reset the temporary password for the enterprisedb user on every EDB PgBouncer host by running the following command as root:
Configuring the network load balancer
For the Failover Manager \ EDB PgBouncer integration using a network load balancer in AWS or Azure, you need to perform additional steps.
Add the following rules to the security groups to be used by the EDB PgBouncer and database instances.
Rules for the security group to be used by the EDB PgBouncer instances (SG PgBouncer).
Type Protocol Port range Source Description Custom TCP TCP 6432 Entire Subnet PgBouncer Custom TCP TCP 22 Entire Subnet ssh
In addition to these rules, add the rules for SSH and Ping as per your requirement.
Rules for the security group used by the database instances (SG DB):
Type Protocol Port range Source Description Custom TCP TCP 7800 Entire Subnet Failover Manager Custom TCP TCP 5444 Entire Subnet Postgres Custom TCP TCP 22 Entire Subnet ssh
These rules ensure that the ports required to run the database, Failover Manager, and EDB PgBouncer are open for communication between the nodes and the load balancer for traffic routing and health monitoring.
In addition to these rules, add the rules for SSH and Ping as per your requirement.
Configuring NLB in Azure
If you are using AWS, see Configuring NLB in AWS.
After configuring the rules described in Creating rules for security groups, follow the Azure documentation to:
Create a backend pool consisting of the two virtual machines running the EDB PgBouncer instances. Use the private IPs of the virtual machines to create the backend pool.
Add a health probe to check if the EDB PgBouncer instance is available on the virtual machines. Select
TCP
as the protocol and6432
as the port.Add a load balancing rule for port
6432
. This rule ensures that the network traffic coming toward that port is distributed evenly among all the virtual machines present in the backend pool. SelectPublic
load balancer orInternal
load balancer as the type.
After completing these configurations, you can connect to the database
on the IP address of the network load balancer using port 6432. If a
failure occurs on the primary database server, Failover Manager
promotes a new primary and then reconfigures EDB PgBouncer to redistribute
traffic. If any of the EDB PgBouncer processes is not available to
accept traffic, the network load balancer redistributes all
the traffic to the remaining EDB PgBouncer processes. Make sure that the
max_client_conn
parameter is tuned to compensate for the higher number
of connections in case of failover.
Configuring NLB in AWS
The following sample configuration assumes:
All the EC2 instances and the load balancer are deployed in the same subnet. If required, you can add the database nodes to another subnet, but that requires a more complex configuration and might have a performance impact.
There's a security group for PgBouncer and a security group for the database instances.
After configuring the rules described in Creating rules for security groups, follow the AWS documentation to
Create a target group with the following details:
Name Type Protocol Port VPC pgbouncer Instances TCP 6432 Select the VPC to which the instances are connected. Leave the rest of the settings (Health check TCP and Advanced health check settings) as default.
Register the created target groups with the instances that are running EDB PgBouncer.
Create a load balancer with the following details:
Type VPC Listener Public
orInternal
. EDB recommends using an internal load balancer.Choose a VPC and map it to the desired zones. Create a listener with TCP
as6432
, and forward it to the target group pgbouncer.
After completing the configurations, you can connect to the database on
the IP address of the network load balancer on port 6432. If a failure
occurs on the primary database server, Failover Manager promotes a new
primary and then reconfigures EDB PgBouncer to redistribute traffic. If any
of the EDB PgBouncer processes is not available to accept traffic, the network
load balancer redistributes all the traffic to
the remaining EDB PgBouncer processes. Make sure that the max_client_conn
parameter is tuned to compensate for the higher number of connections in
case of failover.