Use external PostgreSQL
The Helm chart deployment can optionally install an internal PostgreSQL using Bitnami subcharts. For production environments, we advise deploying PostgreSQL separately from the Camunda Helm charts. This guide steps through using an external PostgreSQL instance.
Prerequisites
- Running external PostgreSQL service
- Connection details: following sample values are used in this guide (replace them with your own):
host: `db.example.com`
port: `5432`
username: `postgres`
password: `examplePassword`
- Supported versions:: Check the supported environments page to confirm which PostgreSQL versions are supported.
- Database setup: Ensure the required databases exist in your PostgreSQL instance. For this guide, create the following databases:
CREATE DATABASE "web-modeler";
CREATE DATABASE "keycloak";
CREATE DATABASE "identity";
- Kubernetes secrests: Store the database password in a Kubernetes secret so it is not referenced in plain text within your values.yaml (This secret exists outside the Helm chart and will not be overwritten by subsequent helm upgrade commands). For example:
kubectl create secret generic camunda-psql-db --from-literal=password=examplePassword -n camunda
Configuration
Three Camunda 8 Self-Managed components require PostgreSQL: Identity, Keycloak, and Web Modeler. Each of these components must be configured to connect to the external PostgreSQL instance.
Parameters
values.yaml option | type | default | description |
---|---|---|---|
webModeler.restapi.externalDatabase.url | string | "" | JDBC url of the database |
webModeler.restapi.externalDatabase.user | string | "" | Username of the database |
webModeler.restapi.externalDatabase.secret.existingSecret | string | "" | Kubernetes Secret name containing a database password |
webModeler.restapi.externalDatabase.secret.existingSecretKey | string | "" | Key within the Kubernetes Secret that has the database password |
webModeler.restapi.externalDatabase.secret.inlineSecret | string | "" | string literal of the database password if not using a Kubernetes Secret |
identity.externalDatabase.enabled | boolean | false | Enable the externalDatabase options |
identity.externalDatabase.host | string | "" | Hostname of the database |
identity.externalDatabase.port | integer | 5432 | Port of the database |
identity.externalDatabase.username | string | "" | Username of the database |
identity.externalDatabase.secret.existingSecret | string | "" | Kubernetes Secret name containing database password |
identity.externalDatabase.secret.existingSecretKey | string | "" | Key within the Kubernetes Secret that contains the database password |
identity.externalDatabase.database | string | "" | Database name |
identityKeycloak.externalDatabase.host | string | "" | Database host name |
identityKeycloak.externalDatabase.port | integer | 5432 | Database port number |
identityKeycloak.externalDatabase.user | string | "" | Database user name |
identityKeycloak.externalDatabase.existingSecret | string | "" | Kubernetes Secret containing the database password |
identityKeycloak.externalDatabase.existingSecretKey | string | "" | Key within the Kubernetes Secret containing the database password |
identityKeycloak.externalDatabase.database | string | "" | Database name |
Example usage
webModeler:
enabled: true
restapi:
mail:
fromAddress: noreply@camunda.mycompany.com
fromName: Camunda 8 WebModeler
externalDatabase:
url: "jdbc:postgresql://db.example.com:5432/web-modeler"
user: "postgres"
secret:
existingSecret: "camunda-psql-db"
existingSecretKey: "password"
identity:
externalDatabase:
enabled: true
host: "db.example.com"
port: 5432
username: "postgres"
secret:
existingSecret: "camunda-psql-db"
existingSecretKey: "password"
database: "identity"
identityKeycloak:
externalDatabase:
url: "jdbc:postgresql://db.example.com:5432/modeler"
user: "postgres"
existingSecret: "camunda-psql-db"
existingSecretKey: "password"
auth:
adminUser: postgres
existingSecret: "camunda-psql-db"
existingSecretPasswordKey: "password"
# disable internal psql for keycloak
postgresql:
enabled: false
Troubleshooting
- If the database for Keycloak is misconfigured, other applications will output a
401
error code in the logs as they are not able to correctly authenticate against Keycloak. - If you have not created the databases in your external PostgreSQL instance, a
database missing
error will output in the logs of the respective component.