You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/Security/configure-postgres-operator-rbac.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ If the user tries to access a namespace that they are not configured for within
43
43
Error: user [pgouser1] is not allowed access to namespace [pgouser2]
44
44
45
45
46
-
If you wish to add all avaiable permissions to a *pgorole*, you can specify it by using a single `*` in your configuration. Note that if you are editing your YAML file directly, you will need to ensure to write it as `"*"` to ensure it is recognized as a string.
46
+
If you wish to add all available permissions to a *pgorole*, you can specify it by using a single `*` in your configuration. Note that if you are editing your YAML file directly, you will need to ensure to write it as `"*"` to ensure it is recognized as a string.
47
47
48
48
The following list shows the current complete list of possible pgo permissions that you can specify within the *pgorole* file when creating roles:
Copy file name to clipboardExpand all lines: docs/content/advanced/multi-zone-design-considerations.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ be provisioned in a topology-aware manner according to the specific scheduling r
18
18
This means that when a new PostgreSQL cluster is created, it is necessary to ensure that the volume containing the database
19
19
files for the primary PostgreSQL database within the PostgreSQL clluster is provisioned in the same zone as the node containing the PostgreSQL primary pod that will be accesing the applicable volume.
20
20
21
-
#### Dynamic Provisioning of Volumes: Default Behavoir
21
+
#### Dynamic Provisioning of Volumes: Default Behavior
22
22
23
23
By default, the Kubernetes scheduler will ensure any pods created that claim a specific volume via a PVC are scheduled on a
24
24
node in the same zone as that volume. This is part of the default Kubernetes [multi-zone support](https://kubernetes.io/docs/setup/multiple-zones/).
@@ -34,7 +34,7 @@ soon as they are requested, which means volumes are provisioned without knowledg
34
34
This behavior defined using the `volumeBindingMode` configuration applicable to the Storage Class being utilized to
35
35
dynamically provision the volume. By default,`volumeBindingMode` is set to `Immediate`.
36
36
37
-
This default behavoir for dynamic provisioning can be seen in the Storage Class definition for a Google Cloud Engine Persistent Disk (GCE PD):
37
+
This default behavior for dynamic provisioning can be seen in the Storage Class definition for a Google Cloud Engine Persistent Disk (GCE PD):
38
38
39
39
```bash
40
40
kind: StorageClass
@@ -50,7 +50,7 @@ As indicated, `volumeBindingMode` indicates the default value of `Immediate`.
50
50
51
51
#### Issues with Dynamic Provisioning of Volumes in PostgreSQL Operator
52
52
53
-
Unfortunately, the default setting for dynamic provisinoing of volumes in mulit-zone Kubernetes cluster environments results in undesired behavoir when using the PostgreSQL Operator.
53
+
Unfortunately, the default setting for dynamic provisinoing of volumes in mulit-zone Kubernetes cluster environments results in undesired behavior when using the PostgreSQL Operator.
54
54
55
55
Within the PostgreSQL Operator, a **node label** is implemented as a `preferredDuringSchedulingIgnoredDuringExecution` node
56
56
affinity rule, which is an affinity rule that Kubernetes will attempt to adhere to when scheduling any pods for the cluster,
Copy file name to clipboardExpand all lines: docs/content/installation/other/ansible/prerequisites.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ directory in the [postgres-operator project](https://github.com/CrunchyData/pos
65
65
66
66
Available to Crunchy customers is an RPM containing all the necessary Ansible roles
67
67
and files required for installation using Ansible. The RPM can be found in Crunchy's
68
-
yum repository. For information on setting up `yum` to use the Crunchy repoistory,
68
+
yum repository. For information on setting up `yum` to use the Crunchy repository,
69
69
see the [Crunchy Access Portal](https://access.crunchydata.com/).
70
70
71
71
To install the Crunchy PostgreSQL Operator Ansible roles using `yum`, run the following
@@ -174,7 +174,7 @@ sets of variables cannot be used at the same time.
174
174
|`db_port`| 5432 |**Required**| Set to configure the default port used on all newly created clusters. |
175
175
|`db_replicas`| 1 |**Required**| Set to configure the amount of replicas provisioned on all newly created clusters. |
176
176
|`db_user`| testuser |**Required**| Set to configure the username of the dedicated user account on all newly created clusters. |
177
-
|`disable_failover`| false |**Required**| Set to true disable auto failover capabilities on all newly created cluster requests. This cannot be overriden by the client on a cluster create, but on a cluster update. Setting this is not generally recommend, as it disable high-availability capabilities.|
177
+
|`disable_failover`| false |**Required**| Set to true disable auto failover capabilities on all newly created cluster requests. This cannot be overridden by the client on a cluster create, but on a cluster update. Setting this is not generally recommend, as it disable high-availability capabilities.|
178
178
|`exporterport`| 9187 |**Required**| Set to configure the default port used to connect to postgres exporter. |
179
179
|`grafana_admin_password`||| Set to configure the login password for the Grafana administrator. |
180
180
|`grafana_admin_username`| admin || Set to configure the login username for the Grafana administrator. |
Copy file name to clipboardExpand all lines: docs/content/installation/other/bash.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -265,7 +265,7 @@ Prior to using *pgo*, users testing the Operator on a single host can specify th
265
265
pgo version
266
266
```
267
267
268
-
That URL address needs to be reachable from your local *pgo* client host. Your Kubernetes administrator will likely need to create a network route, ingress, or LoadBalancer service to expose the Operator REST API to applications outside of the Kubernetes cluster. Your Kubernetes administrator might also allow you to run the Kubernetes port-forward command, contact your adminstrator for details.
268
+
That URL address needs to be reachable from your local *pgo* client host. Your Kubernetes administrator will likely need to create a network route, ingress, or LoadBalancer service to expose the Operator REST API to applications outside of the Kubernetes cluster. Your Kubernetes administrator might also allow you to run the Kubernetes port-forward command, contact your administrator for details.
269
269
270
270
Next, the *pgo* client needs to reference the keys used to secure the Operator REST API:
0 commit comments