Skip to content

PostgreSQL Cluster Requiring Encrypted Connections After 230 Days #1099

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
uk1988 opened this issue Mar 26, 2025 · 0 comments
Open

PostgreSQL Cluster Requiring Encrypted Connections After 230 Days #1099

uk1988 opened this issue Mar 26, 2025 · 0 comments

Comments

@uk1988
Copy link

uk1988 commented Mar 26, 2025

Environment

  • PostgreSQL Cluster: Managed by the Zalando operator
  • Kubernetes: Single node, 1 PostgreSQL replica
  • Node Details: Azure VM, D-class
  • Image Versions: Observed with spilo-16:3.3-p2 and spilo-15:3.0-p1
  • Application: Keycloak, configured for unencrypted PostgreSQL connections
  • Uptime: Solution ran successfully for 230 days prior to issue

Issue Description

After 230 days of stable operation, the PostgreSQL database began rejecting all unencrypted connections, enforcing an encrypted connection requirement. This caused connectivity failures with Keycloak, which is configured to use an unencrypted connection. The change in behavior was unexpected and not preceded by any known configuration changes.

Temporary Resolution

Restarting the PostgreSQL pod resolves the issue, restoring normal operation and allowing unencrypted connections again.

Observations

  • The issue has occurred with both spilo-16:3.3-p2 and spilo-15:3.0-p1 images.
  • The Zalando operator does not support adding a liveness probe, limiting automated detection or recovery options.

Questions

  1. What could cause PostgreSQL to suddenly enforce encrypted connections after 230 days of operation without this requirement?
  2. Are there known conditions (e.g., certificate updates, operator behavior) that might trigger this behavior?

Image
Image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant