You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
PostgreSQL Cluster: Managed by the Zalando operator
Kubernetes: Single node, 1 PostgreSQL replica
Node Details: Azure VM, D-class
Image Versions: Observed with spilo-16:3.3-p2 and spilo-15:3.0-p1
Application: Keycloak, configured for unencrypted PostgreSQL connections
Uptime: Solution ran successfully for 230 days prior to issue
Issue Description
After 230 days of stable operation, the PostgreSQL database began rejecting all unencrypted connections, enforcing an encrypted connection requirement. This caused connectivity failures with Keycloak, which is configured to use an unencrypted connection. The change in behavior was unexpected and not preceded by any known configuration changes.
Temporary Resolution
Restarting the PostgreSQL pod resolves the issue, restoring normal operation and allowing unencrypted connections again.
Observations
The issue has occurred with both spilo-16:3.3-p2 and spilo-15:3.0-p1 images.
The Zalando operator does not support adding a liveness probe, limiting automated detection or recovery options.
Questions
What could cause PostgreSQL to suddenly enforce encrypted connections after 230 days of operation without this requirement?
Are there known conditions (e.g., certificate updates, operator behavior) that might trigger this behavior?
The text was updated successfully, but these errors were encountered:
Environment
spilo-16:3.3-p2
andspilo-15:3.0-p1
Issue Description
After 230 days of stable operation, the PostgreSQL database began rejecting all unencrypted connections, enforcing an encrypted connection requirement. This caused connectivity failures with Keycloak, which is configured to use an unencrypted connection. The change in behavior was unexpected and not preceded by any known configuration changes.
Temporary Resolution
Restarting the PostgreSQL pod resolves the issue, restoring normal operation and allowing unencrypted connections again.
Observations
spilo-16:3.3-p2
andspilo-15:3.0-p1
images.Questions
The text was updated successfully, but these errors were encountered: