• Logo
    Charmed PostgreSQL K8s
  • canonical.com/data/postgresql
  • More resources
    • Discourse
    • Matrix
    • GitHub
Contents Menu Expand Light mode Dark mode Auto light/dark, in light mode Auto light/dark, in dark mode Skip to content
Charmed PostgreSQL K8s 16 documentation
Charmed PostgreSQL K8s 16 documentation
  • Home
  • Tutorial
  • How-to guides
    • Deploy
      • Canonical K8s
      • GKE
      • EKS
      • AKS
      • Multi-AZ
      • Terraform
      • Air-gapped
    • Integrate
    • Scale
    • Manage passwords
    • Enable TLS
    • External network access
    • Enable LDAP
    • Enable plugins/extensions
    • Back up and restore
      • Configure S3 AWS
      • Configure S3 RadosGW
      • Create a backup
      • Restore a backup
      • Manage backup retention
      • Migrate a cluster
    • Monitoring (COS)
      • Enable monitoring
      • Enable alert rules
      • Enable tracing
    • Refresh (upgrade)
    • Data migration
      • Migrate data from PostgreSQL 14 to 16
      • Migrate data via `pg_dump`
      • Migrate data via backup/restore
    • Cross-regional async replication
      • Set up clusters
      • Integrate with a client app
      • Remove or recover a cluster
    • Logical replication
      • Set up two clusters
      • Re-enable logical replication
    • Integrate PostgreSQL with your charm
  • Reference
    • Releases
    • System requirements
    • Software testing
    • Performance and resources
    • Troubleshooting
    • Plugins/extensions
    • Alert rules
    • Statuses
    • Contacts
  • Explanation
    • Architecture
    • Interfaces and endpoints
    • Legacy charm
    • Juju
    • Users
    • Logs
    • Connection pooling
    • Security
      • Cryptography
    • Flowcharts
      • Charm
      • Backups
      • Relations
Back to top
Contribute to this page

Explanation¶

Additional context about the PostgreSQL charm, including design, legacy information, and security.

Core¶

Core concepts about the history and design of the charm:

  • Architecture
  • Interfaces and endpoints
  • Legacy charm
  • Juju

Operation¶

Clarification of standard operational concepts:

  • Users
  • Logs
  • Connection pooling

Security¶

Security hardening overview:

  • Security

Development¶

Charm event flowcharts:

  • Flowcharts
    • Charm
    • Backups
    • Relations
Copyright © 2025 CC-BY-SA, Canonical Ltd.
Last updated on Oct 29, 2025
Contents
  • Explanation
    • Core
    • Operation
    • Security
    • Development