A DB instance is a concept that encompasses virtual equipment and installed PostgreSQL, a unit of PostgreSQL provided by RDS for PostgreSQL. You do not have direct access to the operating system of the DB instance; you can only access the database through the port you entered when you created the DB instance. The available port ranges have the following restrictions.
DB instance is identified by the name given by the customer and the 32-byte ID given automatically. DB instance names have the following restrictions.
You can create a DB instance through the settings below.
NHN Cloud has divided the entire system into multiple availability areas to prepare for failures caused by physical hardware problems. For each of these availability areas, storage systems, network switches, top and power supplies are all configured separately. Failure within one area of availability does not affect another area of availability, which means increasing availability across the service. If you deploy DB instances across multiple availability areas, you can increase the availability of services. Network communication is possible between DB instances created across multiple availability zones, and there is no network usage charge for this.
[Caution] You cannot change the availability area of an already created DB instance.
The versions specified below are available.
Version | Note |
---|---|
PostgreSQL 14.6 |
DB instances have different CPU cores and different memory capacities, depending on the type. When you create a DB instance, you must select the appropriate DB instance type according to the database workload.
Type | Description |
---|---|
m2 | This is a type that balances CPU and memory. |
c2 | This is an Instance type with high CPU performance. |
r2 | It can be used when memory is used more than other resources. |
x1 | It is a type that supports high-specification CPU and memory. It can be used for services or applications that require high performance. |
The type of DB instance that you have already created can be easily changed through the console.
[Caution] Changing the type of a DB instance that you have already created will shut down the DB instance, resulting in a few minutes of downtime.
Stores the database's data files in data storage. DB instances support two types of data storage: HDD and SSD. Performance and price vary by data storage type, so you need to choose the right type according to your database workload. Data storage can be created in 20GB to 2TB.
[Caution] You cannot change the data storage type of an already created DB instance.
[Note] To use more than 2TB of data storage, contact NHN Cloud Customer Center.
The following tasks use the I/O capacity of the data storage, which may degrade the performance of DB instances during the process.
High availability DB instances increase availability and data durability, and provide a fault-tolerant database. High availability DB instances consist of a master, a candidate master, and are created in different availability zones. A candidate master is a DB instance that is prepared for failure and is not normally available. For highly available DB instances, backups are performed on the candidate master to avoid performance degradation due to backups. You can see the various features provided by the High Availability DB Instance in High Availability DB Instance.
Set DB instance default information. You can enter the instance name, description, DB port, and user information that you want to create by default. The user ID you enter is created with DDL permissions.
DDL * Includes CRUD permissions, and has permissions to execute DDL queries.
CRUD * Includes query permissions, and has permission to change data. * CRUD users can create a DB instance on DB & User tab after it has been created.
[Caution] You can create only one DDL user per DB instance, and you cannot change the privileges of users that you have already created.
To access a DB instance from outside, you must connect the floating IP to DB instance. You can create a floating IP only if you connect a subnet to which the Internet Gateway is connected. Floating IP is charged at the same time as it is used, and separately, it is charged separately if traffic is generated in the direction of the Internet through the floating IP.
A parameter group is a set of parameters that allow you to set up a database installed on a DB instance. You must select one parameter group when you create a DB instance. The parameter group can be changed freely even after it is created. For a detailed description of the parameter group, refer to Parameter Group.
DB security groups are used to restrict access against outside break-in. You can allow access to specific port ranges or database ports for incoming and outgoing traffic. You can apply multiple DB security groups to a DB instance. For a detailed description of DB security groups, refer to DB security groups.
You can set up a database of DB instances to periodically back up, or you can create backups at any time with console. During the backup, the performance might degrade. We recommended that you back up at a time when the service load is not high so as not to affect the service. If you don't want performance degradation from backups, you can perform backups on a read replica. Backup files are stored in internal backup storage and are charged based on backup capacity. We recommend that you enable periodic backups to prepare for unexpected failures. For a detailed description of backups, see Backup and Restore.
Periodically, set tasks to run that can help stabilize the DB instance. If you are using file I/O, you might experience performance degradation while maintenance tasks are performed. We recommend that you run automatic maintenance tasks during off-peak hours to avoid impacting your services.
Clean up archived write ahead logs that do not affect service behavior. Archived transaction logs that do not affect service behavior are logs that are not used when using automatic backups to restore to the current point in time.
You can set default notifications when creating a DB instance. Setting default notifications creates a new notification group with {DB instance name}-default
name and automatically sets the notification items below. You can freely modify and delete notification groups generated by default notifications. See Notification Groups for a detailed description of notification groups.
Items | comparison method | Threshold value | Duration |
---|---|---|---|
CPU Usage | >= | 80% | 5 minutes |
Storage Remaining Usage | <= | 5,120MB | 5 minutes |
Database Connection Status | <= | 0 | 0 minutes |
Storage usage | >= | 95% | 5 minutes |
Data storage fault | <= | 0 | 0 minutes |
Connection Ratio | >= | 85% | 5 minutes |
Memory Usage | >= | 90% | 5 minutes |
You can view the DB instances created from the console. You can view in groups of DB instances, or as individual DB instances.
❶ Change the DB instance screen mode. ❷ Change the deletion protection settings by clicking the lock icon. ❸ Display the most recently collected monitoring metrics. ❹ Display the current status. ❺ Spinner icon appears if any work in progress exists. ❻ Change the search conditions.
DB instance's status consists of the following values, which change based on your behavior and your current status.
Status | Description |
---|---|
BEFORE_CREATE | Before creating |
AVAILABLE | Available |
STORAGE_FULL | Lack of storage |
FAIL_TO_CREATE | Fail to create |
FAIL_TO_CONNECT | Fail to connect |
REPLICATION_DELAY | Replication latency |
REPLICATION_STOP | Replication stopped |
SHUTDOWN | shutdown |
The search conditions that can be changed are as follows.
❶ Retrieve the status of DB instance by filtering criteria. ❷ Retrieve availability zones by filtering criteria.
Select DB instance to view details.
❶ When you click on the domain of the connection information, the pop-up window to verify the IP address appears. ❷ When you click on the DB security group, a pop-up window appears to verify the DB security rules. ❸ Click a parameter group to go to the screen where you can check the parameters. ❹ Adjust the height of the detail panel by dragging and dropping with the mouse. ❺ Adjust the height of the detail panel to a pre-determined height.
Issues an internal domain when you create a DB instance. Internal domain refers to an IP address that belongs to the user's VPC subnet. In the case of a high availability DB instance, the internal domain does not change even if the candidate master is changed to a new master in a failover. Therefore, unless there is a special reason, the application's access information must use the internal domain.
If you created a floating IP, issue an additional external domain. External domain points to the address of the floating IP. Because the external domain or floating IP is externally accessible, you must set the rules of the DB security group appropriately to protect the DB instance.
On the Logs tab of the DB instance, you can view or download various log files. Log files will rotate to the set settings as follows. Some log files can be enabled or disabled in a parameter group.
Items | Rotate Settings | Whether to change or not |
---|---|---|
postgresql.log | 40 items of 100 MB | Static |
backup.log | Daily 10 items | Static |
❶ When you click View Log, a pop-up window appears where you can view the contents of the log file. You can check logs up to 65,535 Bytes. ❷ Click on Import to request that the log files of the DB instance be downloaded. ❸ When the download is ready, the Download button is exposed. Click to download the log.
[Caution] When Import is clicked, the log file is uploaded to the backup storage for approximately 5 minutes and the backup storage capacity is charged to the size of the log file. Click on Download to charge Internet traffic as large as the log file.
Database & User tab of DB instance allows you to query and control databases and users created in the DB engine.
❶ When you click on + Create, a pop-up window appears where you can enter the name of the database. ❷ You can create the database by entering the database name and clicking Create.
Database names have the following restrictions.
postgres
information_schema
performance_schema
repmgr
db_helper
sys
mysql
rds_maintenance
pgpool
nsight
watchdog
barman
rman
are not allowed to use as database names. ❶ When you click on Modify in the database row you want to modify, a pop-up window appears where you can modify the database information. ❷ You can request a modification by clicking on Modify. ❸ When checking Immediate Apply Scheduled Access Control, the modifications are also applied to the access control rule immediately.
❶ After you click Synchronization, the synchronization confirmation pop-up window appears. ❷ You can click Confirm to request the synchronization.
❶ If select the database you want to delete and click on Delete, the Delete confirmation pop-up window appears. ❷ You can request deletion by clicking on Delete.
❶ Click on + Create to see the Add User pop-up window. ❷ Enter user ID.
User ID has the following restrictions.
postgres
repmgr
barman
rman
pgpool
nsight
watchdog
dba
manager
mysql.session
mysql.sys
mysql.infoschema
sqlgw
admin
etladm
alertman
prom
rds_admin
rds_mha
rds_repl
mariadb.sys
are not allowed to be used as user ID.❸ Enter a password.
Password has the following restrictions.
❹ Select the permissions you want to grant to the user. The permissions and descriptions you can grant are as follows.
CRUD * Includes query permissions, and has permission to change data.
❺ You can choose to add a default access control rule to give the user you're creating full database access. If you don't add a default access control rule, you must set a separate access control rule to access the database.
❶ When you click on Modify in the row of users that you want to edit, a pop-up window appears where you can edit information. ❷ If you do not enter a password, it will not be edited. ❸ When checking Immediate Apply Scheduled Access Control, the modifications are also applied to the access control rule immediately.
❶ Click Synchronization and a Confirm Synchronization pop-up window will appear. ❷ Click Confirm to request synchronization.
❶ Select the user that you want to delete and click on the drop-down menu. ❷ When Delete is clicked, Delete Confirmation pop-up window appears. You can request deletion by clicking on Confirm.
Access Control tab of the DB instance allows you to query and control DB Engine access rules for specific databases and users. The rules set here apply to file pg_hba.conf
.
❶ You can view the application status for access control rules. ❷ If there is any work in progress, a spinner will appear. ❸ You can search and view by entering search keywords.
The status of access control consists of the following values, which change depending on your behavior and your current status.
Status | Schedule status | Description |
---|---|---|
CREATED | CREATE | Schedule Create (requires application) |
CREATED | MODIFY | Schedule modify (requires application) |
CREATED | DELETE | Schedule delete (requires application) |
APPLIED | NONE | Applied |
- | - | Not applicable |
[Caution] If all the targets of the rule that you have added by selecting a specific database and user are deleted, they appear as not applicable state and do not apply to the configuration file.
❶ When you click on + Create, add Access Control Rule pop-up window appears. ❷ You can specify the full target of the rule or select a specific database or user. - When Custom is selected, a drop-down menu for selecting the database and user is displayed on the Database & User tab. ❸ Enter the connection address to which the rule applies in CIDR format. ❹ Select authentication method. The following authentication methods are supported by RDS for PostgreSQL.
authentication method | DB Engine Settings value | Description |
---|---|---|
Trust (no password required) | trust | Allow all connections without passwords or other authentication. |
Block connection | reject | Block all connections. |
password (SCRAM-SHA-256) | scram-sha-256 | Ensure that SCRAM-SHA-256 is authenticated with the password set on Database & User tab. |
❺ Adjust the order in which the rules are applied with the up/down arrow buttons. - Access control rules are applied sequentially from above and the first applied rule takes priority. - If the access permission rule registered at the top is applied first, access is allowed even if there is an access blocking rule at the bottom. - Conversely, even if there is an access permission rule at the bottom, access is not allowed if the access blocking rule registered at the top is applied first. ❻ After finish setting, click Apply Changes to apply the access control settings to DB instance. ❼ When applied to DB instance, the status changes to Applied.
❶ When click Modify in the row of access control rules to modify, a pop-up window appears where you can modify existing information. ❷ Modified rules must apply access control settings to DB instances by clicking on Apply Changes.
❶ If you select the user you want to delete and click on Delete, the Delete confirmation pop-up window appears. ❷ Deleted rules must apply access control settings to DB instances by clicking on Apply Changes.
You can easily change various items in DB instance created through the console. The change items you request are applied to DB instances sequentially. If a restart is required during the application process, apply all changes and restart the DB instance. Items that cannot be changed and that require a restart are as follows.
Items | Whether able to change or not | Whether need to restart or not |
---|---|---|
Availability Zone | No | |
DB version | Yes | Yes |
DB instance type | Yes | Yes |
Data Storage Types | No | |
Data Storage Sizes | Yes | Yes |
High Availability available | Yes | No |
Ping Interval | Yes | No |
Failover latency | Yes | No |
Name | Yes | No |
Description | Yes | No |
DB port | Yes | Yes |
VPC Sub-net | No | |
Floating IP | Yes | No |
Parameter Group | Yes | Determines whether or not the changed parameters are restarted |
DB Security Group | Yes | No |
Backup Settings | Yes | No |
Database and User Control | Yes | No |
Access Control | Yes | No |
For high-availability DB instances, we provide a failover restart feature to increase reliability and reduce net time when there is a change to something that requires a restart.
If you do not use restart with failover, the changes are applied sequentially to the master and candidate master, and then the DB instance is restarted. For more information, see Manual Failover Items in High Availability DB Instances.
You can delete DB instances that are no longer in use. When you delete a master, the read replicas that belong to its replication group are also deleted. Because deleted DB instances cannot be recovered, it is recommended that you enable deletion protection for critical DB instances.
You can prepare a database of DB instances to recover in case of a failure. You can perform backups from the console whenever you need to or you can set to perform periodical back up. See Backup for more information.
You can use backup to restore data to any point in time. Restore always creates a new DB instance and cannot be restored to an existing DB instance. See Backup for more information.
If WAL logs are excessively generated due to rapid load and the data storage is low in capacity, you can delete the WAL logs using the capacity acquisition feature on the console. When you select Free Capacity from the console, a pop-up window appears to select WAL log for the DB instance. Select the WAL log and click Confirm to delete all WAL logs created before the selected item. The capacity acquisition feature is a function of temporarily securing capacity. If you continue to run out of capacity, you must scale up your data storage to meet the service load.
[Caution] Depending on the deleted WAL log, it may not be restored to a certain point in time.
Even though the settings of the parameter groups connected to the DB instance changed, it does not automatically apply to the DB instance. If the parameters applied to DB instance and the settings of the connected parameter group are different, Parameter button is displayed in the console.
You can apply changes to a parameter group to a DB instance using one of the following methods.
❶ Click Parameter for destination DB instance, or ❷ Select a destination DB instance and click on Apply Parameter Group Changes menu from the drop-down menu.
If the parameters that require restart in the parameter group are changed, such DB instance is restarted in the process of applying the changes.
❶ Click Compare Chnages to check the changed parameters. ❷ Click Confirm after checking the changes to apply the changed parameters to DB instances.
After backing up, you can export the backup file to user object storage in NHN Cloud. For details, see Export Backup Files.
You can restore to a DB instance using a backup file exported from RDS for PostgreSQL to object storage. For more information, see Restore using Backup in Object Storage.
To increase read performance, you can create read replicas that are available for read-only use. You can create up to five read replicas for a single master. You cannot create read replicas of read replicas.
To create a read replica, you need a backup file created on a DB instance that belongs to the replication group. If you do not have a backup file, select the DB instances to perform the backup in the following order
❶ Read replicas with auto backup enabled ❷ Masters with auto backup enabled
If there is no DB instance that meets the criteria, the request to create a read replica will fail.
[Caution] The read replica creation time may increase in proportion to the database size of the master. For DB instances that are backed up, there may be a drop in storage I/O performance during the read replica creation process.
[Note] Backup storage charges can be incurred for the amount of data storage required for the read replica creation process.
To create a read replica from the console,
❶ After selecting the source DB instance, click Create Read Replica to go to the page for creating a read replica.
You can create a read replica using the settings below.
When creating a read replica, the items listed below cannot be changed because they follow the settings of the original DB instance.
Select the availability zone for the read replica. For a detailed description, see Availability zones.
It is recommended that read replicas be created to the same specification or higher than the master; creating them to a lower specification can cause replication delays.
It is recommended to make it the same size as the source DB instance. If you set a smaller size, the replication process may be interrupted due to insufficient data storage capacity.
Select whether to use a floating IP for the read replica. For a detailed description, see Floating IP.
When selecting a parameter group for a read replica, we recommend that you select the same parameter group as the source DB instance unless you need to change any replication-related settings. For a detailed description of parameter groups, see Parameter Group.
Select the DB security group to apply to the read replica. The rules required for replication are applied automatically, so you do not need to add them to the DB security group. For a detailed description of DB security groups, see DB Security Group.
Select the backup settings for the read replica. For a detailed description of backups, see Backup and Restore.
Select whether to enable default notifications. For a detailed description, see Default notifications.
Select whether to enable erasure protection. For a detailed description, see Deletion Protection.
The process of breaking the replication relationship with a master and turning a read replica into a standalone master is called promotion. The promoted master will operate as a standalone DB instance. If there is a replication delay between the read replica and the master that you want to promote, the promotion will not occur until the delay is resolved. Once promoted, a DB instance cannot be reverted to its previous replication relationship.
[Caution] If the status of the master DB instance is abnormal, you cannot proceed with the promotion operation.
Force promotion based on current point-in-time data on the read replica, regardless of the state of the master. If there is a replication delay, data loss can occur. Therefore, we do not recommend using this feature unless there is an urgent need to bring the read replica into service.
To end the wait operation, when you are waiting for replication delays to resolve during a read replica promotion or force promotion,
❶ Click Replication Waiting brings up a popup window that allows you to end the waiting task. ❷ Click Confirm to end the waiting task.
A read replica can stop replicating for a number of reasons. If the status of a read replica is Replication stopped
, you should quickly determine the cause and get it back to normal. If the replication stopped
state persists for an extended period of time, replication latency will increase. If the WAL logs needed for normalization are not available, you will need to rebuild the read replica.
If you are unable to resolve replication issues with the read replica, you can restore it to a healthy state by rebuilding it. During this process, all databases in the read replica are deleted and rebuilt anew based on the master database. The read replica is unavailable during the rebuild. Rebuilding a read replica requires a backup file created on a DB instance that belongs to the replication group. If you do not have a backup file, see Create Read Replica for behavior and cautions.
[Note] Access information (domain, IP) does not change after rebuilding.
If you want to restart PostgreSQL, you can restart a DB instance. To minimize restart time, it is recommended to perform when service load is low.
To restart a DB instance, use console
❶ Select DB instance that you want to restart and click Restart DB Instance from the drop-down menu.
If PostgreSQL of a DB instance is not working properly, you can force a restart. For a forced restart, issue a SIGTERM command to PostgreSQL and wait 10 minutes for normal shutdown. After PostgreSQL shuts down successfully in 10 minutes, reboot the virtual machine afterward. If it does not shut down normally in 10 minutes, force a reboot of the virtual machine. If a virtual machine is forced to reboot, some work-in-progress transactions may be lost and the data volume may become corrupted, making it impossible to recover. After a forced restart, the state of the DB instance might not return to the enabled state. Please contact the customer center if such situation occurs.
[Caution] This feature should be avoided to use, except in urgent and unavoidable circumstances, as data may be lost or data volume may be compromised.
To force a DB instance restart from console
❶ Select the DB instance that you want to force restart and click on Force Restart DB Instance menu from the drop-down menu.
Enabling deletion protection secures DB instances from accidental deletion. You will not be able to delete that DB instance until you disable the feature. To change the deletion protection settings
❶ After selecting the DB instance for which you want to change the deletion protection settings, click Change Deletion Protection Settings from the drop-down menu, and a pop-up window will appear.
❷ Click Confrim after changing the deletion protection settings.
High availability DB instances increase availability and data durability and provide a fault-tolerant database. High availability DB instances consist of a master, a spare master, and are created in different availability zones. The spare master is the DB instance in case of failure and is not normally available. For highly available DB instances, backups are performed on the spare master.
[Note] For highly available DB instances, if you force replication from another DB instance or from an external PostgreSQL master with a PostgreSQL query statement, high availability and some features will not work properly.
The redundant master has a process for detecting failures, which periodically detects the health of the master. These detection cycles are called ping intervals, and failover occurs if four consecutive health checks fail. The shorter the ping interval, the more sensitive it is to failures, and the longer the ping interval, the more insensitive it is to failures. It is important to set the appropriate ping interval for your service load.
[Note] Note that if the master's data storage usage fills up, the high availability watchdog process detects it as a failure and takes failover.
If the redundant master fails four consecutive health checks on the master, it determines that the master is unable to provide service and automatically fails over. To prevent split-brain, all user security groups assigned to the failed master are unlinked to prevent external access, and the redundant master assumes the role of the master. The internal virtual IP for connectivity is changed from the failed master to the reserve master, so no changes to the application are required. When failover is complete, the failed master's type is changed to Failed Master and the reserve master's type is changed to Master. During the failover process, automatic recovery occurs for the failed master, and if the automatic recovery is successful, the failed master functions as a spare master again. Failover does not occur until the failed master is recovered or rebuilt. The promoted master inherits all automatic backups from the failed master. You can restore a point in time from the time a new backup was taken on the promoted master.
[Note] Since the high availability feature is based on domains, if the network environment is such that the client attempting to connect cannot reach the DNS server, the DB instance cannot be accessed through the domain, and normal access is not possible in the event of a failover. Access may be temporarily interrupted while the internal virtual IP is changing from the spare master to the master.
A master that fails and becomes failover is called a failed master. Automatic backups of a failed master are not performed, and all other functions except recovering, rebuilding, detaching, and deleting a failed master cannot be performed.
If the consistency of the data was not broken during the failover process and the Archived Write Ahead Log was not lost between the time of the failure and the time you attempt to recover, you can recover the failed master and the promoted master back to a highly available configuration. The recovery will fail if the data is inconsistent or if the Archived Write Ahead Log, which is required for recovery, has been lost because it re-establishes the replication relationship with the promoted master with the failed master's database intact. If the recovery of a failed master fails, you can enable high availability again by rebuilding it.
To recover a failed master, run the
❶ Select the failed master you want to recover, and then click the Recover Failed Master menu from the drop-down menu.
If recovery of a failed master fails, you can use rebuild to enable high availability again. Unlike recovery, rebuilding removes all of the failed master's database and rebuilds it based on the promoted master's database. To rebuild a failed master, you need a backup file and an archived write ahead transaction log from one of the DB instances in the replication group. If you do not have a backup file, select the DB instance to perform the backup in the following order
❶ Read replicas with automatic backups enabled ❷ Masters with automatic backups enabled
If no DB instance meets the criteria, the request to rebuild the failed master fails.
[Caution] The time to rebuild a failed master may increase proportionally to the size of the database on the master. For DB instances that are backed up, there might be a drop in storage I/O performance during the rebuilding of the failed master. To rebuild a failed master, in the console, run the
❶ Select the failed master you want to rebuild, and then click the Rebuild Failed Master menu from the drop-down menu.
If the failed master recovery fails and data correction is required, you can disable the high availability feature by detaching the failed master. The replication relationship between the detached master and the promoted master is broken and each behaves as a normal DB instance. Once detached, it is not possible to recover it back to its original configuration.
To detach a failed master, go to the Console
❶ Select the failed master you want to detach, and then click the Detach Failed Master menu from the drop-down menu.
For highly available DB instances, when you perform an operation that involves a restart, you can choose whether to restart with failover or not, as shown below.
When you restart with failover, the reserve master is restarted first. Failover then promotes the reserve master to master, and the existing master acts as the reserve master. Upon promotion, the internal virtual IP for connectivity changes from the master to the reserve master, so no changes to the application are required. The promoted master inherits all automatic backups from the old master.
[Note] Since the high availability feature is based on domains, if the network environment is such that the client attempting to connect cannot reach the DNS server, the DB instance cannot be accessed through the domain, and normal access is not possible in the event of a failover.
[Caution] If the replication delay value of the spare master and the read replicas included in the replication group is 1 or more, replication delay is considered to have occurred, and manual failover fails. It is recommended that you perform manual failover during off-peak hours. Restart failures due to replication delay can be checked through the Events screen. When restarting with failover, you can select the following additional items to increase reliability
You can proceed with a manual backup immediately after the restart with failover is complete.
You can either apply the changes to the spare master first and observe how they evolve, or you can control the timing of the failover directly from the console if you want to execute the failover at a precise time. If you choose to manually control failover, a failover button appears in the console ❶ after the spare master restarts. Clicking this button triggers a failover, which can wait up to five days to execute. If you do not run the failover within 5 days, the action is automatically canceled.
[Caution] There is no automatic failover while waiting for failover.
Enabling the Wait for replication latency to clear option allows you to wait for replication latency to clear for the spare master and the read replicas included in the replication group.
You have the option to additionally block write loads while resolving replication delays. Blocking the write load puts the master into read-only mode just before failover, setting all change queries to fail.
You can temporarily pause a high availability feature in situations where you anticipate connection disruptions or large loads due to temporary operations. When a high-availability feature is paused, it does not detect a failure and therefore does not perform failover. Performing an operation that requires a restart while a high-availability feature is paused does not resume the paused high-availability feature. Because data replication occurs normally when a high-availability feature is paused, or because a failure is not detected, it is not recommended to leave it paused for extended periods of time.
Replication on a spare master can be interrupted for a variety of reasons, such as a disconnection in the network or the establishment of replication from another master. To resolve a replication interruption on a spare master, you must rebuild the spare master. Rebuilding a spare master removes all of the database on the spare master and rebuilds it based on the database on the master. During this process, if the backup files required for the rebuild do not exist in the master database, a backup is performed on the master, and performance degradation due to the backup can occur.
pg_dump -h {DB instance external domain address} -U {DB instance user ID} -p {DB instance connection port} -d {Database name to export} -f {file path to save locally}
pg_dump -h {DB instance external domain address} -U {DB instance user ID} -p {DB instance connection port} -d {database name to export} | psql -h {external PostgreSQL connection address} -U {external PostgreSQL user ID} -p {external PostgreSQL connection port} -d {external PostgreSQL database name}
Create a DB instance to import data from, selecting Use Floating IP.
Ensure that the DB instance you are importing has enough capacity.
On the Database & User tab, pre-create the required databases.
Execute the command below to get data from an external source.
pg_dump -h {external PostgreSQL connection address} -U {external PostgreSQL user ID} -p {external PostgreSQL connection port} -d {external PostgreSQL database name} | psql -h {DB instance external domain address} -U {DB instance user ID} -p {DB instance connection port} -d {DB instance database name}
NHN Cloud periodically updates the hypervisor software of DB instances to improve security and reliability. DB instances running on the hypervisor being checked for maintenance must be migrated to the hypervisor being checked for maintenance.
DB instance migration can be initiated from NHN Cloud console. Follow the guide below to use the migration feature on the console. Navigate to the project that contains the DB instance that you specify to maintenance check.
Those with the migration button next to name are the maintenance targets.
You can check the detailed schedule of maintenance by putting the mouse pointer over the migration button.
Take appropriate measures to avoid affecting services connected to the DB. If you have no choice but to affect the service, please contact NHN Cloud Customer Center and we will guide you with appropriate measures.
If the DB instance status does not change, 'refresh'.
No action is allowed while the DB instance is being migrated. If DB instance migration does not complete successfully, it will be reported to the administrator automatically, and NHN Cloud will contact you separately.