• Logo
    Charmed PostgreSQL K8s
  • canonical.com/data/postgresql
  • More resources
    • Discourse
    • Matrix
    • GitHub
Contents Menu Expand Light mode Dark mode Auto light/dark, in light mode Auto light/dark, in dark mode Skip to content
Charmed PostgreSQL K8s 16 documentation
Charmed PostgreSQL K8s 16 documentation
  • Tutorial
  • How-to guides
    • Deploy
      • Canonical K8s
      • GKE
      • EKS
      • AKS
      • Multi-AZ
      • Terraform
      • Air-gapped
    • Scale
    • Integrate
    • Manage passwords
    • Enable TLS
    • Enable plugins/extensions
    • External network access
    • Enable LDAP
    • Back up and restore
      • Configure S3 AWS
      • Configure S3 RadosGW
      • Create a backup
      • Restore a backup
      • Manage backup retention
      • Migrate a cluster
    • Data migration
      • Migrate data from PostgreSQL 14 to 16
      • Migrate data via `pg_dump`
      • Migrate data via backup/restore
    • Monitoring (COS)
      • Enable monitoring
      • Enable alert rules
      • Enable tracing
    • Refresh (upgrade)
    • Cross-regional async replication
      • Set up clusters
      • Integrate with a client app
      • Remove or recover a cluster
    • Logical replication
      • Set up two clusters
      • Re-enable logical replication
    • Integrate PostgreSQL with your charm
  • Reference
    • Releases
    • System requirements
    • Performance and resources
    • Troubleshooting
    • Charm statuses
    • Plugins/extensions
    • Alert rules
    • Software testing
    • Contacts
  • Explanation
    • Architecture
    • Interfaces and endpoints
    • Legacy charm
    • Juju
    • Users
    • Roles
    • Logs
    • Connection pooling
    • Security
      • Cryptography
    • Flowcharts
      • Charm
      • Backups
      • Relations
Back to top
Contribute to this page

Explanation¶

Additional context about the PostgreSQL charm, including design, legacy information, and security.

Core¶

Core concepts about the history and design of the charm:

  • Architecture
  • Interfaces and endpoints
  • Legacy charm
  • Juju

Operation¶

Clarification of standard operational concepts:

  • Users
  • Roles
  • Logs
  • Connection pooling

Security¶

Security hardening overview:

  • Security

Development¶

Charm event flowcharts:

  • Flowcharts
    • Charm
    • Backups
    • Relations
Copyright © 2026 CC-BY-SA, Canonical Ltd.
Last updated on Mar 26, 2026
Manage your tracker settings
Contents
  • Explanation
    • Core
    • Operation
    • Security
    • Development