Architecture
Pigsty’s modular architecture, compose modules in a declarative manner
Pigsty’s modular architecture, compose modules in a declarative manner
Define business users & roles in PostgreSQL, which is the object created by SQL CREATE USER/ROLE
Define business databases in PostgreSQL, which is the object create by SQL CREATE DATABASE
Define and create new services, and expose them via haproxy
Define, Create, Install, Enable Extensions in Pigsty
Host-Based Authentication in Pigsty, how to manage HBA rules in Pigsty?
Learn about core concept about Pigsty: architecture, cluster models, infra, PG HA, PITR, and service access.
Pigsty comes with a set of self-signed CA PKI for issuing SSL certs to encrypt network traffic.
Pigsty uses Patroni to achieve high availability for PostgreSQL, ensuring automatic failover.
Built-in roles system, and battery-included access control model in Pigsty.
Pigsty has moderate security best-practice: password & certs, built-in ACLs, encrypted network traffics and cold backups