Managed PostgreSQL
Learn about connecting a managed PostgreSQL service with Seldon Enterprise Platform.
You can connect a managed PostgreSQL service in AWS RDS and Google Cloud SQL with Seldon Enterprise Platform. After you have a running PostgreSQL instance, with a database and a user created, you can configure Seldon Enterprise Platform by adding the metadata-postgres
secret.
Prerequisites
Install Seldon Enterprise Platform.
Install Ingress Controller.
Configure PostgreSQL with Seldon Enterprise Platform
To configure a PostgreSQL database with Seldon Enterprise Platform:
Execute the following after substituting the variables
<your_user>
,<your_password>
,<metadata>
, and<your.postgres.host>
with those from your database:Note: If you would like to configure PostgreSQL with SSL, see the SSL Support section.
Add the following to your
install-values.yaml
file.Change to the directory that contains the
install-values.yaml
file and then upgrade the Seldon Enterprise Platform installation in the namespaceseldon-system
.Check the status of the installation seldon-enterprise-seldon-deploy.
When the installation is complete you should see this:
Access Seldon Enterprise Platform.
Get the Pod that is running Seldon Enterprise Platform in the cluster and save it as
$POD_NAME.
You can use port-forwarding to access your application locally.
Open your browser and navigate to
http://127.0.0.1:8000/seldon-deploy/
to access Seldon Enterprise Platform.
SSL Support¶
By default, Seldon Enterprise Platform does not perform any verification of the Postgres server certificate. To allow server certificate verification, change the SSL mode to verify-ca
or verify-full
as needed and place one or more root certificates in the ca.crt
key in the kubernetes secret. Also add any intermediate certificates to the file if they are needed to link the certificate chain sent by the server to the root certificates stored on the client.
Execute the following after substituting the variables <your_user>
, <your_password>
,<metadata>
, and <your.postgres.host>
with those from your database:
Further, if the server attempts to verify the identity of the client by requesting the client’s leaf certificates, create another kubernetes TLS secret with client certificates for the connection. You can create a secret named postgres-client-certs
.
Next
You may now explore the Model Catalog feature in Seldon Enterprise Platform.
Last updated