{ config, pkgs, lib, ... }: let backupDir = "/var/lib/postgresql/backups"; in { services.postgresql = { enable = true; package = pkgs.postgresql_15; enableTCPIP = true; dataDir = "/data/postgresql"; authentication = '' host all all 129.241.210.128/25 md5 host all all 2001:700:300:1900::/64 md5 ''; # Hilsen https://pgconfigurator.cybertec-postgresql.com/ settings = { # Connectivity max_connections = 500; superuser_reserved_connections = 3; # Memory Settings shared_buffers = "8192 MB"; work_mem = "32 MB"; maintenance_work_mem = "420 MB"; effective_cache_size = "22 GB"; effective_io_concurrency = 100; random_page_cost = 1.25; # Monitoring shared_preload_libraries = "pg_stat_statements"; track_io_timing = true; track_functions = "pl"; # Replication wal_level = "replica"; max_wal_senders = 0; synchronous_commit = false; # Checkpointing: checkpoint_timeout = "15 min"; checkpoint_completion_target = 0.9; max_wal_size = "1024 MB"; min_wal_size = "512 MB"; # WAL writing wal_compression = true; wal_buffers = -1; # Background writer bgwriter_delay = "200ms"; bgwriter_lru_maxpages = 100; bgwriter_lru_multiplier = 2.0; bgwriter_flush_after = 0; # Parallel queries: max_worker_processes = 8; max_parallel_workers_per_gather = 4; max_parallel_maintenance_workers = 4; max_parallel_workers = 8; parallel_leader_participation = true; # Advanced features enable_partitionwise_join = true; enable_partitionwise_aggregate = true; max_slot_wal_keep_size = "1000 MB"; track_wal_io_timing = true; maintenance_io_concurrency = 100; wal_recycle = true; # SSL ssl = true; ssl_cert_file = "/run/credentials/postgresql.service/cert"; ssl_key_file = "/run/credentials/postgresql.service/key"; }; }; systemd.services.postgresql.serviceConfig = { LoadCredential = [ "cert:/etc/certs/postgres.crt" "key:/etc/certs/postgres.key" ]; }; environment.snakeoil-certs."/etc/certs/postgres" = { owner = "postgres"; group = "postgres"; subject = "/C=NO/O=Programvareverkstedet/CN=postgres.pvv.ntnu.no/emailAddress=drift@pvv.ntnu.no"; }; networking.firewall.allowedTCPPorts = [ 5432 ]; networking.firewall.allowedUDPPorts = [ 5432 ]; # NOTE: instead of having the upstream nixpkgs postgres backup unit trigger # another unit, it was easier to just make one ourselves systemd.services."backup-postgresql" = { description = "Backup PostgreSQL data"; requires = [ "postgresql.service" ]; path = [ pkgs.coreutils pkgs.rsync pkgs.gzip config.services.postgresql.package ]; script = let rotations = 10; sshTarget1 = "root@isvegg.pvv.ntnu.no:/mnt/backup1/bicep/postgresql"; sshTarget2 = "root@isvegg.pvv.ntnu.no:/mnt/backup2/bicep/postgresql"; in '' set -eo pipefail pg_dumpall -U postgres | gzip -c -9 --rsyncable > "${backupDir}/$(date --iso-8601)-dump.sql.gz" while [ $(ls -1 "${backupDir}" | wc -l) -gt ${toString rotations} ]; do rm $(find "${backupDir}" -type f -printf '%T+ %p\n' | sort | head -n 1 | cut -d' ' -f2) done rsync -avz --delete "${backupDir}" '${sshTarget1}' rsync -avz --delete "${backupDir}" '${sshTarget2}' ''; serviceConfig = { Type = "oneshot"; User = "postgres"; Group = "postgres"; UMask = "0077"; ReadWritePaths = [ backupDir ]; }; startAt = "*-*-* 01:15:00"; }; systemd.tmpfiles.settings."10-postgresql-backup".${backupDir}.d = { user = "postgres"; group = "postgres"; mode = "700"; }; }