MaxScale Database Proxy
MaxScale is a sophisticated database proxy, router, and load balancer designed specifically for and by MariaDB. It provides a range of features that ensure optimal high availability:
- Query-based routing: Transparently route write queries to the primary nodes and read queries to the replica nodes.
- Connection-based routing: Load balance connections between multiple servers.
- Automatic primary failover based on MariaDB internals.
- Replay pending transactions when a server goes down.
- Support for Galera and Replication.
To better understand what MaxScale is capable of you may check the product page and the documentation.
Table of contents
- MaxScale resources
MaxScale
CRMariaDB
CRMaxScale
embedded inMariaDB
- Defaults
- Server configuration
- Server maintenance
- Configuration
- Authentication
- Kubernetes
Services
- Connection
- High availability
- Suspend resources
- MaxScale GUI
- MaxScale API
- Troubleshooting
MaxScale resources
Prior to configuring MaxScale within Kubernetes, it's essential to have a basic understanding of the resources managed through its API.
Servers
A server defines the backend database servers that MaxScale forwards traffic to. For more detailed information, please consult the server reference.
Monitors
A monitor is an agent that queries the state of the servers and makes it available to the services in order to route traffic based on it. For more detailed information, please consult the monitor reference.
Depending on which highly available configuration your servers have, you will need to choose betweeen the following modules:
- Galera Monitor: Detects whether servers are part of the cluster, ensuring synchronization among them, and assigning primary and replica roles as needed.
- MariaDB Monitor: Probes the state of the cluster, assigns roles to the servers, and executes failover, switchover, and rejoin operations as necessary.
Services
A service defines how the traffic is routed to the servers based on a routing algorithm that takes into account the state of the servers and its role. For more detailed information, please consult the service reference.
Depending on your requirements to route traffic, you may choose between the following routers:
- Readwritesplit: Route write queries to the primary server and read queries to the replica servers.
- Readconnroute: Load balance connections between multiple servers.
Listeners
A listener specifies a port where MaxScale listens for incoming connections. It is associated with a service that handles the requests received on that port. For more detailed information, please consult the listener reference.
MaxScale
CR
The minimal spec you need to provision a MaxScale instance is just a reference to a MariaDB
resource:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: mariaDbRef: name: mariadb-galera
This will provision a new StatefulSet
for running MaxScale and configure the servers specified by the MariaDB
resource. Refer to the Server configuration section if you want to manually configure the MariaDB servers.
The rest of the configuration uses reasonable defaults set automatically by the operator. If you need a more fine grained configuration, you can provide this values yourself:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... mariaDbRef: name: mariadb-galera services: - name: rw-router router: readwritesplit listener: port: 3306 monitor: interval: 2s cooperativeMonitoring: majority_of_all params: disable_master_failback: "false" available_when_donor: "false" disable_master_role_setting: "false" kubernetesService: type: LoadBalancer metadata: annotations: metallb.universe.tf/loadBalancerIPs: 172.18.0.224
As you can see, the MaxScale resources we previously mentioned have a counterpart resource in the MaxScale
CR.
You also need to set a reference in the MariaDB
resource to make it MaxScale
-aware. This is explained in the MariaDB CR section.
Refer to the API reference for further detail.
MariaDB
CR
You can set a spec.maxScaleRef
in your MariaDB
resource to make it MaxScale
-aware. By doing so, the primary server reported by MaxScale
will be used in MariaDB
and the high availability tasks such the primary failover will be delegated to MaxScale
:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MariaDB metadata: name: mariadb-galera spec: ... maxScaleRef: name: maxscale-galera galera: enabled: true
Refer to the API reference for further detail.
MaxScale
embedded in MariaDB
To streamline the setup outlined in the MaxScale CR and MariaDB CR sections, you can provision a MaxScale
to be used with MariaDB
in just one resource:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MariaDB metadata: name: mariadb-galera spec: ... maxScale: enabled: true kubernetesService: type: LoadBalancer metadata: annotations: metallb.universe.tf/loadBalancerIPs: 172.18.0.229 galera: enabled: true
This will automatically set the references between MariaDB
and MaxScale
and default the rest of the fields.
It is important to note that, this is intended for simple use cases that only require a single replica and where no further modifications are done on the spec.maxscale
field. If you need a more fine grained configuration and perform further updates to the MaxScale
resource, please use a dedicated MaxScale
as described in the MaxScale CR section.
Refer to the API reference for further detail.
Defaults
MariaDB Enterprise Operator aims to provide highly configurable CRs, but at the same time maximize its usability by providing reasonable defaults. In the case of MaxScale
, the following defaulting logic is applied:
spec.servers
are inferred fromspec.mariaDbRef
.spec.monitor.module
is inferred from thespec.mariaDbRef
.spec.monitor.cooperativeMonitoring
is set if high availability is enabled.- If
spec.services
is not provided, areadwritesplit
service is configured on port3306
by default.
Server configuration
As an alternative to provide a reference to a MariaDB
via spec.mariaDbRef
, you can also specify the servers manually:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... servers: - name: mariadb-0 address: mariadb-galera-0.mariadb-galera-internal.default.svc.cluster.local - name: mariadb-1 address: mariadb-galera-1.mariadb-galera-internal.default.svc.cluster.local - name: mariadb-2 address: mariadb-galera-2.mariadb-galera-internal.default.svc.cluster.local
As you could see, you can refer to in-cluser MariaDB servers by providing the DNS names of the MariaDB
Pods
as server addresses. In addition, you can also refer to external MariaDB instances running outside of the Kubernetes cluster where the operator was deployed:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... servers: - name: mariadb-0 address: 172.18.0.140 port: 3306 - name: mariadb-1 address: 172.18.0.141 - name: mariadb-2 address: 172.18.0.142 monitor: name: mariadb-monitor module: galeramon interval: 2s cooperativeMonitoring: majority_of_all params: disable_master_failback: "false" available_when_donor: "false" disable_master_role_setting: "false" auth: adminUsername: mariadb-enterprise-operator adminPasswordSecretKeyRef: name: maxscale key: password clientUsername: maxscale-client clientPasswordSecretKeyRef: name: maxscale key: password serverUsername: maxscale-server serverPasswordSecretKeyRef: name: maxscale key: password monitorUsername: maxscale-monitor monitorPasswordSecretKeyRef: name: maxscale key: password syncUsername: maxscale-sync syncPasswordSecretKeyRef: name: maxscale key: password
Pointing to external MariaDBs has a some limitations: Since the operator doesn't have a reference to a MariaDB
resource (spec.mariaDbRef
), it will be unable to perform the following actions:
- Infer the monitor module (
spec.monitor.module
), so it will need to be provided by the user. - Autogenerate authentication credentials (
spec.auth
), so they will need to be provided by the user. See Authentication section.
Server maintenance
You can put servers in maintenance mode by setting maintenance = true
:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... servers: - name: mariadb-0 address: mariadb-galera-0.mariadb-galera-internal.default.svc.cluster.local port: 3306 protocol: MariaDBBackend maintenance: true
Maintenance mode prevents MaxScale from routing traffic to the server and also excludes it from being elected as the new primary during failover events.
Configuration
Similar to MariaDB, MaxScale allows you to provide global configuration parameters in a maxscale.conf
file. You don't need to provide this config file directly, but instead you can use the spec.config.params
to instruct the operator to create the maxscale.conf
:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... config: params: log_info: "true" volumeClaimTemplate: resources: requests: storage: 100Mi accessModes: - ReadWriteOnce
Both this global configuration and the resources created by the operator using the MaxScale API are stored under a volume provisioned by the spec.config.volumeClaimTemplate
.
Refer to the MaxScale reference for more details about the supported parameters.
Authentication
MaxScale requires authentication with differents levels of permissions for the following components/actors:
- MaxScale API consumed by MariaDB Enterprise Operator.
- Clients connecting to MaxScale.
- MaxScale connecting to MariaDB servers.
- MaxScale monitor connecting to MariaDB servers.
- MaxScale configuration syncer to connect to MariaDB servers. See high availability section.
By default, the operator generates this credentials when spec.mariaDbRef
is set and spec.auth.generate = true
, but you are still able to provide your own:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... auth: generate: false adminUsername: mariadb-enterprise-operator adminPasswordSecretKeyRef: name: maxscale key: password deleteDefaultAdmin: true clientUsername: maxscale-client clientPasswordSecretKeyRef: name: maxscale key: password clientMaxConnections: 90 serverUsername: maxscale-server serverPasswordSecretKeyRef: name: maxscale key: password serverMaxConnections: 90 monitorUsername: maxscale-monitor monitorPasswordSecretKeyRef: name: maxscale key: password monitorMaxConnections: 90 syncUsername: maxscale-sync syncPasswordSecretKeyRef: name: maxscale key: password syncMaxConnections: 90
As you could see, you are also able to limit the number of connections for each component/actor. Bear in mind that, when running in high availability, you may need to increase this number, as more MaxScale instances implies more connections.
Kubernetes Services
To enable your applications to communicate with MaxScale, a Kubernetes Service
is provisioned with all the ports specified in the MaxScale listeners. You have the flexibility to provide a template to customize this Service
:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... kubernetesService: type: LoadBalancer metadata: annotations: metallb.universe.tf/loadBalancerIPs: 172.18.0.224
This results in the reconciliation of the following Service
:
apiVersion: v1 kind: Service metadata: annotations: metallb.universe.tf/loadBalancerIPs: 172.18.0.229 name: maxscale-galera spec: ... ports: - name: admin port: 8989 targetPort: 8989 - name: rw-router-listener port: 3306 targetPort: 3306 selector: app.kubernetes.io/instance: maxscale-galera app.kubernetes.io/name: maxscale type: LoadBalancer
There is also another Kubernetes Service
to access the GUI, please refer to the MaxScale GUI section for further detail.
Connection
You can leverage the Connection
resource to automatically configure connection strings as Secret
resources that your applications can mount:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: Connection metadata: name: connection-maxscale spec: maxScaleRef: name: maxscale-galera username: maxscale-galera-client passwordSecretKeyRef: name: maxscale-galera-client key: password secretName: conn-mxs port: 3306
Alternatively, you can also provide a connection template to your MaxScale
resource:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... connection: secretName: mxs-galera-conn port: 3306
Note that, the Connection
uses the Service
described in the Kubernetes Service section and you are able to specify which MaxScale service to connect to by providing the port (spec.port
) of the corresponding MaxScale listener.
High availability
To synchronize the configuration state across multiple replicas, MaxScale stores the configuration externally in a MariaDB table and conducts periodic polling across all replicas. By default, the table mysql.maxscale_config
is used, but this can be configured by the user as well as the synchronization interval.
Another crucial aspect to consider regarding HA is that only one monitor can be running at any given time to avoid conflicts. This can be achieved via cooperative locking, which can be configured by the user. Refer to MaxScale docs for more information.
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... replicas: 2 monitor: name: mariadb-monitor module: galeramon interval: 2s cooperativeMonitoring: majority_of_all params: disable_master_failback: "false" available_when_donor: "false" disable_master_role_setting: "false" config: sync: database: mysql interval: 5s timeout: 10s
Multiple MaxScale
replicas can be specified by providing the spec.replicas
field. Note that, MaxScale
exposes the scale subresource, so you can scale/downscale it by running the following command:
kubectl scale maxscale maxscale-galera --replicas 3
Suspend resources
In order to enable this feature, you must set the --feature-maxscale-suspend
feature flag:
helm upgrade --install mariadb-enterprise-operator mariadb-enterprise-operator/mariadb-enterprise-operator --set extraArgs={--feature-maxscale-suspend}
Then you will be able to suspend any MaxScale resources, for instance, you can suspend a monitor:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... monitor: name: mariadb-monitor module: galeramon interval: 2s cooperativeMonitoring: majority_of_all params: disable_master_failback: "false" available_when_donor: "false" disable_master_role_setting: "false" suspend: true
MaxScale GUI
MaxScale offers a great user interface that provides very useful information about the MaxScale resources. You can enable it by providing the following configuration:
apiVersion: enterprise.mariadb.com/v1alpha1 kind: MaxScale metadata: name: maxscale-galera spec: ... admin: port: 8989 guiEnabled: true guiKubernetesService: type: LoadBalancer metadata: metadata: annotations: metallb.universe.tf/loadBalancerIPs: 172.18.0.231
The GUI is exposed via a dedicated Kubernetes Service
in the same port as the MaxScale API. Once you access, you will need to enter the MaxScale API credentials configured by the operator in a Secret
. See the Authentication section for more details.
MaxScale API
MariaDB Enterprise Operator interacts with the MaxScale REST API to reconcile the specification provided by the user, considering both the MaxScale status retrieved from the API and the provided spec.
Troubleshooting
The operator tracks both the MaxScale
status in regards to Kubernetes resources as well as the status of the MaxScale API resources. This information is available on the status field of the MaxScale
resource, it may be very useful for debugging purposes:
status: conditions: - lastTransitionTime: "2024-02-08T17:29:01Z" message: Running reason: MaxScaleReady status: "True" type: Ready configSync: databaseVersion: 20 maxScaleVersion: 20 listeners: - name: rw-router-listener state: Running monitor: name: galeramon-monitor state: Running primaryServer: mariadb-galera-1 replicas: 1 servers: - name: mariadb-galera-0 state: Slave, Synced, Running - name: mariadb-galera-1 state: Master, Synced, Running - name: mariadb-galera-2 state: Slave, Synced, Running services: - name: rw-router state: Started
Kubernetes events emitted by mariadb-enterprise-operator
may also be very relevant for debugging. For instance, an event is emitted whenever the primary server changes:
kubectl get events --field-selector involvedObject.name=mariadb-repl-maxscale --sort-by='.lastTimestamp' LAST SEEN TYPE REASON OBJECT MESSAGE 24s Normal MaxScalePrimaryServerChanged maxscale/mariadb-repl-maxscale MaxScale primary server changed from 'mariadb-repl-0' to 'mariadb-repl-1'
The operator logs can also be a good source of information for troubleshooting. You can increase its verbosity and enable MaxScale API request logs by running:
helm upgrade --install mariadb-enterprise-operator mariadb-enterprise-operator/mariadb-enterprise-operator --set logLevel=debug --set extraArgs={--log-maxscale}
Common errors
Permission denied writing /var/lib/maxscale
This error occurs when the user that runs the container does not have enough privileges to write in /var/lib/maxscale
:
Failed to create directory '/var/lib/maxscale/maxscale.cnf.d': 13, Permission denied
To mitigate this, by default, the operator sets the following securityContext
in the MaxScale
's StatefulSet
:
apiVersion: apps/v1 kind: StatefulSet metadata: name: maxscale-galera spec: securityContext: fsGroup: 999 runAsGroup: 999 runAsNonRoot: true runAsUser: 999
This enables the CSIDriver
and the kubelet to recursively set the ownership ofr the /var/lib/maxscale
folder to the group 999
, which is the one expected by MaxScale. It is important to note that not all the CSIDrivers
implementations support this feature, see the CSIDriver documentation for further information.