This directory contains the configurations and scripts required to run Supabase inside a Kubernetes cluster.
We use supabase/postgres to create and manage the Postgres database. This permit you to use replication if needed but you'll have to use the Postgres image provided Supabase or build your own on top of it. You can also choose to use other databases provider like StackGres or Postgres Operator.
For the moment we are using a root container to permit the installation of the missing pgjwt
and wal2json
extension inside the initdbScripts
. This is considered a security issue, but you can use your own Postgres image instead with the extension already installed to prevent this. We provide an example of Dockerfile
for this purpose, you can use ours or build and host it on your own.
The database configuration we provide is an example using only one master. If you want to go to production, we highly recommend you to use a replicated database.
For this section we're using Minikube and Docker to create a Kubernetes cluster
# Clone Repository
git clone https://github.com/supabase-community/supabase-kubernetes
# Switch to charts directory
cd supabase-kubernetes/charts/supabase/
# Install the chart
helm install demo -f values.example.yaml .
The first deployment can take some time to complete (especially auth service). You can view the status of the pods using:
kubectl get pod -l app.kubernetes.io/instance=demo
NAME READY STATUS RESTARTS AGE
demo-supabase-analytics-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-auth-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-db-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-functions-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-imgproxy-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-kong-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-meta-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-realtime-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-rest-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
demo-supabase-storage-xxxxxxxxxx-xxxxx 1/1 Running 0 47s
Assuming that you have enabled Minikube ingress addon, note down the Minikube IP address:
minikube ip
Then, add the IP into your /etc/hosts
file:
# This will redirect request for example.com to the minikube IP
<minikube-ip> example.com
Open http://example.com in your browser.
# Uninstall Helm chart
helm uninstall demo
# Backup and/or remove any Persistent Volume Claims that have keep annotation
kubectl delete pvc demo-supabase-storage-pvc
You should consider to adjust the following values in values.yaml
:
RELEASE_NAME
: Name used for helm releaseSTUDIO.EXAMPLE.COM
URL to Studio
If you want to use mail, consider to adjust the following values in values.yaml
:
SMTP_ADMIN_MAIL
SMTP_HOST
SMTP_PORT
SMTP_SENDER_NAME
We encourage you to use your own JWT keys by generating a new Kubernetes secret and reference it in values.yaml
:
secret:
jwt:
anonKey: <new-anon-jwt>
serviceKey: <new-service-role-jwt>
secret: <jwt-secret>
32 characters long secret can be generated with
openssl rand 64 | base64
You can use the JWT Tool to generate anon and service keys.
Connection credentials for the SMTP mail server will also be provided via Kubernetes secret referenced in values.yaml
:
secret:
smtp:
username: <your-smtp-username>
password: <your-smtp-password>
DB credentials will also be stored in a Kubernetes secret and referenced in values.yaml
:
secret:
db:
username: <db-username>
password: <db-password>
database: <supabase-database-name>
The secret can be created with kubectl via command-line:
If you depend on database providers like StackGres, Postgres Operator or self-hosted Postgres instance, fill in the secret above and modify any relevant Postgres attributes such as port or hostname (e.g.
PGPORT
,DB_HOST
) for any relevant deployments. Refer to values.yaml for more details.
By default, a username and password is required to access the Supabase Studio dashboard. Simply change them at:
secret:
dashboard:
username: supabase
password: this_password_is_insecure_and_should_be_updated
A new logflare secret API key is required for securing communication between all of the Supabase services. To set the secret, generate a new 32 characters long secret similar to the step above.
secret:
analytics:
apiKey: your-super-secret-with-at-least-32-characters-long-logflare-key
Supabase storage supports the use of S3 object-storage. To enable S3 for Supabase storage:
- Set S3 key ID and access key:
secret:
s3:
keyId: your-s3-key-id
accessKey: your-s3-access-key
- Set storage S3 environment variables:
storage:
environment:
# Set S3 endpoint if using external object-storage
# GLOBAL_S3_ENDPOINT: http://minio:9000
STORAGE_BACKEND: s3
GLOBAL_S3_PROTOCOL: http
GLOBAL_S3_FORCE_PATH_STYLE: true
AWS_DEFAULT_REGION: stub
- (Optional) Enable internal minio deployment
minio:
enabled: true
We didn't provide a complete configuration to go production because of the multiple possibility.
But here are the important points you have to think about:
- Use a replicated version of the Postgres database.
- Add SSL to the Postgres database.
- Add SSL configuration to the ingresses endpoints using either the
cert-manager
or a LoadBalancer provider. - Change the domain used in the ingresses endpoints.
- Generate a new secure JWT Secret.
Migration from local development is made easy by adding migration scripts at db.config
field. This will apply all of the migration scripts during the database initialization. For example:
db:
config:
20230101000000_profiles.sql: |
create table profiles (
id uuid references auth.users not null,
updated_at timestamp with time zone,
username text unique,
avatar_url text,
website text,
primary key (id),
unique(username),
constraint username_length check (char_length(username) >= 3)
);
To make copying scripts easier, use this handy bash script:
#!/bin/bash
for file in $1/*; do
clipboard+=" $(basename $file): |\n"
clipboard+=$(cat $file | awk '{print " "$0}')
clipboard+="\n"
done
echo -e "$clipboard"
and pipe it to your system clipboard handler:
# Using xclip as an example
./script.sh supabase/migrations | xclip -sel clipboard
Depending on your Kubernetes version you might want to fill the className
property instead of the kubernetes.io/ingress.class
annotations. For example:
kong:
ingress:
enabled: 'true'
className: "nginx"
annotations:
nginx.ingress.kubernetes.io/rewrite-target: /
Before creating a merge request, you can test the charts locally by using helm/chart-testing. If you have Docker and a Kubernetes environment to test with, simply run:
# Run chart-testing (lint)
docker run -it \
--workdir=/data \
--volume $(pwd)/charts/supabase:/data \
quay.io/helmpack/chart-testing:v3.7.1 \
ct lint --validate-maintainers=false --chart-dirs . --charts .
# Run chart-testing (install)
docker run -it \
--network host \
--workdir=/data \
--volume ~/.kube/config:/root/.kube/config:ro \
--volume $(pwd)/charts/supabase:/data \
quay.io/helmpack/chart-testing:v3.7.1 \
ct install --chart-dirs . --charts .
supabase/postgres
is updated from14.1
to15.1
, which warrants backing up all your data before proceeding to update to the next major version.- Intialization scripts for
supabase/postgres
has been reworked and matched closely to the Docker Compose version. Further tweaks to the scripts are needed to ensure backward-compatibility. - Migration scripts are now exposed at
db.config
, which will be mounted at/docker-entrypoint-initdb.d/migrations/
. Simply copy your migration files from your local project'ssupabase/migration
and populate thedb.config
. - Ingress are now limited to
kong
&db
services. This is by design to limit entry to the stack through securekong
service. kong.yaml
has been modified to follow Docker kong.yaml template.supabase/storage
does not comes with pre-populated/var/lib/storage
, therefore anemptyDir
will be created if persistence is disabled. This might be incompatible with previous version if the persistent storage location is set to location other than specified above.supabase/vector
requires read access to the/var/log/pods
directory. When run in a Kubernetes cluster this can be provided with a hostPath volume.