New to KubeDB? Please start here.
Initialization PgBouncer from a Git Repository
This guide demonstrates how to use KubeDB to initialize a PgBouncer database with initialization scripts (.sql, .sh, .js and/or .sql.gz) stored in a public or private Git repository.
To fetch the repository contents, KubeDB uses a sidecar container called git-sync.
In this example, we will initialize PgBouncer using a .sql script from the GitHub repository [kubedb/PgBouncer -init-scripts](https://github.com/kubedb/PgBouncer -init-scripts).
Before You Begin
At first, you need to have a Kubernetes cluster, and the
kubectlcommand-line tool must be configured to communicate with your cluster. If you do not already have a cluster, you can create one by using kind.Install
KubeDBProvisioner and Ops-manager operator in your cluster following the steps here.You should be familiar with the following
KubeDBconcepts:
To keep everything isolated, we are going to use a separate namespace called demo throughout this tutorial.
$ kubectl create ns demo
namespace/demo created
Note: YAML files used in this tutorial are stored in docs/examples/pgbouncer directory of kubedb/docs repository.
Prepare Postgres
Prepare a KubeDB Postgres cluster using this tutorial,but you have to set password as qrDy;GnX4QsKQ0UL.
Prepare PgBouncer
Now, we are going to deploy a PgBouncer with version 1.24.0.
From Public Git Repository
KubeDB implements a PgBouncer Custom Resource Definition (CRD) to define the specification of a PgBouncer database.
To initialize the database from a public Git repository, you need to specify the required arguments for the git-sync sidecar container within the PgBouncer resource specification.
The following YAML manifest shows an example PgBouncer object configured with git-sync:
apiVersion: kubedb.com/v1
kind: PgBouncer
metadata:
name: pb
namespace: demo
spec:
version: "1.24.0"
replicas: 1
database:
syncUsers: true
databaseName: "postgres"
databaseRef:
name: "quick-postgres"
namespace: demo
connectionPool:
maxClientConnections: 20
reservePoolSize: 5
init:
script:
git:
args:
- --repo=<default_git_repo_http_url>
- --depth=1
- --period=60s
- --one-time
resources: {}
scriptPath: <desired_script_path_in_repo>
kubectl create -f https://github.com/kubedb/docs/raw/v2025.10.17/docs/examples/pgbouncer/initialization/git-sync-public.yaml
PgBouncer .kubedb.com/pb created
Here,
.spec.init.script.git.argsspecifies the arguments for thegit-synccontainer. Thegit-synccontainer has one required flags:--repo– specifies the remote Git repository to sync.
Here, the value of the --link argument must match the value of spec.init.script.scriptPath.
The --link argument creates a symlink that always points to the latest synced data.
To know more about
git-syncconfiguration visit this link.
Now, wait until pb has status Ready. i.e,
$ kubectl get PgBouncer -n demo
NAME VERSION STATUS AGE
pb 1.24.0 Ready 49m
Next, we will connect to the PgBouncer database and verify the data inserted from the *.sql script stored in the Git repository.
$ kubectl exec -it -n demo pb-0 -- sh
Defaulted container "pgbouncer" out of: pgbouncer, git-sync (init)
/ $ cd init-scripts/
/init-scripts $ export PGPASSWORD="qrDy;GnX4QsKQ0UL"
/init-scripts $ psql -U postgres -d postgres -h localhost -p <db container port>
psql (16.10, server 13.13)
Type "help" for help.
postgres=# \dt
List of relations
Schema | Name | Type | Owner
--------+------------------------------+-------+----------
public | kubedb_write_check_pgbouncer | table | postgres
public | kubedb_write_check_pgpool | table | postgres
public | my_table | table | postgres
(3 rows)
my_table is created by the init.sql script stored in the Git repository.
From Private Git Repository
1. Using SSH Key
Git-sync supports using SSH protocol for pulling git content.
First, Obtain the host keys for your git server:
$ ssh-keyscan $YOUR_GIT_HOST > /tmp/known_hosts
$YOUR_GIT_HOSTrefers to the hostname of your Git server.
For example, if you are using GitHub, set the variable as follows:export YOUR_GIT_HOST=github.com
Use the kubectl create secret command to create a secret from your local SSH key and known hosts file.
This secret will be used by git-sync to authenticate with the Git repository.
Here, we are using the default SSH key file located at
$HOME/.ssh/id_rsa. If your SSH key is stored in a different location, please update the command accordingly. Also you can use any name instead ofgit-credsto create the secret.
$ kubectl create secret generic -n demo git-creds \
--from-file=ssh=$HOME/.ssh/id_rsa \
--from-file=known_hosts=/tmp/known_hosts
The following YAML manifest provides an example of a PgBouncer resource configured to use git-sync with a private Git repository:
apiVersion: kubedb.com/v1
kind: PgBouncer
metadata:
name: pb
namespace: demo
spec:
version: "1.24.0"
replicas: 1
database:
syncUsers: true
databaseName: "postgres"
databaseRef:
name: "postgres"
namespace: demo
connectionPool:
maxClientConnections: 20
reservePoolSize: 5
init:
script:
scriptPath: pgpool_pgb_script.git/pgbouncer
git:
args:
# use --ssh for private repository
# - --ssh
- --repo=git@github.com:Bonusree/pgpool_pgb_script.git
- --depth=1
- --period=60s
- --root=/init-script-from-git
# terminate after successful sync
- --one-time
authSecret:
name: git-creds
securityContext:
runAsUser: 65533
# run as git sync user
kubectl create -f https://github.com/kubedb/docs/raw/v2025.10.17/docs/guides/PgBouncer /initialization/yamls/git-sync-ssh.yaml
PgBouncer .kubedb.com/pb created
Here,
.spec.init.git.securityContext.runAsUser: 65533ensure the container runs as the dedicated non-rootgit-syncuser..spec.init.git.authSecretspecifies the secret containing theSSHkey.
Once the database reaches the Ready state, you can verify the data using the method described above.
2. Using Username and Personal Access Token(PAT)
First, create a Personal Access Token (PAT) on your Git host server with the required permissions to access the repository.
Then create a Kubernetes secret using the Personal Access Token (PAT):
Here, you can use any key name instead of
git-patto store the token in the secret.
$ kubectl create secret generic -n demo git-pat \
--from-literal=github-pat=<ghp_yourpersonalaccesstoken>
Now, create a PgBouncer resource that references the secret created above.
The following YAML manifest shows an example:
apiVersion: kubedb.com/v1
kind: PgBouncer
metadata:
name: pb
namespace: demo
spec:
database:
syncUsers: true
databaseName: "postgres"
databaseRef:
name: "postgres"
namespace: demo
connectionPool:
maxClientConnections: 20
reservePoolSize: 5
init:
script:
scriptPath: pgpool_pgb_script.git/pgbouncer
git:
args:
# update with your private repository
- --repo=https://github.com/Bonusree/pgpool_pgb_script.git
- --link=current
- --root=/git
- --credential={"url":"https://github.com","username":"Bonusree","password-file":"/etc/git-secret/github-pat"}
# terminate after one successful sync
- --one-time
authSecret:
# the name of the secret created above
name: git-pat
# run as git sync user
securityContext:
runAsUser: 65533
version: "1.24.0"
replicas: 1
deletionPolicy: WipeOut
kubectl create -f https://github.com/kubedb/docs/raw/v2025.10.17/docs/guides/PgBouncer /initialization/yamls/git-sync-pat.yaml
PgBouncer .kubedb.com/pb created
Once the database reaches the Ready state, you can verify the data using the method described above.
CleanUp
To clean up the Kubernetes resources created by this tutorial, run:
$ kubectl delete PgBouncer -n demo pb
$ kubectl delete ns demo































