Getting started

debops.postgresql role is only the "client" part. To have working a PostgreSQL installation, you also need to setup debops.postgresql_server role somewhere. It can be either on the same host, or on a separate host. See the debops.postgresql_server documentation to learn how to install the database server itself.

The PostgreSQL version installed by the role will be a default version offered by the distribution. If you want PostgreSQL 9.4 on Debian Wheezy, or an upstream version of the server, you can enable the upstream APT repository by adding in inventory:

postgresql__upstream: True

Check postgresql__preferred_version to learn more about selecting custom PostgreSQL versions.

Server configuration

The role supports different modes of operation, depending on the presence of a PostgreSQL server installed locally or not.

Local database server

If the database server is installed locally, it will be automatically detected and used by the debops.postgresql role without any additional configuration. Also, if a remote server was used previously, and a local one was installed, it will automatically override the remote configuration. You might need to recreate the databases and user accounts in that case.

Remote database server

If your PostgreSQL server is configured on a remote host and you don't have a local installation, debops.postgresql will detect that and won't manage the databases/user accounts without a server specified. To point it to a server, you need to set a variable in the inventory:

postgresql__server: ''

This needs to be a FQDN address or an IP address of a host with PostgreSQL server installed. This host will be accessed by Ansible using task delegation, so it needs to be accessible and managed by Ansible. Currently only 1 server at a time is supported by the role.

If you use debops.pki to manage SSL certificates and you configured PostgreSQL server with them, remote connections to the database should be automatically encrypted. Default server configuration requires remote connections to be done over SSL, otherwise connecion is dropped.

Example inventory

To enable PostgreSQL client support on a host, you need to add that host to [debops_service_postgresql] Ansible group:


When PostgreSQL server is properly configured, or installed locally, you can create user accounts and databases using inventory variables:


  - name: 'application'

  - name: 'application_production'
    flags: [ 'NOLOGIN' ]


  - database: 'application_production'
    owner:    'application_production'


  - roles:  [ 'application' ]
    groups: [ 'application_production' ]
    database: 'application_production'


  - owner: 'application'

Above set of variables will create a PostgreSQL roles application and application_production which is meant to manage the database and cannot directly be logged into. A application_production PostgreSQL database will be created on the server and application_production role will be its owner. application role will be granted access to application_production role and all of its objects.

Next, Ansible will ensure that local system group and user account application exists, and will create ~/.pgpass with PostgreSQL user and password stored for easier access.

Example playbook

Here's an example Ansible playbook that uses the debops.postgresql role:


- name: Manage PostgreSQL client
  hosts: [ 'debops_service_postgresql' ]
  become: True


    - role: debops.apt_preferences
      tags: [ 'role::apt_preferences' ]
        - '{{ postgresql__apt_preferences__dependent_list }}'

    - role: debops.postgresql
      tags: [ 'role::postgresql' ]

Local Ansible facts, custom tasks

Role creates a set of local Ansible facts which can be used by other roles to create database management tasks that work both with local and remote PostgreSQL servers. These facts are:

  • ansible_local.postgresql.delegate_to
  • ansible_local.postgresql.server
  • ansible_local.postgresql.port
  • ansible_local.postgresql.user
  • ansible_local.postgresql.version

These variables can be used in Ansible tasks to provide correct values pointing to the correct PostgreSQL server. An example set of tasks to create a role and database:

- name: Create database role
    name: '{{ application_database_user }}'
    password: '{{ application_database_password }}'
    state: 'present'
  delegate_to: '{{ ansible_local.postgresql.delegate_to }}'

- name: Create application database
    name: '{{ application_database_name }}'
    owner: '{{ application_database_user }}'
    state: 'present'
  delegate_to: '{{ ansible_local.postgresql.delegate_to }}'
  register: application_register_database