commit
a618612626
@ -0,0 +1,21 @@
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
@ -0,0 +1,27 @@
|
||||
apiVersion: v1
|
||||
name: ccdb
|
||||
version: 7.9.6
|
||||
appVersion: 10.3.23-1602
|
||||
description: Vicidial Database MariaDB Fast, reliable, scalable, and easy to use open-source relational database
|
||||
system. MariaDB Server is intended for mission-critical, heavy-load production systems
|
||||
as well as for embedding into mass-deployed software. Highly available MariaDB cluster.
|
||||
home: https://git.sapian.com.co/Sapian/callcenter-online-editon
|
||||
icon: https://www.sapian.cloud/wp-content/uploads/2020/05/Logo_cc_db_72dpi.png
|
||||
keywords:
|
||||
- mariadb
|
||||
- mysql
|
||||
- database
|
||||
- sql
|
||||
- prometheus
|
||||
- ccdb
|
||||
- voe
|
||||
- vicidial
|
||||
maintainers:
|
||||
- email: design@sapian.com.co
|
||||
name: Sebastian Rojo
|
||||
sources:
|
||||
- https://git.sapian.com.co/Sapian/callcenter-online-editon
|
||||
- https://github.com/bitnami/bitnami-docker-mariadb
|
||||
- https://github.com/prometheus/mysqld_exporter
|
||||
annotations:
|
||||
category: Database
|
||||
@ -0,0 +1,31 @@
|
||||
# Test values file for generating all of the yaml and check that
|
||||
# the rendering is correct
|
||||
|
||||
metrics:
|
||||
enabled: true
|
||||
|
||||
podDisruptionBudget:
|
||||
create: true
|
||||
|
||||
master:
|
||||
extraEnvVars:
|
||||
- name: TEST
|
||||
value: "3"
|
||||
|
||||
extraEnvVarsSecret: example-secret
|
||||
extraEnvVarsCM: example-cm
|
||||
|
||||
slave:
|
||||
extraEnvVars:
|
||||
- name: TEST
|
||||
value: "2"
|
||||
|
||||
extraEnvVarsSecret: example-secret-2
|
||||
extraEnvVarsCM: example-cm-2
|
||||
|
||||
rbac:
|
||||
create: true
|
||||
|
||||
serviceAccount:
|
||||
create: true
|
||||
name: mariadb-galera-service-account
|
||||
@ -0,0 +1,29 @@
|
||||
#!/bin/bash
|
||||
cat > /tmp/10-vici_db_createdb.sql <<EOF
|
||||
ALTER DATABASE asterisk CHARACTER SET utf8 COLLATE utf8_unicode_ci;
|
||||
|
||||
GRANT ALL PRIVILEGES ON asterisk.* TO 'ccagent'@'%' IDENTIFIED BY 'VOE_CHANGE_ME';
|
||||
|
||||
GRANT CREATE,ALTER on asterisk.* TO ccwebcustom@'%' IDENTIFIED BY 'VOE_CHANGE_ME';
|
||||
GRANT SELECT,INSERT,UPDATE,DELETE,LOCK TABLES on asterisk.* TO cctel@'%' IDENTIFIED BY 'VOE_CHANGE_ME';
|
||||
GRANT CREATE,ALTER on asterisk.* TO cctelcustom@'%' IDENTIFIED BY 'VOE_CHANGE_ME';
|
||||
|
||||
GRANT RELOAD ON *.* TO ccagent@'%';
|
||||
GRANT RELOAD ON *.* TO ccwebcustom@'%';
|
||||
GRANT RELOAD ON *.* TO cctel@'%';
|
||||
GRANT RELOAD ON *.* TO cctelcustom@'%';
|
||||
|
||||
EOF
|
||||
|
||||
password_root="${MARIADB_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_root=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
|
||||
password_db="${MARIADB_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_PASSWORD_FILE:-}" ]; then
|
||||
password_db=$(cat $MARIADB_PASSWORD_FILE)
|
||||
fi
|
||||
|
||||
|
||||
sed 's/VOE_CHANGE_ME/'${password_db}'/g' /tmp/10-vici_db_createdb.sql | mysql -uroot -p${password_root}
|
||||
@ -0,0 +1,12 @@
|
||||
#!/bin/bash
|
||||
password_root="${MARIADB_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_root=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
|
||||
password_db="${MARIADB_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_PASSWORD_FILE:-}" ]; then
|
||||
password_db=$(cat $MARIADB_PASSWORD_FILE)
|
||||
fi
|
||||
|
||||
/opt/bitnami/mariadb/bin/mysql_tzinfo_to_sql /usr/share/zoneinfo | mysql -uroot -p${password_root} mysql
|
||||
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,33 @@
|
||||
#!/bin/bash
|
||||
cat > /tmp/30-vici_sapian_customization.sql <<EOF
|
||||
UPDATE system_settings SET voicemail_timezones="newzealand=Pacific/Auckland\naustraliaeast=Australia/Sydney\naustraliacentral=Australia/Adelaide\naustraliawest=Australia/Perth\njapan=Asia/Tokyo\nphilippines=Asia/Manila\nchina=Asia/Shanghai\nmalaysia=Asia/Kuala_Lumpur\nthailand=Asia/Bangkok\nindia=Asia/Calcutta\npakistan=Asia/Karachi\nrussiaeast=Europe/Moscow\nkenya=Africa/Nairobi\neuropeaneast=Europe/Kiev\nsouthafrica=Africa/Johannesburg\neuropean=Europe/Copenhagen\nnigeria=Africa/Lagos\nuk=Europe/London\nbrazil=America/Sao_Paulo\nnewfoundland=Canada/Newfoundland\ncarribeaneast=America/Santo_Domingo\natlantic=Canada/Atlantic\nchile=America/Santiago\neastern=America/New_York\nperu=America/Lima\nco=America/bogota\ncentral=America/Chicago\nmexicocity=America/Mexico_City\nmountain=America/Denver\narizona=America/Phoenix\nsaskatchewan=America/Saskatchewan\npacific=America/Los_Angeles\nalaska=America/Anchorage\nhawaii=Pacific/Honolulu\neastern24=America/New_York\ncentral24=America/Chicago\nmountain24=America/Denver\npacific24=America/Los_Angeles\nmilitary=Zulu\n";
|
||||
UPDATE system_settings set default_voicemail_timezone='co';
|
||||
UPDATE system_settings set first_login_trigger='N';
|
||||
UPDATE system_settings set default_local_gmt='-5.00';
|
||||
UPDATE system_settings set default_phone_registration_password='${CCDB_DEFAULT_PHONE_REGISTRATION_PASSWORD}';
|
||||
UPDATE system_settings set default_phone_login_password='${CCDB_DEFAULT_PHONE_LOGIN_PASSWORD}';
|
||||
UPDATE system_settings set default_server_password='${CCDB_DEFAULT_SERVER_PASSWORD}';
|
||||
UPDATE system_settings set pass_key='${CCDB_PASS_KEY}';
|
||||
|
||||
UPDATE vicidial_users SET user='sapian', pass='${SAPIAN_PASSWORD}' ,pass_hash='' ,force_change_password='N' ,failed_login_count=0 where user='6666' and active='Y' and user_level > 6;
|
||||
UPDATE phones SET conf_secret='${CCDB_DEFAULT_PHONE_REGISTRATION_PASSWORD}' ,pass='${CCDB_DEFAULT_PHONE_REGISTRATION_PASSWORD}' ,local_gmt='-5.00' ,voicemail_timezone='co';
|
||||
UPDATE servers SET conf_secret='${CCDB_DEFAULT_SERVER_PASSWORD}' ,rebuild_conf_files='Y';
|
||||
INSERT INTO vicidial_screen_colors (colors_id,colors_name,active,menu_background,frame_background,std_row1_background,std_row2_background,std_row3_background,std_row4_background,std_row5_background,alt_row1_background,alt_row2_background,alt_row3_background,user_group,web_logo) VALUES
|
||||
('sapian_theme','Sapian Theme','Y','3c6e71','d9d9d9','BDFFBD','DFFFDE','BCD180','BCD180','BCD180','BDFFBD','004b3f','CCFFCC','---ALL---','SAPIAN.png')
|
||||
;
|
||||
|
||||
UPDATE system_settings set admin_screen_colors='sapian_theme', agent_screen_colors='sapian_theme', agent_chat_screen_colors='sapian_theme';
|
||||
UPDATE system_settings set default_phone_code='57';
|
||||
EOF
|
||||
|
||||
password_root="${MARIADB_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_root=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
|
||||
password_db="${MARIADB_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_PASSWORD_FILE:-}" ]; then
|
||||
password_db=$(cat $MARIADB_PASSWORD_FILE)
|
||||
fi
|
||||
|
||||
cat /tmp/30-vici_sapian_customization.sql | mysql -uroot -p${password_root} ${MARIADB_DATABASE}
|
||||
@ -0,0 +1,303 @@
|
||||
USE asterisk;
|
||||
INSERT INTO servers (server_id,server_description,server_ip,active,asterisk_version) values('voe-ccweb','voe-ccweb', '169.254.217.1','Y','13.24.1');
|
||||
INSERT INTO server_updater SET server_ip='169.254.217.1', last_update='';
|
||||
|
||||
INSERT INTO conferences values('8600001','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600002','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600003','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600004','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600005','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600006','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600007','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600008','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600009','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600010','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600011','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600012','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600013','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600014','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600015','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600016','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600017','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600018','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600019','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600020','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600021','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600022','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600023','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600024','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600025','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600026','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600027','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600028','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600029','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600030','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600031','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600032','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600033','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600034','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600035','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600036','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600037','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600038','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600039','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600040','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600041','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600042','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600043','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600044','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600045','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600046','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600047','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600048','169.254.217.1','');
|
||||
INSERT INTO conferences values('8600049','169.254.217.1','');
|
||||
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600051','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600052','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600053','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600054','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600055','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600056','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600057','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600058','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600059','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600060','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600061','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600062','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600063','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600064','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600065','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600066','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600067','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600068','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600069','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600070','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600071','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600072','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600073','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600074','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600075','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600076','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600077','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600078','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600079','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600080','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600081','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600082','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600083','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600084','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600085','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600086','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600087','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600088','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600089','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600090','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600091','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600092','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600093','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600094','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600095','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600096','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600097','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600098','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600099','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600100','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600101','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600102','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600103','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600104','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600105','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600106','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600107','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600108','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600109','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600110','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600111','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600112','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600113','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600114','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600115','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600116','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600117','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600118','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600119','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600120','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600121','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600122','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600123','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600124','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600125','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600126','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600127','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600128','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600129','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600130','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600131','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600132','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600133','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600134','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600135','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600136','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600137','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600138','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600139','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600140','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600141','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600142','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600143','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600144','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600145','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600146','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600147','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600148','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600149','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600150','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600151','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600152','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600153','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600154','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600155','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600156','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600157','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600158','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600159','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600160','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600161','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600162','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600163','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600164','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600165','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600166','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600167','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600168','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600169','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600170','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600171','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600172','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600173','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600174','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600175','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600176','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600177','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600178','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600179','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600180','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600181','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600182','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600183','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600184','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600185','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600186','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600187','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600188','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600189','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600190','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600191','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600192','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600193','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600194','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600195','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600196','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600197','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600198','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600199','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600200','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600201','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600202','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600203','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600204','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600205','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600206','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600207','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600208','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600209','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600210','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600211','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600212','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600213','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600214','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600215','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600216','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600217','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600218','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600219','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600220','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600221','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600222','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600223','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600224','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600225','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600226','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600227','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600228','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600229','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600230','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600231','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600232','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600233','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600234','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600235','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600236','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600237','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600238','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600239','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600240','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600241','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600242','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600243','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600244','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600245','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600246','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600247','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600248','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600249','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600250','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600251','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600252','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600253','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600254','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600255','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600256','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600257','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600258','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600259','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600260','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600261','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600262','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600263','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600264','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600265','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600266','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600267','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600268','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600269','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600270','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600271','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600272','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600273','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600274','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600275','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600276','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600277','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600278','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600279','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600280','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600281','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600282','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600283','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600284','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600285','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600286','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600287','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600288','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600289','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600290','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600291','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600292','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600293','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600294','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600295','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600296','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600297','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600298','169.254.217.1');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600299','169.254.217.1');
|
||||
@ -0,0 +1,303 @@
|
||||
USE asterisk;
|
||||
INSERT INTO servers (server_id,server_description,server_ip,active,asterisk_version) values('cctel-01-voe','cctel-01-voe', '169.254.217.2','Y','13.24.1');
|
||||
INSERT INTO server_updater SET server_ip='169.254.217.2', last_update='';
|
||||
|
||||
INSERT INTO conferences values('8600001','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600002','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600003','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600004','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600005','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600006','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600007','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600008','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600009','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600010','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600011','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600012','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600013','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600014','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600015','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600016','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600017','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600018','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600019','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600020','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600021','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600022','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600023','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600024','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600025','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600026','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600027','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600028','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600029','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600030','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600031','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600032','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600033','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600034','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600035','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600036','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600037','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600038','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600039','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600040','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600041','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600042','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600043','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600044','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600045','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600046','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600047','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600048','169.254.217.2','');
|
||||
INSERT INTO conferences values('8600049','169.254.217.2','');
|
||||
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600051','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600052','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600053','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600054','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600055','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600056','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600057','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600058','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600059','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600060','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600061','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600062','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600063','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600064','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600065','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600066','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600067','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600068','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600069','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600070','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600071','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600072','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600073','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600074','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600075','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600076','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600077','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600078','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600079','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600080','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600081','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600082','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600083','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600084','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600085','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600086','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600087','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600088','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600089','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600090','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600091','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600092','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600093','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600094','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600095','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600096','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600097','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600098','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600099','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600100','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600101','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600102','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600103','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600104','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600105','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600106','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600107','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600108','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600109','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600110','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600111','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600112','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600113','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600114','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600115','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600116','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600117','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600118','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600119','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600120','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600121','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600122','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600123','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600124','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600125','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600126','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600127','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600128','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600129','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600130','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600131','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600132','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600133','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600134','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600135','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600136','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600137','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600138','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600139','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600140','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600141','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600142','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600143','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600144','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600145','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600146','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600147','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600148','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600149','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600150','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600151','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600152','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600153','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600154','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600155','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600156','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600157','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600158','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600159','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600160','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600161','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600162','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600163','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600164','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600165','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600166','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600167','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600168','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600169','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600170','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600171','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600172','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600173','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600174','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600175','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600176','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600177','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600178','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600179','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600180','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600181','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600182','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600183','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600184','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600185','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600186','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600187','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600188','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600189','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600190','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600191','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600192','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600193','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600194','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600195','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600196','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600197','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600198','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600199','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600200','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600201','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600202','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600203','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600204','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600205','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600206','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600207','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600208','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600209','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600210','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600211','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600212','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600213','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600214','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600215','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600216','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600217','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600218','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600219','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600220','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600221','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600222','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600223','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600224','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600225','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600226','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600227','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600228','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600229','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600230','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600231','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600232','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600233','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600234','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600235','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600236','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600237','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600238','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600239','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600240','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600241','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600242','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600243','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600244','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600245','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600246','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600247','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600248','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600249','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600250','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600251','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600252','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600253','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600254','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600255','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600256','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600257','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600258','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600259','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600260','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600261','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600262','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600263','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600264','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600265','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600266','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600267','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600268','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600269','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600270','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600271','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600272','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600273','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600274','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600275','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600276','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600277','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600278','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600279','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600280','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600281','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600282','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600283','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600284','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600285','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600286','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600287','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600288','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600289','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600290','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600291','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600292','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600293','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600294','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600295','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600296','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600297','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600298','169.254.217.2');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600299','169.254.217.2');
|
||||
@ -0,0 +1,303 @@
|
||||
USE asterisk;
|
||||
INSERT INTO servers (server_id,server_description,server_ip,active,asterisk_version) values('cctel-02-voe','cctel-02-voe', '169.254.217.3','Y','13.24.1');
|
||||
INSERT INTO server_updater SET server_ip='169.254.217.3', last_update='';
|
||||
|
||||
INSERT INTO conferences values('8600001','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600002','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600003','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600004','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600005','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600006','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600007','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600008','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600009','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600010','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600011','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600012','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600013','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600014','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600015','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600016','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600017','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600018','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600019','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600020','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600021','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600022','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600023','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600024','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600025','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600026','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600027','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600028','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600029','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600030','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600031','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600032','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600033','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600034','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600035','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600036','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600037','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600038','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600039','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600040','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600041','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600042','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600043','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600044','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600045','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600046','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600047','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600048','169.254.217.3','');
|
||||
INSERT INTO conferences values('8600049','169.254.217.3','');
|
||||
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600051','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600052','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600053','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600054','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600055','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600056','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600057','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600058','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600059','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600060','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600061','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600062','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600063','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600064','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600065','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600066','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600067','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600068','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600069','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600070','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600071','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600072','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600073','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600074','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600075','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600076','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600077','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600078','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600079','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600080','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600081','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600082','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600083','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600084','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600085','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600086','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600087','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600088','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600089','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600090','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600091','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600092','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600093','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600094','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600095','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600096','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600097','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600098','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600099','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600100','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600101','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600102','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600103','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600104','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600105','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600106','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600107','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600108','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600109','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600110','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600111','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600112','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600113','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600114','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600115','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600116','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600117','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600118','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600119','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600120','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600121','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600122','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600123','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600124','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600125','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600126','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600127','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600128','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600129','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600130','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600131','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600132','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600133','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600134','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600135','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600136','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600137','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600138','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600139','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600140','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600141','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600142','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600143','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600144','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600145','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600146','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600147','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600148','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600149','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600150','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600151','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600152','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600153','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600154','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600155','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600156','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600157','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600158','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600159','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600160','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600161','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600162','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600163','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600164','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600165','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600166','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600167','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600168','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600169','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600170','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600171','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600172','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600173','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600174','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600175','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600176','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600177','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600178','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600179','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600180','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600181','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600182','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600183','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600184','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600185','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600186','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600187','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600188','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600189','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600190','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600191','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600192','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600193','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600194','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600195','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600196','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600197','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600198','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600199','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600200','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600201','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600202','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600203','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600204','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600205','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600206','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600207','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600208','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600209','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600210','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600211','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600212','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600213','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600214','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600215','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600216','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600217','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600218','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600219','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600220','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600221','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600222','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600223','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600224','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600225','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600226','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600227','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600228','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600229','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600230','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600231','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600232','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600233','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600234','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600235','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600236','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600237','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600238','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600239','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600240','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600241','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600242','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600243','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600244','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600245','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600246','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600247','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600248','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600249','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600250','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600251','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600252','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600253','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600254','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600255','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600256','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600257','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600258','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600259','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600260','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600261','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600262','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600263','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600264','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600265','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600266','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600267','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600268','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600269','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600270','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600271','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600272','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600273','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600274','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600275','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600276','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600277','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600278','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600279','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600280','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600281','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600282','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600283','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600284','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600285','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600286','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600287','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600288','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600289','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600290','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600291','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600292','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600293','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600294','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600295','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600296','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600297','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600298','169.254.217.3');
|
||||
INSERT INTO vicidial_conferences(conf_exten,server_ip) values('8600299','169.254.217.3');
|
||||
@ -0,0 +1,16 @@
|
||||
You can copy here your custom .sh, .sql or .sql.gz file so they are executed during the first boot of the image.
|
||||
|
||||
More info in the [bitnami-docker-mariadb](https://github.com/bitnami/bitnami-docker-mariadb#initializing-a-new-instance) repository.
|
||||
|
||||
## Initializing User for Vicidial DB
|
||||
|
||||
k8s/ccdb/files/docker-entrypoint-initdb.d/00-vici_db_createdb.sh
|
||||
|
||||
|
||||
## Initializing Vicidial Install DB
|
||||
|
||||
```
|
||||
cp ~/Workspace/vicidial/extras/MySQL_AST_CREATE_tables.sql ~/Workspace/callcenter-online-editon/k8s/ccdb/files/docker-entrypoint-initdb.d/20-MySQL_AST_CREATE_tables.sql
|
||||
```
|
||||
|
||||
## Create 3 Dummy Servers
|
||||
@ -0,0 +1,54 @@
|
||||
|
||||
Please be patient while the chart is being deployed
|
||||
|
||||
Tip:
|
||||
|
||||
Watch the deployment status using the command: kubectl get pods -w --namespace {{ .Release.Namespace }} -l release={{ .Release.Name }}
|
||||
|
||||
Services:
|
||||
|
||||
echo Master: {{ template "mariadb.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local:{{ .Values.service.port }}
|
||||
{{- if .Values.replication.enabled }}
|
||||
echo Slave: {{ template "slave.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local:{{ .Values.service.port }}
|
||||
{{- end }}
|
||||
|
||||
Administrator credentials:
|
||||
|
||||
Username: root
|
||||
Password : $(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mariadb.secretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
|
||||
Vicidial Default credentials:
|
||||
|
||||
Sapian Password : $(kubectl get secret --namespace {{ .Release.Namespace }} vicidial-ccdb-{{ template "mariadb.fullname" . }} -o jsonpath="{.data.SAPIAN_PASSWORD}" | base64 --decode)
|
||||
|
||||
|
||||
To connect to your database:
|
||||
|
||||
1. Run a pod that you can use as a client:
|
||||
|
||||
kubectl run {{ template "mariadb.fullname" . }}-client --rm --tty -i --restart='Never' --image {{ template "mariadb.image" . }} --namespace {{ .Release.Namespace }} --command -- bash
|
||||
|
||||
2. To connect to master service (read/write):
|
||||
|
||||
mysql -h {{ template "mariadb.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local -uroot -p {{ .Values.db.name }}
|
||||
|
||||
{{- if .Values.replication.enabled }}
|
||||
|
||||
3. To connect to slave service (read-only):
|
||||
|
||||
mysql -h {{ template "slave.fullname" . }}.{{ .Release.Namespace }}.svc.cluster.local -uroot -p {{ .Values.db.name }}
|
||||
{{- end }}
|
||||
|
||||
To upgrade this helm chart:
|
||||
|
||||
1. Obtain the password as described on the 'Administrator credentials' section and set the 'rootUser.password' parameter as shown below:
|
||||
|
||||
ROOT_PASSWORD=$(kubectl get secret --namespace {{ .Release.Namespace }} {{ template "mariadb.secretName" . }} -o jsonpath="{.data.mariadb-root-password}" | base64 --decode)
|
||||
helm upgrade {{ .Release.Name }} bitnami/mariadb --set rootUser.password=$ROOT_PASSWORD
|
||||
|
||||
{{- if and (contains "bitnami/" .Values.image.repository) (not (.Values.image.tag | toString | regexFind "-r\\d+$|sha256:")) }}
|
||||
|
||||
WARNING: Rolling tag detected ({{ .Values.image.repository }}:{{ .Values.image.tag }}), please note that it is strongly recommended to avoid using rolling tags in a production environment.
|
||||
+info https://docs.bitnami.com/containers/how-to/understand-rolling-tags-containers/
|
||||
|
||||
{{- end }}
|
||||
@ -0,0 +1,3 @@
|
||||
{{- define "ccdb.phoneloginpassword" -}}
|
||||
{{- printf "%s-%s-%s" (randNumeric 3) (include "mariadb.fullname" .) (randNumeric 3) | trimSuffix "-" | b64enc -}}
|
||||
{{- end -}}
|
||||
@ -0,0 +1,288 @@
|
||||
{{/*
|
||||
Return the appropriate apiVersion for statefulset.
|
||||
*/}}
|
||||
{{- define "mariadb.statefulset.apiVersion" -}}
|
||||
{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
{{- print "apps/v1beta1" -}}
|
||||
{{- else -}}
|
||||
{{- print "apps/v1" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/* vim: set filetype=mustache: */}}
|
||||
{{/*
|
||||
Expand the name of the chart.
|
||||
*/}}
|
||||
{{- define "mariadb.name" -}}
|
||||
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Create a default fully qualified app name.
|
||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||
If release name contains chart name it will be used as a full name.
|
||||
*/}}
|
||||
{{- define "mariadb.fullname" -}}
|
||||
{{- if .Values.fullnameOverride -}}
|
||||
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}}
|
||||
{{- else -}}
|
||||
{{- $name := default .Chart.Name .Values.nameOverride -}}
|
||||
{{- if contains $name .Release.Name -}}
|
||||
{{- printf .Release.Name | trunc 63 | trimSuffix "-" -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "master.fullname" -}}
|
||||
{{- if .Values.replication.enabled -}}
|
||||
{{- printf "%s-%s" (include "mariadb.fullname" .) "master" | trunc 63 | trimSuffix "-" -}}
|
||||
{{- else -}}
|
||||
{{- include "mariadb.fullname" . -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "slave.fullname" -}}
|
||||
{{- printf "%s-%s" (include "mariadb.fullname" .) "slave" | trunc 63 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "mariadb.chart" -}}
|
||||
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Create pod labels for mariadb
|
||||
*/}}
|
||||
{{- define "mariadb.podLabels" -}}
|
||||
{{- if .Values.podLabels }}
|
||||
{{ toYaml .Values.podLabels }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the proper MariaDB image name
|
||||
*/}}
|
||||
{{- define "mariadb.image" -}}
|
||||
{{- $registryName := .Values.image.registry -}}
|
||||
{{- $repositoryName := .Values.image.repository -}}
|
||||
{{- $tag := .Values.image.tag | toString -}}
|
||||
{{/*
|
||||
Helm 2.11 supports the assignment of a value to a variable defined in a different scope,
|
||||
but Helm 2.9 and 2.10 doesn't support it, so we need to implement this if-else logic.
|
||||
Also, we can't use a single if because lazy evaluation is not an option
|
||||
*/}}
|
||||
{{- if .Values.global }}
|
||||
{{- if .Values.global.imageRegistry }}
|
||||
{{- printf "%s/%s:%s" .Values.global.imageRegistry $repositoryName $tag -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the proper metrics image name
|
||||
*/}}
|
||||
{{- define "mariadb.metrics.image" -}}
|
||||
{{- $registryName := .Values.metrics.image.registry -}}
|
||||
{{- $repositoryName := .Values.metrics.image.repository -}}
|
||||
{{- $tag := .Values.metrics.image.tag | toString -}}
|
||||
{{/*
|
||||
Helm 2.11 supports the assignment of a value to a variable defined in a different scope,
|
||||
but Helm 2.9 and 2.10 doesn't support it, so we need to implement this if-else logic.
|
||||
Also, we can't use a single if because lazy evaluation is not an option
|
||||
*/}}
|
||||
{{- if .Values.global }}
|
||||
{{- if .Values.global.imageRegistry }}
|
||||
{{- printf "%s/%s:%s" .Values.global.imageRegistry $repositoryName $tag -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{ template "mariadb.initdbScriptsCM" . }}
|
||||
{{/*
|
||||
Get the initialization scripts ConfigMap name.
|
||||
*/}}
|
||||
{{- define "mariadb.initdbScriptsCM" -}}
|
||||
{{- if .Values.initdbScriptsConfigMap -}}
|
||||
{{- printf "%s" .Values.initdbScriptsConfigMap -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s-init-scripts" (include "master.fullname" .) -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Create the name of the service account to use
|
||||
*/}}
|
||||
{{- define "mariadb.serviceAccountName" -}}
|
||||
{{- if .Values.serviceAccount.create -}}
|
||||
{{ default (include "mariadb.fullname" .) .Values.serviceAccount.name }}
|
||||
{{- else -}}
|
||||
{{ default "default" .Values.serviceAccount.name }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the proper Docker Image Registry Secret Names
|
||||
*/}}
|
||||
{{- define "mariadb.imagePullSecrets" -}}
|
||||
{{/*
|
||||
Helm 2.11 supports the assignment of a value to a variable defined in a different scope,
|
||||
but Helm 2.9 and 2.10 does not support it, so we need to implement this if-else logic.
|
||||
Also, we can not use a single if because lazy evaluation is not an option
|
||||
*/}}
|
||||
{{- if .Values.global }}
|
||||
{{- if .Values.global.imagePullSecrets }}
|
||||
imagePullSecrets:
|
||||
{{- range .Values.global.imagePullSecrets }}
|
||||
- name: {{ . }}
|
||||
{{- end }}
|
||||
{{- else if or .Values.image.pullSecrets .Values.metrics.image.pullSecrets .Values.volumePermissions.image.pullSecrets }}
|
||||
imagePullSecrets:
|
||||
{{- range .Values.image.pullSecrets }}
|
||||
- name: {{ . }}
|
||||
{{- end }}
|
||||
{{- range .Values.metrics.image.pullSecrets }}
|
||||
- name: {{ . }}
|
||||
{{- end }}
|
||||
{{- range .Values.volumePermissions.image.pullSecrets }}
|
||||
- name: {{ . }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- else if or .Values.image.pullSecrets .Values.metrics.image.pullSecrets .Values.volumePermissions.image.pullSecrets }}
|
||||
imagePullSecrets:
|
||||
{{- range .Values.image.pullSecrets }}
|
||||
- name: {{ . }}
|
||||
{{- end }}
|
||||
{{- range .Values.metrics.image.pullSecrets }}
|
||||
- name: {{ . }}
|
||||
{{- end }}
|
||||
{{- range .Values.volumePermissions.image.pullSecrets }}
|
||||
- name: {{ . }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the proper image name (for the init container volume-permissions image)
|
||||
*/}}
|
||||
{{- define "mariadb.volumePermissions.image" -}}
|
||||
{{- $registryName := .Values.volumePermissions.image.registry -}}
|
||||
{{- $repositoryName := .Values.volumePermissions.image.repository -}}
|
||||
{{- $tag := .Values.volumePermissions.image.tag | toString -}}
|
||||
{{/*
|
||||
Helm 2.11 supports the assignment of a value to a variable defined in a different scope,
|
||||
but Helm 2.9 and 2.10 doesn't support it, so we need to implement this if-else logic.
|
||||
Also, we can't use a single if because lazy evaluation is not an option
|
||||
*/}}
|
||||
{{- if .Values.global }}
|
||||
{{- if .Values.global.imageRegistry }}
|
||||
{{- printf "%s/%s:%s" .Values.global.imageRegistry $repositoryName $tag -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s/%s:%s" $registryName $repositoryName $tag -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the proper Storage Class for the master
|
||||
*/}}
|
||||
{{- define "mariadb.master.storageClass" -}}
|
||||
{{/*
|
||||
Helm 2.11 supports the assignment of a value to a variable defined in a different scope,
|
||||
but Helm 2.9 and 2.10 does not support it, so we need to implement this if-else logic.
|
||||
*/}}
|
||||
{{- if .Values.global -}}
|
||||
{{- if .Values.global.storageClass -}}
|
||||
{{- if (eq "-" .Values.global.storageClass) -}}
|
||||
{{- printf "storageClassName: \"\"" -}}
|
||||
{{- else }}
|
||||
{{- printf "storageClassName: %s" .Values.global.storageClass -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- if .Values.master.persistence.storageClass -}}
|
||||
{{- if (eq "-" .Values.master.persistence.storageClass) -}}
|
||||
{{- printf "storageClassName: \"\"" -}}
|
||||
{{- else }}
|
||||
{{- printf "storageClassName: %s" .Values.master.persistence.storageClass -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- if .Values.master.persistence.storageClass -}}
|
||||
{{- if (eq "-" .Values.master.persistence.storageClass) -}}
|
||||
{{- printf "storageClassName: \"\"" -}}
|
||||
{{- else }}
|
||||
{{- printf "storageClassName: %s" .Values.master.persistence.storageClass -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the proper Storage Class for the slave
|
||||
*/}}
|
||||
{{- define "mariadb.slave.storageClass" -}}
|
||||
{{/*
|
||||
Helm 2.11 supports the assignment of a value to a variable defined in a different scope,
|
||||
but Helm 2.9 and 2.10 does not support it, so we need to implement this if-else logic.
|
||||
*/}}
|
||||
{{- if .Values.global -}}
|
||||
{{- if .Values.global.storageClass -}}
|
||||
{{- if (eq "-" .Values.global.storageClass) -}}
|
||||
{{- printf "storageClassName: \"\"" -}}
|
||||
{{- else }}
|
||||
{{- printf "storageClassName: %s" .Values.global.storageClass -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- if .Values.slave.persistence.storageClass -}}
|
||||
{{- if (eq "-" .Values.slave.persistence.storageClass) -}}
|
||||
{{- printf "storageClassName: \"\"" -}}
|
||||
{{- else }}
|
||||
{{- printf "storageClassName: %s" .Values.slave.persistence.storageClass -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{- if .Values.slave.persistence.storageClass -}}
|
||||
{{- if (eq "-" .Values.slave.persistence.storageClass) -}}
|
||||
{{- printf "storageClassName: \"\"" -}}
|
||||
{{- else }}
|
||||
{{- printf "storageClassName: %s" .Values.slave.persistence.storageClass -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the name of the Secret used to store the passwords
|
||||
*/}}
|
||||
{{- define "mariadb.secretName" -}}
|
||||
{{- if .Values.existingSecret -}}
|
||||
{{ .Values.existingSecret }}
|
||||
{{- else -}}
|
||||
{{ template "mariadb.fullname" . -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Renders a value that contains template.
|
||||
Usage:
|
||||
{{ include "mariadb.tplValue" ( dict "value" .Values.path.to.the.Value "context" $) }}
|
||||
*/}}
|
||||
{{- define "mariadb.tplValue" -}}
|
||||
{{- if typeIs "string" .value }}
|
||||
{{- tpl .value .context }}
|
||||
{{- else }}
|
||||
{{- tpl (.value | toYaml) .context }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
@ -0,0 +1,37 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: vicidial-ccdb-{{ template "mariadb.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
type: Opaque
|
||||
data:
|
||||
{{- if not (empty .Values.ccdb.DefaultPhoneRegistrationPassword) }}
|
||||
CCDB_DEFAULT_PHONE_REGISTRATION_PASSWORD: "{{ .Values.ccdb.DefaultPhoneRegistrationPassword | b64enc }}"
|
||||
{{ else }}
|
||||
CCDB_DEFAULT_PHONE_REGISTRATION_PASSWORD: "{{ randAlphaNum 16 | b64enc }}"
|
||||
{{- end }}
|
||||
{{- if not (empty .Values.ccdb.DefaultPhoneLoginPassword) }}
|
||||
CCDB_DEFAULT_PHONE_LOGIN_PASSWORD: "{{ .Values.ccdb.DefaultPhoneLoginPassword | b64enc }}"
|
||||
{{ else }}
|
||||
CCDB_DEFAULT_PHONE_LOGIN_PASSWORD: "{{ template "ccdb.phoneloginpassword" . }}"
|
||||
{{- end }}
|
||||
{{- if not (empty .Values.ccdb.DefaultServerPassword) }}
|
||||
CCDB_DEFAULT_SERVER_PASSWORD: "{{ .Values.ccdb.DefaultServerPassword | b64enc }}"
|
||||
{{ else }}
|
||||
CCDB_DEFAULT_SERVER_PASSWORD: "{{ randAlphaNum 16 | b64enc }}"
|
||||
{{- end }}
|
||||
{{- if not (empty .Values.ccdb.DefaultPassKey) }}
|
||||
CCDB_PASS_KEY: "{{ .Values.ccdb.DefaultPassKey | b64enc }}"
|
||||
{{ else }}
|
||||
CCDB_PASS_KEY: "{{ randAlphaNum 16 | b64enc }}"
|
||||
{{- end }}
|
||||
{{- if not (empty .Values.ccdb.SapianPassword) }}
|
||||
SAPIAN_PASSWORD: "{{ .Values.ccdb.SapianPassword | b64enc }}"
|
||||
{{ else }}
|
||||
SAPIAN_PASSWORD: "{{ randAlphaNum 16 | b64enc }}"
|
||||
{{- end }}
|
||||
@ -0,0 +1,27 @@
|
||||
{{- if and (or (.Files.Glob "files/docker-entrypoint-initdb.d/*.{sh,sql,sql.gz}") .Values.initdbScripts) (not .Values.initdbScriptsConfigMap) }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ template "master.fullname" . }}-init-scripts
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
component: "master"
|
||||
{{- if and (.Files.Glob "files/docker-entrypoint-initdb.d/*.sql.gz") (not .Values.initdbScriptsConfigMap) }}
|
||||
binaryData:
|
||||
{{- $root := . }}
|
||||
{{- range $path, $bytes := .Files.Glob "files/docker-entrypoint-initdb.d/*.sql.gz" }}
|
||||
{{ base $path }}: {{ $root.Files.Get $path | b64enc | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
data:
|
||||
{{- if and (.Files.Glob "files/docker-entrypoint-initdb.d/*.{sh,sql}") (not .Values.initdbScriptsConfigMap) }}
|
||||
{{ (.Files.Glob "files/docker-entrypoint-initdb.d/*.{sh,sql}").AsConfig | indent 2 }}
|
||||
{{- end }}
|
||||
{{- with .Values.initdbScripts }}
|
||||
{{ toYaml . | indent 2 }}
|
||||
{{- end }}
|
||||
{{ end }}
|
||||
@ -0,0 +1,16 @@
|
||||
{{- if .Values.master.config }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ template "master.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "master"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
data:
|
||||
my.cnf: |-
|
||||
{{ .Values.master.config | indent 4 }}
|
||||
{{- end -}}
|
||||
@ -0,0 +1,25 @@
|
||||
{{- if .Values.master.podDisruptionBudget.enabled }}
|
||||
apiVersion: policy/v1beta1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ template "mariadb.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "master"
|
||||
chart: {{ template "mariadb.chart" . }}
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
spec:
|
||||
{{- if .Values.master.podDisruptionBudget.minAvailable }}
|
||||
minAvailable: {{ .Values.master.podDisruptionBudget.minAvailable }}
|
||||
{{- end }}
|
||||
{{- if .Values.master.podDisruptionBudget.maxUnavailable }}
|
||||
maxUnavailable: {{ .Values.master.podDisruptionBudget.maxUnavailable }}
|
||||
{{- end }}
|
||||
selector:
|
||||
matchLabels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "master"
|
||||
release: {{ .Release.Name | quote }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,349 @@
|
||||
apiVersion: {{ template "mariadb.statefulset.apiVersion" . }}
|
||||
kind: StatefulSet
|
||||
metadata:
|
||||
name: {{ template "master.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
chart: {{ template "mariadb.chart" . }}
|
||||
release: {{ .Release.Name }}
|
||||
heritage: {{ .Release.Service }}
|
||||
component: master
|
||||
{{- include "mariadb.podLabels" . | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
component: master
|
||||
serviceName: {{ template "master.fullname" . }}
|
||||
replicas: 1
|
||||
updateStrategy:
|
||||
type: {{ .Values.master.updateStrategy.type }}
|
||||
{{- if (eq "Recreate" .Values.master.updateStrategy.type) }}
|
||||
rollingUpdate: null
|
||||
{{- end }}
|
||||
template:
|
||||
metadata:
|
||||
{{- with .Values.master.annotations }}
|
||||
annotations:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
labels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
chart: {{ template "mariadb.chart" . }}
|
||||
release: {{ .Release.Name }}
|
||||
component: master
|
||||
{{- include "mariadb.podLabels" . | nindent 8 }}
|
||||
spec:
|
||||
{{- if .Values.schedulerName }}
|
||||
schedulerName: {{ .Values.schedulerName | quote }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ template "mariadb.serviceAccountName" . }}
|
||||
{{- if .Values.securityContext.enabled }}
|
||||
securityContext:
|
||||
fsGroup: {{ .Values.securityContext.fsGroup }}
|
||||
runAsUser: {{ .Values.securityContext.runAsUser }}
|
||||
{{- end }}
|
||||
{{- if eq .Values.master.antiAffinity "hard" }}
|
||||
affinity:
|
||||
{{- with .Values.master.affinity }}
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
podAntiAffinity:
|
||||
requiredDuringSchedulingIgnoredDuringExecution:
|
||||
- topologyKey: "kubernetes.io/hostname"
|
||||
labelSelector:
|
||||
matchLabels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
{{- else if eq .Values.master.antiAffinity "soft" }}
|
||||
affinity:
|
||||
{{- with .Values.master.affinity }}
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
podAntiAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
- weight: 1
|
||||
podAffinityTerm:
|
||||
topologyKey: kubernetes.io/hostname
|
||||
labelSelector:
|
||||
matchLabels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
{{- else}}
|
||||
{{- with .Values.master.affinity }}
|
||||
affinity: {{ toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.master.nodeSelector }}
|
||||
nodeSelector: {{ toYaml .Values.master.nodeSelector | nindent 8 }}
|
||||
{{- end -}}
|
||||
{{- with .Values.master.tolerations }}
|
||||
tolerations: {{ toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- include "mariadb.imagePullSecrets" . | indent 6 }}
|
||||
initContainers:
|
||||
{{- if .Values.master.extraInitContainers }}
|
||||
{{ tpl .Values.master.extraInitContainers . | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if and .Values.volumePermissions.enabled .Values.master.persistence.enabled }}
|
||||
- name: volume-permissions
|
||||
image: {{ template "mariadb.volumePermissions.image" . }}
|
||||
imagePullPolicy: {{ .Values.volumePermissions.image.pullPolicy | quote }}
|
||||
command: ["chown", "-R", "{{ .Values.securityContext.runAsUser }}:{{ .Values.securityContext.fsGroup }}", "{{ .Values.master.persistence.mountPath }}"]
|
||||
securityContext:
|
||||
runAsUser: 0
|
||||
resources: {{ toYaml .Values.volumePermissions.resources | nindent 12 }}
|
||||
volumeMounts:
|
||||
- name: data
|
||||
mountPath: {{ .Values.master.persistence.mountPath }}
|
||||
{{- end }}
|
||||
containers:
|
||||
- name: "mariadb"
|
||||
image: {{ template "mariadb.image" . }}
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy | quote }}
|
||||
env:
|
||||
{{- if .Values.image.debug}}
|
||||
- name: BITNAMI_DEBUG
|
||||
value: "true"
|
||||
{{- end }}
|
||||
{{- if .Values.master.extraFlags }}
|
||||
- name: MARIADB_EXTRA_FLAGS
|
||||
value: "{{ .Values.master.extraFlags }}"
|
||||
{{- end }}
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
- name: MARIADB_ROOT_PASSWORD_FILE
|
||||
value: "/opt/bitnami/mariadb/secrets/mariadb-root-password"
|
||||
{{- else }}
|
||||
- name: MARIADB_ROOT_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ template "mariadb.secretName" . }}
|
||||
key: mariadb-root-password
|
||||
{{- end }}
|
||||
{{- if not (empty .Values.db.user) }}
|
||||
- name: MARIADB_USER
|
||||
value: "{{ .Values.db.user }}"
|
||||
{{- if .Values.db.injectSecretsAsVolume }}
|
||||
- name: MARIADB_PASSWORD_FILE
|
||||
value: "/opt/bitnami/mariadb/secrets/mariadb-password"
|
||||
{{- else }}
|
||||
- name: MARIADB_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ template "mariadb.secretName" . }}
|
||||
key: mariadb-password
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
- name: MARIADB_DATABASE
|
||||
value: "{{ .Values.db.name }}"
|
||||
{{- if .Values.replication.enabled }}
|
||||
- name: MARIADB_REPLICATION_MODE
|
||||
value: "master"
|
||||
- name: MARIADB_REPLICATION_USER
|
||||
value: "{{ .Values.replication.user }}"
|
||||
{{- if .Values.replication.injectSecretsAsVolume }}
|
||||
- name: MARIADB_REPLICATION_PASSWORD_FILE
|
||||
value: "/opt/bitnami/mariadb/secrets/mariadb-replication-password"
|
||||
{{- else }}
|
||||
- name: MARIADB_REPLICATION_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ template "mariadb.secretName" . }}
|
||||
key: mariadb-replication-password
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.master.extraEnvVars }}
|
||||
{{- tpl (toYaml .Values.master.extraEnvVars) $ | nindent 12 }}
|
||||
{{- end }}
|
||||
envFrom:
|
||||
{{- if .Values.master.extraEnvVarsCM }}
|
||||
- configMapRef:
|
||||
name: {{ .Values.master.extraEnvVarsCM }}
|
||||
{{- end }}
|
||||
- secretRef:
|
||||
name: vicidial-ccdb-{{ template "mariadb.fullname" . }}
|
||||
{{- if .Values.master.extraEnvVarsSecret }}
|
||||
- secretRef:
|
||||
name: {{ .Values.master.extraEnvVarsSecret }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- name: mysql
|
||||
containerPort: 3306
|
||||
{{- if .Values.master.livenessProbe.enabled }}
|
||||
livenessProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
password_aux="${MARIADB_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_aux=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
mysqladmin status -uroot -p$password_aux
|
||||
initialDelaySeconds: {{ .Values.master.livenessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.master.livenessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.master.livenessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.master.livenessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.master.livenessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.master.readinessProbe.enabled }}
|
||||
readinessProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
password_aux="${MARIADB_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_aux=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
mysqladmin status -uroot -p$password_aux
|
||||
initialDelaySeconds: {{ .Values.master.readinessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.master.readinessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.master.readinessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.master.readinessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.master.readinessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.master.resources }}
|
||||
resources: {{ toYaml .Values.master.resources | nindent 12 }}
|
||||
{{- end }}
|
||||
volumeMounts:
|
||||
- name: tz-bogota
|
||||
mountPath: /etc/localtime
|
||||
- name: data
|
||||
mountPath: {{ .Values.master.persistence.mountPath }}
|
||||
{{- if .Values.master.persistence.subPath }}
|
||||
subPath: {{ .Values.master.persistence.subPath }}
|
||||
{{- end }}
|
||||
{{- if or (.Files.Glob "files/docker-entrypoint-initdb.d/*.{sh,sql,sql.gz}") .Values.initdbScriptsConfigMap .Values.initdbScripts }}
|
||||
- name: custom-init-scripts
|
||||
mountPath: /docker-entrypoint-initdb.d
|
||||
{{- end }}
|
||||
{{- if .Values.master.config }}
|
||||
- name: config
|
||||
mountPath: /opt/bitnami/mariadb/conf/my.cnf
|
||||
subPath: my.cnf
|
||||
{{- end }}
|
||||
{{- if or .Values.rootUser.injectSecretsAsVolume .Values.db.injectSecretsAsVolume .Values.replication.injectSecretsAsVolume }}
|
||||
- name: mariadb-credentials
|
||||
mountPath: /opt/bitnami/mariadb/secrets/
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.enabled }}
|
||||
- name: metrics
|
||||
image: {{ template "mariadb.metrics.image" . }}
|
||||
imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }}
|
||||
env:
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
- name: MARIADB_ROOT_PASSWORD_FILE
|
||||
value: "/opt/bitnami/mysqld-exporter/secrets/mariadb-root-password"
|
||||
{{- else }}
|
||||
- name: MARIADB_ROOT_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ template "mariadb.secretName" . }}
|
||||
key: mariadb-root-password
|
||||
{{- end }}
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
password_aux="${MARIADB_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_aux=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
DATA_SOURCE_NAME="root:${password_aux}@(localhost:3306)/" /bin/mysqld_exporter {{- range .Values.metrics.extraArgs.master }} {{ . }} {{- end }}
|
||||
ports:
|
||||
- name: metrics
|
||||
containerPort: 9104
|
||||
{{- if .Values.metrics.livenessProbe.enabled }}
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
port: metrics
|
||||
initialDelaySeconds: {{ .Values.metrics.livenessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.metrics.livenessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.metrics.livenessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.metrics.livenessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.metrics.livenessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.readinessProbe.enabled }}
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
port: metrics
|
||||
initialDelaySeconds: {{ .Values.metrics.readinessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.metrics.readinessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.metrics.readinessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.metrics.readinessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.metrics.readinessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.resources }}
|
||||
resources: {{ toYaml .Values.metrics.resources | nindent 12 }}
|
||||
{{- end }}
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
volumeMounts:
|
||||
- name: mariadb-credentials
|
||||
mountPath: /opt/bitnami/mysqld-exporter/secrets/
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
volumes:
|
||||
- name: tz-bogota
|
||||
hostPath:
|
||||
path: /usr/share/zoneinfo/America/Bogota
|
||||
{{- if .Values.master.config }}
|
||||
- name: config
|
||||
configMap:
|
||||
name: {{ template "master.fullname" . }}
|
||||
{{- end }}
|
||||
{{- if or (.Files.Glob "files/docker-entrypoint-initdb.d/*.{sh,sql,sql.gz}") .Values.initdbScriptsConfigMap .Values.initdbScripts }}
|
||||
- name: custom-init-scripts
|
||||
configMap:
|
||||
name: {{ template "mariadb.initdbScriptsCM" . }}
|
||||
{{- end }}
|
||||
{{- if or .Values.rootUser.injectSecretsAsVolume .Values.db.injectSecretsAsVolume .Values.replication.injectSecretsAsVolume }}
|
||||
- name: mariadb-credentials
|
||||
secret:
|
||||
secretName: {{ template "mariadb.fullname" . }}
|
||||
items:
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
- key: mariadb-root-password
|
||||
path: mariadb-root-password
|
||||
{{- end }}
|
||||
{{- if .Values.db.injectSecretsAsVolume }}
|
||||
- key: mariadb-password
|
||||
path: mariadb-password
|
||||
{{- end }}
|
||||
{{- if and .Values.replication.enabled .Values.replication.injectSecretsAsVolume }}
|
||||
- key: mariadb-replication-password
|
||||
path: mariadb-replication-password
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if and .Values.master.persistence.enabled .Values.master.persistence.existingClaim }}
|
||||
- name: data
|
||||
persistentVolumeClaim:
|
||||
claimName: {{ .Values.master.persistence.existingClaim }}
|
||||
{{- else if not .Values.master.persistence.enabled }}
|
||||
- name: data
|
||||
emptyDir: {}
|
||||
{{- else if and .Values.master.persistence.enabled (not .Values.master.persistence.existingClaim) }}
|
||||
volumeClaimTemplates:
|
||||
- metadata:
|
||||
name: data
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "master"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
spec:
|
||||
accessModes:
|
||||
{{- range .Values.master.persistence.accessModes }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .Values.master.persistence.size | quote }}
|
||||
{{ include "mariadb.master.storageClass" . }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,47 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: {{ template "mariadb.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "master"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
{{- if or .Values.metrics.enabled .Values.master.service.annotations }}
|
||||
annotations:
|
||||
{{- if .Values.metrics.enabled }}
|
||||
{{ toYaml .Values.metrics.annotations | indent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.master.service.annotations }}
|
||||
{{ toYaml .Values.master.service.annotations | indent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
spec:
|
||||
type: {{ .Values.service.type }}
|
||||
{{- if eq .Values.service.type "ClusterIP" }}
|
||||
{{- if .Values.service.clusterIp }}
|
||||
clusterIP: {{ .Values.service.clusterIp.master }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- name: mysql
|
||||
port: {{ .Values.service.port }}
|
||||
targetPort: mysql
|
||||
{{- if eq .Values.service.type "NodePort" }}
|
||||
{{- if .Values.service.nodePort }}
|
||||
{{- if .Values.service.nodePort.master }}
|
||||
nodePort: {{ .Values.service.nodePort.master }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.enabled }}
|
||||
- name: metrics
|
||||
port: 9104
|
||||
targetPort: metrics
|
||||
{{- end }}
|
||||
selector:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "master"
|
||||
release: "{{ .Release.Name }}"
|
||||
@ -0,0 +1,19 @@
|
||||
{{- if and .Values.serviceAccount.create .Values.rbac.create }}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: {{ template "master.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- endpoints
|
||||
verbs:
|
||||
- get
|
||||
{{- end }}
|
||||
@ -0,0 +1,19 @@
|
||||
{{- if and .Values.serviceAccount.create .Values.rbac.create }}
|
||||
kind: RoleBinding
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
metadata:
|
||||
name: {{ template "master.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ template "mariadb.serviceAccountName" . }}
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: Role
|
||||
name: {{ template "master.fullname" . }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,44 @@
|
||||
{{- if (not .Values.existingSecret) -}}
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ template "mariadb.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
{{- if .Values.secret.annotations }}
|
||||
annotations: {{- include "mariadb.tplValue" (dict "value" .Values.secret.annotations "context" $) | nindent 4 }}
|
||||
{{- end }}
|
||||
type: Opaque
|
||||
{{- if .Values.secret.requirePasswords }}
|
||||
data:
|
||||
{{- if not (empty .Values.rootUser.password) }}
|
||||
mariadb-root-password: "{{ .Values.rootUser.password | b64enc }}"
|
||||
{{- else if (not .Values.rootUser.forcePassword) }}
|
||||
mariadb-root-password: "{{ randAlphaNum 10 | b64enc }}"
|
||||
{{ else }}
|
||||
mariadb-root-password: {{ required "A MariaDB Root Password is required!" .Values.rootUser.password }}
|
||||
{{- end }}
|
||||
{{- if not (empty .Values.db.user) }}
|
||||
{{- if not (empty .Values.db.password) }}
|
||||
mariadb-password: "{{ .Values.db.password | b64enc }}"
|
||||
{{- else if (not .Values.db.forcePassword) }}
|
||||
mariadb-password: "{{ randAlphaNum 10 | b64enc }}"
|
||||
{{- else }}
|
||||
mariadb-password: {{ required "A MariaDB Database Password is required!" .Values.db.password }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.replication.enabled }}
|
||||
{{- if not (empty .Values.replication.password) }}
|
||||
mariadb-replication-password: "{{ .Values.replication.password | b64enc }}"
|
||||
{{- else if (not .Values.replication.forcePassword) }}
|
||||
mariadb-replication-password: "{{ randAlphaNum 10 | b64enc }}"
|
||||
{{- else }}
|
||||
mariadb-replication-password: {{ required "A MariaDB Replication Password is required!" .Values.replication.password }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,12 @@
|
||||
{{- if .Values.serviceAccount.create }}
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: {{ template "mariadb.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,35 @@
|
||||
{{- if and .Values.metrics.enabled .Values.metrics.serviceMonitor.enabled }}
|
||||
apiVersion: monitoring.coreos.com/v1
|
||||
kind: ServiceMonitor
|
||||
metadata:
|
||||
name: {{ template "mariadb.fullname" . }}
|
||||
{{- if .Values.metrics.serviceMonitor.namespace }}
|
||||
namespace: {{ .Values.metrics.serviceMonitor.namespace }}
|
||||
{{- else }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
{{- end }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: {{ template "mariadb.chart" . }}
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
{{- range $key, $value := .Values.metrics.serviceMonitor.selector }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
release: {{ .Release.Name | quote }}
|
||||
endpoints:
|
||||
- port: metrics
|
||||
{{- if .Values.metrics.serviceMonitor.interval }}
|
||||
interval: {{ .Values.metrics.serviceMonitor.interval }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.serviceMonitor.scrapeTimeout }}
|
||||
scrapeTimeout: {{ .Values.metrics.serviceMonitor.scrapeTimeout }}
|
||||
{{- end }}
|
||||
namespaceSelector:
|
||||
matchNames:
|
||||
- {{ .Release.Namespace }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,16 @@
|
||||
{{- if and .Values.replication.enabled .Values.slave.config }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ template "slave.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "slave"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
data:
|
||||
my.cnf: |-
|
||||
{{ .Values.slave.config | indent 4 }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,27 @@
|
||||
{{- if .Values.replication.enabled }}
|
||||
{{- if .Values.slave.podDisruptionBudget.enabled }}
|
||||
apiVersion: policy/v1beta1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: {{ template "mariadb.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "slave"
|
||||
chart: {{ template "mariadb.chart" . }}
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
spec:
|
||||
{{- if .Values.slave.podDisruptionBudget.minAvailable }}
|
||||
minAvailable: {{ .Values.slave.podDisruptionBudget.minAvailable }}
|
||||
{{- end }}
|
||||
{{- if .Values.slave.podDisruptionBudget.maxUnavailable }}
|
||||
maxUnavailable: {{ .Values.slave.podDisruptionBudget.maxUnavailable }}
|
||||
{{- end }}
|
||||
selector:
|
||||
matchLabels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "slave"
|
||||
release: {{ .Release.Name | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,316 @@
|
||||
{{- if .Values.replication.enabled }}
|
||||
apiVersion: {{ template "mariadb.statefulset.apiVersion" . }}
|
||||
kind: StatefulSet
|
||||
metadata:
|
||||
name: {{ template "slave.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
chart: {{ template "mariadb.chart" . }}
|
||||
release: {{ .Release.Name }}
|
||||
heritage: {{ .Release.Service }}
|
||||
component: slave
|
||||
{{- include "mariadb.podLabels" . | nindent 4 }}
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
component: slave
|
||||
serviceName: {{ template "slave.fullname" . }}
|
||||
replicas: {{ .Values.slave.replicas }}
|
||||
updateStrategy:
|
||||
type: {{ .Values.slave.updateStrategy.type }}
|
||||
{{- if (eq "Recreate" .Values.slave.updateStrategy.type) }}
|
||||
rollingUpdate: null
|
||||
{{- end }}
|
||||
template:
|
||||
metadata:
|
||||
{{- if .Values.slave.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.slave.annotations }}
|
||||
{{ $key }}: {{ $value }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
labels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
chart: {{ template "mariadb.chart" . }}
|
||||
release: {{ .Release.Name }}
|
||||
component: slave
|
||||
{{- include "mariadb.podLabels" . | nindent 8 }}
|
||||
spec:
|
||||
{{- if .Values.schedulerName }}
|
||||
schedulerName: {{ .Values.schedulerName | quote }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ template "mariadb.serviceAccountName" . }}
|
||||
{{- if .Values.securityContext.enabled }}
|
||||
securityContext:
|
||||
fsGroup: {{ .Values.securityContext.fsGroup }}
|
||||
runAsUser: {{ .Values.securityContext.runAsUser }}
|
||||
{{- end }}
|
||||
{{- if eq .Values.slave.antiAffinity "hard" }}
|
||||
affinity:
|
||||
{{- with .Values.slave.affinity }}
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
podAntiAffinity:
|
||||
requiredDuringSchedulingIgnoredDuringExecution:
|
||||
- topologyKey: "kubernetes.io/hostname"
|
||||
labelSelector:
|
||||
matchLabels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
{{- else if eq .Values.slave.antiAffinity "soft" }}
|
||||
affinity:
|
||||
{{- with .Values.slave.affinity }}
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
podAntiAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
- weight: 1
|
||||
podAffinityTerm:
|
||||
topologyKey: kubernetes.io/hostname
|
||||
labelSelector:
|
||||
matchLabels:
|
||||
app: {{ template "mariadb.name" . }}
|
||||
release: {{ .Release.Name }}
|
||||
{{- else}}
|
||||
{{- with .Values.slave.affinity }}
|
||||
affinity: {{ toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.slave.nodeSelector }}
|
||||
nodeSelector: {{ toYaml .Values.slave.nodeSelector | nindent 8 }}
|
||||
{{- end -}}
|
||||
{{- with .Values.slave.tolerations }}
|
||||
tolerations: {{ toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- include "mariadb.imagePullSecrets" . | indent 6 }}
|
||||
initContainers:
|
||||
{{- if .Values.master.extraInitContainers }}
|
||||
{{- tpl .Values.master.extraInitContainers . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if and .Values.volumePermissions.enabled .Values.slave.persistence.enabled }}
|
||||
- name: volume-permissions
|
||||
image: {{ template "mariadb.volumePermissions.image" . }}
|
||||
imagePullPolicy: {{ .Values.volumePermissions.image.pullPolicy | quote }}
|
||||
command: ["chown", "-R", "{{ .Values.securityContext.runAsUser }}:{{ .Values.securityContext.fsGroup }}", "/bitnami/mariadb"]
|
||||
securityContext:
|
||||
runAsUser: 0
|
||||
resources: {{ toYaml .Values.volumePermissions.resources | nindent 12 }}
|
||||
volumeMounts:
|
||||
- name: data
|
||||
mountPath: /bitnami/mariadb
|
||||
{{- end }}
|
||||
containers:
|
||||
- name: "mariadb"
|
||||
image: {{ template "mariadb.image" . }}
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy | quote }}
|
||||
env:
|
||||
{{- if .Values.image.debug}}
|
||||
- name: BITNAMI_DEBUG
|
||||
value: "true"
|
||||
{{- end }}
|
||||
{{- if .Values.slave.extraFlags }}
|
||||
- name: MARIADB_EXTRA_FLAGS
|
||||
value: "{{ .Values.slave.extraFlags }}"
|
||||
{{- end }}
|
||||
- name: MARIADB_REPLICATION_MODE
|
||||
value: "slave"
|
||||
- name: MARIADB_MASTER_HOST
|
||||
value: {{ template "mariadb.fullname" . }}
|
||||
- name: MARIADB_MASTER_PORT_NUMBER
|
||||
value: "{{ .Values.service.port }}"
|
||||
- name: MARIADB_MASTER_ROOT_USER
|
||||
value: "root"
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
- name: MARIADB_MASTER_ROOT_PASSWORD_FILE
|
||||
value: "/opt/bitnami/mariadb/secrets/mariadb-root-password"
|
||||
{{- else }}
|
||||
- name: MARIADB_MASTER_ROOT_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ template "mariadb.secretName" . }}
|
||||
key: mariadb-root-password
|
||||
{{- end }}
|
||||
- name: MARIADB_REPLICATION_USER
|
||||
value: "{{ .Values.replication.user }}"
|
||||
{{- if .Values.replication.injectSecretsAsVolume }}
|
||||
- name: MARIADB_REPLICATION_PASSWORD_FILE
|
||||
value: "/opt/bitnami/mariadb/secrets/mariadb-replication-password"
|
||||
{{- else }}
|
||||
- name: MARIADB_REPLICATION_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ template "mariadb.secretName" . }}
|
||||
key: mariadb-replication-password
|
||||
{{- end }}
|
||||
{{- if .Values.slave.extraEnvVars }}
|
||||
{{- tpl (toYaml .Values.slave.extraEnvVars) $ | nindent 12 }}
|
||||
{{- end }}
|
||||
{{- if or .Values.slave.extraEnvVarsCM .Values.slave.extraEnvVarsSecret }}
|
||||
envFrom:
|
||||
{{- if .Values.slave.extraEnvVarsCM }}
|
||||
- configMapRef:
|
||||
name: {{ .Values.slave.extraEnvVarsCM }}
|
||||
{{- end }}
|
||||
{{- if .Values.slave.extraEnvVarsSecret }}
|
||||
- secretRef:
|
||||
name: {{ .Values.slave.extraEnvVarsSecret }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- name: mysql
|
||||
containerPort: 3306
|
||||
{{- if .Values.slave.livenessProbe.enabled }}
|
||||
livenessProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
password_aux="${MARIADB_MASTER_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_MASTER_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_aux=$(cat $MARIADB_MASTER_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
mysqladmin status -uroot -p$password_aux
|
||||
initialDelaySeconds: {{ .Values.slave.livenessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.slave.livenessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.slave.livenessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.slave.livenessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.slave.livenessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.slave.readinessProbe.enabled }}
|
||||
readinessProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
password_aux="${MARIADB_MASTER_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_MASTER_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_aux=$(cat $MARIADB_MASTER_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
mysqladmin status -uroot -p$password_aux
|
||||
initialDelaySeconds: {{ .Values.slave.readinessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.slave.readinessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.slave.readinessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.slave.readinessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.slave.readinessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.slave.resources }}
|
||||
resources: {{ toYaml .Values.slave.resources | nindent 12 }}
|
||||
{{- end }}
|
||||
volumeMounts:
|
||||
- name: data
|
||||
mountPath: /bitnami/mariadb
|
||||
{{- if .Values.slave.config }}
|
||||
- name: config
|
||||
mountPath: /opt/bitnami/mariadb/conf/my.cnf
|
||||
subPath: my.cnf
|
||||
{{- end }}
|
||||
{{- if or .Values.rootUser.injectSecretsAsVolume .Values.replication.injectSecretsAsVolume }}
|
||||
- name: mariadb-credentials
|
||||
mountPath: /opt/bitnami/mariadb/secrets/
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.enabled }}
|
||||
- name: metrics
|
||||
image: {{ template "mariadb.metrics.image" . }}
|
||||
imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }}
|
||||
env:
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
- name: MARIADB_ROOT_PASSWORD_FILE
|
||||
value: "/opt/bitnami/mysqld-exporter/secrets/mariadb-root-password"
|
||||
{{- else }}
|
||||
- name: MARIADB_ROOT_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ template "mariadb.secretName" . }}
|
||||
key: mariadb-root-password
|
||||
{{- end }}
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
password_aux="${MARIADB_ROOT_PASSWORD:-}"
|
||||
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||||
password_aux=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||||
fi
|
||||
DATA_SOURCE_NAME="root:${password_aux}@(localhost:3306)/" /bin/mysqld_exporter {{- range .Values.metrics.extraArgs.slave }} {{ . }} {{- end }}
|
||||
ports:
|
||||
- name: metrics
|
||||
containerPort: 9104
|
||||
{{- if .Values.metrics.livenessProbe.enabled }}
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
port: metrics
|
||||
initialDelaySeconds: {{ .Values.metrics.livenessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.metrics.livenessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.metrics.livenessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.metrics.livenessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.metrics.livenessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.readinessProbe.enabled }}
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
port: metrics
|
||||
initialDelaySeconds: {{ .Values.metrics.readinessProbe.initialDelaySeconds }}
|
||||
periodSeconds: {{ .Values.metrics.readinessProbe.periodSeconds }}
|
||||
timeoutSeconds: {{ .Values.metrics.readinessProbe.timeoutSeconds }}
|
||||
successThreshold: {{ .Values.metrics.readinessProbe.successThreshold }}
|
||||
failureThreshold: {{ .Values.metrics.readinessProbe.failureThreshold }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.resources }}
|
||||
resources: {{ toYaml .Values.metrics.resources | nindent 12 }}
|
||||
{{- end }}
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
volumeMounts:
|
||||
- name: mariadb-credentials
|
||||
mountPath: /opt/bitnami/mysqld-exporter/secrets/
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
volumes:
|
||||
{{- if .Values.slave.config }}
|
||||
- name: config
|
||||
configMap:
|
||||
name: {{ template "slave.fullname" . }}
|
||||
{{- end }}
|
||||
{{- if or .Values.rootUser.injectSecretsAsVolume .Values.replication.injectSecretsAsVolume }}
|
||||
- name: mariadb-credentials
|
||||
secret:
|
||||
secretName: {{ template "mariadb.fullname" . }}
|
||||
items:
|
||||
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||||
- key: mariadb-root-password
|
||||
path: mariadb-root-password
|
||||
{{- end }}
|
||||
{{- if .Values.replication.injectSecretsAsVolume }}
|
||||
- key: mariadb-replication-password
|
||||
path: mariadb-replication-password
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if not .Values.slave.persistence.enabled }}
|
||||
- name: "data"
|
||||
emptyDir: {}
|
||||
{{- else }}
|
||||
volumeClaimTemplates:
|
||||
- metadata:
|
||||
name: data
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "slave"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
spec:
|
||||
accessModes:
|
||||
{{- range .Values.slave.persistence.accessModes }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .Values.slave.persistence.size | quote }}
|
||||
{{ include "mariadb.slave.storageClass" . }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
@ -0,0 +1,49 @@
|
||||
{{- if .Values.replication.enabled }}
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: {{ template "slave.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
chart: "{{ template "mariadb.chart" . }}"
|
||||
component: "slave"
|
||||
release: {{ .Release.Name | quote }}
|
||||
heritage: {{ .Release.Service | quote }}
|
||||
{{- if or .Values.metrics.enabled .Values.slave.service.annotations }}
|
||||
annotations:
|
||||
{{- if .Values.metrics.enabled }}
|
||||
{{ toYaml .Values.metrics.annotations | indent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.slave.service.annotations }}
|
||||
{{ toYaml .Values.slave.service.annotations | indent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
spec:
|
||||
type: {{ .Values.service.type }}
|
||||
{{- if eq .Values.service.type "ClusterIP" }}
|
||||
{{- if .Values.service.clusterIp }}
|
||||
clusterIP: {{ .Values.service.clusterIp.slave }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- name: mysql
|
||||
port: {{ .Values.service.port }}
|
||||
targetPort: mysql
|
||||
{{- if (eq .Values.service.type "NodePort") }}
|
||||
{{- if .Values.service.nodePort }}
|
||||
{{- if .Values.service.nodePort.slave }}
|
||||
nodePort: {{ .Values.service.nodePort.slave }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.metrics.enabled }}
|
||||
- name: metrics
|
||||
port: 9104
|
||||
targetPort: metrics
|
||||
{{- end }}
|
||||
selector:
|
||||
app: "{{ template "mariadb.name" . }}"
|
||||
component: "slave"
|
||||
release: "{{ .Release.Name }}"
|
||||
{{- end }}
|
||||
@ -0,0 +1,592 @@
|
||||
## Global Docker image parameters
|
||||
## Please, note that this will override the image parameters, including dependencies, configured to use the global value
|
||||
## Current available global Docker image parameters: imageRegistry and imagePullSecrets
|
||||
##
|
||||
# global:
|
||||
# imageRegistry: myRegistryName
|
||||
# imagePullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
# storageClass: myStorageClass
|
||||
|
||||
## Use an alternate scheduler, e.g. "stork".
|
||||
## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
|
||||
##
|
||||
# schedulerName:
|
||||
|
||||
## Bitnami MariaDB image
|
||||
## ref: https://hub.docker.com/r/bitnami/mariadb/tags/
|
||||
##
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mariadb
|
||||
tag: 10.3.23-debian-10-r73
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
|
||||
##
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
|
||||
## Set to true if you would like to see extra information on logs
|
||||
## It turns BASH and NAMI debugging in minideb
|
||||
## ref: https://github.com/bitnami/minideb-extras/#turn-on-bash-debugging
|
||||
debug: false
|
||||
|
||||
## String to partially override mariadb.fullname template (will maintain the release name)
|
||||
##
|
||||
# nameOverride:
|
||||
|
||||
## String to fully override mariadb.fullname template
|
||||
##
|
||||
# fullnameOverride:
|
||||
|
||||
## Additional pod labels
|
||||
##
|
||||
# podLabels:
|
||||
# extraLabel: extraValue
|
||||
|
||||
## Init containers parameters:
|
||||
## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section.
|
||||
##
|
||||
volumePermissions:
|
||||
enabled: false
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/minideb
|
||||
tag: buster
|
||||
pullPolicy: Always
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
resources: {}
|
||||
|
||||
service:
|
||||
## Kubernetes service type, ClusterIP and NodePort are supported at present
|
||||
type: ClusterIP
|
||||
# clusterIp:
|
||||
# master: xx.xx.xx.xx
|
||||
# slave: xx.xx.xx.xx
|
||||
port: 3306
|
||||
## Specify the nodePort value for the LoadBalancer and NodePort service types.
|
||||
## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
|
||||
##
|
||||
# nodePort:
|
||||
# master: 30001
|
||||
# slave: 30002
|
||||
|
||||
## Pods Service Account
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
|
||||
serviceAccount:
|
||||
## Specifies whether a ServiceAccount should be created
|
||||
##
|
||||
create: false
|
||||
## The name of the ServiceAccount to use.
|
||||
## If not set and create is true, a name is generated using the mariadb.fullname template
|
||||
# name:
|
||||
|
||||
## Role Based Access
|
||||
## Ref: https://kubernetes.io/docs/admin/authorization/rbac/
|
||||
##
|
||||
rbac:
|
||||
create: false
|
||||
|
||||
## Pod Security Context
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
||||
##
|
||||
securityContext:
|
||||
enabled: true
|
||||
fsGroup: 1001
|
||||
runAsUser: 1001
|
||||
|
||||
## Use existing secret (ignores root, db and replication passwords)
|
||||
##
|
||||
# existingSecret:
|
||||
|
||||
## Allow customization of the secret resource
|
||||
##
|
||||
secret:
|
||||
## Add custom annotations to the secret (evaluated as a template)
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
annotations: {}
|
||||
## Require all passwords at the secret resource
|
||||
##
|
||||
requirePasswords: true
|
||||
|
||||
## MariaDB admin credentials
|
||||
##
|
||||
rootUser:
|
||||
## MariaDB admin password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run
|
||||
##
|
||||
password: ""
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: true
|
||||
## Mount admin password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: true
|
||||
|
||||
## Custom user/db credentials
|
||||
##
|
||||
db:
|
||||
## MariaDB username and password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-user-on-first-run
|
||||
##
|
||||
user: ""
|
||||
password: ""
|
||||
## Database to create
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-on-first-run
|
||||
##
|
||||
name: my_database
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: true
|
||||
## Mount user password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: true
|
||||
|
||||
## Replication configuration
|
||||
##
|
||||
replication:
|
||||
## Enable replication. This enables the creation of replicas of MariaDB. If false, only a
|
||||
## master deployment would be created
|
||||
##
|
||||
enabled: true
|
||||
## MariaDB replication user
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster
|
||||
##
|
||||
user: replicator
|
||||
## MariaDB replication user password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster
|
||||
##
|
||||
password: ""
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: true
|
||||
## Mount replication user password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: true
|
||||
|
||||
## initdb scripts
|
||||
## Specify dictionary of scripts to be run at first boot
|
||||
## Alternatively, you can put your scripts under the files/docker-entrypoint-initdb.d directory
|
||||
##
|
||||
# initdbScripts:
|
||||
# my_init_script.sh: |
|
||||
# #!/bin/sh
|
||||
# echo "Do something."
|
||||
#
|
||||
## ConfigMap with scripts to be run at first boot
|
||||
## Note: This will override initdbScripts
|
||||
# initdbScriptsConfigMap:
|
||||
|
||||
master:
|
||||
## Mariadb Master additional pod annotations
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
# annotations:
|
||||
# key: value
|
||||
# another-key: another-value
|
||||
|
||||
## MariaDB additional command line flags
|
||||
## Can be used to specify command line flags, for example:
|
||||
##
|
||||
## extraFlags: "--max-connect-errors=1000 --max_connections=155"
|
||||
|
||||
## Affinity for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
##
|
||||
affinity: {}
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
## extraEnvVars:
|
||||
## - name: TZ
|
||||
## value: "Europe/Paris"
|
||||
##
|
||||
extraEnvVars:
|
||||
|
||||
## ConfigMap with extra env vars:
|
||||
##
|
||||
extraEnvVarsCM:
|
||||
|
||||
## Secret with extra env vars:
|
||||
##
|
||||
extraEnvVarsSecret:
|
||||
|
||||
## Kept for backwards compatibility. You can now disable it by removing it.
|
||||
## if you wish to set it through master.affinity.podAntiAffinity instead.
|
||||
##
|
||||
antiAffinity: soft
|
||||
|
||||
## Node labels for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/user-guide/node-selection/
|
||||
##
|
||||
nodeSelector: {}
|
||||
|
||||
## Tolerations for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
##
|
||||
tolerations: []
|
||||
|
||||
## updateStrategy for MariaDB Master StatefulSet
|
||||
## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
|
||||
updateStrategy:
|
||||
type: RollingUpdate
|
||||
|
||||
## Enable persistence using Persistent Volume Claims
|
||||
## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
||||
##
|
||||
persistence:
|
||||
## If true, use a Persistent Volume Claim, If false, use emptyDir
|
||||
##
|
||||
enabled: true
|
||||
# Enable persistence using an existing PVC
|
||||
# existingClaim:
|
||||
# Subdirectory of the volume to mount
|
||||
# subPath:
|
||||
mountPath: /bitnami/mariadb
|
||||
## Persistent Volume Storage Class
|
||||
## If defined, storageClassName: <storageClass>
|
||||
## If set to "-", storageClassName: "", which disables dynamic provisioning
|
||||
## If undefined (the default) or set to null, no storageClassName spec is
|
||||
## set, choosing the default provisioner. (gp2 on AWS, standard on
|
||||
## GKE, AWS & OpenStack)
|
||||
##
|
||||
# storageClass: "-"
|
||||
## Persistent Volume Claim annotations
|
||||
##
|
||||
annotations: {}
|
||||
## Persistent Volume Access Mode
|
||||
##
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
## Persistent Volume size
|
||||
##
|
||||
size: 8Gi
|
||||
|
||||
extraInitContainers: []
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
## extraEnvVars:
|
||||
## - name: TZ
|
||||
## value: "Europe/Paris"
|
||||
##
|
||||
# extraEnvVars:
|
||||
|
||||
## Configure MySQL with a custom my.cnf file
|
||||
## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file
|
||||
##
|
||||
config: |-
|
||||
[mysqld]
|
||||
skip-name-resolve
|
||||
explicit_defaults_for_timestamp
|
||||
basedir=/opt/bitnami/mariadb
|
||||
plugin_dir=/opt/bitnami/mariadb/plugin
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
tmpdir=/opt/bitnami/mariadb/tmp
|
||||
max_allowed_packet=16M
|
||||
bind-address=0.0.0.0
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
log-error=/opt/bitnami/mariadb/logs/mysqld.log
|
||||
character-set-server=UTF8
|
||||
collation-server=utf8_general_ci
|
||||
|
||||
[client]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
default-character-set=UTF8
|
||||
plugin_dir=/opt/bitnami/mariadb/plugin
|
||||
|
||||
[manager]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
|
||||
## Configure master resource requests and limits
|
||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
||||
##
|
||||
resources: {}
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 30
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
podDisruptionBudget:
|
||||
enabled: false
|
||||
minAvailable: 1
|
||||
# maxUnavailable: 1
|
||||
|
||||
## Allow customization of the service resource
|
||||
##
|
||||
service:
|
||||
## Add custom annotations to the service
|
||||
##
|
||||
annotations: {}
|
||||
|
||||
slave:
|
||||
replicas: 2
|
||||
|
||||
## Mariadb Slave additional pod annotations
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
# annotations:
|
||||
# key: value
|
||||
# another-key: another-value
|
||||
|
||||
## MariaDB additional command line flags
|
||||
## Can be used to specify command line flags, for example:
|
||||
##
|
||||
## extraFlags: --max-connect-errors=1000 --max_connections=155"
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
## extraEnvVars:
|
||||
## - name: TZ
|
||||
## value: "Europe/Paris"
|
||||
##
|
||||
extraEnvVars:
|
||||
|
||||
## ConfigMap with extra env vars:
|
||||
##
|
||||
extraEnvVarsCM:
|
||||
|
||||
## Secret with extra env vars:
|
||||
##
|
||||
extraEnvVarsSecret:
|
||||
|
||||
## Affinity for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
##
|
||||
affinity: {}
|
||||
|
||||
## Kept for backwards compatibility. You can now disable it by removing it.
|
||||
## if you wish to set it through slave.affinity.podAntiAffinity instead.
|
||||
##
|
||||
antiAffinity: soft
|
||||
|
||||
## Node labels for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/user-guide/node-selection/
|
||||
##
|
||||
nodeSelector: {}
|
||||
|
||||
## Tolerations for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
##
|
||||
tolerations: []
|
||||
|
||||
## updateStrategy for MariaDB Slave StatefulSet
|
||||
## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
|
||||
updateStrategy:
|
||||
type: RollingUpdate
|
||||
|
||||
persistence:
|
||||
## If true, use a Persistent Volume Claim, If false, use emptyDir
|
||||
##
|
||||
enabled: true
|
||||
# storageClass: "-"
|
||||
annotations:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
## Persistent Volume size
|
||||
##
|
||||
size: 8Gi
|
||||
|
||||
## Add extra init containers
|
||||
##
|
||||
extraInitContainers: []
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
## extraEnvVars:
|
||||
## - name: TZ
|
||||
## value: "Europe/Paris"
|
||||
##
|
||||
# extraEnvVars:
|
||||
|
||||
## Configure MySQL slave with a custom my.cnf file
|
||||
## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file
|
||||
##
|
||||
config: |-
|
||||
[mysqld]
|
||||
skip-name-resolve
|
||||
explicit_defaults_for_timestamp
|
||||
basedir=/opt/bitnami/mariadb
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
tmpdir=/opt/bitnami/mariadb/tmp
|
||||
max_allowed_packet=16M
|
||||
bind-address=0.0.0.0
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
log-error=/opt/bitnami/mariadb/logs/mysqld.log
|
||||
character-set-server=UTF8
|
||||
collation-server=utf8_general_ci
|
||||
|
||||
[client]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
default-character-set=UTF8
|
||||
|
||||
[manager]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
|
||||
##
|
||||
## Configure slave resource requests and limits
|
||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
||||
##
|
||||
resources: {}
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 45
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
podDisruptionBudget:
|
||||
enabled: false
|
||||
minAvailable: 1
|
||||
# maxUnavailable: 1
|
||||
|
||||
## Allow customization of the service resource
|
||||
##
|
||||
service:
|
||||
## Add custom annotations to the service
|
||||
##
|
||||
annotations: {}
|
||||
|
||||
metrics:
|
||||
enabled: true
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mysqld-exporter
|
||||
tag: 0.12.1-debian-10-r179
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
resources: {}
|
||||
annotations:
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: "9104"
|
||||
|
||||
## Extra args to be passed to mysqld_exporter
|
||||
## ref: https://github.com/prometheus/mysqld_exporter/
|
||||
##
|
||||
extraArgs:
|
||||
master: []
|
||||
slave: []
|
||||
# - --collect.auto_increment.columns
|
||||
# - --collect.binlog_size
|
||||
# - --collect.engine_innodb_status
|
||||
# - --collect.engine_tokudb_status
|
||||
# - --collect.global_status
|
||||
# - --collect.global_variables
|
||||
# - --collect.info_schema.clientstats
|
||||
# - --collect.info_schema.innodb_metrics
|
||||
# - --collect.info_schema.innodb_tablespaces
|
||||
# - --collect.info_schema.innodb_cmp
|
||||
# - --collect.info_schema.innodb_cmpmem
|
||||
# - --collect.info_schema.processlist
|
||||
# - --collect.info_schema.processlist.min_time
|
||||
# - --collect.info_schema.query_response_time
|
||||
# - --collect.info_schema.tables
|
||||
# - --collect.info_schema.tables.databases
|
||||
# - --collect.info_schema.tablestats
|
||||
# - --collect.info_schema.userstats
|
||||
# - --collect.perf_schema.eventsstatements
|
||||
# - --collect.perf_schema.eventsstatements.digest_text_limit
|
||||
# - --collect.perf_schema.eventsstatements.limit
|
||||
# - --collect.perf_schema.eventsstatements.timelimit
|
||||
# - --collect.perf_schema.eventswaits
|
||||
# - --collect.perf_schema.file_events
|
||||
# - --collect.perf_schema.file_instances
|
||||
# - --collect.perf_schema.indexiowaits
|
||||
# - --collect.perf_schema.tableiowaits
|
||||
# - --collect.perf_schema.tablelocks
|
||||
# - --collect.perf_schema.replication_group_member_stats
|
||||
# - --collect.slave_status
|
||||
# - --collect.slave_hosts
|
||||
# - --collect.heartbeat
|
||||
# - --collect.heartbeat.database
|
||||
# - --collect.heartbeat.table
|
||||
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 30
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
# Enable this if you're using https://github.com/coreos/prometheus-operator
|
||||
serviceMonitor:
|
||||
enabled: false
|
||||
## Specify a namespace if needed
|
||||
# namespace: monitoring
|
||||
# fallback to the prometheus default unless specified
|
||||
# interval: 10s
|
||||
# scrapeTimeout: 10s
|
||||
## Defaults to what's used if you follow CoreOS [Prometheus Install Instructions](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#tldr)
|
||||
## [Prometheus Selector Label](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-operator-1)
|
||||
## [Kube Prometheus Selector Label](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#exporters)
|
||||
selector:
|
||||
prometheus: kube-prometheus
|
||||
@ -0,0 +1,571 @@
|
||||
## Global Docker image parameters
|
||||
## Please, note that this will override the image parameters, including dependencies, configured to use the global value
|
||||
## Current available global Docker image parameters: imageRegistry and imagePullSecrets
|
||||
##
|
||||
# global:
|
||||
# imageRegistry: myRegistryName
|
||||
# imagePullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
# storageClass: myStorageClass
|
||||
|
||||
## Use an alternate scheduler, e.g. "stork".
|
||||
## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
|
||||
##
|
||||
# schedulerName:
|
||||
|
||||
## Bitnami MariaDB image
|
||||
## ref: https://hub.docker.com/r/bitnami/mariadb/tags/
|
||||
##
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mariadb
|
||||
tag: 10.3.23-debian-10-r65
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
|
||||
##
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
|
||||
## Set to true if you would like to see extra information on logs
|
||||
## It turns BASH and NAMI debugging in minideb
|
||||
## ref: https://github.com/bitnami/minideb-extras/#turn-on-bash-debugging
|
||||
debug: false
|
||||
|
||||
## String to partially override mariadb.fullname template (will maintain the release name)
|
||||
##
|
||||
# nameOverride:
|
||||
|
||||
## String to fully override mariadb.fullname template
|
||||
##
|
||||
# fullnameOverride:
|
||||
|
||||
## Additional pod labels
|
||||
##
|
||||
# podLabels:
|
||||
# extraLabel: extraValue
|
||||
|
||||
## Init containers parameters:
|
||||
## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section.
|
||||
##
|
||||
volumePermissions:
|
||||
enabled: false
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/minideb
|
||||
tag: buster
|
||||
pullPolicy: Always
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
resources: {}
|
||||
|
||||
service:
|
||||
## Kubernetes service type, ClusterIP and NodePort are supported at present
|
||||
type: ClusterIP
|
||||
# clusterIp:
|
||||
# master: xx.xx.xx.xx
|
||||
# slave: xx.xx.xx.xx
|
||||
port: 3306
|
||||
## Specify the nodePort value for the LoadBalancer and NodePort service types.
|
||||
## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
|
||||
##
|
||||
# nodePort:
|
||||
# master: 30001
|
||||
# slave: 30002
|
||||
|
||||
## Pods Service Account
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
|
||||
serviceAccount:
|
||||
## Specifies whether a ServiceAccount should be created
|
||||
##
|
||||
create: false
|
||||
## The name of the ServiceAccount to use.
|
||||
## If not set and create is true, a name is generated using the mariadb.fullname template
|
||||
# name:
|
||||
|
||||
## Role Based Access
|
||||
## Ref: https://kubernetes.io/docs/admin/authorization/rbac/
|
||||
##
|
||||
rbac:
|
||||
create: false
|
||||
|
||||
## Pod Security Context
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
||||
##
|
||||
securityContext:
|
||||
enabled: true
|
||||
fsGroup: 1001
|
||||
runAsUser: 1001
|
||||
|
||||
## Use existing secret (ignores root, db and replication passwords)
|
||||
##
|
||||
# existingSecret:
|
||||
|
||||
## MariaDB admin credentials
|
||||
##
|
||||
rootUser:
|
||||
## MariaDB admin password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run
|
||||
##
|
||||
password: ""
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: false
|
||||
## Mount admin password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: false
|
||||
|
||||
## Custom user/db credentials
|
||||
##
|
||||
db:
|
||||
## MariaDB username and password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-user-on-first-run
|
||||
##
|
||||
user: ""
|
||||
password: ""
|
||||
## Database to create
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-on-first-run
|
||||
##
|
||||
name: my_database
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: false
|
||||
## Mount user password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: false
|
||||
|
||||
## Replication configuration
|
||||
##
|
||||
replication:
|
||||
## Enable replication. This enables the creation of replicas of MariaDB. If false, only a
|
||||
## master deployment would be created
|
||||
##
|
||||
enabled: true
|
||||
## MariaDB replication user
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster
|
||||
##
|
||||
user: replicator
|
||||
## MariaDB replication user password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster
|
||||
##
|
||||
password: ""
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: false
|
||||
## Mount replication user password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: false
|
||||
|
||||
## initdb scripts
|
||||
## Specify dictionary of scripts to be run at first boot
|
||||
## Alternatively, you can put your scripts under the files/docker-entrypoint-initdb.d directory
|
||||
##
|
||||
# initdbScripts:
|
||||
# my_init_script.sh: |
|
||||
# #!/bin/sh
|
||||
# echo "Do something."
|
||||
#
|
||||
## ConfigMap with scripts to be run at first boot
|
||||
## Note: This will override initdbScripts
|
||||
# initdbScriptsConfigMap:
|
||||
|
||||
master:
|
||||
## Mariadb Master additional pod annotations
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
# annotations:
|
||||
# key: value
|
||||
# another-key: another-value
|
||||
|
||||
## MariaDB additional command line flags
|
||||
## Can be used to specify command line flags, for example:
|
||||
##
|
||||
## extraFlags: "--max-connect-errors=1000 --max_connections=155"
|
||||
|
||||
## Affinity for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
##
|
||||
affinity: {}
|
||||
|
||||
## Kept for backwards compatibility. You can now disable it by removing it.
|
||||
## if you wish to set it through master.affinity.podAntiAffinity instead.
|
||||
##
|
||||
antiAffinity: soft
|
||||
|
||||
## Node labels for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/user-guide/node-selection/
|
||||
##
|
||||
nodeSelector: {}
|
||||
|
||||
## Tolerations for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
##
|
||||
tolerations: []
|
||||
|
||||
## updateStrategy for MariaDB Master StatefulSet
|
||||
## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
|
||||
updateStrategy:
|
||||
type: RollingUpdate
|
||||
|
||||
## Enable persistence using Persistent Volume Claims
|
||||
## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
||||
##
|
||||
persistence:
|
||||
## If true, use a Persistent Volume Claim, If false, use emptyDir
|
||||
##
|
||||
enabled: true
|
||||
# Enable persistence using an existing PVC
|
||||
# existingClaim:
|
||||
# Subdirectory of the volume to mount
|
||||
# subPath:
|
||||
mountPath: /bitnami/mariadb
|
||||
## Persistent Volume Storage Class
|
||||
## If defined, storageClassName: <storageClass>
|
||||
## If set to "-", storageClassName: "", which disables dynamic provisioning
|
||||
## If undefined (the default) or set to null, no storageClassName spec is
|
||||
## set, choosing the default provisioner. (gp2 on AWS, standard on
|
||||
## GKE, AWS & OpenStack)
|
||||
##
|
||||
# storageClass: "-"
|
||||
## Persistent Volume Claim annotations
|
||||
##
|
||||
annotations: {}
|
||||
## Persistent Volume Access Mode
|
||||
##
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
## Persistent Volume size
|
||||
##
|
||||
size: 8Gi
|
||||
|
||||
## Add extra init Containers (evaluated as a templ
|
||||
##
|
||||
extraInitContainers: []
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
## extraEnvVars:
|
||||
## - name: TZ
|
||||
## value: "Europe/Paris"
|
||||
##
|
||||
extraEnvVars:
|
||||
|
||||
## ConfigMap with extra env vars:
|
||||
##
|
||||
extraEnvVarsCM:
|
||||
|
||||
## Secret with extra env vars:
|
||||
##
|
||||
extraEnvVarsSecret:
|
||||
|
||||
## Configure MySQL with a custom my.cnf file
|
||||
## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file
|
||||
##
|
||||
config: |-
|
||||
[mysqld]
|
||||
skip-name-resolve
|
||||
explicit_defaults_for_timestamp
|
||||
basedir=/opt/bitnami/mariadb
|
||||
plugin_dir=/opt/bitnami/mariadb/plugin
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
tmpdir=/opt/bitnami/mariadb/tmp
|
||||
max_allowed_packet=16M
|
||||
bind-address=0.0.0.0
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
log-error=/opt/bitnami/mariadb/logs/mysqld.log
|
||||
character-set-server=UTF8
|
||||
collation-server=utf8_general_ci
|
||||
|
||||
[client]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
default-character-set=UTF8
|
||||
plugin_dir=/opt/bitnami/mariadb/plugin
|
||||
|
||||
[manager]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
|
||||
## Configure master resource requests and limits
|
||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
||||
##
|
||||
resources: {}
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 30
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
podDisruptionBudget:
|
||||
enabled: false
|
||||
minAvailable: 1
|
||||
# maxUnavailable: 1
|
||||
|
||||
## Allow customization of the service resource
|
||||
##
|
||||
service:
|
||||
## Add custom annotations to the service
|
||||
##
|
||||
annotations: {}
|
||||
# external-dns.alpha.kubernetes.io/hostname: db.example.com
|
||||
|
||||
slave:
|
||||
replicas: 1
|
||||
|
||||
## Mariadb Slave additional pod annotations
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
# annotations:
|
||||
# key: value
|
||||
# another-key: another-value
|
||||
|
||||
## MariaDB additional command line flags
|
||||
## Can be used to specify command line flags, for example:
|
||||
##
|
||||
## extraFlags: "--max-connect-errors=1000 --max_connections=155"
|
||||
|
||||
## Affinity for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
##
|
||||
affinity: {}
|
||||
|
||||
## Kept for backwards compatibility. You can now disable it by removing it.
|
||||
## if you wish to set it through slave.affinity.podAntiAffinity instead.
|
||||
##
|
||||
antiAffinity: soft
|
||||
|
||||
## Node labels for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/user-guide/node-selection/
|
||||
##
|
||||
nodeSelector: {}
|
||||
|
||||
## Tolerations for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
##
|
||||
tolerations: []
|
||||
|
||||
## updateStrategy for MariaDB Slave StatefulSet
|
||||
## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
|
||||
updateStrategy:
|
||||
type: RollingUpdate
|
||||
|
||||
persistence:
|
||||
## If true, use a Persistent Volume Claim, If false, use emptyDir
|
||||
##
|
||||
enabled: true
|
||||
# storageClass: "-"
|
||||
annotations:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
## Persistent Volume size
|
||||
##
|
||||
size: 8Gi
|
||||
|
||||
## Add extra init containers
|
||||
##
|
||||
extraInitContainers:
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
## extraEnvVars:
|
||||
## - name: TZ
|
||||
## value: "Europe/Paris"
|
||||
##
|
||||
extraEnvVars:
|
||||
|
||||
## ConfigMap with extra env vars:
|
||||
##
|
||||
extraEnvVarsCM:
|
||||
|
||||
## Secret with extra env vars:
|
||||
##
|
||||
extraEnvVarsSecret:
|
||||
|
||||
## Configure MySQL slave with a custom my.cnf file
|
||||
## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file
|
||||
##
|
||||
config: |-
|
||||
[mysqld]
|
||||
skip-name-resolve
|
||||
explicit_defaults_for_timestamp
|
||||
basedir=/opt/bitnami/mariadb
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
tmpdir=/opt/bitnami/mariadb/tmp
|
||||
max_allowed_packet=16M
|
||||
bind-address=0.0.0.0
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
log-error=/opt/bitnami/mariadb/logs/mysqld.log
|
||||
character-set-server=UTF8
|
||||
collation-server=utf8_general_ci
|
||||
|
||||
[client]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
default-character-set=UTF8
|
||||
|
||||
[manager]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
|
||||
##
|
||||
## Configure slave resource requests and limits
|
||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
||||
##
|
||||
resources: {}
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 45
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
podDisruptionBudget:
|
||||
enabled: false
|
||||
minAvailable: 1
|
||||
# maxUnavailable: 1
|
||||
|
||||
## Allow customization of the service resource
|
||||
##
|
||||
service:
|
||||
## Add custom annotations to the service
|
||||
##
|
||||
annotations: {}
|
||||
# external-dns.alpha.kubernetes.io/hostname: rodb.example.com
|
||||
|
||||
metrics:
|
||||
enabled: false
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mysqld-exporter
|
||||
tag: 0.12.1-debian-10-r170
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
resources: {}
|
||||
annotations:
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: "9104"
|
||||
|
||||
## Extra args to be passed to mysqld_exporter
|
||||
## ref: https://github.com/prometheus/mysqld_exporter/
|
||||
##
|
||||
extraArgs:
|
||||
master: []
|
||||
slave: []
|
||||
# - --collect.auto_increment.columns
|
||||
# - --collect.binlog_size
|
||||
# - --collect.engine_innodb_status
|
||||
# - --collect.engine_tokudb_status
|
||||
# - --collect.global_status
|
||||
# - --collect.global_variables
|
||||
# - --collect.info_schema.clientstats
|
||||
# - --collect.info_schema.innodb_metrics
|
||||
# - --collect.info_schema.innodb_tablespaces
|
||||
# - --collect.info_schema.innodb_cmp
|
||||
# - --collect.info_schema.innodb_cmpmem
|
||||
# - --collect.info_schema.processlist
|
||||
# - --collect.info_schema.processlist.min_time
|
||||
# - --collect.info_schema.query_response_time
|
||||
# - --collect.info_schema.tables
|
||||
# - --collect.info_schema.tables.databases
|
||||
# - --collect.info_schema.tablestats
|
||||
# - --collect.info_schema.userstats
|
||||
# - --collect.perf_schema.eventsstatements
|
||||
# - --collect.perf_schema.eventsstatements.digest_text_limit
|
||||
# - --collect.perf_schema.eventsstatements.limit
|
||||
# - --collect.perf_schema.eventsstatements.timelimit
|
||||
# - --collect.perf_schema.eventswaits
|
||||
# - --collect.perf_schema.file_events
|
||||
# - --collect.perf_schema.file_instances
|
||||
# - --collect.perf_schema.indexiowaits
|
||||
# - --collect.perf_schema.tableiowaits
|
||||
# - --collect.perf_schema.tablelocks
|
||||
# - --collect.perf_schema.replication_group_member_stats
|
||||
# - --collect.slave_status
|
||||
# - --collect.slave_hosts
|
||||
# - --collect.heartbeat
|
||||
# - --collect.heartbeat.database
|
||||
# - --collect.heartbeat.table
|
||||
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 30
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
# Enable this if you're using https://github.com/coreos/prometheus-operator
|
||||
serviceMonitor:
|
||||
enabled: false
|
||||
## Specify a namespace if needed
|
||||
# namespace: monitoring
|
||||
# fallback to the prometheus default unless specified
|
||||
# interval: 10s
|
||||
# scrapeTimeout: 10s
|
||||
## Defaults to what's used if you follow CoreOS [Prometheus Install Instructions](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#tldr)
|
||||
## [Prometheus Selector Label](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-operator-1)
|
||||
## [Kube Prometheus Selector Label](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#exporters)
|
||||
selector:
|
||||
prometheus: kube-prometheus
|
||||
|
||||
@ -0,0 +1,204 @@
|
||||
{
|
||||
"$schema": "http://json-schema.org/schema#",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"rootUser": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"password": {
|
||||
"type": "string",
|
||||
"title": "MariaDB admin password",
|
||||
"form": true,
|
||||
"description": "Defaults to a random 10-character alphanumeric string if not set",
|
||||
"hidden": {
|
||||
"value": false,
|
||||
"path": "usePassword"
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"ccdb": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"DefaultPhoneRegistrationPassword": {
|
||||
"type": "string",
|
||||
"title": "Default Phone Registration Password",
|
||||
"description": "This is the default registration password used when new phones are added to the system. Default is random.",
|
||||
"form": true
|
||||
},
|
||||
"DefaultPhoneLoginPassword": {
|
||||
"type": "string",
|
||||
"title": "Default Phone Login Password",
|
||||
"description": "This is the default phone web login password used when new phones are added to the system. Default is release-name-random.",
|
||||
"form": true
|
||||
},
|
||||
"DefaultServerPassword": {
|
||||
"type": "string",
|
||||
"title": "Default Server Password",
|
||||
"description": "This is the default server password used when new servers are added to the system. Default is random.",
|
||||
"form": true
|
||||
},
|
||||
"DefaultPassKey": {
|
||||
"type": "string",
|
||||
"title": "Default Pass Key",
|
||||
"description": "Password Encryption Default is random.",
|
||||
"form": true
|
||||
},
|
||||
"SapianPassword": {
|
||||
"type": "string",
|
||||
"title": "Sapian Password",
|
||||
"description": "Sapian Admin User Password Default is random.",
|
||||
"form": true
|
||||
}
|
||||
}
|
||||
},
|
||||
"db": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"name": {
|
||||
"type": "string",
|
||||
"title": "MariaDB custom database",
|
||||
"description": "Name of the custom database to be created during the 1st initialization of MariaDB",
|
||||
"form": true
|
||||
},
|
||||
"user": {
|
||||
"type": "string",
|
||||
"title": "MariaDB custom user",
|
||||
"description": "Name of the custom user to be created during the 1st initialization of MariaDB. This user only has permissions on the MariaDB custom database",
|
||||
"form": true
|
||||
},
|
||||
"password": {
|
||||
"type": "string",
|
||||
"title": "Password for MariaDB custom user",
|
||||
"form": true,
|
||||
"description": "Defaults to a random 10-character alphanumeric string if not set",
|
||||
"hidden": {
|
||||
"value": false,
|
||||
"path": "usePassword"
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"replication": {
|
||||
"type": "object",
|
||||
"title": "Replication configuration",
|
||||
"form": true,
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"form": true,
|
||||
"title": "Enable replication configuration"
|
||||
}
|
||||
}
|
||||
},
|
||||
"master": {
|
||||
"type": "object",
|
||||
"title": "Master replicas settings",
|
||||
"form": true,
|
||||
"properties": {
|
||||
"persistence": {
|
||||
"type": "object",
|
||||
"title": "Persistence for master replicas",
|
||||
"form": true,
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"form": true,
|
||||
"title": "Enable persistence",
|
||||
"description": "Enable persistence using Persistent Volume Claims"
|
||||
},
|
||||
"size": {
|
||||
"type": "string",
|
||||
"title": "Persistent Volume Size",
|
||||
"form": true,
|
||||
"render": "slider",
|
||||
"sliderMin": 1,
|
||||
"sliderMax": 100,
|
||||
"sliderUnit": "Gi",
|
||||
"hidden": {
|
||||
"value": false,
|
||||
"path": "persistence/enabled"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"slave": {
|
||||
"type": "object",
|
||||
"title": "Slave replicas settings",
|
||||
"form": true,
|
||||
"hidden": {
|
||||
"value": false,
|
||||
"path": "replication/enabled"
|
||||
},
|
||||
"properties": {
|
||||
"persistence": {
|
||||
"type": "object",
|
||||
"title": "Persistence for slave replicas",
|
||||
"form": true,
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"form": true,
|
||||
"title": "Enable persistence",
|
||||
"description": "Enable persistence using Persistent Volume Claims"
|
||||
},
|
||||
"size": {
|
||||
"type": "string",
|
||||
"title": "Persistent Volume Size",
|
||||
"form": true,
|
||||
"render": "slider",
|
||||
"sliderMin": 1,
|
||||
"sliderMax": 100,
|
||||
"sliderUnit": "Gi",
|
||||
"hidden": {
|
||||
"value": false,
|
||||
"path": "persistence/enabled"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"volumePermissions": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"form": true,
|
||||
"title": "Enable Init Containers",
|
||||
"description": "Use an init container to set required folder permissions on the data volume before mounting it in the final destination"
|
||||
}
|
||||
}
|
||||
},
|
||||
"metrics": {
|
||||
"type": "object",
|
||||
"form": true,
|
||||
"title": "Prometheus metrics details",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"title": "Create Prometheus metrics exporter",
|
||||
"description": "Create a side-car container to expose Prometheus metrics",
|
||||
"form": true
|
||||
},
|
||||
"serviceMonitor": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"title": "Create Prometheus Operator ServiceMonitor",
|
||||
"description": "Create a ServiceMonitor to track metrics using Prometheus Operator",
|
||||
"form": true,
|
||||
"hidden": {
|
||||
"value": false,
|
||||
"path": "metrics/enabled"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,615 @@
|
||||
## Global Docker image parameters
|
||||
## Please, note that this will override the image parameters, including dependencies, configured to use the global value
|
||||
## Current available global Docker image parameters: imageRegistry and imagePullSecrets
|
||||
##
|
||||
# global:
|
||||
# imageRegistry: myRegistryName
|
||||
# imagePullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
# storageClass: myStorageClass
|
||||
|
||||
## Use an alternate scheduler, e.g. "stork".
|
||||
## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
|
||||
##
|
||||
# schedulerName:
|
||||
|
||||
## Bitnami MariaDB image
|
||||
## ref: https://hub.docker.com/r/bitnami/mariadb/tags/
|
||||
##
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mariadb
|
||||
tag: 10.3.23-debian-10-r73
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
|
||||
##
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
|
||||
## Set to true if you would like to see extra information on logs
|
||||
## It turns BASH and NAMI debugging in minideb
|
||||
## ref: https://github.com/bitnami/minideb-extras/#turn-on-bash-debugging
|
||||
debug: true
|
||||
|
||||
## String to partially override mariadb.fullname template (will maintain the release name)
|
||||
##
|
||||
# nameOverride:
|
||||
|
||||
## String to fully override mariadb.fullname template
|
||||
##
|
||||
# fullnameOverride:
|
||||
|
||||
## Additional pod labels
|
||||
##
|
||||
# podLabels:
|
||||
# extraLabel: extraValue
|
||||
|
||||
## Init containers parameters:
|
||||
## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup values from the securityContext section.
|
||||
##
|
||||
volumePermissions:
|
||||
enabled: false
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/minideb
|
||||
tag: buster
|
||||
pullPolicy: Always
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
resources: {}
|
||||
|
||||
service:
|
||||
## Kubernetes service type, ClusterIP and NodePort are supported at present
|
||||
type: ClusterIP
|
||||
# clusterIp:
|
||||
# master: xx.xx.xx.xx
|
||||
# slave: xx.xx.xx.xx
|
||||
port: 3306
|
||||
## Specify the nodePort value for the LoadBalancer and NodePort service types.
|
||||
## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
|
||||
##
|
||||
# nodePort:
|
||||
# master: 30001
|
||||
# slave: 30002
|
||||
|
||||
## Pods Service Account
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
|
||||
serviceAccount:
|
||||
## Specifies whether a ServiceAccount should be created
|
||||
##
|
||||
create: false
|
||||
## The name of the ServiceAccount to use.
|
||||
## If not set and create is true, a name is generated using the mariadb.fullname template
|
||||
# name:
|
||||
|
||||
## Role Based Access
|
||||
## Ref: https://kubernetes.io/docs/admin/authorization/rbac/
|
||||
##
|
||||
rbac:
|
||||
create: false
|
||||
|
||||
## Pod Security Context
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
||||
##
|
||||
securityContext:
|
||||
enabled: true
|
||||
fsGroup: 1001
|
||||
runAsUser: 1001
|
||||
|
||||
## Use existing secret (ignores root, db and replication passwords)
|
||||
##
|
||||
# existingSecret:
|
||||
|
||||
## Allow customization of the secret resource
|
||||
##
|
||||
secret:
|
||||
## Add custom annotations to the secret (evaluated as a template)
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
annotations: {}
|
||||
## Require all passwords at the secret resource
|
||||
##
|
||||
requirePasswords: true
|
||||
|
||||
## Vicidial CCDB admin credentials
|
||||
##
|
||||
|
||||
ccdb:
|
||||
# This is the default registration password used when new phones are added
|
||||
# to the system. Default is random.
|
||||
DefaultPhoneRegistrationPassword: ""
|
||||
# This is the default phone web login password used when new phones
|
||||
# are added to the system. Default is release-name-random.
|
||||
DefaultPhoneLoginPassword: ""
|
||||
# This is the default server password used when new servers
|
||||
# are added to the system. Default is random
|
||||
DefaultServerPassword: ""
|
||||
# Password Encryption Default is random
|
||||
DefaultPassKey: ""
|
||||
# Sapian Admin User Password Default is random
|
||||
SapianPassword: ""
|
||||
|
||||
|
||||
|
||||
## MariaDB admin credentials
|
||||
##
|
||||
rootUser:
|
||||
## MariaDB admin password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-the-root-password-on-first-run
|
||||
##
|
||||
password: ""
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: false
|
||||
## Mount admin password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: true
|
||||
|
||||
## Custom user/db credentials
|
||||
##
|
||||
db:
|
||||
## MariaDB username and password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-user-on-first-run
|
||||
##
|
||||
user: "ccweb"
|
||||
password: ""
|
||||
## Database to create
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#creating-a-database-on-first-run
|
||||
##
|
||||
name: asterisk
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: false
|
||||
## Mount user password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: true
|
||||
|
||||
## Replication configuration
|
||||
##
|
||||
replication:
|
||||
## Enable replication. This enables the creation of replicas of MariaDB. If false, only a
|
||||
## master deployment would be created
|
||||
##
|
||||
enabled: true
|
||||
## MariaDB replication user
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster
|
||||
##
|
||||
user: replicator
|
||||
## MariaDB replication user password
|
||||
## ref: https://github.com/bitnami/bitnami-docker-mariadb#setting-up-a-replication-cluster
|
||||
##
|
||||
password: ""
|
||||
## Option to force users to specify a password. That is required for 'helm upgrade' to work properly.
|
||||
## If it is not force, a random password will be generated.
|
||||
##
|
||||
forcePassword: false
|
||||
## Mount replication user password as a file instead of using an environment variable
|
||||
##
|
||||
injectSecretsAsVolume: true
|
||||
|
||||
## initdb scripts
|
||||
## Specify dictionary of scripts to be run at first boot
|
||||
## Alternatively, you can put your scripts under the files/docker-entrypoint-initdb.d directory
|
||||
##
|
||||
# initdbScripts:
|
||||
# my_init_script.sh: |
|
||||
# #!/bin/sh
|
||||
# echo "Do something."
|
||||
#
|
||||
## ConfigMap with scripts to be run at first boot
|
||||
## Note: This will override initdbScripts
|
||||
# initdbScriptsConfigMap:
|
||||
|
||||
master:
|
||||
## Mariadb Master additional pod annotations
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
# annotations:
|
||||
# key: value
|
||||
# another-key: another-value
|
||||
|
||||
## MariaDB additional command line flags
|
||||
## Can be used to specify command line flags, for example:
|
||||
##
|
||||
extraFlags: "--sql-mode=NO_ENGINE_SUBSTITUTION"
|
||||
|
||||
## Affinity for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
##
|
||||
affinity: {}
|
||||
|
||||
## Kept for backwards compatibility. You can now disable it by removing it.
|
||||
## if you wish to set it through master.affinity.podAntiAffinity instead.
|
||||
##
|
||||
antiAffinity: soft
|
||||
|
||||
## Node labels for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/user-guide/node-selection/
|
||||
##
|
||||
nodeSelector: {}
|
||||
|
||||
## Tolerations for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
##
|
||||
tolerations: []
|
||||
|
||||
## updateStrategy for MariaDB Master StatefulSet
|
||||
## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
|
||||
updateStrategy:
|
||||
type: RollingUpdate
|
||||
|
||||
## Enable persistence using Persistent Volume Claims
|
||||
## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
||||
##
|
||||
persistence:
|
||||
## If true, use a Persistent Volume Claim, If false, use emptyDir
|
||||
##
|
||||
enabled: true
|
||||
# Enable persistence using an existing PVC
|
||||
# existingClaim:
|
||||
# Subdirectory of the volume to mount
|
||||
# subPath:
|
||||
mountPath: /bitnami/mariadb
|
||||
## Persistent Volume Storage Class
|
||||
## If defined, storageClassName: <storageClass>
|
||||
## If set to "-", storageClassName: "", which disables dynamic provisioning
|
||||
## If undefined (the default) or set to null, no storageClassName spec is
|
||||
## set, choosing the default provisioner. (gp2 on AWS, standard on
|
||||
## GKE, AWS & OpenStack)
|
||||
##
|
||||
# storageClass: "-"
|
||||
## Persistent Volume Claim annotations
|
||||
##
|
||||
annotations: {}
|
||||
## Persistent Volume Access Mode
|
||||
##
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
## Persistent Volume size
|
||||
##
|
||||
size: 8Gi
|
||||
|
||||
## Add extra init Containers (evaluated as a templ
|
||||
##
|
||||
extraInitContainers: []
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
extraEnvVars:
|
||||
- name: TZ
|
||||
value: "America/Bogota"
|
||||
# - name: MARIADB_INIT_SLEEP_TIME
|
||||
# value: "360"
|
||||
# - name: BITNAMI_DEBUG
|
||||
# value: "true"
|
||||
|
||||
## extraEnvVars:
|
||||
|
||||
## ConfigMap with extra env vars:
|
||||
##
|
||||
extraEnvVarsCM:
|
||||
|
||||
## Secret with extra env vars:
|
||||
##
|
||||
extraEnvVarsSecret:
|
||||
|
||||
## Configure MySQL with a custom my.cnf file
|
||||
## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file
|
||||
##
|
||||
config: |-
|
||||
[mysqld]
|
||||
skip-name-resolve
|
||||
# explicit_defaults_for_timestamp
|
||||
basedir=/opt/bitnami/mariadb
|
||||
plugin_dir=/opt/bitnami/mariadb/plugin
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
tmpdir=/opt/bitnami/mariadb/tmp
|
||||
max_allowed_packet=16M
|
||||
bind-address=0.0.0.0
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
log-error=/opt/bitnami/mariadb/logs/mysqld.log
|
||||
character-set-server=UTF8
|
||||
collation-server=utf8_general_ci
|
||||
expire_logs_days=3
|
||||
long_query_time=1
|
||||
|
||||
[client]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
default-character-set=UTF8
|
||||
plugin_dir=/opt/bitnami/mariadb/plugin
|
||||
|
||||
[manager]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
|
||||
## Configure master resource requests and limits
|
||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
||||
##
|
||||
resources: {}
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 30
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
podDisruptionBudget:
|
||||
enabled: false
|
||||
minAvailable: 1
|
||||
# maxUnavailable: 1
|
||||
|
||||
## Allow customization of the service resource
|
||||
##
|
||||
service:
|
||||
## Add custom annotations to the service
|
||||
##
|
||||
annotations: {}
|
||||
# external-dns.alpha.kubernetes.io/hostname: db.example.com
|
||||
|
||||
slave:
|
||||
replicas: 1
|
||||
|
||||
## Mariadb Slave additional pod annotations
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
# annotations:
|
||||
# key: value
|
||||
# another-key: another-value
|
||||
|
||||
## MariaDB additional command line flags
|
||||
## Can be used to specify command line flags, for example:
|
||||
##
|
||||
## extraFlags: "--max-connect-errors=1000 --max_connections=155"
|
||||
|
||||
## Affinity for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
##
|
||||
affinity: {}
|
||||
|
||||
## Kept for backwards compatibility. You can now disable it by removing it.
|
||||
## if you wish to set it through slave.affinity.podAntiAffinity instead.
|
||||
##
|
||||
antiAffinity: soft
|
||||
|
||||
## Node labels for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/user-guide/node-selection/
|
||||
##
|
||||
nodeSelector: {}
|
||||
|
||||
## Tolerations for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
##
|
||||
tolerations: []
|
||||
|
||||
## updateStrategy for MariaDB Slave StatefulSet
|
||||
## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
|
||||
updateStrategy:
|
||||
type: RollingUpdate
|
||||
|
||||
persistence:
|
||||
## If true, use a Persistent Volume Claim, If false, use emptyDir
|
||||
##
|
||||
enabled: true
|
||||
# storageClass: "-"
|
||||
annotations:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
## Persistent Volume size
|
||||
##
|
||||
size: 8Gi
|
||||
|
||||
## Add extra init containers
|
||||
##
|
||||
extraInitContainers:
|
||||
|
||||
## An array to add extra environment variables
|
||||
## For example:
|
||||
## extraEnvVars:
|
||||
## - name: TZ
|
||||
## value: "Europe/Paris"
|
||||
##
|
||||
extraEnvVars:
|
||||
- name: TZ
|
||||
value: "America/Bogota"
|
||||
# - name: MARIADB_INIT_SLEEP_TIME
|
||||
# value: "360"
|
||||
- name: BITNAMI_DEBUG
|
||||
value: "true"
|
||||
|
||||
## ConfigMap with extra env vars:
|
||||
##
|
||||
extraEnvVarsCM:
|
||||
|
||||
## Secret with extra env vars:
|
||||
##
|
||||
extraEnvVarsSecret:
|
||||
|
||||
## Configure MySQL slave with a custom my.cnf file
|
||||
## ref: https://mysql.com/kb/en/mysql/configuring-mysql-with-mycnf/#example-of-configuration-file
|
||||
##
|
||||
config: |-
|
||||
[mysqld]
|
||||
skip-name-resolve
|
||||
explicit_defaults_for_timestamp
|
||||
basedir=/opt/bitnami/mariadb
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
tmpdir=/opt/bitnami/mariadb/tmp
|
||||
max_allowed_packet=16M
|
||||
bind-address=0.0.0.0
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
log-error=/opt/bitnami/mariadb/logs/mysqld.log
|
||||
character-set-server=UTF8
|
||||
collation-server=utf8_general_ci
|
||||
expire_logs_days=3
|
||||
long_query_time=1
|
||||
slave-skip-errors = 1032,1690,1062
|
||||
|
||||
[client]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
default-character-set=UTF8
|
||||
|
||||
[manager]
|
||||
port=3306
|
||||
socket=/opt/bitnami/mariadb/tmp/mysql.sock
|
||||
pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid
|
||||
|
||||
##
|
||||
## Configure slave resource requests and limits
|
||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
||||
##
|
||||
resources: {}
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 600
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 600
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 6
|
||||
|
||||
podDisruptionBudget:
|
||||
enabled: false
|
||||
minAvailable: 1
|
||||
# maxUnavailable: 1
|
||||
|
||||
## Allow customization of the service resource
|
||||
##
|
||||
service:
|
||||
## Add custom annotations to the service
|
||||
##
|
||||
annotations: {}
|
||||
# external-dns.alpha.kubernetes.io/hostname: rodb.example.com
|
||||
|
||||
metrics:
|
||||
enabled: true
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/mysqld-exporter
|
||||
tag: 0.12.1-debian-10-r179
|
||||
pullPolicy: IfNotPresent
|
||||
## Optionally specify an array of imagePullSecrets.
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
resources: {}
|
||||
annotations:
|
||||
prometheus.io/scrape: "true"
|
||||
prometheus.io/port: "9104"
|
||||
|
||||
## Extra args to be passed to mysqld_exporter
|
||||
## ref: https://github.com/prometheus/mysqld_exporter/
|
||||
##
|
||||
extraArgs:
|
||||
master: []
|
||||
slave: []
|
||||
# - --collect.auto_increment.columns
|
||||
# - --collect.binlog_size
|
||||
# - --collect.engine_innodb_status
|
||||
# - --collect.engine_tokudb_status
|
||||
# - --collect.global_status
|
||||
# - --collect.global_variables
|
||||
# - --collect.info_schema.clientstats
|
||||
# - --collect.info_schema.innodb_metrics
|
||||
# - --collect.info_schema.innodb_tablespaces
|
||||
# - --collect.info_schema.innodb_cmp
|
||||
# - --collect.info_schema.innodb_cmpmem
|
||||
# - --collect.info_schema.processlist
|
||||
# - --collect.info_schema.processlist.min_time
|
||||
# - --collect.info_schema.query_response_time
|
||||
# - --collect.info_schema.tables
|
||||
# - --collect.info_schema.tables.databases
|
||||
# - --collect.info_schema.tablestats
|
||||
# - --collect.info_schema.userstats
|
||||
# - --collect.perf_schema.eventsstatements
|
||||
# - --collect.perf_schema.eventsstatements.digest_text_limit
|
||||
# - --collect.perf_schema.eventsstatements.limit
|
||||
# - --collect.perf_schema.eventsstatements.timelimit
|
||||
# - --collect.perf_schema.eventswaits
|
||||
# - --collect.perf_schema.file_events
|
||||
# - --collect.perf_schema.file_instances
|
||||
# - --collect.perf_schema.indexiowaits
|
||||
# - --collect.perf_schema.tableiowaits
|
||||
# - --collect.perf_schema.tablelocks
|
||||
# - --collect.perf_schema.replication_group_member_stats
|
||||
# - --collect.slave_status
|
||||
# - --collect.slave_hosts
|
||||
# - --collect.heartbeat
|
||||
# - --collect.heartbeat.database
|
||||
# - --collect.heartbeat.table
|
||||
|
||||
livenessProbe:
|
||||
enabled: true
|
||||
##
|
||||
## Initializing the database could take some time
|
||||
initialDelaySeconds: 120
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
readinessProbe:
|
||||
enabled: true
|
||||
initialDelaySeconds: 30
|
||||
##
|
||||
## Default Kubernetes values
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 1
|
||||
successThreshold: 1
|
||||
failureThreshold: 3
|
||||
|
||||
# Enable this if you're using https://github.com/coreos/prometheus-operator
|
||||
serviceMonitor:
|
||||
enabled: false
|
||||
## Specify a namespace if needed
|
||||
# namespace: monitoring
|
||||
# fallback to the prometheus default unless specified
|
||||
# interval: 10s
|
||||
# scrapeTimeout: 10s
|
||||
## Defaults to what's used if you follow CoreOS [Prometheus Install Instructions](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#tldr)
|
||||
## [Prometheus Selector Label](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-operator-1)
|
||||
## [Kube Prometheus Selector Label](https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#exporters)
|
||||
selector:
|
||||
prometheus: kube-prometheus
|
||||
Loading…
Reference in new issue