|
1 | 1 | # proxysql |
2 | 2 |
|
3 | | -  |
| 3 | +  |
4 | 4 |
|
5 | 5 | ProxySQL Helm chart for Kubernetes |
6 | 6 |
|
@@ -103,7 +103,7 @@ ProxySQL Helm chart for Kubernetes |
103 | 103 | | mysql_query_rules | string | `nil` | Configure mysql_query_rules. | |
104 | 104 | | use_default_proxysql_servers | bool | `true` | Configure use_default_proxysql_servers. | |
105 | 105 | | additional_proxysql_servers | string | `nil` | Configure additional_proxysql_servers. | |
106 | | -| proxysql_cluster | object | `{"core":{"enabled":true,"exit_on_error":false,"podDisruptionBudget":{},"priorityClassName":"","replicas":3,"service":{"name":""},"statefullset":{"affinity":{},"minReadySeconds":0,"nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"updateStrategy":{"type":"RollingUpdate"}}},"enabled":false,"healthcheck":{"diff_check_limit":10,"kill_if_healthcheck_failed":true,"livenessCommand":["/bin/sh","-c","/usr/local/bin/proxysql_cluster_healthcheck.sh liveness"],"psql_host":"127.0.0.1","psql_host_port":null,"psql_pass":null,"psql_user":null,"readinessCommand":["/bin/sh","-c","/usr/local/bin/proxysql_cluster_healthcheck.sh readiness"],"startupCommand":["/bin/sh","-c","/usr/local/bin/proxysql_cluster_healthcheck.sh started"],"verbose":false},"job":{"affinity":{},"backoffLimit":3,"enabled":true,"nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"ttlSecondsAfterFinished":86400},"satellite":{"daemonset":{"affinity":{},"minReadySeconds":0,"nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"updateStrategy":{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"}},"deployment":{"minReadySeconds":0,"strategy":{"rollingUpdate":{"maxSurge":1,"maxUnavailable":0},"type":"RollingUpdate"}},"enabled":true,"exit_on_error":false,"kind":"DaemonSet","podDisruptionBudget":{},"priorityClassName":"","replicas":3,"service":{"name":""}},"secret":{"cluster_password":"proxysql","cluster_username":"proxysql-cluster"}}` | Set proxysql_cluster. | |
| 106 | +| proxysql_cluster | object | `{"core":{"enabled":true,"exit_on_error":false,"podDisruptionBudget":{},"priorityClassName":"","replicas":3,"service":{"name":""},"statefullset":{"affinity":{},"minReadySeconds":0,"nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"updateStrategy":{"type":"RollingUpdate"}}},"enabled":false,"healthcheck":{"diff_check_limit":10,"kill_if_healthcheck_failed":true,"livenessCommand":["/bin/sh","-c","/usr/local/bin/proxysql_cluster_healthcheck.sh liveness"],"psql_host":"127.0.0.1","psql_host_port":null,"psql_pass":null,"psql_user":null,"readinessCommand":["/bin/sh","-c","/usr/local/bin/proxysql_cluster_healthcheck.sh readiness"],"startupCommand":["/bin/sh","-c","/usr/local/bin/proxysql_cluster_healthcheck.sh started"],"verbose":false},"job":{"affinity":{},"backoffLimit":3,"enabled":true,"mysqlClientFlags":"--ssl=0","nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"ttlSecondsAfterFinished":86400},"satellite":{"daemonset":{"affinity":{},"minReadySeconds":0,"nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"updateStrategy":{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"}},"deployment":{"minReadySeconds":0,"strategy":{"rollingUpdate":{"maxSurge":1,"maxUnavailable":0},"type":"RollingUpdate"}},"enabled":true,"exit_on_error":false,"kind":"DaemonSet","podDisruptionBudget":{},"priorityClassName":"","replicas":3,"service":{"name":""}},"secret":{"cluster_password":"proxysql","cluster_username":"proxysql-cluster"}}` | Set proxysql_cluster. | |
107 | 107 | | proxysql_cluster.enabled | bool | `false` | Enable this feature. | |
108 | 108 | | proxysql_cluster.secret | object | `{"cluster_password":"proxysql","cluster_username":"proxysql-cluster"}` | Component secret configuration map. | |
109 | 109 | | proxysql_cluster.secret.cluster_username | string | `"proxysql-cluster"` | Set proxysql_cluster.secret.cluster_username. | |
@@ -150,10 +150,11 @@ ProxySQL Helm chart for Kubernetes |
150 | 150 | | proxysql_cluster.satellite.deployment.strategy.rollingUpdate.maxSurge | int | `1` | Allow one extra pod during upgrades. | |
151 | 151 | | proxysql_cluster.satellite.service | object | `{"name":""}` | Service configuration. | |
152 | 152 | | proxysql_cluster.satellite.service.name | string | `""` | Set proxysql_cluster.satellite.service.name. | |
153 | | -| proxysql_cluster.job | object | `{"affinity":{},"backoffLimit":3,"enabled":true,"nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"ttlSecondsAfterFinished":86400}` | Set proxysql_cluster.job. | |
| 153 | +| proxysql_cluster.job | object | `{"affinity":{},"backoffLimit":3,"enabled":true,"mysqlClientFlags":"--ssl=0","nodeSelector":{},"podAnnotations":{},"resources":{},"tolerations":[],"ttlSecondsAfterFinished":86400}` | Set proxysql_cluster.job. | |
154 | 154 | | proxysql_cluster.job.enabled | bool | `true` | Enable this feature. | |
155 | 155 | | proxysql_cluster.job.backoffLimit | int | `3` | Set proxysql_cluster.job.backoffLimit. | |
156 | 156 | | proxysql_cluster.job.ttlSecondsAfterFinished | int | `86400` | Set proxysql_cluster.job.ttlSecondsAfterFinished. | |
| 157 | +| proxysql_cluster.job.mysqlClientFlags | string | `"--ssl=0"` | Extra mysql client flags used by init-cluster job. Default disables TLS for internal admin connection to avoid certificate trust errors. | |
157 | 158 | | proxysql_cluster.job.nodeSelector | object | `{}` | Node selector for pod scheduling. | |
158 | 159 | | proxysql_cluster.job.tolerations | list | `[]` | Tolerations for pod scheduling. | |
159 | 160 | | proxysql_cluster.job.affinity | object | `{}` | Affinity rules for pod scheduling. | |
|
0 commit comments