@@ -65,7 +65,8 @@ podAnnotations: {}
65
65
# # @param podSecurityContext.enabled Enabled PgCat pods' Security Context
66
66
# # @param podSecurityContext.fsGroup Set PgCat pod's Security Context fsGroup
67
67
# #
68
- podSecurityContext : {}
68
+ podSecurityContext :
69
+ {}
69
70
# fsGroup: 2000
70
71
71
72
# # PgCat pods' Security Context
@@ -75,7 +76,8 @@ podSecurityContext: {}
75
76
# # @param containerSecurityContext.runAsUser Set PgCat container's Security Context runAsUser
76
77
# # @param containerSecurityContext.runAsNonRoot Set PgCat container's Security Context runAsNonRoot
77
78
# #
78
- containerSecurityContext : {}
79
+ containerSecurityContext :
80
+ {}
79
81
# capabilities:
80
82
# drop:
81
83
# - ALL
@@ -94,7 +96,8 @@ service:
94
96
ingress :
95
97
enabled : false
96
98
className : " "
97
- annotations : {}
99
+ annotations :
100
+ {}
98
101
# kubernetes.io/ingress.class: nginx
99
102
# kubernetes.io/tls-acme: "true"
100
103
hosts :
@@ -170,16 +173,16 @@ configuration:
170
173
connect_timeout : 5000
171
174
172
175
# How long an idle connection with a server is left open (ms).
173
- idle_timeout : 30000 # milliseconds
176
+ idle_timeout : 30000 # milliseconds
174
177
175
178
# Max connection lifetime before it's closed, even if actively used.
176
- server_lifetime : 86400000 # 24 hours
179
+ server_lifetime : 86400000 # 24 hours
177
180
178
181
# Whether to use TLS for server connections or not.
179
182
server_tls : false
180
183
181
184
# How long a client is allowed to be idle while in a transaction (ms).
182
- idle_client_in_transaction_timeout : 0 # milliseconds
185
+ idle_client_in_transaction_timeout : 0 # milliseconds
183
186
184
187
# @param configuration.general.healthcheck_timeout How much time to give `SELECT 1` health check query to return with a result (ms).
185
188
healthcheck_timeout : 1000
@@ -191,7 +194,7 @@ configuration:
191
194
shutdown_timeout : 60000
192
195
193
196
# @param configuration.general.ban_time For how long to ban a server if it fails a health check (seconds).
194
- ban_time : 60 # seconds
197
+ ban_time : 60 # seconds
195
198
196
199
# @param configuration.general.log_client_connections If we should log client connections
197
200
log_client_connections : false
@@ -205,9 +208,15 @@ configuration:
205
208
tls_certificate : " -"
206
209
tls_private_key : " -"
207
210
208
- # Credentials to access the virtual administrative database (pgbouncer or pgcat)
211
+ # Username used to access the virtual administrative database (pgbouncer or pgcat)
209
212
# Connecting to that database allows running commands like `SHOW POOLS`, `SHOW DATABASES`, etc..
210
213
admin_username : " postgres"
214
+
215
+ # Password to be used for administrative queries.
216
+ #
217
+ # @param configuration.general.admin_password
218
+ # @param configuration.general.admin_password_password_secret.name Name of the secret containing the password
219
+ # @param configuration.general.admin_password_password_secret.key Key in the secret containing the password
211
220
admin_password : " postgres"
212
221
213
222
# Query to be sent to servers to obtain the hash used for md5 authentication. The connection will be
@@ -227,6 +236,8 @@ configuration:
227
236
# in the pool. This parameter is inherited by every pool and can be redefined in pool configuration.
228
237
#
229
238
# @param configuration.general.auth_query_password
239
+ # @param configuration.general.auth_query_password_secret.name Name of the secret containing the password
240
+ # @param configuration.general.auth_query_password_secret.key Key in the secret containing the password
230
241
auth_query_password : null
231
242
232
243
# Number of seconds of connection idleness to wait before sending a keepalive packet to the server.
@@ -244,14 +255,28 @@ configuration:
244
255
# # For the example below a client can connect using "postgres://sharding_user:sharding_user@pgcat_host:pgcat_port/sharded"
245
256
# # @param [object]
246
257
pools :
247
- [{
248
- name : " simple" , pool_mode: "transaction",
249
- users : [{username: "user", password: "pass", pool_size: 5, statement_timeout: 0}],
250
- shards : [{
251
- servers : [{host: "postgres", port: 5432, role: "primary"}],
252
- database : " postgres"
253
- }]
254
- }]
258
+ [
259
+ {
260
+ name : " simple" ,
261
+ pool_mode : " transaction" ,
262
+ users :
263
+ [
264
+ {
265
+ username : " user" ,
266
+ password : " pass" ,
267
+ pool_size : 5,
268
+ statement_timeout : 0,
269
+ },
270
+ ],
271
+ shards :
272
+ [
273
+ {
274
+ servers : [{ host: "postgres", port: 5432, role: "primary" }],
275
+ database : " postgres" ,
276
+ },
277
+ ],
278
+ },
279
+ ]
255
280
# - ## default values
256
281
# ##
257
282
# ##
@@ -322,6 +347,8 @@ configuration:
322
347
# ## @param users[0].passwordSecret.name Name of the secret containing the password
323
348
# ## @param users[0].passwordSecret.key Key in the secret containing the password
324
349
# ## @param users[0].pool_size Maximum number of server connections that can be established for this user
350
+ # ## @param users[0].server_password_secret.name Name of the secret containing the server password
351
+ # ## @param users[0].server_password_secret.key Key in the secret containing the server password
325
352
# ## @param users[0].statement_timeout Maximum query duration. Dangerous, but protects against DBs that died in a non-obvious way.
326
353
# users: []
327
354
# # - username: "user"
0 commit comments