forked from oracle/oracle-database-operator
-
Notifications
You must be signed in to change notification settings - Fork 0
/
autonomousdatabase_create.yaml
64 lines (59 loc) · 3.02 KB
/
autonomousdatabase_create.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
#
# Copyright (c) 2022, Oracle and/or its affiliates.
# Licensed under the Universal Permissive License v 1.0 as shown at http://oss.oracle.com/licenses/upl.
#
apiVersion: database.oracle.com/v1alpha1
kind: AutonomousDatabase
metadata:
name: autonomousdatabase-sample
spec:
details:
# Update compartmentOCID with your compartment OCID.
compartmentOCID: ocid1.compartment... OR ocid1.tenancy...
# The dbName must begin with an alphabetic character and can contain a maximum of 14 alphanumeric characters. Special characters are not permitted. The database name must be unique in the tenancy.
dbName: NewADB
displayName: NewADB
cpuCoreCount: 1
adminPassword:
# Comment out k8sSecret and uncomment ociSecret if you pass the admin password using OCI Secret.
k8sSecret:
# The Name of the K8s secret where you want to hold the password of the ADMIN account.
name: admin-password
# ociSecret:
# # The OCID of the OCI Secret that holds the password of the ADMIN account. It should start with ocid1.vaultsecret... .
# ocid: ocid1.vaultsecret...
dataStorageSizeInTBs: 1
# networkAccess:
# # Uncomment this block to configure the network access type with the PUBLIC option, which allows secure access from everywhere.
# accessType: PUBLIC
# # Uncomment this block to configure the network access type with the RESTRICTED option.
# # This option lets you restrict access by defining access control rules in an Access Control List (ACL).
# # By specifying an ACL, the database will be accessible from a whitelisted set of IP addresses, CIDR (Classless Inter-Domain Routing) blocks, or VCNs.
# # Use a semicolon (;) as a deliminator between the VCN-specific subnets or IPs.
# accessType: RESTRICTED
# accessControlList:
# - 1.1.1.1
# - 1.1.0.0/16
# - ocid1.vcn...
# - ocid1.vcn...;1.1.1.1
# - ocid1.vcn...;1.1.0.0/16
# isMTLSConnectionRequired: true
# # Uncomment this block to configure the network access type with the PRIVATE option.
# # This option assigns a private endpoint, private IP, and hostname to your database.
# # Specifying this option allows traffic only from the VCN you specify.
# # This allows you to define security rules, ingress/egress, at the Network Security Group (NSG) level and to control traffic to your Autonomous Database.
# accessType: PRIVATE
# privateEndpoint:
# subnetOCID: ocid1.subnet...
# nsgOCIDs:
# - ocid1.networksecuritygroup...
# isMTLSConnectionRequired: true
# # Uncomment this block to configure the network access of an dedicated Autonomous Database (ADB-D) with an access control list.
# isAccessControlEnabled: true
# accessControlList:
# - 1.1.1.1
# - 1.1.0.0/16
# Authorize the operator with API signing key pair. Comment out the ociConfig fields if your nodes are already authorized with instance principal.
ociConfig:
configMapName: oci-cred
secretName: oci-privatekey