Hello,
please keep the list in CC – that others can comment as well.
Can you actually connect from the kamailio system e.g. with mysql client? If yes, as I
said – I would try to debug the issue further with network analysis tools.
Cheers,
Henning
--
Henning Westerholt –
https://skalatan.de/blog/
Kamailio services –
https://gilawa.com<https://gilawa.com/>
From: Paclinio <thomas.leutscher(a)gmail.com>
Sent: Monday, March 28, 2022 1:11 PM
To: Henning Westerholt <hw(a)gilawa.com>
Subject: Re: [SR-Users] Kamailio : kamctl address reload with HAProxy
Hello,
KAMCTL :
I've resolved the problem with kamctl that now can communicate with my remote Cluster
by adding this line in kamctlrc.
// HAPROXY = 192.168.1.37
DBHOST=192.168.1.37
DBACCESSHOST=192.168.1.37
I can now add and reload new addresses with success.
KAMAILIO + HAPROXY:
But now, I've this issue when restarting kamailio.
Mar 28 10:54:39 kamailio /usr/sbin/kamailio[8416]: ERROR: permissions [address.c:233]:
reload_address_db_table(): database problem - invalid record
Mar 28 10:54:39 kamailio /usr/sbin/kamailio[8416]: ERROR: permissions [permissions.c:657]:
mod_init(): failed to initialize the allow_address function
Mar 28 10:54:39 kamailio /usr/sbin/kamailio[8416]: ERROR: <core>
[core/sr_module.c:942]: init_mod(): Error while initializing module permissions
(/usr/lib/x86_64-linux-gnu/kamailio/modules/permissions.so)
My DBURL is
#!substdef "!DB_USER!kamailio!g"
#!substdef "!DB_PASS!XXXXX!g"
#!substdef "!DB_HOST!192.168.1.37!g" // HA PROXY
#!substdef "!DB_PORT!MY_PORT_DB!g"
#!substdef "!DB_NAME!kamailio!g"
#!define DBURL "mysql://DB_USER:DB_PASS@DB_HOST/DB_NAME"
KAMAILIO + REMOTE DB :
Even I using a remote database I'm getting the same issue.
I've discovered the connection between kamailio and remote database is aborded
instantly after restarting kamailio.
Mar 28 11:47:30 db03srv mariadbd[874]: 2022-03-28 11:47:30 44076 [Warning] Aborted
connection 44076 to db: 'kamailio' user: 'kamailio' host:
'192.168.1.41' (Got an error reading communication packets)
Thank you
[Das Bild wurde vom Absender
entfernt.]<https://www.avast.com/sig-email?utm_medium=email&utm_sour…
Virus-free.
www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_s…
Le dim. 27 mars 2022 à 22:52, Henning Westerholt
<hw@gilawa.com<mailto:hw@gilawa.com>> a écrit :
Hello,
it seems the data that gets delivered to the Kamailio is corrupted. Analyse it further
e.g. with a network trace, wireshark etc..
Cheers,
Henning
--
Henning Westerholt –
https://skalatan.de/blog/
Kamailio services –
https://gilawa.com<https://gilawa.com/>
From: sr-users
<sr-users-bounces@lists.kamailio.org<mailto:sr-users-bounces@lists.kamailio.org>>
On Behalf Of Paclinio
Sent: Friday, March 25, 2022 5:22 PM
To: sr-users@lists.kamailio.org<mailto:sr-users@lists.kamailio.org>
Subject: [SR-Users] Kamailio : kamctl address reload with HAProxy
Dear colleagues,
I've installed a Galera cluster with a HAProxy that kamailio interacts with.
Kamailio's DBURL is linked to the proxy that will contact the databases.
Kamailio works fine except when I need to reload something from the database (Using
kamctl).
When cache and database are the same I receive
sudo kamctl address reload
{
"jsonrpc": "2.0",
"result": "Reload OK",
"id": 13111
}
Now when I have something using kamctl, it still works and is replaced on all my
databases.
sipsecure@kamailio:~$ sudo kamctl address add 0 192.168.48.15 32 0 Test
-e \E[37;33mINFO: execute '/sbin/kamctl address reload' to synchronize cache and
database
Then when i try to reload i receive
sipsecure@kamailio:~$ sudo kamctl address reload
{
"jsonrpc": "2.0",
"error": {
"code": 500,
"message": "Reload failed."
},
"id": 13504
}
And when I'm going to read my logs to see a error, I only see that little sentence
Mar 25 17:14:40 kamailio /usr/sbin/kamailio[13343]: ERROR: permissions [address.c:233]:
reload_address_db_table(): database problem - invalid record
Could I have some explanation ?
Thank you.
[Das Bild wurde vom Absender
entfernt.]<https://www.avast.com/sig-email?utm_medium=email&utm_sour…
Virus-free.
www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_s…