Manually edit sip.conf or opensips.cfg , add peer definition, rewrite ACLs, test with sipshowpeer , reload, pray.
While not a household name in general IT, sisipsconfig has carved out a loyal following among telecom architects who need deterministic, repeatable, and auditable SIP configurations. This article explores its architecture, key features, and why it deserves a spot in your infrastructure toolchain. At its core, sisipsconfig is a declarative configuration management tool specifically designed for SIP infrastructure. Think of it as a hybrid between Ansible’s idempotency and iptables ’ rule-based logic, but tailored exclusively for SIP proxies, registrars, session border controllers (SBCs), and media gateways. sisipsconfig
# trunk.yaml version: "1.0" type: outbound_trunk name: carrier_east gateway: sip.carrier.com:5061 transport: tls auth: username: "outbound_001" secret_ref: "secret/carrier_east/pass" codecs: [PCMA, PCMU, G722] match_rules: - from_domain: "example.com" from_clid_regex: "^+1[2-9][0-9]{9}$" failover: secondary_gw Run: Manually edit sip
However, for a single Asterisk box with three extensions, the overhead may be unnecessary. The project’s maintainers have hinted at a GraphQL API for real-time configuration introspection and a Terraform provider for infrastructure-as-code integration. If those materialize, sisipsconfig could become the de facto standard for programmable SIP infrastructure. At its core, sisipsconfig is a declarative configuration