|
@@ -31,8 +31,6 @@
|
|
- fluentd
|
|
- fluentd
|
|
loop_control:
|
|
loop_control:
|
|
loop_var: component
|
|
loop_var: component
|
|
- when: secret_name not in openshift_logging_facts.{{component}}.secrets or
|
|
|
|
- secret_keys | difference(openshift_logging_facts.{{component}}.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
|
|
check_mode: no
|
|
check_mode: no
|
|
changed_when: no
|
|
changed_when: no
|
|
|
|
|
|
@@ -50,8 +48,6 @@
|
|
kibana_key_file: "{{key_pairs | entry_from_named_pair('kibana_internal_key')| b64decode }}"
|
|
kibana_key_file: "{{key_pairs | entry_from_named_pair('kibana_internal_key')| b64decode }}"
|
|
kibana_cert_file: "{{key_pairs | entry_from_named_pair('kibana_internal_cert')| b64decode }}"
|
|
kibana_cert_file: "{{key_pairs | entry_from_named_pair('kibana_internal_cert')| b64decode }}"
|
|
server_tls_file: "{{key_pairs | entry_from_named_pair('server_tls')| b64decode }}"
|
|
server_tls_file: "{{key_pairs | entry_from_named_pair('server_tls')| b64decode }}"
|
|
- when: secret_name not in openshift_logging_facts.kibana.secrets or
|
|
|
|
- secret_keys | difference(openshift_logging_facts.kibana.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
|
|
check_mode: no
|
|
check_mode: no
|
|
changed_when: no
|
|
changed_when: no
|
|
|
|
|
|
@@ -66,8 +62,6 @@
|
|
secret_name: logging-elasticsearch
|
|
secret_name: logging-elasticsearch
|
|
secret_keys: ["admin-cert", "searchguard.key", "admin-ca", "key", "truststore", "admin-key", "searchguard.truststore"]
|
|
secret_keys: ["admin-cert", "searchguard.key", "admin-ca", "key", "truststore", "admin-key", "searchguard.truststore"]
|
|
register: logging_es_secret
|
|
register: logging_es_secret
|
|
- when: secret_name not in openshift_logging_facts.elasticsearch.secrets or
|
|
|
|
- secret_keys | difference(openshift_logging_facts.elasticsearch.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
|
|
check_mode: no
|
|
check_mode: no
|
|
changed_when: no
|
|
changed_when: no
|
|
|
|
|