|
@@ -9,10 +9,10 @@
|
|
- { name: "curator_key", file: "system.logging.curator.key"}
|
|
- { name: "curator_key", file: "system.logging.curator.key"}
|
|
- { name: "curator_cert", file: "system.logging.curator.crt"}
|
|
- { name: "curator_cert", file: "system.logging.curator.crt"}
|
|
- { name: "fluentd_key", file: "system.logging.fluentd.key"}
|
|
- { name: "fluentd_key", file: "system.logging.fluentd.key"}
|
|
- - { name: "fluentd_cert", file: "system.logging.fluentd.crt"}
|
|
|
|
- - { name: "kibana_internal_key", file: "kibana-internal.key"}
|
|
|
|
- - { name: "kibana_internal_cert", file: "kibana-internal.crt"}
|
|
|
|
- - { name: "server_tls", file: "server-tls.json"}
|
|
|
|
|
|
+ - { name: "fluentd_cert", file: "system.logging.fluentd.crt"}
|
|
|
|
+ - { name: "kibana_internal_key", file: "kibana-internal.key"}
|
|
|
|
+ - { name: "kibana_internal_cert", file: "kibana-internal.crt"}
|
|
|
|
+ - { name: "server_tls", file: "server-tls.json"}
|
|
|
|
|
|
- name: Generating secrets for logging components
|
|
- name: Generating secrets for logging components
|
|
template: src=secret.j2 dest={{mktemp.stdout}}/templates/{{secret_name}}-secret.yaml
|
|
template: src=secret.j2 dest={{mktemp.stdout}}/templates/{{secret_name}}-secret.yaml
|
|
@@ -34,14 +34,15 @@
|
|
when: secret_name not in openshift_logging_facts.{{component}}.secrets or
|
|
when: secret_name not in openshift_logging_facts.{{component}}.secrets or
|
|
secret_keys | difference(openshift_logging_facts.{{component}}.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
secret_keys | difference(openshift_logging_facts.{{component}}.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
check_mode: no
|
|
check_mode: no
|
|
|
|
+ changed_when: no
|
|
|
|
|
|
- name: Generating secrets for kibana proxy
|
|
- name: Generating secrets for kibana proxy
|
|
template: src=secret.j2 dest={{mktemp.stdout}}/templates/{{secret_name}}-secret.yaml
|
|
template: src=secret.j2 dest={{mktemp.stdout}}/templates/{{secret_name}}-secret.yaml
|
|
vars:
|
|
vars:
|
|
secret_name: logging-kibana-proxy
|
|
secret_name: logging-kibana-proxy
|
|
- secrets:
|
|
|
|
- - {key: oauth-secret, value: "{{oauth_secret.stdout}}"}
|
|
|
|
- - {key: session-secret, value: "{{session_secret.stdout}}"}
|
|
|
|
|
|
+ secrets:
|
|
|
|
+ - {key: oauth-secret, value: "{{oauth_secret}}"}
|
|
|
|
+ - {key: session-secret, value: "{{session_secret}}"}
|
|
- {key: server-key, value: "{{kibana_key_file}}"}
|
|
- {key: server-key, value: "{{kibana_key_file}}"}
|
|
- {key: server-cert, value: "{{kibana_cert_file}}"}
|
|
- {key: server-cert, value: "{{kibana_cert_file}}"}
|
|
- {key: server-tls, value: "{{server_tls_file}}"}
|
|
- {key: server-tls, value: "{{server_tls_file}}"}
|
|
@@ -52,6 +53,7 @@
|
|
when: secret_name not in openshift_logging_facts.kibana.secrets or
|
|
when: secret_name not in openshift_logging_facts.kibana.secrets or
|
|
secret_keys | difference(openshift_logging_facts.kibana.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
secret_keys | difference(openshift_logging_facts.kibana.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
check_mode: no
|
|
check_mode: no
|
|
|
|
+ changed_when: no
|
|
|
|
|
|
- name: Generating secrets for elasticsearch
|
|
- name: Generating secrets for elasticsearch
|
|
command: >
|
|
command: >
|
|
@@ -67,7 +69,9 @@
|
|
when: secret_name not in openshift_logging_facts.elasticsearch.secrets or
|
|
when: secret_name not in openshift_logging_facts.elasticsearch.secrets or
|
|
secret_keys | difference(openshift_logging_facts.elasticsearch.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
secret_keys | difference(openshift_logging_facts.elasticsearch.secrets["{{secret_name}}"]["keys"]) | length != 0
|
|
check_mode: no
|
|
check_mode: no
|
|
|
|
+ changed_when: no
|
|
|
|
|
|
- copy: content="{{logging_es_secret.stdout}}" dest={{mktemp.stdout}}/templates/logging-elasticsearch-secret.yaml
|
|
- copy: content="{{logging_es_secret.stdout}}" dest={{mktemp.stdout}}/templates/logging-elasticsearch-secret.yaml
|
|
when: logging_es_secret.stdout is defined
|
|
when: logging_es_secret.stdout is defined
|
|
check_mode: no
|
|
check_mode: no
|
|
|
|
+ changed_when: no
|