generate_routes.yaml 1.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940
  1. ---
  2. - set_fact: kibana_key={{ lookup('file', openshift_logging_kibana_key) | b64encode }}
  3. when: "{{ openshift_logging_kibana_key | trim | length > 0 }}"
  4. changed_when: false
  5. - set_fact: kibana_cert={{ lookup('file', openshift_logging_kibana_cert)| b64encode }}
  6. when: "{{openshift_logging_kibana_cert | trim | length > 0}}"
  7. changed_when: false
  8. - set_fact: kibana_ca={{ lookup('file', openshift_logging_kibana_ca)| b64encode }}
  9. when: "{{openshift_logging_kibana_ca | trim | length > 0}}"
  10. changed_when: false
  11. - set_fact: kibana_ca={{key_pairs | entry_from_named_pair('ca_file') }}
  12. when: kibana_ca is not defined
  13. changed_when: false
  14. - name: Generating logging routes
  15. template: src=route_reencrypt.j2 dest={{mktemp.stdout}}/templates/logging-{{route_info.name}}-route.yaml
  16. tags: routes
  17. vars:
  18. obj_name: "{{route_info.name}}"
  19. route_host: "{{route_info.host}}"
  20. service_name: "{{route_info.name}}"
  21. tls_key: "{{kibana_key | default('') | b64decode}}"
  22. tls_cert: "{{kibana_cert | default('') | b64decode}}"
  23. tls_ca_cert: "{{kibana_ca | b64decode}}"
  24. tls_dest_ca_cert: "{{key_pairs | entry_from_named_pair('ca_file')| b64decode }}"
  25. edge_term_policy: "{{openshift_logging_kibana_edge_term_policy | default('') }}"
  26. labels:
  27. component: support
  28. logging-infra: support
  29. provider: openshift
  30. with_items:
  31. - {name: logging-kibana, host: "{{openshift_logging_kibana_hostname}}"}
  32. - {name: logging-kibana-ops, host: "{{openshift_logging_kibana_ops_hostname}}"}
  33. loop_control:
  34. loop_var: route_info
  35. when: (route_info.name == 'logging-kibana-ops' and openshift_logging_use_ops | bool) or route_info.name == 'logging-kibana'
  36. changed_when: no