thalesgroup.ciphertrust.connection_manager_aws module – Manage connections to the AWS cloud
Note
This module is part of the thalesgroup.ciphertrust collection (version 1.0.0).
To install it, use: ansible-galaxy collection install thalesgroup.ciphertrust
.
To use it in a playbook, specify: thalesgroup.ciphertrust.connection_manager_aws
.
New in thalesgroup.ciphertrust 1.0.0
Synopsis
This is a Thales CipherTrust Manager module for working with the CipherTrust Manager APIs, more specifically with Connection Manager API for AWS
Parameters
Parameter |
Comments |
---|---|
Key ID of the AWS user Default: |
|
AWS IAM role ARN Default: |
|
AWS role external ID Default: |
|
AWS region. only used when aws_sts_regional_endpoints is equal to regional otherwise, it takes default values according to Cloud Name given. Default: |
|
By default, AWS Security Token Service (AWS STS) is available as a global service, and all AWS STS requests go to a single endpoint at https://sts.amazonaws.com. Global requests map to the US East (N. Virginia) Region. AWS recommends using Regional AWS STS endpoints instead of the global endpoint to reduce latency, build in redundancy, and increase session token validity. Default: |
|
Name of the cloud Default: |
|
Unique ID of the connection to be updated Default: |
|
Description about the connection Default: |
|
this holds the connection parameters required to communicate with an instance of CipherTrust Manager (CM) holds IP/FQDN of the server, username, password, and port |
|
admin password of CM |
|
CM Server IP or FQDN |
|
Port on which CM server is listening Default: |
|
internal or private IP of the CM Server, if different from the server_ip |
|
admin username of CM |
|
if SSL verification is required Choices:
|
|
Optional end-user or service data stored with the connection |
|
Unique connection name Default: |
|
Operation to be performed Choices:
|
|
Array of the CipherTrust products associated with the connection. |
|
Secret associated with the access key ID of the AWS user Default: |
Examples
- name: "Create AWS Connection"
thalesgroup.ciphertrust.connection_manager_aws:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
op_type: create
name: aws-connection
products:
- cckm
access_key_id: "Sample ID"
secret_access_key: "Sample Secret"
cloud_name: aws
- name: "Update AWS Connection"
thalesgroup.ciphertrust.connection_manager_aws:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
op_type: patch