thalesgroup.ciphertrust.connection_manager_elasticsearch module – Manage Elasticsearch log forwarder connections
Note
This module is part of the thalesgroup.ciphertrust collection (version 1.0.0).
To install it, use: ansible-galaxy collection install thalesgroup.ciphertrust
.
To use it in a playbook, specify: thalesgroup.ciphertrust.connection_manager_elasticsearch
.
New in thalesgroup.ciphertrust 1.0.0
Synopsis
This is a Thales CipherTrust Manager module for working with the CipherTrust Manager APIs, more specifically with Connection Manager API for Elasticsearch
Parameters
Parameter |
Comments |
---|---|
Unique ID of the connection to be updated Default: |
|
Description about the connection Default: |
|
Elasticsearch parameters |
|
CA certificate in PEM format |
|
HTTP basic auth password |
|
HTTP basic auth username |
|
In TLS mode, skip server certificate validation. This setting should only be used for testing Choices:
|
|
Transport mode for sending data, supports “tls” and “tcp”. “tls” requires either a trusted CA cert or insecure TLS skip verify to be set to true. Default is “tcp” |
|
Host of the log-forwarder server Default: |
|
this holds the connection parameters required to communicate with an instance of CipherTrust Manager (CM) holds IP/FQDN of the server, username, password, and port |
|
admin password of CM |
|
CM Server IP or FQDN |
|
Port on which CM server is listening Default: |
|
internal or private IP of the CM Server, if different from the server_ip |
|
admin username of CM |
|
if SSL verification is required Choices:
|
|
Optional end-user or service data stored with the connection |
|
Unique connection name Default: |
|
Operation to be performed Choices:
|
|
Port of the log-forwarder server |
|
Array of the CipherTrust products associated with the connection. Default: |
Examples
- name: "Create ElasticSearch Connection"
thalesgroup.ciphertrust.connection_manager_elasticsearch:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
op_type: create
name: "Elasticsearch Connection"
products:
- logger
host: 127.0.0.1
port: 5321
- name: "Update ElasticSearch Connection"
thalesgroup.ciphertrust.connection_manager_elasticsearch:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
op_type: patch