thalesgroup.ciphertrust.connection_manager_hadoop module – Manage connections to the Hadoop servers
Note
This module is part of the thalesgroup.ciphertrust collection (version 1.0.0).
To install it, use: ansible-galaxy collection install thalesgroup.ciphertrust
.
To use it in a playbook, specify: thalesgroup.ciphertrust.connection_manager_hadoop
.
New in thalesgroup.ciphertrust 1.0.0
Synopsis
This is a Thales CipherTrust Manager module for working with the CipherTrust Manager APIs, more specifically with Connection Manager API for Hadoop
Parameters
Parameter |
Comments |
---|---|
Unique ID of the connection to be updated Default: |
|
Description about the connection Default: |
|
hostname for Hadoop Server |
|
this holds the connection parameters required to communicate with an instance of CipherTrust Manager (CM) holds IP/FQDN of the server, username, password, and port |
|
admin password of CM |
|
CM Server IP or FQDN |
|
Port on which CM server is listening Default: |
|
internal or private IP of the CM Server, if different from the server_ip |
|
admin username of CM |
|
if SSL verification is required Choices:
|
|
Optional end-user or service data stored with the connection |
|
Unique connection name Default: |
|
Unique ID of the Hadoop node to be updated or removed |
|
Hadoop nodes information |
|
hostname for Hadoop Server |
|
path for Hadoop Server |
|
port for Hadoop Server. Possible values 1-65535 |
|
http or https protocol to be used for communication with the Hadoop node (https required for hadoop-knox) |
|
SSL certificate for Hadoop Server TLS communication |
|
Operation to be performed Choices:
|
|
Password for Hadoop server (required for Knox) Default: |
|
path for Hadoop Server |
|
port for Hadoop Server. Possible values 1-65535 |
|
Array of the CipherTrust products associated with the connection. Default: |
|
http or https protocol to be used for communication with the Hadoop node (https required for hadoop-knox) |
|
SSL certificate for Hadoop Server TLS communication |
|
Name of the third-party service associated with the resource. Examples are aws, azure, gcp, luna network, and hadoop-knox Default: |
|
Topology deployment of the Knox gateway Default: |
|
Username for accessing Hadoop server (required for Knox) Default: |
Examples
- name: "Create Hadoop Connection"
thalesgroup.ciphertrust.connection_manager_hadoop:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
op_type: create
name: knoxConnection
service: hadoop-knox
products:
- cte
- "data discovery"
username: user
password: pwd
topology: default
nodes:
- hostname: node1
port: 1234
protocol: https
server_certificate: "-----cert-----"
- name: "Update Hadoop Connection"
thalesgroup.ciphertrust.connection_manager_hadoop:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
op_type: patch