MAS DevOps Ansible Collection Ansible CLI
Edit on GitHub
Home Ansible Automation Platform OCP Install Cloud Pak For Data Install Core Add AIBroker Add IoT Add Manage Add Monitor Add Optimizer Add Predict Add Visual Inspection Update Upgrade Uninstall Core Backup & Restore ocp_cluster_monitoring ocp_config ocp_deprovision ocp_efs ocp_github_oauth ocp_login ocp_node_config ocp_provision ocp_roks_upgrade_registry_storage ocp_upgrade ocp_verify appconnect aws_bucket_access_point aws_documentdb_user aws_policy aws_route53 aws_user_creation aws_vpc cert_manager cis common-services configure_manage_eventstreams cos cos_bucket cp4d_admin_pwd_update cp4d cp4d_service db2 dro eck grafana ibm_catalogs kafka nvidia_gpu mongodb ocs sls turbonomic uds mirror_case_prepare mirror_extras_prepare mirror_images mirror_ocp ocp_idms ocp_simulate_disconnected_network registry suite_app_config suite_app_install suite_app_uninstall suite_app_upgrade suite_app_rollback suite_app_backup_restore suite_certs suite_config suite_db2_setup_for_manage suite_dns suite_install suite_manage_attachments_config suite_manage_birt_report_config suite_manage_bim_config suite_manage_customer_files_config suite_manage_imagestitching_config suite_manage_import_certs_config suite_manage_load_dbc_scripts suite_manage_logging_config suite_manage_pvc_config suite_uninstall suite_upgrade suite_rollback suite_verify suite_backup_restore ansible_version_check entitlement_key_rotation gencfg_jdbc gencfg_watsonstudio gencfg_workspace gencfg_mongo

cp4d_admin_pwd_update¤

This role will update the password on an existing cp4d instance. By default it will update the password to a randomly generated new password only when the instance is still using the 'initial_admin_password' although using the 'cp4d_admin_password_force_update' variable referenced below will override this to update the password regardless of the current one being used. The new password will be added to the same yaml file that the 'initial_admin_password' was generated into - 'admin-user-details' by default.

Role Variables¤

mas_instance_id¤

The instance ID of Maximo Application Suite that the cp4d password updater will target.

cp4d_namespace¤

The instance of cp4d in your cluster that the cp4d password updater will target - defaults to 'ibm-cpd'.

cp4d_admin_credentials_secret_name¤

The secret inside your cp4d instance that stores the intial admin password - defaults to 'admin-user-details'.

cp4d_admin_username¤

The username for your cp4d instance - defaults to 'admin'.

cp4d_admin_password¤

The password for your cp4d insrance - an optional addition as the password updater will attempt to collect this value from the 'cp4d_admin_credentials_secret_name' secret.

cp4d_admin_password_force_update¤

Typically the password updater will only update the password if the cp4d instance is using the initial password provided in the secret - setting this value to 'True' will ensure that is resets the password regardless.

Example Playbook¤

- hosts: localhost
  any_errors_fatal: true
  vars:
    mas_instance_id: "{{ lookup('env', 'MAS_INSTANCE_ID') }}"
    cp4d_namespace: ibm-cpd
    cp4d_admin_credentials_secret_name: admin-user-details

    cp4d_admin_username: admin
    cp4d_admin_password: password123
    cp4d_admin_password_force_update: True

  roles:
    - ibm.mas_devops.cp4d_admin_pwd_update