MAS DevOps Ansible Collection Ansible CLI
Edit on GitHub
Home Ansible Automation Platform OCP Install Cloud Pak For Data Install Core Add AIBroker Add IoT Add Manage Add Monitor Add Optimizer Add Predict Add Visual Inspection Update Upgrade Uninstall Core Backup & Restore ocp_cluster_monitoring ocp_config ocp_deprovision ocp_efs ocp_github_oauth ocp_login ocp_node_config ocp_provision ocp_roks_upgrade_registry_storage ocp_upgrade ocp_verify appconnect aws_bucket_access_point aws_documentdb_user aws_policy aws_route53 aws_user_creation aws_vpc cert_manager cis common-services configure_manage_eventstreams cos cos_bucket cp4d_admin_pwd_update cp4d cp4d_service db2 dro eck grafana ibm_catalogs kafka nvidia_gpu mongodb ocs sls turbonomic uds mirror_case_prepare mirror_extras_prepare mirror_images mirror_ocp ocp_idms ocp_simulate_disconnected_network registry suite_app_config suite_app_install suite_app_uninstall suite_app_upgrade suite_app_rollback suite_app_backup_restore suite_certs suite_config suite_db2_setup_for_manage suite_dns suite_install suite_manage_attachments_config suite_manage_birt_report_config suite_manage_bim_config suite_manage_customer_files_config suite_manage_imagestitching_config suite_manage_import_certs_config suite_manage_load_dbc_scripts suite_manage_logging_config suite_manage_pvc_config suite_uninstall suite_upgrade suite_rollback suite_verify suite_backup_restore ansible_version_check entitlement_key_rotation gencfg_jdbc gencfg_watsonstudio gencfg_workspace gencfg_mongo

suite_manage_import_certs_config¤

This role extends support for importing certificates into Manage application's workspace. Note: This role should be executed after Manage application is deployed and activated as it needs Manage up and running prior importing new certificates.

You can run this as standalone role, providing a local path for a file that contains the Manage certificates definition (manage_certificates_file_path_local variable).

Or you can invoke this role inside another playbook/role, passing the Manage certificates content as a list variable (manage_certificates) and an alias prefix as a string variable (manage_certificates_alias_prefix). The certificate alias name will be concatenated with the alias prefix plus auto incremented accordingly to the number of certificates provided i.e If you provide a list with 3 certificates, and define manage_certificates_alias_prefix: myaliasprefixpart, then the alias name will be myaliasprefixpart1; myaliasprefixpart2; myaliasprefixpart3

Role Variables¤

mas_instance_id¤

Required. The instance ID of Maximo Application Suite. This will be used to lookup for Manage application resources.

mas_workspace_id¤

Required. The workspace ID of Maximo Application Suite. This will be used to lookup for Manage application resources.

manage_workspace_cr_name¤

Optional. Name of the ManageWorkspace Custom Resource that will be targeted to import the new certificates.

manage_certificates_file_path_local¤

Required if running as standalone role. This defines a local path pointing the certificates definition from a custom file. Sample file definition can be found in files/manage-certs-sample.yml.

Example Playbook¤

The following sample can be used to import Manage certificates for an existing Manage instance, using a local path pointing the certificates definition from a custom file.

- hosts: localhost
  any_errors_fatal: true
  vars:
    mas_instance_id: masinst1
    mas_workspace_id: masdev
    manage_certificates_file_path_local: /my-path/manage-certs.yml
  roles:
    - ibm.mas_devops.suite_manage_import_certs_config

The following sample can be used to import Manage certificates for an existing Manage instance, passing the certificates and prefix from a variable.

- hosts: localhost
  any_errors_fatal: true
  vars:
    mas_instance_id: masinst1
    mas_workspace_id: masdev
    manage_certificates: ['-----BEGIN CERTIFICATE----- << your-cert-content >> -----END CERTIFICATE-----']
    manage_certificates_alias_prefix: "myaliasprefixpart"
  roles:
    - ibm.mas_devops.suite_manage_import_certs_config

Run Role Playbook¤

After installing the Ansible Collection you can easily run the role standalone using the run_role playbook provided.

```bash export MAS_INSTANCE_ID=masinst1 export MAS_WORKSPACE_ID=masdev export MANAGE_CERTIFICATES_FILE_PATH_LOCAL=/my-path/manage-certs.yml ROLE_NAME='suite_manage_import_certs_config' ansible-playbook playbooks/run_role.yml

License¤

EPL-2.0