cp-ansible icon indicating copy to clipboard operation
cp-ansible copied to clipboard

Ansible playbooks for the Confluent Platform

Results 109 cp-ansible issues
Sort by recently updated
recently updated
newest added

# Description Please include a summary of the change and which issue is fixed. Please also include relevant motivation and context. List any dependencies that are required for this change....

**Describe the issue** When ssl_custom_certs_remote_src is true, task "Retrieve SSL key hash" should execute on the remote host(s). The task is delagated to localhost but the certs don't reside there....

Fixed issue where ksql log4j templating was failing in case of ccloud… # Description In case if broker list is missing, template engine fails to find the `kafka_broker` dict. Fixes...

# Description This PR aims to introduce a playbook to upgrade a cluster from non tls to tls. Steps being: Run CA if self signed certs are used. Generate key/truststore...

# Description Using the existing `sasl_protocol: oauth` will add callback handlers for Confluent-provided classes. This PR adds a similar `sasl_protocol: oauthbearer` that will not automatically set up any callback handlers....

We're playing with Kafka on-premise and using LetsEncrypt to generate certificates. All variables for custom certificates were set up and initial deployment worked as intended. Recently LE-cert has expired and...

hello, we want to use MTLS auth between kafka brokers, and trying to use principal.rules to extract data from the certificates subject, but the CP-Ansible ignores this paramater and export...

I am deploying Confluent platform using ansible playbooks and using confluent community edition ver 7.0.1. I am trying to incorporate custom passwords for the sasl_plain_users and any other principal which...

**Describe the issue** This task: ``` - name: Set Permissions on /var/log/confluent file: path: /var/log/confluent/ owner: "{{control_center_user}}" group: "{{control_center_group}}" mode: 0770 state: directory ``` Should not be necessary with the...

**Describe the issue** Currently additional Systemadmins for components are hardcoded for users: eg: ``` "{{mds_bootstrap_server_urls.split(',')[0]}}/security/1.0/principals/User:{{item}}/roles/SystemAdmin" ``` However the API would allow any valid `principal` - meaning `Group:aldapgroup` would work as...