cp-ansible icon indicating copy to clipboard operation
cp-ansible copied to clipboard

Changing the hosts and tags from kafka_broker to kafka-broker is giving Error

Open cmreddyv opened this issue 2 years ago • 4 comments

For Confluent Enterprise Support customers, we would strongly advise you to open a Support ticket which will be addressed within your Support contract SLA at https://support.confluent.io

Changing the hosts and tags from kafka_broker to kafka-broker is giving error in

TASK [confluent.kafka-broker : Assert log.dirs Property not Misconfigured] ********************************* task path: /Users/chandramohan/Desktop/Work/gcp-infra/kafka-automation/ansible/kafka/roles/confluent.kafka-broker/tasks/main.yml:164 Friday 29 October 2021 13:38:59 +0530 (0:00:01.536) 0:01:27.679 ******** fatal: []: FAILED! => { "msg": "The conditional check 'kafka_broker_final_properties['log.dirs'].split(',')[0] != "/"' failed. The error was: error while evaluating conditional (kafka_broker_final_properties['log.dirs'].split(',')[0] != "/"): {{ kafka_broker_combined_properties | combine(kafka_broker_custom_properties) }}: {{kafka_broker_properties | combine_properties}}: {'defaults': {'enabled': True, 'properties': {'group.initial.rebalance.delay.ms': 3000, 'log.retention.check.interval.ms': 300000,

log.dirs path i am passing as

   log.dirs: "{% for item in disks %}{{ item.mntpoint }}{{data_dir}}{% if not loop.last %},{% endif %}{% endfor %}"
   

disks: - { 'device': '/dev/sdb' , 'mntpoint': '/kafka'} - { 'device': '/dev/sdc' , 'mntpoint': '/kafka1'} mntpoint: kafka module: kafka project_dir: /opt/kafka data_dir: /data

To Reproduce Change the name of kafka_broker to kafka-broker in tags as well as in hosts and in the invetory.yml

Expected behaviour Chaning the name should of the user wish

Inventory File [kafka-broker] machinename broker_id=1

Logs Friday 29 October 2021 13:38:59 +0530 (0:00:01.536) 0:01:27.679 ******** fatal: []: FAILED! => { "msg": "The conditional check 'kafka_broker_final_properties['log.dirs'].split(',')[0] != "/"' failed. The error was: error while evaluating conditional (kafka_broker_final_properties['log.dirs'].split(',')[0] != "/"): {{ kafka_broker_combined_properties | combine(kafka_broker_custom_properties) }}: {{kafka_broker_properties | combine_properties}}: {'defaults': {'enabled': True, 'properties': {'group.initial.rebalance.delay.ms': 3000, 'log.retention.check.interval.ms': 300000, 'log.retention.hours': 168, 'log.segment.bytes': 1073741824, 'num.io.threads': 16, 'num.network.threads': 8, 'num.partitions': 1, 'num.recovery.threads.per.data.dir': 2, 'offsets.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'socket.receive.buffer.bytes': 102400, 'socket.request.max.bytes': 104857600, 'socket.send.buffer.bytes': 102400, 'transaction.state.log.min.isr': '{{ [ 2, kafka_broker_default_internal_replication_factor|int ] | min }}', 'transaction.state.log.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'zookeeper.connection.timeout.ms': 18000, 'confluent.ansible.managed': 'true', 'confluent.license.topic': '_confluent-license', 'confluent.license.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'confluent.metadata.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'confluent.balancer.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'confluent.security.event.logger.exporter.kafka.topic.replicas': "{{audit_logs_destination_bootstrap_servers.split(',')|length if audit_logs_destination_enabled and rbac_enabled else kafka_broker_default_internal_replication_factor}}", 'confluent.support.metrics.enable': 'true', 'confluent.support.customer.id': 'anonymous', 'zookeeper.connect': "{{ groups['zookeeper'] | default(['localhost']) | resolve_hostnames(hostvars) | join(':' + zookeeper_client_port|string + ',') }}:{{zookeeper_client_port}}{{zookeeper_chroot}}", 'log.dirs': '{% for item in disks %}{{ item.mntpoint }}{{data_dir}}{% if not loop.last %},{% endif %}{% endfor %}', 'listener.security.protocol.map': "{% for listener in kafka_broker_listeners|dict2items %}{% if loop.index > 1%},{% endif %}{{ listener['value']['name'] }}:{{ listener['value'] | kafka_protocol_defaults(ssl_enabled, sasl_protocol)}}{% endfor %}", 'listeners': "{% for listener in kafka_broker_listeners|dict2items %}{% if loop.index > 1%},{% endif %}{{ listener['value']['name'] }}://:{{ listener['value']['port'] }}{% endfor %}", 'advertised.listeners': "{% for listener in kafka_broker_listeners|dict2items %}{% if loop.index > 1%},{% endif %}{{ listener['value']['name'] }}://{{ listener['value']['hostname'] | default(hostvars[inventory_hostname]|resolve_hostname) }}:{{ listener['value']['port'] }}{% endfor %}", 'inter.broker.listener.name': "{{kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['name']}}", 'kafka.rest.enable': '{{kafka_broker_rest_proxy_enabled|string|lower}}'}}, 'broker_id': {'enabled': '{{ inventory_hostname in groups.kafka_broker }}', 'properties': {'broker.id': '{{ broker_id | default( groups.kafka_broker.index(inventory_hostname) + 1 ) if inventory_hostname in groups.kafka_broker else 0 }}'}}, 'fips': {'enabled': '{{fips_enabled}}', 'properties': {'enable.fips': 'true', 'security.providers': 'io.confluent.kafka.security.fips.provider.BcFipsProviderCreator,io.confluent.kafka.security.fips.provider.BcFipsJsseProviderCreator', 'ssl.keymanager.algorithm': 'PKIX', 'ssl.trustmanager.algorithm': 'PKIX', 'ssl.keystore.type': 'BCFKS', 'ssl.truststore.type': 'BCFKS', 'ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'ssl.truststore.password': '{{kafka_broker_truststore_storepass}}', 'ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'ssl.key.password': '{{kafka_broker_keystore_storepass}}', 'ssl.enabled.protocols': 'TLSv1.2'}}, 'inter_broker_sasl': {'enabled': "{{ kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['sasl_protocol'] | default(sasl_protocol) | normalize_sasl_protocol != 'none' }}", 'properties': {'sasl.mechanism.inter.broker.protocol': "{{kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['sasl_protocol'] | default(sasl_protocol) | normalize_sasl_protocol}}"}}, 'sasl_enabled': {'enabled': '{{ kafka_broker_sasl_enabled_mechanisms|length > 0 }}', 'properties': {'sasl.enabled.mechanisms': '{% for mechanism in kafka_broker_sasl_enabled_mechanisms %}{% if loop.index > 1%},{% endif %}{{ mechanism|upper }}{% endfor %}'}}, 'sasl_gssapi': {'enabled': "{{ 'GSSAPI' in kafka_broker_sasl_enabled_mechanisms }}", 'properties': {'sasl.kerberos.service.name': '{{kerberos_kafka_broker_primary}}'}}, 'zk_ssl': {'enabled': '{{ zookeeper_ssl_enabled }}', 'properties': {'zookeeper.ssl.client.enable': 'true', 'zookeeper.clientCnxnSocket': 'org.apache.zookeeper.ClientCnxnSocketNetty', 'zookeeper.ssl.truststore.location': '{{kafka_broker_pkcs12_truststore_path}}', 'zookeeper.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'zk_mtls': {'enabled': "{{ zookeeper_client_authentication_type == 'mtls' }}", 'properties': {'zookeeper.ssl.keystore.location': '{{kafka_broker_pkcs12_keystore_path}}', 'zookeeper.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}'}}, 'zk_acls': {'enabled': "{{ zookeeper_client_authentication_type in ['kerberos', 'digest'] }}", 'properties': {'zookeeper.set.acl': 'true'}}, 'sr': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups }}", 'properties': {'confluent.schema.registry.url': '{{schema_registry_url}}'}}, 'sr_ssl': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and schema_registry_ssl_enabled }}", 'properties': {'confluent.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'confluent.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}', 'confluent.ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'confluent.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'confluent.ssl.key.password': '{{kafka_broker_keystore_keypass}}'}}, 'sr_ssl_fips': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and schema_registry_ssl_enabled and fips_enabled }}", 'properties': {'confluent.ssl.keymanager.algorithm': 'PKIX', 'confluent.ssl.trustmanager.algorithm': 'PKIX', 'confluent.ssl.keystore.type': 'BCFKS', 'confluent.ssl.truststore.type': 'BCFKS'}}, 'sr_rbac': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and rbac_enabled }}", 'properties': {'confluent.basic.auth.credentials.source': 'USER_INFO', 'confluent.basic.auth.user.info': "{{schema_registry_ldap_user | default('sr') }}:{{schema_registry_ldap_password | default('pass')}}"}}, 'sr_basic': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and schema_registry_authentication_type == 'basic'}}", 'properties': {'confluent.basic.auth.credentials.source': 'USER_INFO', 'confluent.basic.auth.user.info': '{{schema_registry_basic_users_final.admin.principal}}:{{schema_registry_basic_users_final.admin.password}}'}}, 'rbac': {'enabled': '{{ rbac_enabled }}', 'properties': {'authorizer.class.name': 'io.confluent.kafka.security.authorizer.ConfluentServerAuthorizer', 'confluent.authorizer.access.rule.providers': 'CONFLUENT,ZK_ACL', 'super.users': "User:{{ mds_super_user|default('mds') }}"}}, 'rbac_mds': {'enabled': '{{ rbac_enabled and not external_mds_enabled }}', 'properties': {'confluent.metadata.server.advertised.listeners': '{{mds_http_protocol}}://{{ mds_advertised_listener_hostname | default(hostvars[inventory_hostname]|resolve_hostname) }}:{{mds_port}}', 'confluent.metadata.server.listeners': '{{mds_http_protocol}}://0.0.0.0:{{mds_port}}', 'confluent.metadata.server.token.auth.enable': 'true', 'confluent.metadata.server.token.max.lifetime.ms': 3600000, 'confluent.metadata.server.token.key.path': '{{rbac_enabled_private_pem_path}}', 'confluent.metadata.server.public.key.path': '{{rbac_enabled_public_pem_path}}', 'confluent.metadata.server.token.signature.algorithm': 'RS256', 'confluent.metadata.server.authentication.method': 'BEARER'}}, 'rbac_mds_ldap': {'enabled': '{{ rbac_enabled and not external_mds_enabled }}', 'properties': "{{ ldap_config | default('') | split_newline_to_dict }}"}, 'rbac_mds_ssl': {'enabled': '{{ rbac_enabled and not external_mds_enabled and kafka_broker_rest_ssl_enabled }}', 'properties': {'confluent.metadata.server.ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'confluent.metadata.server.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'confluent.metadata.server.ssl.key.password': '{{kafka_broker_keystore_keypass}}', 'confluent.metadata.server.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'confluent.metadata.server.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'rbac_mds_ssl_fips': {'enabled': '{{ rbac_enabled and not external_mds_enabled and kafka_broker_rest_ssl_enabled and fips_enabled }}', 'properties': {'confluent.metadata.server.ssl.keymanager.algorithm': 'PKIX', 'confluent.metadata.server.ssl.trustmanager.algorithm': 'PKIX', 'confluent.metadata.server.ssl.keystore.type': 'BCFKS', 'confluent.metadata.server.ssl.truststore.type': 'BCFKS'}}, 'rbac_external_mds': {'enabled': '{{rbac_enabled and external_mds_enabled}}', 'properties': {'confluent.metadata.bootstrap.servers': '{{mds_broker_bootstrap_servers}}'}}, 'rbac_external_mds_client': {'enabled': '{{rbac_enabled and external_mds_enabled}}', 'properties': "{{ mds_broker_listener | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.metadata.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, kafka_broker_ldap_user, kafka_broker_ldap_password, mds_bootstrap_server_urls) }}"}, 'embedded_rest_proxy': {'enabled': '{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) }}', 'properties': {'confluent.http.server.advertised.listeners': '{{mds_http_protocol}}://{{ mds_advertised_listener_hostname | default(hostvars[inventory_hostname]|resolve_hostname) }}:{{mds_port}}', 'confluent.http.server.listeners': '{{mds_http_protocol}}://0.0.0.0:{{mds_port}}'}}, 'embedded_rest_proxy_ssl': {'enabled': '{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) and kafka_broker_rest_ssl_enabled }}', 'properties': {'confluent.http.server.ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'confluent.http.server.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'confluent.http.server.ssl.key.password': '{{kafka_broker_keystore_keypass}}', 'confluent.http.server.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'confluent.http.server.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'embedded_rest_proxy_ssl_fips': {'enabled': '{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) and kafka_broker_rest_ssl_enabled and fips_enabled}}', 'properties': {'confluent.http.server.ssl.keymanager.algorithm': 'PKIX', 'confluent.http.server.ssl.trustmanager.algorithm': 'PKIX', 'confluent.http.server.ssl.keystore.type': 'BCFKS', 'confluent.http.server.ssl.truststore.type': 'BCFKS'}}, 'embedded_rest_proxy_basic': {'enabled': "{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) and kafka_broker_rest_proxy_authentication_type == 'basic' }}", 'properties': {'kafka.rest.resource.extension.class': 'io.confluent.kafkarest.security.KafkaRestSecurityResourceExtension', 'kafka.rest.confluent.rest.auth.propogate.method': 'JETTY_AUTH', 'kafka.rest.authentication.method': 'BASIC', 'kafka.rest.authentication.realm': 'KafkaRest', 'kafka.rest.authentication.roles': "{{ kafka_broker_rest_proxy_basic_users | get_roles | unique | join(',') }}"}}, 'embedded_rest_proxy_client_bootstrap': {'enabled': '{{ kafka_broker_rest_proxy_enabled }}', 'properties': {'kafka.rest.bootstrap.servers': "{{ groups['kafka_broker'] | default(['localhost']) | resolve_hostnames(hostvars) | join(':' + kafka_broker_listeners['internal']['port']|string + ',') }}:{{kafka_broker_listeners['internal']['port']}}"}}, 'embedded_rest_proxy_client': {'enabled': '{{ kafka_broker_rest_proxy_enabled }}', 'properties': "{{ kafka_broker_listeners['internal'] | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'kafka.rest.client.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), true, kafka_broker_ldap_user, kafka_broker_ldap_password, mds_bootstrap_server_urls) }}"}, 'embedded_rest_proxy_rbac': {'enabled': '{{ kafka_broker_rest_proxy_enabled and rbac_enabled }}', 'properties': {'kafka.rest.kafka.rest.resource.extension.class': 'io.confluent.kafkarest.security.KafkaRestSecurityResourceExtension', 'kafka.rest.rest.servlet.initializor.classes': 'io.confluent.common.security.jetty.initializer.InstallBearerOrBasicSecurityHandler', 'kafka.rest.public.key.path': '{{rbac_enabled_public_pem_path}}', 'kafka.rest.confluent.metadata.bootstrap.server.urls': '{{mds_bootstrap_server_urls}}', 'kafka.rest.confluent.metadata.basic.auth.user.info': "{{kafka_broker_ldap_user | default('kafka') }}:{{kafka_broker_ldap_password | default('pass')}}", 'kafka.rest.confluent.metadata.http.auth.credentials.provider': 'BASIC'}}, 'embedded_rest_proxy_rbac_ssl': {'enabled': '{{rbac_enabled and mds_tls_enabled}}', 'properties': {'kafka.rest.confluent.metadata.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'kafka.rest.confluent.metadata.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'listeners': {'enabled': True, 'properties': "{{ kafka_broker_listeners | listener_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, kafka_broker_truststore_path, kafka_broker_truststore_storepass, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, plain_jaas_config, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), kerberos_kafka_broker_primary, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, rbac_enabled_public_pem_path ) }}"}, 'controlplane_listener': {'enabled': '{{ kafka_broker_configure_control_plane_listener|bool and kafka_broker_configure_multiple_listeners|bool }}', 'properties': {'control.plane.listener.name': "{{(kafka_broker_listeners[kafka_broker_control_plane_listener_name]|default(kafka_broker_listeners[kafka_broker_inter_broker_listener_name]))['name']}}"}}, 'metrics_reporter': {'enabled': '{{ kafka_broker_metrics_reporter_enabled|bool }}', 'properties': {'metric.reporters': 'io.confluent.metrics.reporter.ConfluentMetricsReporter', 'confluent.metrics.reporter.bootstrap.servers': "{{ groups['kafka_broker'] | default(['localhost']) | resolve_hostnames(hostvars) | join(':' + kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['port']|string + ',') }}:{{kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['port']}}", 'confluent.metrics.reporter.topic.replicas': '{{kafka_broker_default_internal_replication_factor}}'}}, 'metrics_reporter_client': {'enabled': '{{ kafka_broker_metrics_reporter_enabled|bool }}', 'properties': "{{ kafka_broker_listeners[kafka_broker_inter_broker_listener_name] | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.metrics.reporter.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, kafka_broker_ldap_user, kafka_broker_ldap_password, mds_bootstrap_server_urls) }}"}, 'telemetry': {'enabled': '{{kafka_broker_telemetry_enabled}}', 'properties': {'confluent.telemetry.enabled': 'true', 'confluent.telemetry.api.key': '{{telemetry_api_key}}', 'confluent.telemetry.api.secret': '{{telemetry_api_secret}}'}}, 'telemetry_proxy': {'enabled': "{{kafka_broker_telemetry_enabled and telemetry_proxy_url != ''}}", 'properties': {'confluent.telemetry.proxy.url': '{{telemetry_proxy_url}}'}}, 'telemetry_proxy_auth': {'enabled': "{{kafka_broker_telemetry_enabled and telemetry_proxy_username != ''}}", 'properties': {'confluent.telemetry.proxy.username': '{{telemetry_proxy_username}}', 'confluent.telemetry.proxy.password': '{{telemetry_proxy_password}}'}}, 'telemetry_labels': {'enabled': '{{kafka_broker_telemetry_ansible_labels_enabled}}', 'properties': {'confluent.telemetry.labels.confluent.ansible.playbooks.version': '{{confluent_ansible_branch}}'}}, 'audit_logs_destination': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled}}', 'properties': {'confluent.security.event.logger.exporter.kafka.bootstrap.servers': '{{audit_logs_destination_bootstrap_servers}}', 'confluent.security.event.logger.exporter.kafka.topic.create': 'false'}}, 'audit_logs_destination_client': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled}}', 'properties': "{{ audit_logs_destination_listener | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.security.event.logger.exporter.kafka.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary|default('kafka'), kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, 'user', 'pass', mds_bootstrap_server_urls) }}"}, 'audit_logs_destination_admin': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled and not external_mds_enabled}}', 'properties': {'confluent.security.event.logger.destination.admin.bootstrap.servers': '{{audit_logs_destination_bootstrap_servers}}'}}, 'audit_logs_destination_admin_client': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled and not external_mds_enabled}}', 'properties': "{{ audit_logs_destination_listener | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.security.event.logger.destination.admin.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary|default('kafka'), kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, 'user', 'pass', mds_bootstrap_server_urls) }}"}}: 'dict object' has no attribute 'kafka_broker'" }

Environment (please complete the following information):

  • OS: Ubuntu 18.04
  • CP-Ansible Branch: [6.2.1-post]
  • Ansible Version [e.g. ansible 2.11.5 ]

Additional context Add any other context about the problem here.

cmreddyv avatar Oct 31 '21 13:10 cmreddyv

It seems like you have also changed the name of the role from confluent.kafka_broker to confluent.kafka-broker. Ansible is built on Python, and Python does not like the '-' character.

What is your use case?

erikgb avatar Oct 31 '21 15:10 erikgb

This is the role structure. image

Use case is that, we are using an IAC tool which is not accepting the _ character in the machine name and also try to set up end to automation of creating machine and running the ansible using a script, in which the machine template is returing the hostname and set the tags as kafka-broker instead of kafka_broker, this is to avoid the machine creation failure in the initial step.

Also, i am just changing the host and tags nothing changed in the roles and tasks etc.

cmreddyv avatar Oct 31 '21 15:10 cmreddyv

TASK [confluent.kafka-broker : Assert log.dirs Property not Misconfigured] ********************************* task path: /Users/chandramohan/Desktop/Work/gcp-infra/kafka-automation/ansible/kafka/roles/confluent.kafka-broker/tasks/main.yml:164

From your issue description, it looks like you have renamed the role. Please explain.

erikgb avatar Oct 31 '21 19:10 erikgb

Even after changing the role name same issue

`TASK [confluent.kafka_broker : Assert log.dirs Property not Misconfigured] ************************** Sunday 31 October 2021 20:54:32 +0530 (0:00:01.654) 0:04:04.961 ******** fatal: [: FAILED! => {"msg": "The conditional check 'kafka_broker_final_properties['log.dirs'].split(',')[0] != "/"' failed. The error was: An unhandled exception occurred while templating '{{ kafka_broker_combined_properties | combine(kafka_broker_custom_properties) }}'. Error was a <class 'ansible.errors.AnsibleError'>, original message: An unhandled exception occurred while templating '{{kafka_broker_properties | combine_properties}}'. Error was a <class 'ansible.errors.AnsibleError'>, original message: An unhandled exception occurred while templating '{'defaults': {'enabled': True, 'properties': {'group.initial.rebalance.delay.ms': 3000, 'log.retention.check.interval.ms': 300000, 'log.retention.hours': 168, 'log.segment.bytes': 1073741824, 'num.io.threads': 16, 'num.network.threads': 8, 'num.partitions': 1, 'num.recovery.threads.per.data.dir': 2, 'offsets.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'socket.receive.buffer.bytes': 102400, 'socket.request.max.bytes': 104857600, 'socket.send.buffer.bytes': 102400, 'transaction.state.log.min.isr': '{{ [ 2, kafka_broker_default_internal_replication_factor|int ] | min }}', 'transaction.state.log.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'zookeeper.connection.timeout.ms': 18000, 'confluent.ansible.managed': 'true', 'confluent.license.topic': '_confluent-license', 'confluent.license.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'confluent.metadata.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'confluent.balancer.topic.replication.factor': '{{kafka_broker_default_internal_replication_factor}}', 'confluent.security.event.logger.exporter.kafka.topic.replicas': "{{audit_logs_destination_bootstrap_servers.split(',')|length if audit_logs_destination_enabled and rbac_enabled else kafka_broker_default_internal_replication_factor}}", 'confluent.support.metrics.enable': 'true', 'confluent.support.customer.id': 'anonymous', 'zookeeper.connect': "{{ groups['zookeeper'] | default(['localhost']) | resolve_hostnames(hostvars) | join(':' + zookeeper_client_port|string + ',') }}:{{zookeeper_client_port}}{{zookeeper_chroot}}", 'log.dirs': '{% for item in disks]%}{{ item.mntpoint }}{{data_dir}}{% if not loop.last %},{% endif %}{% endfor %}', 'listener.security.protocol.map': "{% for listener in kafka_broker_listeners|dict2items %}{% if loop.index > 1%},{% endif %}{{ listener['value']['name'] }}:{{ listener['value'] | kafka_protocol_defaults(ssl_enabled, sasl_protocol)}}{% endfor %}", 'listeners': "{% for listener in kafka_broker_listeners|dict2items %}{% if loop.index > 1%},{% endif %}{{ listener['value']['name'] }}://:{{ listener['value']['port'] }}{% endfor %}", 'advertised.listeners': "{% for listener in kafka_broker_listeners|dict2items %}{% if loop.index > 1%},{% endif %}{{ listener['value']['name'] }}://{{ listener['value']['hostname'] | default(hostvars[inventory_hostname]|resolve_hostname) }}:{{ listener['value']['port'] }}{% endfor %}", 'inter.broker.listener.name': "{{kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['name']}}", 'kafka.rest.enable': '{{kafka_broker_rest_proxy_enabled|string|lower}}'}}, 'broker_id': {'enabled': '{{ inventory_hostname in groups.kafka_broker }}', 'properties': {'broker.id': '{{ broker_id | default( groups.kafka_broker.index(inventory_hostname) + 1 ) if inventory_hostname in groups.kafka_broker else 0 }}'}}, 'fips': {'enabled': '{{fips_enabled}}', 'properties': {'enable.fips': 'true', 'security.providers': 'io.confluent.kafka.security.fips.provider.BcFipsProviderCreator,io.confluent.kafka.security.fips.provider.BcFipsJsseProviderCreator', 'ssl.keymanager.algorithm': 'PKIX', 'ssl.trustmanager.algorithm': 'PKIX', 'ssl.keystore.type': 'BCFKS', 'ssl.truststore.type': 'BCFKS', 'ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'ssl.truststore.password': '{{kafka_broker_truststore_storepass}}', 'ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'ssl.key.password': '{{kafka_broker_keystore_storepass}}', 'ssl.enabled.protocols': 'TLSv1.2'}}, 'inter_broker_sasl': {'enabled': "{{ kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['sasl_protocol'] | default(sasl_protocol) | normalize_sasl_protocol != 'none' }}", 'properties': {'sasl.mechanism.inter.broker.protocol': "{{kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['sasl_protocol'] | default(sasl_protocol) | normalize_sasl_protocol}}"}}, 'sasl_enabled': {'enabled': '{{ kafka_broker_sasl_enabled_mechanisms|length > 0 }}', 'properties': {'sasl.enabled.mechanisms': '{% for mechanism in kafka_broker_sasl_enabled_mechanisms %}{% if loop.index > 1%},{% endif %}{{ mechanism|upper }}{% endfor %}'}}, 'sasl_gssapi': {'enabled': "{{ 'GSSAPI' in kafka_broker_sasl_enabled_mechanisms }}", 'properties': {'sasl.kerberos.service.name': '{{kerberos_kafka_broker_primary}}'}}, 'zk_ssl': {'enabled': '{{ zookeeper_ssl_enabled }}', 'properties': {'zookeeper.ssl.client.enable': 'true', 'zookeeper.clientCnxnSocket': 'org.apache.zookeeper.ClientCnxnSocketNetty', 'zookeeper.ssl.truststore.location': '{{kafka_broker_pkcs12_truststore_path}}', 'zookeeper.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'zk_mtls': {'enabled': "{{ zookeeper_client_authentication_type == 'mtls' }}", 'properties': {'zookeeper.ssl.keystore.location': '{{kafka_broker_pkcs12_keystore_path}}', 'zookeeper.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}'}}, 'zk_acls': {'enabled': "{{ zookeeper_client_authentication_type in ['kerberos', 'digest'] }}", 'properties': {'zookeeper.set.acl': 'true'}}, 'sr': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups }}", 'properties': {'confluent.schema.registry.url': '{{schema_registry_url}}'}}, 'sr_ssl': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and schema_registry_ssl_enabled }}", 'properties': {'confluent.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'confluent.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}', 'confluent.ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'confluent.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'confluent.ssl.key.password': '{{kafka_broker_keystore_keypass}}'}}, 'sr_ssl_fips': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and schema_registry_ssl_enabled and fips_enabled }}", 'properties': {'confluent.ssl.keymanager.algorithm': 'PKIX', 'confluent.ssl.trustmanager.algorithm': 'PKIX', 'confluent.ssl.keystore.type': 'BCFKS', 'confluent.ssl.truststore.type': 'BCFKS'}}, 'sr_rbac': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and rbac_enabled }}", 'properties': {'confluent.basic.auth.credentials.source': 'USER_INFO', 'confluent.basic.auth.user.info': "{{schema_registry_ldap_user | default('sr') }}:{{schema_registry_ldap_password | default('pass')}}"}}, 'sr_basic': {'enabled': "{{ kafka_broker_schema_validation_enabled and 'schema_registry' in groups and schema_registry_authentication_type == 'basic'}}", 'properties': {'confluent.basic.auth.credentials.source': 'USER_INFO', 'confluent.basic.auth.user.info': '{{schema_registry_basic_users_final.admin.principal}}:{{schema_registry_basic_users_final.admin.password}}'}}, 'rbac': {'enabled': '{{ rbac_enabled }}', 'properties': {'authorizer.class.name': 'io.confluent.kafka.security.authorizer.ConfluentServerAuthorizer', 'confluent.authorizer.access.rule.providers': 'CONFLUENT,ZK_ACL', 'super.users': "User:{{ mds_super_user|default('mds') }}"}}, 'rbac_mds': {'enabled': '{{ rbac_enabled and not external_mds_enabled }}', 'properties': {'confluent.metadata.server.advertised.listeners': '{{mds_http_protocol}}://{{ mds_advertised_listener_hostname | default(hostvars[inventory_hostname]|resolve_hostname) }}:{{mds_port}}', 'confluent.metadata.server.listeners': '{{mds_http_protocol}}://0.0.0.0:{{mds_port}}', 'confluent.metadata.server.token.auth.enable': 'true', 'confluent.metadata.server.token.max.lifetime.ms': 3600000, 'confluent.metadata.server.token.key.path': '{{rbac_enabled_private_pem_path}}', 'confluent.metadata.server.public.key.path': '{{rbac_enabled_public_pem_path}}', 'confluent.metadata.server.token.signature.algorithm': 'RS256', 'confluent.metadata.server.authentication.method': 'BEARER'}}, 'rbac_mds_ldap': {'enabled': '{{ rbac_enabled and not external_mds_enabled }}', 'properties': "{{ ldap_config | default('') | split_newline_to_dict }}"}, 'rbac_mds_ssl': {'enabled': '{{ rbac_enabled and not external_mds_enabled and kafka_broker_rest_ssl_enabled }}', 'properties': {'confluent.metadata.server.ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'confluent.metadata.server.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'confluent.metadata.server.ssl.key.password': '{{kafka_broker_keystore_keypass}}', 'confluent.metadata.server.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'confluent.metadata.server.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'rbac_mds_ssl_fips': {'enabled': '{{ rbac_enabled and not external_mds_enabled and kafka_broker_rest_ssl_enabled and fips_enabled }}', 'properties': {'confluent.metadata.server.ssl.keymanager.algorithm': 'PKIX', 'confluent.metadata.server.ssl.trustmanager.algorithm': 'PKIX', 'confluent.metadata.server.ssl.keystore.type': 'BCFKS', 'confluent.metadata.server.ssl.truststore.type': 'BCFKS'}}, 'rbac_external_mds': {'enabled': '{{rbac_enabled and external_mds_enabled}}', 'properties': {'confluent.metadata.bootstrap.servers': '{{mds_broker_bootstrap_servers}}'}}, 'rbac_external_mds_client': {'enabled': '{{rbac_enabled and external_mds_enabled}}', 'properties': "{{ mds_broker_listener | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.metadata.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, kafka_broker_ldap_user, kafka_broker_ldap_password, mds_bootstrap_server_urls) }}"}, 'embedded_rest_proxy': {'enabled': '{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) }}', 'properties': {'confluent.http.server.advertised.listeners': '{{mds_http_protocol}}://{{ mds_advertised_listener_hostname | default(hostvars[inventory_hostname]|resolve_hostname) }}:{{mds_port}}', 'confluent.http.server.listeners': '{{mds_http_protocol}}://0.0.0.0:{{mds_port}}'}}, 'embedded_rest_proxy_ssl': {'enabled': '{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) and kafka_broker_rest_ssl_enabled }}', 'properties': {'confluent.http.server.ssl.keystore.location': '{{kafka_broker_keystore_path}}', 'confluent.http.server.ssl.keystore.password': '{{kafka_broker_keystore_storepass}}', 'confluent.http.server.ssl.key.password': '{{kafka_broker_keystore_keypass}}', 'confluent.http.server.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'confluent.http.server.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'embedded_rest_proxy_ssl_fips': {'enabled': '{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) and kafka_broker_rest_ssl_enabled and fips_enabled}}', 'properties': {'confluent.http.server.ssl.keymanager.algorithm': 'PKIX', 'confluent.http.server.ssl.trustmanager.algorithm': 'PKIX', 'confluent.http.server.ssl.keystore.type': 'BCFKS', 'confluent.http.server.ssl.truststore.type': 'BCFKS'}}, 'embedded_rest_proxy_basic': {'enabled': "{{ kafka_broker_rest_proxy_enabled and (not rbac_enabled or (rbac_enabled and external_mds_enabled)) and kafka_broker_rest_proxy_authentication_type == 'basic' }}", 'properties': {'kafka.rest.resource.extension.class': 'io.confluent.kafkarest.security.KafkaRestSecurityResourceExtension', 'kafka.rest.confluent.rest.auth.propogate.method': 'JETTY_AUTH', 'kafka.rest.authentication.method': 'BASIC', 'kafka.rest.authentication.realm': 'KafkaRest', 'kafka.rest.authentication.roles': "{{ kafka_broker_rest_proxy_basic_users | get_roles | unique | join(',') }}"}}, 'embedded_rest_proxy_client_bootstrap': {'enabled': '{{ kafka_broker_rest_proxy_enabled }}', 'properties': {'kafka.rest.bootstrap.servers': "{{ groups['kafka_broker'] | default(['localhost']) | resolve_hostnames(hostvars) | join(':' + kafka_broker_listeners['internal']['port']|string + ',') }}:{{kafka_broker_listeners['internal']['port']}}"}}, 'embedded_rest_proxy_client': {'enabled': '{{ kafka_broker_rest_proxy_enabled }}', 'properties': "{{ kafka_broker_listeners['internal'] | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'kafka.rest.client.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), true, kafka_broker_ldap_user, kafka_broker_ldap_password, mds_bootstrap_server_urls) }}"}, 'embedded_rest_proxy_rbac': {'enabled': '{{ kafka_broker_rest_proxy_enabled and rbac_enabled }}', 'properties': {'kafka.rest.kafka.rest.resource.extension.class': 'io.confluent.kafkarest.security.KafkaRestSecurityResourceExtension', 'kafka.rest.rest.servlet.initializor.classes': 'io.confluent.common.security.jetty.initializer.InstallBearerOrBasicSecurityHandler', 'kafka.rest.public.key.path': '{{rbac_enabled_public_pem_path}}', 'kafka.rest.confluent.metadata.bootstrap.server.urls': '{{mds_bootstrap_server_urls}}', 'kafka.rest.confluent.metadata.basic.auth.user.info': "{{kafka_broker_ldap_user | default('kafka') }}:{{kafka_broker_ldap_password | default('pass')}}", 'kafka.rest.confluent.metadata.http.auth.credentials.provider': 'BASIC'}}, 'embedded_rest_proxy_rbac_ssl': {'enabled': '{{rbac_enabled and mds_tls_enabled}}', 'properties': {'kafka.rest.confluent.metadata.ssl.truststore.location': '{{kafka_broker_truststore_path}}', 'kafka.rest.confluent.metadata.ssl.truststore.password': '{{kafka_broker_truststore_storepass}}'}}, 'listeners': {'enabled': True, 'properties': "{{ kafka_broker_listeners | listener_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, kafka_broker_truststore_path, kafka_broker_truststore_storepass, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, plain_jaas_config, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), kerberos_kafka_broker_primary, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, rbac_enabled_public_pem_path ) }}"}, 'controlplane_listener': {'enabled': '{{ kafka_broker_configure_control_plane_listener|bool and kafka_broker_configure_multiple_listeners|bool }}', 'properties': {'control.plane.listener.name': "{{(kafka_broker_listeners[kafka_broker_control_plane_listener_name]|default(kafka_broker_listeners[kafka_broker_inter_broker_listener_name]))['name']}}"}}, 'metrics_reporter': {'enabled': '{{ kafka_broker_metrics_reporter_enabled|bool }}', 'properties': {'metric.reporters': 'io.confluent.metrics.reporter.ConfluentMetricsReporter', 'confluent.metrics.reporter.bootstrap.servers': "{{ groups['kafka_broker'] | default(['localhost']) | resolve_hostnames(hostvars) | join(':' + kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['port']|string + ',') }}:{{kafka_broker_listeners[kafka_broker_inter_broker_listener_name]['port']}}", 'confluent.metrics.reporter.topic.replicas': '{{kafka_broker_default_internal_replication_factor}}'}}, 'metrics_reporter_client': {'enabled': '{{ kafka_broker_metrics_reporter_enabled|bool }}', 'properties': "{{ kafka_broker_listeners[kafka_broker_inter_broker_listener_name] | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.metrics.reporter.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary, kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, kafka_broker_ldap_user, kafka_broker_ldap_password, mds_bootstrap_server_urls) }}"}, 'telemetry': {'enabled': '{{kafka_broker_telemetry_enabled}}', 'properties': {'confluent.telemetry.enabled': 'true', 'confluent.telemetry.api.key': '{{telemetry_api_key}}', 'confluent.telemetry.api.secret': '{{telemetry_api_secret}}'}}, 'telemetry_proxy': {'enabled': "{{kafka_broker_telemetry_enabled and telemetry_proxy_url != ''}}", 'properties': {'confluent.telemetry.proxy.url': '{{telemetry_proxy_url}}'}}, 'telemetry_proxy_auth': {'enabled': "{{kafka_broker_telemetry_enabled and telemetry_proxy_username != ''}}", 'properties': {'confluent.telemetry.proxy.username': '{{telemetry_proxy_username}}', 'confluent.telemetry.proxy.password': '{{telemetry_proxy_password}}'}}, 'telemetry_labels': {'enabled': '{{kafka_broker_telemetry_ansible_labels_enabled}}', 'properties': {'confluent.telemetry.labels.confluent.ansible.playbooks.version': '{{confluent_ansible_branch}}'}}, 'audit_logs_destination': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled}}', 'properties': {'confluent.security.event.logger.exporter.kafka.bootstrap.servers': '{{audit_logs_destination_bootstrap_servers}}', 'confluent.security.event.logger.exporter.kafka.topic.create': 'false'}}, 'audit_logs_destination_client': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled}}', 'properties': "{{ audit_logs_destination_listener | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.security.event.logger.exporter.kafka.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary|default('kafka'), kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, 'user', 'pass', mds_bootstrap_server_urls) }}"}, 'audit_logs_destination_admin': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled and not external_mds_enabled}}', 'properties': {'confluent.security.event.logger.destination.admin.bootstrap.servers': '{{audit_logs_destination_bootstrap_servers}}'}}, 'audit_logs_destination_admin_client': {'enabled': '{{audit_logs_destination_enabled and rbac_enabled and not external_mds_enabled}}', 'properties': "{{ audit_logs_destination_listener | client_properties(ssl_enabled, fips_enabled, ssl_mutual_auth_enabled, sasl_protocol, 'confluent.security.event.logger.destination.admin.', kafka_broker_truststore_path, kafka_broker_truststore_storepass, False, kafka_broker_keystore_path, kafka_broker_keystore_storepass, kafka_broker_keystore_keypass, false, sasl_plain_users_final.admin.principal, sasl_plain_users_final.admin.password, sasl_scram_users_final.admin.principal, sasl_scram_users_final.admin.password, sasl_scram256_users_final.admin.principal, sasl_scram256_users_final.admin.password, kerberos_kafka_broker_primary|default('kafka'), kafka_broker_keytab_path, kafka_broker_kerberos_principal|default('kafka'), false, 'user', 'pass', mds_bootstrap_server_urls) }}"}}'. Error was a <class 'ansible.errors.AnsibleError'>, original message: template error while templating string: unexpected ']'. String: {% for item in disks]%}{{ item.mntpoint }}{{data_dir}}{% if not loop.last %},{% endif %}{% endfor %}"}

RUNNING HANDLER [confluent.kafka_broker : restart kafka] ******************************************** Sunday 31 October 2021 20:54:32 +0530 (0:00:00.084) 0:04:05.046 ********

PLAY RECAP ****************************************************************************************** : ok=43 changed=14 unreachable=0 failed=1 skipped=26 rescued=0 ignored=0
`

cmreddyv avatar Nov 01 '21 02:11 cmreddyv