Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/samdoran/ansible-role-kibana
https://github.com/samdoran/ansible-role-kibana
Last synced: 3 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/samdoran/ansible-role-kibana
- Owner: samdoran
- Created: 2016-04-07T21:26:02.000Z (over 8 years ago)
- Default Branch: main
- Last Pushed: 2022-11-11T18:58:58.000Z (about 2 years ago)
- Last Synced: 2024-11-01T09:14:33.145Z (about 2 months ago)
- Language: Jinja
- Size: 101 KB
- Stars: 2
- Watchers: 3
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Kibana
========
[![Galaxy](https://img.shields.io/badge/galaxy-samdoran.kibana-blue.svg?style=flat)](https://galaxy.ansible.com/samdoran/kibana)Install Kibana
Requirements
------------TCP port 5601 open in the firewall.
Role Variables
--------------| Name | Default Value | Description |
|-------------------|---------------------|----------------------|
| `es_http_port` | `9200` | Port to communicate with Elasticsearch. |
| `es_http_listen_port` | `{{ es_http_port }}` | Can be set to a different value when using a TLS proxy in front of Elasticsearch and you want to talk directly to Elasticsearch service and bypass the proxy. |
| `es_proxy_host` | (no proxy) | Host of proxy to use with YUM repo. This variable is the same as used by official elasticsearch role |
| `es_proxy_port` | (no proxy) | Port of proxy to use with YUM repo |
| `kibana_version` | `5` | Version number used in `kibana.repo.j2` template. The latest version from that repository will be installed. |
| `kibana_tls_enabled` | `False` | Whether or not to use TLS for connections from the browser to Kibana. Setting this to `True` also inserts `kibana_service_ssl_cert` and `kibana_service_ssl_key` into `kibana.yml`, so make sure those values are correctly defined as well. |
| `kibana_tls_crt_path` | `/etc/pki/tls/certs` | Location of the Kibana TLS certificate will be copied to. |
| `kibana_tls_key_path` | `/etc/pki/tls/private` | Locate of the Kibana TLS private key will be copied to. |
| `kibana_tls_filename` | `{{ ansible_fqdn }}` | Basename used for naming certificate and private key files. |
| `kibana_elasticsearch_tls_enabled` | `False` | Whether or not to use TLS for connections from the Kibana to Elasticsearch. Setting this to `True` also inserts `kibana_service_ssl_cert` and `kibana_service_ssl_key` into `kibana.yml`, so make sure those values are correctly defined as well. |
| `kibana_elasticsearch_tls_crt_path` | `/etc/pki/tls/certs` | Location of the TLS certificate used to validate the identity of the Elasticsearch node. |
| `kibana_elasticsearch_tls_key_path` | `/etc/pki/tls/private` | Locate of the TLS key used to validate the identity of the Elasticsearch node. |
| `kibana_elasticsearch_tls_filename` | `{{ ansible_fqdn }}` | Basename used for naming certificate and private key files used by the Elasticsearch node. |
| `kibana_tls_cerficates` | `[see defaults/main.yml` | List of TLS files to copy, their destinations, and optionally ower, group, and mode. |All other settings available in `kibana.yml` can be set as variables. See `defaults/main.yml` for available settings and the destripition of what they do.
Dependencies
------------None
Example Playbook
----------------hosts: all
roles:
- samdoran.java
- samdoran.elasticsearch
- samdoran.kibanaLicense
-------MIT