1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
|
# This define allows you to insert, update or delete Elasticsearch SLM
# policies.
#
# Policy content should be defined through either the `content` parameter
# (when passing a hash or json string) or the `source` parameter (when passing
# the puppet file URI to a policy json file).
#
# @param ensure
# Controls whether the named SLM policy should be present or absent in the
# cluster.
#
# @param api_basic_auth_password
# HTTP basic auth password to use when communicating over the Elasticsearch
# API.
#
# @param api_basic_auth_username
# HTTP basic auth username to use when communicating over the Elasticsearch
# API.
#
# @param api_ca_file
# Path to a CA file which will be used to validate server certs when
# communicating with the Elasticsearch API over HTTPS.
#
# @param api_ca_path
# Path to a directory with CA files which will be used to validate server
# certs when communicating with the Elasticsearch API over HTTPS.
#
# @param api_host
# Host name or IP address of the ES instance to connect to.
#
# @param api_port
# Port number of the ES instance to connect to
#
# @param api_protocol
# Protocol that should be used to connect to the Elasticsearch API.
#
# @param api_timeout
# Timeout period (in seconds) for the Elasticsearch API.
#
# @param content
# Contents of the policy. Can be either a puppet hash or a string containing
# JSON.
#
# @param source
# Source path for the policy file. Can be any value similar to `source`
# values for `file` resources.
#
# @param validate_tls
# Determines whether the validity of SSL/TLS certificates received from the
# Elasticsearch API should be verified or ignored.
#
# @author Richard Pijnenburg <richard.pijnenburg@elasticsearch.com>
# @author Tyler Langlois <tyler.langlois@elastic.co>
#
define elasticsearch::slm_policy (
Enum['absent', 'present'] $ensure = 'present',
Optional[String] $api_basic_auth_password = $elasticsearch::api_basic_auth_password,
Optional[String] $api_basic_auth_username = $elasticsearch::api_basic_auth_username,
Optional[Stdlib::Absolutepath] $api_ca_file = $elasticsearch::api_ca_file,
Optional[Stdlib::Absolutepath] $api_ca_path = $elasticsearch::api_ca_path,
String $api_host = $elasticsearch::api_host,
Integer[0, 65535] $api_port = $elasticsearch::api_port,
Enum['http', 'https'] $api_protocol = $elasticsearch::api_protocol,
Integer $api_timeout = $elasticsearch::api_timeout,
Optional[Variant[String, Hash]] $content = undef,
Optional[String] $source = undef,
Boolean $validate_tls = $elasticsearch::validate_tls,
) {
if $content =~ String {
$_content = parsejson($content)
} else {
$_content = $content
}
if $ensure == 'present' and $source == undef and $_content == undef {
fail('one of "file" or "content" required.')
} elsif $source != undef and $_content != undef {
fail('"file" and "content" cannot be simultaneously defined.')
}
es_instance_conn_validator { "${name}-slm_policy-conn-validator":
server => $api_host,
port => $api_port,
timeout => $api_timeout,
}
-> elasticsearch_slm_policy { $name:
ensure => $ensure,
content => $_content,
source => $source,
protocol => $api_protocol,
host => $api_host,
port => $api_port,
timeout => $api_timeout,
username => $api_basic_auth_username,
password => $api_basic_auth_password,
ca_file => $api_ca_file,
ca_path => $api_ca_path,
validate_tls => $validate_tls,
}
}
|