For IT admins and DevOps teams who use Red Hat® Ansible® to manage their infrastructure, we have provided Ansible Modules and Playbooks that interface with each of the products within the CipherTrust Data Security Platform and IBM Guardium Data Encryption.
Tested with the Ansible Core 2.12, and 2.13 releases, and the current development version of Ansible. Ansible Core versions before 2.11.0 are not tested.
Tested with Python version 3.6
Name | Description |
---|---|
group_save | Create and manage User Groups |
group_add_remove_object | Add or remove clients or users to a group |
interface_save | Create and manage interfaces on CipherTrust Manager |
interface_actions | Perform operations on interfaces |
license_trial_action | Apply trial license to CipherTrust Manager |
license_trial_get | Get the trial license state for CipherTrust Manager |
licensing_lockdata_get | Get lockdata for license file |
usermgmt_users_save | Create and manager CipherTrust Manager users |
vault_keys2_save | Create and manage keys |
vault_keys2_op | Perform key operations |
cm_cluster | Create and add nodes to a CipherTrust Manager cluster |
domain_save | Create and manage domains for CM |
cm_regtoken | Create and manage registration tokens to be used by CM connectors like DPG and CTE |
cm_resource_delete | Delete an asset on CM using ID or name |
cm_resource_get_id_from_name | Get asset ID using name |
cte_client | Create and manage CipherTrust Transparent Encryption (CTE) clients |
cte_client_group | Create and manage CTE client groups |
cte_csi_storage_group | Create and manage Container Storage Interface (CSI) storage group for CTE for Kubernetes |
cte_policy_save | Create and manage CTE policies |
cte_process_set | Create and manage process sets to which CTE policy may apply |
cte_resource_set | Create and manage resource sets like directories and files to be protected by CTE |
cte_signature_set | Create and manage signature sets to which CTE policy may apply |
cte_user_set | Create and manage users with a user set to which CTE policy may apply |
dpg_access_policy_save | Create and manage Access Policies for CipherTrust Data Protection Gateway (DPG) |
dpg_character_set_save | Create character sets for DPG |
dpg_client_profile_save | Create and manage client profiles for DPG |
dpg_masking_format_save | Manage masking formats for data reveal operations in DPG |
dpg_policy_save | Create and manage DPG data protection policies |
dpg_protection_policy_save | Create and manage protection policies on DPG |
dpg_user_set_save | Create and manage user sets for DPG |
Install Ansible on your host machine using instructions specific to the OS of the host machine.
Download thalesgroup-ciphertrust-1.0.0.tar.gz from this repository
Install the collection using command -
ansible-galaxy collection install thalesgroup-ciphertrust-1.0.0.tar.gz
You can call modules by their Fully Qualified Collection Name (FQCN), such as thalesgroup.ciphertrust.cm_cluster
---
- name: "Create new cluster"
thalesgroup.ciphertrust.cm_cluster:
localNode:
server_ip: "{{ <IP or FQDN of CipherTrust Manager Server> }}"
server_private_ip: "{{ <Private IP of CipherTrust Manager Server...If different from server_ip> }}"
server_port: "{{ port number where CipherTrust Manager is listening, defaults to 5432}}"
user: "{{ <Admin User of CipherTrust Manager> }}"
password: "{{ <Password of Admin User> }}"
verify: False
op_type: new
Sample playbooks provided as part of the repo
ansible-playbook cluster.yml -vv
We welcome community contributions to this collection. If you find problems, please open an issue or create a PR against the this repository.