Execution
Date 15 Dec 2025 09:55:36 +0000
Duration 00:21:13.46
Controller aio1.openstack.local
User root
Versions
Ansible 2.18.6
ara 1.7.4 / 1.7.4
Python 3.12.3
Summary
15 Hosts
924 Tasks
1203 Results
46 Plays
212 Files
0 Records

Task result details

  • Status
    CHANGED
  • Duration
    00:00:01.03
  • Play
    HAProxy base config
  • Task
    haproxy_server : Create haproxy service config files
  • Host
    aio1

Field Value
changed
True
msg
All items completed
results

Result #1

Field Value
ansible_loop_var
service
changed
False
false_condition
(service.haproxy_service_enabled | default('True')) | bool
service
{
    "haproxy_backend_arguments": [
        "errorfile 503 /etc/haproxy/security.txt"
    ],
    "haproxy_backend_nodes": [],
    "haproxy_backend_only": true,
    "haproxy_balance_type": "http",
    "haproxy_map_entries": [
        {
            "entries": [
                ".*/security.txt security_txt-back"
            ],
            "name": "base_regex"
        }
    ],
    "haproxy_service_enabled": false,
    "haproxy_service_name": "security_txt"
}
skip_reason
Conditional result was False
skipped
True



Result #2

Field Value
ansible_loop_var
service
changed
True
checksum
e735823f601364dfa071e6f90cf25ef8a7204166
dest
/etc/haproxy/conf.d/base
diff

failed
False
gid
986
group
haproxy
invocation
{
    "module_args": {
        "_original_basename": "service.j2",
        "attributes": null,
        "backup": false,
        "checksum": "e735823f601364dfa071e6f90cf25ef8a7204166",
        "content": null,
        "dest": "/etc/haproxy/conf.d/base",
        "directory_mode": null,
        "follow": false,
        "force": true,
        "group": "haproxy",
        "local_follow": null,
        "mode": "0640",
        "owner": "root",
        "remote_src": null,
        "selevel": null,
        "serole": null,
        "setype": null,
        "seuser": null,
        "src": "/root/.ansible/tmp/ansible-tmp-1765792616.886975-126269-89490061261508/.source",
        "unsafe_writes": false,
        "validate": null
    }
}
md5sum
f2dabe568a28f2c6171edb65b749fcf4
mode
0640
owner
root
service
{
    "haproxy_balance_type": "http",
    "haproxy_frontend_acls": {},
    "haproxy_frontend_only": true,
    "haproxy_frontend_raw": [
        "http-response set-header Strict-Transport-Security \"max-age=31536000; includeSubDomains;\"",
        "http-response set-header X-Content-Type-Options \"nosniff\"",
        "http-response set-header Referrer-Policy \"same-origin\"",
        "http-response set-header Permissions-Policy \"accelerometer=(), ambient-light-sensor=(), autoplay=(), battery=(), camera=(), cross-origin-isolated=(), display-capture=(), document-domain=(), encrypted-media=(), execution-while-not-rendered=(), execution-while-out-of-viewport=(), fullscreen=(self), geolocation=(), gyroscope=(), magnetometer=(), microphone=(), midi=(), navigation-override=(self), payment=(), picture-in-picture=(), publickey-credentials-get=(), screen-wake-lock=(), sync-xhr=(), usb=(), web-share=(), xr-spatial-tracking=(), clipboard-read=(self), clipboard-write=(self), gamepad=(), speaker-selection=()\"",
        "http-response set-header Content-Security-Policy \" default-src 'self'; frame-ancestors 'self' ; form-action 'self'; upgrade-insecure-requests; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; child-src 'self' 23.253.164.124:6082 23.253.164.124:6080 23.253.164.124:6083; frame-src 'self' 23.253.164.124:6082 23.253.164.124:6080 23.253.164.124:6083; connect-src 'self' 23.253.164.124:* wss://23.253.164.124:6083; img-src 'self' data:; worker-src blob:; \"\n",
        ""
    ],
    "haproxy_map_entries": [
        {
            "entries": [
                "#Regular expression map file - this comment is defined in the base frontend config"
            ],
            "name": "base_regex"
        }
    ],
    "haproxy_maps": [
        "use_backend %[path,map_reg(/etc/haproxy/base_regex.map)]"
    ],
    "haproxy_port": "443",
    "haproxy_redirect_http_port": 80,
    "haproxy_redirect_scheme": "https if !{ ssl_fc }",
    "haproxy_service_enabled": true,
    "haproxy_service_name": "base",
    "haproxy_ssl": true,
    "haproxy_ssl_all_vips": true
}
size
3547
src
/root/.ansible/tmp/ansible-tmp-1765792616.886975-126269-89490061261508/.source
state
file
uid
0



Result #3

Field Value
ansible_loop_var
service
changed
False
false_condition
(service.haproxy_service_enabled | default('True')) | bool
service
{
    "backend_fall": 5,
    "backend_rise": 1,
    "haproxy_backend_nodes": [
        "aio1"
    ],
    "haproxy_balance_type": "http",
    "haproxy_bind": [
        "127.0.0.1"
    ],
    "haproxy_port": 8888,
    "haproxy_service_enabled": false,
    "haproxy_service_name": "letsencrypt",
    "interval": 4000
}
skip_reason
Conditional result was False
skipped
True



Result #4

Field Value
ansible_loop_var
service
changed
False
false_condition
(service.haproxy_service_enabled | default('True')) | bool
service
{
    "haproxy_accept_both_protocols": false,
    "haproxy_backend_ca": true,
    "haproxy_backend_httpcheck_options": [
        "send meth HEAD",
        "expect rstatus 200|405"
    ],
    "haproxy_backend_nodes": [],
    "haproxy_backend_ssl": false,
    "haproxy_balance_alg": "source",
    "haproxy_balance_type": "http",
    "haproxy_port": "8080",
    "haproxy_service_enabled": false,
    "haproxy_service_name": "ceph-rgw",
    "haproxy_ssl": true,
    "haproxy_ssl_all_vips": false
}
skip_reason
Conditional result was False
skipped
True