|
results
|
Result #1
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
checksum
|
d338a89548804a073ef5d26dad02e2a92b0f995f
|
|
dest
|
/etc/haproxy/conf.d/nova_api_metadata
|
|
diff
|
|
|
failed
|
|
|
gid
|
|
|
group
|
|
|
invocation
|
{
"module_args": {
"_original_basename": "service.j2",
"attributes": null,
"backup": false,
"checksum": "d338a89548804a073ef5d26dad02e2a92b0f995f",
"content": null,
"dest": "/etc/haproxy/conf.d/nova_api_metadata",
"directory_mode": null,
"follow": false,
"force": true,
"group": "haproxy",
"local_follow": null,
"mode": "0640",
"owner": "root",
"remote_src": null,
"selevel": null,
"serole": null,
"setype": null,
"seuser": null,
"src": "/root/.ansible/tmp/ansible-tmp-1765202021.7792625-68099-145183194170939/.source",
"unsafe_writes": false,
"validate": null
}
}
|
|
md5sum
|
1c6d6ffa9f035c5ad3e57fcc86cfac44
|
|
mode
|
|
|
owner
|
|
|
service
|
{
"haproxy_accept_both_protocols": false,
"haproxy_allowlist_networks": [
"192.168.0.0/16",
"172.16.0.0/12",
"10.0.0.0/8"
],
"haproxy_backend_ca": true,
"haproxy_backend_httpcheck_options": [
"send hdr User-Agent \"osa-proxy-healthcheck\" meth HEAD"
],
"haproxy_backend_nodes": [
"aio1"
],
"haproxy_backend_ssl": false,
"haproxy_balance_type": "http",
"haproxy_bind": [
{
"address": "172.29.236.101",
"interface": ""
}
],
"haproxy_port": 8775,
"haproxy_service_enabled": true,
"haproxy_service_name": "nova_api_metadata",
"haproxy_ssl": false
}
|
|
size
|
|
|
src
|
/root/.ansible/tmp/ansible-tmp-1765202021.7792625-68099-145183194170939/.source
|
|
state
|
|
|
uid
|
|
Result #2
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
checksum
|
5673d99be4b8ba002ce3d3b2bd17e45c1482ee3d
|
|
dest
|
/etc/haproxy/conf.d/nova_api_os_compute
|
|
diff
|
|
|
failed
|
|
|
gid
|
|
|
group
|
|
|
invocation
|
{
"module_args": {
"_original_basename": "service.j2",
"attributes": null,
"backup": false,
"checksum": "5673d99be4b8ba002ce3d3b2bd17e45c1482ee3d",
"content": null,
"dest": "/etc/haproxy/conf.d/nova_api_os_compute",
"directory_mode": null,
"follow": false,
"force": true,
"group": "haproxy",
"local_follow": null,
"mode": "0640",
"owner": "root",
"remote_src": null,
"selevel": null,
"serole": null,
"setype": null,
"seuser": null,
"src": "/root/.ansible/tmp/ansible-tmp-1765202022.8716059-68099-39790829331607/.source",
"unsafe_writes": false,
"validate": null
}
}
|
|
md5sum
|
d71c65cc36e80c214bbfc6834f158c00
|
|
mode
|
|
|
owner
|
|
|
service
|
{
"haproxy_accept_both_protocols": false,
"haproxy_backend_ca": true,
"haproxy_backend_httpcheck_options": [
"send hdr User-Agent \"osa-proxy-healthcheck\" meth HEAD"
],
"haproxy_backend_nodes": [
"aio1"
],
"haproxy_backend_ssl": false,
"haproxy_balance_type": "http",
"haproxy_port": 8774,
"haproxy_service_enabled": true,
"haproxy_service_name": "nova_api_os_compute",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": false
}
|
|
size
|
|
|
src
|
/root/.ansible/tmp/ansible-tmp-1765202022.8716059-68099-39790829331607/.source
|
|
state
|
|
|
uid
|
|
Result #3
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(service.haproxy_service_enabled | default('True')) | bool
|
|
service
|
{
"haproxy_accept_both_protocols": false,
"haproxy_backend_ca": true,
"haproxy_backend_httpcheck_options": [
"send hdr User-Agent \"osa-proxy-healthcheck\" meth HEAD uri /spice_auto.html",
"expect status 200"
],
"haproxy_backend_nodes": [
"aio1"
],
"haproxy_backend_ssl": false,
"haproxy_balance_alg": "source",
"haproxy_balance_type": "http",
"haproxy_frontend_raw": [
"http-request deny if { path,url_dec -m sub /. }"
],
"haproxy_port": "6082",
"haproxy_service_enabled": false,
"haproxy_service_name": "nova_spice_console",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": false,
"haproxy_timeout_client": "60m",
"haproxy_timeout_server": "60m"
}
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
Result #4
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(service.haproxy_service_enabled | default('True')) | bool
|
|
service
|
{
"haproxy_accept_both_protocols": false,
"haproxy_backend_ca": true,
"haproxy_backend_httpcheck_options": [
"send hdr User-Agent \"osa-proxy-healthcheck\" meth HEAD uri /vnc.html",
"expect status 200"
],
"haproxy_backend_nodes": [
"aio1"
],
"haproxy_backend_ssl": false,
"haproxy_balance_alg": "source",
"haproxy_balance_type": "http",
"haproxy_frontend_raw": [
"http-request deny if { path,url_dec -m sub /. }"
],
"haproxy_port": "6080",
"haproxy_service_enabled": false,
"haproxy_service_name": "nova_novnc_console",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": false,
"haproxy_timeout_client": "60m",
"haproxy_timeout_server": "60m"
}
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
Result #5
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(service.haproxy_service_enabled | default('True')) | bool
|
|
service
|
{
"haproxy_accept_both_protocols": false,
"haproxy_backend_ca": true,
"haproxy_backend_httpcheck_options": [
"send hdr User-Agent \"osa-proxy-healthcheck\" meth HEAD",
"expect status 405"
],
"haproxy_backend_nodes": [
"aio1"
],
"haproxy_backend_ssl": false,
"haproxy_balance_alg": "source",
"haproxy_balance_type": "http",
"haproxy_frontend_raw": [
"http-request deny if { path,url_dec -m sub /. }"
],
"haproxy_port": "6083",
"haproxy_service_enabled": false,
"haproxy_service_name": "nova_serial_console",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": false,
"haproxy_timeout_client": "60m",
"haproxy_timeout_server": "60m"
}
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
Result #6
Result #7
|