You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The password to set for the master key used with the certificate.
800
+
The password to set for the master key used with the certificate.<!-- codespell:ignore master -->
799
801
800
802
Default: `null`
801
803
@@ -999,6 +1001,7 @@ all:
999
1001
```
1000
1002
1001
1003
Playbook:
1004
+
<!-- codespell:ignore-begin -->
1002
1005
1003
1006
```yaml
1004
1007
- hosts: all
@@ -1025,6 +1028,7 @@ Playbook:
1025
1028
roles:
1026
1029
- microsoft.sql.server
1027
1030
```
1031
+
<!-- codespell:ignore-end -->
1028
1032
1029
1033
#### Configuring SQL Server with HA and Pacemaker on Bare Metal
1030
1034
@@ -1034,6 +1038,7 @@ This example configures required Pacemaker properties and resources and enables
1034
1038
1035
1039
The `fedora.linux_system_roles.ha_cluster` role expects watchdog devices to be configured on `/dev/watchdog` by default, you can set a different device per host in inventory.
1036
1040
For more information, see the `fedora.linux_system_roles.ha_cluster` role documentation.
1041
+
<!-- codespell:ignore-begin -->
1037
1042
1038
1043
```yaml
1039
1044
- hosts: all
@@ -1123,12 +1128,14 @@ For more information, see the `fedora.linux_system_roles.ha_cluster` role docume
1123
1128
- microsoft.sql.server
1124
1129
```
1125
1130
1131
+
<!-- codespell:ignore-end -->
1126
1132
#### Configuring SQL Server with HA and Pacemaker on VMWare
1127
1133
1128
1134
If you want to configure Pacemaker from this role, you can set [mssql_manage_ha_cluster](#mssql_manage_ha_cluster) to `true` and provide variables required by the `fedora.linux_system_roles.ha_cluster` role to configure Pacemaker for your environment properly.
1129
1135
See the `fedora.linux_system_roles.ha_cluster` role documentation for more information.
1130
1136
1131
1137
Note that production environments require Pacemaker configured with fencing agents, this example playbook configures the `stonith:fence_vmware_soap` agent.
1138
+
<!-- codespell:ignore-begin -->
1132
1139
1133
1140
```yaml
1134
1141
- hosts: all
@@ -1226,6 +1233,7 @@ Note that production environments require Pacemaker configured with fencing agen
1226
1233
roles:
1227
1234
- microsoft.sql.server
1228
1235
```
1236
+
<!-- codespell:ignore-end -->
1229
1237
1230
1238
#### Configuring SQL Server with HA and Pacemaker on Azure
1231
1239
@@ -1243,6 +1251,7 @@ See the `fedora.linux_system_roles.ha_cluster` role documentation for more infor
1243
1251
Note that production environments require Pacemaker configured with fencing agents, this example playbook configures the `stonith:fence_azure_arm` agent.
1244
1252
1245
1253
This example playbooks sets the `firewall` variables for the `fedora.linux_system_roles.firewall` role and then runs this role to open the probe port configured in Azure.
1254
+
<!-- codespell:ignore-begin -->
1246
1255
1247
1256
```yaml
1248
1257
- hosts: all
@@ -1371,6 +1380,7 @@ This example playbooks sets the `firewall` variables for the `fedora.linux_syste
1371
1380
- fedora.linux_system_roles.firewall
1372
1381
- microsoft.sql.server
1373
1382
```
1383
+
<!-- codespell:ignore-end -->
1374
1384
1375
1385
## Configuring SQL Server to authenticate with Active Directory (AD) Server
1376
1386
@@ -1569,6 +1579,7 @@ Type: `string`
1569
1579
### AD Example Playbooks
1570
1580
1571
1581
#### Configuring AD integration with general parameters
1582
+
<!-- codespell:ignore-begin -->
1572
1583
1573
1584
```yaml
1574
1585
- name: Configure with AD server authentication
@@ -1607,10 +1618,12 @@ Type: `string`
1607
1618
PRINT 'A <mydomain>\<myADlogin> login already exists, skipping'
1608
1619
END
1609
1620
```
1621
+
<!-- codespell:ignore-end -->
1610
1622
1611
1623
#### Configuring AD integration with a pre-created keytab file
1612
1624
1613
1625
If you received a pre-created keytab file and want the role to use it, set variables like in this example:
1626
+
<!-- codespell:ignore-begin -->
1614
1627
1615
1628
```yaml
1616
1629
- name: Configure with AD server authentication with a pre-created keytab file
@@ -1649,10 +1662,12 @@ If you received a pre-created keytab file and want the role to use it, set varia
1649
1662
PRINT 'A <mydomain>\<myADlogin> login already exists, skipping'
1650
1663
END
1651
1664
```
1665
+
<!-- codespell:ignore-end -->
1652
1666
1653
1667
#### Configuring AD integration without joining to AD
1654
1668
1655
1669
You must join managed host to AD Server yourself prior to running this playbook.
1670
+
<!-- codespell:ignore-begin -->
1656
1671
1657
1672
```yaml
1658
1673
- name: Configure with AD server authentication without joining to AD
@@ -1687,6 +1702,7 @@ You must join managed host to AD Server yourself prior to running this playbook.
1687
1702
PRINT 'A <mydomain>\<myADlogin> login already exists, skipping'
0 commit comments