Note
This plugin is part of the community.postgresql collection (version 1.5.0).
You might already have this collection installed if you are using the ansible
package. It is not included in ansible-core
. To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install community.postgresql
.
To use it in a playbook, specify: community.postgresql.postgresql_ping
.
The below requirements are needed on the host that executes this module.
Parameter | Choices/Defaults | Comments |
---|---|---|
ca_cert string | Specifies the name of a file containing SSL certificate authority (CA) certificate(s). If the file exists, the server's certificate will be verified to be signed by one of these authorities. aliases: ssl_rootcert | |
db string | Name of a database to connect to. aliases: login_db | |
login_host string | Host running the database. If you have connection issues when using localhost , try to use 127.0.0.1 instead. | |
login_password string | The password this module should use to establish its PostgreSQL session. | |
login_unix_socket string | Path to a Unix domain socket for local connections. | |
login_user string | Default: "postgres" | The username this module should use to establish its PostgreSQL session. |
port integer | Default: 5432 | Database port to connect to. aliases: login_port |
session_role string added in 0.2.0 of community.postgresql | Switch to session_role after connecting. The specified session_role must be a role that the current login_user is a member of. Permissions checking for SQL commands is carried out as though the session_role were the one that had logged in originally. | |
ssl_mode string |
| Determines whether or with what priority a secure SSL TCP/IP connection will be negotiated with the server. See https://www.postgresql.org/docs/current/static/libpq-ssl.html for more information on the modes. Default of prefer matches libpq default. |
trust_input boolean added in 0.2.0 of community.postgresql |
| If no , check whether a value of session_role is potentially dangerous.It makes sense to use no only when SQL injections via session_role are possible. |
Note
check_mode
.postgres
account on the host.See also
The official documentation on the community.postgresql.postgresql_info module.
# PostgreSQL ping dbsrv server from the shell: # ansible dbsrv -m postgresql_ping # In the example below you need to generate certificates previously. # See https://www.postgresql.org/docs/current/libpq-ssl.html for more information. - name: PostgreSQL ping dbsrv server using not default credentials and ssl community.postgresql.postgresql_ping: db: protected_db login_host: dbsrv login_user: secret login_password: secret_pass ca_cert: /root/root.crt ssl_mode: verify-full
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
is_available boolean | always | PostgreSQL server availability. Sample: True |
server_version dictionary | always | PostgreSQL server version. Sample: {'full': '13.2', 'major': 13, 'minor': 2, 'raw': 'PostgreSQL 13.2 on x86_64-pc-linux-gnu'} |
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/community/postgresql/postgresql_ping_module.html