containers.podman.podman_play module – Play kubernetes YAML file using podman
Note
This module is part of the containers.podman collection (version 1.9.3).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install containers.podman
.
To use it in a playbook, specify: containers.podman.podman_play
.
Synopsis
The module reads in a structured file of Kubernetes YAML. It will then recreate the pod and containers described in the YAML.
Requirements
The below requirements are needed on the host that executes this module.
Podman installed on host
Parameters
Parameter |
Comments |
---|---|
Path of the authentication file. Default is ${XDG_RUNTIME_DIR}/containers/auth.json, which is set using podman login. If the authorization state is not found there, $HOME/.docker/config.json is checked, which is set using docker login. Note - You can also override the default path of the authentication file by setting the REGISTRY_AUTH_FILE environment variable. export REGISTRY_AUTH_FILE=path |
|
Use Kubernetes configmap YAML at path to provide a source for environment variable values within the containers of the pod. Note - The configmap option can be used multiple times to pass multiple Kubernetes configmap YAMLs |
|
Enable debug for the module. Choices:
|
|
Name of executable to run, by default ‘podman’ Default: “podman” |
|
Path to file with YAML configuration for a Pod. |
|
Set logging driver for all created containers. |
|
Set logging level for podman calls. Log messages above specified level (“debug”|”info”|”warn”|”error”|”fatal”|”panic”) (default “error”) Choices:
|
|
List of the names of CNI networks the pod should join. |
|
The username and password to use to authenticate with the registry if required. |
|
Hide image pulls logs from output. Choices:
|
|
If pod already exists, delete it and run the new one. Choices:
|
|
Directory path for seccomp profiles (default is “/var/lib/kubelet/seccomp”). This option is not available with the remote Podman client |
|
Start the pod after creating it, or to leave it created only. Choices:
|
|
Require HTTPS and verify certificates when contacting registries (default is true). If explicitly set to true, then TLS verification will be used. If set to false, then TLS verification will not be used. If not specified, TLS verification will be used unless the target registry is listed as an insecure registry in registries.conf. Choices:
|
|
The username and password to use to authenticate with the registry if required. |