This SaltStack extensions allows interfaces SAP Host Agents running on minions.
THIS PROJECT IS NOT ASSOCIATED WITH SAP IN ANY WAY
Run the following to install the SaltStack SAP Host Agent extension:
salt-call pip.install saltext.sap-hostctrl
Keep in mind that this package must be installed on every minion that should utilize the states and execution modules.
Alternatively, you can add this repository directly over gitfs
gitfs_remotes:
- https://github.com/SAPUCC/saltext-sap_hostctrl.git:
- root: src/saltext/sap_hostctrl
In order to enable this, logical links under src/saltext/sap_hostctrl/
from _<dir_type>
(where the code lives) to <dir_type>
have been placed, e.g. _modules
-> modules
. This will double the source data during build, but:
_modules
is required for integrating the repo over gitfsmodules
is required for the salt loader to find the modules / states
A state using the SAP Host Agent extension looks like this:
Outside Discovery is executed:
sap_hostctrl.outside_discovery_executed:
- name: sol.my.domain
- sld_port: 50000
- sld_username: SLD_DS_USER
- sld_password: __slot__:salt:vault.read_secret(path="SAP", key="SLD_DS_USER")
- username: sapadm
- password: __slot__:salt:vault.read_secret(path="os", key="sapadm")
See https://saltext-sap-hostctrl.readthedocs.io/ for the documentation.
We would love to see your contribution to this project. Please refer to CONTRIBUTING.md
for further details.
This project is licensed under GPLv3. See LICENSE.md
for the license text and COPYRIGHT.md
for the general copyright notice.