title: “Enterprise inventory file”
date: 2020-02-13T09:21:08
slug: enterprise-inventory-file
[OSEv3:children]
masters
nodes
etcd
# Set variables common for all OSEv3 hosts
[OSEv3:vars]
oreg\_auth\_user=tomskiffb
oreg\_auth\_password=v3NtPkdo7nfijV7SoZhf
openshift\_web\_console\_install=true
osm\_use\_cockpit=true
openshift\_logging\_install\_logging=true
openshift\_disable\_check=disk\_availability,docker\_storage,memory\_availability,docker\_image\_availability
# SSH user, this user should allow ssh based auth without requiring a password
ansible\_ssh\_user=root
# If ansible\_ssh\_user is not root, ansible\_become must be set to true
#ansible\_become=true
openshift\_deployment\_type=openshift-enterprise
#deployment\_subtype=registry
openshift\_hosted\_infra\_selector=""
openshift\_logging\_es\_nodeselector={"node-role.kubernetes.io/infra":"true"}
openshift\_logging\_kibana\_nodeselector={"node-role.kubernetes.io/infra":"true"}
openshift\_logging\_curator\_nodeselector={"node-role.kubernetes.io/infra":"true"}
# uncomment the following to enable htpasswd authentication; defaults to DenyAllPasswordIdentityProvider
openshift\_master\_identity\_providers=[{'name': 'htpasswd\_auth', 'login': 'true', 'challenge': 'true', 'kind': 'HTPasswdPasswordIdentityProvider'}]
openshift\_master\_htpasswd\_users={'admin': 'admin:$apr1$AysC7Y3Y$LN.UA3Pn1qobSrsxJ7qHN0'}
openshift\_master\_htpasswd\_file='/etc/origin/master/htpasswd'
openshift\_public\_hostname=registry.os.asanger.eu
openshift\_master\_default\_subdomain=apps.os.asanger.eu
openshift\_master\_api\_port=8443
openshift\_master\_console\_port=8443
# host group for masters
[masters]
registry.os.asanger.eu
# host group for etcd
[etcd]
registry.os.asanger.eu
# host group for nodes, includes region info
[nodes]
registry.os.asanger.eu openshift\_node\_group\_name='node-config-all-in-one'
