*** Wartungsfenster jeden ersten Mittwoch vormittag im Monat ***

Skip to content
Snippets Groups Projects
Verified Commit f3706782 authored by Weise, Martin's avatar Weise, Martin
Browse files

Integrated the owner node now

parent 25ec2cab
Branches
No related tags found
1 merge request!11Allow for the sysadmin to access the provider network, added the ui support...
...@@ -53,6 +53,7 @@ ...@@ -53,6 +53,7 @@
- hosts: controlnode - hosts: controlnode
vars_files: vars_files:
- vars/auth.yml
- vars/vms.yml - vars/vms.yml
roles: roles:
- role: setup_node - role: setup_node
...@@ -72,12 +73,6 @@ ...@@ -72,12 +73,6 @@
- hosts: controlnode - hosts: controlnode
roles: roles:
- role: teardown_port
vars:
type: owner
node: "{{ lookup('file', '/tmp/vmid') }}"
instance: "Owner Node {{ lookup('file', '/tmp/vmid') }}"
network: vpn
- role: start_node - role: start_node
vars: vars:
instance: "Owner Node {{ lookup('file', '/tmp/vmid') }}" instance: "Owner Node {{ lookup('file', '/tmp/vmid') }}"
......
...@@ -85,6 +85,9 @@ write_files: ...@@ -85,6 +85,9 @@ write_files:
ipa hostgroup-add corenodes --desc="Core infrastructure nodes" ipa hostgroup-add corenodes --desc="Core infrastructure nodes"
ipa hostgroup-add-member corenodes --hosts=id.ossdip.at ipa hostgroup-add-member corenodes --hosts=id.ossdip.at
ipa hostgroup-add datanodes --desc="Data infrastructure nodes" ipa hostgroup-add datanodes --desc="Data infrastructure nodes"
ipa hostgroup-add ownernodes --desc="Owner nodes"
ipa hostgroup-add analystnodes --desc="Analyst nodes"
ipa hostgroup-add desktopnodes --desc="Remote Desktop nodes"
ipa hbacrule-add allow_sysadmin ipa hbacrule-add allow_sysadmin
ipa hbacrule-add-user allow_sysadmin --user=sysadmin ipa hbacrule-add-user allow_sysadmin --user=sysadmin
ipa hbacrule-add-host allow_sysadmin --hostgroups=corenodes ipa hbacrule-add-host allow_sysadmin --hostgroups=corenodes
......
...@@ -35,7 +35,6 @@ runcmd: ...@@ -35,7 +35,6 @@ runcmd:
- /root/rsyslog-init && logger "Configured rsyslog" - /root/rsyslog-init && logger "Configured rsyslog"
- /root/chrono-init && logger "Configured chrono" - /root/chrono-init && logger "Configured chrono"
- /root/firewall-init && logger "Configured firewalld" - /root/firewall-init && logger "Configured firewalld"
- /root/2fa-init && logger "Configured two-factor authentication"
- /root/idm-init && logger "Configured identity client" - /root/idm-init && logger "Configured identity client"
- /usr/bin/rm -f /root/idm-init - /usr/bin/rm -f /root/idm-init
write_files: write_files:
...@@ -64,12 +63,12 @@ write_files: ...@@ -64,12 +63,12 @@ write_files:
content: | content: |
#!/bin/bash #!/bin/bash
logger "Configuring ipa client" logger "Configuring ipa client"
/usr/bin/hostnamectl set-hostname owner1.ossdip.at /usr/bin/hostnamectl set-hostname owner-{{ id }}.ossdip.at
/usr/bin/hostname /usr/bin/hostname
ipa-client-install --server="{{ idm_domain }}" --domain="{{ idm_domain }}" --no-ntp --principal="admin" \ ipa-client-install --server="{{ idm_domain }}" --domain="{{ idm_domain }}" --no-ntp --principal="admin" \
--password="{{ idm_adm_passwd }}" --unattended --password="{{ idm_adm_passwd }}" --unattended
echo '{{ idm_adm_passwd }}' | kinit admin echo '{{ idm_adm_passwd }}' | kinit admin
ipa hostgroup-add-member corenodes --hosts=owner1.ossdip.at #ipa hostgroup-add-member ownernodes --hosts=owner-{{ id }}.ossdip.at
- path: /root/chrono-init - path: /root/chrono-init
permissions: '0744' permissions: '0744'
......
...@@ -43,16 +43,27 @@ write_files: ...@@ -43,16 +43,27 @@ write_files:
content: | content: |
#!/bin/bash #!/bin/bash
logger "Configuring firewalld ..." logger "Configuring firewalld ..."
/bin/firewall-offline-cmd --zone=public --add-port=1194/udp /bin/firewall-offline-cmd --add-port=1194/udp
/bin/firewall-offline-cmd --zone=public --add-masquerade /bin/firewall-offline-cmd --add-masquerade
/bin/firewall-offline-cmd --zone=public --remove-interface=eth3 # provider /bin/firewall-offline-cmd --list-all
/bin/firewall-offline-cmd --zone=public --list-all
#/bin/firewall-offline-cmd --new-zone=private /bin/firewall-offline-cmd --new-zone=vnc
#/bin/firewall-offline-cmd --zone=private --add-service=ssh /bin/firewall-offline-cmd --zone=vnc --add-port=5900/tcp
#/bin/firewall-offline-cmd --zone=private --add-masquerade /bin/firewall-offline-cmd --zone=vnc --add-masquerade
#/bin/firewall-offline-cmd --zone=private --add-interface=eth3 # provider /bin/firewall-offline-cmd --zone=vnc --add-interface=eth1 # vnc
#/bin/firewall-offline-cmd --zone=private --add-source=10.8.0.2 /bin/firewall-offline-cmd --zone=vnc --list-all
#/bin/firewall-offline-cmd --zone=private --list-all
/bin/firewall-offline-cmd --new-zone=owner
/bin/firewall-offline-cmd --zone=owner --add-port=22/tcp
/bin/firewall-offline-cmd --zone=owner --add-interface=eth2 # owner
/bin/firewall-offline-cmd --zone=owner --list-all
/bin/firewall-offline-cmd --new-zone=provider
/bin/firewall-offline-cmd --zone=provider --add-port=22/tcp
/bin/firewall-offline-cmd --zone=provider --add-interface=eth3 # provider
/bin/firewall-offline-cmd --zone=provider --add-source=10.8.0.2
/bin/firewall-offline-cmd --zone=provider --list-all
/bin/systemctl enable firewalld /bin/systemctl enable firewalld
/bin/systemctl start firewalld /bin/systemctl start firewalld
...@@ -157,4 +168,7 @@ write_files: ...@@ -157,4 +168,7 @@ write_files:
#!/bin/bash #!/bin/bash
cat <<EOF >> /etc/hosts cat <<EOF >> /etc/hosts
172.27.48.141 VPNgate 172.27.48.141 VPNgate
172.27.48.6 PROgate
172.27.48.70 VNCgate
172.27.49.140 OWNgate
EOF EOF
...@@ -27,6 +27,12 @@ vms: ...@@ -27,6 +27,12 @@ vms:
networks: networks:
- ip: 172.27.48.140 - ip: 172.27.48.140
name: vpn name: vpn
- ip: 172.27.48.72
name: vnc
- ip: 172.27.49.142
name: owner
- ip: 172.27.48.9
name: provider
gate: gate:
networks: networks:
- ip: 172.27.48.141 - ip: 172.27.48.141
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment