Compare commits

..

18 Commits

Author SHA1 Message Date
2822944c95 postfix ok et template mail nagios 2023-01-12 11:57:09 +01:00
85657ca334 Modif du script d'installation de docker 2023-01-12 11:42:49 +01:00
d3c3ef1fdc commenté sshpass dans main.yml 2023-01-12 11:34:37 +01:00
073c529f19 recup
Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023
2023-01-12 09:38:13 +01:00
c5d7bc847b modif pour glpi 10.0.5 2023-01-12 09:37:45 +01:00
4c0b3295af Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023 2023-01-12 09:05:01 +01:00
cd9c94ec5c Modification mkvm pour s-fog 2023-01-12 09:04:03 +01:00
dd73c48e28 modif mkvm ajout s-nxc 2023-01-12 08:55:46 +01:00
7f4588c279 Modification mkvm pour s-fog 2023-01-12 08:45:54 +01:00
ca6a1b9513 Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023 2023-01-10 09:41:43 +01:00
2ab19a6497 modif goss r-ext 2023-01-10 09:41:14 +01:00
b017071726 correction interfaces sources ignore 2023-01-10 09:41:08 +01:00
b4e7f7e067 mise a jour s-adm goss 2023-01-10 09:19:23 +01:00
031984aa2b modif sur README.md 2023-01-10 09:04:56 +01:00
389cb3e330 Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023
merge
2023-01-10 09:03:53 +01:00
9655c226b1 maj goss s-mon 2023-01-10 08:45:44 +01:00
e767433224 Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023
merge
2023-01-06 09:50:45 +01:00
945bae351d chut 2023-01-06 09:50:40 +01:00
16 changed files with 135 additions and 75 deletions

View File

@ -56,7 +56,7 @@ On utilisera l'image de machine virtuelle suivante :
- cloner le dépot :
```shell
mkdir -p tools/ansible ; cd tools/ansible
git clone https://gitea.lyc-lecastel.fr/gadmin/gsb2022.git
git clone https://gitea.lyc-lecastel.fr/gadmin/gsb2023.git
cd gsb2023/pre
export DEPL=192.168.99.99
bash gsbboot

View File

@ -34,8 +34,6 @@ interface:
- 192.168.100.254/24
enp0s9:
exists: true
addrs:
- 192.168.0.38/24
enp0s16:
exists: true
addrs:

View File

@ -16,10 +16,6 @@ port:
listening: true
ip:
- '::'
tcp6:8080:
listening: true
ip:
- '::'
udp:53:
listening: true
ip:
@ -45,7 +41,6 @@ service:
user:
dnsmasq:
exists: true
uid: 109
gid: 65534
groups:
- nogroup
@ -54,7 +49,6 @@ user:
group:
ssh:
exists: true
gid: 111
command:
/sbin/sysctl net.ipv4.ip_forward:
exit-status: 0
@ -65,8 +59,6 @@ command:
dns:
depl.sio.lan:
resolveable: true
addrs:
- 10.121.38.10
timeout: 500
process:
dnsmasq:

View File

@ -1,26 +1,27 @@
file:
/etc/icinga/htpasswd.users:
/etc/nagios4/htdigest.users:
exists: true
mode: "0644"
size: 26
owner: root
group: root
mode: "0640"
owner: nagios
group: www-data
filetype: file
contains: []
contains: [nagiosadmin]
package:
apache2:
installed: true
nagios-snmp-plugins:
installed: true
icinga:
nagios4:
installed: true
snmp:
installed: true
python3-passlib:
installed: true
port:
tcp6:80:
tcp:80:
listening: true
ip:
- '::'
- 0.0.0.0
udp:514:
listening: true
ip:
@ -29,7 +30,7 @@ service:
apache2:
enabled: true
running: true
icinga:
nagios4:
enabled: true
running: true
command:
@ -42,19 +43,19 @@ command:
process:
apache2:
running: true
icinga:
nagios4:
running: true
interface:
enp0s3:
exists: true
addrs:
- 192.168.99.8/24
- 192.168.99.104/24
enp0s8:
exists: true
addrs:
- 172.16.0.8/24
http:
http://localhost/icinga:
http://localhost/nagios4:
status: 401
allow-insecure: false
no-follow-redirects: false

View File

@ -1,16 +1,16 @@
---
- name: Téléchargement getdocker.sh
ansible.builtin.get_url:
url: http://s-adm.gsb.adm/gsbstore/getdocker.sh
dest: /tmp
mode: '0755'
- name: Supprime le fichier getdocker.sh si déjà présent
file:
state: absent
path: /tmp/getdocker.sh
- name: Télécharge le script d'installation de docker
uri:
url: 'https://get.docker.com'
method: GET
dest: /tmp/getdocker.sh
mode: a+x
register: result
- name: Execution du script getdocker
ansible.builtin.script:
cmd: /tmp/getdocker.sh
- name: Téléchargement docker-compose
ansible.builtin.get_url:
url: http://s-adm.gsb.adm/gsbstore/docker-compose
dest: /usr/local/bin
mode: '0755'
shell: bash /tmp/getdocker.sh

View File

@ -3,16 +3,16 @@
- name: goss binary exists
stat: path=/usr/local/bin/goss
register: gossbin
- name: install goss sur machine standard
get_url:
url: "{{ depl_url }}/{{ depl_goss }}"
url: "{{ depl_url }}/{{ depl_goss }}"
dest: /usr/local/bin/{{ depl_goss }}
mode: 0755
when: gossbin.stat.exists == false and ansible_hostname != "s-adm"
- name: install goss sur s-adm
copy:
copy:
src: "/var/www/html/gsbstore/{{ depl_goss }}"
dest: /usr/local/bin/{{ depl_goss }}
mode: 0755

View File

@ -1,5 +1,6 @@
depl_url: "http://s-adm.gsb.adm/gsbstore"
depl_glpi: "glpi-9.5.6.tgz"
#depl_glpi: "glpi-9.5.6.tgz"
depl_glpi: "glpi-10.0.5.tgz"
depl_fusioninventory: "fusioninventory-9.5+3.0.tar.bz2"
depl_fusioninventory_agentx64: "fusioninventory-agent_windows-x64_2.6.exe"
depl_fusioninventory_agentx86: "fusioninventory-agent_windows-x86_2.6.exe"

View File

@ -1,5 +1,6 @@
#!/bin/bash
GLPIREL=9.5.3
#GLPIREL=9.5.3
GLPIREL=10.0.5
wget -nc https://github.com/glpi-project/glpi/releases/download/${GLPIREL}/glpi-${GLPIREL}.tgz
FIREL=9.5+1.0

View File

@ -0,0 +1 @@
MAIL_DEST: "anthony.arnoux@protonmail.ch"

View File

@ -35,7 +35,7 @@ define contact {
host_notification_options d,r
service_notification_commands notify-service-by-email
host_notification_commands notify-host-by-email
email nagios.gsb22@gmail.com
email {{ MAIL_DEST }}
}

View File

@ -1,7 +1,7 @@
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
source /etc/network/interfaces.d/*
#source /etc/network/interfaces.d/*
# The loopback network interface
auto lo
@ -10,7 +10,7 @@ iface lo inet loopback
# cote n-adm
allow-hotplug enp0s3
iface enp0s3 inet static
address 192.168.99.104/24
address 192.168.99.8/24
gateway 192.168.99.99
# Cote n-infra
@ -20,4 +20,4 @@ iface enp0s8 inet static
up ip route add 172.16.64.0/24 via 172.16.0.254
up ip route add 172.16.128.0/24 via 172.16.0.254
up ip route add 192.168.0.0/16 via 172.16.0.254
up ip route add 192.168.200.0/24 via 172.16.0.254
up ip route add 192.168.200.0/24 via 172.16.0.254

View File

@ -1,4 +1,4 @@
source /etc/network/interfaces.d/*
#source /etc/network/interfaces.d/*
# The loopback network interface
auto lo
@ -14,4 +14,4 @@ iface enp0s3 inet static
allow-hotplug enp0s8
iface enp0s8 inet static
address 192.168.102.253
netmask 255.255.255.0
netmask 255.255.255.0

View File

@ -1,2 +1 @@
[smtp.gmail.com]:587 nagios.gsb22@gmail.com:Azerty1+
chmod 600 /etc/postfix/sasl_passwd
[smtp.gmail.com]:587 anthony.arnoux22@gmail.com:gndtfomdkxnmcdft

View File

@ -4,6 +4,7 @@
name:
- postfix
- mailutils
- libsasl2-modules
state: latest
- name: Copie du fichier sasl_passwd
@ -12,17 +13,75 @@
src: sasl_passwd
dest: /etc/postfix/sasl/
- name: Copie du fichier main.cf
tags: main.cf
template:
src: main.cf.j2
dest: /etc/postfix.main.cf
- name: ajout relay host gmail
tags: postfix
replace:
path: /etc/postfix/main.cf
regexp: '^relayhost ='
replace: 'relayhost = [smtp.gmail.com]:587'
notify: restart postfix
- name: Commande postmap
- name: ajout lignes conf postfix
tags: postfix
blockinfile:
path: /etc/postfix/main.cf
block: |
#TLS
smtp_use_tls = yes
#SASL
smtp_sasl_auth_enable = yes
#pas d auth anonyme
smtp_sasl_security_options = noanonymous
#chemin sasl_passwd
smtp_sasl_password_maps = hash:/etc/postfix/sasl/sasl_passwd
#chemin certificats CA
smtp_tls_CAfile = /etc/postfix/cacert.pem
notify: restart postfix
#- name: Copie du fichier main.cf
# tags: main.cf
# template:
# src: main.cf.j2
# dest: /etc/postfix.main.cf
- name: Commande postmap identifiants
tags: postmap
command: postmap /etc/postfix/sasl/sasl_passwd
notify: restart postfix
- name: Ensure directory exists for local self-signed TLS certs.
file:
path: /etc/ssl/certs/postfix
state: directory
- name: Generate an OpenSSL private key
community.crypto.openssl_privatekey:
path: /etc/ssl/certs/postfix/privkey.pem
- name: Generate an OpenSSL CSR
community.crypto.openssl_csr:
path: /etc/ssl/certs/postfix/postfix.csr
privatekey_path: /etc/ssl/certs/postfix/privkey.pem
common_name: "GSB2023.LAN"
- name: Generate a Self Signed OpenSSL certificate.
community.crypto.x509_certificate:
path: /etc/ssl/certs/postfix/fullchain.pem
privatekey_path: /etc/ssl/certs/postfix/privkey.pem
csr_path: /etc/ssl/certs/postfix/postfix.csr
provider: selfsigned
- name: Copy certificate preserve owner and permissions to be used with postfix
copy:
remote_src: true
src: /etc/ssl/certs/postfix/fullchain.pem
dest: /etc/postfix/cacert.pem
owner: root
group: root
mode: '0644'
notify: restart postfix
- name: message d'information pour gmail
tags: msg2
debug: msg="Il faut activer les applications moins sécurisées sur le compte google"
debug: msg="Il faut activer les applications moins sécurisées sur le compte google"

View File

@ -9,13 +9,13 @@
name: wireguard-tools
state: present
- name: installation de sshpass
apt:
name: sshpass
state: present
#- name: installation de sshpass
# apt:
# name: sshpass
# state: present
- name: copie du fichier de configuration depuis r-vp1
command: "sshpass -p 'root' scp -r root@192.168.99.112:/root/confwg/wg0-b.conf /etc/wireguard/"
#- name: copie du fichier de configuration depuis r-vp1
# command: "sshpass -p 'root' scp -r root@192.168.99.112:/root/confwg/wg0-b.conf /etc/wireguard/"
- name: renommage du fichier de configuration
command: "mv /etc/wireguard/wg0-b.conf /etc/wireguard/wg0.conf"

View File

@ -1,7 +1,9 @@
#!/bin/bash
ovarelease="2023a"
ovafogrelease="2023a"
ovafile="$HOME/Téléchargements/debian-bullseye-gsb-${ovarelease}.ova"
ovafilefog="$HOME/Téléchargements/debian-buster-gsb-${ovafogrelease}.ova"
usage () {
@ -12,27 +14,31 @@ usage () {
}
create_vm () {
nom=$1
if [[ ! -r "${ovafile}" ]]; then
echo "$0 : erreur ouverture fichier ${ovafile} ..."
nom="$1"
nomova=${ovafile}
if [[ "${nom}" == "s-fog" ]] ; then
nomova="${ovafilefog}"
fi
if [[ ! -r "${nomova}" ]]; then
echo "$0 : erreur ouverture fichier ${nomova} ..."
exit 3
fi
vboxmanage import "${ovafile}" --vsys 0 --vmname "${nom}"
vboxmanage import "${nomova}" --vsys 0 --vmname "${nom}"
}
setif () {
VBoxManage modifyvm $1 --nic${2} intnet
VBoxManage modifyvm $1 --intnet${2} $3
VBoxManage modifyvm $1 --nictype${2} 82540EM
VBoxManage modifyvm $1 --cableconnected${2} on
VBoxManage modifyvm $1 --nicpromisc${2} allow-all
VBoxManage modifyvm "$1" --nic"${2}" intnet
VBoxManage modifyvm "$1" --intnet"${2}" "$3"
VBoxManage modifyvm "$1" --nictype"${2}" 82540EM
VBoxManage modifyvm "$1" --cableconnected"${2}" on
VBoxManage modifyvm "$1" --nicpromisc"${2}" allow-all
}
create_if () {
# enp0s3
setif $1 1 $2
setif $1 2 $3
setif "$1" 1 "$2"
setif "$1" 2 "$3"
#(enp0s8)
}
@ -41,7 +47,7 @@ if [[ $# != 1 ]] ; then
usage
fi
vm=$1
vm="$1"
create_vm "${vm}"
if [[ "${vm}" == "s-infra" ]] ; then
@ -74,6 +80,8 @@ elif [[ "${vm}" == "s-DNS-ext" ]] ; then
create_if "${vm}" "n-adm" "n-dmz"
elif [[ "${vm}" == "s-web-ext" ]] ; then
create_if "${vm}" "n-adm" "n-dmz"
elif [[ "${vm}" == "s-nxc" ]] ; then
create_if "${vm}" "n-adm" "n-infra"
elif [[ "${vm}" == "s-lb" ]] ; then
create_if "${vm}" "n-adm" "n-dmz" "n-dmz-lb"
elif [[ "${vm}" == "s-web1" ]] ; then