Compare commits
64 Commits
v0.0.1e-em
...
v0.0.2z-em
Author | SHA1 | Date | |
---|---|---|---|
f8e3eabb9d | |||
043a273589 | |||
5981b67dd9 | |||
36336384e6 | |||
0da9fc0d5a | |||
62f9591c62 | |||
c32cf92cf5 | |||
d0ba31e795 | |||
69aa1ac739 | |||
90222678ce | |||
1fc84c8f19 | |||
b17d0fbac1 | |||
edbce48966 | |||
56f3780480 | |||
5eae26a67c | |||
7711d023e8 | |||
1777bec595 | |||
12621bb60a | |||
592843932c | |||
abfe277180 | |||
c2eb2b85a4 | |||
c20f44ec6e | |||
0c7d48caf3 | |||
12de1c8891 | |||
5fffbc77e2 | |||
b1e87cdd1e | |||
7f7207cf46 | |||
1187a5e28d | |||
8cef3cbf6b | |||
49ca8325e8 | |||
08973e83b3 | |||
79c7bd34e6 | |||
0cd9f1bb4c | |||
4dd5b711e2 | |||
f4361d9ecb | |||
5d767a195d | |||
7092ed5963 | |||
a508e7e65c | |||
da5011466b | |||
e395c14752 | |||
c5c261893c | |||
b8d05aa7c5 | |||
ce6d9e4c57 | |||
8d241f8786 | |||
2822944c95 | |||
85657ca334 | |||
d3c3ef1fdc | |||
073c529f19 | |||
c5d7bc847b | |||
4c0b3295af | |||
cd9c94ec5c | |||
dd73c48e28 | |||
7f4588c279 | |||
ca6a1b9513 | |||
2ab19a6497 | |||
b017071726 | |||
b4e7f7e067 | |||
031984aa2b | |||
389cb3e330 | |||
9655c226b1 | |||
e767433224 | |||
945bae351d | |||
75bc513445 | |||
17b049942f |
38
README.md
38
README.md
@ -1,22 +1,40 @@
|
||||
# gsb2023
|
||||
|
||||
2023-01-06
|
||||
2023-01-25 ps
|
||||
|
||||
Environnement et playbooks ansible pour le projet GSB 2023
|
||||
|
||||
## Quickstart
|
||||
prérequis :
|
||||
Prérequis :
|
||||
* une machine Debian Bullseye
|
||||
* VirtualBox
|
||||
* fichier machines viruelles **ova** :
|
||||
* **debian-bullseye-gsb-2023a.ova**
|
||||
* **debian-buster-gsb-2023a.ova**
|
||||
|
||||
|
||||
|
||||
## Les machines
|
||||
* s-adm
|
||||
* s-infra
|
||||
* r-int
|
||||
* r-ext
|
||||
* s-proxy
|
||||
* **s-adm** : routeur adm, DHCP + NAT, deploiement, proxy squid
|
||||
* **s-infra** : DNS maitre, autoconfiguration navigateurs avec **wpad**
|
||||
* **r-int** : routage, DHCP
|
||||
* **r-ext** : routage, NAT
|
||||
* **s-proxy** : squid
|
||||
* **s-itil** : serveur GLPI
|
||||
* **s-backup** : DNS esclave + sauvegarde s-win (SMB)
|
||||
* **s-mon** : supervision avec **Nagios4**, notifications et syslog
|
||||
* **s-fog** : deploiement postes de travail avec **FOG**
|
||||
* **s-win** : Windows Server 2019, AD, DNS, DHCP, partage fichiers
|
||||
* **s-nxc** : NextCloud avec **docker**
|
||||
* **s-elk** : pile ELK dockerisée
|
||||
* **s-lb** : Load Balancer **HaProxy** pour application Wordpress (DMZ)
|
||||
* **r-vp1** : Routeur VPN Wireguard coté siège
|
||||
* **r-vp2** : Routeur VPN Wireguard coté agence, DHCP
|
||||
* **s-agence** : Serveur agence
|
||||
* **s-lb** : Load Balancer **HaProxy** pour application Wordpress
|
||||
* **s-lb-web1** : Serveur Wordpress 1 Load Balancer
|
||||
* **s-lb-web2** : Serveur Wordpress 2 Load Balancer
|
||||
* **s-lb-db** : Serveur Mariadb pour Wordpress
|
||||
* **s-lb-nfs** : Serveur NFS pour application Wordpress
|
||||
|
||||
|
||||
## Les playbooks
|
||||
@ -26,7 +44,7 @@ prérequis :
|
||||
|
||||
On utilisera l'image de machine virtuelle suivante :
|
||||
* **debian-bullseye-2023a.ova** (2023-01-06)
|
||||
* Debian Bullseye 11 - 2 cartes - 1 Go - stockage 20 Go
|
||||
* Debian Bullseye 11.6 - 2 cartes - 1 Go - stockage 20 Go
|
||||
|
||||
|
||||
### Machine s-adm
|
||||
@ -56,7 +74,7 @@ On utilisera l'image de machine virtuelle suivante :
|
||||
- cloner le dépot :
|
||||
```shell
|
||||
mkdir -p tools/ansible ; cd tools/ansible
|
||||
git clone https://gitea.lyc-lecastel.fr/gadmin/gsb2022.git
|
||||
git clone https://gitea.lyc-lecastel.fr/gadmin/gsb2023.git
|
||||
cd gsb2023/pre
|
||||
export DEPL=192.168.99.99
|
||||
bash gsbboot
|
||||
|
@ -34,8 +34,6 @@ interface:
|
||||
- 192.168.100.254/24
|
||||
enp0s9:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.0.38/24
|
||||
enp0s16:
|
||||
exists: true
|
||||
addrs:
|
||||
|
@ -1,67 +1,56 @@
|
||||
file:
|
||||
/etc/wireguard/wg0.conf:
|
||||
exists: true
|
||||
mode: "0644"
|
||||
owner: root
|
||||
group: root
|
||||
filetype: file
|
||||
contains:
|
||||
- AllowedIPs = 10.0.0.2/32, 172.16.128.0/24
|
||||
package:
|
||||
# ferm:
|
||||
# installed: true
|
||||
strongswan:
|
||||
wireguard:
|
||||
installed: true
|
||||
port:
|
||||
udp:68:
|
||||
listening: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
wireguard-tools:
|
||||
installed: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
service:
|
||||
# dnsmasq:
|
||||
# enabled: true
|
||||
# running: true
|
||||
strongswan:
|
||||
enabled: true
|
||||
running: true
|
||||
ssh:
|
||||
wg-quick@wg0:
|
||||
enabled: true
|
||||
running: true
|
||||
command:
|
||||
sysctl net.ipv4.ip_forward:
|
||||
host 192.168.99.99:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- net.ipv4.ip_forward = 1
|
||||
- 99.99.168.192.in-addr.arpa domain name pointer s-adm.gsb.adm.
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 192.168.0.52:
|
||||
ping -c4 10.0.0.2:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 192.168.1.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 192.168.200.254:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 172.16.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
#process:
|
||||
# dnsmasq:
|
||||
# running: true
|
||||
# squid:
|
||||
# running: true
|
||||
interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.112/24
|
||||
mtu: 1500
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.0.51/24
|
||||
- 192.168.1.2/24
|
||||
mtu: 1500
|
||||
enp0s9:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.1.2/24
|
||||
- 192.168.0.51/24
|
||||
mtu: 1500
|
||||
wg0:
|
||||
exists: true
|
||||
addrs:
|
||||
- 10.0.0.1/32
|
||||
mtu: 1420
|
||||
|
52
goss/r-vp2.yaml
Normal file
52
goss/r-vp2.yaml
Normal file
@ -0,0 +1,52 @@
|
||||
file:
|
||||
/etc/wireguard/wg0.conf:
|
||||
exists: true
|
||||
mode: "0644"
|
||||
owner: root
|
||||
group: root
|
||||
filetype: file
|
||||
contains: []
|
||||
package:
|
||||
wireguard:
|
||||
installed: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
wireguard-tools:
|
||||
installed: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
service:
|
||||
isc-dhcp-server:
|
||||
enabled: true
|
||||
running: true
|
||||
wg-quick@wg0:
|
||||
enabled: true
|
||||
running: true
|
||||
command:
|
||||
ping -c4 10.0.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.102/24
|
||||
mtu: 1500
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 172.16.128.254/24
|
||||
mtu: 1500
|
||||
enp0s9:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.0.52/24
|
||||
mtu: 1500
|
||||
wg0:
|
||||
exists: true
|
||||
addrs:
|
||||
- 10.0.0.2/32
|
||||
mtu: 1420
|
@ -1,67 +0,0 @@
|
||||
package:
|
||||
ferm:
|
||||
installed: true
|
||||
ipsec:
|
||||
installed: true
|
||||
port:
|
||||
tcp:53:
|
||||
listening: true
|
||||
udp:67:
|
||||
listening: true
|
||||
udp:68:
|
||||
listening: true
|
||||
service:
|
||||
dnsmasq:
|
||||
enabled: true
|
||||
running: true
|
||||
ferm:
|
||||
enabled: true
|
||||
running: true
|
||||
ssh:
|
||||
enabled: true
|
||||
running: true
|
||||
command:
|
||||
sysctl net.ipv4.ip_forward:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- net.ipv4.ip_forward = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 192.168.0.51:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 192.168.1.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 192.168.200.254:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 172.16.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
process:
|
||||
dnsmasq:
|
||||
running: true
|
||||
squid3:
|
||||
running: true
|
||||
interface:
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 172.16.128.254/24
|
||||
enp0s9:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.0.52/24
|
@ -16,10 +16,6 @@ port:
|
||||
listening: true
|
||||
ip:
|
||||
- '::'
|
||||
tcp6:8080:
|
||||
listening: true
|
||||
ip:
|
||||
- '::'
|
||||
udp:53:
|
||||
listening: true
|
||||
ip:
|
||||
@ -45,7 +41,6 @@ service:
|
||||
user:
|
||||
dnsmasq:
|
||||
exists: true
|
||||
uid: 109
|
||||
gid: 65534
|
||||
groups:
|
||||
- nogroup
|
||||
@ -54,7 +49,6 @@ user:
|
||||
group:
|
||||
ssh:
|
||||
exists: true
|
||||
gid: 111
|
||||
command:
|
||||
/sbin/sysctl net.ipv4.ip_forward:
|
||||
exit-status: 0
|
||||
@ -65,8 +59,6 @@ command:
|
||||
dns:
|
||||
depl.sio.lan:
|
||||
resolveable: true
|
||||
addrs:
|
||||
- 10.121.38.10
|
||||
timeout: 500
|
||||
process:
|
||||
dnsmasq:
|
||||
|
41
goss/s-backup.yaml
Normal file
41
goss/s-backup.yaml
Normal file
@ -0,0 +1,41 @@
|
||||
package:
|
||||
bind9:
|
||||
installed: true
|
||||
cifs-utils:
|
||||
installed: true
|
||||
rsync:
|
||||
installed: true
|
||||
smbclient:
|
||||
installed: true
|
||||
service:
|
||||
bind9:
|
||||
enabled: true
|
||||
running: true
|
||||
rsync:
|
||||
enabled: true
|
||||
running: false
|
||||
command:
|
||||
ping -c4 ns.gsb.lan:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
#check si partage windows accesible
|
||||
smbclient -L //s-win --user=uBackup%Azerty1+ | grep 'public':
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- public
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.4/24
|
||||
mtu: 1500
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 172.16.0.4/24
|
||||
mtu: 1500
|
@ -1,26 +1,27 @@
|
||||
file:
|
||||
/etc/icinga/htpasswd.users:
|
||||
/etc/nagios4/htdigest.users:
|
||||
exists: true
|
||||
mode: "0644"
|
||||
size: 26
|
||||
owner: root
|
||||
group: root
|
||||
mode: "0640"
|
||||
owner: nagios
|
||||
group: www-data
|
||||
filetype: file
|
||||
contains: []
|
||||
contains: [nagiosadmin]
|
||||
package:
|
||||
apache2:
|
||||
installed: true
|
||||
nagios-snmp-plugins:
|
||||
installed: true
|
||||
icinga:
|
||||
nagios4:
|
||||
installed: true
|
||||
snmp:
|
||||
installed: true
|
||||
python3-passlib:
|
||||
installed: true
|
||||
port:
|
||||
tcp6:80:
|
||||
tcp:80:
|
||||
listening: true
|
||||
ip:
|
||||
- '::'
|
||||
- 0.0.0.0
|
||||
udp:514:
|
||||
listening: true
|
||||
ip:
|
||||
@ -29,7 +30,7 @@ service:
|
||||
apache2:
|
||||
enabled: true
|
||||
running: true
|
||||
icinga:
|
||||
nagios4:
|
||||
enabled: true
|
||||
running: true
|
||||
command:
|
||||
@ -42,7 +43,7 @@ command:
|
||||
process:
|
||||
apache2:
|
||||
running: true
|
||||
icinga:
|
||||
nagios4:
|
||||
running: true
|
||||
interface:
|
||||
enp0s3:
|
||||
@ -54,7 +55,7 @@ interface:
|
||||
addrs:
|
||||
- 172.16.0.8/24
|
||||
http:
|
||||
http://localhost/icinga:
|
||||
http://localhost/nagios4:
|
||||
status: 401
|
||||
allow-insecure: false
|
||||
no-follow-redirects: false
|
||||
|
@ -1,8 +0,0 @@
|
||||
---
|
||||
- hosts: localhost
|
||||
connection: local
|
||||
|
||||
roles:
|
||||
- goss
|
||||
- docker-graylog-pont
|
||||
- post
|
@ -1,14 +0,0 @@
|
||||
#!/bin/bash
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
ping -c3 172.16.0.1
|
14
ping-rext.sh
14
ping-rext.sh
@ -1,14 +0,0 @@
|
||||
#!/bin/bash
|
||||
ping -c3 172.16.0.1
|
||||
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
ping -c3 172.16.128.10
|
12
ping-rint.sh
12
ping-rint.sh
@ -1,12 +0,0 @@
|
||||
#!/bin/bash
|
||||
ping -c3 172.16.0.1
|
||||
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
ping -c3 172.16.128.10
|
@ -1,14 +0,0 @@
|
||||
#!/bin/bash
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
ping -c3 172.16.125.254
|
||||
|
||||
ping -c3 172.16.128.10
|
@ -1,5 +1,5 @@
|
||||
#!/bin/bash
|
||||
## ps : 2021-04-01 15:25
|
||||
## aa : 2023-04-18 15:25
|
||||
|
||||
set -o errexit
|
||||
set -o pipefail
|
||||
@ -9,11 +9,11 @@ apt update && apt upgrade
|
||||
apt install -y apache2 git
|
||||
STOREREP="/var/www/html/gsbstore"
|
||||
|
||||
GLPIREL=9.5.6
|
||||
GLPIREL=10.0.5
|
||||
str="wget -nc https://github.com/glpi-project/glpi/releases/download/${GLPIREL}/glpi-${GLPIREL}.tgz"
|
||||
|
||||
FIREL=9.5
|
||||
str2="https://github.com/fusioninventory/fusioninventory-for-glpi/releases/download/glpi9.5%2B3.0/fusioninventory-9.5+3.0.tar.bz2"
|
||||
FIREL=10.0.3+1.0
|
||||
str2="https://github.com/fusioninventory/fusioninventory-for-glpi/releases/download/glpi${FIREL}/fusioninventory-${FIREL}.tar.bz2"
|
||||
|
||||
FIAGREL=2.6
|
||||
str31="wget -nc https://github.com/fusioninventory/fusioninventory-agent/releases/download/${FIAGREL}/fusioninventory-agent_windows-x64_${FIAGREL}.exe"
|
||||
@ -23,19 +23,21 @@ str32="wget -nc https://github.com/fusioninventory/fusioninventory-agent/release
|
||||
FOGREL=1.5.9
|
||||
str4="wget -nc https://github.com/FOGProject/fogproject/archive/${FOGREL}.tar.gz -O fogproject-${FOGREL}.tar.gz"
|
||||
|
||||
WPREL=5.8.2
|
||||
str5="wget -nc https://fr.wordpress.org/wordpress-${WPREL}-fr_FR.tar.gz"
|
||||
WPREL=6.1.1
|
||||
#v6.1.1 le 17/01/2023
|
||||
str5="wget -nc https://fr.wordpress.org/latest-fr_FR.tar.gz -O wordpress-6.1.1-fr_FR.tar.gz"
|
||||
|
||||
GOSSVER=v0.3.16
|
||||
GOSSVER=v0.3.21
|
||||
str6="curl -L https://github.com/aelsabbahy/goss/releases/download/${GOSSVER}/goss-linux-amd64 -o goss"
|
||||
|
||||
DOCKERREL=1.29.2
|
||||
str7="curl -L https://github.com/docker/compose/releases/download/${DOCKERREL}/docker-compose-$(uname -s)-$(uname -m) -o docker-compose"
|
||||
#DOCKERREL=1.29.2
|
||||
#str7="curl -L https://github.com/docker/compose/releases/download/${DOCKERREL}/docker-compose-$(uname -s)-$(uname -m) -o docker-compose"
|
||||
|
||||
GESTSUPREL=3.2.15
|
||||
str8="wget -nc https://gestsup.fr/downloads/versions/current/version/gestsup_${GESTSUPREL}.zip"
|
||||
#GESTSUPREL=3.2.30
|
||||
#str8="wget -nc 'https://gestsup.fr/index.php?page=download&channel=stable&version=${GESTSUPREL}&type=gestsup' -O gestsup_${GESTSUPREL}.zip"
|
||||
str8="wget -nc 'https://gestsup.fr/index.php?page=download&channel=stable&version=3.2.30&type=gestsup' -O gestsup_3.2.30.zip"
|
||||
|
||||
ELKREL=7.16.3
|
||||
ELKREL=8.6.0
|
||||
str81="wget https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-${ELKREL}-amd64.deb"
|
||||
|
||||
str82="wget https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-${ELKREL}-windows-x86_64.zip"
|
||||
@ -70,12 +72,12 @@ curl -L https://get.docker.com -o getdocker.sh
|
||||
|
||||
chmod +x ./getdocker.sh
|
||||
|
||||
${str7}
|
||||
#${str7}
|
||||
|
||||
chmod +x ./docker-compose
|
||||
#chmod +x ./docker-compose
|
||||
|
||||
|
||||
wget -nc https://github.com/FiloSottile/mkcert/releases/download/v1.4.3/mkcert-v1.4.3-linux-amd64 -O mkcert
|
||||
wget -nc https://github.com/FiloSottile/mkcert/releases/download/v1.4.4/mkcert-v1.4.4-linux-amd64 -O mkcert
|
||||
|
||||
chmod +x ./mkcert
|
||||
|
||||
@ -90,4 +92,3 @@ EOT
|
||||
)
|
||||
|
||||
cat "${STOREREP}/getall"
|
||||
|
||||
|
@ -1,5 +1,9 @@
|
||||
#!/bin/bash
|
||||
|
||||
dir=/root/tools/ansible
|
||||
prj=gsb2023
|
||||
opt=""
|
||||
|
||||
if [ -z ${UREP+x} ]; then
|
||||
UREP=https://gitea.lyc-lecastel.fr/gadmin/gsb2023.git
|
||||
fi
|
||||
@ -11,6 +15,14 @@ dir=/root/tools/ansible
|
||||
cd "${dir}" || exit 1
|
||||
|
||||
hostname > hosts
|
||||
ansible-pull -i "${dir}/hosts" -C main -U "${UREP}"
|
||||
if [[ $# == 1 ]] ; then
|
||||
opt=$1
|
||||
fi
|
||||
if [[ "${opt}" == '-l' ]] ; then
|
||||
cd "${dir}/${prj}" || exit 2
|
||||
ansible-playbook -i localhost, -c local "$(hostname).yml"
|
||||
else
|
||||
ansible-pull -i "${dir}/hosts" -C main -U "${UREP}"
|
||||
fi
|
||||
|
||||
exit 0
|
||||
|
@ -1,6 +1,6 @@
|
||||
#!/bin/bash
|
||||
|
||||
if [ -z ${UREP+x} ]; then
|
||||
if [ -z ${UREP+x} ]; then
|
||||
UREP=https://gitea.lyc-lecastel.fr/gadmin/gsb2023.git
|
||||
fi
|
||||
|
||||
@ -11,6 +11,6 @@ dir=/root/tools/ansible
|
||||
cd "${dir}" || exit 1
|
||||
|
||||
hostname > hosts
|
||||
ansible-pull -i "${dir}/hosts" -U "${UREP}"
|
||||
ansible-pull -i "${dir}/hosts" -C main -U "${UREP}"
|
||||
|
||||
exit 0
|
||||
|
@ -10,18 +10,23 @@
|
||||
192.168.99.3 s-appli.gsb.adm
|
||||
192.168.99.4 s-backup.gsb.adm
|
||||
192.168.99.5 s-puppet.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.7 s-nxc.gsb.adm
|
||||
192.168.99.8 s-mon.gsb.adm
|
||||
192.168.99.9 s-itil.gsb.adm
|
||||
192.168.99.10 s-sspec.gsb.adm
|
||||
192.168.99.11 s-web-ext.gsb.adm
|
||||
192.168.99.10 s-lb.gsb.adm
|
||||
192.168.99.11 s-elk.gsb.adm
|
||||
192.168.99.10 s-dns.gsb.adm
|
||||
192.168.99.12 r-int.gsb.adm
|
||||
192.168.99.13 r-ext.gsb.adm
|
||||
192.168.99.14 s-nas.gsb.adm
|
||||
192.168.99.15 s-san.gsb.adm
|
||||
192.168.99.16 s-fog.gsb.adm
|
||||
192.168.99.50 s-lb-bd.gsb.adm
|
||||
192.168.99.101 s-lb-web1.gsb.adm
|
||||
192.168.99.102 s-lb-web2.gsb.adm
|
||||
192.168.99.103 s-lb-web3.gsb.adm
|
||||
|
||||
|
||||
192.168.99.8 syslog.gsb.adm
|
||||
|
||||
|
@ -11,16 +11,20 @@
|
||||
192.168.99.3 s-appli.gsb.adm
|
||||
192.168.99.4 s-backup.gsb.adm
|
||||
192.168.99.5 s-puppet.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.7 s-nxc.gsb.adm
|
||||
192.168.99.8 s-mon.gsb.adm
|
||||
192.168.99.9 s-itil.gsb.adm
|
||||
192.168.99.10 s-sspec.gsb.adm
|
||||
192.168.99.11 s-web-ext.gsb.adm
|
||||
192.168.99.10 s-lb.gsb.adm
|
||||
192.168.99.11 s-elk.gsb.adm
|
||||
192.168.99.10 s-dns.gsb.adm
|
||||
192.168.99.12 r-int.gsb.adm
|
||||
192.168.99.13 r-ext.gsb.adm
|
||||
192.168.99.14 s-nas.gsb.adm
|
||||
192.168.99.50 s-lb-bd.gsb.adm
|
||||
192.168.99.101 s-lb-web1.gsb.adm
|
||||
192.168.99.102 s-lb-web2.gsb.adm
|
||||
192.168.99.103 s-lb-web3.gsb.adm
|
||||
|
||||
192.168.99.8 syslog.gsb.adm
|
||||
|
||||
|
@ -5,7 +5,7 @@
|
||||
;
|
||||
$TTL 604800
|
||||
@ IN SOA s-infra.gsb.lan. root.s-infra.gsb.lan. (
|
||||
2022041200 ; Serial
|
||||
2023012500 ; Serial
|
||||
7200 ; Refresh
|
||||
86400 ; Retry
|
||||
8419200 ; Expire
|
||||
@ -25,7 +25,7 @@ s-nxc IN A 172.16.0.7
|
||||
s-docker IN A 172.16.0.7
|
||||
s-mon IN A 172.16.0.8
|
||||
s-itil IN A 172.16.0.9
|
||||
s-elk IN A 172.16.0.10
|
||||
s-elk IN A 172.16.0.11
|
||||
s-gestsup IN A 172.16.0.17
|
||||
r-int IN A 172.16.0.254
|
||||
r-int-lnk IN A 192.168.200.254
|
||||
|
@ -5,7 +5,7 @@
|
||||
;
|
||||
$TTL 604800
|
||||
@ IN SOA s-infra.gsb.lan. root.s-infra.gsb.lan. (
|
||||
2022041200 ; Serial
|
||||
2023012500 ; Serial
|
||||
7200 ; Refresh
|
||||
86400 ; Retry
|
||||
8419200 ; Expire
|
||||
@ -20,12 +20,12 @@ $TTL 604800
|
||||
6.0 IN PTR s-win.gsb.lan.
|
||||
7.0 IN PTR s-nxc.gsb.lan.
|
||||
8.0 IN PTR s-mon.gsb.lan.
|
||||
9.0 IN PTR s-itil.gsb.lan.
|
||||
9.0 IN PTR s-itil.gsb.lan.
|
||||
101.1 IN PTR s-web1
|
||||
101.2 IN PTR s-web2
|
||||
100.10 IN PTR s-lb
|
||||
100.10 IN PTR s-lb.gsb.lan
|
||||
10.0 IN PTR s-elk.gsb.lan.
|
||||
11.0 IN PTR s-elk.gsb.lan.
|
||||
17.0 IN PTR s-gestsup.lan
|
||||
254.0 IN PTR r-int.gsb.lan.
|
||||
|
||||
|
@ -1,16 +1,16 @@
|
||||
---
|
||||
- name: Téléchargement getdocker.sh
|
||||
ansible.builtin.get_url:
|
||||
url: http://s-adm.gsb.adm/gsbstore/getdocker.sh
|
||||
dest: /tmp
|
||||
mode: '0755'
|
||||
- name: Supprime le fichier getdocker.sh si déjà présent
|
||||
file:
|
||||
state: absent
|
||||
path: /tmp/getdocker.sh
|
||||
|
||||
- name: Télécharge le script d'installation de docker
|
||||
uri:
|
||||
url: 'https://get.docker.com'
|
||||
method: GET
|
||||
dest: /tmp/getdocker.sh
|
||||
mode: a+x
|
||||
register: result
|
||||
|
||||
- name: Execution du script getdocker
|
||||
ansible.builtin.script:
|
||||
cmd: /tmp/getdocker.sh
|
||||
|
||||
- name: Téléchargement docker-compose
|
||||
ansible.builtin.get_url:
|
||||
url: http://s-adm.gsb.adm/gsbstore/docker-compose
|
||||
dest: /usr/local/bin
|
||||
mode: '0755'
|
||||
shell: bash /tmp/getdocker.sh
|
||||
|
@ -3,19 +3,19 @@
|
||||
- name: goss binary exists
|
||||
stat: path=/usr/local/bin/goss
|
||||
register: gossbin
|
||||
|
||||
|
||||
- name: install goss sur machine standard
|
||||
get_url:
|
||||
url: "{{ depl_url }}/{{ depl_goss }}"
|
||||
get_url:
|
||||
url: "{{ depl_url }}/{{ depl_goss }}"
|
||||
dest: /usr/local/bin/{{ depl_goss }}
|
||||
mode: 0755
|
||||
when: gossbin.stat.exists == False and ansible_hostname != "s-adm"
|
||||
when: gossbin.stat.exists == false and ansible_hostname != "s-adm"
|
||||
|
||||
- name: install goss sur s-adm
|
||||
copy:
|
||||
copy:
|
||||
src: "/var/www/html/gsbstore/{{ depl_goss }}"
|
||||
dest: /usr/local/bin/{{ depl_goss }}
|
||||
mode: 0755
|
||||
remote_src: yes
|
||||
when: gossbin.stat.exists == False and ansible_hostname == "s-adm"
|
||||
when: gossbin.stat.exists == false and ansible_hostname == "s-adm"
|
||||
|
||||
|
@ -1,5 +1,6 @@
|
||||
depl_url: "http://s-adm.gsb.adm/gsbstore"
|
||||
depl_glpi: "glpi-9.5.6.tgz"
|
||||
#depl_glpi: "glpi-9.5.6.tgz"
|
||||
depl_glpi: "glpi-10.0.5.tgz"
|
||||
depl_fusioninventory: "fusioninventory-9.5+3.0.tar.bz2"
|
||||
depl_fusioninventory_agentx64: "fusioninventory-agent_windows-x64_2.6.exe"
|
||||
depl_fusioninventory_agentx86: "fusioninventory-agent_windows-x86_2.6.exe"
|
||||
|
@ -44,7 +44,6 @@ backend fermeweb
|
||||
#option httpchk HEAD / HTTP/1.0
|
||||
server s-lb-web1 192.168.101.1:80 check
|
||||
server s-lb-web2 192.168.101.2:80 check
|
||||
#server s-lb-web3 192.168.101.3:80 check
|
||||
|
||||
|
||||
listen stats
|
25
roles/lb-front/tasks/main.yml
Normal file
25
roles/lb-front/tasks/main.yml
Normal file
@ -0,0 +1,25 @@
|
||||
- name: install haproxy
|
||||
apt:
|
||||
name: haproxy
|
||||
state: present
|
||||
|
||||
- name: parametre backend et fontend
|
||||
blockinfile:
|
||||
path: /etc/haproxy/haproxy.cfg
|
||||
block: |
|
||||
frontend proxypublic
|
||||
bind 192.168.100.10:80
|
||||
default_backend fermeweb
|
||||
|
||||
backend fermeweb
|
||||
balance roundrobin
|
||||
option httpclose
|
||||
#option httpchk HEAD / HTTP/1.0
|
||||
server s-lb-web1 192.168.101.1:80 check
|
||||
server s-lb-web2 192.168.101.2:80 check
|
||||
|
||||
- name: redemarre haproxy
|
||||
service:
|
||||
name: haproxy
|
||||
# state: restarted
|
||||
enabled: yes
|
10
roles/lb-nfs-server/README.md
Normal file
10
roles/lb-nfs-server/README.md
Normal file
@ -0,0 +1,10 @@
|
||||
# Role s-nas-server
|
||||
## Installation de nfs-server et mise en oeuvre du partage /home/wordpress
|
||||
|
||||
Ce rôle :
|
||||
* installe **nfs-server**
|
||||
* copie le fichier de configuration **exports** pour exporter le répertoire **/home/wordpress**
|
||||
* relance le service **nfs-server**
|
||||
|
||||
### Objectif
|
||||
Le répertoire **/home/wordpress** est exporté par **nfs** sur le réseau **n-dmz-db**
|
2
roles/lb-web/defaults/main.yml
Normal file
2
roles/lb-web/defaults/main.yml
Normal file
@ -0,0 +1,2 @@
|
||||
depl_url: "http://s-adm.gsb.adm/gsbstore/"
|
||||
depl_wordpress: "wordpress-6.1.1-fr_FR.tar.gz"
|
@ -1,11 +1,16 @@
|
||||
---
|
||||
- name: creation repertoir
|
||||
file:
|
||||
path: /home/
|
||||
state: directory
|
||||
---
|
||||
- name: installation php et apache ...
|
||||
apt:
|
||||
name:
|
||||
- apache2
|
||||
- php
|
||||
- php-mbstring
|
||||
- php-mysql
|
||||
- mariadb-client
|
||||
state: present
|
||||
- name: download and extract wordpress
|
||||
unarchive:
|
||||
src: "{{ depl_url }}/{{ depl_wordpress }}"
|
||||
src: https://fr.wordpress.org/latest-fr_FR.tar.gz
|
||||
dest: /home/
|
||||
remote_src: yes
|
||||
owner: www-data
|
||||
@ -25,14 +30,3 @@
|
||||
recurse: yes
|
||||
owner: 33
|
||||
group: 33
|
||||
|
||||
# - name: Fix permissions
|
||||
# shell: chown -R www-data /var/www/wordpress/*
|
||||
#
|
||||
# - name: Update default Apache site
|
||||
# lineinfile:
|
||||
# dest=/etc/apache2/sites-enabled/000-default.conf
|
||||
# regexp="(.)+DocumentRoot /var/www/html"
|
||||
# line="DocumentRoot /var/www/wordpress"
|
||||
# notify:
|
||||
# - restart apache2
|
@ -1,5 +1,6 @@
|
||||
#!/bin/bash
|
||||
GLPIREL=9.5.3
|
||||
#GLPIREL=9.5.3
|
||||
GLPIREL=10.0.5
|
||||
wget -nc https://github.com/glpi-project/glpi/releases/download/${GLPIREL}/glpi-${GLPIREL}.tgz
|
||||
|
||||
FIREL=9.5+1.0
|
||||
|
1
roles/nagios/defaults/main.yml
Normal file
1
roles/nagios/defaults/main.yml
Normal file
@ -0,0 +1 @@
|
||||
MAIL_DEST: "anthony.arnoux@protonmail.ch"
|
@ -35,7 +35,7 @@ define contact {
|
||||
host_notification_options d,r
|
||||
service_notification_commands notify-service-by-email
|
||||
host_notification_commands notify-host-by-email
|
||||
email nagios.gsb22@gmail.com
|
||||
email {{ MAIL_DEST }}
|
||||
}
|
||||
|
||||
|
||||
|
@ -2,34 +2,36 @@
|
||||
|
||||
Nextcloud et Traefik fonctionnent grâce à docker. Pour pouvoir faire fonctionner ce playbook, docker doit être installé.
|
||||
|
||||
## Premièrement
|
||||
## 1.
|
||||
|
||||
Le playbook va créer le dossier nxc à la racine de root. Deux fichier docker-compose "nextcloud.yml" et "traefik.yml" y seront copiés depuis le répertoire "files" du playbook.
|
||||
Enfin, dans le répertoire nxc, seront créé les dossier certs et config.
|
||||
Le playbook crée le dossier **nxc** à la racine de root.
|
||||
|
||||
### Deuxièmement
|
||||
Les fichiers "nextcloud.yml" et "traefik.yml" y seront copiés depuis le répertoire "files" du playbook.
|
||||
|
||||
Le playbook va copier les fichiers placés dans "files" et les placer dans les bons répertoires.
|
||||
Enfin, dans le répertoire nxc, sont créés les répertoires **certs** et **config**.
|
||||
|
||||
#### Troisièmement
|
||||
## 2. Copie des fichiers
|
||||
|
||||
Le playbook va créer un certificat x509 grâce à mkcert, il s'agit d'une solution permettant de créer
|
||||
des certificats auto-signés. Pour cela il télécharge mkcert sur s-adm (utiliser le getall).
|
||||
Le playbook copie les fichiers placés dans "files" et les placer dans les bons répertoires.
|
||||
|
||||
mkcert sera placé dans : /usr/local/bin/
|
||||
## 3. Génération du certificat
|
||||
|
||||
Pour créer le certificat le playbook va executer des lignes de commandes (lancé depuis nxc/) :
|
||||
Le playbook crée un certificat **x509** grâce à **mkcert**, il s'agit d'une solution permettant de créer des certificats auto-signés. Pour cela, il télécharge **mkcert** sur **s-adm** (utiliser le script **getall**).
|
||||
|
||||
**mkcert** est placé dans : /usr/local/bin/
|
||||
|
||||
Pour créer le certificat, le playbook exécute les commandes (lancé depuis nxc/) :
|
||||
```
|
||||
/usr/local/bin/mkcert -install # Installe mkcert
|
||||
/usr/local/bin/mkcert -key-file key.pem -cert-file cert.pem "hôte.domaine.local" "*.domaine.local" #Crée le certificat le DNS spécifié
|
||||
```
|
||||
##### Quatrièmement
|
||||
## 4. Lancement
|
||||
|
||||
Le playbook va lancer les fichier "docker-compose" à savoir : nextcloud.yml et traefik.yml.
|
||||
Cela va installer les solutions automatiquement. Nextcloud est alors fonctionnel avec
|
||||
un proxy inverse qui va rediriger en HTTPS.
|
||||
Le playbook lance les fichiers "docker-compose" à savoir : nextcloud.yml et traefik.yml qui démarrent les deux piles **docker**.
|
||||
|
||||
Nextcloud est alors fonctionnel avec le proxy inverse **traefik** assurant la redirection vers HTTPS.
|
||||
|
||||
|
||||
ATTENTION : Après avoir relancé la VM, executez le script "nxc-start.sh" afin d'installer les piles applicatives.
|
||||
Une fois le script fini, accedez au site :
|
||||
https://s-nxc.gsb.lan
|
||||
ATTENTION : Après avoir relancé la VM, executez le script "nxc-start.sh" afin d'installer les piles applicatives.
|
||||
|
||||
Une fois le script terminé, le site est disponible ici : https://s-nxc.gsb.lan
|
||||
|
@ -8,37 +8,30 @@ iface lo inet loopback
|
||||
# Reseau N-adm
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.99.12
|
||||
netmask 255.255.255.0
|
||||
address 192.168.99.12/24
|
||||
|
||||
|
||||
# Reseau liaison avec r-ext
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 192.168.200.254
|
||||
netmask 255.255.255.0
|
||||
address 192.168.200.254/24
|
||||
gateway 192.168.200.253
|
||||
up ip route add default via 192.168.200.253
|
||||
|
||||
|
||||
# Reseau wifi
|
||||
allow-hotplug enp0s9
|
||||
iface enp0s9 inet static
|
||||
address 172.16.65.254
|
||||
netmask 255.255.255.0
|
||||
address 172.16.65.254/24
|
||||
|
||||
|
||||
# Reseau user
|
||||
allow-hotplug enp0s10
|
||||
iface enp0s10 inet static
|
||||
address 172.16.64.254
|
||||
netmask 255.255.255.0
|
||||
address 172.16.64.254/24
|
||||
|
||||
|
||||
# Reseau infra
|
||||
allow-hotplug enp0s16
|
||||
iface enp0s16 inet static
|
||||
address 172.16.0.254
|
||||
netmask 255.255.255.0
|
||||
up /root/routagenat
|
||||
address 172.16.0.254/24
|
||||
|
||||
|
@ -8,13 +8,13 @@ iface lo inet loopback
|
||||
# cote N-adm
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.99.10
|
||||
address 192.168.99.11
|
||||
netmask 255.255.255.0
|
||||
gateway 192.168.99.99
|
||||
|
||||
# cote N-infra
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 172.16.0.10
|
||||
address 172.16.0.11
|
||||
netmask 255.255.255.0
|
||||
post-up route add -net 172.16.64.0/24 gw 172.16.0.254
|
||||
|
@ -1,7 +1,7 @@
|
||||
# This file describes the network interfaces available on your system
|
||||
# and how to activate them. For more information, see interfaces(5).
|
||||
|
||||
source /etc/network/interfaces.d/*
|
||||
#source /etc/network/interfaces.d/*
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
@ -10,7 +10,7 @@ iface lo inet loopback
|
||||
# cote n-adm
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.99.104/24
|
||||
address 192.168.99.8/24
|
||||
gateway 192.168.99.99
|
||||
|
||||
# Cote n-infra
|
||||
@ -20,4 +20,4 @@ iface enp0s8 inet static
|
||||
up ip route add 172.16.64.0/24 via 172.16.0.254
|
||||
up ip route add 172.16.128.0/24 via 172.16.0.254
|
||||
up ip route add 192.168.0.0/16 via 172.16.0.254
|
||||
up ip route add 192.168.200.0/24 via 172.16.0.254
|
||||
up ip route add 192.168.200.0/24 via 172.16.0.254
|
||||
|
@ -1,4 +1,4 @@
|
||||
source /etc/network/interfaces.d/*
|
||||
#source /etc/network/interfaces.d/*
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
@ -14,4 +14,4 @@ iface enp0s3 inet static
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 192.168.102.253
|
||||
netmask 255.255.255.0
|
||||
netmask 255.255.255.0
|
||||
|
@ -1,2 +1 @@
|
||||
[smtp.gmail.com]:587 nagios.gsb22@gmail.com:Azerty1+
|
||||
chmod 600 /etc/postfix/sasl_passwd
|
||||
[smtp.gmail.com]:587 anthony.arnoux22@gmail.com:gndtfomdkxnmcdft
|
||||
|
@ -4,6 +4,7 @@
|
||||
name:
|
||||
- postfix
|
||||
- mailutils
|
||||
- libsasl2-modules
|
||||
state: latest
|
||||
|
||||
- name: Copie du fichier sasl_passwd
|
||||
@ -12,17 +13,75 @@
|
||||
src: sasl_passwd
|
||||
dest: /etc/postfix/sasl/
|
||||
|
||||
- name: Copie du fichier main.cf
|
||||
tags: main.cf
|
||||
template:
|
||||
src: main.cf.j2
|
||||
dest: /etc/postfix.main.cf
|
||||
- name: ajout relay host gmail
|
||||
tags: postfix
|
||||
replace:
|
||||
path: /etc/postfix/main.cf
|
||||
regexp: '^relayhost ='
|
||||
replace: 'relayhost = [smtp.gmail.com]:587'
|
||||
notify: restart postfix
|
||||
|
||||
- name: Commande postmap
|
||||
- name: ajout lignes conf postfix
|
||||
tags: postfix
|
||||
blockinfile:
|
||||
path: /etc/postfix/main.cf
|
||||
block: |
|
||||
#TLS
|
||||
smtp_use_tls = yes
|
||||
#SASL
|
||||
smtp_sasl_auth_enable = yes
|
||||
#pas d auth anonyme
|
||||
smtp_sasl_security_options = noanonymous
|
||||
#chemin sasl_passwd
|
||||
smtp_sasl_password_maps = hash:/etc/postfix/sasl/sasl_passwd
|
||||
#chemin certificats CA
|
||||
smtp_tls_CAfile = /etc/postfix/cacert.pem
|
||||
notify: restart postfix
|
||||
|
||||
#- name: Copie du fichier main.cf
|
||||
# tags: main.cf
|
||||
# template:
|
||||
# src: main.cf.j2
|
||||
# dest: /etc/postfix.main.cf
|
||||
|
||||
|
||||
- name: Commande postmap identifiants
|
||||
tags: postmap
|
||||
command: postmap /etc/postfix/sasl/sasl_passwd
|
||||
notify: restart postfix
|
||||
|
||||
- name: Ensure directory exists for local self-signed TLS certs.
|
||||
file:
|
||||
path: /etc/ssl/certs/postfix
|
||||
state: directory
|
||||
|
||||
- name: Generate an OpenSSL private key
|
||||
community.crypto.openssl_privatekey:
|
||||
path: /etc/ssl/certs/postfix/privkey.pem
|
||||
|
||||
- name: Generate an OpenSSL CSR
|
||||
community.crypto.openssl_csr:
|
||||
path: /etc/ssl/certs/postfix/postfix.csr
|
||||
privatekey_path: /etc/ssl/certs/postfix/privkey.pem
|
||||
common_name: "GSB2023.LAN"
|
||||
|
||||
- name: Generate a Self Signed OpenSSL certificate.
|
||||
community.crypto.x509_certificate:
|
||||
path: /etc/ssl/certs/postfix/fullchain.pem
|
||||
privatekey_path: /etc/ssl/certs/postfix/privkey.pem
|
||||
csr_path: /etc/ssl/certs/postfix/postfix.csr
|
||||
provider: selfsigned
|
||||
|
||||
- name: Copy certificate preserve owner and permissions to be used with postfix
|
||||
copy:
|
||||
remote_src: true
|
||||
src: /etc/ssl/certs/postfix/fullchain.pem
|
||||
dest: /etc/postfix/cacert.pem
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
notify: restart postfix
|
||||
|
||||
- name: message d'information pour gmail
|
||||
tags: msg2
|
||||
debug: msg="Il faut activer les applications moins sécurisées sur le compte google"
|
||||
debug: msg="Il faut activer les applications moins sécurisées sur le compte google"
|
||||
|
@ -3,11 +3,11 @@
|
||||
- name: Copie du fichier sysctl.conf
|
||||
copy: src=sysctl.conf dest=/etc/
|
||||
|
||||
- name: copier le script de routage
|
||||
copy: src=routagenat dest=/root/
|
||||
#- name: copier le script de routage
|
||||
# copy: src=routagenat dest=/root/
|
||||
|
||||
- name: rendre executabe le script
|
||||
shell: chmod +x /root/routagenat
|
||||
#- name: rendre executabe le script
|
||||
# shell: chmod +x /root/routagenat
|
||||
|
||||
#- name: exectuer le script
|
||||
# script: /root/routagenat
|
||||
|
@ -1,2 +0,0 @@
|
||||
depl_url: "http://s-adm.gsb.adm/gsbstore/"
|
||||
depl_wordpress: "wordpress-5.8.2-fr_FR.tar.gz"
|
@ -1,11 +0,0 @@
|
||||
---
|
||||
- name: Installation d'HAproxy
|
||||
apt: pkg=haproxy state=present update_cache=yes
|
||||
|
||||
- name: Fichier de configuration
|
||||
copy: src=haproxy.cfg dest=/etc/haproxy/haproxy.cfg
|
||||
notify:
|
||||
- restart haproxy
|
||||
|
||||
- name: Copie de goss
|
||||
copy: src=goss.yaml dest=/root
|
@ -1,3 +0,0 @@
|
||||
##Installation de nfs
|
||||
|
||||
Ce rôle télécharge NFS puis copie un fichier de configuration pour partager le dossier /home/wordpress.
|
@ -1,27 +1,51 @@
|
||||
#!/bin/bash
|
||||
|
||||
BDIR=/home/backup
|
||||
SWIN=/tmp/s-win
|
||||
LOCK=/tmp/s-backup.lock
|
||||
|
||||
#Fonction cleanup pour sortir propre dans tout les cas
|
||||
cleanup()
|
||||
{
|
||||
rm "${LOCK}"
|
||||
umount "${SWIN}"
|
||||
echo "nettoyage effectue, sortie tout propre ..."
|
||||
exit 3
|
||||
}
|
||||
|
||||
#check si pas deja en cours d execution > sortie si fichier de lock existe
|
||||
if [ -e "${LOCK}" ] ; then
|
||||
echo "$0 : Verrouillage, deja en cours d execution"
|
||||
trap cleanup 1 2 3 6
|
||||
fi
|
||||
#prepartion des dossiers qui vont accueillir les donnees à sauvegarder
|
||||
[ -d "${BDIR}" ] || mkdir "${BDIR}"
|
||||
[ -d "${BDIR}" ] || mkdir "${BDIR}/s-win"
|
||||
[ -d "${BDIR}/s-win" ] || mkdir "${BDIR}/s-win"
|
||||
[ -d "${SWIN}" ] || mkdir "${SWIN}"
|
||||
|
||||
mount -t cifs -o ro,vers=3.0,username=u-backup,password=Azerty1+ //s-win/commun "${SWIN}"
|
||||
#etablissement du lock
|
||||
touch "${LOCK}"
|
||||
|
||||
mount -t cifs -o ro,vers=3.0,username=uBackup,password=Azerty1+ //s-win/commun "${SWIN}"
|
||||
if [ $? != 0 ] ; then
|
||||
echo "$0 : erreur montage ${SWIN}"
|
||||
exit 1
|
||||
rm "${LOCK}"
|
||||
trap cleanup 1 2 3 6
|
||||
fi
|
||||
rsync -av "${SWIN}/" "${BDIR}/s-win/commun"
|
||||
umount "${SWIN}"
|
||||
|
||||
|
||||
mount -t cifs -o ro,vers=3.0,username=u-backup,password=Azerty1+ //s-win/public "${SWIN}"
|
||||
mount -t cifs -o ro,vers=3.0,username=uBackup,password=Azerty1+ //s-win/public "${SWIN}"
|
||||
if [ $? != 0 ] ; then
|
||||
echo "$0 : erreur montage"
|
||||
exit 2
|
||||
echo "$0 : erreur montage ${SWIN}"
|
||||
trap cleanup 1 2 3 6
|
||||
fi
|
||||
rsync -av "${SWIN}/" "${BDIR}/s-win/public"
|
||||
umount "${SWIN}"
|
||||
|
||||
#libere le verrou
|
||||
rm "${LOCK}"
|
||||
|
||||
exit 0
|
||||
|
||||
|
5
roles/wireguard-l/README.md
Normal file
5
roles/wireguard-l/README.md
Normal file
@ -0,0 +1,5 @@
|
||||
#ajout du sleep 5
|
||||
|
||||
éditer "/etc/init.d/isc-dhcp-server"
|
||||
aller au "case \"$1\" in" et rajouter "sleep 5" avant le "if"
|
||||
|
@ -9,13 +9,13 @@
|
||||
name: wireguard-tools
|
||||
state: present
|
||||
|
||||
- name: installation de sshpass
|
||||
apt:
|
||||
name: sshpass
|
||||
state: present
|
||||
#- name: installation de sshpass
|
||||
# apt:
|
||||
# name: sshpass
|
||||
# state: present
|
||||
|
||||
- name: copie du fichier de configuration depuis r-vp1
|
||||
command: "sshpass -p 'root' scp -r root@192.168.99.112:/root/confwg/wg0-b.conf /etc/wireguard/"
|
||||
#- name: copie du fichier de configuration depuis r-vp1
|
||||
# command: "sshpass -p 'root' scp -r root@192.168.99.112:/root/confwg/wg0-b.conf /etc/wireguard/"
|
||||
|
||||
- name: renommage du fichier de configuration
|
||||
command: "mv /etc/wireguard/wg0-b.conf /etc/wireguard/wg0.conf"
|
||||
#- name: renommage du fichier de configuration
|
||||
# command: "mv /etc/wireguard/wg0-b.conf /etc/wireguard/wg0.conf"
|
||||
|
@ -8,7 +8,7 @@
|
||||
- s-ssh
|
||||
- dnsmasq
|
||||
- squid
|
||||
- local-store
|
||||
# - local-store
|
||||
- snmp-agent
|
||||
- syslog-cli
|
||||
- post
|
||||
|
@ -4,6 +4,7 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- goss
|
||||
# - proxy3
|
||||
- snmp-agent
|
||||
# - ssh-cli
|
||||
|
@ -4,8 +4,8 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- s-lb-web-ab
|
||||
- lb-web
|
||||
- snmp-agent
|
||||
- s-nas-client
|
||||
- lb-nfs-client
|
||||
- post
|
||||
|
||||
|
@ -4,8 +4,8 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- s-lb-web-ab
|
||||
- lb-web
|
||||
- snmp-agent
|
||||
- s-nas-client
|
||||
- lb-nfs-client
|
||||
- post
|
||||
|
||||
|
@ -1,11 +0,0 @@
|
||||
---
|
||||
- hosts: localhost
|
||||
connection: local
|
||||
|
||||
roles:
|
||||
- base
|
||||
- s-lb-web-ab
|
||||
- snmp-agent
|
||||
- s-nas-client
|
||||
- post
|
||||
|
@ -1,18 +0,0 @@
|
||||
---
|
||||
- hosts: localhost
|
||||
connection: local
|
||||
vars:
|
||||
wp_mysql_db: "wordpress"
|
||||
wp_mysql_user: "wp"
|
||||
wp_mysql_password: "wp"
|
||||
wp_mysql_host: "192.168.102.50"
|
||||
|
||||
roles:
|
||||
- base
|
||||
- goss
|
||||
- apache2
|
||||
- s-lb-wordpress
|
||||
- snmp-agent
|
||||
- post
|
||||
- mysql
|
||||
- php-fpm
|
@ -10,8 +10,8 @@
|
||||
roles:
|
||||
- base
|
||||
- snmp-agent
|
||||
- s-lb-wordpress
|
||||
- s-nas-server
|
||||
- lb-web
|
||||
- lb-nfs-server
|
||||
- ssh-cli
|
||||
- syslog-cli
|
||||
- post
|
||||
|
80
scripts/mkvm
80
scripts/mkvm
@ -1,47 +1,69 @@
|
||||
#!/bin/bash
|
||||
|
||||
ovarelease="2023a"
|
||||
ovafile="$HOME/Téléchargements/debian-bullseye-gsb-${ovarelease}.ova"
|
||||
mkvmrelease="v1.2"
|
||||
|
||||
ovarelease="2023a"
|
||||
ovafogrelease="2023a"
|
||||
ovafile="$HOME/Téléchargements/debian-bullseye-gsb-${ovarelease}.ova"
|
||||
ovafilefog="$HOME/Téléchargements/debian-buster-gsb-${ovafogrelease}.ova"
|
||||
deletemode=0
|
||||
|
||||
usage () {
|
||||
echo "$0 - version ${ovarelease}"
|
||||
echo "$0 - version ${mkvmrelease} - Ova version ${ovarelease}"
|
||||
echo "$0 : creation VM et parametrage interfaces"
|
||||
echo "usage : $0 <s-infra|r-int|r-ext|s-proxy|s-mon>"
|
||||
echo "usage : $0 [-r] <s-infra|r-int|r-ext|s-proxy|s-mon|s-appli|s-backup|s-itil|s-ncx|s-fog>"
|
||||
echo " option -r : efface vm existante avant creation nouvelle"
|
||||
exit 1
|
||||
}
|
||||
|
||||
create_vm () {
|
||||
nom=$1
|
||||
if [[ ! -r "${ovafile}" ]]; then
|
||||
echo "$0 : erreur ouverture fichier ${ovafile} ..."
|
||||
local nom="$1"
|
||||
local nomova="${ovafile}"
|
||||
if [[ "${nom}" == "s-fog" ]] ; then
|
||||
nomova="${ovafilefog}"
|
||||
fi
|
||||
if [[ ! -r "${nomova}" ]]; then
|
||||
echo "$0 : erreur ouverture fichier ${nomova} ..."
|
||||
exit 3
|
||||
fi
|
||||
vboxmanage import "${ovafile}" --vsys 0 --vmname "${nom}"
|
||||
if [[ "${deletemode}" = 1 ]] ; then
|
||||
VBoxManage unregistervm --delete "${nom}"
|
||||
fi
|
||||
vboxmanage import "${nomova}" --vsys 0 --vmname "${nom}"
|
||||
}
|
||||
|
||||
setif () {
|
||||
|
||||
VBoxManage modifyvm $1 --nic${2} intnet
|
||||
VBoxManage modifyvm $1 --intnet${2} $3
|
||||
VBoxManage modifyvm $1 --nictype${2} 82540EM
|
||||
VBoxManage modifyvm $1 --cableconnected${2} on
|
||||
VBoxManage modifyvm $1 --nicpromisc${2} allow-all
|
||||
VBoxManage modifyvm "$1" --nic"${2}" intnet
|
||||
VBoxManage modifyvm "$1" --intnet"${2}" "$3"
|
||||
VBoxManage modifyvm "$1" --nictype"${2}" 82540EM
|
||||
VBoxManage modifyvm "$1" --cableconnected"${2}" on
|
||||
VBoxManage modifyvm "$1" --nicpromisc"${2}" allow-all
|
||||
}
|
||||
|
||||
create_if () {
|
||||
# enp0s3
|
||||
setif $1 1 $2
|
||||
setif $1 2 $3
|
||||
setif "$1" 1 "$2"
|
||||
#(enp0s8)
|
||||
setif "$1" 2 "$3"
|
||||
#(enp0s9)
|
||||
if [[ -n "$4" ]] ; then
|
||||
setif "$1" 3 "$4"
|
||||
fi
|
||||
}
|
||||
|
||||
|
||||
if [[ $# != 1 ]] ; then
|
||||
if [[ $# == 0 ]] ; then
|
||||
usage
|
||||
fi
|
||||
|
||||
vm=$1
|
||||
if [[ $1 == "--help" ]] || [[ $1 == "-h" ]] || [[ $1 == "-V" ]] ; then
|
||||
usage
|
||||
fi
|
||||
if [[ $1 == "-r" ]] ; then
|
||||
deletemode=1
|
||||
shift
|
||||
fi
|
||||
vm="$1"
|
||||
|
||||
create_vm "${vm}"
|
||||
if [[ "${vm}" == "s-infra" ]] ; then
|
||||
@ -50,9 +72,7 @@ elif [[ "${vm}" == "s-proxy" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "r-int" ]] ; then
|
||||
# n-adm, n-link, n-wifi, n-user, n-infra
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
setif "${vm}" 2 "n-link"
|
||||
setif "${vm}" 3 "n-wifi"
|
||||
create_if "${vm}" "n-adm" "n-link" "n-wifi"
|
||||
setif "${vm}" 4 "n-user"
|
||||
setif "${vm}" 5 "n-infra"
|
||||
elif [[ "${vm}" == "r-ext" ]] ; then
|
||||
@ -68,22 +88,21 @@ elif [[ "${vm}" == "s-itil" ]] ; then
|
||||
elif [[ "${vm}" == "s-nxc" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-fog" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
setif "${vm}" 3 "n-user"
|
||||
elif [[ "${vm}" == "s-DNS-ext" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra" "n-user"
|
||||
elif [[ "${vm}" == "s-dns-ext" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz"
|
||||
elif [[ "${vm}" == "s-web-ext" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz"
|
||||
elif [[ "${vm}" == "s-nxc" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-lb" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz" "n-dmz-lb"
|
||||
elif [[ "${vm}" == "s-web1" ]] ; then
|
||||
elif [[ "${vm}" == "s-lb-web1" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
# setif "${vm}" 3 "n-dmz-lb"
|
||||
elif [[ "${vm}" == "s-web2" ]] ; then
|
||||
elif [[ "${vm}" == "s-lb-web2" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-web3" ]] ; then
|
||||
elif [[ "${vm}" == "s-lb-web3" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
# setif "${vm}" 3 "n-dmz-lb"
|
||||
elif [[ "${vm}" == "s-lb-bd" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-nas" ]] ; then
|
||||
@ -94,8 +113,7 @@ elif [[ "${vm}" == "r-vp2" ]] ; then
|
||||
./addint.r-vp2
|
||||
elif [[ "${vm}" == "s-agence" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-agence"
|
||||
|
||||
else
|
||||
echo "$0 : vm ${vm} non prevu"
|
||||
echo "$0 : vm ${vm} non prevue "
|
||||
exit 2
|
||||
fi
|
||||
|
135
scripts/mkvm.pl
Executable file
135
scripts/mkvm.pl
Executable file
@ -0,0 +1,135 @@
|
||||
#!/usr/pbin/perl
|
||||
use strict;
|
||||
use warnings;
|
||||
use v5.10;
|
||||
|
||||
my $ovarelease = "2023a";
|
||||
my $ovafogrelease = "2023a";
|
||||
my $home=$ENV{'HOME'};
|
||||
my $ovafile="$home/Téléchargements/debian-bullseye-gsb-".$ovarelease.".ova";
|
||||
my $ovafilefog="$home/Téléchargements/debian-buster-gsb-i".$ovafogrelease.".ova";
|
||||
|
||||
my %vmtab = (
|
||||
#name => "s-adm", params => ":1024:"
|
||||
name => "s-adm", params => ":1024:n-adm:n-infra",
|
||||
name => "s-infra", params => ":1024:n-adm:n-infra",
|
||||
name => "s-proxy", params => ":1024:n-adm:n-infra",
|
||||
name => "r-int", params => ":1024:n-adm:n-link:n-wifi:n-user:n-infra",
|
||||
name => "r-ext", params => ":1024:n-adm:n-dmz:eno1:n-linkvi:n-link",
|
||||
name => "s-mon", params => ":1024:n-adm:n-infra",
|
||||
name => "s-itil", params => ":1024:n-adm:n-infra",
|
||||
name => "s-appli", params => ":1024:n-adm:n-infra",
|
||||
name => "s-backup", params => ":1024:n-adm:n-infra",
|
||||
name => "s-fog", params => ":1024:n-adm:n-infra:n-user",
|
||||
name => "s-nxc", params => ":1024:n-adm:n-infra",
|
||||
|
||||
)
|
||||
|
||||
sub usage () {
|
||||
say "$0 - version ${ovarelease}";
|
||||
say "$0 : creation VM et parametrage interfaces";
|
||||
say "usage : $0 <s-infra|r-int|r-ext|s-proxy|s-mon>";
|
||||
exit 1 ;
|
||||
}
|
||||
|
||||
sub create_vm () {
|
||||
my $nom = shift ;
|
||||
my $nomova = shift ;
|
||||
if ( $nom == "s-fog" ) {
|
||||
$nomova = $ovafilefog;
|
||||
}
|
||||
if ( ! -r $nomova ) {
|
||||
say "$0 : erreur ouverture fichier $nomova ..."
|
||||
exit 3
|
||||
}
|
||||
qx (vboxmanage import $nomova --vsys 0 --vmname $nom);
|
||||
}
|
||||
|
||||
sub setif () {
|
||||
my ($vm, $interf, $parm) = @ARGV;
|
||||
qx(VBoxManage modifyvm $vm --nic"${2}" intnet);
|
||||
qx(VBoxManage modifyvm $vm --intnet"${2}" "$3");
|
||||
qx(VBoxManage modifyvm $vm --nictype"${2}" 82540EM);
|
||||
qx(VBoxManage modifyvm $vm --cableconnected"${2}" on);
|
||||
qx(VBoxManage modifyvm $vm --nicpromisc"${2}" allow-all);
|
||||
}
|
||||
|
||||
sub create_if () {
|
||||
# enp0s3
|
||||
setif "$1" 1 "$2"
|
||||
setif "$1" 2 "$3"
|
||||
#(enp0s8)
|
||||
}
|
||||
|
||||
|
||||
create_vm "${vm}"
|
||||
if [[ "${vm}" == "s-infra" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-proxy" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "r-int" ]] ; then
|
||||
# n-adm, n-link, n-wifi, n-user, n-infra
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
setif "${vm}" 2 "n-link"
|
||||
setif "${vm}" 3 "n-wifi"
|
||||
setif "${vm}" 4 "n-user"
|
||||
setif "${vm}" 5 "n-infra"
|
||||
elif [[ "${vm}" == "r-ext" ]] ; then
|
||||
./addint.r-ext
|
||||
elif [[ "${vm}" == "s-mon" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-appli" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-backup" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-itil" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-nxc" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-fog" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
setif "${vm}" 3 "n-user"
|
||||
elif [[ "${vm}" == "s-DNS-ext" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz"
|
||||
elif [[ "${vm}" == "s-web-ext" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz"
|
||||
elif [[ "${vm}" == "s-nxc" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-lb" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz" "n-dmz-lb"
|
||||
elif [[ "${vm}" == "s-web1" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
# setif "${vm}" 3 "n-dmz-lb"
|
||||
elif [[ "${vm}" == "s-web2" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-web3" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
# setif "${vm}" 3 "n-dmz-lb"
|
||||
elif [[ "${vm}" == "s-lb-bd" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-nas" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-db"
|
||||
elif [[ "${vm}" == "r-vp1" ]] ; then
|
||||
./addint.r-vp1
|
||||
elif [[ "${vm}" == "r-vp2" ]] ; then
|
||||
./addint.r-vp2
|
||||
elif [[ "${vm}" == "s-agence" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-agence"
|
||||
|
||||
else
|
||||
echo "$0 : vm ${vm} non prevu"
|
||||
exit 2
|
||||
fi
|
||||
|
||||
|
||||
sub usage () {
|
||||
print "usage : mkvm.pl <vm-name>\n";
|
||||
print "cree une VM a partir d'un fichier OVA et parametre les interfaces";
|
||||
exit 1 ;
|
||||
}
|
||||
|
||||
sub main () {
|
||||
my $vm = shift;
|
||||
usage unless ( $vm);
|
||||
|
||||
}
|
@ -1,15 +1,18 @@
|
||||
# Création des dossiers partagés et des utilisateur
|
||||
# Tuto Installation Windows Serveur
|
||||
|
||||
Les fichiers .cmd lancer sur la machine s-win permet de créer les utilisateur, leurs mettres
|
||||
droits et créer des dossiers partagés.
|
||||
- Une fois l'installation du serveur Windows, renommer le serveur en s-win et installer git.
|
||||
- Installer Serveur DNS et Services AD DS.
|
||||
- Créer une nouvelle fôret pour le domaine gsb.lan.
|
||||
- Configurer la zone inverse du DNS.
|
||||
|
||||
le fichier mkusr.cmd permet de créer un autre utiliateur avec les mêmes droits que les autres.
|
||||
## Création des dossiers partagés et des utilisateur
|
||||
|
||||
# Utilisation des comptes utilisateurs
|
||||
- Lancer mkusr-compta.cmd et mkusr-ventes.cmd sur s-win pour créer les utilisateurs avec leurs droits.
|
||||
- Le fichier gsb-dossiers.cmd permet de créer des dossiers partagés.
|
||||
- Le fichier mkusr.cmd permet de créer un autre utiliateur avec les mêmes droits que les autres.
|
||||
|
||||
Pour vous connecter au serveurs DNS s-win il faut créer un machine dans le réseau n-user et que
|
||||
cette machine puisse ping le serveur.
|
||||
## Utilisation des comptes utilisateurs
|
||||
|
||||
Après il suffit de changer le domaine de cette machine et la redémarrer.
|
||||
|
||||
suite à ça, connecter vous avec les identifiants d'un utilisateurs.
|
||||
- Pour utiliser l'AD du serveur s-win, créer une machine Windows 10 dans le réseau n-user.
|
||||
- Une fois son adresse IP obtenue (172.16.64.xx) ajouter la machine dans le domaine gsb.lan en utilisant un utiliateur (autre que l'Administrateur).
|
||||
- Redémarrer puis se connecter avec les identifiants choisis.
|
@ -2,14 +2,14 @@ mkdir C:\gsb\partages
|
||||
|
||||
cd C:\gsb\partages
|
||||
|
||||
mkdir compta
|
||||
mkdir compta
|
||||
|
||||
mkdir ventes
|
||||
|
||||
mkdir public
|
||||
|
||||
mkdir commun
|
||||
|
||||
mkdir users
|
||||
|
||||
|
||||
|
||||
cd C:\gsb
|
||||
|
||||
mkdir users
|
3
windows/mkusr-backup.cmd
Normal file
3
windows/mkusr-backup.cmd
Normal file
@ -0,0 +1,3 @@
|
||||
net group gg-backup /ADD
|
||||
call mkusr uBackup "u-backup" gg-backup
|
||||
icacls "C:\gsb\partages\public" /Grant:r uBackup:M /T
|
22
wireguard/ping-agence.sh
Normal file
22
wireguard/ping-agence.sh
Normal file
@ -0,0 +1,22 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo ping interface paserelle r-vp2
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
echo ping r-vp1 interface n-linkv
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
echo ping r-ext interface n-linkv
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-ext interface n-link
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
echo ping r-int interface n-link
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
echo ping r-int interface s-infra
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
echo ping s-infra
|
||||
ping -c3 172.16.0.1
|
22
wireguard/ping-rext.sh
Executable file
22
wireguard/ping-rext.sh
Executable file
@ -0,0 +1,22 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo ping s-infra
|
||||
ping -c3 172.16.0.1
|
||||
|
||||
echo ping r-int interface n-infra
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
echo ping r-int interface n-link
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
echo ping r-ext interface n-linkv
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-vp1 interface n-linkv
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
echo ping r-vp2 interface n-ag
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
echo ping s-agence
|
||||
ping -c3 172.16.128.10
|
19
wireguard/ping-rint.sh
Normal file
19
wireguard/ping-rint.sh
Normal file
@ -0,0 +1,19 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo ping s-infra
|
||||
ping -c3 172.16.0.1
|
||||
|
||||
echo ping r-ext interface n-link
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
echo ping r-ext interface n-linkv
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-vp1 interface n-link
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
echo ping r-vp2 interface n-ag
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
echo ping s-agence
|
||||
ping -c3 172.16.128.10
|
21
wireguard/ping-sinfra.sh
Normal file
21
wireguard/ping-sinfra.sh
Normal file
@ -0,0 +1,21 @@
|
||||
#!/bin/bash
|
||||
echo ping vers r-int
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
echo ping r-int interface externe
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
echo ping r-ext interface interne
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
echo ping r-ext interface liaison
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-vp1 interface liaison n-linkv
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
echo ping r-vp2 interface interface interne
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
echo ping s-agence
|
||||
ping -c3 172.16.128.11
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user