Compare commits
91 Commits
v0.0.2d-ps
...
v0.0.4o-aa
Author | SHA1 | Date | |
---|---|---|---|
a7a9752aa0 | |||
4490b84c15 | |||
46ad76af18 | |||
019096fb7e | |||
993c34b934 | |||
fe914d9894 | |||
83bfd34e91 | |||
00289e1bcb | |||
8f3f364152 | |||
e36f8af7e6 | |||
495546fae7 | |||
c29549a281 | |||
761d3a00bc | |||
aadc552dc3 | |||
3cbae83a73 | |||
e1323f22b8 | |||
f541cebcc2 | |||
ea4166590b | |||
b04ae4302b | |||
e328a1e13c | |||
ac65be862f | |||
83f3d14c2a | |||
9bda971ff6 | |||
038e41dd40 | |||
a4ef2de7e8 | |||
0dbbaf0751 | |||
64f1b74ba7 | |||
5ddbedac97 | |||
05ddace1af | |||
9019c0dbe7 | |||
9fd18796a6 | |||
6e33ccce33 | |||
f38fca4561 | |||
01c2b76936 | |||
a6a35324ba | |||
70950f9e4e | |||
a7f366a124 | |||
143c3878a3 | |||
76b4ceabe3 | |||
0988c9729e | |||
9bcfcc6305 | |||
4cb8aa49b9 | |||
340333d5d1 | |||
82f6fdc9c9 | |||
17618a8c8e | |||
3dac065600 | |||
acb722461c | |||
6200de2cda | |||
0074367972 | |||
3aa4a58252 | |||
8fd183998e | |||
f4b736847e | |||
5c8efd5e62 | |||
ab2cc8da96 | |||
44c8fc32a5 | |||
385563b4f2 | |||
fff62c5507 | |||
6139095296 | |||
9b609e6418 | |||
332c8a2167 | |||
a3c2d85952 | |||
f8e3eabb9d | |||
043a273589 | |||
5981b67dd9 | |||
36336384e6 | |||
0da9fc0d5a | |||
62f9591c62 | |||
c32cf92cf5 | |||
d0ba31e795 | |||
69aa1ac739 | |||
90222678ce | |||
1fc84c8f19 | |||
b17d0fbac1 | |||
edbce48966 | |||
56f3780480 | |||
5eae26a67c | |||
7711d023e8 | |||
1777bec595 | |||
12621bb60a | |||
592843932c | |||
abfe277180 | |||
c2eb2b85a4 | |||
c20f44ec6e | |||
0c7d48caf3 | |||
12de1c8891 | |||
5fffbc77e2 | |||
b1e87cdd1e | |||
7f7207cf46 | |||
1187a5e28d | |||
8cef3cbf6b | |||
49ca8325e8 |
49
README.md
49
README.md
@ -1,35 +1,40 @@
|
||||
# gsb2023
|
||||
|
||||
2023-01-18 ps
|
||||
2023-01-30 ps
|
||||
|
||||
Environnement et playbooks ansible pour le projet GSB 2023
|
||||
|
||||
## Quickstart
|
||||
prérequis :
|
||||
Prérequis :
|
||||
* une machine Debian Bullseye
|
||||
* VirtualBox
|
||||
* fichier machines viruelles ova :
|
||||
* debian-bullseye-gsb-2023a.ova
|
||||
* debian-buster-gsb-2023a.ova
|
||||
* fichier machines viruelles **ova** :
|
||||
* **debian-bullseye-gsb-2023a.ova**
|
||||
* **debian-buster-gsb-2023a.ova**
|
||||
|
||||
|
||||
|
||||
## Les machines
|
||||
* s-adm : routeur adm, DHCP + NAT, deploiement, proxy squid
|
||||
* s-infra : DNS maitre
|
||||
* r-int : routaage, DHCP
|
||||
* r-ext : routage, NAT
|
||||
* s-proxy : squid
|
||||
* s-itil : serveur GLPI
|
||||
* s-backup : DNS esclave + sauvegarde s-win
|
||||
* s-mon : supervision avec **Nagios4** et syslog
|
||||
* s-fog : deploiement postes de travail avec **FOG**
|
||||
* s-win : Windows Server 2019, AD, DNS, DHCP, partage fichiers
|
||||
* s-nxc : NextCloud avec **docker**
|
||||
* s-elk : pile ELK dockerisée
|
||||
* s-lb : Load Balancer **HaProxy** pour application Wordpress
|
||||
* r-vp1 : Routeur VPN Wireguard coté siège
|
||||
* r-vp2 : Routeur VPN Wireguard coté agence, DHCP
|
||||
* **s-adm** : routeur adm, DHCP + NAT, deploiement, proxy squid
|
||||
* **s-infra** : DNS maitre, autoconfiguration navigateurs avec **wpad**
|
||||
* **r-int** : routage, DHCP
|
||||
* **r-ext** : routage, NAT
|
||||
* **s-proxy** : squid
|
||||
* **s-itil** : serveur GLPI
|
||||
* **s-backup** : DNS esclave + sauvegarde s-win (SMB)
|
||||
* **s-mon** : supervision avec **Nagios4**, notifications et syslog
|
||||
* **s-fog** : deploiement postes de travail avec **FOG**
|
||||
* **s-win** : Windows Server 2019, AD, DNS, DHCP, partage fichiers
|
||||
* **s-nxc** : NextCloud avec **docker**
|
||||
* **s-elk** : pile ELK dockerisée
|
||||
* **s-lb** : Load Balancer **HaProxy** pour application Wordpress (DMZ)
|
||||
* **r-vp1** : Routeur VPN Wireguard coté siège
|
||||
* **r-vp2** : Routeur VPN Wireguard coté agence, DHCP
|
||||
* **s-agence** : Serveur agence
|
||||
* **s-lb** : Load Balancer **HaProxy** pour application Wordpress
|
||||
* **s-lb-web1** : Serveur Wordpress 1 Load Balancer
|
||||
* **s-lb-web2** : Serveur Wordpress 2 Load Balancer
|
||||
* **s-lb-db** : Serveur Mariadb pour Wordpress
|
||||
* **s-nas** : Serveur NFS pour application Wordpress avec LB
|
||||
|
||||
|
||||
## Les playbooks
|
||||
@ -39,7 +44,7 @@ prérequis :
|
||||
|
||||
On utilisera l'image de machine virtuelle suivante :
|
||||
* **debian-bullseye-2023a.ova** (2023-01-06)
|
||||
* Debian Bullseye 11 - 2 cartes - 1 Go - stockage 20 Go
|
||||
* Debian Bullseye 11.6 - 2 cartes - 1 Go - stockage 20 Go
|
||||
|
||||
|
||||
### Machine s-adm
|
||||
|
12
goss/list-goss
Normal file
12
goss/list-goss
Normal file
@ -0,0 +1,12 @@
|
||||
cd goss/
|
||||
goss -g r-vp1.yaml v
|
||||
goss -g r-vp1.yaml aa wireguard
|
||||
goss add interface enp0s3
|
||||
goss add interface enp0s8
|
||||
goss add interface enp0s9
|
||||
goss add interface wg0
|
||||
goss aa wireguard
|
||||
goss add package wireguard-tools
|
||||
goss add service wg-quick@wg0
|
||||
goss add command "ping -c4 10.0.0.2"
|
||||
goss add file "/etc/wireguard/wg0.conf"
|
@ -1,67 +1,56 @@
|
||||
file:
|
||||
/etc/wireguard/wg0.conf:
|
||||
exists: true
|
||||
mode: "0644"
|
||||
owner: root
|
||||
group: root
|
||||
filetype: file
|
||||
contains:
|
||||
- AllowedIPs = 10.0.0.2/32, 172.16.128.0/24
|
||||
package:
|
||||
# ferm:
|
||||
# installed: true
|
||||
strongswan:
|
||||
wireguard:
|
||||
installed: true
|
||||
port:
|
||||
udp:68:
|
||||
listening: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
wireguard-tools:
|
||||
installed: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
service:
|
||||
# dnsmasq:
|
||||
# enabled: true
|
||||
# running: true
|
||||
strongswan:
|
||||
enabled: true
|
||||
running: true
|
||||
ssh:
|
||||
wg-quick@wg0:
|
||||
enabled: true
|
||||
running: true
|
||||
command:
|
||||
sysctl net.ipv4.ip_forward:
|
||||
host 192.168.99.99:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- net.ipv4.ip_forward = 1
|
||||
- 99.99.168.192.in-addr.arpa domain name pointer s-adm.gsb.adm.
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 192.168.0.52:
|
||||
ping -c4 10.0.0.2:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 192.168.1.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 192.168.200.254:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
command:
|
||||
ping -c 4 172.16.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
#process:
|
||||
# dnsmasq:
|
||||
# running: true
|
||||
# squid:
|
||||
# running: true
|
||||
interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.112/24
|
||||
mtu: 1500
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.0.51/24
|
||||
- 192.168.1.2/24
|
||||
mtu: 1500
|
||||
enp0s9:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.1.2/24
|
||||
- 192.168.0.51/24
|
||||
mtu: 1500
|
||||
wg0:
|
||||
exists: true
|
||||
addrs:
|
||||
- 10.0.0.1/32
|
||||
mtu: 1420
|
||||
|
52
goss/r-vp2.yaml
Normal file
52
goss/r-vp2.yaml
Normal file
@ -0,0 +1,52 @@
|
||||
file:
|
||||
/etc/wireguard/wg0.conf:
|
||||
exists: true
|
||||
mode: "0644"
|
||||
owner: root
|
||||
group: root
|
||||
filetype: file
|
||||
contains: []
|
||||
package:
|
||||
wireguard:
|
||||
installed: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
wireguard-tools:
|
||||
installed: true
|
||||
versions:
|
||||
- 1.0.20210223-1
|
||||
service:
|
||||
isc-dhcp-server:
|
||||
enabled: true
|
||||
running: true
|
||||
wg-quick@wg0:
|
||||
enabled: true
|
||||
running: true
|
||||
command:
|
||||
ping -c4 10.0.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.102/24
|
||||
mtu: 1500
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 172.16.128.254/24
|
||||
mtu: 1500
|
||||
enp0s9:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.0.52/24
|
||||
mtu: 1500
|
||||
wg0:
|
||||
exists: true
|
||||
addrs:
|
||||
- 10.0.0.2/32
|
||||
mtu: 1420
|
@ -1,67 +0,0 @@
|
||||
package:
|
||||
ferm:
|
||||
installed: true
|
||||
ipsec:
|
||||
installed: true
|
||||
port:
|
||||
tcp:53:
|
||||
listening: true
|
||||
udp:67:
|
||||
listening: true
|
||||
udp:68:
|
||||
listening: true
|
||||
service:
|
||||
dnsmasq:
|
||||
enabled: true
|
||||
running: true
|
||||
ferm:
|
||||
enabled: true
|
||||
running: true
|
||||
ssh:
|
||||
enabled: true
|
||||
running: true
|
||||
command:
|
||||
sysctl net.ipv4.ip_forward:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- net.ipv4.ip_forward = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 192.168.0.51:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 192.168.1.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 192.168.200.254:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
sysctl ping -c 4 172.16.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 4 received = 1
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
process:
|
||||
dnsmasq:
|
||||
running: true
|
||||
squid3:
|
||||
running: true
|
||||
interface:
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 172.16.128.254/24
|
||||
enp0s9:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.0.52/24
|
@ -1,39 +1,19 @@
|
||||
command:
|
||||
ip r:
|
||||
ip route |grep default:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- default via 172.16.128.254 dev enp0s8
|
||||
- 172.16.128.0/24
|
||||
- 192.168.99.0/24
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
ping -c 2 172.16.128.254:
|
||||
ping -c4 172.16.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
ping -c 2 192.168.1.2:
|
||||
ping -c4 172.16.128.254:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
ping -c 2 192.168.1.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
ping -c 2 192.168.200.254:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
ping -c 2 172.16.0.1:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
|
41
goss/s-backup.yaml
Normal file
41
goss/s-backup.yaml
Normal file
@ -0,0 +1,41 @@
|
||||
package:
|
||||
bind9:
|
||||
installed: true
|
||||
cifs-utils:
|
||||
installed: true
|
||||
rsync:
|
||||
installed: true
|
||||
smbclient:
|
||||
installed: true
|
||||
service:
|
||||
bind9:
|
||||
enabled: true
|
||||
running: true
|
||||
rsync:
|
||||
enabled: true
|
||||
running: false
|
||||
command:
|
||||
ping -c4 ns.gsb.lan:
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- 0% packet loss
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
#check si partage windows accesible
|
||||
smbclient -L //s-win --user=uBackup%Azerty1+ | grep 'public':
|
||||
exit-status: 0
|
||||
stdout:
|
||||
- public
|
||||
stderr: []
|
||||
timeout: 10000
|
||||
interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.4/24
|
||||
mtu: 1500
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 172.16.0.4/24
|
||||
mtu: 1500
|
@ -49,7 +49,7 @@ interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.104/24
|
||||
- 192.168.99.8/24
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
|
@ -9,16 +9,23 @@ apt update && apt upgrade
|
||||
apt install -y apache2 git
|
||||
STOREREP="/var/www/html/gsbstore"
|
||||
|
||||
GLPIREL=10.0.5
|
||||
GLPIREL=10.0.6
|
||||
str="wget -nc https://github.com/glpi-project/glpi/releases/download/${GLPIREL}/glpi-${GLPIREL}.tgz"
|
||||
|
||||
FIREL=10.0.3+1.0
|
||||
str2="https://github.com/fusioninventory/fusioninventory-for-glpi/releases/download/glpi${FIREL}/fusioninventory-${FIREL}.tar.bz2"
|
||||
|
||||
FIAGREL=2.6
|
||||
str31="wget -nc https://github.com/fusioninventory/fusioninventory-agent/releases/download/${FIAGREL}/fusioninventory-agent_windows-x64_${FIAGREL}.exe"
|
||||
#Fusion Inventory
|
||||
|
||||
#FIREL=10.0.3+1.0
|
||||
#str2="https://github.com/fusioninventory/fusioninventory-for-glpi/releases/download/glpi${FIREL}/fusioninventory-${FIREL}.tar.bz2"
|
||||
|
||||
|
||||
#GLPI Agent
|
||||
|
||||
GLPIAGVER=1.4
|
||||
str31="wget -nc https://github.com/glpi-project/glpi-agent/releases/download/${GLPIAGVER}/GLPI-Agent-${GLPIAGVER}-x64.msi"
|
||||
|
||||
str32="wget -nc https://github.com/glpi-project/glpi-agent/releases/download/${GLPIAGVER}/GLPI-Agent-${GLPIAGVER}-x86.msi"
|
||||
|
||||
str32="wget -nc https://github.com/fusioninventory/fusioninventory-agent/releases/download/${FIAGREL}/fusioninventory-agent_windows-x86_${FIAGREL}.exe"
|
||||
|
||||
FOGREL=1.5.9
|
||||
str4="wget -nc https://github.com/FOGProject/fogproject/archive/${FOGREL}.tar.gz -O fogproject-${FOGREL}.tar.gz"
|
||||
|
@ -13,8 +13,9 @@
|
||||
- goss
|
||||
# - snmp-agent
|
||||
# - firewall-vpn-r
|
||||
- post
|
||||
- wireguard-r
|
||||
# - x509-r
|
||||
- fw-ferm
|
||||
- ssh-cli
|
||||
- syslog-cli
|
||||
- post
|
||||
|
||||
|
@ -18,6 +18,7 @@
|
||||
# - firewall-vpn-l
|
||||
- wireguard-l
|
||||
# - x509-l
|
||||
- fw-ferm
|
||||
- ssh-cli
|
||||
- syslog-cli
|
||||
- post
|
||||
|
@ -10,18 +10,23 @@
|
||||
192.168.99.3 s-appli.gsb.adm
|
||||
192.168.99.4 s-backup.gsb.adm
|
||||
192.168.99.5 s-puppet.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.7 s-nxc.gsb.adm
|
||||
192.168.99.8 s-mon.gsb.adm
|
||||
192.168.99.9 s-itil.gsb.adm
|
||||
192.168.99.10 s-sspec.gsb.adm
|
||||
192.168.99.11 s-web-ext.gsb.adm
|
||||
192.168.99.10 s-lb.gsb.adm
|
||||
192.168.99.11 s-elk.gsb.adm
|
||||
192.168.99.10 s-dns.gsb.adm
|
||||
192.168.99.12 r-int.gsb.adm
|
||||
192.168.99.13 r-ext.gsb.adm
|
||||
192.168.99.14 s-nas.gsb.adm
|
||||
192.168.99.15 s-san.gsb.adm
|
||||
192.168.99.16 s-fog.gsb.adm
|
||||
192.168.99.50 s-lb-bd.gsb.adm
|
||||
192.168.99.101 s-lb-web1.gsb.adm
|
||||
192.168.99.102 s-lb-web2.gsb.adm
|
||||
192.168.99.103 s-lb-web3.gsb.adm
|
||||
192.168.99.112 r-vp1.gsb.adm
|
||||
|
||||
192.168.99.8 syslog.gsb.adm
|
||||
|
||||
|
@ -11,16 +11,21 @@
|
||||
192.168.99.3 s-appli.gsb.adm
|
||||
192.168.99.4 s-backup.gsb.adm
|
||||
192.168.99.5 s-puppet.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.6 s-win.gsb.adm
|
||||
192.168.99.7 s-nxc.gsb.adm
|
||||
192.168.99.8 s-mon.gsb.adm
|
||||
192.168.99.9 s-itil.gsb.adm
|
||||
192.168.99.10 s-sspec.gsb.adm
|
||||
192.168.99.11 s-web-ext.gsb.adm
|
||||
192.168.99.10 s-lb.gsb.adm
|
||||
192.168.99.11 s-elk.gsb.adm
|
||||
192.168.99.10 s-dns.gsb.adm
|
||||
192.168.99.12 r-int.gsb.adm
|
||||
192.168.99.13 r-ext.gsb.adm
|
||||
192.168.99.14 s-nas.gsb.adm
|
||||
192.168.99.50 s-lb-bd.gsb.adm
|
||||
192.168.99.101 s-lb-web1.gsb.adm
|
||||
192.168.99.102 s-lb-web2.gsb.adm
|
||||
192.168.99.103 s-lb-web3.gsb.adm
|
||||
192.168.99.112 r-vp1.gsb.adm
|
||||
|
||||
192.168.99.8 syslog.gsb.adm
|
||||
|
||||
|
@ -109,12 +109,12 @@ log-facility local7;
|
||||
#DHCP pour le réseau wifi
|
||||
#subnet 172.16.65.0 netmask 255.255.255.0 {
|
||||
# range 172.16.65.1 172.16.65.100;
|
||||
# option domain-name-servers ns1.internal.example.org;
|
||||
# option domain-name "internal.example.org";
|
||||
# option routers 10.5.5.1;
|
||||
# option broadcast-address 10.5.5.31;
|
||||
# default-lease-time 600;
|
||||
# max-lease-time 7200;
|
||||
# option domain-name-servers ns1.internal.example.org;
|
||||
# option domain-name "internal.example.org";
|
||||
# option routers 10.5.5.1;
|
||||
# option broadcast-address 10.5.5.31;
|
||||
# default-lease-time 600;
|
||||
# max-lease-time 7200;
|
||||
#}
|
||||
|
||||
#DHCP pour le réseau USER
|
||||
|
@ -10,5 +10,3 @@
|
||||
copy: src=dhcpd.conf dest=/etc/dhcp/
|
||||
notify:
|
||||
- restart isc-dhcp-server
|
||||
|
||||
|
||||
|
@ -5,7 +5,7 @@
|
||||
;
|
||||
$TTL 604800
|
||||
@ IN SOA s-infra.gsb.lan. root.s-infra.gsb.lan. (
|
||||
2022041200 ; Serial
|
||||
2023012500 ; Serial
|
||||
7200 ; Refresh
|
||||
86400 ; Retry
|
||||
8419200 ; Expire
|
||||
@ -25,7 +25,7 @@ s-nxc IN A 172.16.0.7
|
||||
s-docker IN A 172.16.0.7
|
||||
s-mon IN A 172.16.0.8
|
||||
s-itil IN A 172.16.0.9
|
||||
s-elk IN A 172.16.0.10
|
||||
s-elk IN A 172.16.0.11
|
||||
s-gestsup IN A 172.16.0.17
|
||||
r-int IN A 172.16.0.254
|
||||
r-int-lnk IN A 192.168.200.254
|
||||
|
@ -5,7 +5,7 @@
|
||||
;
|
||||
$TTL 604800
|
||||
@ IN SOA s-infra.gsb.lan. root.s-infra.gsb.lan. (
|
||||
2022041200 ; Serial
|
||||
2023012500 ; Serial
|
||||
7200 ; Refresh
|
||||
86400 ; Retry
|
||||
8419200 ; Expire
|
||||
@ -20,12 +20,12 @@ $TTL 604800
|
||||
6.0 IN PTR s-win.gsb.lan.
|
||||
7.0 IN PTR s-nxc.gsb.lan.
|
||||
8.0 IN PTR s-mon.gsb.lan.
|
||||
9.0 IN PTR s-itil.gsb.lan.
|
||||
9.0 IN PTR s-itil.gsb.lan.
|
||||
101.1 IN PTR s-web1
|
||||
101.2 IN PTR s-web2
|
||||
100.10 IN PTR s-lb
|
||||
100.10 IN PTR s-lb.gsb.lan
|
||||
10.0 IN PTR s-elk.gsb.lan.
|
||||
11.0 IN PTR s-elk.gsb.lan.
|
||||
17.0 IN PTR s-gestsup.lan
|
||||
254.0 IN PTR r-int.gsb.lan.
|
||||
|
||||
|
@ -1,17 +1,15 @@
|
||||
---
|
||||
- name: creation d'un repertoire fog
|
||||
file:
|
||||
path: /root/tools/fog
|
||||
state: directory
|
||||
|
||||
- name: recuperation de l'archive d'installation fog sur git
|
||||
git:
|
||||
repo: https://gitea.lyc-lecastel.fr/gadmin/fog.git
|
||||
dest: /root/tools/fog/
|
||||
clone: yes
|
||||
update: yes
|
||||
force: yes
|
||||
|
||||
#- name: Instructions
|
||||
# tags: msg
|
||||
# debug: msg='{{instructions}}'
|
||||
|
||||
- name: Modification fichier bash (desac UDPCast)
|
||||
ansible.builtin.lineinfile:
|
||||
path: /root/tools/fog/lib/common/functions.sh
|
||||
regexp: '^configureUDPCast\(\).*'
|
||||
line: "configureUDPCast() {\nreturn"
|
||||
backup: yes
|
||||
|
23
roles/fw-ferm/README.md
Normal file
23
roles/fw-ferm/README.md
Normal file
@ -0,0 +1,23 @@
|
||||
[Ferm]:http://ferm.foo-projects.org/
|
||||
|
||||
Modifier l'execution d'iptables [plus d'info ici]:https://wiki.debian.org/iptables
|
||||
```shell
|
||||
update-alternatives --set iptables /usr/sbin/iptables-legacy
|
||||
```
|
||||
|
||||
Pour tester utiliser [Nmap]:https://nmap.org/man/fr/man-briefoptions.html
|
||||
### r-vp1
|
||||
```shell
|
||||
sudo nmap -p51820 192.168.0.51
|
||||
```
|
||||
### r-vp2
|
||||
```shell
|
||||
sudo nmap -p51820 192.168.0.52
|
||||
```
|
||||
### Sortie :
|
||||
```
|
||||
`PORT STATE SERVICE
|
||||
51820/tcp filtered unknown`
|
||||
```
|
||||
|
||||
Faire des ping!
|
63
roles/fw-ferm/files/ferm.conf.r-vp1
Normal file
63
roles/fw-ferm/files/ferm.conf.r-vp1
Normal file
@ -0,0 +1,63 @@
|
||||
# -*- shell-script -*-
|
||||
#
|
||||
# Ferm script r-vp1
|
||||
|
||||
@def $DEV_PRIVATE = enp0s8;
|
||||
@def $DEV_WORLD = enp0s9;
|
||||
|
||||
@def $NET_PRIVATE = 172.16.0.0/24;
|
||||
|
||||
table filter {
|
||||
chain (INPUT OUTPUT){
|
||||
# allow VPN
|
||||
proto udp dport 51820 ACCEPT;
|
||||
}
|
||||
chain INPUT {
|
||||
policy DROP;
|
||||
|
||||
# connection tracking
|
||||
mod state state INVALID DROP;
|
||||
mod state state (ESTABLISHED RELATED) ACCEPT;
|
||||
|
||||
# allow local connections
|
||||
interface lo ACCEPT;
|
||||
|
||||
# respond to ping
|
||||
proto icmp icmp-type echo-request ACCEPT;
|
||||
|
||||
|
||||
# allow SSH connections from the private network and from some
|
||||
# well-known internet hosts
|
||||
saddr ($NET_PRIVATE 81.209.165.42) proto tcp dport ssh ACCEPT;
|
||||
|
||||
# we provide DNS and SMTP services for the internal net
|
||||
interface $DEV_PRIVATE saddr $NET_PRIVATE {
|
||||
proto (udp tcp) dport domain ACCEPT;
|
||||
proto udp dport bootps ACCEPT;
|
||||
}
|
||||
|
||||
# interface réseau
|
||||
interface $DEV_WORLD {
|
||||
|
||||
}
|
||||
|
||||
# the rest is dropped by the above policy
|
||||
}#FIN INPUT
|
||||
|
||||
# outgoing connections are not limited
|
||||
chain OUTPUT policy ACCEPT;
|
||||
|
||||
chain FORWARD {
|
||||
policy ACCEPT;
|
||||
|
||||
# connection tracking
|
||||
mod state state INVALID DROP;
|
||||
mod state state (ESTABLISHED RELATED) ACCEPT;
|
||||
|
||||
# connections from the internal net to the internet or to other
|
||||
# internal nets are allowed
|
||||
interface $DEV_PRIVATE ACCEPT;
|
||||
|
||||
# the rest is dropped by the above policy
|
||||
}
|
||||
}
|
62
roles/fw-ferm/files/ferm.conf.r-vp2
Normal file
62
roles/fw-ferm/files/ferm.conf.r-vp2
Normal file
@ -0,0 +1,62 @@
|
||||
# -*- shell-script -*-
|
||||
#
|
||||
# Ferm script r-vp2
|
||||
|
||||
@def $DEV_PRIVATE = enp0s9;
|
||||
@def $DEV_WORLD = enp0s8;
|
||||
|
||||
@def $NET_PRIVATE = 172.16.0.0/24;
|
||||
|
||||
table filter {
|
||||
chain (INPUT OUTPUT){
|
||||
# allow VPN
|
||||
proto udp dport 51820 ACCEPT;
|
||||
}
|
||||
chain INPUT {
|
||||
policy DROP;
|
||||
|
||||
# connection tracking
|
||||
mod state state INVALID DROP;
|
||||
mod state state (ESTABLISHED RELATED) ACCEPT;
|
||||
|
||||
# allow local connections
|
||||
interface lo ACCEPT;
|
||||
|
||||
# respond to ping
|
||||
proto icmp icmp-type echo-request ACCEPT;
|
||||
|
||||
# allow SSH connections from the private network and from some
|
||||
# well-known internet hosts
|
||||
saddr ($NET_PRIVATE 81.209.165.42) proto tcp dport ssh ACCEPT;
|
||||
|
||||
# we provide DNS and SMTP services for the internal net
|
||||
interface $DEV_PRIVATE saddr $NET_PRIVATE {
|
||||
proto (udp tcp) dport domain ACCEPT;
|
||||
proto udp dport bootps ACCEPT;
|
||||
}
|
||||
|
||||
# interface réseau
|
||||
interface $DEV_WORLD {
|
||||
|
||||
}
|
||||
|
||||
# the rest is dropped by the above policy
|
||||
}#FIN INPUT
|
||||
|
||||
# outgoing connections are not limited
|
||||
chain OUTPUT policy ACCEPT;
|
||||
|
||||
chain FORWARD {
|
||||
policy ACCEPT;
|
||||
|
||||
# connection tracking
|
||||
mod state state INVALID DROP;
|
||||
mod state state (ESTABLISHED RELATED) ACCEPT;
|
||||
|
||||
# connections from the internal net to the internet or to other
|
||||
# internal nets are allowed
|
||||
interface $DEV_PRIVATE ACCEPT;
|
||||
|
||||
# the rest is dropped by the above policy
|
||||
}
|
||||
}
|
15
roles/fw-ferm/tasks/main.yml
Normal file
15
roles/fw-ferm/tasks/main.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
- name: installation de ferm
|
||||
apt:
|
||||
name: ferm
|
||||
state: present
|
||||
|
||||
- name: copie du ferm.conf
|
||||
copy:
|
||||
src: ferm.conf.{{ ansible_hostname }}
|
||||
dest: /etc/ferm/ferm.conf
|
||||
|
||||
- name: redemarage service ferm
|
||||
ansible.builtin.service:
|
||||
name: ferm.service
|
||||
state: restarted
|
@ -14,22 +14,6 @@ mot de passe : glpi
|
||||
Selectionner la base glpi
|
||||
Ne pas envoyer de statistique d'usage
|
||||
|
||||
## Fusion Inventory :
|
||||
|
||||
Installer le plugin dans Configuration > Plugins
|
||||
Activer le plugin
|
||||
Pour que la remonter de l'agent se fasse, il faut ajouter une crontab (crontab -e) sur s-itil : * * * * * /usr/bin/php7.4 /var/www/glpi/front/cron.php &>/dev/null
|
||||
Puis éxécuter le tasksheduler dans Configuration > Actions automatiques > taskscheduler
|
||||
|
||||
Pour l'agent Windows, récuperer l'agent sur http://s-itil/ficlients
|
||||
Il faut faire une installation à parti de 0
|
||||
Selectionner comme type d'installation complète
|
||||
Dans le mode serveur mettre l'url : http://s-itil/plugins/fusioninventory et cocher la case installation rapide
|
||||
|
||||
Pour l'agent Debian il faut installer le paquet fusioninventory-agent
|
||||
Ajouter la ligne server = http://s-itil/plugins/fusioninventory dans le fichier /etc/fusioninventory/agent.cfg
|
||||
Redemarrer le service fusioninventory-agent puis faite un reload
|
||||
Exécuter la commande pkill -USR1 -f -P 1 fusioninventory-agent
|
||||
|
||||
## Postfix :
|
||||
|
6
roles/glpi/defaults/main.yml
Normal file
6
roles/glpi/defaults/main.yml
Normal file
@ -0,0 +1,6 @@
|
||||
depl_url: "http://s-adm.gsb.adm/gsbstore"
|
||||
#depl_glpi: "glpi-9.5.6.tgz"
|
||||
depl_glpi: "glpi-10.0.6.tgz"
|
||||
#depl_fusioninventory: "fusioninventory-9.5+3.0.tar.bz2"
|
||||
depl_glpi_agentx64: "GLPI-Agent-1.4-x64.msi"
|
||||
depl_glpi_agentx86: "GLPI-Agent-1.4-x86.msi"
|
@ -105,12 +105,12 @@
|
||||
# - name: copy .my.cnf file with root password credentials
|
||||
# copy: src=.my.cnf dest=/root/tools/ansible/.my.cnf owner=root mode=0600
|
||||
|
||||
- name: Installation de Fusioninventory pour Linux
|
||||
unarchive:
|
||||
src: "{{ depl_url }}/{{ depl_fusioninventory }}"
|
||||
#src: http://depl/gsbstore/fusioninventory-{{ fd_version }}.tar.bz2
|
||||
dest: /var/www/html/glpi/plugins
|
||||
remote_src: yes
|
||||
# - name: Installation de Fusioninventory pour Linux
|
||||
# unarchive:
|
||||
# src: "{{ depl_url }}/{{ depl_fusioninventory }}"
|
||||
#src: http://depl/gsbstore/fusioninventory-{{ fd_version }}.tar.bz2
|
||||
# dest: /var/www/html/glpi/plugins
|
||||
# remote_src: yes
|
||||
|
||||
- name: Creation de ficlient
|
||||
file:
|
||||
@ -127,23 +127,15 @@
|
||||
group: www-data
|
||||
mode: 0775
|
||||
|
||||
- name: Installation de FusionInventory windows x64
|
||||
- name: Installation de GLPI Agent windows x64
|
||||
get_url:
|
||||
url: "{{ depl_url }}/{{ depl_fusioninventory_agentx64 }}"
|
||||
url: "{{ depl_url }}/{{ depl_glpi_agentx64 }}"
|
||||
dest: "/var/www/html/ficlients"
|
||||
|
||||
- name: Installation de FusionInventory windows x86
|
||||
get_url:
|
||||
url: "{{ depl_url }}/{{ depl_fusioninventory_agentx86 }}"
|
||||
dest: "/var/www/html/ficlients"
|
||||
|
||||
- name: Attribution des permissions sur repertoire /plugins/fusioninventory
|
||||
file:
|
||||
path: /var/www/html/glpi/plugins/fusioninventory
|
||||
owner: www-data
|
||||
group: www-data
|
||||
recurse: yes
|
||||
state: directory
|
||||
# - name: Installation de GLPI Agent windows x86
|
||||
# get_url:
|
||||
# url: "{{ depl_url }}/{{ depl_glpi_agentx86 }}"
|
||||
# dest: "/var/www/html/ficlients"
|
||||
|
||||
- name: Copie du script dbdump
|
||||
copy:
|
@ -1,6 +0,0 @@
|
||||
depl_url: "http://s-adm.gsb.adm/gsbstore"
|
||||
#depl_glpi: "glpi-9.5.6.tgz"
|
||||
depl_glpi: "glpi-10.0.5.tgz"
|
||||
depl_fusioninventory: "fusioninventory-9.5+3.0.tar.bz2"
|
||||
depl_fusioninventory_agentx64: "fusioninventory-agent_windows-x64_2.6.exe"
|
||||
depl_fusioninventory_agentx86: "fusioninventory-agent_windows-x86_2.6.exe"
|
@ -44,7 +44,6 @@ backend fermeweb
|
||||
#option httpchk HEAD / HTTP/1.0
|
||||
server s-lb-web1 192.168.101.1:80 check
|
||||
server s-lb-web2 192.168.101.2:80 check
|
||||
#server s-lb-web3 192.168.101.3:80 check
|
||||
|
||||
|
||||
listen stats
|
||||
|
@ -8,18 +8,18 @@
|
||||
path: /etc/haproxy/haproxy.cfg
|
||||
block: |
|
||||
frontend proxypublic
|
||||
bind 192.168.56.2:80
|
||||
bind 192.168.100.10:80
|
||||
default_backend fermeweb
|
||||
|
||||
backend fermeweb
|
||||
balance roundrobin
|
||||
option httpclose
|
||||
#option httpchk HEAD / HTTP/1.0
|
||||
server web1.test 192.168.56.3:80 check
|
||||
#server web2.test 192.168.56.4:80 check
|
||||
server s-lb-web1 192.168.101.1:80 check
|
||||
server s-lb-web2 192.168.101.2:80 check
|
||||
|
||||
- name: redemarre haproxy
|
||||
service:
|
||||
name: haproxy
|
||||
state: restarted
|
||||
# state: restarted
|
||||
enabled: yes
|
||||
|
@ -10,4 +10,4 @@
|
||||
dest: /etc/fstab
|
||||
regexp: ''
|
||||
insertafter: EOF
|
||||
line: '192.168.102.253:/home/wordpress /var/www/html/wordpress nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0'
|
||||
line: '192.168.102.253:/home/ /var/www/html/wordpress nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0'
|
||||
|
@ -5,6 +5,6 @@ Ce rôle :
|
||||
* installe **nfs-server**
|
||||
* copie le fichier de configuration **exports** pour exporter le répertoire **/home/wordpress**
|
||||
* relance le service **nfs-server**
|
||||
|
||||
* décompresse wordpress
|
||||
### Objectif
|
||||
Le répertoire **/home/wordpress** est exporté par **nfs** sur le réseau **n-dmz-db**
|
||||
|
@ -7,4 +7,4 @@
|
||||
# Example for NFSv4:
|
||||
# /srv/nfs4 gss/krb5i(rw,sync,fsid=0,crossmnt,no_subtree_check)
|
||||
# /srv/nfs4/homes gss/krb5i(rw,sync,no_subtree_check)
|
||||
/home/wordpress 192.168.102.0/255.255.255.0 (rw,no_root_squash,subtree_check)
|
||||
/home/wordpress 192.168.102.0/255.255.255.0(rw,no_root_squash,subtree_check)
|
||||
|
@ -1,18 +1,70 @@
|
||||
---
|
||||
- name: installation des paquets
|
||||
apt:
|
||||
name:
|
||||
- nfs-kernel-server
|
||||
state: latest
|
||||
- name: 00 - cree repertoire wordpress pour export nfs
|
||||
file:
|
||||
path: /home/wordpress
|
||||
state: directory
|
||||
|
||||
- name: copie exports pour partage nfs wordpress
|
||||
copy:
|
||||
src: exports
|
||||
dest: /etc
|
||||
- name: 05 - Install nfs-server
|
||||
apt:
|
||||
name: nfs-server
|
||||
state: present
|
||||
|
||||
- name: redemarrage du service rpcbind requis pour le service nfs
|
||||
shell: service rpcbind restart
|
||||
- name: 10 - creation fichier exports nfs
|
||||
ansible.builtin.blockinfile:
|
||||
path: /etc/exports
|
||||
block: |
|
||||
/home/wordpress 192.168.102.0/255.255.255.0(rw,no_root_squash,subtree_check)
|
||||
|
||||
- name: redemarrage du service nfs-kernel-server
|
||||
shell: service nfs-kernel-server restart
|
||||
- name: 20 - decompresse wordpress
|
||||
unarchive:
|
||||
src: https://fr.wordpress.org/latest-fr_FR.tar.gz
|
||||
dest: /home/
|
||||
remote_src: yes
|
||||
|
||||
- name: 22 - change owner et group pour repertoire wordpress
|
||||
file:
|
||||
path: /home/wordpress
|
||||
state: directory
|
||||
recurse: yes
|
||||
owner: www-data
|
||||
group: www-data
|
||||
|
||||
- name: 30 - genere fichier de config wordpress
|
||||
copy:
|
||||
src: /home/wordpress/wp-config-sample.php
|
||||
dest: /home/wordpress/wp-config.php
|
||||
remote_src: yes
|
||||
|
||||
- name: 35 - ajuste variable dbname dans fichier de config wp-config.php
|
||||
replace:
|
||||
path: /home/wordpress/wp-config.php
|
||||
regexp: "votre_nom_de_bdd"
|
||||
replace: "wordpressdb"
|
||||
backup: yes
|
||||
|
||||
|
||||
- name: 40 ajuste variable dbusername dans fichier de config wp-config.php
|
||||
replace:
|
||||
path: /home/wordpress/wp-config.php
|
||||
regexp: "votre_utilisateur_de_bdd"
|
||||
replace: "wordpressuser"
|
||||
backup: yes
|
||||
|
||||
- name: 45 - ajuste variable mdp dans fichier de config wp-config.php
|
||||
replace:
|
||||
path: /home/wordpress/wp-config.php
|
||||
regexp: "votre_mdp_de_bdd"
|
||||
replace: "wordpresspasswd"
|
||||
backup: yes
|
||||
|
||||
- name: 50 - ajuste hostname fichier wp-config.php
|
||||
replace:
|
||||
path: /home/wordpress/wp-config.php
|
||||
regexp: "localhost"
|
||||
replace: "192.168.102.254"
|
||||
backup: yes
|
||||
|
||||
- name: 55 - relance nfs
|
||||
service:
|
||||
name: nfs-server
|
||||
state: restarted
|
||||
enabled: yes
|
||||
|
@ -1,102 +0,0 @@
|
||||
<?php
|
||||
/**
|
||||
* La configuration de base de votre installation WordPress.
|
||||
*
|
||||
* Ce fichier est utilisé par le script de création de wp-config.php pendant
|
||||
* le processus d’installation. Vous n’avez pas à utiliser le site web, vous
|
||||
* pouvez simplement renommer ce fichier en « wp-config.php » et remplir les
|
||||
* valeurs.
|
||||
*
|
||||
* Ce fichier contient les réglages de configuration suivants :
|
||||
*
|
||||
* Réglages MySQL
|
||||
* Préfixe de table
|
||||
* Clés secrètes
|
||||
* Langue utilisée
|
||||
* ABSPATH
|
||||
*
|
||||
* @link https://fr.wordpress.org/support/article/editing-wp-config-php/.
|
||||
*
|
||||
* @package WordPress
|
||||
*/
|
||||
|
||||
// ** Réglages MySQL - Votre hébergeur doit vous fournir ces informations. ** //
|
||||
/** Nom de la base de données de WordPress. */
|
||||
define( 'DB_NAME', 'wordpress' );
|
||||
|
||||
/** Utilisateur de la base de données MySQL. */
|
||||
define( 'DB_USER', 'wp' );
|
||||
|
||||
/** Mot de passe de la base de données MySQL. */
|
||||
define( 'DB_PASSWORD', 'wp' );
|
||||
|
||||
/** Adresse de l’hébergement MySQL. */
|
||||
define( 'DB_HOST', '192.168.102.254' );
|
||||
|
||||
/** Jeu de caractères à utiliser par la base de données lors de la création des tables. */
|
||||
define( 'DB_CHARSET', 'utf8' );
|
||||
|
||||
/**
|
||||
* Type de collation de la base de données.
|
||||
* N’y touchez que si vous savez ce que vous faites.
|
||||
*/
|
||||
define( 'DB_COLLATE', '' );
|
||||
|
||||
/**#@+
|
||||
* Clés uniques d’authentification et salage.
|
||||
*
|
||||
* Remplacez les valeurs par défaut par des phrases uniques !
|
||||
* Vous pouvez générer des phrases aléatoires en utilisant
|
||||
* {@link https://api.wordpress.org/secret-key/1.1/salt/ le service de clés secrètes de WordPress.org}.
|
||||
* Vous pouvez modifier ces phrases à n’importe quel moment, afin d’invalider tous les cookies existants.
|
||||
* Cela forcera également tous les utilisateurs à se reconnecter.
|
||||
*
|
||||
* @since 2.6.0
|
||||
*/
|
||||
define( 'AUTH_KEY', 'mettez une phrase unique ici' );
|
||||
define( 'SECURE_AUTH_KEY', 'mettez une phrase unique ici' );
|
||||
define( 'LOGGED_IN_KEY', 'mettez une phrase unique ici' );
|
||||
define( 'NONCE_KEY', 'mettez une phrase unique ici' );
|
||||
define( 'AUTH_SALT', 'mettez une phrase unique ici' );
|
||||
define( 'SECURE_AUTH_SALT', 'mettez une phrase unique ici' );
|
||||
define( 'LOGGED_IN_SALT', 'mettez une phrase unique ici' );
|
||||
define( 'NONCE_SALT', 'mettez une phrase unique ici' );
|
||||
/**#@-*/
|
||||
|
||||
/**
|
||||
* Préfixe de base de données pour les tables de WordPress.
|
||||
*
|
||||
* Vous pouvez installer plusieurs WordPress sur une seule base de données
|
||||
* si vous leur donnez chacune un préfixe unique.
|
||||
* N’utilisez que des chiffres, des lettres non-accentuées, et des caractères soulignés !
|
||||
*/
|
||||
$table_prefix = 'wp_';
|
||||
|
||||
/**
|
||||
* Pour les développeurs : le mode déboguage de WordPress.
|
||||
*
|
||||
* En passant la valeur suivante à "true", vous activez l’affichage des
|
||||
* notifications d’erreurs pendant vos essais.
|
||||
* Il est fortement recommandé que les développeurs d’extensions et
|
||||
* de thèmes se servent de WP_DEBUG dans leur environnement de
|
||||
* développement.
|
||||
*
|
||||
* Pour plus d’information sur les autres constantes qui peuvent être utilisées
|
||||
* pour le déboguage, rendez-vous sur le Codex.
|
||||
*
|
||||
* @link https://fr.wordpress.org/support/article/debugging-in-wordpress/
|
||||
*/
|
||||
define( 'WP_DEBUG', false );
|
||||
|
||||
/* C’est tout, ne touchez pas à ce qui suit ! Bonne publication. */
|
||||
|
||||
/** Chemin absolu vers le dossier de WordPress. */
|
||||
if ( ! defined( 'ABSPATH' ) )
|
||||
define( 'ABSPATH', dirname( __FILE__ ) . '/' );
|
||||
|
||||
/** Réglage des variables de WordPress et de ses fichiers inclus. */
|
||||
require_once( ABSPATH . 'wp-settings.php' );
|
||||
define('DB_NAME', 'wordpress');
|
||||
define('DB_HOST', '192.168.102.254');
|
||||
define('DB_USER', 'wp');
|
||||
define('DB_PASSWORD', 'wp');
|
@ -1,38 +1,28 @@
|
||||
---
|
||||
- name: creation repertoir
|
||||
file:
|
||||
path: /home/
|
||||
state: directory
|
||||
- name: download and extract wordpress
|
||||
unarchive:
|
||||
src: "{{ depl_url }}/{{ depl_wordpress }}"
|
||||
dest: /home/
|
||||
remote_src: yes
|
||||
owner: www-data
|
||||
group: www-data
|
||||
---
|
||||
- name: installation des paquets web
|
||||
apt:
|
||||
name:
|
||||
- apache2
|
||||
- php
|
||||
- php-mbstring
|
||||
- php-mysql
|
||||
- mariadb-client
|
||||
state: present
|
||||
|
||||
- name: Copy sample config file
|
||||
command: mv /home/wordpress/wp-config-sample.php /home/wordpress/wp-config.php creates=/home/wordpress/wp-config.php
|
||||
- name: install nfs-common
|
||||
apt:
|
||||
name: nfs-common
|
||||
state: present
|
||||
|
||||
- name: Changement du fichier de conf
|
||||
copy:
|
||||
src: wp-config.php
|
||||
dest: /home/wordpress/wp-config.php
|
||||
- name: montage nfs pour word press
|
||||
blockinfile:
|
||||
path: /etc/fstab
|
||||
block: |
|
||||
192.168.102.253:/home/wordpress /var/www/html nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0
|
||||
|
||||
- name: Attributions des permissions
|
||||
file:
|
||||
path: /home/wordpress
|
||||
recurse: yes
|
||||
owner: 33
|
||||
group: 33
|
||||
|
||||
# - name: Fix permissions
|
||||
# shell: chown -R www-data /var/www/wordpress/*
|
||||
#
|
||||
# - name: Update default Apache site
|
||||
# lineinfile:
|
||||
# dest=/etc/apache2/sites-enabled/000-default.conf
|
||||
# regexp="(.)+DocumentRoot /var/www/html"
|
||||
# line="DocumentRoot /var/www/wordpress"
|
||||
# notify:
|
||||
# - restart apache2
|
||||
#- name: monte export wordpress
|
||||
# ansible.posix.mount:
|
||||
# path: /var/www/html
|
||||
# state: mounted
|
||||
# fstype: nfs
|
||||
# src: 192.168.102.253:/exports/wordpress
|
||||
|
@ -2,31 +2,36 @@
|
||||
|
||||
Nextcloud et Traefik fonctionnent grâce à docker. Pour pouvoir faire fonctionner ce playbook, docker doit être installé.
|
||||
|
||||
## Premièrement
|
||||
## 1.
|
||||
|
||||
Le playbook crée le dossier **nxc** à la racine de root. Les fichier docker-compose "nextcloud.yml" et "traefik.yml" y seront copiés depuis le répertoire "files" du playbook.
|
||||
Enfin, dans le répertoire nxc, seront créés les répertoires **certs** et **config**.
|
||||
Le playbook crée le dossier **nxc** à la racine de root.
|
||||
|
||||
## Deuxièmement
|
||||
Les fichiers "nextcloud.yml" et "traefik.yml" y seront copiés depuis le répertoire "files" du playbook.
|
||||
|
||||
Le playbook va copier les fichiers placés dans "files" et les placer dans les bons répertoires.
|
||||
Enfin, dans le répertoire nxc, sont créés les répertoires **certs** et **config**.
|
||||
|
||||
## Troisièmement
|
||||
## 2. Copie des fichiers
|
||||
|
||||
Le playbook crée un certificat **x509** grâce à **mkcert**, il s'agit d'une solution permettant de créer des certificats auto-signés. Pour celai, il télécharge **mkcert** sur **s-adm** (utiliser le script **getall**).
|
||||
Le playbook copie les fichiers placés dans "files" et les placer dans les bons répertoires.
|
||||
|
||||
## 3. Génération du certificat
|
||||
|
||||
Le playbook crée un certificat **x509** grâce à **mkcert**, il s'agit d'une solution permettant de créer des certificats auto-signés. Pour cela, il télécharge **mkcert** sur **s-adm** (utiliser le script **getall**).
|
||||
|
||||
**mkcert** est placé dans : /usr/local/bin/
|
||||
|
||||
Pour créer le certificat, le playbook executer les commandes (lancé depuis nxc/) :
|
||||
Pour créer le certificat, le playbook exécute les commandes (lancé depuis nxc/) :
|
||||
```
|
||||
/usr/local/bin/mkcert -install # Installe mkcert
|
||||
/usr/local/bin/mkcert -key-file key.pem -cert-file cert.pem "hôte.domaine.local" "*.domaine.local" #Crée le certificat le DNS spécifié
|
||||
```
|
||||
## Quatrièmement
|
||||
## 4. Lancement
|
||||
|
||||
Le playbook va lancer les fichiers "docker-compose" à savoir : nextcloud.yml et traefik.yml.
|
||||
Cela va installer les solutions automatiquement. Nextcloud est alors fonctionnel avec le proxy inverse **traefik** assurant la redirection vers HTTPS.
|
||||
Le playbook lance les fichiers "docker-compose" à savoir : nextcloud.yml et traefik.yml qui démarrent les deux piles **docker**.
|
||||
|
||||
Nextcloud est alors fonctionnel avec le proxy inverse **traefik** assurant la redirection vers HTTPS.
|
||||
|
||||
|
||||
ATTENTION : Après avoir relancé la VM, executez le script "nxc-start.sh" afin d'installer les piles applicatives.
|
||||
ATTENTION : Après avoir relancé la VM, executez le script "nxc-start.sh" afin d'installer les piles applicatives.
|
||||
|
||||
Une fois le script terminé, le site est disponible ici : https://s-nxc.gsb.lan
|
||||
|
@ -8,13 +8,13 @@ iface lo inet loopback
|
||||
# cote N-adm
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.99.10
|
||||
address 192.168.99.11
|
||||
netmask 255.255.255.0
|
||||
gateway 192.168.99.99
|
||||
|
||||
# cote N-infra
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 172.16.0.10
|
||||
address 172.16.0.11
|
||||
netmask 255.255.255.0
|
||||
post-up route add -net 172.16.64.0/24 gw 172.16.0.254
|
||||
|
@ -6,6 +6,13 @@ s-backup permet de récupérer les dossiers et fichiers présent dans le répert
|
||||
# Lancement du script backup.sh
|
||||
|
||||
Après la fin de l'installation de s-backup et la fin de la configuration de s-win vous pouvez
|
||||
lancer le fichier backup.sh pour récuperer l'intégraliter du fichier partagé gsb.lan de s-win
|
||||
lancer le fichier backupsmb.sh pour récuperer l'intégraliter du fichier partagé gsb.lan de s-win
|
||||
sur la machine s-backup.
|
||||
|
||||
# Crontab
|
||||
|
||||
Une crontab a été ajoutée mais désactivée par défaut ( backupsmb.sh executée tout les jours à 5h00)
|
||||
|
||||
# Pistes
|
||||
|
||||
- Traps à consolider
|
||||
|
@ -1,27 +0,0 @@
|
||||
#!/bin/bash
|
||||
BDIR=/home/backup
|
||||
SWIN=/tmp/s-win
|
||||
|
||||
[ -d "${BDIR}" ] || mkdir "${BDIR}"
|
||||
[ -d "${BDIR}" ] || mkdir "${BDIR}/s-win"
|
||||
[ -d "${SWIN}" ] || mkdir "${SWIN}"
|
||||
|
||||
mount -t cifs -o ro,vers=3.0,username=u-backup,password=Azerty1+ //s-win/commun "${SWIN}"
|
||||
if [ $? != 0 ] ; then
|
||||
echo "$0 : erreur montage ${SWIN}"
|
||||
exit 1
|
||||
fi
|
||||
rsync -av "${SWIN}/" "${BDIR}/s-win/commun"
|
||||
umount "${SWIN}"
|
||||
|
||||
|
||||
mount -t cifs -o ro,vers=3.0,username=u-backup,password=Azerty1+ //s-win/public "${SWIN}"
|
||||
if [ $? != 0 ] ; then
|
||||
echo "$0 : erreur montage"
|
||||
exit 2
|
||||
fi
|
||||
rsync -av "${SWIN}/" "${BDIR}/s-win/public"
|
||||
umount "${SWIN}"
|
||||
|
||||
exit 0
|
||||
|
51
roles/smb-backup/files/backupsmb.sh
Executable file
51
roles/smb-backup/files/backupsmb.sh
Executable file
@ -0,0 +1,51 @@
|
||||
#!/bin/bash
|
||||
|
||||
BDIR=/home/backup
|
||||
SWIN=/tmp/s-win
|
||||
LOCK=/tmp/s-backup.lock
|
||||
|
||||
#Fonction cleanup pour sortir propre dans tout les cas
|
||||
cleanup()
|
||||
{
|
||||
rm "${LOCK}"
|
||||
umount "${SWIN}"
|
||||
echo "nettoyage effectue, sortie tout propre ..."
|
||||
exit 3
|
||||
}
|
||||
|
||||
#check si pas deja en cours d execution > sortie si fichier de lock existe
|
||||
if [ -e "${LOCK}" ] ; then
|
||||
echo "$0 : Verrouillage, deja en cours d execution"
|
||||
trap cleanup 1 2 3 6
|
||||
fi
|
||||
#prepartion des dossiers qui vont accueillir les donnees à sauvegarder
|
||||
[ -d "${BDIR}" ] || mkdir "${BDIR}"
|
||||
[ -d "${BDIR}/s-win" ] || mkdir "${BDIR}/s-win"
|
||||
[ -d "${SWIN}" ] || mkdir "${SWIN}"
|
||||
|
||||
#etablissement du lock
|
||||
touch "${LOCK}"
|
||||
|
||||
mount -t cifs -o ro,vers=3.0,username=uBackup,password=Azerty1+ //s-win/commun "${SWIN}"
|
||||
if [ $? != 0 ] ; then
|
||||
echo "$0 : erreur montage ${SWIN}"
|
||||
rm "${LOCK}"
|
||||
trap cleanup 1 2 3 6
|
||||
fi
|
||||
rsync -av "${SWIN}/" "${BDIR}/s-win/commun"
|
||||
umount "${SWIN}"
|
||||
|
||||
|
||||
mount -t cifs -o ro,vers=3.0,username=uBackup,password=Azerty1+ //s-win/public "${SWIN}"
|
||||
if [ $? != 0 ] ; then
|
||||
echo "$0 : erreur montage ${SWIN}"
|
||||
trap cleanup 1 2 3 6
|
||||
fi
|
||||
rsync -av "${SWIN}/" "${BDIR}/s-win/public"
|
||||
umount "${SWIN}"
|
||||
|
||||
#libere le verrou
|
||||
rm "${LOCK}"
|
||||
|
||||
exit 0
|
||||
|
@ -2,7 +2,22 @@
|
||||
apt:
|
||||
name:
|
||||
- rsync
|
||||
- smbclient
|
||||
- smbclient
|
||||
- cifs-utils
|
||||
state: present
|
||||
|
||||
- name: copie script backupsmb dans /usr/local/bin
|
||||
copy:
|
||||
src: backupsmb.sh
|
||||
dest: /usr/local/bin
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0755'
|
||||
|
||||
- name: crontab backupsmb ( commentee par defaut )
|
||||
cron:
|
||||
name: backupsmb
|
||||
disabled: true
|
||||
minute: "0"
|
||||
hour: "5"
|
||||
job: "/usr/local/bin/backupsmb.sh"
|
||||
|
5
roles/wireguard-l/README.md
Normal file
5
roles/wireguard-l/README.md
Normal file
@ -0,0 +1,5 @@
|
||||
#ajout du sleep 5
|
||||
|
||||
éditer "/etc/init.d/isc-dhcp-server"
|
||||
aller au "case \"$1\" in" et rajouter "sleep 5" avant le "if"
|
||||
|
@ -4,18 +4,17 @@
|
||||
name: wireguard
|
||||
state: present
|
||||
|
||||
- name: installation de ferm
|
||||
apt:
|
||||
name: ferm
|
||||
state: present
|
||||
|
||||
- name: installation de wireguard-tools
|
||||
apt:
|
||||
name: wireguard-tools
|
||||
state: present
|
||||
|
||||
#- name: installation de sshpass
|
||||
# apt:
|
||||
# name: sshpass
|
||||
# state: present
|
||||
|
||||
#- name: copie du fichier de configuration depuis r-vp1
|
||||
# command: "sshpass -p 'root' scp -r root@192.168.99.112:/root/confwg/wg0-b.conf /etc/wireguard/"
|
||||
|
||||
- name: renommage du fichier de configuration
|
||||
command: "mv /etc/wireguard/wg0-b.conf /etc/wireguard/wg0.conf"
|
||||
#- name: renommage du fichier de configuration
|
||||
# command: "mv /etc/wireguard/wg0-b.conf /etc/wireguard/wg0.conf"
|
||||
|
@ -1,14 +1,13 @@
|
||||
#Installation de r-vp1 (Wireguard)
|
||||
Procédure d'installation de r-vp1 et de copie du fichier wg0-b.conf.
|
||||
***
|
||||
|
||||
***
|
||||
Ce fichier à pour but de présenter l'installation de r-vp1
|
||||
***
|
||||
Depuis r-vp1 se deplacer dans le repertoire **/tools/ansible/gsb2023** pour executer le playbook:
|
||||
**"ansible-playbook -i localhost, -c local r-vp1.yml"** puis reboot r-vp1.
|
||||
|
||||
Attendre la fin de l'installation. Ensuite faire une copie distante du fichier
|
||||
wg0-b.conf sur r-vp2 **"scp /confwg/wg0-b.conf root@'ip r-vp2':/etc/wireguard/"**.
|
||||
|
||||
Se rendre dans le dossier gsb2022 et éxécuter la commande suivante :
|
||||
_"ansible-playbook -i localhost, -c local r-vp1.yml"_
|
||||
Attendre la fin de l'installation, puis se rendre dans le dossier confwg
|
||||
Faites une copie à distance du fichier wg0-b.conf sur r-vp2 et déplacer le fichier wg0-a.conf localement dans /etc/wireguard
|
||||
Renommer les deux fichiers en wg0.conf
|
||||
Executer _"systemctl enable wg-quick@wg0"_ puis _"systemctl start wg-quick@wg0"_ sur r-vp1 et r-vp2
|
||||
Entrer la commande _"wg"_ si des paquets sont envoyés et reçus votre VPN fonctionne.
|
||||
Lorsque votre infrastructure est prête rendez vous dans gsb2022 et éxécuter le **fichier ping-sagence** afin vérifier le bon fonctionnement.
|
||||
Renommer les fichiers en **wg0.conf**
|
||||
|
||||
Executer **"systemctl enable wg-quick@wg0"** puis **"systemctl start wg-quick@wg0"** sur r-vp1 et r-vp2.
|
||||
Entrer la commande **"wg"** pour voir si l'interface wg0 est correctement montée.
|
||||
|
@ -4,6 +4,11 @@
|
||||
name: wireguard
|
||||
state: present
|
||||
|
||||
- name: installation de ferm
|
||||
apt:
|
||||
name: ferm
|
||||
state: present
|
||||
|
||||
- name: installation de wireguard-tools
|
||||
apt:
|
||||
name: wireguard-tools
|
||||
@ -27,12 +32,11 @@
|
||||
- name: copie du fichier de configuration
|
||||
copy:
|
||||
src: /root/confwg/wg0-a.conf
|
||||
dest: /etc/wireguard
|
||||
dest: /etc/wireguard/wg0.conf
|
||||
|
||||
- name: renommage fichier de configuration
|
||||
command: "mv /etc/wireguard/wg0-a.conf /etc/wireguard/wg0.conf"
|
||||
- name: Restart service httpd, in all cases
|
||||
ansible.builtin.service:
|
||||
name: wg-quick@wg0
|
||||
enabled: yes
|
||||
state: restarted
|
||||
|
||||
- name: demarrage du service wireguard
|
||||
tags: aaaa
|
||||
command: "systemctl enable wg-quick@wg0"
|
||||
command: "systemctl restart wg-quick@wg0"
|
||||
|
@ -4,6 +4,7 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- goss
|
||||
# - proxy3
|
||||
- snmp-agent
|
||||
# - ssh-cli
|
||||
|
@ -3,11 +3,7 @@
|
||||
connection: local
|
||||
|
||||
vars:
|
||||
|
||||
glpi_version: "9.4.5"
|
||||
fd_version: "9.4+1.1"
|
||||
fd_version64: "x64_2.5.2"
|
||||
fd_version86: "x86_2.5.2"
|
||||
glpi_version: "10.0.6"
|
||||
glpi_dir: "/var/www/html/glpi"
|
||||
glpi_dbhost: "127.0.0.1"
|
||||
glpi_dbname: "glpi"
|
||||
@ -18,7 +14,7 @@
|
||||
- base
|
||||
- goss
|
||||
- snmp-agent
|
||||
- itil
|
||||
- glpi
|
||||
- ssh-cli
|
||||
- syslog-cli
|
||||
- post
|
||||
|
67
s-lb-bd.yml
67
s-lb-bd.yml
@ -1,24 +1,49 @@
|
||||
---
|
||||
- hosts: localhost
|
||||
connection: local
|
||||
vars:
|
||||
maria_dbhost: "192.168.102.254"
|
||||
maria_dbname: "wordpress"
|
||||
maria_dbuser: "wp"
|
||||
maria_dbpasswd: "wp"
|
||||
- hosts: all
|
||||
become: true
|
||||
tasks:
|
||||
|
||||
- name: modules python pour
|
||||
apt:
|
||||
name: python3-pymysql
|
||||
state: present
|
||||
|
||||
roles:
|
||||
- base
|
||||
- goss
|
||||
- post
|
||||
#- s-lb-bd-ab
|
||||
- mariadb-ab
|
||||
# - role: db-user
|
||||
# cli_ip: "192.168.102.1"
|
||||
# - role: db-user
|
||||
# cli_ip: "192.168.102.2"
|
||||
# - role: db-user
|
||||
# cli_ip: "192.168.102.3"
|
||||
- snmp-agent
|
||||
# - post
|
||||
- name: install mariadb-server
|
||||
apt:
|
||||
name: mariadb-server
|
||||
state: present
|
||||
|
||||
- name: Cree Bd wordpress
|
||||
mysql_db:
|
||||
db: wordpressdb
|
||||
login_unix_socket: /var/run/mysqld/mysqld.sock
|
||||
state: present
|
||||
|
||||
- name: Ouvre port 3306 mariadb-server
|
||||
replace:
|
||||
path: /etc/mysql/mariadb.conf.d/50-server.cnf
|
||||
regexp: '^bind-address.*'
|
||||
replace: '#bind-adress = 127.0.0.1'
|
||||
backup: yes
|
||||
notify: restart mariadb
|
||||
|
||||
- name: Create MySQL user for wordpress
|
||||
mysql_user:
|
||||
name: wordpressuser
|
||||
password: wordpresspasswd
|
||||
priv: "wordpressdb.*:ALL"
|
||||
host: '%'
|
||||
state: present
|
||||
login_unix_socket: /var/run/mysqld/mysqld.sock
|
||||
|
||||
handlers:
|
||||
- name: restart mariadb
|
||||
ansible.builtin.service:
|
||||
name: mariadb
|
||||
state: restarted
|
||||
|
||||
roles:
|
||||
- base
|
||||
- goss
|
||||
- post
|
||||
- snmp-agent
|
||||
|
@ -4,8 +4,6 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- s-lb-web-ab
|
||||
- snmp-agent
|
||||
- s-nas-client
|
||||
- post
|
||||
|
||||
- lb-web
|
||||
- snmp-agent
|
||||
|
@ -4,8 +4,6 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- s-lb-web-ab
|
||||
- snmp-agent
|
||||
- s-nas-client
|
||||
- post
|
||||
|
||||
- lb-web
|
||||
- snmp-agent
|
||||
|
@ -10,8 +10,7 @@
|
||||
roles:
|
||||
- base
|
||||
- snmp-agent
|
||||
- s-lb-wordpress
|
||||
- s-nas-server
|
||||
- lb-nfs-server
|
||||
- ssh-cli
|
||||
- syslog-cli
|
||||
- post
|
||||
|
@ -97,11 +97,11 @@ elif [[ "${vm}" == "s-nxc" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-infra"
|
||||
elif [[ "${vm}" == "s-lb" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz" "n-dmz-lb"
|
||||
elif [[ "${vm}" == "s-web1" ]] ; then
|
||||
elif [[ "${vm}" == "s-lb-web1" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-web2" ]] ; then
|
||||
elif [[ "${vm}" == "s-lb-web2" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-web3" ]] ; then
|
||||
elif [[ "${vm}" == "s-lb-web3" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-lb" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-lb-bd" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-db"
|
||||
|
128
scripts/mkvm.ps1
Normal file
128
scripts/mkvm.ps1
Normal file
@ -0,0 +1,128 @@
|
||||
#mkvm pour toutes les vms
|
||||
|
||||
$mkvmrelease="v1.2"
|
||||
$ovarelease="2023a"
|
||||
$ovafogrelease="2023a"
|
||||
$ovafile="$HOME\Downloads\debian-bullseye-gsb-${ovarelease}.ova"
|
||||
$ovafilefog="$HOME\Downloads\debian-buster-gsb-${ovafogrelease}.ova"
|
||||
$deletemode=0
|
||||
|
||||
if ($args[0] -eq "s-adm") {
|
||||
|
||||
#Importation depuis l'ova
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "s-adm"
|
||||
|
||||
#création de la première interface
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nic1 bridged
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nictype1 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --cableconnected1 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nicpromisc1 allow-all
|
||||
|
||||
#création de la deuxième interface
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nic2 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --intnet2 "n-adm"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nictype2 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --cableconnected2 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nicpromisc2 allow-all
|
||||
}
|
||||
|
||||
elseif ($args[0] -eq "s-infra") {
|
||||
|
||||
#Importation depuis l'ova
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "s-infra"
|
||||
|
||||
#création de la première interface
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nic1 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --intnet1 "n-adm"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nictype1 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --cableconnected1 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nicpromisc1 allow-all
|
||||
|
||||
#création de la deuxième interface
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nic2 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --intnet2 "n-infra"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nictype2 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --cableconnected2 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nicpromisc2 allow-all
|
||||
}
|
||||
|
||||
elseif ($args[0] -eq "r-int") {
|
||||
|
||||
#Importation depuis l'ova
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "r-int"
|
||||
|
||||
#interface 1
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic1 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet1 "n-adm"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype1 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected1 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc1 allow-all
|
||||
|
||||
#interface 2
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic2 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet2 "n-link"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype2 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected2 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc2 allow-all
|
||||
|
||||
#interface 3
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic3 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet3 "n-wifi"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype3 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected3 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc3 allow-all
|
||||
|
||||
#interface 4
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic4 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet4 "n-user"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype4 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected4 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc4 allow-all
|
||||
|
||||
#interface 5
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic5 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet5 "n-infra"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype5 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected5 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc5 allow-all
|
||||
}
|
||||
|
||||
elseif ($args[0] -eq "r-ext") {
|
||||
|
||||
#Importation depuis l'ova
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "r-ext"
|
||||
|
||||
#interface 1
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic1 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet1 "n-adm"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype1 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected1 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc1 allow-all
|
||||
|
||||
#interface 2
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic2 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet2 "n-dmz"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype2 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected2 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc2 allow-all
|
||||
|
||||
#interface 3
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic3 bridged
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype3 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected3 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc3 allow-all
|
||||
|
||||
#interface 4
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic4 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet4 "n-linkv"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype4 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected4 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc4 allow-all
|
||||
|
||||
#interface 5
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic5 intnet
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet5 "n-link"
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype5 82540EM
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected5 on
|
||||
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc5 allow-all
|
||||
}
|
2
scripts/r-vp1-post.sh
Normal file
2
scripts/r-vp1-post.sh
Normal file
@ -0,0 +1,2 @@
|
||||
#!/bin/bash
|
||||
cd /root/confwg/ && python3 -m http.server 8000 &
|
3
scripts/r-vp2-post.sh
Normal file
3
scripts/r-vp2-post.sh
Normal file
@ -0,0 +1,3 @@
|
||||
#!/bin/bash
|
||||
|
||||
wget http://r-vp1.gsb.adm:8000/wg0-b.qconf
|
@ -2,14 +2,14 @@ mkdir C:\gsb\partages
|
||||
|
||||
cd C:\gsb\partages
|
||||
|
||||
mkdir compta
|
||||
mkdir compta
|
||||
|
||||
mkdir ventes
|
||||
|
||||
mkdir public
|
||||
|
||||
mkdir commun
|
||||
|
||||
mkdir users
|
||||
|
||||
|
||||
|
||||
cd C:\gsb
|
||||
|
||||
mkdir users
|
3
windows/mkusr-backup.cmd
Normal file
3
windows/mkusr-backup.cmd
Normal file
@ -0,0 +1,3 @@
|
||||
net group gg-backup /ADD
|
||||
call mkusr uBackup "u-backup" gg-backup
|
||||
icacls "C:\gsb\partages\public" /Grant:r uBackup:M /T
|
@ -1,14 +1,22 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo ping interface paserelle r-vp2
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
echo ping r-vp1 interface n-linkv
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
echo ping r-ext interface n-linkv
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-ext interface n-link
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
echo ping r-int interface n-link
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
echo ping r-int interface s-infra
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
echo ping s-infra
|
||||
ping -c3 172.16.0.1
|
||||
|
@ -1,14 +1,22 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo ping s-infra
|
||||
ping -c3 172.16.0.1
|
||||
|
||||
echo ping r-int interface n-infra
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
echo ping r-int interface n-link
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
echo ping r-ext interface n-linkv
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-vp1 interface n-linkv
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
echo ping r-vp2 interface n-ag
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
echo ping s-agence
|
||||
ping -c3 172.16.128.10
|
||||
|
@ -1,12 +1,19 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo ping s-infra
|
||||
ping -c3 172.16.0.1
|
||||
|
||||
echo ping r-ext interface n-link
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
echo ping r-ext interface n-linkv
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-vp1 interface n-link
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
echo ping r-vp2 interface n-ag
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
echo ping s-agence
|
||||
ping -c3 172.16.128.10
|
||||
|
@ -1,14 +1,21 @@
|
||||
#!/bin/bash
|
||||
echo ping vers r-int
|
||||
ping -c3 172.16.0.254
|
||||
|
||||
echo ping r-int interface externe
|
||||
ping -c3 192.168.200.254
|
||||
|
||||
echo ping r-ext interface interne
|
||||
ping -c3 192.168.200.253
|
||||
|
||||
echo ping r-ext interface liaison
|
||||
ping -c3 192.168.1.1
|
||||
|
||||
echo ping r-vp1 interface liaison n-linkv
|
||||
ping -c3 192.168.1.2
|
||||
|
||||
ping -c3 172.16.125.254
|
||||
echo ping r-vp2 interface interface interne
|
||||
ping -c3 172.16.128.254
|
||||
|
||||
ping -c3 172.16.128.10
|
||||
echo ping s-agence
|
||||
ping -c3 172.16.128.11
|
||||
|
Reference in New Issue
Block a user