Compare commits
22 Commits
v0.0.5t-aa
...
v0.0.6k-em
Author | SHA1 | Date | |
---|---|---|---|
08afef422c | |||
47d6805612 | |||
57780388e7 | |||
8c3fc380fa | |||
b5abdda49d | |||
2b5fc38edb | |||
dd8bb815cc | |||
a35048dc9f | |||
fe0629d1c3 | |||
1371b6b970 | |||
2bffbbedc0 | |||
272ef9ac07 | |||
81478df279 | |||
75126890b3 | |||
851543db0a | |||
f9e48e7614 | |||
16d22619bf | |||
3fc572ca72 | |||
da25a9dda0 | |||
0af1984a3f | |||
fef6b25101 | |||
797b65ef56 |
25
README.md
25
README.md
@ -1,6 +1,6 @@
|
||||
# gsb2023
|
||||
|
||||
2023-02-01 ps
|
||||
2023-02-02 ps
|
||||
|
||||
Environnement et playbooks ansible pour le projet GSB 2023
|
||||
|
||||
@ -59,9 +59,9 @@ $ mkvm -r s-adm
|
||||
```
|
||||
|
||||
### Machine s-adm
|
||||
* créer la machine virtuelle **s-adm** avec **mkvm * comme décrit plus haut.
|
||||
* utiliser le script de renommage comme suit --> bash chname [nouveau_nom_de_machine] puis redémarrer
|
||||
* utiliser le script s-adm-start --> bash s-adm-start, redémarrer
|
||||
* créer la machine virtuelle **s-adm** avec **mkvm** comme décrit plus haut.
|
||||
* utiliser le script de renommage comme suit --> `bash chname <nouveau_nom_de_machine>` , puis redémarrer
|
||||
* utiliser le script **s-adm-start** : `bash s-adm-start` , puis redémarrer
|
||||
* ou sinon :
|
||||
```shell
|
||||
mkdir -p tools/ansible ; cd tools/ansible
|
||||
@ -79,9 +79,9 @@ $ mkvm -r s-adm
|
||||
### Pour chaque machine
|
||||
|
||||
- créer la machine avec **mkvm -r**, les cartes réseau sont paramétrées par **mkvm** selon les spécifications
|
||||
- utiliser le script de renommage comme suit --> bash chname [nouveau_nom_de_machine]
|
||||
- utiliser le script de renommage comme suit : `bash chname <nouveau_nom_de_machine>`
|
||||
- redémarrer
|
||||
- utiliser le script gsb-start --> bash gsb-start
|
||||
- utiliser le script **gsb-start** : `bash gsb-start`
|
||||
- ou sinon:
|
||||
```shell
|
||||
mkdir -p tools/ansible ; cd tools/ansible
|
||||
@ -94,3 +94,16 @@ bash pull-config
|
||||
```
|
||||
- redémarrer
|
||||
- **Remarque** : une machine doit avoir été redémarrée pour prendre en charge la nouvelle configuration
|
||||
|
||||
|
||||
## Les tests
|
||||
|
||||
Il peuvent êtres mis en oeuvre avec **goss** de la façon suivante : chaque machine installée dispose d'un fichier de test ad-hoc portant le nom de la machine elle-même (machine.yml).
|
||||
|
||||
```
|
||||
cd tools/ansible/gsb2023
|
||||
bash agoss # lance le test portant le nom de la machine
|
||||
```
|
||||
|
||||
`bash agoss -f tap` permet de lancer le test avec le détail d'exécution
|
||||
|
||||
|
26
goss/s-elk.yaml
Normal file
26
goss/s-elk.yaml
Normal file
@ -0,0 +1,26 @@
|
||||
port:
|
||||
tcp:5044:
|
||||
listening: true
|
||||
ip:
|
||||
- 0.0.0.0
|
||||
tcp:5601:
|
||||
listening: true
|
||||
ip:
|
||||
- 0.0.0.0
|
||||
tcp:9200:
|
||||
listening: true
|
||||
ip:
|
||||
- 0.0.0.0
|
||||
service:
|
||||
docker:
|
||||
enabled: true
|
||||
running: true
|
||||
interface:
|
||||
enp0s3:
|
||||
exists: true
|
||||
addrs:
|
||||
- 192.168.99.11/24
|
||||
enp0s8:
|
||||
exists: true
|
||||
addrs:
|
||||
- 172.16.0.11/24
|
@ -1,11 +1,16 @@
|
||||
# Fog
|
||||
|
||||
Ce rôle permet l'installation et la modification de Fog.
|
||||
|
||||
|
||||
## Fog, c'est quoi ?
|
||||
|
||||
|
||||
Fog permet le déploiement d'images disque tel que Windows ou bien Linux en utilisant PXE (Preboot Execution Environment).
|
||||
|
||||
|
||||
## Comment l'installer ?
|
||||
|
||||
Avant toute chose, lancer le fichier goss de s-fog ( présent dans gsb2023/goss/s-fog.yaml ) pour vérifier que la configuration réseau est correct et opérationel. Une fois l'installation principal effectué, il faut lancé le playbook ansible s-fog.yaml.
|
||||
Il faudra se rendre dans le dossier **fog** pour lancer le script **installfog.sh** ( fog/bin/ ). La configuration sera déjà établi via le fichier **.fogsettings**
|
||||
|
||||
Avant toute chose, lancer le fichier goss de s-fog ( présent dans gsb2023/goss/s-fog.yaml ) pour vérifier que la configuration réseau est correct et opérationnel. Une fois l'installation principale effectuée, il faut lancer le playbook ansible s-fog.yaml.
|
||||
Il faudra se rendre dans le dossier **fog** pour lancer le script **installfog.sh** ( fog/bin/ ). La configuration sera déjà établie via le fichier **.fogsettings**
|
||||
|
47
roles/fw-ferm/files/ferm-vp1.conf
Normal file
47
roles/fw-ferm/files/ferm-vp1.conf
Normal file
@ -0,0 +1,47 @@
|
||||
# -*- shell-script -*-
|
||||
|
||||
@def $DEV_VPN= wg0;
|
||||
|
||||
table filter {
|
||||
chain INPUT {
|
||||
policy DROP;
|
||||
|
||||
# connection tracking
|
||||
mod state state INVALID DROP;
|
||||
mod state state (ESTABLISHED RELATED) ACCEPT;
|
||||
|
||||
# allow local connections
|
||||
interface lo ACCEPT;
|
||||
interface $DEV_VPN{
|
||||
# respond to ping
|
||||
proto icmp icmp-type echo-request ACCEPT;
|
||||
# disallow ssh
|
||||
saddr proto tcp dport ssh DROP;
|
||||
}
|
||||
}#FIN INPUT
|
||||
|
||||
# outgoing connections are not limited
|
||||
chain OUTPUT {
|
||||
policy ACCEPT;
|
||||
interface $DEV_VPN{
|
||||
# allow ssh
|
||||
daddr proto tcp dport ssh ACCEPT;
|
||||
# respond to ping
|
||||
proto icmp icmp-type echo-request ACCEPT;
|
||||
}
|
||||
}#FIN OUTPUT
|
||||
|
||||
chain FORWARD {
|
||||
policy ACCEPT;
|
||||
|
||||
# connection tracking
|
||||
mod state state INVALID DROP;
|
||||
mod state state (ESTABLISHED RELATED) ACCEPT;
|
||||
|
||||
# connections from the internal net to the internet or to other
|
||||
# internal nets are allowed
|
||||
interface $DEV_VPN ACCEPT;
|
||||
|
||||
# the rest is dropped by the above policy
|
||||
}#FIN FO
|
||||
}
|
@ -4,7 +4,7 @@
|
||||
|
||||
@def $DEV_PRIVATE = enp0s8;
|
||||
@def $DEV_WORLD = enp0s9;
|
||||
|
||||
@def $DEV_VPN= wg0;
|
||||
@def $NET_PRIVATE = 172.16.0.0/24;
|
||||
|
||||
table filter {
|
||||
@ -33,23 +33,33 @@ table filter {
|
||||
# we provide DNS and SMTP services for the internal net
|
||||
interface $DEV_PRIVATE saddr $NET_PRIVATE {
|
||||
proto (udp tcp) dport domain ACCEPT;
|
||||
proto udp dport bootps ACCEPT;
|
||||
proto udp dport bootps ACCEPT;
|
||||
}
|
||||
|
||||
# interface réseau
|
||||
# interface réseau
|
||||
interface $DEV_WORLD {
|
||||
|
||||
|
||||
}
|
||||
|
||||
# the rest is dropped by the above policy
|
||||
}#FIN INPUT
|
||||
|
||||
# outgoing connections are not limited
|
||||
chain OUTPUT policy ACCEPT;
|
||||
chain OUTPUT {policy ACCEPT;
|
||||
}#FIN OUTPUT
|
||||
|
||||
chain FORWARD {
|
||||
policy ACCEPT;
|
||||
|
||||
interface $DEV_VPN{
|
||||
# respond to ping
|
||||
proto icmp icmp-type echo-request ACCEPT;
|
||||
# disallow ssh
|
||||
saddr($DEV_VPN) proto tcp dport ssh DROP;
|
||||
# allow ssh
|
||||
daddr($DEV_VPN) proto tcp dport ssh ACCEPT;
|
||||
|
||||
}
|
||||
# connection tracking
|
||||
mod state state INVALID DROP;
|
||||
mod state state (ESTABLISHED RELATED) ACCEPT;
|
||||
|
@ -4,7 +4,7 @@
|
||||
|
||||
@def $DEV_PRIVATE = enp0s9;
|
||||
@def $DEV_WORLD = enp0s8;
|
||||
|
||||
@def $DEV_VPN= wg0;
|
||||
@def $NET_PRIVATE = 172.16.0.0/24;
|
||||
|
||||
table filter {
|
||||
@ -34,7 +34,12 @@ table filter {
|
||||
proto (udp tcp) dport domain ACCEPT;
|
||||
proto udp dport bootps ACCEPT;
|
||||
}
|
||||
|
||||
interface $DEV_VPN{
|
||||
# respond to ping
|
||||
proto icmp icmp-type echo-request ACCEPT;
|
||||
# disallow ssh
|
||||
saddr proto tcp dport ssh ACCEPT;
|
||||
}
|
||||
# interface réseau
|
||||
interface $DEV_WORLD {
|
||||
|
||||
@ -44,8 +49,14 @@ table filter {
|
||||
}#FIN INPUT
|
||||
|
||||
# outgoing connections are not limited
|
||||
chain OUTPUT policy ACCEPT;
|
||||
|
||||
chain OUTPUT {policy ACCEPT;
|
||||
interface $DEV_VPN{
|
||||
# allow ssh
|
||||
daddr proto tcp dport ssh DROP;
|
||||
# respond to ping
|
||||
proto icmp icmp-type echo-request ACCEPT;
|
||||
}
|
||||
}
|
||||
chain FORWARD {
|
||||
policy ACCEPT;
|
||||
|
||||
|
43
roles/fw-ferm/files/iptables.test.r-vp1
Normal file
43
roles/fw-ferm/files/iptables.test.r-vp1
Normal file
@ -0,0 +1,43 @@
|
||||
# Définir la politique par défaut
|
||||
iptables -P INPUT DROP
|
||||
iptables -P OUTPUT ACCEPT
|
||||
iptables -P FORWARD ACCEPT
|
||||
|
||||
# Autoriser le trafic pour le VPN
|
||||
iptables -A INPUT -p udp --dport 51820 -j ACCEPT
|
||||
|
||||
# Autoriser les connexions établies et connexes
|
||||
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
|
||||
# Autoriser les connexions sur l'interface loopback
|
||||
iptables -A INPUT -i lo -j ACCEPT
|
||||
|
||||
# Autoriser les requêtes ping
|
||||
iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# Autoriser les connexions SSH depuis le réseau privé et depuis certains hôtes internet
|
||||
iptables -A INPUT -p tcp -s 172.16.0.0/24,81.209.165.42 --dport ssh -j ACCEPT
|
||||
|
||||
# Autoriser les connexions DNS et SMTP sur l'interface privée
|
||||
iptables -A INPUT -i enp0s9 -s 172.16.0.0/24 -p udp --dport domain -j ACCEPT
|
||||
iptables -A INPUT -i enp0s9 -s 172.16.0.0/24 -p tcp --dport domain -j ACCEPT
|
||||
iptables -A INPUT -i enp0s9 -s 172.16.0.0/24 -p udp --dport bootps -j ACCEPT
|
||||
|
||||
# Autoriser les requêtes ping sur l'interface VPN
|
||||
iptables -A INPUT -i wg0 -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# Interdire les connexions SSH sur l'interface VPN
|
||||
iptables -A INPUT -i wg0 -s 0.0.0.0/0 -p tcp --dport ssh -j DROP
|
||||
|
||||
# Interdire les connexions SSH sortantes sur l'interface VPN
|
||||
iptables -A OUTPUT -o wg0 -d 0.0.0.0/0 -p tcp --dport ssh -j DROP
|
||||
|
||||
# Autoriser le trafic sur l'interface publique
|
||||
iptables -A INPUT -i enp0s8 -j ACCEPT
|
||||
|
||||
# Autoriser les connexions depuis l'interface privée vers l'interface publique ou une autre interface privée
|
||||
iptables -A FORWARD -i enp0s9 -o enp0s8 -j ACCEPT
|
||||
iptables -A FORWARD -i enp0s9 -o enp0s9 -j ACCEPT
|
||||
|
||||
# Interdire toutes les autres connexions de forwarding
|
||||
iptables -A FORWARD -j DROP
|
50
roles/fw-ferm/files/iptables.test.r-vp2
Normal file
50
roles/fw-ferm/files/iptables.test.r-vp2
Normal file
@ -0,0 +1,50 @@
|
||||
# Politique par défaut : DROP
|
||||
iptables -P INPUT DROP
|
||||
iptables -P FORWARD ACCEPT
|
||||
iptables -P OUTPUT ACCEPT
|
||||
|
||||
# Autoriser les connexions VPN entrantes
|
||||
iptables -A INPUT -p udp --dport 51820 -j ACCEPT
|
||||
|
||||
# Autoriser les connexions établies et apparentées
|
||||
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
|
||||
# Autoriser les connexions depuis l'interface locale
|
||||
iptables -A INPUT -i lo -j ACCEPT
|
||||
|
||||
# Autoriser les requêtes ping
|
||||
iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# Autoriser les connexions SSH depuis le réseau privé et depuis certains hôtes Internet
|
||||
iptables -A INPUT -s 172.16.0.0/24 -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A INPUT -s 81.209.165.42 -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
|
||||
|
||||
# Autoriser les connexions DNS et SMTP depuis le réseau privé
|
||||
iptables -A INPUT -i enp0s8 -s 172.16.0.0/24 -p udp --dport 53 -j ACCEPT
|
||||
iptables -A INPUT -i enp0s8 -s 172.16.0.0/24 -p tcp --dport 53 -j ACCEPT
|
||||
iptables -A INPUT -i enp0s8 -s 172.16.0.0/24 -p udp --dport 67 -j ACCEPT
|
||||
|
||||
# Autoriser le trafic sortant
|
||||
iptables -A OUTPUT -j ACCEPT
|
||||
|
||||
# Autoriser les requêtes ping sortantes
|
||||
iptables -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# Autoriser les connexions SSH sortantes
|
||||
iptables -A OUTPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
|
||||
|
||||
# Autoriser les connexions VPN sortantes
|
||||
iptables -A FORWARD -i wg0 -o enp0s9 -j ACCEPT
|
||||
iptables -A FORWARD -i enp0s9 -o wg0 -j ACCEPT
|
||||
|
||||
# Interdire les connexions SSH entrantes depuis l'interface VPN
|
||||
iptables -A FORWARD -i wg0 -p tcp --dport 22 -j DROP
|
||||
|
||||
# Autoriser les connexions SSH sortantes vers l'interface VPN
|
||||
iptables -A FORWARD -o wg0 -p tcp --dport 22 -j ACCEPT
|
||||
|
||||
# Autoriser les connexions établies et apparentées
|
||||
iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
|
||||
# Autoriser le trafic depuis le réseau privé
|
||||
iptables -A FORWARD -i enp0s8 -o enp0s9 -j ACCEPT
|
@ -13,16 +13,3 @@
|
||||
apt:
|
||||
name: nfs-common
|
||||
state: present
|
||||
|
||||
- name: montage nfs pour word press
|
||||
blockinfile:
|
||||
path: /etc/fstab
|
||||
block: |
|
||||
192.168.102.253:/home/wordpress /var/www/html nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0
|
||||
|
||||
#- name: monte export wordpress
|
||||
# ansible.posix.mount:
|
||||
# path: /var/www/html
|
||||
# state: mounted
|
||||
# fstype: nfs
|
||||
# src: 192.168.102.253:/exports/wordpress
|
||||
|
@ -26,6 +26,7 @@ define host {
|
||||
host_name localhost
|
||||
alias localhost
|
||||
address 127.0.0.1
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
||||
|
@ -9,5 +9,6 @@ define host{
|
||||
host_name s-adm
|
||||
alias debian-servers
|
||||
address 192.168.99.99
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
@ -9,5 +9,6 @@ define host{
|
||||
host_name s-appli
|
||||
alias debian-servers
|
||||
address 172.16.0.3
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
@ -9,5 +9,6 @@ define host{
|
||||
host_name s-backup
|
||||
alias serveur proxy
|
||||
address 172.16.0.4
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
@ -9,6 +9,7 @@ define host{
|
||||
host_name s-fog
|
||||
alias serveur proxy
|
||||
address 172.16.0.16
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
||||
|
@ -9,5 +9,6 @@ define host{
|
||||
host_name s-infra
|
||||
alias debian-servers
|
||||
address 172.16.0.1
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
@ -9,6 +9,7 @@ define host{
|
||||
host_name s-itil
|
||||
alias serveur proxy
|
||||
address 172.16.0.9
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
||||
|
@ -9,5 +9,6 @@ define host{
|
||||
host_name s-nxc
|
||||
alias debian-servers
|
||||
address 172.16.0.7
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
@ -9,6 +9,7 @@ define host{
|
||||
host_name s-proxy
|
||||
alias serveur proxy
|
||||
address 172.16.0.2
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
||||
|
@ -9,6 +9,7 @@ define host{
|
||||
host_name s-win
|
||||
alias serveur proxy
|
||||
address 172.16.0.6
|
||||
parents r-int
|
||||
}
|
||||
|
||||
|
||||
|
0
roles/peertube/README.md
Normal file
0
roles/peertube/README.md
Normal file
139
roles/peertube/files/values.yaml
Normal file
139
roles/peertube/files/values.yaml
Normal file
@ -0,0 +1,139 @@
|
||||
replicaCount: 1
|
||||
image:
|
||||
repository: chocobozzz/peertube
|
||||
pullPolicy: IfNotPresent
|
||||
tag: "v5.0.1-bullseye"
|
||||
|
||||
imagePullSecrets: []
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
serviceAccount:
|
||||
create: false
|
||||
annotations: {}
|
||||
name: ""
|
||||
podAnnotations: {}
|
||||
podSecurityContext: {}
|
||||
securityContext: {}
|
||||
|
||||
service:
|
||||
type: ClusterIP
|
||||
port: 9000
|
||||
nginxPort: 9001
|
||||
|
||||
## default config for postgresql should work, but feel free to modify it if required.
|
||||
# must stay consistent with peertube configuration, otherwise peertube will crash
|
||||
postgresql:
|
||||
enabled: true
|
||||
primary:
|
||||
persistence:
|
||||
enabled: true
|
||||
existingClaim: "pvc-postgres"
|
||||
global:
|
||||
postgresql:
|
||||
auth:
|
||||
postgrePassword: "admin"
|
||||
username: "user"
|
||||
password: "user"
|
||||
database: "peertube"
|
||||
|
||||
## the main list of variables tha will be applied in the peertube container
|
||||
# any error or misconfiguration will make peertube crash.
|
||||
peertube:
|
||||
env:
|
||||
dbUser: user # must be consistent with postgresql configuration
|
||||
dbPasswd: user # must be consistent with postgresql configuration
|
||||
dbSsl: false # disabled by default WARNING: ssl connection feature not tested, use at your own risk
|
||||
dbHostname: peertube-postgresql # must be consistent with postgresql configuration
|
||||
webHostname: peertube # must be changed to your local setup
|
||||
secret: b2753b0f37444974de0e81f04815e6a889fcf8960bd203a01b624d8fa8a37683
|
||||
smtpHostname: peertube-mail # must be consistent with mail configuration
|
||||
smtpPort: 587 # must be consistent with mail configuration
|
||||
smtpFrom: noreply@lan.lan # not configured by default, add something meaningfull if you want
|
||||
smtpTls: false # disabled by default WARNING: tls connection feature not tested, use at your own risk
|
||||
smtpDisableStartTls: false # unless crashes related to tls/ssl, this should be unchanged
|
||||
adminEmail: root@localhost.lan # use this if you want peopleto be able to reach you
|
||||
redisHostname: peertube-redis-master # must be consistent with redis configuration
|
||||
redisAuth: peertube # must be consistent with redis configuration
|
||||
app:
|
||||
userCanRegister: true # control if people can register by themselves
|
||||
rootPasswd: rootroot # CHANGE THIS! the default admin username is 'root' this variable define the password
|
||||
## the next section configure at wich quality videos will be transcoded
|
||||
transcoding360: true
|
||||
transcoding480: true
|
||||
transcoding720: true
|
||||
transcoding1080: false
|
||||
transcoding2160: false
|
||||
|
||||
## the configuration of the postfix server called 'mail' here
|
||||
# change these settings if you know what you are doing
|
||||
mail:
|
||||
enbled: true
|
||||
config:
|
||||
general:
|
||||
ALLOWED_SENDER_DOMAINS: # should be the same as your web domain
|
||||
DKIM_AUTOGENERATE: "yes"
|
||||
opendkim:
|
||||
RequireSafeKeys: "no"
|
||||
postfix:
|
||||
smtp_tls_security_level: "secure" # works by default, any other tls level is untested
|
||||
persistence:
|
||||
enabled: false
|
||||
service:
|
||||
port: 587
|
||||
|
||||
## the configuration of the redis server
|
||||
redis:
|
||||
master:
|
||||
persistence:
|
||||
enabled: true
|
||||
existingClaim: "pvc-redis"
|
||||
replica:
|
||||
persistence:
|
||||
enabled: true
|
||||
existingClaim: "pvc-redis"
|
||||
auth:
|
||||
enbled: true
|
||||
password: "peertube"
|
||||
|
||||
## ingress configuration is very specific this part must be configured or else you'll get 503 or 404 errors
|
||||
ingress:
|
||||
enabled: false
|
||||
className: ""
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: nginx
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: 4G # this caps the size of imported videos, if set low this might prevent you from uploading videos
|
||||
# kubernetes.io/tls-acme: "true"
|
||||
hosts:
|
||||
- host: # your domain here
|
||||
paths:
|
||||
- path: /
|
||||
pathType: ImplementationSpecific
|
||||
tls:
|
||||
# - secretName: chart-example-tls
|
||||
- hosts:
|
||||
- # your domain here
|
||||
|
||||
resources: {}
|
||||
autoscaling:
|
||||
enabled: true
|
||||
minimumReplicas: 3
|
||||
maximumReplicas: 20
|
||||
targetCPUUtilizationPercentage: 90
|
||||
targetMemoryUtilizationPercentage: 75
|
||||
windowSeconds: 120
|
||||
minCPUPercentage: 20
|
||||
minMemoryPercentage: 30
|
||||
|
||||
## this section should be configured to match your needs and available ressources
|
||||
persistence:
|
||||
enabled: true
|
||||
reclaimPolicy: Retain
|
||||
redisVolumeStorage: 1Gi
|
||||
peertubeVolumeStorage: 5Gi
|
||||
postgresqlVolumeStorage: 1Gi
|
||||
accessMode: ReadWriteOnce
|
||||
|
||||
nodeSelector: {}
|
||||
tolerations: []
|
||||
affinity: {}
|
12
roles/peertube/tasks/main.yml
Normal file
12
roles/peertube/tasks/main.yml
Normal file
@ -0,0 +1,12 @@
|
||||
---
|
||||
- name: installation de docker...
|
||||
shell: curl https://releases.rancher.com/install-docker/20.10.sh | sh
|
||||
|
||||
- name: installation de k3s...
|
||||
shell: curl -sfL https://get.k3s.io | sh -s - --docker
|
||||
|
||||
- name: clonage du dépot peertube...
|
||||
git:
|
||||
repo: https://github.com/Elam-Monnot/Peertube-helm.git
|
||||
dest: /root/tools/
|
||||
clone: yes
|
7
roles/post-lb/README.md
Normal file
7
roles/post-lb/README.md
Normal file
@ -0,0 +1,7 @@
|
||||
# Rôle Post
|
||||
|
||||
Le rôle "post" copie la configuration des interfaces des cartes réseaux nécessaires selon la machine sur laquelle on exécute le rôle. Il place cette configuration dans /etc/network/interfaces.
|
||||
|
||||
Ensuite, on copie le fichier "resolv.conf" dans /etc/ lorsque que la machine qui exécute le rôle n'est pas "s-adm", "s-proxy" ou "r-vp2".
|
||||
|
||||
Cependant, si la machine qui exécute le rôle est "s-proxy", on copie le fichier "resolv.conf.s-proxy" dans /etc/resolv.conf
|
21
roles/post-lb/files/interfaces.s-lb-web1
Normal file
21
roles/post-lb/files/interfaces.s-lb-web1
Normal file
@ -0,0 +1,21 @@
|
||||
### 0.2 - putconf - jeudi 7 janvier 2016, 16:18:49 (UTC+0100)
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
||||
|
||||
# carte n-adm
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.99.101/24
|
||||
|
||||
# Réseau n-dmz-lb
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 192.168.101.1/24
|
||||
|
||||
# réseau n-dmz-db
|
||||
allow-hotplug enp0s9
|
||||
iface enp0s9 inet static
|
||||
address 192.168.102.1/24
|
||||
post-up mount -o rw 192.168.102.253:/home/wordpress /var/www/html
|
21
roles/post-lb/files/interfaces.s-lb-web2
Normal file
21
roles/post-lb/files/interfaces.s-lb-web2
Normal file
@ -0,0 +1,21 @@
|
||||
### 0.2 - putconf - jeudi 7 janvier 2016, 16:18:49 (UTC+0100)
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
||||
|
||||
# carte n-adm
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.99.101/24
|
||||
|
||||
# Réseau n-dmz-lb
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 192.168.101.1/24
|
||||
|
||||
# réseau n-dmz-db
|
||||
allow-hotplug enp0s9
|
||||
iface enp0s9 inet static
|
||||
address 192.168.102.1/24
|
||||
post-up mount -o rw 192.168.102.253:/home/wordpress /var/www/html
|
4
roles/post-lb/files/resolv.conf
Normal file
4
roles/post-lb/files/resolv.conf
Normal file
@ -0,0 +1,4 @@
|
||||
search gsb.lan
|
||||
domain gsb.lan
|
||||
nameserver 172.16.0.1
|
||||
|
24
roles/post-lb/tasks/main.yml
Normal file
24
roles/post-lb/tasks/main.yml
Normal file
@ -0,0 +1,24 @@
|
||||
---
|
||||
|
||||
|
||||
- name: Copie interfaces
|
||||
copy: src=interfaces.{{ ansible_hostname }} dest=/etc/network/interfaces
|
||||
|
||||
- name: Copie resolv.conf
|
||||
copy: src=resolv.conf dest=/etc/
|
||||
when: ansible_hostname != "s-adm" and ansible_hostname != "s-proxy"
|
||||
|
||||
- name: pas de chgt resolv.conf pour r-vp2
|
||||
meta: end_play
|
||||
when: ansible_hostname == "r-vp2"
|
||||
|
||||
- name: Copie resolv.conf pour s-proxy
|
||||
copy: src=resolv.conf.s-proxy dest=/etc/resolv.conf
|
||||
when: ansible_hostname == "s-proxy"
|
||||
|
||||
#- name: Confirm
|
||||
# prompt: "<Entree> pour redemarrer ..."
|
||||
|
||||
#- name: Reboot
|
||||
# shell: reboot
|
||||
|
17
roles/post/files/interfaces.s-peertube
Normal file
17
roles/post/files/interfaces.s-peertube
Normal file
@ -0,0 +1,17 @@
|
||||
### 0.1 - putconf - jeudi 30 mars 2023, 8:11:30 (UTC+0100)
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
||||
|
||||
# carte n-adm
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.99.120/24
|
||||
gateway 192.168.99.99
|
||||
|
||||
# Réseau n-dmz
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 192.168.100.20/24
|
||||
post-up systemctl start k3s
|
@ -21,4 +21,3 @@
|
||||
|
||||
#- name: Reboot
|
||||
# shell: reboot
|
||||
|
||||
|
@ -1,19 +1,32 @@
|
||||
Procédure d'installation de **r-vp1** et de copie du fichier wg0-b.conf.
|
||||
|
||||
# <p align="center">Procédure d'installation </p>
|
||||
|
||||
de **r-vp1** et de copie du fichier wg0-b.conf.
|
||||
|
||||
***
|
||||
## Sur **r-vp1**:
|
||||
Attendre la fin de l'installation. Ensuite lancer un serveur http avec python3 pour récuperer le fichier wg0-b.conf sur **r-vp2** .
|
||||
|
||||
### 🛠️ Lancer le script
|
||||
```bash
|
||||
cd /tools/ansible/gsb2023/Scripts
|
||||
```
|
||||
```bash
|
||||
bash r-vp1-post.sh
|
||||
```
|
||||
## Sur **r-vp2**:
|
||||
|
||||
Depuis **r-vp1** se deplacer dans le repertoire **/tools/ansible/gsb2023** pour executer le playbook:
|
||||
**"ansible-playbook -i localhost, -c local r-vp1.yml"** puis reboot **r-vp1**.
|
||||
|
||||
|
||||
Sur **r-vp1**:
|
||||
|
||||
Attendre la fin de l'installation. Ensuite lancer un serveur http avec python3 pour récuperer le fichier
|
||||
wg0-b.conf sur **r-vp2** . Lancer le script **r-vp1-post.sh** dans **/tools/ansible/gsb2023/Scripts**.
|
||||
|
||||
|
||||
Sur **r-vp2**:
|
||||
|
||||
Lancer le script r-vp2-post.sh dans **/tools/ansible/gsb2023/Scripts** pour recuperer wg0-b.conf
|
||||
et qui renomme le fichier en **wg0.conf** . Il redémarre et active le service **wg-quick@wg0**.
|
||||
Lancer le script r-vp2-post.sh pour récuperer le fichier de configuration et activer l'interface wg0.
|
||||
### 🛠️ Lancer le script
|
||||
```bash
|
||||
cd /tools/ansible/gsb2023/Scripts
|
||||
```
|
||||
```bash
|
||||
bash r-vp2-post.sh
|
||||
```
|
||||
## Fin
|
||||
|
||||
redemarer les machines
|
||||
```bash
|
||||
reboot
|
||||
```
|
||||
|
@ -4,7 +4,7 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- post
|
||||
- post-lb
|
||||
- lb-web
|
||||
- snmp-agent
|
||||
- ssh-cli
|
||||
|
@ -4,7 +4,8 @@
|
||||
|
||||
roles:
|
||||
- base
|
||||
- post
|
||||
- post-lb
|
||||
- lb-web
|
||||
- snmp-agent
|
||||
- ssh-cli
|
||||
|
||||
|
10
s-peertube.yml
Normal file
10
s-peertube.yml
Normal file
@ -0,0 +1,10 @@
|
||||
---
|
||||
- hosts: localhost
|
||||
connection: local
|
||||
|
||||
roles:
|
||||
- base
|
||||
- peertube
|
||||
- post
|
||||
- snmp-agent
|
||||
- ssh-cli
|
18
scripts/addint.s-peertube
Executable file
18
scripts/addint.s-peertube
Executable file
@ -0,0 +1,18 @@
|
||||
#!/bin/bash
|
||||
nom=s-peertube
|
||||
|
||||
# N-adm (enp0s3)
|
||||
|
||||
VBoxManage modifyvm $nom --nic1 intnet
|
||||
VBoxManage modifyvm $nom --intnet1 "n-adm"
|
||||
VBoxManage modifyvm $nom --nictype1 82540EM
|
||||
VBoxManage modifyvm $nom --cableconnected1 on
|
||||
VBoxManage modifyvm $nom --nicpromisc1 allow-all
|
||||
|
||||
# N-dmz (enp0s8)
|
||||
|
||||
VBoxManage modifyvm $nom --nic2 intnet
|
||||
VBoxManage modifyvm $nom --intnet2 "n-dmz"
|
||||
VBoxManage modifyvm $nom --nictype2 82540EM
|
||||
VBoxManage modifyvm $nom --cableconnected2 on
|
||||
VBoxManage modifyvm $nom --nicpromisc2 allow-all
|
@ -110,6 +110,8 @@ elif [[ "${vm}" == "s-lb-bd" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-nas" ]] ; then
|
||||
create_if "${vm}" "n-adm" "n-dmz-db"
|
||||
elif [[ "${vm}" == "s-peertube" ]] ; then
|
||||
./addint.s-peertube
|
||||
elif [[ "${vm}" == "r-vp1" ]] ; then
|
||||
./addint.r-vp1
|
||||
elif [[ "${vm}" == "r-vp2" ]] ; then
|
||||
|
Reference in New Issue
Block a user