ajout role awx
This commit is contained in:
parent
78230b7f21
commit
17647b17da
21
roles/awx/README.md
Normal file
21
roles/awx/README.md
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
# Rôle Kea
|
||||||
|
***
|
||||||
|
Rôle Kea: Configuration de 2 serveurs KEA en mode haute disponbilité.
|
||||||
|
|
||||||
|
## Tables des matières
|
||||||
|
1. [Que fait le rôle Kea ?]
|
||||||
|
2. [Installation et configuration de ka]
|
||||||
|
3. [Remarques]
|
||||||
|
|
||||||
|
|
||||||
|
## Que fait le rôle Kea ?
|
||||||
|
Le rôle KEA permet de configurer 1 serveurs kea (s-kea1 et s-kea2) en mode haute disponibilité.
|
||||||
|
- Le serveur **s-kea1** sera en mode **primary** il délivrera les baux DHCP sur le réseau n-user.
|
||||||
|
- Le serveur **s-kea2**, sera en mode **stand-by** le service DHCP basculera donc sur **s-kea2** en cas disponibilité du serveur**s-kea1**.
|
||||||
|
|
||||||
|
### Installation et configuration de kea
|
||||||
|
|
||||||
|
Le rôle kea installe les packets **kea dhcp4, hooks, admin** une fois les packets installer. Il configure un serveur kea pour qu'il distribue les ips sur le réseau n-user et soit en haute disponibilité.
|
||||||
|
|
||||||
|
### Remarquees ###
|
||||||
|
Une fois le playbook **s-kea** correctement terminé et la machine **s-kea** redemarrée, redémarrée le service **isc-kea-dhcp4.service** afin de prendre en compte les modifications éfféctuées sur la couche réseau par le role POST.
|
8
roles/awx/default/main.yml
Normal file
8
roles/awx/default/main.yml
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
#variable kea
|
||||||
|
kea_ver: "2.4.1"
|
||||||
|
kea_dbname: ""
|
||||||
|
kaa_dbuser: ""
|
||||||
|
kea_dbpasswd: ""
|
||||||
|
kea_dhcp4_dir: "/etc/kea/kea-dhcp4.conf"
|
||||||
|
kea_ctrl_dir: "/etc/kea/kea-ctrl-agent.conf"
|
||||||
|
|
6
roles/awx/handlers/main.yml
Normal file
6
roles/awx/handlers/main.yml
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
- name: Restart isc-stork-server.service
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: isc-stork-server.service
|
||||||
|
state: restarted
|
||||||
|
enabled: yes
|
47
roles/awx/tasks/main.yml
Normal file
47
roles/awx/tasks/main.yml
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
---
|
||||||
|
- name: Preparation
|
||||||
|
ansible.builtin.shell: curl -sfL https://get.k3s.io | INSTALL_K3S_VERSION=v1.28.5+k3s1 sh -s - --write-kubeconfig-mode 644 --node-ip "{{ awx_ip }}" --flanel-iface "{{ awx_if }}"
|
||||||
|
|
||||||
|
- name: clonage du dépot awx-on-k3s
|
||||||
|
git:
|
||||||
|
repo: https://github.com/kurokobo/awx-on-k3s.git
|
||||||
|
dest: "{{ awx_dir }}"
|
||||||
|
clone: yes
|
||||||
|
force: yes
|
||||||
|
|
||||||
|
- name: Deploiement AWX Operator ...
|
||||||
|
ansible.builtin.shell: "kubectl apply -k operator"
|
||||||
|
args:
|
||||||
|
chdir: "{{ awx_dir }}"
|
||||||
|
|
||||||
|
- name: Git checkout
|
||||||
|
ansible.builtin.git:
|
||||||
|
repo: 'https://github.com/kurokobo/awx-on-k3s.git'
|
||||||
|
dest: "{{ awx_dir }}"
|
||||||
|
version: release-2.10.0
|
||||||
|
|
||||||
|
- name: Generation de certification auto-signé
|
||||||
|
ansible.builtin.shell: 'openssl req -x509 -nodes -days 3650 -newkey rsa:2048 -out ./base/tls.crt -keyout ./base/tls.key -subj "/CN={{ awx_host }}/O={{ awx_host }}" -addext "subjectAltName = DNS:{{ awx_host }}"'
|
||||||
|
args:
|
||||||
|
chdir: "{{ awx_dir }}"
|
||||||
|
|
||||||
|
- name: creation du repertoire postgres-13
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /data/postgres-13
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Creation repertoire projects
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /data/projects
|
||||||
|
state: directory
|
||||||
|
owner: 1000:0
|
||||||
|
|
||||||
|
- name: Deploiement d'AWX ...
|
||||||
|
ansible.builtin.shell: "kubectl apply -k base"
|
||||||
|
args:
|
||||||
|
chdir: "{{ awx_dir }}"
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
52
roles/awx/templates/server.env.j2
Normal file
52
roles/awx/templates/server.env.j2
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
### database settings
|
||||||
|
### the address of a PostgreSQL database
|
||||||
|
STORK_DATABASE_HOST=localhost
|
||||||
|
### the port of a PostgreSQL database
|
||||||
|
STORK_DATABASE_PORT=5432
|
||||||
|
### the name of a database
|
||||||
|
STORK_DATABASE_NAME={{ stork_db_name }}
|
||||||
|
### the username for connecting to the database
|
||||||
|
STORK_DATABASE_USER_NAME={{ stork_db_user }}
|
||||||
|
### the SSL mode for connecting to the database
|
||||||
|
### possible values: disable, require, verify-ca, or verify-full
|
||||||
|
# STORK_DATABASE_SSLMODE=
|
||||||
|
### the location of the SSL certificate used by the server to connect to the database
|
||||||
|
# STORK_DATABASE_SSLCERT=
|
||||||
|
### the location of the SSL key used by the server to connect to the database
|
||||||
|
# STORK_DATABASE_SSLKEY=
|
||||||
|
### the location of the root certificate file used to verify the database server's certificate
|
||||||
|
# STORK_DATABASE_SSLROOTCERT=
|
||||||
|
### the password for the username connecting to the database
|
||||||
|
### empty password is set to avoid prompting a user for database password
|
||||||
|
STORK_DATABASE_PASSWORD={{stork_db_passwd }}
|
||||||
|
|
||||||
|
### REST API settings
|
||||||
|
### the IP address on which the server listens
|
||||||
|
# STORK_REST_HOST=
|
||||||
|
### the port number on which the server listens
|
||||||
|
# STORK_REST_PORT=
|
||||||
|
### the file with a certificate to use for secure connections
|
||||||
|
# STORK_REST_TLS_CERTIFICATE=
|
||||||
|
### the file with a private key to use for secure connections
|
||||||
|
# STORK_REST_TLS_PRIVATE_KEY=
|
||||||
|
### the certificate authority file used for mutual TLS authentication
|
||||||
|
# STORK_REST_TLS_CA_CERTIFICATE=
|
||||||
|
### the directory with static files served in the UI
|
||||||
|
STORK_REST_STATIC_FILES_DIR=/usr/share/stork/www
|
||||||
|
### the base URL of the UI - to be used only if the UI is served from a subdirectory
|
||||||
|
# STORK_REST_BASE_URL=
|
||||||
|
|
||||||
|
### enable Prometheus /metrics HTTP endpoint for exporting metrics from
|
||||||
|
### the server to Prometheus. It is recommended to secure this endpoint
|
||||||
|
### (e.g. using HTTP proxy).
|
||||||
|
# STORK_SERVER_ENABLE_METRICS=true
|
||||||
|
|
||||||
|
### Logging parameters
|
||||||
|
|
||||||
|
### Set logging level. Supported values are: DEBUG, INFO, WARN, ERROR
|
||||||
|
# STORK_LOG_LEVEL=DEBUG
|
||||||
|
### disable output colorization
|
||||||
|
# CLICOLOR=false
|
||||||
|
|
||||||
|
### path to the hook directory
|
||||||
|
# STORK_SERVER_HOOK_DIRECTORY=
|
Loading…
x
Reference in New Issue
Block a user