Ansible configuration for the Netz39 infrastructure
Find a file
2023-07-13 23:44:00 +02:00
files 🔧 prosody: Remove legacy TLS options 2022-12-22 11:19:33 +01:00
group_vars Add group config for k3s 2023-05-05 16:21:07 +02:00
host_vars feat: add initial work to configure cisco router 2023-07-13 23:44:00 +02:00
roles ⬆️ Update cleanuri-webui to 0.2.0 2023-02-24 16:39:28 +01:00
templates Add a template for spaceapi handling on pottwal 2023-07-02 16:31:23 +02:00
.editorconfig Add EditorConfig configuration file 2022-01-08 13:25:36 +01:00
.mailmap 📝 mailmap: Expand alias to real name 2022-12-31 10:43:16 +01:00
.yamllint 🚨 yamllint: Ignore line-length warnings 2022-11-18 08:58:19 +01:00
ansible.cfg feat: add nicer rendering to ansible config 2022-10-24 16:33:16 +00:00
configure-grafana.yml update requirements.yml to correctly install collection 2022-11-12 15:31:51 +01:00
group-all.yml 🐛 Fix origin for unattended-upgrades 2022-11-24 16:03:02 +01:00
group-docker_host.yml 🐳 Add telegraf container for Docker metrics in influxdb 2023-01-10 06:26:14 +01:00
group-proxmox.yml 🚚 Rename group playbooks to group-* 2022-11-04 22:35:41 +01:00
host-beaker.yml feat: add admins to proxmox user permissions file 2022-11-11 14:56:02 +01:00
host-hobbes.yml ⬆️ Update to chromium-browser 2023-04-17 23:19:19 +02:00
host-holmium.yml Move spaceapi handling to pottwal on holmium 2023-07-02 16:32:01 +02:00
host-krypton.yml 🔧 Move docker_setup role application to group playbook 2022-12-21 19:00:22 +01:00
host-oganesson.yml 🚚 Rename host playbooks to host-* 2022-11-04 22:34:37 +01:00
host-platon.yml Install jq on platon 2023-01-09 15:49:17 +01:00
host-pottwal.yml Create spaceapi.n39.eu site on pottwal 2023-07-02 16:31:38 +02:00
host-radon.yml 🎨 Change alias for BrotherQL WebUI to labelprinter 2023-07-09 10:17:23 +02:00
host-tau.yml 🔧 Use share-link for discord forward to gather some statistics 2023-05-01 14:00:37 +02:00
host-unicorn.yml 🔧 Move docker_setup role application to group playbook 2022-12-21 19:00:22 +01:00
inventory.yml feat: add initial work to configure cisco router 2023-07-13 23:44:00 +02:00
main.yml 🔧 Move docker_setup role application to group playbook 2022-12-21 19:00:22 +01:00
README.md Merge pull request 'docs: add command to verify changes' (!112) from add-verification-docs into master 2022-11-12 15:43:51 +01:00
requirements.yml ⬆️ Bump role version to v0.2.1 2023-01-11 18:26:33 +01:00
setup-ssh.yml 🚨 Fix new-line-at-end-of-file warnings 2022-11-18 08:50:33 +01:00
switch-cisco-2960s.yml feat: add initial work to configure cisco router 2023-07-13 23:44:00 +02:00

Ansible configuration for the Netz39 infrastructure

This call lists all hosts defined in the inventory:

ansible all --list-hosts

Setup

ansible-galaxy install -r requirements.yml

Setup SSH Access to hosts

LOGUSER=<loguser>
SSH_KEY=<absolute/path/to/ssh/private/key>
ansible-playbook setup-ssh.yml --ask-vault-pass -e "setup_ssh_logname=$LOGUSER" -e "setup_ssh_key=$SSH_KEY"

Edit vault encrypted vars files

ansible-vault edit group_vars/all/vault

Call with

ansible-playbook --ask-vault-pass main.yml

You need to provide a user with sudo rights and the vault password.

Verify Changes

ansible-lint main.yml
ansible-playbook --ask-vault-pass main.yml --check --diff

HTTPS ingress configuration

HTTPS ingress is controlled by the server holmium and forwarded to the configured servers.

To set up a new HTTPS vhost, the following steps need to be taken:

  1. Select a domain (for internal services we use sub-domains of .n39.eu).
  2. Create an external CNAME from this domain to dyndns.n39.eu.
  3. Create an internal DNS entry in the Descartes DNS config. This is usually an alias on an existing server.
  4. Add the entry to the holmium playbook.
  5. Set up Dehydrated and vhost on the target host, e.g. using setup_http_site_proxy.

Do not forget to execute all playbooks with relevant changes.