Ansible configuration for the Netz39 infrastructure
Find a file
Christof Schulze 41243266e0 prosody: plugin_paths cleared
we do not need community moules, therefore no path needs to be specified
2025-04-06 18:30:25 +02:00
files prosody.cfg: migrated to 0.12 2025-04-06 18:30:25 +02:00
group_vars Adjust variable docker_image_prune to change in netz39.host_docker 0.5.0 2025-03-05 12:00:46 +01:00
host_vars Update netz39/ampel-controller Docker tag to v0.2.0 2025-03-23 21:53:57 +01:00
roles 🚨 roles: Fix remaining fqcn linter warnings 2025-03-09 19:00:21 +01:00
templates prosody: plugin_paths cleared 2025-04-06 18:30:25 +02:00
.editorconfig Add EditorConfig configuration file 2022-01-08 13:25:36 +01:00
.gitignore git: add ansible vault pass to gitignore 2023-07-25 23:26:23 +02:00
.mailmap 📝 mailmap: Merge some new identies 2025-02-27 21:59:00 +01:00
.yamllint 🔧 yamllint: Disable comment-indentation warnings 2025-02-20 08:23:17 +01:00
ansible.cfg feat: add nicer rendering to ansible config 2022-10-24 16:33:16 +00:00
configure-grafana.yml update requirements.yml to correctly install collection 2022-11-12 15:31:51 +01:00
group-all.yml 🚨 group: all: Fix fqcn linter warnings 2025-03-09 19:00:21 +01:00
group-docker_host.yml Merge pull request 'Fix linter warnings of type 'name'' () from alex/netz39-infra-ansible:lint into master 2025-03-05 18:13:58 +01:00
group-k3s.yml 🚨 Add names to plays to fix name[play] linter warnings 2025-03-02 09:22:05 +01:00
group-proxmox.yml 🚨 Add names to plays to fix name[play] linter warnings 2025-03-02 09:22:05 +01:00
host-beaker.yml 🚨 Add names to plays to fix name[play] linter warnings 2025-03-02 09:22:05 +01:00
host-hobbes.yml 🚨 Add names to plays to fix name[play] linter warnings 2025-03-02 09:22:05 +01:00
host-holmium.yml 🚨 Add names to plays to fix name[play] linter warnings 2025-03-02 09:22:05 +01:00
host-krypton.yml 🚨 host: krypton: Fix fqcn linter warnings 2025-03-09 19:00:21 +01:00
host-oganesson.yml 🚨 Add names to plays to fix name[play] linter warnings 2025-03-02 09:22:05 +01:00
host-platon.yml 🚨 host: platon: Fix fqcn linter warnings 2025-03-09 19:00:21 +01:00
host-plumbum.yml 🚨 Add names to plays to fix name[play] linter warnings 2025-03-02 09:22:05 +01:00
host-pottwal.yml ✏️ host: pottwal: Fix misleading task name 2025-03-19 22:00:12 +01:00
host-radon.yml 🚨 host: radon: Fix fqcn linter warnings 2025-03-09 19:00:21 +01:00
host-tau.yml ✏️ host: tau: Fix misleading task name 2025-03-14 08:50:56 +01:00
host-unicorn.yml 🚨 host: unicorn: Fix fqcn linter warning 2025-03-09 19:00:21 +01:00
host-wittgenstein.yml 🚨 host: wittgenstein: Fix fqcn linter warnings 2025-03-09 19:00:21 +01:00
inventory.yml Add wittgenstein to docker group 2025-03-05 12:26:17 +01:00
main.yml Add wittgenstein to main playbook 2024-11-02 23:01:13 +01:00
README.md Make a note about adding SSH keys to host Rhodium 2025-01-13 10:31:59 +01:00
renovate.json Allow automerge for renovate/renovate 2025-03-12 14:26:05 +01:00
requirements.yml Update dependency 24367dfa.dehydrated to v2.1.0 2025-03-23 20:23:14 +00:00
setup-ssh.yml 🚨 Fix linter warning of type 'name[template]' 2025-03-01 22:09:10 +01:00

Ansible configuration for the Netz39 infrastructure

This call lists all hosts defined in the inventory:

ansible all --list-hosts

Setup

ansible-galaxy install -r requirements.yml

Setup SSH Access to hosts

LOGUSER=<loguser>
SSH_KEY=<absolute/path/to/ssh/private/key>
ansible-playbook setup-ssh.yml --ask-vault-pass -e "setup_ssh_logname=$LOGUSER" -e "setup_ssh_key=$SSH_KEY"

This playbook also adds rhodium.n39.eu (OpenWRT router), but our Ansible cannot set up SSH keys (yet). Please add your key to OpenWRT manually.

Edit vault encrypted vars files

ansible-vault edit group_vars/all/vault

Call with

ansible-playbook --ask-vault-pass main.yml

You need to provide a user with sudo rights and the vault password.

Verify Changes

ansible-lint main.yml
ansible-playbook --ask-vault-pass main.yml --check --diff

HTTPS ingress configuration

HTTPS ingress is controlled by the server holmium and forwarded to the configured servers.

To set up a new HTTPS vhost, the following steps need to be taken:

  1. Select a domain (for internal services we use sub-domains of .n39.eu).
  2. Create an external CNAME from this domain to dyndns.n39.eu.
  3. Create an internal DNS entry in the Descartes DNS config. This is usually an alias on an existing server.
  4. Add the entry to the holmium playbook.
  5. Set up Dehydrated and vhost on the target host, e.g. using setup_http_site_proxy.

Do not forget to execute all playbooks with relevant changes.