Compare commits
3 Commits
main
...
8414_Add_m
Author | SHA1 | Date |
---|---|---|
|
b541b42584 | |
|
e0c9f2d1b0 | |
|
6984cd1ece |
|
@ -1,6 +0,0 @@
|
|||
- name: Configure bind9 name server
|
||||
hosts: all
|
||||
tasks:
|
||||
- name: Configure services to install in the server
|
||||
import_role:
|
||||
name: ns
|
|
@ -1,6 +0,0 @@
|
|||
- name: Configure IPsec StrongSwan
|
||||
hosts: all
|
||||
tasks:
|
||||
- name: Configure services to install in the server
|
||||
import_role:
|
||||
name: ipsec
|
|
@ -1,4 +1,4 @@
|
|||
command[check_total_procs]=/usr/lib/nagios/plugins/check_procs -w 1300 -c 1500
|
||||
command[check_total_procs]=/usr/lib/nagios/plugins/check_procs -w 700 -c 1000
|
||||
command[check_chrony]=/usr/lib/nagios/plugins/check_chrony 1 2
|
||||
command[check_smartdisk]=/etc/nagios/plugins/check_smartdisk.sh /dev/sda /dev/sdb
|
||||
command[check_raid]=/usr/lib/nagios/plugins/check_raid
|
|
@ -1,163 +0,0 @@
|
|||
#!/usr/bin/env python3
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# Copyright (c) 2013 Catalyst IT http://www.catalyst.net.nz
|
||||
# Copyright (c) 2015 SWITCH http://www.switch.ch
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
|
||||
from __future__ import print_function
|
||||
import argparse
|
||||
import socket
|
||||
import os
|
||||
import re
|
||||
import subprocess
|
||||
import sys
|
||||
import json
|
||||
|
||||
__version__ = '1.5.0'
|
||||
|
||||
# default ceph values
|
||||
CEPH_EXEC = '/usr/bin/ceph'
|
||||
CEPH_COMMAND = 'quorum_status'
|
||||
|
||||
# nagios exit code
|
||||
STATUS_OK = 0
|
||||
STATUS_WARNING = 1
|
||||
STATUS_ERROR = 2
|
||||
STATUS_UNKNOWN = 3
|
||||
|
||||
##
|
||||
# ceph quorum_status output example
|
||||
##
|
||||
ceph_quorum_status_output_example = '''{
|
||||
"quorum_leader_name" : "s0001",
|
||||
"monmap" : {
|
||||
"mons" : [
|
||||
{
|
||||
"name" : "s0001",
|
||||
"addr" : "[2001:620:5ca1:8000::1001]:6789/0",
|
||||
"rank" : 0
|
||||
},
|
||||
{
|
||||
"name" : "s0003",
|
||||
"addr" : "[2001:620:5ca1:8000::1003]:6789/0",
|
||||
"rank" : 1
|
||||
}
|
||||
],
|
||||
"created" : "2014-12-15 08:28:35.153650",
|
||||
"epoch" : 2,
|
||||
"modified" : "2014-12-15 08:28:40.371878",
|
||||
"fsid" : "22348d2b-b69d-46cc-9a79-ca93cd6bae84"
|
||||
},
|
||||
"quorum_names" : [
|
||||
"s0001",
|
||||
"s0003"
|
||||
],
|
||||
"quorum" : [
|
||||
0,
|
||||
1
|
||||
],
|
||||
"election_epoch" : 24
|
||||
}'''
|
||||
|
||||
def main():
|
||||
|
||||
# parse args
|
||||
parser = argparse.ArgumentParser(description="'ceph quorum_status' nagios plugin.")
|
||||
parser.add_argument('-e','--exe', help='ceph executable [%s]' % CEPH_EXEC)
|
||||
parser.add_argument('-c','--conf', help='alternative ceph conf file')
|
||||
parser.add_argument('-m','--monaddress', help='ceph monitor to use for queries (address[:port])')
|
||||
parser.add_argument('-i','--id', help='ceph client id')
|
||||
parser.add_argument('-k','--keyring', help='ceph client keyring file')
|
||||
parser.add_argument('-V','--version', help='show version and exit', action='store_true')
|
||||
parser.add_argument('-I','--monid', help='mon ID to be checked for availability')
|
||||
args = parser.parse_args()
|
||||
|
||||
if args.version:
|
||||
print('version %s' % __version__)
|
||||
return STATUS_OK
|
||||
|
||||
# validate args
|
||||
ceph_exec = args.exe if args.exe else CEPH_EXEC
|
||||
if not os.path.exists(ceph_exec):
|
||||
print("MON ERROR: ceph executable '%s' doesn't exist" % ceph_exec)
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
if args.conf and not os.path.exists(args.conf):
|
||||
print("MON ERROR: ceph conf file '%s' doesn't exist" % args.conf)
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
if args.keyring and not os.path.exists(args.keyring):
|
||||
print("MON ERROR: keyring file '%s' doesn't exist" % args.keyring)
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
if not args.monid:
|
||||
print("MON ERROR: no MON ID given, use -I/--monid parameter")
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
# build command
|
||||
ceph_cmd = [ceph_exec]
|
||||
if args.monaddress:
|
||||
ceph_cmd.append('-m')
|
||||
ceph_cmd.append(args.monaddress)
|
||||
if args.conf:
|
||||
ceph_cmd.append('-c')
|
||||
ceph_cmd.append(args.conf)
|
||||
if args.id:
|
||||
ceph_cmd.append('--id')
|
||||
ceph_cmd.append(args.id)
|
||||
if args.keyring:
|
||||
ceph_cmd.append('--keyring')
|
||||
ceph_cmd.append(args.keyring)
|
||||
ceph_cmd.append(CEPH_COMMAND)
|
||||
|
||||
# exec command
|
||||
p = subprocess.Popen(ceph_cmd,stdout=subprocess.PIPE,stderr=subprocess.PIPE)
|
||||
output, err = p.communicate()
|
||||
|
||||
if p.returncode != 0 or not output:
|
||||
print("MON ERROR: %s" % err)
|
||||
return STATUS_ERROR
|
||||
|
||||
# load json output and parse
|
||||
quorum_status = False
|
||||
try:
|
||||
quorum_status = json.loads(output)
|
||||
except Exception as e:
|
||||
print("MON ERROR: could not parse '%s' output: %s: %s" % (CEPH_COMMAND,output,e))
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
#print "XXX: quorum_status['quorum_names']:", quorum_status['quorum_names']
|
||||
|
||||
# do our checks
|
||||
is_monitor = False
|
||||
for mon in quorum_status['monmap']['mons']:
|
||||
if mon['name'] == args.monid:
|
||||
is_monitor = True
|
||||
if not is_monitor:
|
||||
print("MON WARN: mon '%s' is not in monmap: %s" % (args.monid,quorum_status['monmap']['mons']))
|
||||
return STATUS_WARNING
|
||||
|
||||
in_quorum = args.monid in quorum_status['quorum_names']
|
||||
if in_quorum:
|
||||
print("MON OK")
|
||||
return STATUS_OK
|
||||
else:
|
||||
print("MON WARN: no MON '%s' found in quorum" % args.monid)
|
||||
return STATUS_WARNING
|
||||
|
||||
# main
|
||||
if __name__ == "__main__":
|
||||
sys.exit(main())
|
|
@ -1,154 +0,0 @@
|
|||
#!/usr/bin/env python3
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# Copyright (c) 2013 Catalyst IT http://www.catalyst.net.nz
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
# 1.5.2 (2019-06-16) Martin Seener: fixed regex to work with Ceph Nautilus (14.2.x)
|
||||
|
||||
from __future__ import print_function
|
||||
import argparse
|
||||
import os
|
||||
import re
|
||||
import subprocess
|
||||
import sys
|
||||
import socket
|
||||
|
||||
__version__ = '1.5.2'
|
||||
|
||||
# default ceph values
|
||||
CEPH_COMMAND = '/usr/bin/ceph'
|
||||
|
||||
# nagios exit code
|
||||
STATUS_OK = 0
|
||||
STATUS_WARNING = 1
|
||||
STATUS_ERROR = 2
|
||||
STATUS_UNKNOWN = 3
|
||||
|
||||
def main():
|
||||
|
||||
# parse args
|
||||
parser = argparse.ArgumentParser(description="'ceph osd' nagios plugin.")
|
||||
parser.add_argument('-e','--exe', help='ceph executable [%s]' % CEPH_COMMAND)
|
||||
parser.add_argument('-c','--conf', help='alternative ceph conf file')
|
||||
parser.add_argument('-m','--monaddress', help='ceph monitor address[:port]')
|
||||
parser.add_argument('-i','--id', help='ceph client id')
|
||||
parser.add_argument('-k','--keyring', help='ceph client keyring file')
|
||||
parser.add_argument('-V','--version', help='show version and exit', action='store_true')
|
||||
parser.add_argument('-H','--host', help='osd host', required=True)
|
||||
parser.add_argument('-I','--osdid', help='osd id', required=False)
|
||||
parser.add_argument('-C','--crit', help='Number of failed OSDs to trigger critical (default=2)',type=int,default=2, required=False)
|
||||
parser.add_argument('-o','--out', help='check osds that are set OUT', default=False, action='store_true', required=False)
|
||||
args = parser.parse_args()
|
||||
|
||||
# validate args
|
||||
ceph_exec = args.exe if args.exe else CEPH_COMMAND
|
||||
if not os.path.exists(ceph_exec):
|
||||
print("OSD ERROR: ceph executable '%s' doesn't exist" % ceph_exec)
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
if args.version:
|
||||
print('version %s' % __version__)
|
||||
return STATUS_OK
|
||||
|
||||
if args.conf and not os.path.exists(args.conf):
|
||||
print("OSD ERROR: ceph conf file '%s' doesn't exist" % args.conf)
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
if args.keyring and not os.path.exists(args.keyring):
|
||||
print("OSD ERROR: keyring file '%s' doesn't exist" % args.keyring)
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
if not args.osdid:
|
||||
args.osdid = '[^ ]*'
|
||||
|
||||
if not args.host:
|
||||
print("OSD ERROR: no OSD hostname given")
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
try:
|
||||
addrinfo = socket.getaddrinfo(args.host, None, 0, socket.SOCK_STREAM)
|
||||
args.host = addrinfo[0][-1][0]
|
||||
if addrinfo[0][0] == socket.AF_INET6:
|
||||
args.host = "[%s]" % args.host
|
||||
except:
|
||||
print('OSD ERROR: could not resolve %s' % args.host)
|
||||
return STATUS_UNKNOWN
|
||||
|
||||
|
||||
# build command
|
||||
ceph_cmd = [ceph_exec]
|
||||
if args.monaddress:
|
||||
ceph_cmd.append('-m')
|
||||
ceph_cmd.append(args.monaddress)
|
||||
if args.conf:
|
||||
ceph_cmd.append('-c')
|
||||
ceph_cmd.append(args.conf)
|
||||
if args.id:
|
||||
ceph_cmd.append('--id')
|
||||
ceph_cmd.append(args.id)
|
||||
if args.keyring:
|
||||
ceph_cmd.append('--keyring')
|
||||
ceph_cmd.append(args.keyring)
|
||||
ceph_cmd.append('osd')
|
||||
ceph_cmd.append('dump')
|
||||
|
||||
# exec command
|
||||
p = subprocess.Popen(ceph_cmd,stdout=subprocess.PIPE,stderr=subprocess.PIPE)
|
||||
output, err = p.communicate()
|
||||
output = output.decode('utf8')
|
||||
|
||||
if err or not output:
|
||||
print("OSD ERROR: %s" % err)
|
||||
return STATUS_ERROR
|
||||
|
||||
# escape IPv4 host address
|
||||
osd_host = args.host.replace('.', '\.')
|
||||
# escape IPv6 host address
|
||||
osd_host = osd_host.replace('[', '\[')
|
||||
osd_host = osd_host.replace(']', '\]')
|
||||
up = re.findall(r"^(osd\.%s) up.*%s:" % (args.osdid, osd_host), output, re.MULTILINE)
|
||||
if args.out:
|
||||
down = re.findall(r"^(osd\.%s) down.*%s:" % (args.osdid, osd_host), output, re.MULTILINE)
|
||||
down_in = re.findall(r"^(osd\.%s) down[ ]+in.*%s:" % (args.osdid, osd_host), output, re.MULTILINE)
|
||||
down_out = re.findall(r"^(osd\.%s) down[ ]+out.*%s:" % (args.osdid, osd_host), output, re.MULTILINE)
|
||||
else:
|
||||
down = re.findall(r"^(osd\.%s) down[ ]+in.*%s:" % (args.osdid, osd_host), output, re.MULTILINE)
|
||||
down_in = down
|
||||
down_out = re.findall(r"^(osd\.%s) down[ ]+out.*%s:" % (args.osdid, osd_host), output, re.MULTILINE)
|
||||
|
||||
if down:
|
||||
print("OSD %s: Down OSD%s on %s: %s" % ('CRITICAL' if len(down)>=args.crit else 'WARNING' ,'s' if len(down)>1 else '', args.host, " ".join(down)))
|
||||
print("Up OSDs: " + " ".join(up))
|
||||
print("Down+In OSDs: " + " ".join(down_in))
|
||||
print("Down+Out OSDs: " + " ".join(down_out))
|
||||
print("| 'osd_up'=%d 'osd_down_in'=%d;;%d 'osd_down_out'=%d;;%d" % (len(up), len(down_in), args.crit, len(down_out), args.crit))
|
||||
if len(down)>=args.crit:
|
||||
return STATUS_ERROR
|
||||
else:
|
||||
return STATUS_WARNING
|
||||
|
||||
if up:
|
||||
print("OSD OK")
|
||||
print("Up OSDs: " + " ".join(up))
|
||||
print("Down+In OSDs: " + " ".join(down_in))
|
||||
print("Down+Out OSDs: " + " ".join(down_out))
|
||||
print("| 'osd_up'=%d 'osd_down_in'=%d;;%d 'osd_down_out'=%d;;%d" % (len(up), len(down_in), args.crit, len(down_out), args.crit))
|
||||
return STATUS_OK
|
||||
|
||||
print("OSD WARN: no OSD.%s found on host %s" % (args.osdid, args.host))
|
||||
return STATUS_WARNING
|
||||
|
||||
if __name__ == "__main__":
|
||||
sys.exit(main())
|
|
@ -1,128 +0,0 @@
|
|||
#!/usr/bin/env perl
|
||||
#===============================================================================
|
||||
# DESCRIPTION: Icinga2 / Nagios Check for chrony time sync status and offset
|
||||
#
|
||||
# OPTIONS: -h : Help
|
||||
# -w [warning threshold in seconds]
|
||||
# -c [critical threshold in seconds]
|
||||
#
|
||||
# REQUIREMENTS: Chrony, perl version 5.10.1+
|
||||
#
|
||||
# AUTHOR: Dennis Ullrich (request@decstasy.de)
|
||||
#
|
||||
# BUGS ETC: https://github.com/Decstasy/check_chrony
|
||||
#
|
||||
# LICENSE: GPL v3 (GNU General Public License, Version 3)
|
||||
# see https://www.gnu.org/licenses/gpl-3.0.txt
|
||||
#===============================================================================
|
||||
|
||||
use 5.10.1;
|
||||
use strict;
|
||||
use warnings;
|
||||
use utf8;
|
||||
use Getopt::Std;
|
||||
|
||||
#
|
||||
# Variables
|
||||
#
|
||||
my $chronyDaemonName = "chronyd";
|
||||
my $leapOk = "Normal";
|
||||
|
||||
my $rc = 3;
|
||||
my $msg= "";
|
||||
my $perfdata = "";
|
||||
|
||||
#
|
||||
# Subroutines
|
||||
#
|
||||
|
||||
sub help {
|
||||
print "check_chrony [options]
|
||||
-w [warning threshold in seconds]
|
||||
-c [critical threshold in seconds]
|
||||
e.g.: check_chrony -w 0.6 -c 2\n";
|
||||
exit(3);
|
||||
}
|
||||
|
||||
# Script exit with Nagios / Icinga typical output
|
||||
sub _exit {
|
||||
my ( $return, $line ) = @_;
|
||||
my @state = ( "OK", "WARNING", "CRITICAL", "UNKNOWN" );
|
||||
print "$state[$return]: $line\n";
|
||||
exit( $return );
|
||||
}
|
||||
|
||||
# Checks if a process with $_[0] as name exists
|
||||
sub proc_exists {
|
||||
my $PID = `ps -C $_[0] -o pid=`;
|
||||
if ( ${^CHILD_ERROR_NATIVE} == 0 ){
|
||||
return 1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
#
|
||||
# Options
|
||||
#
|
||||
|
||||
my %options=();
|
||||
getopts( "hw:c:", \%options );
|
||||
|
||||
# Check input
|
||||
if ( keys %options == 0 || defined $options{h} ){
|
||||
&help;
|
||||
}
|
||||
|
||||
for my $key ( keys %options ){
|
||||
if ( $options{$key} !~ /^[\d\.]+$/ ){
|
||||
&_exit( 3, "Value of option -$key is not a valid number!" );
|
||||
}
|
||||
}
|
||||
|
||||
#
|
||||
# Check chrony process
|
||||
#
|
||||
|
||||
&_exit( 2, "$chronyDaemonName is not running!" ) if not &proc_exists( $chronyDaemonName );
|
||||
|
||||
#
|
||||
# Get tracking data
|
||||
#
|
||||
|
||||
my $chronyOutput = `chronyc tracking`;
|
||||
&_exit( 3, "Chronyc tracking command failed!" ) if ${^CHILD_ERROR_NATIVE} != 0;
|
||||
|
||||
my ( $offset, $dir ) = $chronyOutput =~ /(?:System\stime)[^\d]+([\d\.]+)(?:.*?)(fast|slow)/;
|
||||
my ( $leap ) = $chronyOutput =~ /(?:Leap)[^\:]+(?::\s+)([\w\h]+)/;
|
||||
|
||||
#
|
||||
# Check stuff
|
||||
#
|
||||
|
||||
# Check offset
|
||||
if ( $offset >= $options{"c"} ){
|
||||
$rc = 2; # Critical
|
||||
}
|
||||
elsif ( $offset >= $options{"w"} ){
|
||||
$rc = 1; # Warning
|
||||
}
|
||||
else {
|
||||
$rc = 0; # Ok
|
||||
}
|
||||
|
||||
# Prepare offset performace data
|
||||
$offset = $dir =~ "slow" ? "-$offset" : "+$offset";
|
||||
$msg = sprintf( "Time offset of %+.9f seconds to reference.", $offset);
|
||||
$perfdata = sprintf( "|offset=%.9fs;%.9f;%.9f", ${offset}, $options{'w'}, $options{'c'});
|
||||
|
||||
# Check leap
|
||||
if( $leap !~ $leapOk ){
|
||||
&_exit( 2, "Chrony leap status \"$leap\" is not equal to \"$leapOk\"! $msg $perfdata" );
|
||||
}
|
||||
|
||||
#
|
||||
# Return stuff
|
||||
#
|
||||
|
||||
&_exit($rc, "$msg $perfdata");
|
||||
|
|
@ -1 +0,0 @@
|
|||
nagios ALL=(root) NOPASSWD: /usr/sbin/smartctl,/sbin/dmsetup
|
|
@ -1,2 +1,8 @@
|
|||
- import_tasks: nrpe.yml
|
||||
tags: nrpe
|
||||
- name: Set NRPE Ceph configuration
|
||||
copy:
|
||||
src: nrpe.cfg
|
||||
dest: /etc/nagios/nrpe.d/95-ceph.cfg
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
notify: restart-nrpe
|
||||
|
|
|
@ -1,24 +0,0 @@
|
|||
- name: Set NRPE Ceph configuration
|
||||
copy:
|
||||
src: nrpe.d/95-ceph.cfg
|
||||
dest: /etc/nagios/nrpe.d/
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
notify: restart-nrpe
|
||||
- name: Copy Ceph NRPE plugins
|
||||
copy:
|
||||
src: plugins/
|
||||
dest: /etc/nagios/plugins/
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rwx,g=rx,o=rx
|
||||
notify: restart-nrpe
|
||||
- name: Add nagios to sudoers
|
||||
copy:
|
||||
src: sudoers
|
||||
dest: /etc/sudoers.d/nagios
|
||||
mode: u=rw,g=r,o=
|
||||
owner: root
|
||||
group: root
|
||||
notify: restart-nrpe
|
|
@ -29,14 +29,10 @@ required_mariabackup_files_and_scripts:
|
|||
- { src: scripts/check-memory.sh, dest: /root/scripts/check-memory.sh, mode: u=rwx,g=rx,o=rx }
|
||||
- { src: scripts/export-privs.sh, dest: /root/scripts/export-privs.sh, mode: u=rwx,g=rx,o=rx }
|
||||
- { src: scripts/mysqltuner.pl, dest: /root/scripts/mysqltuner.pl, mode: u=rwx,g=rx,o=rx }
|
||||
- { src: scripts/role-change.sh, dest: /root/scripts/role-change.sh, mode: u=rwx,g=rx,o=rx }
|
||||
- { src: scripts/events-promote.sh, dest: /root/scripts/events-promote.sh, mode: u=rwx,g=rx,o=rx }
|
||||
- { src: scripts/events-demote.sh, dest: /root/scripts/events-demote.sh, mode: u=rwx,g=rx,o=rx }
|
||||
- { src: scripts/README.md, dest: /root/scripts/README.md, mode: u=rw,g=r,o=r }
|
||||
- { src: scripts/scheduler-log.sh, dest: /root/scripts/scheduler-log.sh, mode: u=rwx,g=rx,o=rx }
|
||||
configuration_files:
|
||||
- { src: "conf/z99-local.cnf", dest: "/etc/mysql/mariadb.conf.d/z99-local.cnf", owner: "root", group: "root", mode: "u=rw,g=r,o=r" }
|
||||
- { src: "mariabackup/my.cnf", dest: "/root/mariabackup/my.cnf", owner: "root", group: "root", mode: "u=rw,g=,o=" }
|
||||
- { src: "pmm-agent.yaml", dest: "/usr/local/percona/pmm2/config/pmm-agent.yaml", owner: "pmm-agent", group: "pmm-agent", mode: "u=rw,g=rw,o=" }
|
||||
- { src: "check-memory.cron", dest: "/etc/cron.d/vn-check-memory", owner: "root", group: "root", mode: "u=rw,g=r,o=r" }
|
||||
downloads:
|
||||
- url: https://r.mariadb.com/downloads/mariadb_repo_setup
|
||||
dest: /tmp/mariadb_repo_setup
|
||||
|
@ -44,8 +40,3 @@ downloads:
|
|||
- url: https://repo.percona.com/apt/percona-release_latest.generic_all.deb
|
||||
dest: /tmp/percona-release_latest.generic_all.deb
|
||||
mode: u=rw,g=r,o=r
|
||||
clean_config_and_scripts:
|
||||
- { path: /root/scripts/events-promote.sh }
|
||||
- { path: /root/scripts/events-demote.sh }
|
||||
- { path: /root/scripts/promote-master.sh }
|
||||
- { path: /root/scripts/promote-slave.sh }
|
|
@ -30,7 +30,7 @@ interactive_timeout = 1800
|
|||
wait_timeout = 1800
|
||||
open_files_limit = 20000
|
||||
low_priority_updates = 1
|
||||
table_open_cache = 50000
|
||||
table_open_cache = 40000
|
||||
table_definition_cache = 10000
|
||||
table_open_cache_instances = 1
|
||||
key_buffer_size = 256K
|
||||
|
|
|
@ -3,3 +3,4 @@ command[check_disk_mysqlbin]=/usr/lib/nagios/plugins/check_disk -w 10% -c 5% -p
|
|||
command[check_disk_backup]=/usr/lib/nagios/plugins/check_disk -w 10% -c 5% -p /mnt/local-backup
|
||||
command[check_mysql_scheduler]=/etc/nagios/plugins/check_mysql_scheduler
|
||||
command[check_total_procs]=/usr/lib/nagios/plugins/check_procs -w 600 -c 700
|
||||
|
||||
|
|
|
@ -0,0 +1,6 @@
|
|||
[Unit]
|
||||
Description=Collect system processes and stats
|
||||
|
||||
[Service]
|
||||
Type=oneshot
|
||||
ExecStart=/root/scripts/collect_processes.sh
|
|
@ -0,0 +1,9 @@
|
|||
[Unit]
|
||||
Description=Timer for collecting system processes and stats
|
||||
|
||||
[Timer]
|
||||
OnCalendar=*-*-* 00..05:00/5:00 Europe/Madrid
|
||||
Persistent=true
|
||||
|
||||
[Install]
|
||||
WantedBy=timers.target
|
|
@ -0,0 +1,97 @@
|
|||
#!/bin/bash
|
||||
# Script to collect system and process data for monitoring.
|
||||
#
|
||||
# Author: Xavi Lleó
|
||||
# Copyright (c) 2025 Verdnatura S.L. All rights reserved.
|
||||
# Version: 1.0.0
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
#
|
||||
# Description:
|
||||
# This script collects system statistics and process information
|
||||
# and logs it to a file in /var/log/processes. It includes:
|
||||
# - CPU and memory usage with `top`
|
||||
# - Process queue statistics with `sar`
|
||||
# - Nagios process count check
|
||||
# - MySQL process list
|
||||
#
|
||||
# Execution:
|
||||
# The script is designed to be executed by a systemd timer every 5 minutes
|
||||
# between 02:30 and 06:30 AM daily. The timer is configured to run the
|
||||
# script located at /usr/local/bin/monitor_processes.sh.
|
||||
#
|
||||
# Log Location:
|
||||
# The log file will be stored in /var/log/processes with a timestamp in the filename.
|
||||
#
|
||||
# Example Timer Configuration:
|
||||
# The following systemd timer will execute the script every 5 minutes
|
||||
# between 02:30 and 06:30 AM:
|
||||
#
|
||||
# [Timer]
|
||||
# OnCalendar=*-*-* 02:30:00
|
||||
# Persistent=true
|
||||
# OnBootSec=10min
|
||||
# OnUnitActiveSec=5min
|
||||
# Until=*-*-* 06:30:00
|
||||
#
|
||||
# [Service]
|
||||
# Type=oneshot
|
||||
# ExecStart=/usr/local/bin/monitor_processes.sh
|
||||
#
|
||||
# Ensure that the systemd timer and service are enabled to run as expected.
|
||||
|
||||
LOG_DIR="/var/log/processes"
|
||||
mkdir -p "$LOG_DIR"
|
||||
|
||||
timestamp() {
|
||||
date +'%Y_%m_%d-%H:%M:%S'
|
||||
}
|
||||
|
||||
LOG_FILE="$LOG_DIR/processes_$(timestamp).log"
|
||||
|
||||
log() {
|
||||
echo "$1" >> "$LOG_FILE"
|
||||
}
|
||||
|
||||
check_command() {
|
||||
command -v "$1" >/dev/null 2>&1
|
||||
}
|
||||
|
||||
log "Process and system data collection - $(timestamp)"
|
||||
log "-------------------------------------------"
|
||||
|
||||
commands=(
|
||||
"/usr/bin/top -b -n 1"
|
||||
"/usr/bin/sar -q 1 10"
|
||||
"/usr/lib/nagios/plugins/check_procs"
|
||||
"/usr/bin/mysql -Bse 'show processlist;'"
|
||||
)
|
||||
|
||||
for cmd in "${commands[@]}"; do
|
||||
cmd_name=$(echo $cmd | cut -d' ' -f1)
|
||||
|
||||
if check_command "$cmd_name"; then
|
||||
log "### Executing $cmd_name ###"
|
||||
eval $cmd >> "$LOG_FILE" 2>&1
|
||||
if [ $? -ne 0 ]; then
|
||||
log "Error executing '$cmd_name'"
|
||||
fi
|
||||
else
|
||||
log "Skipping execution of '$cmd_name' due to missing command"
|
||||
fi
|
||||
done
|
||||
|
||||
log "-------------------------------------------"
|
||||
log "Log finished - $(timestamp)"
|
||||
|
|
@ -0,0 +1,16 @@
|
|||
#!/bin/bash
|
||||
|
||||
mysql -e "SET GLOBAL event_scheduler = OFF"
|
||||
|
||||
echo "SELECT db, name FROM mysql.event WHERE status = 'ENABLED'" | mysql --raw --silent | \
|
||||
awk '{
|
||||
gsub("`", "``", $1);
|
||||
gsub("`", "``", $2);
|
||||
print "`"$1"`.`"$2"`";
|
||||
}' | \
|
||||
while read event; do
|
||||
mysql -e "ALTER EVENT $event DISABLE ON SLAVE"
|
||||
done
|
||||
|
||||
mysql -e "SET GLOBAL event_scheduler = ON"
|
||||
|
|
@ -0,0 +1,15 @@
|
|||
#!/bin/bash
|
||||
|
||||
mysql -e "SET GLOBAL event_scheduler = OFF"
|
||||
|
||||
echo "SELECT db, name FROM mysql.event WHERE status = 'SLAVESIDE_DISABLED'" | mysql --raw --silent | \
|
||||
awk '{
|
||||
gsub("`", "``", $1);
|
||||
gsub("`", "``", $2);
|
||||
print "`"$1"`.`"$2"`";
|
||||
}' | \
|
||||
while read event; do
|
||||
mysql -e "ALTER EVENT $event ENABLE"
|
||||
done
|
||||
|
||||
mysql -e "SET GLOBAL event_scheduler = ON"
|
|
@ -1,123 +0,0 @@
|
|||
#!/bin/bash
|
||||
# Script to manage MariaDB events during replication role changes.
|
||||
#
|
||||
# Author: Xavi Lleó & GhatGPT ®
|
||||
# Copyright (c) 2025 Verdnatura S.L. All rights reserved.
|
||||
# Version: 1.4.0
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
#
|
||||
# Description:
|
||||
# This script toggles MariaDB events during replication role changes.
|
||||
# It supports three modes:
|
||||
# --promote : Re-enable events previously marked SLAVESIDE_DISABLED
|
||||
# --demote : Disable currently ENABLED events using DISABLE ON SLAVE
|
||||
# --status : Display current status of all events
|
||||
# All actions are logged to /var/log/mariadb_admin.log.
|
||||
|
||||
set -euo pipefail
|
||||
|
||||
LOG_FILE="/var/log/mariadb_admin.log"
|
||||
TIMESTAMP="$(date '+%F %T')"
|
||||
|
||||
log() {
|
||||
echo "$TIMESTAMP - $1" | tee -a "$LOG_FILE"
|
||||
}
|
||||
|
||||
disable_scheduler() {
|
||||
log "Disabling event_scheduler..."
|
||||
if mysql -e "SET GLOBAL event_scheduler = OFF"; then
|
||||
log "Successfully disabled event_scheduler"
|
||||
else
|
||||
log "ERROR: Failed to disable event_scheduler"
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
enable_scheduler() {
|
||||
log "Re-enabling event_scheduler..."
|
||||
if mysql -e "SET GLOBAL event_scheduler = ON"; then
|
||||
log "Successfully re-enabled event_scheduler"
|
||||
else
|
||||
log "ERROR: Failed to re-enable event_scheduler"
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
final_status() {
|
||||
log "Final event_scheduler status:"
|
||||
mysql --table -e "SHOW VARIABLES LIKE 'event_scheduler';" | tee -a "$LOG_FILE"
|
||||
|
||||
log "Final state of all events:"
|
||||
mysql --table -e "SELECT db, name, status FROM mysql.event;" | tee -a "$LOG_FILE"
|
||||
}
|
||||
|
||||
if [[ $# -ne 1 ]]; then
|
||||
echo "Usage: $0 --promote | --demote | --status"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
MODE="$1"
|
||||
|
||||
case "$MODE" in
|
||||
--status)
|
||||
log "Fetching current event_scheduler status:"
|
||||
mysql --table -e "SHOW VARIABLES LIKE 'event_scheduler';" | tee -a "$LOG_FILE"
|
||||
|
||||
log "Fetching current event status:"
|
||||
mysql --table -e "SELECT db, name, status FROM mysql.event;" | tee -a "$LOG_FILE"
|
||||
;;
|
||||
|
||||
--promote)
|
||||
disable_scheduler
|
||||
|
||||
log "Promoting: Enabling events with SLAVESIDE_DISABLED status..."
|
||||
mysql --raw --silent -e "SELECT db, name FROM mysql.event WHERE status = 'SLAVESIDE_DISABLED'" | \
|
||||
awk '{ gsub("`", "``", $1); gsub("`", "``", $2); print "`"$1"`.`"$2"`" }' | \
|
||||
while read -r event; do
|
||||
if mysql -e "ALTER EVENT $event ENABLE"; then
|
||||
log "Enabled event: $event"
|
||||
else
|
||||
log "ERROR: Failed to enable event: $event"
|
||||
fi
|
||||
done
|
||||
|
||||
enable_scheduler
|
||||
final_status
|
||||
;;
|
||||
|
||||
--demote)
|
||||
disable_scheduler
|
||||
|
||||
log "Demoting: Disabling events currently ENABLED..."
|
||||
mysql --raw --silent -e "SELECT db, name FROM mysql.event WHERE status = 'ENABLED'" | \
|
||||
awk '{ gsub("`", "``", $1); gsub("`", "``", $2); print "`"$1"`.`"$2"`" }' | \
|
||||
while read -r event; do
|
||||
if mysql -e "ALTER EVENT $event DISABLE ON SLAVE"; then
|
||||
log "Disabled event: $event"
|
||||
else
|
||||
log "ERROR: Failed to disable event: $event"
|
||||
fi
|
||||
done
|
||||
|
||||
enable_scheduler
|
||||
final_status
|
||||
;;
|
||||
|
||||
*)
|
||||
echo "Invalid mode: $MODE"
|
||||
echo "Usage: $0 --promote | --demote | --status"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
|
@ -9,7 +9,3 @@
|
|||
service:
|
||||
name: nagios-nrpe-server
|
||||
state: restarted
|
||||
- name: restart-percona
|
||||
service:
|
||||
name: pmm-agent.service
|
||||
state: restarted
|
||||
|
|
|
@ -3,29 +3,35 @@
|
|||
name: "{{ mariadb_requeriments }}"
|
||||
state: present
|
||||
install_recommends: no
|
||||
|
||||
- name: Download required setup files
|
||||
get_url:
|
||||
url: "{{ item.url }}"
|
||||
dest: "{{ item.dest }}"
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ downloads }}"
|
||||
|
||||
- name: Run MariaDB repository setup script
|
||||
command:
|
||||
cmd: "/bin/bash /tmp/mariadb_repo_setup --mariadb-server-version={{ db.version | default('10.11.10') }}"
|
||||
creates: "/etc/apt/sources.list.d/mariadb.list"
|
||||
|
||||
- name: Install Percona repository package
|
||||
apt:
|
||||
deb: "/tmp/percona-release_latest.generic_all.deb"
|
||||
state: present
|
||||
install_recommends: no
|
||||
|
||||
- name: Update apt cache
|
||||
apt:
|
||||
update_cache: yes
|
||||
|
||||
- name: Install MariaDB packages
|
||||
apt:
|
||||
name: "{{ mariadb_base_packages }}"
|
||||
state: present
|
||||
install_recommends: no
|
||||
|
||||
- name: Add tmpfs in /etc/fstab
|
||||
blockinfile:
|
||||
path: /etc/fstab
|
||||
|
@ -33,6 +39,15 @@
|
|||
block: |
|
||||
tmpfs /mnt/mysqltmp tmpfs rw,size={{ mysqltmpsize }} 0 0
|
||||
register: fstab
|
||||
|
||||
- name: Configure MariaDB memory check CRON
|
||||
template:
|
||||
src: check-memory.cron
|
||||
dest: /etc/cron.d/vn-check-memory
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
|
||||
- name: Configure MariaDB scheduler log CRON
|
||||
copy:
|
||||
src: scheduler-log.cron
|
||||
|
@ -40,6 +55,7 @@
|
|||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
|
||||
- name: Insert MySQL certificates
|
||||
no_log: true
|
||||
copy:
|
||||
|
@ -50,6 +66,7 @@
|
|||
mode: "{{ item.mode }}"
|
||||
loop: "{{ certificates }}"
|
||||
notify: restart-mariadb
|
||||
|
||||
- name: Ensure required directories exist
|
||||
file:
|
||||
path: "{{ item.path }}"
|
||||
|
@ -58,6 +75,7 @@
|
|||
group: "{{ item.group }}"
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ required_directories }}"
|
||||
|
||||
- name: Copy required MariaBackup files and scripts
|
||||
copy:
|
||||
src: "{{ item.src }}"
|
||||
|
@ -66,15 +84,7 @@
|
|||
group: root
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ required_mariabackup_files_and_scripts }}"
|
||||
- name: Deploy configuration files
|
||||
template:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: "{{ item.owner }}"
|
||||
group: "{{ item.group }}"
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ configuration_files }}"
|
||||
notify: restart-percona
|
||||
|
||||
- name: Set MariaDB common configuration
|
||||
copy:
|
||||
src: conf/z90-vn.cnf
|
||||
|
@ -83,6 +93,23 @@
|
|||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
notify: restart-mariadb
|
||||
|
||||
- name: Set MariaDB local configuration template
|
||||
template:
|
||||
src: conf/z99-local.cnf
|
||||
dest: /etc/mysql/mariadb.conf.d/
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
|
||||
- name: Set MariaBackup connection configuration
|
||||
template:
|
||||
src: mariabackup/my.cnf
|
||||
dest: /root/mariabackup/
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=,o=
|
||||
|
||||
- name: Override MariaDB systemd service configuration
|
||||
copy:
|
||||
src: mariadb_override.conf
|
||||
|
@ -91,6 +118,7 @@
|
|||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
notify: reload-systemd
|
||||
|
||||
- name: Set MariaDB NRPE configuration
|
||||
copy:
|
||||
src: nrpe/95-mariadb.cfg
|
||||
|
@ -99,13 +127,15 @@
|
|||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
notify: restart-nrpe
|
||||
|
||||
- name: Check if /var/lib/mysql/ exists
|
||||
stat:
|
||||
path: /var/lib/mysql/
|
||||
register: mysql_dir
|
||||
|
||||
- when: mysql_dir.stat.exists
|
||||
block:
|
||||
|
||||
|
||||
- name: Sync MySQL data directory
|
||||
synchronize:
|
||||
src: /var/lib/mysql/
|
||||
|
@ -119,12 +149,32 @@
|
|||
file:
|
||||
path: /var/lib/mysql/
|
||||
state: absent
|
||||
|
||||
- name: Mount all filesystems from /etc/fstab
|
||||
command: mount -a
|
||||
when: fstab.changed
|
||||
|
||||
- name: Clean old configs or scripts
|
||||
file:
|
||||
path: "{{ item.path }}"
|
||||
state: absent
|
||||
loop: "{{ clean_config_and_scripts }}"
|
||||
- name: Copy systemd service and timer files
|
||||
copy:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
loop:
|
||||
- { src: 'processes_systemd/process_monitor.service', dest: '/lib/systemd/system/process_monitor.service' }
|
||||
- { src: 'processes_systemd/process_monitor.timer', dest: '/lib/systemd/system/process_monitor.timer' }
|
||||
notify: reload-systemd
|
||||
|
||||
- name: Copy collect_processes script to root path scripts
|
||||
copy:
|
||||
src: scripts/collect_processes.sh
|
||||
dest: /root/scripts/collect_processes.sh
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0755'
|
||||
- name: Enable process_monitor timer without starting it
|
||||
systemd:
|
||||
name: process_monitor.timer
|
||||
enabled: true
|
||||
state: stopped
|
||||
|
|
|
@ -1,8 +1,6 @@
|
|||
[mysqld]
|
||||
|
||||
server-id = {{ serverid }}
|
||||
#log_slave_updates = ON
|
||||
#read_only = ON
|
||||
#bind-address = 127.0.0.1
|
||||
#event-scheduler = OFF
|
||||
#skip-log-bin
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Bacula directory for restore
|
||||
baculaDir=/mnt/local-backup/bacula-restore
|
||||
baculaDir=/mnt/mysqldata/bacula-restore
|
||||
|
||||
# Database branch name
|
||||
dbBranch={{ db.branch }}
|
||||
|
@ -15,7 +15,7 @@ dbClusterSiblings=()
|
|||
# Jenkins authentication string
|
||||
jenkinsAuth=jenkins:{{ lookup(passbolt, 'jenkinsAuth', folder_parent_id=passbolt_folder).password }}
|
||||
|
||||
{% if db.jenkinsJob is defined %}
|
||||
{% if db.jenkinsUrl is defined %}
|
||||
# Jenkins job URL
|
||||
jenkinsUrl={{ jenkinsUrl }}{{ db.jenkinsJob }}
|
||||
jenkinsUrl={{ db.jenkinsUrl }}
|
||||
{% endif %}
|
||||
|
|
|
@ -1,34 +0,0 @@
|
|||
# Updated by `pmm-agent setup`.
|
||||
---
|
||||
id: /agent_id/{{ pmm.id }}
|
||||
listen-address: 127.0.0.1
|
||||
listen-port: 7777
|
||||
server:
|
||||
address: {{ pmm.address }}
|
||||
username: {{ pmm.username }}
|
||||
password: {{ pmm.password }}
|
||||
insecure-tls: {{ pmm.insecure }}
|
||||
paths:
|
||||
paths_base: /usr/local/percona/pmm2
|
||||
exporters_base: /usr/local/percona/pmm2/exporters
|
||||
node_exporter: /usr/local/percona/pmm2/exporters/node_exporter
|
||||
mysqld_exporter: /usr/local/percona/pmm2/exporters/mysqld_exporter
|
||||
mongodb_exporter: /usr/local/percona/pmm2/exporters/mongodb_exporter
|
||||
postgres_exporter: /usr/local/percona/pmm2/exporters/postgres_exporter
|
||||
proxysql_exporter: /usr/local/percona/pmm2/exporters/proxysql_exporter
|
||||
rds_exporter: /usr/local/percona/pmm2/exporters/rds_exporter
|
||||
azure_exporter: /usr/local/percona/pmm2/exporters/azure_exporter
|
||||
vmagent: /usr/local/percona/pmm2/exporters/vmagent
|
||||
tempdir: {{ pmm.tempdir }}
|
||||
pt_summary: /usr/local/percona/pmm2/tools/pt-summary
|
||||
pt_pg_summary: /usr/local/percona/pmm2/tools/pt-pg-summary
|
||||
pt_mysql_summary: /usr/local/percona/pmm2/tools/pt-mysql-summary
|
||||
pt_mongodb_summary: /usr/local/percona/pmm2/tools/pt-mongodb-summary
|
||||
ports:
|
||||
min: 42000
|
||||
max: 51999
|
||||
log-level: warn
|
||||
debug: false
|
||||
trace: false
|
||||
loglinescount: 1024
|
||||
window-connected-time: 1h0m0s
|
|
@ -14,7 +14,7 @@ max-lease-time 86400;
|
|||
|
||||
option domain-name "{{ domain_name.name }}";
|
||||
option domain-name-servers {{ domain_name.servers }};
|
||||
option ntp-servers {{ domain_name.ntp_servers }};
|
||||
option ntp-servers {{ ntp_servers }};
|
||||
|
||||
# DHCP daemon uses default time zone UTC
|
||||
db-time-format local;
|
||||
|
|
|
@ -1,36 +0,0 @@
|
|||
strongswan_requeriments:
|
||||
- strongswan
|
||||
- libstrongswan-standard-plugins
|
||||
- strongswan-pki
|
||||
- tcpdump
|
||||
- iperf
|
||||
- conntrack
|
||||
- iptables-persistent
|
||||
certificates:
|
||||
- { content: '{{ cert_ipsec }}', dest: '/etc/ipsec.d/certs/cert.pem', mode: 'u=rw,g=r,o=r' }
|
||||
- { content: '{{ ca }}', dest: '/etc/ipsec.d/cacerts/ca.pem', mode: 'u=rw,g=r,o=r' }
|
||||
config_ipsec_files:
|
||||
- { src: 'ipsec.conf', dest: '/etc/ipsec.conf', mode: 'u=rw,g=r,o=r' }
|
||||
- { src: 'vn-attr.conf', dest: '/etc/strongswan.d/charon/vn-attr.conf', mode: 'u=rw,g=r,o=r' }
|
||||
- { src: 'vn-eap-radius.conf', dest: '/etc/strongswan.d/charon/vn-eap-radius.conf', mode: 'u=r,g=,o=' }
|
||||
- { src: 'ipsec.secrets', dest: '/etc/ipsec.secrets', mode: 'u=r,g=,o=' }
|
||||
mangle_block: |
|
||||
*mangle
|
||||
:PREROUTING ACCEPT [0:0]
|
||||
:INPUT ACCEPT [0:0]
|
||||
:FORWARD ACCEPT [0:0]
|
||||
:OUTPUT ACCEPT [0:0]
|
||||
:POSTROUTING ACCEPT [0:0]
|
||||
-A PREROUTING -p tcp -m policy --dir in --pol ipsec -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360
|
||||
-A POSTROUTING -p tcp -m policy --dir out --pol ipsec -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360
|
||||
COMMIT
|
||||
*filter
|
||||
:INPUT ACCEPT [0:0]
|
||||
:FORWARD ACCEPT [0:0]
|
||||
:OUTPUT ACCEPT [0:0]
|
||||
-A FORWARD -m conntrack --ctstate NEW,RELATED,ESTABLISHED -j ACCEPT
|
||||
-A FORWARD -m conntrack --ctstate INVALID -j LOG --log-prefix "CT INVALID: "
|
||||
COMMIT
|
||||
config_and_logrotate:
|
||||
- { src: vn.conf, dest: '/etc/strongswan.d/vn.conf' }
|
||||
- { src: charon, dest: '/etc/logrotate.d/charon' }
|
|
@ -1,11 +0,0 @@
|
|||
/var/log/strongswan/charon.log
|
||||
{
|
||||
copytruncate
|
||||
create 644 root root
|
||||
rotate 10
|
||||
weekly
|
||||
missingok
|
||||
notifempty
|
||||
compress
|
||||
delaycompress
|
||||
}
|
|
@ -1,19 +0,0 @@
|
|||
charon {
|
||||
cisco_unity = yes
|
||||
|
||||
filelog {
|
||||
log {
|
||||
path = /var/log/strongswan/charon.log
|
||||
append = yes
|
||||
default = 1
|
||||
flush_line = yes
|
||||
ike_name = yes
|
||||
time_format = %Y-%m-%d %H:%M:%S
|
||||
}
|
||||
}
|
||||
syslog {
|
||||
identifier = charon
|
||||
daemon {
|
||||
}
|
||||
}
|
||||
}
|
|
@ -1,4 +0,0 @@
|
|||
- name: restart-ipsec
|
||||
systemd:
|
||||
name: strongswan-starter.service
|
||||
state: restarted
|
|
@ -1,85 +0,0 @@
|
|||
- name: Update apt cache
|
||||
apt:
|
||||
update_cache: yes
|
||||
- name: Install VPN package requirements
|
||||
apt:
|
||||
name: "{{ strongswan_requeriments }}"
|
||||
state: present
|
||||
install_recommends: no
|
||||
- name: Create directory /var/log/strongswan
|
||||
file:
|
||||
path: /var/log/strongswan
|
||||
state: directory
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0755'
|
||||
- name: Insert certificates
|
||||
no_log: true
|
||||
copy:
|
||||
content: "{{ item.content }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ certificates }}"
|
||||
- name: Add private key
|
||||
copy:
|
||||
content: "{{ lookup(passbolt, 'ipsec_private_key', folder_parent_id=passbolt_folder).description }}"
|
||||
dest: /etc/ipsec.d/private/key.pem
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=r,g=r,o=
|
||||
- name: Configure ipsec and charon
|
||||
template:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ config_ipsec_files }}"
|
||||
notify: restart-ipsec
|
||||
- name: Copy Configure file and logrotate Charon
|
||||
copy:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
loop: "{{ config_and_logrotate }}"
|
||||
notify: restart-ipsec
|
||||
- name: IP forward as a router
|
||||
sysctl:
|
||||
name: net.ipv4.ip_forward
|
||||
value: "1"
|
||||
state: present
|
||||
sysctl_set: yes
|
||||
reload: yes
|
||||
- name: Add iptables rules in rules.v4 file
|
||||
blockinfile:
|
||||
path: /etc/iptables/rules.v4
|
||||
marker: "# {mark} ANSIBLE-MANAGED MANGLE CHAIN"
|
||||
block: "{{ mangle_block }}"
|
||||
register: iptables
|
||||
- name: Reload iptables rules
|
||||
command: netfilter-persistent reload
|
||||
when: iptables.changed
|
||||
- name: Get default IPv4 interface
|
||||
command: ip -o -4 route show default
|
||||
register: default_route
|
||||
- name: Extract interface default name
|
||||
set_fact:
|
||||
active_interface: "{{ default_route.stdout.split()[-1] }}"
|
||||
- name: Routing table for VPN
|
||||
lineinfile:
|
||||
path: /etc/iproute2/rt_tables
|
||||
line: "10 vpn"
|
||||
state: present
|
||||
regexp: "vpn"
|
||||
- name: Static routing rules to send VPN traffic directly to the firewall
|
||||
lineinfile:
|
||||
path: /etc/network/interfaces
|
||||
insertafter: "dhcp"
|
||||
line: "{{ item }}"
|
||||
state: present
|
||||
loop: "{{ static_routes }}"
|
||||
|
|
@ -1,3 +0,0 @@
|
|||
- import_tasks: ipsec.yml
|
||||
tags: ipsec
|
||||
|
|
@ -1,32 +0,0 @@
|
|||
|
||||
config setup
|
||||
charondebug="ike 1, knl 1, cfg 0"
|
||||
uniqueids=no
|
||||
|
||||
conn %default
|
||||
auto=add
|
||||
compress=no
|
||||
type=tunnel
|
||||
keyexchange=ikev2
|
||||
fragmentation=yes
|
||||
forceencaps=yes
|
||||
eap_identity=%identity
|
||||
|
||||
dpdaction=clear
|
||||
dpddelay=300s
|
||||
rekey=no
|
||||
|
||||
left=%any
|
||||
leftid=@{{ leftid }}
|
||||
leftcert=cert.pem
|
||||
leftsendcert=always
|
||||
leftsubnet={{ leftsubnet }}
|
||||
|
||||
right=%any
|
||||
rightid=%any
|
||||
rightauth=eap-radius
|
||||
rightdns={{ rightdns }}
|
||||
rightsendcert=never
|
||||
|
||||
{{ ipsec_groups }}
|
||||
|
|
@ -1,2 +0,0 @@
|
|||
{{ leftid }} : RSA "key.pem"
|
||||
admin %any% : EAP "{{ lookup(passbolt, 'eap', folder_parent_id=passbolt_folder).password }}"
|
|
@ -1,8 +0,0 @@
|
|||
attr {
|
||||
load = yes
|
||||
dns = {{ rightdns }}
|
||||
split-include = {{ leftsubnet }}
|
||||
split-exclude = 0.0.0.0/0
|
||||
28674 = {{ leftid }}
|
||||
25 = {{ leftid }}
|
||||
}
|
|
@ -1,21 +0,0 @@
|
|||
eap-radius {
|
||||
load = yes
|
||||
accounting = yes
|
||||
class_group = yes
|
||||
servers {
|
||||
primary {
|
||||
#address = radius1.verdnatura.es
|
||||
address = {{ address_radiusA }}
|
||||
auth_port = {{ auth_port }}
|
||||
acct_port = {{ acct_port }}
|
||||
secret = {{ lookup(passbolt, 'eap-radius', folder_parent_id=passbolt_folder).password }}
|
||||
}
|
||||
secondary {
|
||||
#address = radius2.verdnatura.es
|
||||
address = {{ address_radiusB }}
|
||||
auth_port = {{ auth_port }}
|
||||
acct_port = {{ acct_port }}
|
||||
secret = {{ lookup(passbolt, 'eap-radius', folder_parent_id=passbolt_folder).password }}
|
||||
}
|
||||
}
|
||||
}
|
|
@ -1,29 +0,0 @@
|
|||
bind_packages:
|
||||
- bind9
|
||||
- bind9-dnsutils
|
||||
- bind9-host
|
||||
- bind9-libs
|
||||
- bind9-utils
|
||||
- dnsutils
|
||||
- python3-pycurl
|
||||
bind_config_templates:
|
||||
- { src: 'named.conf.j2', dest: '/etc/bind/named.conf', mode: 'u=rw,g=r,o=r' }
|
||||
- { src: 'named.conf.master.j2', dest: '/etc/bind/named.conf.master', mode: 'u=rw,g=r,o=r' }
|
||||
- { src: 'named.conf.local.j2', dest: '/etc/bind/named.conf.local', mode: 'u=rw,g=r,o=r' }
|
||||
- { src: 'named.conf.slave.j2', dest: '/etc/bind/named.conf.slave', mode: 'u=rw,g=r,o=r' }
|
||||
- { src: 'certbot.key', dest: '/etc/bind/keys/certbot.key', mode: 'u=rw,g=r,o=' }
|
||||
- { src: 'lan.key', dest: '/etc/bind/keys/lan.key', mode: 'u=rw,g=r,o=' }
|
||||
- { src: 'wan.key', dest: '/etc/bind/keys/wan.key', mode: 'u=rw,g=r,o=' }
|
||||
- { src: 'rndc.key', dest: '/etc/bind/rndc.key', mode: 'u=rw,g=r,o=' }
|
||||
- { src: 'dhcp.key', dest: '/etc/bind/keys/dhcp.key', mode: 'u=rw,g=r,o=' }
|
||||
- { src: 'isp1.ns', dest: '/root/scripts/switch-isp', mode: 'u=rw,g=rw,o=r' }
|
||||
- { src: 'isp2.ns', dest: '/root/scripts/switch-isp', mode: 'u=rw,g=rw,o=r' }
|
||||
- { src: 'delete.ns', dest: '/root/scripts/switch-isp', mode: 'u=rw,g=rw,o=r' }
|
||||
directory:
|
||||
- { path: '/root/scripts', owner: 'root', group: 'root', mode: 'u=rwx,g=rx,o=rx' }
|
||||
- { path: '/etc/bind/keys', owner: 'root', group: 'bind', mode: 'u=rwx,g=rxs,o=rx' }
|
||||
- { path: '/root/scripts/switch-isp', owner: 'root', group: 'bind', mode: 'u=rwx,g=rxs,o=rx' }
|
||||
required_files:
|
||||
- { src: 'switch-isp.sh', dest: '/root/scripts', owner: 'root', group: 'root', mode: 'u=rwx,g=rx,o=rx' }
|
||||
- { src: 'sync-conf', dest: '/root/scripts', owner: 'root', group: 'root', mode: 'u=rwx,g=rx,o=rx' }
|
||||
- { src: 'gen-key.sh', dest: '/root/scripts', owner: 'root', group: 'bind', mode: 'u=rwx,g=rx,o=rx' }
|
|
@ -1,10 +0,0 @@
|
|||
#!/bin/bash
|
||||
|
||||
KEYNAME=$1
|
||||
|
||||
if [ -z "$KEYNAME" ]; then
|
||||
echo "Usage: $0 <key_name>"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
tsig-keygen -a hmac-sha512 "$KEYNAME"
|
|
@ -1,23 +0,0 @@
|
|||
#!/bin/bash
|
||||
|
||||
ISP=$1
|
||||
|
||||
if [ -z "$ISP" ]; then
|
||||
echo "Usage: $0 <isp_name>"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
KEY_FILE="/etc/bind/keys/wan.key"
|
||||
NS_DIR="/root/scripts/switch-isp"
|
||||
ISP_FILE="$NS_DIR/$ISP.ns"
|
||||
|
||||
if [ ! -f "$ISP_FILE" ]; then
|
||||
echo "ISP file for nsupdate not found: $ISP_FILE"
|
||||
exit 2
|
||||
fi
|
||||
|
||||
echo "Deleting ISP dependent DNS records."
|
||||
nsupdate -k "$KEY_FILE" "$NS_DIR/delete.ns"
|
||||
|
||||
echo "Registering $ISP DNS records."
|
||||
nsupdate -k "$KEY_FILE" "$ISP_FILE"
|
|
@ -1,27 +0,0 @@
|
|||
#!/bin/bash
|
||||
|
||||
if [ "$(hostname)" = "ns1" ]; then
|
||||
partner=root@ns2.servers.dc.verdnatura.es
|
||||
else
|
||||
partner=root@ns1.servers.dc.verdnatura.es
|
||||
fi
|
||||
|
||||
confDir=/etc/bind
|
||||
|
||||
echo "Restarting service."
|
||||
service bind9 restart
|
||||
|
||||
if [ $? -eq "0" ]; then
|
||||
echo "Synchronizing partner configuration."
|
||||
|
||||
scp "$confDir/named.conf.local" $partner:$confDir
|
||||
scp "$confDir/named.conf.master" $partner:$confDir
|
||||
scp "$confDir/named.conf.slave" $partner:$confDir
|
||||
|
||||
ssh "$partner" rm -rf "$confDir/keys"
|
||||
ssh "$partner" mkdir "$confDir/keys"
|
||||
scp -r "$confDir/keys/"* $partner:"$confDir/keys"
|
||||
|
||||
echo "Restarting partner service."
|
||||
ssh $partner service bind9 restart
|
||||
fi
|
|
@ -1,4 +0,0 @@
|
|||
- name: restart-dns
|
||||
systemd:
|
||||
name: bind9
|
||||
state: restarted
|
|
@ -1,2 +0,0 @@
|
|||
- import_tasks: ns.yml
|
||||
tags: ns
|
|
@ -1,41 +0,0 @@
|
|||
- name: Update apt cache
|
||||
apt:
|
||||
update_cache: yes
|
||||
- name: Install bind package requirements
|
||||
apt:
|
||||
name: "{{ bind_packages }}"
|
||||
state: present
|
||||
install_recommends: no
|
||||
- name: Ensure BIND9 starts with IPv4 only (-4)
|
||||
lineinfile:
|
||||
path: /etc/default/named
|
||||
regexp: '^OPTIONS='
|
||||
line: 'OPTIONS="-u bind -4"'
|
||||
backrefs: yes
|
||||
notify: restart-dns
|
||||
- name: Create directory
|
||||
file:
|
||||
path: "{{ item.path }}"
|
||||
state: directory
|
||||
owner: "{{ item.group }}"
|
||||
group: "{{ item.group }}"
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ directory }}"
|
||||
- name: Copy required files and scripts
|
||||
copy:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: "{{ item.group }}"
|
||||
group: "{{ item.group }}"
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ required_files }}"
|
||||
- name: Deploy BIND config templates
|
||||
template:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: root
|
||||
group: bind
|
||||
mode: "{{ item.mode }}"
|
||||
loop: "{{ bind_config_templates }}"
|
||||
notify: restart-dns
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
key "certbot" {
|
||||
algorithm hmac-sha512;
|
||||
secret "{{ lookup(passbolt, 'certbot', folder_parent_id=passbolt_folder).password }}";
|
||||
};
|
|
@ -1,4 +0,0 @@
|
|||
{% for record in dns_records_delete %}
|
||||
update delete {{ record.name.ljust(30) }} A
|
||||
{% endfor %}
|
||||
send
|
|
@ -1,4 +0,0 @@
|
|||
key "dhcp" {
|
||||
algorithm hmac-sha512;
|
||||
secret "{{ lookup(passbolt, 'dhcpkey', folder_parent_id=passbolt_folder).password }}";
|
||||
};
|
|
@ -1,4 +0,0 @@
|
|||
{% for record in dns_records_main %}
|
||||
update add {{ record.name.ljust(30) }} {{ record.ttl }} A {{ record.ip }}
|
||||
{% endfor %}
|
||||
send
|
|
@ -1,4 +0,0 @@
|
|||
{% for record in dns_records_secondary %}
|
||||
update add {{ record.name.ljust(30) }} {{ record.ttl }} A {{ record.ip }}
|
||||
{% endfor %}
|
||||
send
|
|
@ -1,4 +0,0 @@
|
|||
key "lan" {
|
||||
algorithm hmac-sha512;
|
||||
secret "{{ lookup(passbolt, 'lankey', folder_parent_id=passbolt_folder).password }}";
|
||||
};
|
|
@ -1,16 +0,0 @@
|
|||
// This is the primary configuration file for the BIND DNS server named.
|
||||
//
|
||||
// Please read /usr/share/doc/bind9/README.Debian.gz for information on the
|
||||
// structure of BIND configuration files in Debian, *BEFORE* you customize
|
||||
// this configuration file.
|
||||
//
|
||||
// If you are just adding zones, please do that in /etc/bind/named.conf.local
|
||||
|
||||
#include "/etc/bind/named.conf.options";
|
||||
include "/etc/bind/named.conf.local";
|
||||
{% if bind_is_master %}
|
||||
include "/etc/bind/named.conf.master";
|
||||
{% else %}
|
||||
include "/etc/bind/named.conf.slave";
|
||||
{% endif %}
|
||||
#include "/etc/bind/named.conf.default-zones";
|
|
@ -1,30 +0,0 @@
|
|||
include "/etc/bind/rndc.key";
|
||||
include "/etc/bind/keys/wan.key";
|
||||
include "/etc/bind/keys/lan.key";
|
||||
include "/etc/bind/keys/certbot.key";
|
||||
include "/etc/bind/keys/dhcp.key";
|
||||
|
||||
server fe80::/16 { bogus yes; };
|
||||
|
||||
acl lan {
|
||||
10.0.0.0/8;
|
||||
172.16.0.0/12;
|
||||
192.168.0.0/16;
|
||||
};
|
||||
|
||||
acl rfc5735 {
|
||||
0.0.0.0/8;
|
||||
169.254.0.0/16;
|
||||
192.0.0.0/24;
|
||||
192.0.2.0/24;
|
||||
192.88.99.0/24;
|
||||
198.18.0.0/15;
|
||||
198.51.100.0/24;
|
||||
203.0.113.0/24;
|
||||
224.0.0.0/4;
|
||||
240.0.0.0/4;
|
||||
};
|
||||
|
||||
controls {
|
||||
inet * allow { localhost; lan; } keys { "rndc-key"; };
|
||||
};
|
|
@ -1,85 +0,0 @@
|
|||
options {
|
||||
directory "/var/cache/bind";
|
||||
max-cache-size 500m;
|
||||
auth-nxdomain no;
|
||||
listen-on-v6 { none; };
|
||||
version "DNS";
|
||||
allow-update { none; };
|
||||
blackhole { rfc5735; };
|
||||
|
||||
allow-transfer {
|
||||
{% for ip in bind_allow_transfer %}
|
||||
{{ ip }};
|
||||
{% endfor %}
|
||||
};
|
||||
};
|
||||
|
||||
view "lan" {
|
||||
match-clients {
|
||||
{% for item in key_match_clients_lan_master if item.startswith("!key") %}
|
||||
{{ item }};
|
||||
{% endfor %}
|
||||
{% for item in acl_match_clients %}
|
||||
{{ item }};
|
||||
{% endfor %}
|
||||
{% for item in key_match_clients_lan_master if not item.startswith("!key") %}
|
||||
{{ item }};
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
plugin query "filter-aaaa.so" {
|
||||
filter-aaaa-on-v4 yes;
|
||||
filter-aaaa-on-v6 yes;
|
||||
filter-aaaa { any; };
|
||||
};
|
||||
|
||||
recursion yes;
|
||||
allow-recursion { any; };
|
||||
empty-zones-enable yes;
|
||||
notify yes;
|
||||
|
||||
include "/etc/bind/named.conf.default-zones";
|
||||
|
||||
{% for zone in bind_zones.lan %}
|
||||
zone "{{ zone.name }}" {
|
||||
type master;
|
||||
forwarders {};
|
||||
allow-update { key {{ zone.key }}; };
|
||||
file "{{ zone.file }}";
|
||||
};
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
view "wan" {
|
||||
match-clients { any; };
|
||||
|
||||
recursion no;
|
||||
allow-query-cache { none; };
|
||||
empty-zones-enable no;
|
||||
|
||||
notify explicit;
|
||||
|
||||
also-notify {
|
||||
{% for entry in bind_also_notify %}
|
||||
{{ entry.ip }} key {{ entry.key }};
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
{% for zone in bind_zones.wan %}
|
||||
{% if zone.in_view is defined %}
|
||||
{% for z in zone.in_view %}
|
||||
zone "{{ z }}" {
|
||||
in-view "lan";
|
||||
};
|
||||
{% endfor %}
|
||||
{% else %}
|
||||
zone "{{ zone.name }}" {
|
||||
type master;
|
||||
forwarders {};
|
||||
allow-update { key {{ zone.key }}; };
|
||||
file "{{ zone.file }}";
|
||||
};
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
};
|
||||
|
|
@ -1,78 +0,0 @@
|
|||
options {
|
||||
directory "/var/cache/bind";
|
||||
max-cache-size 500m;
|
||||
auth-nxdomain no;
|
||||
listen-on-v6 { none; };
|
||||
version "DNS";
|
||||
allow-update { none; };
|
||||
blackhole { rfc5735; };
|
||||
|
||||
notify no;
|
||||
allow-transfer { none; };
|
||||
masterfile-format text;
|
||||
};
|
||||
|
||||
masters master-ips {
|
||||
{% for ip in bind_slave_masters %}
|
||||
{{ ip }};
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
view "lan" {
|
||||
match-clients {
|
||||
{%- for item in key_match_clients_lan_master if item.startswith("!key") -%}
|
||||
{{ item }};
|
||||
{% endfor %}
|
||||
{%- for item in acl_match_clients -%}
|
||||
{{ item }};
|
||||
{% endfor %}
|
||||
{%- for item in key_match_clients_lan_slave if not item.startswith("!key") -%}
|
||||
{{ item }};
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
plugin query "filter-aaaa.so" {
|
||||
filter-aaaa-on-v4 yes;
|
||||
filter-aaaa-on-v6 yes;
|
||||
filter-aaaa { any; };
|
||||
};
|
||||
recursion yes;
|
||||
allow-recursion { any; };
|
||||
empty-zones-enable yes;
|
||||
|
||||
include "/etc/bind/named.conf.default-zones";
|
||||
|
||||
{% for zone in bind_zones.lan %}
|
||||
zone "{{ zone.name }}" {
|
||||
type slave;
|
||||
masters { master-ips; };
|
||||
forwarders {};
|
||||
file "{{ zone.file }}";
|
||||
};
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
view "wan" {
|
||||
match-clients { any; };
|
||||
|
||||
recursion no;
|
||||
allow-query-cache { none; };
|
||||
empty-zones-enable no;
|
||||
|
||||
{% for zone in bind_zones.wan %}
|
||||
{% if zone.in_view is defined %}
|
||||
{% for z in zone.in_view %}
|
||||
zone "{{ z }}" {
|
||||
in-view "lan";
|
||||
};
|
||||
{% endfor %}
|
||||
{% else %}
|
||||
zone "{{ zone.name }}" {
|
||||
type slave;
|
||||
masters { {{ bind_slave_masters | join('; ') }} key {{ zone.key }}; };
|
||||
forwarders {};
|
||||
file "{{ zone.file }}";
|
||||
};
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
};
|
|
@ -1,4 +0,0 @@
|
|||
key "rndc-key" {
|
||||
algorithm hmac-md5;
|
||||
secret "{{ lookup(passbolt, 'rndc-key', folder_parent_id=passbolt_folder).password }}";
|
||||
};
|
|
@ -1,4 +0,0 @@
|
|||
key "wan-key" {
|
||||
algorithm hmac-md5;
|
||||
secret "{{ lookup(passbolt, 'wan-key', folder_parent_id=passbolt_folder).password }}";
|
||||
};
|
File diff suppressed because it is too large
Load Diff
|
@ -1,22 +0,0 @@
|
|||
#!/bin/bash
|
||||
# Checks status of disks SMART
|
||||
|
||||
STATUS_LABEL="SMART Health Status:"
|
||||
STATUS_OK="$STATUS_LABEL OK"
|
||||
|
||||
if [[ "$#" == "0" ]]; then
|
||||
echo "Usage: $0 <disk1> [<disk2> ... <diskX>]"
|
||||
exit
|
||||
fi
|
||||
|
||||
for DISK in "$@"
|
||||
do
|
||||
STATUS=$(sudo /usr/sbin/smartctl -H -d scsi "$DISK" | grep "$STATUS_LABEL")
|
||||
|
||||
if [ "$STATUS" != "$STATUS_OK" ]; then
|
||||
echo "CRITICAL: $DISK: $STATUS"
|
||||
exit 2
|
||||
fi
|
||||
done
|
||||
|
||||
echo "OK: $STATUS_OK"
|
|
@ -1,20 +1,14 @@
|
|||
- name: Install PVE NRPE base packages
|
||||
apt:
|
||||
name:
|
||||
- libxml-simple-perl
|
||||
- libmonitoring-plugin-perl
|
||||
state: present
|
||||
- name: Set NRPE PVE configuration
|
||||
copy:
|
||||
src: nrpe.d/95-pve.cfg
|
||||
dest: /etc/nagios/nrpe.d/
|
||||
src: nrpe.cfg
|
||||
dest: /etc/nagios/nrpe.d/95-pve.cfg
|
||||
owner: root
|
||||
group: root
|
||||
mode: u=rw,g=r,o=r
|
||||
notify: restart-nrpe
|
||||
- name: Copy PVE NRPE plugins
|
||||
copy:
|
||||
src: plugins/
|
||||
src: nrpe/
|
||||
dest: /etc/nagios/plugins/
|
||||
owner: root
|
||||
group: root
|
||||
|
|
|
@ -7,8 +7,8 @@
|
|||
group: root
|
||||
register: copy_result
|
||||
|
||||
#- name: Reboot the system if file was copied
|
||||
# reboot:
|
||||
# reboot_timeout: 600
|
||||
# become: true
|
||||
# when: copy_result.changed
|
||||
- name: Reboot the system if file was copied
|
||||
reboot:
|
||||
reboot_timeout: 600
|
||||
become: true
|
||||
when: copy_result.changed
|
Loading…
Reference in New Issue