ansible-debops-infrastructure

DebOps and Ansible scripts to manage my infrastructure
git clone git://git.erethon.com/ansible-debops-infrastructure
Log | Files | Refs

commit b228544927c5b17c9fe23b424f2fa2869b39eeed
parent 3060eb91334a22c9f7af246feb2a0df70825a3f3
Author: Dionysis Grigoropoulos <dgrig@erethon.com>
Date:   Sun, 24 Jan 2021 23:31:15 +0200

ansible: Initialize k3s and autonomous vars

Diffstat:
ansible/inventory/group_vars/k3s/ferm.yml | 21+++++++++++++++++++++
ansible/inventory/group_vars/k3s/k3s.yml | 4++++
ansible/inventory/host_vars/autonomous/apt_install.yml | 6++++++
ansible/inventory/host_vars/autonomous/ferm.yml | 42++++++++++++++++++++++++++++++++++++++++++
4 files changed, 73 insertions(+), 0 deletions(-)

diff --git a/ansible/inventory/group_vars/k3s/ferm.yml b/ansible/inventory/group_vars/k3s/ferm.yml @@ -0,0 +1,21 @@ +--- + +ferm__group_rules: + - type: 'accept' + filename: 'k3sapi' + name: 'k3sapi' + table: 'filter' + chain: 'INPUT' + dport: ['2379', '2380', '6443'] + protocol: 'tcp' + domain: 'ip' + saddr: "{{ k3s__nodes }}" + - type: 'accept' + filename: 'k3sflannel' + name: 'k3sflannel' + table: 'filter' + chain: 'INPUT' + dport: ['8472'] + saddr: "{{ k3s__nodes }}" + protocol: 'udp' + domain: 'ip' diff --git a/ansible/inventory/group_vars/k3s/k3s.yml b/ansible/inventory/group_vars/k3s/k3s.yml @@ -0,0 +1,4 @@ +--- + +# Hardcoded for now since it's simpler this way +k3s__nodes: ['192.168.133.2', '192.168.133.3', '192.168.133.4'] diff --git a/ansible/inventory/host_vars/autonomous/apt_install.yml b/ansible/inventory/host_vars/autonomous/apt_install.yml @@ -0,0 +1,6 @@ +--- + +apt_install__host_packages: ['haproxy', 'cryptsetup', 'qemu-kvm', + 'libvirt-clients', 'libvirt-daemon-system', 'ebtables', 'dnsmasq', + 'bridge-utils', 'qemu-utils', 'virtinst', 'openvpn', 'easy-rsa', + 'pdns-server', 'netcat-openbsd', 'smartmontools'] diff --git a/ansible/inventory/host_vars/autonomous/ferm.yml b/ansible/inventory/host_vars/autonomous/ferm.yml @@ -0,0 +1,42 @@ +--- + +ferm__host_rules: + - type: 'accept' + filename: 'wg0' + name: 'wg0' + table: 'filter' + chain: 'INPUT' + dport: [ 8443 ] + protocol: 'udp' + domain: 'ip' + + - type: 'accept' + filename: 'vmnet133' + name: 'vmnet133' + table: 'filter' + chain: 'FORWARD' + domain: 'ip' + interface_present: 'wg0' + outerface_present: 'virbr1' + comment: 'Forward traffic from Wireguard to VMs' + + - type: 'accept' + filename: 'vmnet133_public' + name: 'vmnet133_public' + table: 'filter' + chain: 'FORWARD' + domain: 'ip' + interface_present: 'virbr1' + saddr: '192.168.133.0/24' + comment: 'Forward traffic from VMs to the internet' + + - type: 'custom' + filename: 'vmnet_nat' + name: 'vmnet_nat' + comment: 'Perform NAT for VMs' + rules: | + domain ip table nat chain POSTROUTING { + outerface enp2s0 { + MASQUERADE; + } + }