Update hardening and add backup playbook

This commit is contained in:
2024-03-31 12:09:09 +02:00
parent 7485cee556
commit 7c95663dd7
8 changed files with 134 additions and 23 deletions

View File

@@ -1,4 +1,4 @@
- hosts: monitoring
- hosts: test
# vars:
become: true
gather_facts: true
@@ -82,19 +82,23 @@
#||-----> GPG error: https://pkgs.netbird.io/debian stable InRelease: The following signatures couldn't be verified because the public key is not available
# roles:
# - robertdebock.update
# - devsec.hardening.os_hardening
# - devsec.hardening.ssh_hardening
# - maxlareo.rkhunter
# - maxlareo.chkrootkit
# - robertdebock.auditd
# - geerlingguy.firewall
# - grog.management-user
# - GROG.user
# - GROG.authorized-key
# - GROG.sudo
# - ansible_unattended_upgrades
# - buluma.lynis
# - robertdebock.update
# - devsec.hardening.os_hardening
# - devsec.hardening.ssh_hardening
# - maxlareo.rkhunter
# - maxlareo.chkrootkit
# - robertdebock.auditd
# - geerlingguy.firewall
# - grog.management-user
# - GROG.user
# - GROG.authorized-key
# - GROG.sudo
# - ansible_unattended_upgrades
# - buluma.lynis
# roles:
# - role: netways.elasticstack.elasticsearch
# tags: test2
tasks:
- name: Retrieve private IP address netbird
@@ -121,13 +125,50 @@
# msg: "{{ group_names }}"
# when: group_names is search("monitoring")
- ansible.builtin.import_role:
name: prometheus.prometheus.node_exporter
# - ansible.builtin.import_role:
# name: prometheus.prometheus.node_exporter
# - ansible.builtin.import_role:
# name: prometheus.prometheus.prometheus
# when: group_names is search("monitoring")
# - ansible.builtin.import_role:
# name: ansible-role-labocbz-install-grafana
# when: group_names is search("monitoring")
- ansible.builtin.import_role:
name: prometheus.prometheus.prometheus
when: group_names is search("monitoring")
name: netways.elasticstack.repos
tags: repo
# to reset password
#/usr/share/elasticsearch/bin/elasticsearch-reset-password -u elastic
# xpack.security.http.ssl.verification_mode: none
# Add token for new node ?
# /usr/share/elasticsearch/elasticsearch-create-enrollment-token -s kibana
# /usr/share/kibana/bin/kibana-encryption-keys generate --force
# /usr/share/elasticsearch/bin# ./elasticsearch-service-tokens create elastic/kibana token
# bin/elasticsearch-create-enrollment-token -s kibana --url "https://172.0.0.3:9200"
- ansible.builtin.import_role:
name: ansible-role-labocbz-install-grafana
when: group_names is search("monitoring")
name: netways.elasticstack.elasticsearch
tags: elastic
# Wait the end install to have th url to connect and put the enroll token
- ansible.builtin.import_role:
name: netways.elasticstack.kibana
tags: kibana
# - ansible.builtin.import_role:
# name: netways.elasticstack.logstash
# tags: test2
# FileBEAT
# filebeat test config -e filebeat.yml
# filebeat setup -e
# restart filebeat
- ansible.builtin.import_role:
name: netways.elasticstack.beats
tags: filebeat