noticket - cleanup of unused sites, containers

This commit is contained in:
Bastian de Byl
2025-03-01 20:47:53 -05:00
parent 2fdd7792fc
commit 6b813362ca
14 changed files with 3 additions and 1318 deletions

View File

@@ -64,7 +64,6 @@
- "{{ base_server_name }}.conf"
- "{{ assistant_server_name }}.conf"
- "{{ bookstack_server_name }}.conf"
- "{{ bitwarden_server_name }}.conf"
- "{{ ci_server_name }}.http.conf"
- "{{ cloud_server_name }}.conf"
- "{{ cloud_skudak_server_name }}.conf"
@@ -90,7 +89,6 @@
- "{{ base_server_name }}.conf"
- "{{ assistant_server_name }}.conf"
- "{{ bookstack_server_name }}.conf"
- "{{ bitwarden_server_name }}.conf"
- "{{ ci_server_name }}.http.conf"
- "{{ cloud_server_name }}.conf"
- "{{ cloud_skudak_server_name }}.conf"

View File

@@ -37,7 +37,6 @@
- "{{ base_server_name }}.https.conf"
- "{{ assistant_server_name }}.https.conf"
- "{{ bookstack_server_name }}.https.conf"
- "{{ bitwarden_server_name }}.https.conf"
- "{{ ci_server_name }}.https.conf"
- "{{ cloud_server_name }}.https.conf"
- "{{ cloud_skudak_server_name }}.https.conf"
@@ -61,7 +60,6 @@
- "{{ base_server_name }}.https.conf"
- "{{ assistant_server_name }}.https.conf"
- "{{ bookstack_server_name }}.https.conf"
- "{{ bitwarden_server_name }}.https.conf"
- "{{ ci_server_name }}.https.conf"
- "{{ cloud_server_name }}.https.conf"
- "{{ cloud_skudak_server_name }}.https.conf"

View File

@@ -1,46 +0,0 @@
---
- name: create factorio host directory volumes
become: true
ansible.builtin.file:
path: "{{ item }}"
state: directory
owner: "{{ podman_user }}"
group: "{{ podman_user }}"
mode: 0755
notify: restorecon podman
loop:
- "{{ factorio_path }}"
- name: unshare chown the elastic volume
become: true
become_user: "{{ podman_user }}"
changed_when: false
ansible.builtin.command: |
podman unshare chown -R 845:845 {{ factorio_path }}
- name: flush handlers
ansible.builtin.meta: flush_handlers
- import_tasks: podman/podman-check.yml
vars:
container_name: factorio
container_image: "{{ image }}"
- name: create factorio server container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: factorio
image: "{{ image }}"
restart_policy: on-failure:3
log_driver: journald
volumes:
- "{{ factorio_path }}:/factorio"
ports:
- 34197:34197/udp
- 27015:27015/tcp
- name: create systemd startup job for factorio
include_tasks: podman/systemd-generate.yml
vars:
container_name: factorio

View File

@@ -1,56 +0,0 @@
---
- name: create palworld host directory volumes
become: true
ansible.builtin.file:
path: "{{ item }}"
state: directory
owner: "{{ podman_subuid.stdout }}"
group: "{{ podman_user }}"
mode: 0755
notify: restorecon podman
loop:
- "{{ palworld_path }}"
- name: unshare chown the palworld volumes
become: true
become_user: "{{ podman_user }}"
changed_when: false
ansible.builtin.command: |
podman unshare chown -R 1000:10000 {{ palworld_path }}
- import_tasks: podman/podman-check.yml
vars:
container_name: palworld
container_image: "{{ image }}"
- name: create palworld server container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: palworld
image: "{{ image }}"
image_strict: true
restart_policy: unless-stopped
log_driver: journald
volumes:
- "{{ palworld_path }}:/palworld"
env:
ALWAYS_UPDATE_ON_START: "true"
MAX_PLAYERS: 32
MULTITHREAD_ENABLED: "true"
COMMUNITY_SERVER: "false"
RCON_ENABLED: "true"
RCON_PORT: 25575
PUBLIC_PORT: 8211
SERVER_NAME: Bearbehr and Friends
SERVER_DESCRIPTION: Bearbehr's Dedicated Server for Friends
SERVER_PASSWORD: ""
ADMIN_PASSWORD: "{{ palworld_admin_password }}"
ports:
- 8211:8211/udp
- 25575:25575/udp
- name: create systemd startup job for palworld
include_tasks: podman/systemd-generate.yml
vars:
container_name: palworld

View File

@@ -1,131 +0,0 @@
---
- name: create required graylog volumes
become: true
ansible.builtin.file:
path: "{{ item }}"
state: directory
owner: "{{ podman_subuid.stdout }}"
group: "{{ podman_user }}"
mode: 0755
notify: restorecon podman
loop:
- "{{ graylog_path }}/mongo"
- "{{ graylog_path }}/opensearch"
- "{{ graylog_path }}/conf"
- "{{ graylog_path }}/bin"
- name: copy configuration files
become: true
ansible.builtin.copy:
src: "files/graylog/{{ item.src }}"
dest: "{{ graylog_path }}/{{ item.dest }}"
owner: "{{ podman_subuid.stdout }}"
group: "{{ podman_user }}"
mode: 0644
loop:
- src: "graylogctl"
dest: "bin/graylogctl"
- src: "graylog.conf"
dest: "conf/graylog.conf"
notify: restorecon podman
- name: unshare chown the opensearch volume
become: true
become_user: "{{ podman_user }}"
changed_when: false
ansible.builtin.command: |
podman unshare chown -R 1000:1000 {{ graylog_path }}/opensearch
- name: flush handlers
ansible.builtin.meta: flush_handlers
- import_tasks: podman/podman-check.yml
vars:
container_name: graylog-mongo
container_image: "{{ db_image }}"
- name: create graylog mongodb container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: graylog-mongo
image: "{{ db_image }}"
restart_policy: on-failure:3
network:
- shared
volumes:
- "{{ graylog_path }}/mongo:/data/db"
- name: create systemd startup job for graylog-mongo
include_tasks: podman/systemd-generate.yml
vars:
container_name: graylog-mongo
- import_tasks: podman/podman-check.yml
vars:
container_name: graylog-opensearch
container_image: "{{ os_image }}"
- name: create graylog opensearch container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: graylog-opensearch
image: "{{ os_image }}"
restart_policy: on-failure:3
network:
- shared
volumes:
- "{{ graylog_path }}/opensearch:/usr/share/opensearch/data"
env:
OPENSEARCH_JAVA_OPTS: "-Xms1g -Xmx1g"
bootstrap.memory_lock: "true"
discovery.type: "single-node"
action.auto_create_index: "false"
plugins.security.ssl.http.enabled: "false"
plugins.security.disabled: "true"
OPENSEARCH_INITIAL_ADMIN_PASSWORD: "{{ graylog_secret }}"
- name: create systemd startup job for graylog-opensearch
include_tasks: podman/systemd-generate.yml
vars:
container_name: graylog-opensearch
- import_tasks: podman/podman-check.yml
vars:
container_name: graylog
container_image: "{{ image }}"
- name: create graylog container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: graylog
image: "{{ image }}"
restart_policy: on-failure:3
sysctl:
net.ipv6.conf.all.disable_ipv6: 1
net.ipv6.conf.default.disable_ipv6: 1
network:
- shared
volumes:
- "{{ graylog_path }}/conf:/usr/share/graylog/data/config"
- "{{ graylog_path }}/bin:/usr/share/graylog/bin"
env:
GRAYLOG_PASSWORD_SECRET: "{{ graylog_secret }}"
GRAYLOG_ROOT_PASSWORD_SHA2: "{{ graylog_root_pass_sha2 }}"
GRAYLOG_HTTP_EXTERNAL_URI: http://{{ ansible_default_ipv4.address }}:9000/
GRAYLOG_HTTP_BIND_ADDRESS: 0.0.0.0:9000
GRAYLOG_MONGODB_URI: mongodb://graylog-mongo/graylog
GRAYLOG_ELASTICSEARCH_HOSTS: http://graylog-opensearch:9200
GRAYLOG_REPORT_DISABLE_SANDBOX: "true"
ports:
- "{{ graylog_port }}:9000"
- "{{ syslog_udp_default }}:{{ syslog_udp_default }}/udp"
- "{{ syslog_udp_unifi }}:{{ syslog_udp_unifi }}/udp"
- "{{ syslog_udp_error }}:{{ syslog_udp_error }}/udp"
- name: create systemd startup job for graylog
include_tasks: podman/systemd-generate.yml
vars:
container_name: graylog

View File

@@ -1,89 +0,0 @@
---
- name: create required bitwarden volumes
become: true
ansible.builtin.file:
path: "{{ item }}"
state: directory
owner: "{{ podman_subuid.stdout }}"
group: "{{ podman_subuid.stdout }}"
mode: 0755
notify: restorecon podman
loop:
- "{{ bitwarden_path }}/mysql"
- "{{ bitwarden_path }}/bitwarden"
- name: flush handlers
ansible.builtin.meta: flush_handlers
- import_tasks: podman/podman-check.yml
vars:
container_name: bitwarden-db
container_image: "{{ db_image }}"
- name: create bitwarden-db container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: bitwarden-db
image: "{{ db_image }}"
restart_policy: on-failure:3
log_driver: journald
network:
- shared
env:
MARIADB_RANDOM_ROOT_PASSWORD: "true"
MARIADB_DATABASE: bitwarden_vault
MARIADB_PASSWORD: "{{ bitwarden_db_pass }}"
MARIADB_USER: bitwarden
volumes:
- "{{ bitwarden_path }}/mysql:/var/lib/mysql"
- name: create systemd startup job for bitwarden-db
include_tasks: podman/systemd-generate.yml
vars:
container_name: bitwarden-db
- import_tasks: podman/podman-check.yml
vars:
container_name: bitwarden
container_image: "{{ image }}"
- name: create bitwarden container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: bitwarden
image: "{{ image }}"
restart_policy: on-failure:3
log_driver: journald
network:
- shared
env:
BW_ENABLE_SSL: "false"
BW_ENABLE_SSL_CA: "false"
BW_PORT_HTTP: "8092"
BW_DOMAIN: "{{ bitwarden_server_name }}"
BW_DB_PROVIDER: mysql
BW_DB_SERVER: bitwarden-db
BW_DB_DATABASE: bitwarden_vault
BW_DB_USERNAME: bitwarden
BW_DB_PASSWORD: "{{ bitwarden_db_pass }}"
BW_INSTALLATION_ID: "{{ bitwarden_id }}"
BW_INSTALLATION_KEY: "{{ bitwarden_key }}"
globalSettings__mail__replyToEmail: "{{ skudaknoreply_mail_user }}"
globalSettings__mail__smtp__host: "{{ skudaknoreply_mail_host }}"
globalSettings__mail__smtp__port: 587
globalSettings__mail__smtp__ssl: "true"
globalSettings__mail__smtp__username: "{{ skudaknoreply_mail_user }}"
globalSettings__mail__smtp__password: "{{ skudaknoreply_mail_pass }}"
globalSettings__disableUserRegistration: "true"
adminSettings__admins: "{{ bitwarden_admins }}"
volumes:
- "{{ bitwarden_path }}/bitwarden:/etc/bitwarden"
ports:
- "8092:8092"
- name: create systemd startup job for bitwarden
include_tasks: podman/systemd-generate.yml
vars:
container_name: bitwarden