noticket - cleanup of unused sites, containers
This commit is contained in:
@@ -64,7 +64,6 @@
|
||||
- "{{ base_server_name }}.conf"
|
||||
- "{{ assistant_server_name }}.conf"
|
||||
- "{{ bookstack_server_name }}.conf"
|
||||
- "{{ bitwarden_server_name }}.conf"
|
||||
- "{{ ci_server_name }}.http.conf"
|
||||
- "{{ cloud_server_name }}.conf"
|
||||
- "{{ cloud_skudak_server_name }}.conf"
|
||||
@@ -90,7 +89,6 @@
|
||||
- "{{ base_server_name }}.conf"
|
||||
- "{{ assistant_server_name }}.conf"
|
||||
- "{{ bookstack_server_name }}.conf"
|
||||
- "{{ bitwarden_server_name }}.conf"
|
||||
- "{{ ci_server_name }}.http.conf"
|
||||
- "{{ cloud_server_name }}.conf"
|
||||
- "{{ cloud_skudak_server_name }}.conf"
|
||||
|
||||
@@ -37,7 +37,6 @@
|
||||
- "{{ base_server_name }}.https.conf"
|
||||
- "{{ assistant_server_name }}.https.conf"
|
||||
- "{{ bookstack_server_name }}.https.conf"
|
||||
- "{{ bitwarden_server_name }}.https.conf"
|
||||
- "{{ ci_server_name }}.https.conf"
|
||||
- "{{ cloud_server_name }}.https.conf"
|
||||
- "{{ cloud_skudak_server_name }}.https.conf"
|
||||
@@ -61,7 +60,6 @@
|
||||
- "{{ base_server_name }}.https.conf"
|
||||
- "{{ assistant_server_name }}.https.conf"
|
||||
- "{{ bookstack_server_name }}.https.conf"
|
||||
- "{{ bitwarden_server_name }}.https.conf"
|
||||
- "{{ ci_server_name }}.https.conf"
|
||||
- "{{ cloud_server_name }}.https.conf"
|
||||
- "{{ cloud_skudak_server_name }}.https.conf"
|
||||
|
||||
@@ -1,46 +0,0 @@
|
||||
---
|
||||
- name: create factorio host directory volumes
|
||||
become: true
|
||||
ansible.builtin.file:
|
||||
path: "{{ item }}"
|
||||
state: directory
|
||||
owner: "{{ podman_user }}"
|
||||
group: "{{ podman_user }}"
|
||||
mode: 0755
|
||||
notify: restorecon podman
|
||||
loop:
|
||||
- "{{ factorio_path }}"
|
||||
|
||||
- name: unshare chown the elastic volume
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
changed_when: false
|
||||
ansible.builtin.command: |
|
||||
podman unshare chown -R 845:845 {{ factorio_path }}
|
||||
|
||||
- name: flush handlers
|
||||
ansible.builtin.meta: flush_handlers
|
||||
|
||||
- import_tasks: podman/podman-check.yml
|
||||
vars:
|
||||
container_name: factorio
|
||||
container_image: "{{ image }}"
|
||||
|
||||
- name: create factorio server container
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
containers.podman.podman_container:
|
||||
name: factorio
|
||||
image: "{{ image }}"
|
||||
restart_policy: on-failure:3
|
||||
log_driver: journald
|
||||
volumes:
|
||||
- "{{ factorio_path }}:/factorio"
|
||||
ports:
|
||||
- 34197:34197/udp
|
||||
- 27015:27015/tcp
|
||||
|
||||
- name: create systemd startup job for factorio
|
||||
include_tasks: podman/systemd-generate.yml
|
||||
vars:
|
||||
container_name: factorio
|
||||
@@ -1,56 +0,0 @@
|
||||
---
|
||||
- name: create palworld host directory volumes
|
||||
become: true
|
||||
ansible.builtin.file:
|
||||
path: "{{ item }}"
|
||||
state: directory
|
||||
owner: "{{ podman_subuid.stdout }}"
|
||||
group: "{{ podman_user }}"
|
||||
mode: 0755
|
||||
notify: restorecon podman
|
||||
loop:
|
||||
- "{{ palworld_path }}"
|
||||
|
||||
- name: unshare chown the palworld volumes
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
changed_when: false
|
||||
ansible.builtin.command: |
|
||||
podman unshare chown -R 1000:10000 {{ palworld_path }}
|
||||
|
||||
- import_tasks: podman/podman-check.yml
|
||||
vars:
|
||||
container_name: palworld
|
||||
container_image: "{{ image }}"
|
||||
|
||||
- name: create palworld server container
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
containers.podman.podman_container:
|
||||
name: palworld
|
||||
image: "{{ image }}"
|
||||
image_strict: true
|
||||
restart_policy: unless-stopped
|
||||
log_driver: journald
|
||||
volumes:
|
||||
- "{{ palworld_path }}:/palworld"
|
||||
env:
|
||||
ALWAYS_UPDATE_ON_START: "true"
|
||||
MAX_PLAYERS: 32
|
||||
MULTITHREAD_ENABLED: "true"
|
||||
COMMUNITY_SERVER: "false"
|
||||
RCON_ENABLED: "true"
|
||||
RCON_PORT: 25575
|
||||
PUBLIC_PORT: 8211
|
||||
SERVER_NAME: Bearbehr and Friends
|
||||
SERVER_DESCRIPTION: Bearbehr's Dedicated Server for Friends
|
||||
SERVER_PASSWORD: ""
|
||||
ADMIN_PASSWORD: "{{ palworld_admin_password }}"
|
||||
ports:
|
||||
- 8211:8211/udp
|
||||
- 25575:25575/udp
|
||||
|
||||
- name: create systemd startup job for palworld
|
||||
include_tasks: podman/systemd-generate.yml
|
||||
vars:
|
||||
container_name: palworld
|
||||
@@ -1,131 +0,0 @@
|
||||
---
|
||||
- name: create required graylog volumes
|
||||
become: true
|
||||
ansible.builtin.file:
|
||||
path: "{{ item }}"
|
||||
state: directory
|
||||
owner: "{{ podman_subuid.stdout }}"
|
||||
group: "{{ podman_user }}"
|
||||
mode: 0755
|
||||
notify: restorecon podman
|
||||
loop:
|
||||
- "{{ graylog_path }}/mongo"
|
||||
- "{{ graylog_path }}/opensearch"
|
||||
- "{{ graylog_path }}/conf"
|
||||
- "{{ graylog_path }}/bin"
|
||||
|
||||
- name: copy configuration files
|
||||
become: true
|
||||
ansible.builtin.copy:
|
||||
src: "files/graylog/{{ item.src }}"
|
||||
dest: "{{ graylog_path }}/{{ item.dest }}"
|
||||
owner: "{{ podman_subuid.stdout }}"
|
||||
group: "{{ podman_user }}"
|
||||
mode: 0644
|
||||
loop:
|
||||
- src: "graylogctl"
|
||||
dest: "bin/graylogctl"
|
||||
- src: "graylog.conf"
|
||||
dest: "conf/graylog.conf"
|
||||
notify: restorecon podman
|
||||
|
||||
- name: unshare chown the opensearch volume
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
changed_when: false
|
||||
ansible.builtin.command: |
|
||||
podman unshare chown -R 1000:1000 {{ graylog_path }}/opensearch
|
||||
|
||||
- name: flush handlers
|
||||
ansible.builtin.meta: flush_handlers
|
||||
|
||||
- import_tasks: podman/podman-check.yml
|
||||
vars:
|
||||
container_name: graylog-mongo
|
||||
container_image: "{{ db_image }}"
|
||||
|
||||
- name: create graylog mongodb container
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
containers.podman.podman_container:
|
||||
name: graylog-mongo
|
||||
image: "{{ db_image }}"
|
||||
restart_policy: on-failure:3
|
||||
network:
|
||||
- shared
|
||||
volumes:
|
||||
- "{{ graylog_path }}/mongo:/data/db"
|
||||
|
||||
- name: create systemd startup job for graylog-mongo
|
||||
include_tasks: podman/systemd-generate.yml
|
||||
vars:
|
||||
container_name: graylog-mongo
|
||||
|
||||
- import_tasks: podman/podman-check.yml
|
||||
vars:
|
||||
container_name: graylog-opensearch
|
||||
container_image: "{{ os_image }}"
|
||||
|
||||
- name: create graylog opensearch container
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
containers.podman.podman_container:
|
||||
name: graylog-opensearch
|
||||
image: "{{ os_image }}"
|
||||
restart_policy: on-failure:3
|
||||
network:
|
||||
- shared
|
||||
volumes:
|
||||
- "{{ graylog_path }}/opensearch:/usr/share/opensearch/data"
|
||||
env:
|
||||
OPENSEARCH_JAVA_OPTS: "-Xms1g -Xmx1g"
|
||||
bootstrap.memory_lock: "true"
|
||||
discovery.type: "single-node"
|
||||
action.auto_create_index: "false"
|
||||
plugins.security.ssl.http.enabled: "false"
|
||||
plugins.security.disabled: "true"
|
||||
OPENSEARCH_INITIAL_ADMIN_PASSWORD: "{{ graylog_secret }}"
|
||||
|
||||
- name: create systemd startup job for graylog-opensearch
|
||||
include_tasks: podman/systemd-generate.yml
|
||||
vars:
|
||||
container_name: graylog-opensearch
|
||||
|
||||
- import_tasks: podman/podman-check.yml
|
||||
vars:
|
||||
container_name: graylog
|
||||
container_image: "{{ image }}"
|
||||
|
||||
- name: create graylog container
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
containers.podman.podman_container:
|
||||
name: graylog
|
||||
image: "{{ image }}"
|
||||
restart_policy: on-failure:3
|
||||
sysctl:
|
||||
net.ipv6.conf.all.disable_ipv6: 1
|
||||
net.ipv6.conf.default.disable_ipv6: 1
|
||||
network:
|
||||
- shared
|
||||
volumes:
|
||||
- "{{ graylog_path }}/conf:/usr/share/graylog/data/config"
|
||||
- "{{ graylog_path }}/bin:/usr/share/graylog/bin"
|
||||
env:
|
||||
GRAYLOG_PASSWORD_SECRET: "{{ graylog_secret }}"
|
||||
GRAYLOG_ROOT_PASSWORD_SHA2: "{{ graylog_root_pass_sha2 }}"
|
||||
GRAYLOG_HTTP_EXTERNAL_URI: http://{{ ansible_default_ipv4.address }}:9000/
|
||||
GRAYLOG_HTTP_BIND_ADDRESS: 0.0.0.0:9000
|
||||
GRAYLOG_MONGODB_URI: mongodb://graylog-mongo/graylog
|
||||
GRAYLOG_ELASTICSEARCH_HOSTS: http://graylog-opensearch:9200
|
||||
GRAYLOG_REPORT_DISABLE_SANDBOX: "true"
|
||||
ports:
|
||||
- "{{ graylog_port }}:9000"
|
||||
- "{{ syslog_udp_default }}:{{ syslog_udp_default }}/udp"
|
||||
- "{{ syslog_udp_unifi }}:{{ syslog_udp_unifi }}/udp"
|
||||
- "{{ syslog_udp_error }}:{{ syslog_udp_error }}/udp"
|
||||
|
||||
- name: create systemd startup job for graylog
|
||||
include_tasks: podman/systemd-generate.yml
|
||||
vars:
|
||||
container_name: graylog
|
||||
@@ -1,89 +0,0 @@
|
||||
---
|
||||
- name: create required bitwarden volumes
|
||||
become: true
|
||||
ansible.builtin.file:
|
||||
path: "{{ item }}"
|
||||
state: directory
|
||||
owner: "{{ podman_subuid.stdout }}"
|
||||
group: "{{ podman_subuid.stdout }}"
|
||||
mode: 0755
|
||||
notify: restorecon podman
|
||||
loop:
|
||||
- "{{ bitwarden_path }}/mysql"
|
||||
- "{{ bitwarden_path }}/bitwarden"
|
||||
|
||||
- name: flush handlers
|
||||
ansible.builtin.meta: flush_handlers
|
||||
|
||||
- import_tasks: podman/podman-check.yml
|
||||
vars:
|
||||
container_name: bitwarden-db
|
||||
container_image: "{{ db_image }}"
|
||||
|
||||
- name: create bitwarden-db container
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
containers.podman.podman_container:
|
||||
name: bitwarden-db
|
||||
image: "{{ db_image }}"
|
||||
restart_policy: on-failure:3
|
||||
log_driver: journald
|
||||
network:
|
||||
- shared
|
||||
env:
|
||||
MARIADB_RANDOM_ROOT_PASSWORD: "true"
|
||||
MARIADB_DATABASE: bitwarden_vault
|
||||
MARIADB_PASSWORD: "{{ bitwarden_db_pass }}"
|
||||
MARIADB_USER: bitwarden
|
||||
volumes:
|
||||
- "{{ bitwarden_path }}/mysql:/var/lib/mysql"
|
||||
|
||||
- name: create systemd startup job for bitwarden-db
|
||||
include_tasks: podman/systemd-generate.yml
|
||||
vars:
|
||||
container_name: bitwarden-db
|
||||
|
||||
- import_tasks: podman/podman-check.yml
|
||||
vars:
|
||||
container_name: bitwarden
|
||||
container_image: "{{ image }}"
|
||||
|
||||
- name: create bitwarden container
|
||||
become: true
|
||||
become_user: "{{ podman_user }}"
|
||||
containers.podman.podman_container:
|
||||
name: bitwarden
|
||||
image: "{{ image }}"
|
||||
restart_policy: on-failure:3
|
||||
log_driver: journald
|
||||
network:
|
||||
- shared
|
||||
env:
|
||||
BW_ENABLE_SSL: "false"
|
||||
BW_ENABLE_SSL_CA: "false"
|
||||
BW_PORT_HTTP: "8092"
|
||||
BW_DOMAIN: "{{ bitwarden_server_name }}"
|
||||
BW_DB_PROVIDER: mysql
|
||||
BW_DB_SERVER: bitwarden-db
|
||||
BW_DB_DATABASE: bitwarden_vault
|
||||
BW_DB_USERNAME: bitwarden
|
||||
BW_DB_PASSWORD: "{{ bitwarden_db_pass }}"
|
||||
BW_INSTALLATION_ID: "{{ bitwarden_id }}"
|
||||
BW_INSTALLATION_KEY: "{{ bitwarden_key }}"
|
||||
globalSettings__mail__replyToEmail: "{{ skudaknoreply_mail_user }}"
|
||||
globalSettings__mail__smtp__host: "{{ skudaknoreply_mail_host }}"
|
||||
globalSettings__mail__smtp__port: 587
|
||||
globalSettings__mail__smtp__ssl: "true"
|
||||
globalSettings__mail__smtp__username: "{{ skudaknoreply_mail_user }}"
|
||||
globalSettings__mail__smtp__password: "{{ skudaknoreply_mail_pass }}"
|
||||
globalSettings__disableUserRegistration: "true"
|
||||
adminSettings__admins: "{{ bitwarden_admins }}"
|
||||
volumes:
|
||||
- "{{ bitwarden_path }}/bitwarden:/etc/bitwarden"
|
||||
ports:
|
||||
- "8092:8092"
|
||||
|
||||
- name: create systemd startup job for bitwarden
|
||||
include_tasks: podman/systemd-generate.yml
|
||||
vars:
|
||||
container_name: bitwarden
|
||||
Reference in New Issue
Block a user