From ec43134104418f90a56dc1d6ee885813cf0ba053 Mon Sep 17 00:00:00 2001 From: Christoph Date: Mon, 8 Apr 2024 21:08:59 +0200 Subject: [PATCH] update.. --- host_vars/file-km.anw-km.netz.yml | 11 ++ host_vars/o12.oopen.de.yml | 5 + host_vars/o13.oopen.de.yml | 5 + host_vars/o17.oopen.de.yml | 5 + host_vars/o21.oopen.de.yml | 5 + host_vars/o22.oopen.de.yml | 5 + host_vars/o23.oopen.de.yml | 5 + host_vars/o24.oopen.de.yml | 5 + host_vars/o25.oopen.de.yml | 5 + host_vars/o27.oopen.de.yml | 5 + host_vars/o28.oopen.de.yml | 5 + host_vars/o29.oopen.de.yml | 5 + host_vars/o30.oopen.de.yml | 5 + host_vars/o31.oopen.de.yml | 5 + host_vars/o32.oopen.de.yml | 5 + host_vars/o34.oopen.de.yml | 5 + host_vars/o35.oopen.de.yml | 5 + host_vars/o36.oopen.de.yml | 5 + host_vars/o38.oopen.de.yml | 5 + host_vars/o39.oopen.de.yml | 5 + host_vars/piwik.warenform.de.yml | 237 ++++++++++++++++++++++++++++ host_vars/server18.warenform.de.yml | 5 + host_vars/server22.warenform.de.yml | 5 + host_vars/server23.warenform.de.yml | 5 + host_vars/server24.warenform.de.yml | 5 + host_vars/server25.warenform.de.yml | 5 + host_vars/server26.warenform.de.yml | 5 + host_vars/server27.warenform.de.yml | 5 + host_vars/server28.warenform.de.yml | 5 + 29 files changed, 383 insertions(+) create mode 100644 host_vars/piwik.warenform.de.yml diff --git a/host_vars/file-km.anw-km.netz.yml b/host_vars/file-km.anw-km.netz.yml index e4f2da5..38fd701 100644 --- a/host_vars/file-km.anw-km.netz.yml +++ b/host_vars/file-km.anw-km.netz.yml @@ -690,6 +690,17 @@ samba_shares: recycle_path: '@Recycle' vfs_object_recycle_is_visible: true + - name: Advoware-Backup + comment: Advoware Dokumente + path: /data/samba/Advoware-Backup + group_valid_users: intern + group_write_list: intern + file_create_mask: !!str 660 + dir_create_mask: !!str 2770 + vfs_object_recycle: true + recycle_path: '@Recycle' + vfs_object_recycle_is_visible: false + - name: alle comment: Alle auf Fileserver path: /data/samba/Alle diff --git a/host_vars/o12.oopen.de.yml b/host_vars/o12.oopen.de.yml index 8547609..edb799a 100644 --- a/host_vars/o12.oopen.de.yml +++ b/host_vars/o12.oopen.de.yml @@ -230,6 +230,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o13.oopen.de.yml b/host_vars/o13.oopen.de.yml index d04cd87..41e7e74 100644 --- a/host_vars/o13.oopen.de.yml +++ b/host_vars/o13.oopen.de.yml @@ -132,6 +132,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o17.oopen.de.yml b/host_vars/o17.oopen.de.yml index 47b5693..ceee4af 100644 --- a/host_vars/o17.oopen.de.yml +++ b/host_vars/o17.oopen.de.yml @@ -154,6 +154,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o21.oopen.de.yml b/host_vars/o21.oopen.de.yml index b52c793..7a70ab2 100644 --- a/host_vars/o21.oopen.de.yml +++ b/host_vars/o21.oopen.de.yml @@ -237,6 +237,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o22.oopen.de.yml b/host_vars/o22.oopen.de.yml index e5eb7cb..2f25477 100644 --- a/host_vars/o22.oopen.de.yml +++ b/host_vars/o22.oopen.de.yml @@ -234,6 +234,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o23.oopen.de.yml b/host_vars/o23.oopen.de.yml index efcc1b8..71b1d02 100644 --- a/host_vars/o23.oopen.de.yml +++ b/host_vars/o23.oopen.de.yml @@ -235,6 +235,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o24.oopen.de.yml b/host_vars/o24.oopen.de.yml index eba7833..41ddce5 100644 --- a/host_vars/o24.oopen.de.yml +++ b/host_vars/o24.oopen.de.yml @@ -237,6 +237,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o25.oopen.de.yml b/host_vars/o25.oopen.de.yml index 2a468b1..717592f 100644 --- a/host_vars/o25.oopen.de.yml +++ b/host_vars/o25.oopen.de.yml @@ -345,6 +345,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o27.oopen.de.yml b/host_vars/o27.oopen.de.yml index 818217a..894a5af 100644 --- a/host_vars/o27.oopen.de.yml +++ b/host_vars/o27.oopen.de.yml @@ -237,6 +237,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o28.oopen.de.yml b/host_vars/o28.oopen.de.yml index 42f0453..0b8144c 100644 --- a/host_vars/o28.oopen.de.yml +++ b/host_vars/o28.oopen.de.yml @@ -344,6 +344,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o29.oopen.de.yml b/host_vars/o29.oopen.de.yml index 7ac0e2c..32a6daf 100644 --- a/host_vars/o29.oopen.de.yml +++ b/host_vars/o29.oopen.de.yml @@ -233,6 +233,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o30.oopen.de.yml b/host_vars/o30.oopen.de.yml index 86fcc46..c32c579 100644 --- a/host_vars/o30.oopen.de.yml +++ b/host_vars/o30.oopen.de.yml @@ -223,6 +223,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o31.oopen.de.yml b/host_vars/o31.oopen.de.yml index 13cb3ef..730db2d 100644 --- a/host_vars/o31.oopen.de.yml +++ b/host_vars/o31.oopen.de.yml @@ -236,6 +236,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o32.oopen.de.yml b/host_vars/o32.oopen.de.yml index 39f7cb6..9d7eec2 100644 --- a/host_vars/o32.oopen.de.yml +++ b/host_vars/o32.oopen.de.yml @@ -234,6 +234,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o34.oopen.de.yml b/host_vars/o34.oopen.de.yml index 2e00f2c..90d99e0 100644 --- a/host_vars/o34.oopen.de.yml +++ b/host_vars/o34.oopen.de.yml @@ -232,6 +232,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o35.oopen.de.yml b/host_vars/o35.oopen.de.yml index aa43abe..3ac3daa 100644 --- a/host_vars/o35.oopen.de.yml +++ b/host_vars/o35.oopen.de.yml @@ -237,6 +237,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o36.oopen.de.yml b/host_vars/o36.oopen.de.yml index e41a45c..e2f6144 100644 --- a/host_vars/o36.oopen.de.yml +++ b/host_vars/o36.oopen.de.yml @@ -230,6 +230,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o38.oopen.de.yml b/host_vars/o38.oopen.de.yml index b3805c3..86821c8 100644 --- a/host_vars/o38.oopen.de.yml +++ b/host_vars/o38.oopen.de.yml @@ -232,6 +232,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/o39.oopen.de.yml b/host_vars/o39.oopen.de.yml index 8df030c..9000f43 100644 --- a/host_vars/o39.oopen.de.yml +++ b/host_vars/o39.oopen.de.yml @@ -232,6 +232,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/piwik.warenform.de.yml b/host_vars/piwik.warenform.de.yml new file mode 100644 index 0000000..3c79238 --- /dev/null +++ b/host_vars/piwik.warenform.de.yml @@ -0,0 +1,237 @@ +--- + +# --- +# vars used by roles/network_interfaces +# --- + + +# --- +# vars used by roles/ansible_dependencies +# --- + + +# --- +# vars used by roles/ansible_user +# --- + + +# --- +# vars used by roles/common/tasks/basic.yml +# --- + + +# --- +# vars used by roles/common/tasks/sshd.yml +# --- + + +# --- +# vars used by roles/common/tasks/apt.yml +# --- + +apt_install_extra_pkgs: true +apt_extra_pkgs: + - subversion + - subversion-tools + + +# --- +# vars used by roles/common/tasks/systemd-resolved.yml +# --- + +systemd_resolved: true + +# CyberGhost - Schnelle Verbindung mit Keine-Logs-Datenschutzrichtlinie +# Primäre DNS-Adresse: 38.132.106.139 +# Sekundäre DNS-Adresse: 194.187.251.67 +# +# Cloudflare (USA) Bester kostenloser DNS-Server für Gaming mit zuverlässigen Verbindungen +# primäre DNS-Adresse +# IPv4: 1.1.1.1 +# IPv6: 2606:4700:4700::1111 +# sekundäre DNS-Adresse +# IPv4: 1.0.0.1 +# IPv6: 2606:4700:4700::1001 +# +# Google (USA) Public DNS - Großartige Kombination aus Geschwindigkeit und Sicherheit +# primäre DNS-Adresse +# IPv4: 8.8.8.8 +# IPv6: 2001:4860:4860::8888 +# sekundäre DNS-Adresse +# IPv4: 8.8.4.4 +# IPv6: 2001:4860:4860::8844 +# +# Quad9 (CH) - Blockiert mühelos schädliche Seiten und verhindert Phishing-Betrug +# primäre DNS-Adresse +# IPv4: 9.9.9.9 +# IPv6: 2620:fe::fe +# sekundäre DNS-Adresse +# IPv4: 149.112.112.112 +# IPv6: 2620:fe::9 +# +# OpenNIC - https://www.opennic.org/ +# IPv4: 195.10.195.195 - ns31.de +# IPv4: 94.16.114.254 - ns28.de +# IPv4: 51.254.162.59 - ns9.de +# IPv4: 194.36.144.87 - ns29.de +# IPv6: 2a00:f826:8:2::195 - ns31.de +# +# Freifunk München (normales DNS, DNS-over-TLS und DNS-over-HTTPS) +# IPv4: 5.1.66.255 +# IPv6: 2001:678:e68:f000:: +# Servername für DNS-over-TLS: dot.ffmuc.net +# IPv4: 185.150.99.255 +# IPv6: 2001:678:ed0:f000:: +# Servername für DNS-over-TLS: dot.ffmuc.net +# für iOS 14+: DoT-Server-Konfiguration (unsigniert, vom PrHdb) +resolved_nameserver: + - 212.42.230.1 + - 83.223.90.90 + - 83.223.66.51 + +# search domains +# +# If there are more than one search domains, then specify them here in the order in which +# the resolver should also search them +# +#resolved_domains: [] +resolved_domains: + - ~. + - warenform.de + +resolved_dnssec: false + +# dns.as250.net: 194.150.168.168 +# +resolved_fallback_nameserver: + - 194.150.168.168 + + +# --- +# vars used by roles/common/tasks/cron.yml +# --- + + +# --- +# vars used by roles/common/tasks/users.yml +# --- + +insert_ssh_keypair_backup_server: false +ssh_keypair_backup_server: + - name: backup + backup_user: back + priv_key_src: root/.ssh/id_rsa.backup.warenform.de + priv_key_dest: /root/.ssh/id_rsa + pub_key_src: root/.ssh/id_rsa.backup.warenform.de.pub + pub_key_dest: /root/.ssh/id_rsa.pub + +insert_keypair_backup_client: true +ssh_keypair_backup_client: + - name: backup + priv_key_src: root/.ssh/id_ed25519.warenform-server + priv_key_dest: /root/.ssh/id_ed25519 + pub_key_src: root/.ssh/id_ed25519.warenform-server.pub + pub_key_dest: /root/.ssh/id_ed25519.pub + target: backup.warenform.de + + +default_user: + + - name: chris + password: $6$bSHlaLHC$URSMVq090e/cJ1v55Jh9ws0w5WekhO7X3Y0RqryAl5R76K9khWBegC76Smjastja.xMiD57/LzUUXW7y9NvAL. + shell: /bin/bash + ssh_keys: + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO90culn3sicU2chTHn40ytcTay0nUIHap0uF/5fVM6P chris@sol' + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOQHMUKlDh2ufno5pZOhUY5xFljC1R5zQ/GjOHDkS58D root@sol' + + - name: axel + password: $6$zUWC465e$XblctxwnBIOa7mPcN6foEQrwChjpwoY7lLtacXJrSsvjZS3I6Ox1mYUtN3/gzkvpbzOPx/9PlRJV.mbl939mD. + shell: /bin/bash + ssh_keys: + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO90culn3sicU2chTHn40ytcTay0nUIHap0uF/5fVM6P chris@sol' + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOQHMUKlDh2ufno5pZOhUY5xFljC1R5zQ/GjOHDkS58D root@sol' + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICOPnP788dlfeFi9oo8UkS0Chi/jcxUGjsOuQnxW/GR+ axel@wf.netz' + + - name: sysadm + user_id: 1050 + group_id: 1050 + password: $6$vvccwrTc$Sz1HaSb3ujObprltiG7D6U1Rr3fpgfjkKuDDWYdHzPkPx/0pEofCWC.vyTn78hcemkntl.6wVUOnJnNloKt/E/ + shell: /bin/bash + ssh_keys: + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO90culn3sicU2chTHn40ytcTay0nUIHap0uF/5fVM6P chris@sol' + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOQHMUKlDh2ufno5pZOhUY5xFljC1R5zQ/GjOHDkS58D root@sol' + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICOPnP788dlfeFi9oo8UkS0Chi/jcxUGjsOuQnxW/GR+ axel@wf.netz' + + - name: localadmin + user_id: 1051 + group_id: 1051 + password: $6$flo5afeu$1Dn/tqIOJIFQbymCzpJk9BgGflQdy2Eg0nTiMBF7VefN7uY/Md1pV2yU0S47kZuH5aDjSdPfKzhHp8Aul/xx90 + shell: /bin/bash + ssh_keys: + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO90culn3sicU2chTHn40ytcTay0nUIHap0uF/5fVM6P chris@sol' + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOQHMUKlDh2ufno5pZOhUY5xFljC1R5zQ/GjOHDkS58D root@sol' + + - name: back + user_id: 1060 + group_id: 1060 + password: $6$GntX81EP$O1GEmQF.BbOQfTMMw/m/BDKSXmANVpqmz0nyzw4O4R2/iK9huGOAjT/2eq8FVdMghvNOvdwrWtwohO.Mg4V9n. + shell: /bin/bash + ssh_keys: + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO90culn3sicU2chTHn40ytcTay0nUIHap0uF/5fVM6P chris@sol' + - 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOQHMUKlDh2ufno5pZOhUY5xFljC1R5zQ/GjOHDkS58D root@sol' + +sudo_users: + - chris + - axel + - sysadm + - localadmin + + +# --- +# vars used by roles/common/tasks/users-systemfiles.yml +# --- + + +# --- +# vars used by roles/common/tasks/webadmin-user.yml +# --- + + +# --- +# vars used by roles/common/tasks/sudoers.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/copy_files.yml +# --- + + +# --- +# vars used by roles/common/tasks/caching-nameserver.yml +# --- + + +# --- +# vars used by roles/common/tasks/git.yml +# --- + +git_firewall_repository: + name: ipt-server + repo: https://git.oopen.de/firewall/ipt-server + dest: /usr/local/src/ipt-server + + +# ============================== + + +# --- +# vars used by scripts/reset_root_passwd.yml +# --- + +root_user: + name: root + password: $6$J1ssJfdshf/$mknQEPDcW4HN5.wFfawbamamywI7F7fhdZmaR1abNrc4DA7DNRx766lz3ygf9YV3gcmRq3QhJ3fBVlkwGMCvq. + diff --git a/host_vars/server18.warenform.de.yml b/host_vars/server18.warenform.de.yml index f183cf7..ec55569 100644 --- a/host_vars/server18.warenform.de.yml +++ b/host_vars/server18.warenform.de.yml @@ -234,6 +234,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/server22.warenform.de.yml b/host_vars/server22.warenform.de.yml index 0a74e80..c39fe4f 100644 --- a/host_vars/server22.warenform.de.yml +++ b/host_vars/server22.warenform.de.yml @@ -221,6 +221,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/server23.warenform.de.yml b/host_vars/server23.warenform.de.yml index 5ae786a..72b2aa8 100644 --- a/host_vars/server23.warenform.de.yml +++ b/host_vars/server23.warenform.de.yml @@ -221,6 +221,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/server24.warenform.de.yml b/host_vars/server24.warenform.de.yml index 1281121..6ae0ae7 100644 --- a/host_vars/server24.warenform.de.yml +++ b/host_vars/server24.warenform.de.yml @@ -228,6 +228,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/server25.warenform.de.yml b/host_vars/server25.warenform.de.yml index 9a3543a..2ef68f1 100644 --- a/host_vars/server25.warenform.de.yml +++ b/host_vars/server25.warenform.de.yml @@ -229,6 +229,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/server26.warenform.de.yml b/host_vars/server26.warenform.de.yml index 859522f..fb9e8d7 100644 --- a/host_vars/server26.warenform.de.yml +++ b/host_vars/server26.warenform.de.yml @@ -244,6 +244,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/server27.warenform.de.yml b/host_vars/server27.warenform.de.yml index 90bb99c..5d12841 100644 --- a/host_vars/server27.warenform.de.yml +++ b/host_vars/server27.warenform.de.yml @@ -251,6 +251,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved" diff --git a/host_vars/server28.warenform.de.yml b/host_vars/server28.warenform.de.yml index 5ed2dd6..2d6f8ae 100644 --- a/host_vars/server28.warenform.de.yml +++ b/host_vars/server28.warenform.de.yml @@ -235,6 +235,11 @@ cron_env_entries: cron_user_special_time_entries: + - name: "Restart NTP service 'ntpsec'" + special_time: reboot + job: "sleep 2 ; /bin/systemctl restart ntpsec" + insertafter: PATH + - name: "Restart DNS Cache service 'systemd-resolved'" special_time: reboot job: "sleep 5 ; /bin/systemctl restart systemd-resolved"