printf "Unauthorized access strictly prohibited.\n" | printf "Unauthorized access strictly prohibited.\n" | ||||
RHEL / CentOS | RHEL / CentOS | ||||
~~~~~~~~~~~~~ | |||||
^^^^^^^^^^^^^ | |||||
Unfortunately ``update-motd`` is currently not available for RHEL so there's | Unfortunately ``update-motd`` is currently not available for RHEL so there's | ||||
no native support for dynamic motd. | no native support for dynamic motd. | ||||
This is [company name] network. | This is [company name] network. | ||||
Unauthorized access strictly prohibited. | Unauthorized access strictly prohibited. | ||||
Haveged | |||||
~~~~~~~ | |||||
If you are running headless server and are low on entropy, it may be a good | |||||
idea to setup Haveged. | |||||
.. code-block:: yaml | |||||
linux: | |||||
system: | |||||
haveged: | |||||
enabled: true | |||||
Linux network | Linux network | ||||
------------- | ------------- | ||||
{%- from "linux/map.jinja" import system with context %} | |||||
{%- if system.haveged.enabled %} | |||||
haveged_pkgs: | |||||
pkg.installed: | |||||
- name: haveged | |||||
- watch_in: | |||||
- service: haveged_service | |||||
haveged_service: | |||||
service.running: | |||||
- name: haveged | |||||
- enable: true | |||||
- require: | |||||
- pkg: haveged_packages | |||||
{%- endif %} |
{%- if system.get('policyrcd', [])|length > 0 %} | {%- if system.get('policyrcd', [])|length > 0 %} | ||||
- linux.system.policyrcd | - linux.system.policyrcd | ||||
{%- endif %} | {%- endif %} | ||||
{%- if system.haveged is defined %} | |||||
- linux.system.haveged | |||||
{%- endif %} |
environment: prd | environment: prd | ||||
apparmor: | apparmor: | ||||
enabled: false | enabled: false | ||||
haveged: | |||||
enabled: true | |||||
console: | console: | ||||
tty0: | tty0: | ||||
autologin: root | autologin: root |