Saltstack Official Linux Formula
Você não pode selecionar mais de 25 tópicos Os tópicos devem começar com uma letra ou um número, podem incluir traços ('-') e podem ter até 35 caracteres.

440 linhas
13KB

  1. linux:
  2. network:
  3. enabled: true
  4. hostname: linux
  5. fqdn: linux.ci.local
  6. system:
  7. enabled: true
  8. cluster: default
  9. name: linux
  10. domain: ci.local
  11. environment: prd
  12. purge_repos: true
  13. directory:
  14. /tmp/test:
  15. makedirs: true
  16. apparmor:
  17. enabled: false
  18. haveged:
  19. enabled: true
  20. prompt:
  21. default: "linux.ci.local$"
  22. kernel:
  23. isolcpu: 1,2,3,4
  24. elevator: deadline
  25. boot_options:
  26. - pti=off
  27. - spectre_v2=auto
  28. module:
  29. module_1:
  30. install:
  31. command: /bin/true
  32. remove:
  33. enabled: false
  34. command: /bin/false
  35. module_2:
  36. install:
  37. enabled: false
  38. command: /bin/false
  39. remove:
  40. command: /bin/true
  41. module_3:
  42. blacklist: true
  43. module_4:
  44. blacklist: false
  45. alias:
  46. "module*":
  47. enabled: true
  48. "module_*":
  49. enabled: false
  50. module_5:
  51. softdep:
  52. pre:
  53. 1:
  54. value: module_1
  55. 2:
  56. value: module_2
  57. enabled: false
  58. post:
  59. 1:
  60. value: module_3
  61. 2:
  62. value: module_4
  63. enabled: false
  64. module_6:
  65. option:
  66. opt_1: 111
  67. opt_2: 222
  68. module_7:
  69. option:
  70. opt_3:
  71. value: 333
  72. opt_4:
  73. enabled: true
  74. value: 444
  75. opt_5:
  76. enabled: false
  77. cgroup:
  78. group:
  79. group_1:
  80. controller:
  81. cpu:
  82. shares:
  83. value: 250
  84. mapping:
  85. subjects:
  86. - '@group1'
  87. sysfs:
  88. scheduler:
  89. block/sda/queue/scheduler: deadline
  90. power:
  91. mode:
  92. power/state: 0660
  93. owner:
  94. power/state: "root:power"
  95. devices/system/cpu/cpu0/cpufreq/scaling_governor: powersave
  96. motd:
  97. - warning: |
  98. #!/bin/sh
  99. printf "WARNING: This is tcpcloud network.\n"
  100. printf " Unauthorized access is strictly prohibited.\n"
  101. printf "\n"
  102. - info: |
  103. #!/bin/sh
  104. printf -- "--[tcp cloud]---------------------------\n"
  105. printf " Hostname | ${linux:system:name}\n"
  106. printf " Domain | ${linux:system:domain}\n"
  107. printf " System | %s\n" "$(lsb_release -s -d)"
  108. printf " Kernel | %s\n" "$(uname -r)"
  109. printf -- "----------------------------------------\n"
  110. printf "\n"
  111. user:
  112. root:
  113. enabled: true
  114. home: /root
  115. name: root
  116. testuser:
  117. enabled: true
  118. name: testuser
  119. password: passw0rd
  120. sudo: true
  121. uid: 9999
  122. full_name: Test User
  123. home: /home/test
  124. groups:
  125. - db-ops
  126. - salt-ops
  127. salt_user1:
  128. enabled: true
  129. name: saltuser1
  130. sudo: false
  131. uid: 9991
  132. full_name: Salt User1
  133. home: /home/saltuser1
  134. home_dir_mode: 755
  135. salt_user2:
  136. enabled: true
  137. name: saltuser2
  138. sudo: false
  139. uid: 9992
  140. full_name: Salt Sudo User2
  141. home: /home/saltuser2
  142. groups:
  143. - sudogroup1
  144. group:
  145. testgroup:
  146. enabled: true
  147. name: testgroup
  148. gid: 9999
  149. system: true
  150. addusers:
  151. - salt_user1
  152. - salt_user2
  153. db-ops:
  154. enabled: true
  155. delusers:
  156. - salt_user1
  157. - dontexistatall
  158. salt-ops:
  159. enabled: true
  160. name: salt-ops
  161. sudogroup1:
  162. enabled: true
  163. name: sudogroup1
  164. sudogroup2:
  165. enabled: true
  166. name: sudogroup2
  167. sudogroup3:
  168. enabled: false
  169. name: sudogroup3
  170. job:
  171. test:
  172. enabled: true
  173. command: "/bin/sleep 3"
  174. user: testuser
  175. minute: 0
  176. hour: 13
  177. package:
  178. htop:
  179. version: latest
  180. repo:
  181. disabled_repo:
  182. source: "deb [arch=amd64] https://download.docker.com/linux/ubuntu xenial stable"
  183. enabled: false
  184. disabled_repo_left_proxy:
  185. source: "deb [arch=amd64] https://download.docker.com/linux/ubuntu xenial stable"
  186. enabled: false
  187. proxy:
  188. enabled: true
  189. https: https://127.0.5.1:443
  190. opencontrail:
  191. source: "deb http://ppa.launchpad.net/tcpcloud/contrail-3.0/ubuntu xenial main"
  192. keyid: E79EE90C
  193. keyserver: keyserver.ubuntu.com
  194. architectures: amd64
  195. proxy:
  196. enabled: true
  197. https: https://127.0.5.1:443
  198. #http: http://127.0.5.2:8080
  199. apt-salt:
  200. source: "deb http://apt.mirantis.com/xenial stable salt"
  201. #key_url: http://apt.mirantis.com/public.gpg
  202. # pub 4096R/A76882D3 2015-06-17
  203. key: |
  204. -----BEGIN PGP PUBLIC KEY BLOCK-----
  205. Version: GnuPG v1
  206. mQINBFWBfCIBEADf6lnsY9v4rf/x0ribkFlnHnsv1/yD+M+YgZoQxYdf6b7M4/PY
  207. zZ/c3uJt4l1vR3Yoocfc1VgtBNfA1ussBqXdmyRBMO1LKdQWnurNxWLW7CwcyNke
  208. xeBfhjOqA6tIIXMfor7uUrwlIxJIxK+jc3C3nhM46QZpWX5d4mlkgxKh1G4ZRj4A
  209. mEo2NduLUgfmF+gM1MmAbU8ekzciKet4TsM64WAtHyYllGKvuFSdBjsewO3McuhR
  210. i1Desb5QdfIU4p3gkIa0EqlkkqX4rowo5qUnl670TNTTZHaz0MxCBoYaGbGhS7gZ
  211. 6/PLm8fJHmU/phst/QmOY76a5efZWbhhnlyYLIB8UjywN+VDqwkNk9jLUSXHTakh
  212. dnL4OuGoNpIzms8juVFlnuOmx+FcfbHMbhAc7aPqFK+6J3YS4kJSfeHWJ6cTGoU1
  213. cLWEhsbU3Gp8am5fnh72RJ7v2sTe/rvCuVtlNufi5SyBPcEUZoxFVWAC/hMeiWzy
  214. drBIVC73raf+A+OjH8op9XfkVj6czxQ/451soe3jvCDGgTXPLlts+P5WhgWNpDPa
  215. fOfTHn/2o7NwoM7Vp+BQYKAQ78phsolvNNhf+g51ntoLUbxAGKZYzQ5RPsKo+Hq6
  216. 96UCFkqhSABk0DvM0LtquzZ+sNoipd02w8EaxQzelDJxvPFGigo1uqGoiQARAQAB
  217. tCx0Y3BjbG91ZCBzaWduaW5nIGtleSA8YXV0b2J1aWxkQHRjcGNsb3VkLmV1PokC
  218. OwQTAQIAJQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AFAlWj4K8CGQEACgkQ
  219. JACFCadogtPm9xAAl1D1RUY1mttjKk+8KI3tUmgtqLaIGUcB4TPbIhQpFy23TJd6
  220. BnnEaGZ+HSCj3lp/dBoq1xxCqHCziKA04IpPaLpGJf8cqaKOpQpW1ErlSxT6nCQW
  221. FrHFxZreBTljKqW3fvRBXNAquj0krJEwv19/3SsQ+CJI2Zkq/HPDw9eJOCu0WcJM
  222. PVtAq2SmaDigh1jtFcFoWZ7uFFMQPIWit/RCPkDfkFaf6lbYZ/nnvWON9OAgzWci
  223. GJjCp5a7vMyCpTRy6bgNPqM61omCe0iQ4yIcqANXhRYS/DBnjKr9YaDKnlKNUgd1
  224. WRE8QzErQznH/plgISQ+df+8Iunp3SBr/jj1604yyM1Wxppn1+dAoTBU1OPFGVd3
  225. mCEYHUe+v0iTZ69C2c1ISmp2MjciGyE/UPbW9ejUIXtFJAJovZjn6P3glyIQB3wq
  226. AW6JE+xEBWH7Ix+Uv6YNAFfj3UO6vNjtuGbTCWYDCEJRkdmeE7QdTYDo7PxgPl1t
  227. 6xMGPLOBdYNJTEojvRYBTt+6iw0eZ+MCUdUFNeaseQh0p1RgqM9/7t75QCNLl1oO
  228. +Cfu4vNef/Tpd3LHcUoQhQ2OViOVFbq1/Yu/natWDPDcXb3peTcNHOjmXAoboWbz
  229. rDkxj5z7vcJ9LMEXviP6Fb/iXDmJh74/o6Agc8efb0WTmFjPFFtMCHrinb+5Ag0E
  230. VYF8IgEQALUVS2GESQ+F1S4b0JIO1M2tVBXiH4N56eUzcDXxXbSZgCgx4aWhk5vJ
  231. Qu7M11gtqIoiRbmuFpUmDOG/kB7DxBZPn8WqcBKpky6GUP/A/emaAZTwNQdcDAhD
  232. foBkJdhVz0D2jnkBffYL055p/r1Ers+iTTNOas/0uc50C32xR823rQ2Nl6/ffIM6
  233. JqfQenhRvqUWPj9oqESHMsqEdceSwS/VC7RN4xQXJXfEWu2q4Ahs62RmvCXnTw1A
  234. sPcpysoBoo8IW+V1MVQEZuAJRn2AGO/Q7uY9TR4guHb3wXRfZ3k0KVUsyqqdusJi
  235. T3DxxBw6GcKdOH6t41Ys3eYgOrc+RcSdcHYSpxaLvEIhwzarZ+mqcp3gz/JkPlXS
  236. 2tx2l6NZHcgReOM7IhqMuxzBbpcrsbBmLBemC+u7hoPTjUdTHKEwvWaeXL4vgsqQ
  237. BbEeKmXep5sZg3kHtpXzY9ZfPQrtGB8vHGrfaZIcCKuXwZWGL5GGWKw3TSP4fAIA
  238. jLxLf5MyyXcsugbai2OY/H4sAuvJHsmGtergGknuR+iFdt5el1wgRKP1r1KdmvMm
  239. wsSayc6eSEKd689x3zsmAtnhYM31oMkPdeYRbnN15gLG7vcsVe4jug0YTqQt2WGn
  240. hwjBA0i2qfTorXemWChsxKllvY9aB3ST8I6RMat0kS08FMD+Ced/ABEBAAGJAh8E
  241. GAECAAkFAlWBfCICGwwACgkQJACFCadogtNicA/9HOM402VGHlmuYPcrvEThHqMK
  242. KOTtNFsrrPp67dGYaT8TGTgy1OG4Oys2y+hrwqnUK6dXJxX2/RBfRuO/gw65RCfC
  243. 9nWeMkqJTjHJCKNTYfXN4O4ag444UZPcOMq+IyiWF3/sh674zCkCm5DQ/FH8IJ8Y
  244. n4jMoxe7G48PCGtgcJKXo8NBzxwXJH4DCdk7rNdrbrnCwObG8h6530WrmzKuyFCJ
  245. QP5JA0MSx23J2OrK2YmVMhTeO0czJ8fRip9We9/qAfZGUEW+sey+nLmT5OJq04al
  246. Va9g2a4nXxzDy84+hRXQNUeCRYn/ys8d8q9HZNv3K36HlILcuWazNTTh0cuWupBd
  247. SlIEuWbIdbknYpGsmS1cPeGi0bdoLZv90BIVmdOS/vXP02fGUblyANciKcBPRhOI
  248. +z6hzwdZ+QvjPbxZUig5XuvqBhIHoRtMBJdf24ysFuf/d4uZzTC8T4rUQO+L29bt
  249. 8riT0dg6cHVwC0VH89FaO1FduvsCtAwdAgxSzOMBECNOmVBThIiWdLnns107Rp4F
  250. ECk+l2UCjl7zwGqJqcd1BQK+UgZwVG2UV11CrhopKU5oGL84n5DaO2n6Rv8wVdrt
  251. MKvqi7EkgvZpY0IHJ7rp0Gzrv0qmwJaUFCWFogITNyijb1JVsUgDTMhAkEgEsIYy
  252. jtcwJrHue5Xn8UPSLkE=
  253. =SWiA
  254. -----END PGP PUBLIC KEY BLOCK-----
  255. architectures: amd64
  256. proxy:
  257. enabled: true
  258. apt-salt-nightly:
  259. source: "deb http://apt.mirantis.com/xenial nightly salt"
  260. key_url: http://apt.mirantis.com/public.gpg
  261. architectures: amd64
  262. proxy:
  263. enabled: false
  264. apt-extra-nightly:
  265. source: "deb http://apt.mirantis.com/xenial nightly extra"
  266. key_url: http://apt.mirantis.com/public.gpg
  267. architectures: amd64
  268. locale:
  269. en_US:
  270. enabled: true
  271. default: true
  272. cs_CZ:
  273. enabled: true
  274. autoupdates:
  275. enabled: true
  276. sudo:
  277. enabled: true
  278. alias:
  279. runas:
  280. DBA:
  281. - postgres
  282. - mysql
  283. SALT:
  284. - root
  285. host:
  286. LOCAL:
  287. - localhost
  288. PRODUCTION:
  289. - db1
  290. - db2
  291. command:
  292. SUDO_RESTRICTED_SU:
  293. - /bin/vi /etc/sudoers
  294. - /bin/su - root
  295. - /bin/su -
  296. - /bin/su
  297. - /usr/sbin/visudo
  298. SUDO_SHELLS:
  299. - /bin/sh
  300. - /bin/ksh
  301. - /bin/bash
  302. - /bin/rbash
  303. - /bin/dash
  304. - /bin/zsh
  305. - /bin/csh
  306. - /bin/fish
  307. - /bin/tcsh
  308. - /usr/bin/login
  309. - /usr/bin/su
  310. - /usr/su
  311. SUDO_SALT_SAFE:
  312. - /usr/bin/salt state*
  313. - /usr/bin/salt service*
  314. - /usr/bin/salt pillar*
  315. - /usr/bin/salt grains*
  316. - /usr/bin/salt saltutil*
  317. - /usr/bin/salt-call state*
  318. - /usr/bin/salt-call service*
  319. - /usr/bin/salt-call pillar*
  320. - /usr/bin/salt-call grains*
  321. - /usr/bin/salt-call saltutil*
  322. SUDO_SALT_TRUSTED:
  323. - /usr/bin/salt*
  324. users:
  325. saltuser1: {}
  326. saltuser2:
  327. hosts:
  328. - LOCAL
  329. # User Alias:
  330. DBA:
  331. hosts:
  332. - ALL
  333. commands:
  334. - SUDO_SALT_SAFE
  335. groups:
  336. db-ops:
  337. hosts:
  338. - ALL
  339. - '!PRODUCTION'
  340. runas:
  341. - DBA
  342. commands:
  343. - /bin/cat *
  344. - /bin/less *
  345. - /bin/ls *
  346. - SUDO_SALT_SAFE
  347. - '!SUDO_SHELLS'
  348. - '!SUDO_RESTRICTED_SU'
  349. salt-ops:
  350. hosts:
  351. - 'ALL'
  352. runas:
  353. - SALT
  354. commands:
  355. - SUDO_SALT_TRUSTED
  356. salt-ops2:
  357. name: salt-ops
  358. runas:
  359. - DBA
  360. commands:
  361. - SUDO_SHELLS
  362. sudogroup1:
  363. commands:
  364. - ALL
  365. sudogroup2:
  366. commands:
  367. - ALL
  368. hosts:
  369. - localhost
  370. users:
  371. - test
  372. nopasswd: false
  373. sudogroup3:
  374. commands:
  375. - ALL
  376. env:
  377. BOB_VARIABLE: Alice
  378. BOB_PATH:
  379. - /srv/alice/bin
  380. - /srv/bob/bin
  381. HTTPS_PROXY: https://127.0.4.1:443
  382. http_proxy: http://127.0.4.2:80
  383. ftp_proxy: ftp://127.0.4.3:2121
  384. no_proxy:
  385. - 192.168.0.1
  386. - 192.168.0.2
  387. - .saltstack.com
  388. - .ubuntu.com
  389. - .mirantis.com
  390. - .launchpad.net
  391. - .dummy.net
  392. - .local
  393. LANG: C
  394. LC_ALL: C
  395. profile:
  396. vi_flavors.sh: |
  397. export PAGER=view
  398. alias vi=vim
  399. locales: |
  400. export LANG=en_US
  401. export LC_ALL=en_US.UTF-8
  402. # pillar for proxy configuration
  403. proxy:
  404. # for package managers
  405. pkg:
  406. enabled: true
  407. https: https://127.0.2.1:4443
  408. #http: http://127.0.2.2
  409. ftp: none
  410. # fallback, system defaults
  411. https: https://127.0.1.1:443
  412. #http: http://127.0.1.2
  413. ftp: ftp://127.0.1.3
  414. noproxy:
  415. - host1
  416. - host2
  417. - .local
  418. # pillars for netconsole setup
  419. netconsole:
  420. enabled: true
  421. port: 514
  422. loglevel: debug
  423. target:
  424. 192.168.0.1:
  425. mac: "ff:ff:ff:ff:ff:ff"
  426. interface: bond0
  427. atop:
  428. enabled: true
  429. interval: 20
  430. logpath: "/var/mylog/atop"
  431. outfile: "/var/mylog/atop/daily.log"
  432. mcelog:
  433. enabled: true
  434. logging:
  435. syslog: true
  436. syslog_error: true