- Notifications
You must be signed in to change notification settings - Fork11
Ansible playbook to setup a Debian server
License
rpthms/ansible-debian-server
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
Ansible Playbook to deploy a Debian Server
This playbook was initially created to easily set up a VPN server within minutes. I've added a few more roles to this playbook since then. You can modify your site.yml file and select the roles which suit your needs.
This playbook currently includes the following roles:
- apt: Install core packages
- system-config: Set up core config files in /etc
- networking: Configure systemd-networkd and enabling IP forwarding
- nftables: Set up a basic nftables ruleset and allow other roles to create firewall rules.
- unattended-upgrades: Automate security upgrades
- postfix: Set up a send-only Postfix SMTP server to receive notifications from the server
- openvpn: Set up the OpenVPN server and configure firewall rules
- rsyslog: Set up a remote syslog server
- user-config: Local user configurations. This role has beek kept empty for you to fill it with your user configurations.
- nginx: Setup an HTTPS server block for a given hostname. This role will call the certbot role to generate a TLS cert.
- nginx-base: Setup a default HTTP and HTTPS server using the server's FQDN. This role should NEVER be called. Use the nginx role instead.
- znc: Setup an IRC bounder via ZNC
- wireguard: Setup a WireGuard VPN server
- certbot: Generate a TLS cert for the given hostname. Only uses the DNS-01 challenege for domain verification.
- influxdb: Set up a time series database using InfluxDB
- kapacitor: Set up data processing and alert generation using Kapacitor. Kapacitor gets its data from an InfluxDB server.
- monitor: Set up Telegraf to gather data from a host and send it to an InfluxDB server and set up alerting tasks on a remote Kapacitor server.
- grafana: Set up a Grafana server to create dashboards and view the time series data stored on an InfluxDB server
Before you use this playbook, you'll need to do 2 things
To keep this playbook as generic as possible, I've moved all the variables into a separate file called vars.yml. You will have to create this file by copyingvars.sample.yml tovars.yml and adding the required information. You can also encryptvars.yml using ansible-vault if you so desire.
You will need to add the following files to the OpenVPN role's files directory (roles/openvpn/files). Make sure the files names are the same as given below:
- ca.crt: Your root certificate (CA file)
- crl.pem: Certicate Revocation List
- dh.pem: Diffie Hellman parameters
- server.crt: Your server's certificate (signed by your CA)
- server.key: Your server's private key
- ta.key: OpenVPN static key required for HMAC authentication
All these files can be easily generated usingEasyRSA. Check out the Arch Wiki to learnhow to use EasyRSA.
- Make sure your SSH public key has been deployed to the root account as the playbook is using root as the
remote_user. If you'd rather SSH into your own account and use sudo to run the playbook, then you'll have to replaceremote_userwithbecome_userin site.yml - Make surepython-netaddr is installed on your system, as some of the roles in this playbook use the
ipaddrfilter which needs that package. - Edit the inventory (
/etc/ansible/hostsor a custom inventory file) to add your Debian server's IP or hostname - Change the hosts entry in
site.ymlto your Debian server's IP or hostname - Modify the list of roles provided in
site.ymlaccording to your requirements. - Run the playbook using
ansible-playbook site.yml
To run only a section of the configuration, make use of the --tags flag. Eg:-ansible-playbook site.yml --tags rsyslog
About
Ansible playbook to setup a Debian server
Topics
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Releases
Packages0
Uh oh!
There was an error while loading.Please reload this page.