ansible/group_vars/all.yml

44 lines
1.3 KiB
YAML

---
# set some ansible directories
ansible_dir_root: /srv/ansible
ansible_private: /srv/private
# set group name with gid 0
ansible_wheel: root
# mail settings
mail_server: mail.foo.sh
mail_domain: foo.sh
# ldap settings
ldap_basedn: dc=foo,dc=sh
ldap_server: [ldap.foo.sh]
# log server
log_server: loghost.foo.sh
# kerberos settings
kerberos_realm: FOO.SH
# tls protocols and ciphers
tls_protocols: TLSv1.2
tls_ciphers: ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
# defaults for tls diretories
tls_certs: /etc/pki/tls/certs
tls_private: /etc/pki/tls/private
tls_bundle: /etc/pki/tls/cert.pem
# url where installer data is located
boot_url: https://boot.foo.sh
# ssh public keys for logsync user
logsync_publickeys:
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIlXfTeMQoYjYVXFH5qhp+YgIBM/1r+BwzME7aEOu2yE logsync@log01.home.foo.sh
# ssh public keys for backup user
backup_publickeys:
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKdaNO9dLpI8CVx1rwGsKN45Pgiz+Btrlf2Q/nXCx4Ru root@backup02.home.foo.sh
# hardcode this for now
ansible_datacenter: home