Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Ansible
Manage
Activity
Members
Labels
Plan
Issues
3
Issue boards
Milestones
Code
Merge requests
2
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Model registry
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Nounous
Ansible
Commits
d649aa63
Commit
d649aa63
authored
4 years ago
by
me5na7qbjqbrp
Browse files
Options
Downloads
Plain Diff
Merge branch 'moreblackbox' into 'newinfra'
Monitor all websites See merge request
!178
parents
1c73bf43
b71f4d36
No related branches found
No related tags found
1 merge request
!178
Monitor all websites
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
plays/monitoring.yml
+25
-33
25 additions, 33 deletions
plays/monitoring.yml
roles/grafana/templates/ldap.toml.j2
+7
-11
7 additions, 11 deletions
roles/grafana/templates/ldap.toml.j2
with
32 additions
and
44 deletions
plays/monitoring.yml
+
25
−
33
View file @
d649aa63
...
...
@@ -11,11 +11,28 @@
# - quasar.adm.crans.org # 4J
unifi_snmp_targets
:
"
{{
groups['crans_unifi']
|
list
|
sort
}}"
blackbox_targets
:
-
https://crans.org
-
https://www.crans.org
-
https://grafana.crans.org
-
https://wiki.crans.org
-
https://pad.crans.org
-
https://crans.org/
-
https://www.crans.org/
-
https://webirc.crans.org/
-
https://jitsi.crans.org/
-
https://ftps.crans.org/
-
http://ftp.crans.org/
-
https://grafana.crans.org/
-
https://roundcube.crans.org/
-
https://zero.crans.org/
-
https://wiki.crans.org/PageAccueil
-
https://framadate.crans.org/
-
https://pad.crans.org/
-
https://lists.crans.org/
-
https://cas.crans.org/
-
https://ethercalc.crans.org/
-
https://phabricator.crans.org/
-
https://webmail.crans.org/horde/login.php
-
https://gitlab.crans.org/
-
https://perso.crans.org/crans/
-
https://install-party.crans.org/
-
https://intranet.crans.org/
-
https://owncloud.crans.org/
nginx_targets
:
-
hodaur.adm.crans.org
-
charybde.adm.crans.org
...
...
@@ -26,10 +43,9 @@
grafana
:
root_url
:
https://grafana.crans.org
icon
:
crans_icon_white.svg
ldap_base
:
'
dc=crans,dc=org'
ldap_master_ipv4
:
'
172.16.10.1'
ldap_user_tree
:
"
ou=passwd,{{
ldap_base
}}"
ldap_base
:
"
{{
glob_ldap.base
}}"
ldap_master_ipv4
:
"
{{
glob_ldap.servers[0]
}}"
ldap_user_tree
:
"
ou=passwd,{{
glob_ldap.base
}}"
roles
:
-
prometheus
-
prometheus-alertmanager
...
...
@@ -38,30 +54,6 @@
-
ninjabot
-
grafana
# Deploy backup Prometheus on backup server
#- hosts: odlyd.adm.crans.org
# vars:
# # only critical infra
# prometheus:
# node_targets:
# - odlyd.adm.crans.org # me, myself and I
# - zamok.adm.crans.org # parce que WeeChat c'est critique
# - thot.adm.crans.org # la bdd adh est critique... enfin a skip
# - zbee.adm.crans.org # zbeu! la bay!
# - stitch.adm.crans.org # last hope virtu
# - redisdead.adm.crans.org # Postmen... youtu.be/vEkY6W-fEZQ?t=132
# ups_snmp_targets:
# - pulsar.adm.crans.org # 0B
# - quasar.adm.crans.org # 4J
#
# snmp_unifi_password: "{{ vault_snmp_unifi_password }}"
# roles:
# - prometheus
# - prometheus-alertmanager
# - prometheus-snmp-exporter
# - ninjabot
# Monitor all hosts
-
hosts
:
server
vars
:
...
...
This diff is collapsed.
Click to expand it.
roles/grafana/templates/ldap.toml.j2
+
7
−
11
View file @
d649aa63
...
...
@@ -5,7 +5,7 @@
[[servers]]
# Ldap server host (specify multiple hosts space separated)
host = "{{ ldap_master_ipv4 }}"
host = "{{
grafana.
ldap_master_ipv4 }}"
# Default port is 389 or 636 if use_ssl = true
port = 636
# Set to true if ldap server supports TLS
...
...
@@ -20,22 +20,18 @@ ssl_skip_verify = true
# client_cert = "/path/to/client.crt"
# client_key = "/path/to/client.key"
# Search user bind dn
bind_dn = "uid=%s,{{ ldap_user_tree }}"
# Search user bind password
# If the password contains # or ; you have to wrap it with triple quotes. Ex """#password;"""
#bind_password = ''
# Use direct bind
bind_dn = "uid=%s,{{ grafana.ldap_user_tree }}"
# User search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)"
# Useless as we are doing direct bind,
# but without LDAP auth hang
search_filter = "(uid=%s)"
# An array of base dns to search through
search_base_dns = ["{{ ldap_user_tree }}"]
search_base_dns = ["ou=passwd,dc=crans,dc=org"]
## For Posix or LDAP setups that does not support member_of attribute you can define the below settings
## Please check grafana LDAP docs for examples
group_search_filter = "(&(objectClass=posixGroup)(memberUid=%s))"
group_search_base_dns = ["ou=group,{{ ldap_base }}"]
group_search_base_dns = ["ou=group,{{
grafana.
ldap_base }}"]
group_search_filter_user_attribute = "cn"
# Specify names of the ldap attributes your ldap uses
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment