-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathCentOS7x_Install-NTP-Services-playbook.yml
113 lines (89 loc) · 3.38 KB
/
CentOS7x_Install-NTP-Services-playbook.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
---
################################################################################
# description: Installs NTP Services on CentOS7x
# usage: ansible-playbook CentOS7x_Install-NTP-Services-playbook.yml --extra-vars 'HostOrGroup=YourServerOrGroupNameGoesHere'
# author: Ernest G. Wilson II <[email protected]> (https://github.com/ernestgwilsonii)
# license: MIT
################################################################################
# Ansible Playbook options
# REF: http://docs.ansible.com/ansible/playbooks.html
#####################################################
- name: Install NTP Services on CentOS7x
hosts: "{{ HostOrGroup|default ('FATAL ERROR --> HostOrGroup NOT SET! You must specify either a Host or a Group name!') }}"
serial: "100%"
gather_facts: False
tasks:
# Install yum packages
# REF: http://docs.ansible.com/ansible/yum_module.html
######################################################
- name: Install ntp (ntpd) package
yum:
name=ntp
state=present
# Restart firewalld to make sure it is running OK before changing any rules
# REF: http://docs.ansible.com/ansible/service_module.html
###########################################################################
# - name: Ensure the firewalld service is enabled and re-started before changing any rules
# service:
# name=firewalld
# enabled=yes
# state=restarted
# Update the firewalld configuration
# REF: http://docs.ansible.com/ansible/firewalld_module.html
############################################################
# - name: Update firewall to allow port TCP 123 ntpd connections
# firewalld:
# port=123/tcp
# permanent=true
# immediate=yes
# state=enabled
# zone=public
# - name: Update firewall to allow port UDP 123 ntpd connections
# firewalld:
# port=123/udp
# permanent=true
# immediate=yes
# state=enabled
# zone=public
# iptables - Modify the systems iptables
# REF: http://docs.ansible.com/ansible/latest/iptables_module.html
##################################################################
- name: Update iptables to allow port TCP 123 ntpd connections
iptables:
chain: INPUT
ctstate: NEW,ESTABLISHED,RELATED
protocol: tcp
match: tcp
destination_port: 123
comment: #iptables -A INPUT -p tcp -m state --state NEW -m tcp --dport 123 -j ACCEPT
jump: ACCEPT
state: present
become: yes
- name: Update iptables to allow port UDP 123 ntpd connections
iptables:
chain: INPUT
ctstate: NEW,ESTABLISHED,RELATED
protocol: udp
match: udp
destination_port: 123
comment: #iptables -A INPUT -p udp -m state --state NEW -m udp --dport 123 -j ACCEPT
jump: ACCEPT
state: present
become: yes
# Enable and start services
# REF: http://docs.ansible.com/ansible/service_module.html
##########################################################
- name: Enable and start the ntpd service
service:
name=ntpd
enabled=yes
state=restarted
# Command line verification:
# systemctl status ntpd
# ntpq -p
# Execute command(s)
# REF: http://docs.ansible.com/ansible/command_module.html
##########################################################
- name: /usr/libexec/iptables/iptables.init save
command: /usr/libexec/iptables/iptables.init save
#cat /etc/sysconfig/iptables