Skip to content

Latest commit

 

History

History
97 lines (70 loc) · 8.63 KB

README.md

File metadata and controls

97 lines (70 loc) · 8.63 KB

Linux Demos

Table of Contents

About These Demos

This category of demos shows examples of linux operations and management with Ansible Automation Platform. The list of demos can be found below. See the Suggested Usage section of this document for recommendations on how to best use these demos.

Jobs

Inventory

A dymanic inventory is created to pull inventory hosts from Red Hat Insights. The Systems will be added by their host name therefore adding duplicate systems will cause conflicts in the inventory. Only systems with the tag purpose=demo in Red Hat Insights will be added to this inventory. Groups will be created for other tags given to the system.

Groups will also be created for systems with missing security, enhancement and bug updates. The inventory configuration is governed by the inventory.insights.yml file.

Remember to delete systems from your Red Hat account when you are done with the demo to avoid conflicts with future demos using the same names.

Post Setup Job Steps

After running the setup job template, there are a few steps required to make the demos fully functional. See the post setup steps below.

These steps may differ in your environment

Add Red Hat account details

To register systems to the Red Hat portal and Insights, edit extra_vars on the Linux / Register job to include your org_id and an activation key to use when registering the systems.

Update Credentials for Insights Inventory

Navigate to the Credentials section and update the Insights Inventory credential with your Red Hat Portal login.

Add Variables for System Roles

Edit the Linux / System Roles job to include the list of roles that you wish to apply and the variables applicable for each role. See documentation here for configuring System Roles.

Suggested Usage

Linux / Register - Use this job to register systems to Red Hat Insights for showing Advisor recommendations and dynamic inventory. Note that the "Ansible Group" will create an AAP inventory group, as well as tag hosts with that group name in Insights.

Linux / Troubleshoot - Use this job to show incident response troubleshooting and basic running of commands with an Ansible Playbook.

Linux / Temporary Sudo - Use this job to show how to grant sudo access with automated cleanup to a server. The user must exist on the system. Using the student user is a good example (ie. student1)

Linux / Patching - Use this job to apply updates or audit for missing updates and produce an html report of systems with missing updates. See the end of the job for the URL to view the report. In other environments this report could be uploaded to a wiki, email, other system. This demo also shows installing a webserver on a linux server. The report is places on the system defined by the report_server variable. By default, report_server is configured as reports. This may be overridden with extra_vars on the Job Template.

Linux / Run Shell Script - Use this job to demonstrate running shell commands or an existing shell script across a group of systems as root. This can be preferred over using Ad-Hoc commands due to the ability to control usage with RBAC. This is helpful in showing the scalable of execution of an existing shell script. It is always recommended to convert shell scripts to playbooks over time. Example usage would be getting the public key used in the environment with the command cat .ssh/authorized_keys.

Linux / Fact Scan - Use this job to demonstrate the use of the Ansible Fact Cache, Ansible facts, and the ability to query installed packages and running services on a system.

Linux / Podman Webserver - Use this job show managing individual containers with Podman via an Ansible Playbook.

Linux / System Roles - This job demonstrates running [RHEL System Roles with AAP. See the documentation here for how to configure system roles with variables by editing the extra_vars on the job template.

Example 1:

system_roles:
  - selinux

selinux_state: enforcing

Example 2 (less invasive, and runs faster):

system_roles:
  - timesync

timesync_ntp_servers:
  - hostname: pool.ntp.org
    pool: yes
    iburst: yes

Linux / DISA STIG - Apply the RHEL STIG security hardening configuration using the DISA Supplemental Automation Content. BE AWARE: this could have unintended results based on the current state of your machine. Always test on a single machine before distributing at scale. For example, AWS instances have NOPASSWD allowed for sudo. Running STIG compliance without adding sudo_remove_nopasswd: false to extra_vars on the job template will lock you out of the machine. This variable is configured on the job template by default for this reason.

Linux / Multi-profile Compliance - Apply security hardening configuration from a supported compliance profile role. BE AWARE: this could have unintended results based on the current state of your machine. Always test on a single machine before distributing at scale. For example, AWS instances have NOPASSWD allowed for sudo. Applying certain compliance profiles without adding sudo_remove_nopasswd: false to extra_vars on the job template will lock you out of the machine. This variable is configured on the job template by default for this reason.

Linux / Report Compliance - Run this template before running the "Linux / Multi-profile Compliance" template and again afterwards to highlight the changes made by the enforcement template. By default, the reports are available by pointing a web browser to the system(s) where the report runs. By setting the use_httpd variable to "false" in the template survey the reports will instead be stored on the target node in the /tmp/oscap-reports directory.

Linux / Insights Compliance Scan - Scan the system according to the compliance profile configured via Red Hat Insights. NOTE: This job will fail if the systems haven't been registered with Insights and associated with a relevant compliance profile. A survey when running the job will ask if you have configured all systems with a compliance profile, and effectively skip all tasks in the job template if the answer is "No".