Compare commits

..

5 commits

Author SHA1 Message Date
249a3b753e
add option to netbox role for custom pipeline code for OIDC mapping
All checks were successful
/ Ansible Lint (push) Successful in 1m44s
/ Ansible Lint (pull_request) Successful in 1m38s
Add option to netbox role for ensuring custom pipeline code for OIDC
group and role mapping is either present or not.

The custom pipeline code is licensed under the Creative Commons: CC
BY-SA 4.0 license.

See:
https://github.com/goauthentik/authentik/blob/main/LICENSE
https://github.com/goauthentik/authentik/blob/main/website/integrations/services/netbox/index.md
https://docs.goauthentik.io/integrations/services/netbox/
5676b1a468
2025-02-15 05:22:21 +01:00
aa9a0cdbce
add license notice to README
This is in preparation for extending that notice to point out code that
is licensed differently.
2025-02-15 03:53:23 +01:00
cf33fb2e0e
add netbox role for ensuring netbox is deployed as specified
All checks were successful
/ Ansible Lint (push) Successful in 1m43s
/ Ansible Lint (pull_request) Successful in 1m39s
The role takes over the deployment of netbox and its dependencies, while
still requiring the user to provide the netbox version, db password and
config as well as to set up a web server and handle stuff like creating
users, etc.
2025-02-14 21:43:44 +01:00
c307e81d9f
add postgresql role for ens. psql and opt. some dbs and users are set up
All checks were successful
/ Ansible Lint (push) Successful in 1m40s
/ Ansible Lint (pull_request) Successful in 1m34s
Add postgresql role for ensuring postgresql is installed.
Furthermore the role optionally takes some basic configuration to ensure
databases with their owners and users are set up as specified.

This is a requirement for a new netbox role.
2025-02-14 05:12:11 +01:00
1080932235
add redis role for ensuring redis is installed from distro packages
This is a requirement for a new netbox role.
2025-02-14 04:42:55 +01:00
2 changed files with 4 additions and 4 deletions

View file

@ -166,7 +166,7 @@ groups:
# Longer intervals to account for disk intensive hypervisor tasks (backups, moving VMs, etc.).
- alert: HypervisorHostUnusualDiskReadRate
expr: (sum by (instance) (rate(node_disk_read_bytes_total[2m])) / 1024 / 1024 > 50) * on(instance) group_left (nodename) node_uname_info{nodename="chaosknoten"}
for: 90m
for: 60m
labels:
severity: warning
annotations:
@ -174,7 +174,7 @@ groups:
description: "Disk is probably reading too much data (> 50 MB/s)\n VALUE = {{ $value }}"
- alert: HypervisorHostUnusualDiskWriteRate
expr: (sum by (instance) (rate(node_disk_written_bytes_total[2m])) / 1024 / 1024 > 50) * on(instance) group_left (nodename) node_uname_info{nodename="chaosknoten"}
for: 90m
for: 60m
labels:
severity: warning
annotations:
@ -256,7 +256,7 @@ groups:
# Since hard disks on the hypervisor can easily have their IO saturated by hypervisor tasks (backups, moving VMs, etc.), alert when the IO is above the regular threshold for a very long time.
- alert: HypervisorHostUnusualHardDiskIo
expr: (rate(node_disk_io_time_seconds_total{device=~"s.+"}[1m]) > 0.5) * on(instance) group_left (nodename) node_uname_info{nodename="chaosknoten"}
for: 90m
for: 50m
labels:
severity: warning
annotations:

View file

@ -38,7 +38,7 @@ server {
location = / {
#return 302 https://wiki.hamburg.ccc.de/infrastructure:service-overview#tickets_pretix;
return 302 https://tickets.hamburg.ccc.de/hackertours/eh22/;
return 302 https://tickets.hamburg.ccc.de/hackertours/38c3/;
}
location / {