Skip to content
Snippets Groups Projects
Commit d0542573 authored by Chris Hines's avatar Chris Hines
Browse files

make roles with with ubuntu

parent 392e5e8b
No related branches found
No related tags found
3 merge requests!518modifications to playbooks because 1. we're not using ldap 2. we're mounting...,!517modifications to playbooks because 1. we're not using ldap 2. we're mounting...,!513modifications to playbooks because 1. we're not using ldap 2. we're mounting...
...@@ -36,7 +36,7 @@ ...@@ -36,7 +36,7 @@
gather_facts: True gather_facts: True
roles: roles:
# - { role: upgrade, tags: [ upgrade ] } # - { role: upgrade, tags: [ upgrade ] }
- { role: mysql, mysql_type: mysql_server, mysql_root_password: "{{ sqlrootPasswd }}", mysql_user_name: slurmdb, mysql_user_db_name: slurm_acct_db, mysql_user_hosts_group: "{{ groups['ManagementNodes'] }}", mysql_user_password: "{{ slurmdb_passwd }}", tags: [ database ] } - { role: mysql, mysql_type: mysql_server, mysql_user_name: slurmdb, mysql_user_db_name: slurm_acct_db, mysql_user_hosts_group: "{{ groups['ManagementNodes'] }}", mysql_user_password: "{{ slurmdb_passwd }}", tags: [ database ] }
- { role: slurm-mysql-config, tags: [database,slurmdb] } - { role: slurm-mysql-config, tags: [database,slurmdb] }
tags: [ sql ] tags: [ sql ]
......
...@@ -14,6 +14,7 @@ ...@@ -14,6 +14,7 @@
regexp: '^(bind.*)' regexp: '^(bind.*)'
replace: '#\1' replace: '#\1'
become: true become: true
register: bind_address
- name: make sure mysql conf directory exists - name: make sure mysql conf directory exists
file: dest=/etc/mysql/conf.d state=directory file: dest=/etc/mysql/conf.d state=directory
...@@ -24,6 +25,11 @@ ...@@ -24,6 +25,11 @@
service: name={{ sqlServiceName }} state=started enabled=true service: name={{ sqlServiceName }} state=started enabled=true
become: true become: true
- name: "Starting MySQL"
service: name={{ sqlServiceName }} state=restarted enabled=true
become: true
when: bind_address.changed
- name: Check that the slurm_acct_db_directory exists - name: Check that the slurm_acct_db_directory exists
stat: stat:
path: /var/lib/mysql/slurm_acct_db/ #defined in /vars/filesystems.yaml path: /var/lib/mysql/slurm_acct_db/ #defined in /vars/filesystems.yaml
...@@ -31,18 +37,18 @@ ...@@ -31,18 +37,18 @@
- name: "Adding user database" - name: "Adding user database"
mysql_db: name={{ mysql_user_db_name }} state=present login_user=root login_password={{ mysql_root_password }} login_unix_socket=/var/run/mysqld/mysqld.sock mysql_db: name={{ mysql_user_db_name }} state=present login_user=root login_unix_socket=/var/run/mysqld/mysqld.sock
become: true become: true
become_user: root become_user: root
- name: "Giving priviliges to user" - name: "Giving priviliges to user"
mysql_user: name={{ mysql_user_name }} host={{ mysql_user_host }} password={{ mysql_user_password }} login_user=root login_password={{ mysql_root_password }} priv={{ mysql_user_db_name }}.*:ALL,GRANT state=present login_unix_socket=/var/run/mysqld/mysqld.sock mysql_user: name={{ mysql_user_name }} host={{ mysql_user_host }} password={{ mysql_user_password }} login_user=root priv={{ mysql_user_db_name }}.*:ALL,GRANT state=present login_unix_socket=/var/run/mysqld/mysqld.sock
when: mysql_user_host is defined when: mysql_user_host is defined
become: true become: true
become_user: root become_user: root
- name: "Giving priviliges to user" - name: "Giving priviliges to user"
mysql_user: name={{ mysql_user_name }} host={{ hostvars[item].ansible_fqdn }} password={{ mysql_user_password }} login_user=root login_password={{ mysql_root_password }} priv={{ mysql_user_db_name }}.*:ALL,GRANT state=present login_unix_socket=/var/run/mysqld/mysqld.sock mysql_user: name={{ mysql_user_name }} host={{ hostvars[item].ansible_fqdn }} password={{ mysql_user_password }} login_user=root priv={{ mysql_user_db_name }}.*:ALL,GRANT state=present login_unix_socket=/var/run/mysqld/mysqld.sock
with_items: "{{ mysql_user_hosts_group }}" with_items: "{{ mysql_user_hosts_group }}"
when: mysql_user_hosts_group is defined when: mysql_user_hosts_group is defined
become: true become: true
......
...@@ -9,6 +9,7 @@ ...@@ -9,6 +9,7 @@
copy: dest=/etc/exports src=files/etcExports mode=644 owner=root group=root copy: dest=/etc/exports src=files/etcExports mode=644 owner=root group=root
become: true become: true
become_user: root become_user: root
register: etcexports
- name: "Starting rpcbind" - name: "Starting rpcbind"
service: "name=rpcbind state=started enabled=true" service: "name=rpcbind state=started enabled=true"
...@@ -24,6 +25,7 @@ ...@@ -24,6 +25,7 @@
service: "name=nfs enabled=true" service: "name=nfs enabled=true"
become: true become: true
when: ansible_os_family == "RedHat" and ansible_distribution_major_version < "7" when: ansible_os_family == "RedHat" and ansible_distribution_major_version < "7"
- name: "Enable the Server at boot" - name: "Enable the Server at boot"
service: "name=nfs-server.service enabled=true" service: "name=nfs-server.service enabled=true"
become: true become: true
...@@ -33,11 +35,18 @@ ...@@ -33,11 +35,18 @@
command: /usr/sbin/exportfs -a command: /usr/sbin/exportfs -a
become: true become: true
when: ansible_os_family == "Debian" when: ansible_os_family == "Debian"
changed_when: false
- name: "Start the Server" - name: "Start the Server"
service: "name=nfs-kernel-server state=started enabled=true" service: "name=nfs-kernel-server state=started enabled=true"
become: true become: true
when: ansible_os_family == "Debian" when: ansible_os_family == "Debian"
- name: "Start the Server"
service: "name=nfs-kernel-server state=restarted enabled=true"
become: true
when: ansible_os_family == "Debian" and etcexports.changed
...@@ -46,6 +46,9 @@ ...@@ -46,6 +46,9 @@
uid: 497 uid: 497
become: true become: true
#
#This should be a template so the password isn't committed
#
- name: install slurmdb.conf - name: install slurmdb.conf
copy: copy:
src: files/slurmdbd.conf src: files/slurmdbd.conf
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment