--
You received this message because you are subscribed to the Google Groups "Ansible Lockdown" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ansible-lockdo...@googlegroups.com.
To post to this group, send email to ansible-...@googlegroups.com.
Visit this group at https://groups.google.com/group/ansible-lockdown.
To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-lockdown/520ae9e6-b2b8-4245-bdfc-071f610430bd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
#!/bin/bash
ansible-playbook hardening.yml --tags rule1,rule2,rule3
Hi,Sounds like a good idea. Lots of (boring bulk) work though. Adding another thing I miss in the roles, and which would improve the auditability is "--skip-tags unimplemented" for all the actions that have no patch.Bas@bbaassiiee
I wanted to get the groups input on the following proposal submitted on the RHEL7-CIS repo. https://github.com/MindPointGroup/RHEL7-CIS/issues/26--joaogbcravo is suggesting/requesting that we add a variable for each rule in the STIG or CIS role. This would make it easier to run specific rules or to enable disable specific rules in a users local copy of the repo so that the exact set of rules that are applied is captured in VCS. I see the merits of this since doing it with tags is not ideal. If we do it for this role I would suggest we add it to the spec for all verified roles going forward.The problems with it are that it adds A LOT of variables to roles that are already variable heavy and adds some to maintenance when benchmark updates come out. Please let me know what you think. If no one has an opinion I'm inclined to move forward with it.Thanks,Dan
You received this message because you are subscribed to the Google Groups "Ansible Lockdown" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ansible-lockdown+unsubscribe@googlegroups.com.
To post to this group, send email to ansible-lockdown@googlegroups.com.
Let me play devil's advocate for a second. Given:Premise: You cant spec rules you apply via source control because selecting rules is tags driven.Argument: Adding a variable based condition to each task would allow for tracking implemented rules via a vars fileWould it not be easier (effort/maintenance) to simply version control a shell script wrapper with your playbook?Example:
#!/bin/bash
ansible-playbook hardening.yml --tags rule1,rule2,rule3
Im not 100% against the proposal but I think the above is 'easier' to advise for from purely a maintainer perspective and shouldn't present too much difficulty even for the most junior of administrators. It is something that would be easy to check in to version control as well. Thoughts?On a separate note, I do like Bas' idea of an unimplemented tag.Just my 2c.
On Wednesday, May 3, 2017 at 6:03:05 PM UTC-4, bbaassssiiee wrote:
Hi,Sounds like a good idea. Lots of (boring bulk) work though. Adding another thing I miss in the roles, and which would improve the auditability is "--skip-tags unimplemented" for all the actions that have no patch.Bas@bbaassiiee