-
Notifications
You must be signed in to change notification settings - Fork 0
/
playbook.yml
executable file
·82 lines (72 loc) · 1.53 KB
/
playbook.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
---
- name: Common part of the playbook for both nodes
hosts: all
become: true
roles:
- docker
- name: NFS server, Swarm cluster and registry init
hosts: nfs-servers
become: true
roles:
- nfs_server
- docker_swarm_manager
- name: NFS client and Swarm worker join
hosts: nfs-clients
become: true
roles:
- nfs_client
- docker_swarm_worker
- name: Prepare all files for the stack
hosts: all
become: true
vars_files:
- "{{ playbook_dir }}/my_secrets/secrets.yml"
roles:
- prometheus_common
- name: Prepare all files for the stack
hosts: nfs-servers
become: true
vars_files:
- "{{ playbook_dir }}/my_secrets/secrets.yml"
roles:
- prepare_stack
- name: Registry Init
hosts: nfs-servers
become: true
vars_files:
- "{{ playbook_dir }}/my_secrets/secrets.yml"
roles:
- registry
- name: Instructing Docker hosts to trust TLS certificate and log into registry
hosts: all
become: true
vars_files:
- "{{ playbook_dir }}/my_secrets/secrets.yml"
roles:
- registry_login
- name: Traefik setup
hosts: nfs-servers
become: true
roles:
- traefik
- name: Prepare Database and Nextcloud
hosts: nfs-servers
become: true
vars_files:
- "{{ playbook_dir }}/my_secrets/secrets.yml"
roles:
- database
- keycloak
- nextcloud
- name: Prepare Logging
hosts: all
become: true
roles:
- logging
- name: Deploy all services
hosts: nfs-servers
become: true
vars_files:
- "{{ playbook_dir }}/my_secrets/secrets.yml"
roles:
- stack