ansible-role-apache - Ansible Role - Apache 2.x.

  •        22

An Ansible Role that installs Apache 2.x on RHEL/CentOS, Debian/Ubuntu, SLES and Solaris. If you are using SSL/TLS, you will need to provide your own certificate and key files. You can generate a self-signed certificate with a command like openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout example.key -out example.crt.

https://galaxy.ansible.com/geerlingguy/apache/
https://github.com/geerlingguy/ansible-role-apache

Tags
Implementation
License
Platform

   




Related Projects

ansible-role-php - Ansible Role - PHP

  •    Shell

Installs PHP on RedHat/CentOS and Debian/Ubuntu servers. If you're using an older LTS release of Ubuntu or RHEL, with an old/outdated version of PHP, you need to use a repo or PPA with a maintained PHP version, as this role only works with PHP versions that are currently supported by the PHP community.

ansible-role-nginx - Ansible Role - Nginx

  •    

Installs Nginx on RedHat/CentOS, Debian/Ubuntu, Archlinux, FreeBSD or OpenBSD servers. This role installs and configures the latest version of Nginx from the Nginx yum repository (on RedHat-based systems), apt (on Debian-based systems), pacman (Archlinux), pkgng (on FreeBSD systems) or pkg_add (on OpenBSD systems). You will likely need to do extra setup work after this role has installed Nginx, like adding your own [virtualhost].conf file inside /etc/nginx/conf.d/, describing the location and options to use for your particular website.

ansible-role-mysql - Ansible Role - MySQL

  •    Shell

Installs and configures MySQL or MariaDB server on RHEL/CentOS or Debian/Ubuntu servers. The home directory inside which Python MySQL settings will be stored, which Ansible will use when connecting to MySQL. This should be the home directory of the user which runs this Ansible role. The mysql_user_name and mysql_user_password can be set if you are running this role under a non-root user account and want to set a non-root user.

ansible-role-jenkins - Ansible Role - Jenkins CI

  •    Groovy

Installs Jenkins CI on RHEL/CentOS and Debian/Ubuntu servers. Requires curl to be installed on the server. Also, newer versions of Jenkins require Java 8+ (see the test playbooks inside the tests/ directory for an example of how to use newer versions of Java for your OS).


lamp - Install LAMP(Linux + Apache + MySQL/MariaDB/Percona Server + PHP ) for CentOS/Debian/Ubuntu

  •    Shell

LAMP is a powerful bash script for the installation of Apache + PHP + MySQL/MariaDB/Percona Server and so on. You can install Apache + PHP + MySQL/MariaDB/Percona Server in an very easy way, just need to choose what you want to install before installation. And all things will be done in a few minutes. Please feel free to report any bugs or issues to us, email to: i@teddysun.com or open issues on Github.

ansible-junos-stdlib - Junos modules for Ansible

  •    Python

Juniper Networks supports Ansible for managing devices running the Junos operating system (Junos OS). This role is hosted on the Ansible Galaxy website under the role Juniper.junos. The Juniper.junos role includes a set of Ansible modules that perform specific operational and configuration tasks on devices running Junos OS. These tasks include: installing and upgrading Junos OS, provisioning new Junos devices in the network, loading configuration changes, retrieving information, and resetting, rebooting, or shutting down managed devices. Please refer to the INSTALLATION section for instructions on installing this role. Since Ansible version >= 2.1, Ansible also natively includes core modules for Junos. The Junos modules included in Ansible core have names which begin with the prefix junos_. The Junos modules included in this Juniper.junos role have names which begin with the prefix juniper_junos_. These two sets of Junos modules can coexist on the same Ansible control machine, and an Ansible play may invoke a module from either (or both) sets. Juniper Networks recommends using the modules in this role when writing new playbooks that manage Junos devices.

debops - DebOps - Your Debian-based data center in a box

  •    Shell

The DebOps project provides a set of general-purpose Ansible roles that can be used to manage Debian or Ubuntu hosts. In addition, a default set of Ansible playbooks can be used to apply the provided roles in a controlled way, using Ansible inventory groups. The roles are written with a high customization in mind, which can be done using Ansible inventory. This way the role and playbook code can be shared between multiple environments, with different configuration in to each one.

cis-rhel-ansible - Ansible playbooks for CIS Benchmarks on RHEL/CentOS 6

  •    

This is an ansible playbook for automatically applying CIS Security Benchmarks to a system running Red Hat Enterprise Linux 6 or CentOS 6. RHEL 7 and CentOS 7 bencharks are coming soon.

openvpn-install - Set up your own OpenVPN server on Debian, Ubuntu, Fedora, CentOS, and Arch Linux

  •    Shell

OpenVPN installer for Debian, Ubuntu, Fedora, CentOS and Arch Linux. This script will let you setup your own secure VPN server in just a few minutes.

ansible-elasticsearch - Ansible playbook for Elasticsearch

  •    Ruby

THIS ROLE IS FOR 5.x. FOR 2.x SUPPORT PLEASE USE THE 2.x BRANCH.The latest Elasticsearch versions of 5.x are actively tested. Only Ansible versions > 2.3.2 are supported, as this is currently the only version tested.

AppImageKit - Package desktop applications as AppImages that run on common Linux-based operating systems, such as RHEL, CentOS, openSUSE, SLED, Ubuntu, Fedora, debian and derivatives

  •    C

The AppImage format is a format for packaging applications in a way that allows them to run on a variety of different target systems (base operating systems, distributions) without further modification. Using AppImageKit you can package desktop applications as AppImages that run on common Linux-based operating systems, such as RHEL, CentOS, Ubuntu, Fedora, Debian and derivatives.

ansible-jenkins - Ansible playbook: Jenkins

  •    Groovy

ansible-jenkins is an Ansible role. Use this role to install Jenkins and install/update plugins. The code should reside in the roles directory of ansible ( See ansible documentation for more information on roles ), in a folder jenkins.

docker-rpm-builder - Build native RPM packages for Centos/RHEL/Fedora from any Linux distro or even OSX, by leveraging docker capabilities

  •    C

IMPORTANT: Docker has changed the distribution repos (both APT and YUM) for its packages. See the updated instructions and repos at docs.docker.com. The new free package is called docker-ce. IMPORTANT: since 1.33, docker-rpm-builder won't force a dependency on a specific docker package, you must install a docker distribution yourself - see prerequisites.

ansible-coreos-bootstrap - [NOT MAINTAINED] bootstrap a coreos machine for control via ansible

  •    Python

In order to effectively run ansible, the target machine needs to have a python interpreter. Coreos machines are minimal and do not ship with any version of python. To get around this limitation we can install pypy, a lightweight python interpreter. The coreos-bootstrap role will install pypy for us and we will update our inventory file to use the installed python interpreter. Unlike a typical role, you need to configure Ansible to use an alternative python interpreter for coreos hosts. This can be done by adding a coreos group to your inventory file and setting the group's vars to use the new python interpreter. This way, you can use ansible to manage CoreOS and non-CoreOS hosts. Simply put every host that has CoreOS into the coreos inventory group and it will automatically use the specified python interpreter.

rvm1-ansible - The official ansible rvm role to install and manage your ruby versions.

  •    Dockerfile

It is an Ansible role to install and manage ruby versions using rvm. In production it's useful because compiling a new version of ruby can easily take upwards of 10 minutes. That's 10 minutes of your CPU being pegged at 100%.

ansible-letsencrypt - An ansible role to generate TLS certificates and get them signed by Let's Encrypt

  •    

An ansible role to generate TLS certificates and get them signed by Let's Encrypt. Currently attempts first to use the webroot authenticator, then if that fails to create certificates, it will use the standalone authenticator. This is handy for generating certs on a fresh machine before the web server has been configured or even installed.

postgresql - Fairly full featured Ansible role for Postgresql.

  •    Shell

Ansible role which installs and configures PostgreSQL, extensions, databases and users. This has been tested on Ansible 2.4.0 and higher.

ansible-os-hardening - This Ansible role provides numerous security-related configurations, providing all-round base protection

  •    Ruby

This role provides numerous security-related configurations, providing all-round base protection. It is intended to be compliant with the DevSec Linux Baseline. If you're using inspec to test your machines after applying this role, please make sure to add the connecting user to the os_ignore_users-variable. Otherwise inspec will fail. For more information, see issue #124.

ansible-ssh-hardening - This Ansible role provides numerous security-related ssh configurations, providing all-round base protection

  •    Ruby

This role provides secure ssh-client and ssh-server configurations. It is intended to be compliant with the DevSec SSH Baseline. Warning: This role disables root-login on the target server! Please make sure you have another user with su or sudo permissions that can login into the server.