Puppet Class: profile::mariadb::ferm_misc
- Defined in:
- modules/profile/manifests/mariadb/ferm_misc.pp
Overview
Firewall rules for the misc db host used by internet-facing websites. We need special rules to allow access for some services which run on hosts with public IPs.
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 |
# File 'modules/profile/manifests/mariadb/ferm_misc.pp', line 4
class profile::mariadb::ferm_misc (
Stdlib::Host $netmon_server = lookup('netmon_server'),
Array[Stdlib::Host] $netmon_servers_failover = lookup('netmon_servers_failover'),
) {
ferm::service { 'netmon-librenms':
proto => 'tcp',
port => '3306',
notrack => true,
srange => "@resolve((${netmon_server} ${netmon_servers_failover.join(' ')}))"
}
ferm::service { 'netbox-librenms-reports':
proto => 'tcp',
port => '3306',
notrack => true,
srange => '@resolve((netbox1003.eqiad.wmnet netbox2003.codfw.wmnet))',
}
ferm::service { 'rt':
proto => 'tcp',
port => '3306',
notrack => true,
srange => '@resolve(moscovium.eqiad.wmnet)',
}
ferm::service { 'exim':
proto => 'tcp',
port => '3306',
notrack => true,
srange => '@resolve((mx1001.wikimedia.org mx2001.wikimedia.org wiki-mail-eqiad.wikimedia.org wiki-mail-codfw.wikimedia.org mx-in1001.wikimedia.org mx-in2001.wikimedia.org))',
}
ferm::service { 'idp_staging':
proto => 'tcp',
port => '3306',
notrack => true,
srange => '@resolve((idp-test1004.wikimedia.org idp-test2004.wikimedia.org))',
}
ferm::service { 'idp':
proto => 'tcp',
port => '3306',
notrack => true,
srange => '@resolve((idp1004.wikimedia.org idp2004.wikimedia.org))',
}
}
|