yum install screen htop tmux
rpm -ivh http://download.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch.rpm
yum install mod_dav_svn subversion
yum install python easy_install Genshi==0.6
easy_install Trac
# setup Firewall -> Uncheck “enable”
mkdir /var/www/svn cd /var/www/svn svnadmin create repos chown -R apache.apache repos chcon -R -t httpd_sys_content_t repos/
Creare il file /var/www/svn/repos/hooks/post-commit
#!/bin/sh export PYTHON_EGG_CACHE="/path/to/dir" /usr/bin/trac-admin /var/www/trac/projects/project-name changeset added "$1" "$2"
chmod +x post-commit chown apache:apache *
Queste credenziali saranno utili per lavorare con Subversion (checkouts, commits, updates..) e per accedere a https://trac.domain.it e https://svn.domain.it
htpasswd -cm /etc/subversion/svn-auth-conf ialbano htpasswd -m /etc/subversion/svn-auth-conf eviegas
Nel caso in cui questa installazione sia la migrazione da un'altro server.
svnadmin load /var/www/svn/repos < repo_name.svn_dump
yum install mod_ssl openssl
# Generate private key openssl genrsa -out ca.key 1024 # Generate CSR openssl req -new -key ca.key -out ca.csr # Generate Self Signed Key openssl x509 -req -days 365 -in ca.csr -signkey ca.key -out ca.crt
cp ca.crt /etc/pki/tls/certs cp ca.key /etc/pki/tls/private/ca.key cp ca.csr /etc/pki/tls/private/ca.csr
Apache sarà configurato per rispondere a
Creare (o modificare) il file /etc/httpd/conf.d/subversion.conf che ci permeterà di raggiungere subversion visitando https://svn.dominio.it
NameVirtualHost *:443 DocumentRoot /var/www/svn/repos ServerName svn.dominio.it #ServerAlias svn.dominio.it DAV svn SVNPath /var/www/svn/repos # Limit write permission to list of valid users. # # Require SSL connection for password protection. # SSLRequireSSL AuthType Basic AuthName "Authorization Realm" AuthUserFile /etc/subversion/svn-auth-conf Require valid-user # SSLEngine on SSLCertificateFile /etc/pki/tls/certs/ca.crt SSLCertificateKeyFile /etc/pki/tls/private/ca.key
chkconfig httpd on
mkdir -p /var/www/trac/projects/project-name trac-admin /var/www/trac/projects/project-name initenv trac-admin /var/www/trac/projects/project-name deploy /tmp/deploy mv /tmp/deploy/* /var/www/trac
# Trac Configuration ServerName trac.dominio.it Redirect / https://trac.dominio.it/ ServerName trac.dominio.it DocumentRoot /var/www/trac/projects/project-name Alias /trac/ /var/www/trac/htdocs Options Indexes MultiViews AllowOverride None Order allow,deny Allow from all SetHandler mod_python PythonHandler trac.web.modpython_frontend PythonInterpreter main_interpreter PythonOption TracEnv /var/www/trac/projects/project-name PythonOption TracUriRoot / AuthType Basic AuthName "trac.dominio.it" # Use the SVN password file. AuthUserFile /etc/subversion/svn-auth-conf Require valid-user SSLEngine on SSLCertificateFile /etc/pki/tls/certs/ca.crt SSLCertificateKeyFile /etc/pki/tls/private/ca.key
trac-admin /var/www/trac/projects/project-name/ > permission add eviegas TRAC_ADMIN
trac-admin /var/www/trac/projects/project-name repository resync "Project Name"
yum install nagios nagios-plugins*
# nagios configuration # File: /etc/httpd/conf.d/nagios.conf DocumentRoot /usr/share/nagios/html ServerName nagios.dominio.it ScriptAlias /nagios/cgi-bin/ "/usr/lib64/nagios/cgi-bin/" Options ExecCGI AllowOverride None Order allow,deny Allow from all AuthName "Nagios Access" AuthType Basic AuthUserFile /etc/nagios/passwd Require valid-user Alias /nagios "/usr/share/nagios/html" Options None AllowOverride None Order allow,deny Allow from all AuthName "Nagios Access" AuthType Basic AuthUserFile /etc/nagios/passwd Require valid-user SSLEngine on SSLCertificateFile /etc/pki/tls/certs/ca.crt SSLCertificateKeyFile /etc/pki/tls/private/ca.key
Aggiungere queste righe alla fine del file /etc/postfix/main.cf
relayhost = smtp.dominio.it:25 smtpd_sasl_auth_enable = yes smtpd_sasl_path = smtpd smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd smtp_sasl_type = cyrus smtp_sasl_auth_enable = yes smtp_cname_overrides_servername = no smtp_sasl_security_options = noanonymous
Creare il file /etc/postfix/sasl_passwd con il nome utente e password dell'account di posta
smtp.dominio.it:25 nome_account@dominio.it:******
postmap /etc/postfix/sasl_passwd
Test
echo "Test mail from postfix" | mail -s "Test Postfix" nome_account@dominio.it
define contact{ contact_name ialbano use generic-contact alias Ignacio Albano email ialbano@dominio.it } define contact{ contact_name eviegas use generic-contact alias Eduardo Viegas email eviegas@dominio.it } define contactgroup{ contactgroup_name support alias Linux System Administrator members ialbano, eviegas }
Attach group to service
define service{ use generic-service host_name project-name service_description SIP voipnet check_command check_nrpe!check_sip_voipnet contact_groups support }
Definire il template "critical-service" per utilizzarlo nei servizi
define service{ name critical-service use generic-service max_check_attempts 1 normal_check_interval 3 retry_check_interval 1 register 0 }