Conversation
|
@redy01 Hi, I completed all the settings, started running the ansible playbook-playbook deploy_pgcluster.yml and I get an error: vars/system.yml |
|
try to define three roles in the playbook instead of role: "fw_{{ firewall_type }}", each with its own condition Example: roles:
- role: fw_iptables
vars:
firewall_allowed_tcp_ports: "{{ firewall_ports_dynamic_var | default([]) | unique }}"
firewall_additional_rules: "{{ firewall_rules_dynamic_var | default([]) | unique }}"
when: firewall_type == 'iptables' and firewall_enabled_at_boot | bool
tags: firewall
- role: fw_firewalld
vars:
firewall_allowed_tcp_ports: "{{ firewall_ports_dynamic_var | default([]) | unique }}"
when: firewall_type == 'firewalld' and firewall_enabled_at_boot | bool
tags: firewall
- role: fw_ufw
vars:
firewall_allowed_tcp_ports: "{{ firewall_ports_dynamic_var | default([]) | unique }}"
when: firewall_type == 'ufw' and firewall_enabled_at_boot | bool
tags: firewallThis approach increases clarity and can sometimes simplify troubleshooting by making the playbook's flow more explicit. |
|
Please note that the ansible code has been moved to the |
|
hi has there been any development on this ? Thanks :) great work guys |
|
The author of this PR has not completed it yet, I can do it if this functionality is really necessary. |
|
Hi, yes I believe this functionality is crucial as firewalld is the preferred way to manage on oracle/redhat and ufw in ubuntu. Maintaining iptables + firewalld can become cumbersome, would rather stick with just firewalld . Thanks ! Great work with the project |
|
If you're interested in this feature, please consider becoming a sponsor. The development of this feature requires sponsorship to fund developer efforts. If you're already a sponsor and are interested in this feature, please leave a comment here so we can prioritize this issue accordingly. |

No description provided.