[debian-lan-devel] seeking advice on how to handle a small existing network
Andreas B. Mundt
andi.mundt at web.de
Thu Nov 12 17:48:41 GMT 2020
Hi Ross,
On Wed, Nov 11, 2020 at 01:16:51PM -0800, Ross Boylan wrote:
> I have a small network already running, including dhcp/dns/netbooting, NFS,
> and apt-cacher (I believe debian-lan moved away from apt-cacher awhile
> ago). I would like to add centralized identity management, i.e., Kerberos
> and LDAP. Some more centralized management might help a bit too. I'm
> inclined to keep home directories separate on separate machines, in part
> because I may have a mix of distributions and OS versions.
>
> Do you have any suggestions about how debian-lan can help? I originally
> thought of it because I understand setting up the centralized management is
> a bit involved, and I thought it would provide a guide. However,
> debian-lan seems more oriented to creating a network from scratch, which is
> not my case.
>
> One option would be to use the configuration scripts as guides to what I
> should do.
>
> Also, there is now a FAI way and an ansible way, and I'm wondering about
> which of those to pick. It sounds as if ansible might be simpler, so maybe
> choose that?
Yes, I recommend using the ansible approach. In Salsa, you'll find
ansible roles which are taken more or less from the FAI config space of
the Debian-LAN package. I would start as follows:
• First, add another machine to your network and provide there, one
after the other:
• A TFTP server to install clients (this is the slightly modified
playbook for the 'installbox'. (Also take a look at the
di-netboot-assistant package, which is used in that playbook).
On your already existing DHCP server you need to only modify
'next-server', to send PXE clients to the new TFTP machine.
If you add some preseeding, new clients can be installed
automatically already using your existing package cache.
(If your netbooting works fine already, skip the TFTP/netbooting stuff.
But preseeding and the following is needed.)
• Then continue providing the ansible playbooks via a git repository
on this new machine. With ansible-pull being run at the end of the
installation (modify the preseed file accordingly), you can customize
all clients.
• Finally, take a look at the roles 'kerberox.yml' and
'kerberox-client.yml': These roles provide the implementation of a
LDAP/KDC as well as a corresponding client. Managing users and
machines is done with a simple, basic script so far[2]. After
some customization taking your existing setup into acount, this
should already work for you.
With this approach, you should be able to step by step add the machinery
to your network without making modifications on the already working
infrastructure. If the new stuff works fine, you can more and more move
to the new system (or finally add existing services to LDAP/Kerberos).
I hope these ideas give some guidance and you can make use of them.
Don't hesitate to ask if you run into problems or something is unclear.
Best Regards
Andi
> P.S. Isn't there a way to filter the spam out of the list more
> effectively? The noise comes close to drowning out the signal in the list
> archive.
Sorry, I do not know a solution here :-/
[1] https://salsa.debian.org/andi/debian-lan-ansible/
[2] https://salsa.debian.org/andi/debian-lan-ansible/-/blob/master/roles/ldap/templates/debian-lan.j2
More information about the debian-lan-devel
mailing list