Displaying 9 results from an estimated 9 matches for "firewall_rul".
Did you mean:
firewall_rule
2009 Aug 11
1
[PATCH server] remove appliance bits
...ysconfig/nfs/LOCKD_TCPPORT 32803",
- "set /files/etc/sysconfig/nfs/LOCKD_UDPPORT 32769",
- "set /files/etc/sysconfig/nfs/STATD_PORT 662"
-]
-
-augeas {"nfslock_config":
- changes => $nfslock_changes,
- notify => Service["nfslock"]
-}
-
-firewall_rule {"tgtd": destination_port => '3260'}
-firewall_rule {"nfsd": destination_port => '2049'}
-firewall_rule {"rpcbind": destination_port => '111'}
-firewall_rule {"rpcbind-udp": destination_port => '111', protocol =>...
2009 May 19
2
[PATCH server] added ovirt vnc proxy server, to proxy vnc request to managed vms
...+esac
+exit $RETVAL
diff --git a/installer/modules/ovirt/manifests/ovirt.pp b/installer/modules/ovirt/manifests/ovirt.pp
index 03a93a7..d953ebe 100644
--- a/installer/modules/ovirt/manifests/ovirt.pp
+++ b/installer/modules/ovirt/manifests/ovirt.pp
@@ -197,6 +197,7 @@ class ovirt::setup {
firewall_rule{"http": destination_port => "80"}
firewall_rule {"https": destination_port => '443'}
firewall_rule {"host-browser": destination_port => '12120'}
+ firewall_rule {"vnc-proxy": destination_port =>...
2009 Aug 11
0
[PATCH server] Added support for remote logging with rsyslog-gssapi to server.
...{"rsyslog" :
+ enable => true,
+ require => [Package[rsyslog],Package[rsyslog-gssapi]],
+ ensure => running
+ }
+
service {"httpd" :
enable => true,
require => Package[httpd],
@@ -213,6 +238,7 @@ class ovirt::setup {
firewall_rule {"qpidd": destination_port => '5672'}
firewall_rule {"collectd": destination_port => '25826', protocol => 'udp'}
firewall_rule {"ntpd": destination_port => '123', protocol => 'udp'}
+ fire...
2009 May 15
1
[PATCH server] add server-side groundwork for remote freeipa server
...-$realm_name = '<%= realm_name %>'
+$realm_name = '<%= realm_name.upcase %>'
$freeipa_password = '<%= freeipa_password %>'
$short_ldap_dn = '<%= ldap_dn %>'
$ldap_dn = 'cn=ipaConfig,cn=etc,<%= ldap_dn %>'
@@ -328,7 +334,11 @@ firewall_rule{"nat-postrouting": table => "nat", chain => "POSTROUTING", out_int
<% end %>
include postgres::bundled
include freeipa::common
+<% if remote_ipa == "n" %>
include freeipa::bundled
+<% else %>
+include freeipa::remote
+<% end %&...
2009 Jul 02
2
How to install ovirt in working environment?
...s of ovirt-installer.
The script was produced as follows (ips and hostnames changed):
# Configurations script generated by ovirt-installer
# at Thu Jul 02 16:32:09 +0400 2009#
import 'ovirt'
import 'firewall'
firewall::setup{'setup':
status => 'enabled'
}
firewall_rule{"ssh": destination_port => "22"}
#DNS Configuration
$guest_httpd_ipaddr = '195.168.1.7'
$guest_ipaddr = '10.1.1.7'
$admin_ipaddr = '10.1.1.7'
$ovirt_host = 'station.example.ru'
$ipa_host = 'station.example.ru'
dns::remote{setup:...
2020 May 07
0
[PATCH v2 2/2] sysprep: add Kerberos keytab file removal
...++++++++++++++++++
2 files changed, 39 insertions(+)
create mode 100644 sysprep/sysprep_operation_kerberos_hostkeytab.ml
diff --git a/sysprep/Makefile.am b/sysprep/Makefile.am
index 43137ce65..95cc7e358 100644
--- a/sysprep/Makefile.am
+++ b/sysprep/Makefile.am
@@ -44,6 +44,7 @@ operations = \
firewall_rules \
fs_uuids \
kerberos_data \
+ kerberos_hostkeytab \
lvm_uuids \
logfiles \
machine_id \
diff --git a/sysprep/sysprep_operation_kerberos_hostkeytab.ml b/sysprep/sysprep_operation_kerberos_hostkeytab.ml
new file mode 100644
index 000000000..cb3023353
--- /dev/null
+++ b/sysprep/sysprep_o...
2013 Sep 05
1
[PATCH V2] sysprep: remove firewall rules
If we do not want to keep the original firewall rules, enable
this operation to remove these rules automatically.
Signed-off-by: Wanlong Gao <gaowanlong@cn.fujitsu.com>
---
sysprep/Makefile.am | 1 +
sysprep/sysprep_operation_firewall_rules.ml | 54 +++++++++++++++++++++++++++++
2 files changed, 55 insertions(+)
create mode 100644 sysprep/sysprep_operation_firewall_rules.ml
diff --git a/sysprep/Makefile.am b/sysprep/Makefile.am
index ec6c2bc..fcd17fc 100644
--- a/sysprep/Makefile.am
+++ b/sysprep/Makefile.am
@@ -40,6 +40,7 @@ oper...
2020 May 07
3
[PATCH v2 0/2] add FreeIPA offline unenrollment (RHBZ#1789592)
This patch series adds a new virt-sysprep operation to offline unenroll
a guest from FreeIPA. It does so by removing some configuration files
and certificates.
Changes from v1:
- the other patches were pushed, as unrelated and approved
- created a new kerberos-hostkeytab operation
Pino Toscano (2):
sysprep: add IPA offline unenrollment (RHBZ#1789592)
sysprep: add Kerberos keytab file removal
2009 Sep 17
1
[PATCH server] oVirt server single network installer
...g the install', RED) %>")
dns_servers = prompt_yes_no("Use this systems's dns servers?")
-guest_httpd_ipaddr = interfaces[guest_httpd_dev]
guest_ipaddr = interfaces[guest_dev]
admin_ipaddr = interfaces[admin_dev]
@@ -276,9 +273,9 @@ firewall::setup{'setup':
firewall_rule{"ssh": destination_port => "22"}
#DNS Configuration
-$guest_httpd_ipaddr = '<%= guest_httpd_ipaddr %>'
$guest_ipaddr = '<%= guest_ipaddr %>'
$admin_ipaddr = '<%= admin_ipaddr %>'
+$seperate_networks = '<%= seperate_networ...