Ber*_*ale 5 nginx kerberos winrm ansible
我有一台需要与主机 C 通信的 ansible 控制机器(主机 A),一台没有本地用户的 Windows 机器(它是一个 Active Directory)。
主机 A 无法访问主机 C,但可以使用主机 B 进行通信。
host-B 它是一台 linux 机器。
host-A 通过 ssh 访问 host-B。
在这篇文章之后,我创建了一个 nginx 服务器来路由主机 B上的 WinRM 流量
server {
listen 5986 default ssl;
server_name localhost;
ssl_certificate ssl/nginx.crt;
ssl_certificate_key ssl/nginx.key;
location /host-c {
proxy_pass https://host-c-address:5986/wsman;
}
}
Run Code Online (Sandbox Code Playgroud)
我对 host-C 的 ansible 库存如下:
[windows]
host-c ansible_host=host-b ansible_winrm_path=host-c
Run Code Online (Sandbox Code Playgroud)
而group_vars
窗户是:
ansible_user: myuser
ansible_pass: andmypass
ansible_port: 5986
ansible_connection: winrm
ansible_winrm_realm: HOSTCDOMAIN.LOCAL
ansible_winrm_scheme: https
ansible_winrm_transport: kerberos
ansible_winrm_server_cert_validation: ignore
Run Code Online (Sandbox Code Playgroud)
改变了这一行:
ansible_winrm_transport: ssl
这是不可能的,因为 host-c 不能有本地用户。
fatal: [host-c]: FAILED! => {"failed": true, "msg": "ssl: 401 Unauthorized."}
Run Code Online (Sandbox Code Playgroud)
有了这个,我可以使用 Kerberos 客户端对我的用户进行身份验证,但不能在 ansible 内部进行身份验证
krb5.conf:
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
default_realm = HOSTCDOMAIN.LOCAL
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
renew_lifetime = 7d
forwardable = false
[realms]
HOSTCDOMAIN.LOCAL = {
kdc = host-b
}
[domain_realm]
.hostcdomain.local = HOSTCDOMAIN.LOCAL
Run Code Online (Sandbox Code Playgroud)
使用本地 kerberos
# kinit myuser@HOSTCDOMAIN.LOCAL
Password for myuser@HOSTCDOMAIN.LOCAL:
# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: myuser@HOSTCDOMAIN.LOCAL
Valid starting Expires Service principal
03/12/2016 20:23:35 03/13/2016 06:23:35 krbtgt/HOSTCDOMAIN.LOCAL@HOSTCDOMAIN.LOCAL
renew until 03/19/2016 20:23:31
Run Code Online (Sandbox Code Playgroud)
Ansible 测试 ansible_winrm_transport: kerberos
e# ansible-playbook test_win.yml -vvv
Using /etc/ansible/ansible.cfg as config file
1 plays in test_win.yml
PLAY [Ping windows] ************************************************************
TASK [ping] ********************************************************************
task path: /etc/ansible/test_win.yml:5
<host-b> ESTABLISH WINRM CONNECTION FOR USER: myuser on PORT 5986 TO host-b
fatal: [host-c]: FAILED! => {"failed": true, "msg": "kerberos: (('Unspecified GSS failure. Minor code may provide more information', 851968), ('Server not found in Kerberos database', -1765328377))"}
Run Code Online (Sandbox Code Playgroud)
有人可以帮我弄清楚如何克服这个问题吗?我想我错过了一些东西。
host-a 可以使用 host-b 在 host-c 上进行身份验证吗?
归档时间: |
|
查看次数: |
1563 次 |
最近记录: |