unifi_controller_rhel/README.md

84 lines
3.7 KiB
Markdown
Raw Normal View History

UniFi Controller for RHEL (yum-based distros)
=============================================
2014-05-27 01:21:46 +00:00
Ansible Galaxy role for installing UniFi Controller software for Ubiquiti Access Points on RedHat/Centos/Amazon/Fedora and other yum-based distros.
**WARNING: This has only been tested on Amazon Linux so far, and may have issues in `/etc/yum.repos.d/mongodb-org-3.2.repo` for Fedora (probably need to use the /redhat/ mongo repo.) If you install this on any other distro besides Amazon Linux please comment with your experiences.**
2014-05-27 01:33:22 +00:00
Forked from https://github.com/fukawi2/unifi-controller-rhel and modified to be an includable role via Galaxy instead of a playbook.
2014-05-27 01:33:22 +00:00
Requirements
------------
2014-05-27 01:33:22 +00:00
2016-06-15 01:37:15 +00:00
- Ubiquiti's license does not allow redistribution of the software ZIP, so you must manually download the ZIP of the UniFi Controller software from the [Ubiquiti website](https://www.ubnt.com/download/unifi/) and save it to `files/UniFi.unix.zip`. The most recent tested version is "UniFi v5.0.6 Zip for DIY Unix/Linux" from 2016-06-01. If you are including this role via Galaxy, you may download this file to your playbook's `files` directory instead of this role's `files` directory; you may also download to an arbitrary folder in your playbook and specify the relative path in the variable.
2016-06-15 00:19:20 +00:00
- You may need the [EPEL Repository](https://fedoraproject.org/wiki/EPEL) from Fedora Project enabled for some packages, however Mongo is installed directly from mongo.org so try running without first.
2014-05-27 01:33:22 +00:00
Role Variables
--------------
2014-05-27 01:33:22 +00:00
2016-06-14 23:17:13 +00:00
- **unifi_controller_rhel_ntp_server** (optional) sets your preferred NTP server for the UniFi APs to use (default: `pool.ntp.org`)
2016-06-15 01:37:15 +00:00
- **unifi_controller_rhel_ssl_bundle** (optional) provides an alternate SSL CA certificate bundle/chain for the Controller to use. (default: none)
- **unifi_controller_rhel_ssl_cert** (optional) provides an alternate SSL certificate for the Controller to use. (default: none)
- **unifi_controller_rhel_ssl_key** (optional) provides an alternate SSL key for the Controller to use. (default: none)
- **unifi_controller_rhel_unifi_zip_file** (optional) sets the filename of the UniFi controller software on the Ansible system, can be a path relative to your playbook like `roles/my_other_role/downloads/Unifi.unix.zip` (default: `UniFi.unix.zip`)
2014-05-27 01:33:22 +00:00
Dependencies
------------
2014-05-27 01:33:22 +00:00
n/a
2014-05-27 01:33:22 +00:00
Example Playbook
----------------
2014-05-27 01:33:22 +00:00
2016-06-14 23:17:13 +00:00
First, install this role via Galaxy by typing `sudo ansible-galaxy install zyphlar.unifi_controller_rhel`
Then create and run an Ansible playbook like this:
- hosts: your_unifi_controllers
2016-06-14 23:17:13 +00:00
become: true
roles:
- zyphlar.unifi_controller_rhel
2016-06-14 23:17:13 +00:00
Or, if you want to override some variables:
- hosts: your_unifi_controllers
become: true
roles:
- some_other_role
- role: zyphlar.unifi_controller_rhel
unifi_controller_rhel_unifi_zip_file: UniFi.unix.5.0.6.zip
License
-------
BSD
Support
-------
2014-05-27 01:33:22 +00:00
There is none. Tested on CentOS 6 x86_64. Not tested on animals.
Your results may vary. Discontinue use and see a doctor if rash occurs.
Author Information
------------------
- [fukawi2](https://github.com/fukawi2) (Original)
- [zyphlar](https://github.com/zyphlar) (Ansible Galaxy version)
2016-06-15 00:19:20 +00:00
TODO
----
Possibly open up ports in iptables if it's enabled by default in some distros:
```
-A INPUT -m state --state NEW -m tcp -p tcp --dport 8081 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 8080 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 8443 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 8843 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 8880 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 27117 -j ACCEPT
# service iptables restart
```