Skip to content

Commit ebb8962

Browse files
committed
dbs_sysctl_config is an hash (closes #14)
1 parent 9a63b27 commit ebb8962

File tree

2 files changed

+34
-34
lines changed

2 files changed

+34
-34
lines changed

defaults/main.yml

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ dbs_set_timezone: true
2929
dbs_set_ntp: true
3030

3131
# -------------------------
32-
# Alternatives
32+
# Alternatives
3333
# -------------------------
3434
dbs_alternative_editor: '/usr/bin/vim.basic'
3535
dbs_alternative_awk: '/usr/bin/gawk'
@@ -56,58 +56,58 @@ dbs_groups: []
5656
dbs_sysctl_config:
5757
### IMPROVE SYSTEM MEMORY MANAGEMENT ###
5858
# Increase size of file handles and inode cache
59-
- { key: 'fs.file-max', value: '2097152' }
59+
'fs.file-max': '2097152'
6060
# Do less swapping
61-
- { key: 'vm.swappiness', value: '10' }
62-
- { key: 'vm.dirty_ratio', value: '60' }
63-
- { key: 'vm.dirty_background_ratio', value: '2' }
61+
'vm.swappiness': '10'
62+
'vm.dirty_ratio': '60'
63+
'vm.dirty_background_ratio': '2'
6464
### GENERAL NETWORK SECURITY OPTIONS ###
6565
# Number of times SYNACKs for passive TCP connection.
66-
- { key: 'net.ipv4.tcp_synack_retries', value: '2' }
66+
'net.ipv4.tcp_synack_retries': '2'
6767
# Allowed local port range
68-
- { key: 'net.ipv4.ip_local_port_range', value: '2000 65535' }
68+
'net.ipv4.ip_local_port_range': '2000 65535'
6969
# Protect Against TCP Time-Wait
70-
- { key: 'net.ipv4.tcp_rfc1337', value: '1' }
70+
'net.ipv4.tcp_rfc1337': '1'
7171
# Decrease the time default value for tcp_fin_timeout connection
72-
- { key: 'net.ipv4.tcp_fin_timeout', value: '15' }
72+
'net.ipv4.tcp_fin_timeout': '15'
7373
# Decrease the time default value for connections to keep alive
74-
- { key: 'net.ipv4.tcp_keepalive_time', value: '300' }
75-
- { key: 'net.ipv4.tcp_keepalive_probes', value: '5' }
76-
- { key: 'net.ipv4.tcp_keepalive_intvl', value: '15' }
77-
# Resist SYN flood attack
78-
- { key: 'net.ipv4.tcp_syncookies', value: '1' }
74+
'net.ipv4.tcp_keepalive_time': '300'
75+
'net.ipv4.tcp_keepalive_probes': '5'
76+
'net.ipv4.tcp_keepalive_intvl': '15'
77+
# Resist SYN flood attack
78+
'net.ipv4.tcp_syncookies': '1'
7979
### TUNING NETWORK PERFORMANCE ###
8080
# Default Socket Receive Buffer
81-
- { key: 'net.core.rmem_default', value: '31457280' }
81+
'net.core.rmem_default': '31457280'
8282
# Maximum Socket Receive Buffer
83-
- { key: 'net.core.rmem_max', value: '12582912' }
83+
'net.core.rmem_max': '12582912'
8484
# Default Socket Send Buffer
85-
- { key: 'net.core.wmem_default', value: '31457280' }
85+
'net.core.wmem_default': '31457280'
8686
# Maximum Socket Send Buffer
87-
- { key: 'net.core.wmem_max', value: '12582912' }
87+
'net.core.wmem_max': '12582912'
8888
# Increase number of incoming connections
89-
- { key: 'net.core.somaxconn', value: '65536' }
89+
'net.core.somaxconn': '65536'
9090
# Increase number of incoming connections backlog
91-
- { key: 'net.core.netdev_max_backlog', value: '65536' }
91+
'net.core.netdev_max_backlog': '65536'
9292
# Increase the maximum amount of option memory buffers
93-
- { key: 'net.core.optmem_max', value: '25165824' }
93+
'net.core.optmem_max': '25165824'
9494
# Increase the maximum total buffer-space allocatable
9595
# This is measured in units of pages (4096 bytes)
96-
- { key: 'net.ipv4.tcp_mem', value: '65536 131072 262144' }
97-
- { key: 'net.ipv4.udp_mem', value: '65536 131072 262144' }
96+
'net.ipv4.tcp_mem': '65536 131072 262144'
97+
'net.ipv4.udp_mem': '65536 131072 262144'
9898
# Increase the read-buffer space allocatable
99-
- { key: 'net.ipv4.tcp_rmem', value: '8192 87380 16777216' }
100-
- { key: 'net.ipv4.udp_rmem_min', value: '16384' }
99+
'net.ipv4.tcp_rmem': '8192 87380 16777216'
100+
'net.ipv4.udp_rmem_min': '16384'
101101
# Increase the write-buffer-space allocatable
102-
- { key: 'net.ipv4.tcp_wmem', value: '8192 65536 16777216' }
103-
- { key: 'net.ipv4.udp_wmem_min', value: '16384' }
102+
'net.ipv4.tcp_wmem': '8192 65536 16777216'
103+
'net.ipv4.udp_wmem_min': '16384'
104104
# Increase the tcp-time-wait buckets pool size to prevent simple DOS attacks
105-
- { key: 'net.ipv4.tcp_max_tw_buckets', value: '1440000' }
106-
# Disable this feature.... dangerous :)
107-
- { key: 'net.ipv4.tcp_tw_recycle', value: '0' }
105+
'net.ipv4.tcp_max_tw_buckets': '1440000'
106+
# Disable this feature.... dangerous ':)
107+
'net.ipv4.tcp_tw_recycle': '0'
108108
# Reuse TIME-WAIT state for outgoing connexion (safe)
109-
- { key: 'net.ipv4.tcp_tw_reuse', value: '1' }
109+
'net.ipv4.tcp_tw_reuse': '1'
110110
# Increase system IP port limits to allow for more connections
111-
- { key: 'net.ipv4.tcp_window_scaling', value: '1' }
111+
'net.ipv4.tcp_window_scaling': '1'
112112
# number of packets to keep in backlog before the kernel starts dropping them
113-
- { key: 'net.ipv4.tcp_max_syn_backlog', value: '3240000' }
113+
'net.ipv4.tcp_max_syn_backlog': '3240000'

tasks/system.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,5 +21,5 @@
2121
value='{{ item.value }}'
2222
sysctl_file=/etc/sysctl.d/ansible.conf
2323
state=present
24-
with_items: "{{ dbs_sysctl_config }}"
24+
with_dict: "{{ dbs_sysctl_config }}"
2525

0 commit comments

Comments
 (0)