Execution
Date 08 Dec 2025 13:40:18 +0000
Duration 00:10:06.79
Controller aio1.openstack.local
User root
Versions
Ansible 2.18.6
ara 1.7.4 / 1.7.4
Python 3.12.11
Summary
15 Hosts
608 Tasks
2412 Results
18 Plays
158 Files
0 Records

Task result details

  • Status
    OK
  • Duration
    00:00:00.03
  • Play
    Apply security hardening configurations
  • Task
    ansible-hardening : Gather variables for each operating system
  • Host
    aio1

Field Value
ansible_facts
{
    "aide_cron_job_path": "/etc/cron.d/aide",
    "aide_database_file": "/var/lib/aide/aide.db.gz",
    "aide_database_out_file": "/var/lib/aide/aide.db.new.gz",
    "chrony_conf_file": "/etc/chrony.conf",
    "chrony_key_file": "/etc/chrony.keys",
    "chrony_service": "chronyd",
    "clamav_service": "clamd@scan",
    "clamav_service_details": {
        "group": "virusgroup",
        "mode": "0710",
        "socket_path": "/run/clamd.scan/clamd.sock",
        "user": "clamscan"
    },
    "cron_service": "crond",
    "daemon_init_params_file": "/etc/init.d/functions",
    "grub_conf_file": "/boot/grub2/grub.cfg",
    "grub_conf_file_efi": "/boot/efi/EFI/{{ ansible_facts['distribution'] | lower | replace(' ', '') }}/grub.cfg",
    "grub_update_cmd": "/usr/sbin/grub2-mkconfig -o {{ grub_config_file_boot }}",
    "pam_auth_file": "/etc/pam.d/system-auth",
    "pam_password_file": "/etc/pam.d/password-auth",
    "pam_postlogin_file": "/etc/pam.d/postlogin",
    "pkg_mgr_config": "/etc/dnf/dnf.conf",
    "rpm_gpgchecks": [
        {
            "line": "gpgcheck={{ security_enable_gpgcheck_packages | bool | ternary('1', 0) }}",
            "regexp": "^gpgcheck.*"
        },
        {
            "line": "localpkg_gpgcheck={{ security_enable_gpgcheck_packages_local | bool | ternary('1', 0) }}",
            "regexp": "^localpkg_gpgcheck.*"
        },
        {
            "line": "repo_gpgcheck={{ security_enable_gpgcheck_repo | bool | ternary('1', 0) }}",
            "regexp": "^repo_gpgcheck.*"
        }
    ],
    "security_interactive_user_minimum_uid": 1000,
    "ssh_keysign_path": "/usr/libexec/openssh",
    "ssh_service": "sshd",
    "stig_packages_rhel7": [
        {
            "enabled": true,
            "packages": [
                "audispd-plugins",
                "audit",
                "dracut-fips",
                "dracut-fips-aesni",
                "openssh-clients",
                "openssh-server"
            ],
            "state": "{{ security_package_state }}"
        },
        {
            "enabled": "{{ security_rhel7_enable_aide }}",
            "packages": [
                "aide"
            ],
            "state": "{{ security_package_state }}"
        },
        {
            "enabled": "{{ security_rhel7_enable_linux_security_module }}",
            "packages": [
                "python3-libselinux",
                "policycoreutils-python-utils",
                "selinux-policy",
                "selinux-policy-targeted"
            ],
            "state": "{{ security_package_state }}"
        },
        {
            "enabled": "{{ security_rhel7_enable_chrony }}",
            "packages": [
                "chrony"
            ],
            "state": "{{ security_package_state }}"
        },
        {
            "enabled": "{{ security_enable_virus_scanner }}",
            "packages": [
                "clamav",
                "clamav-data",
                "clamav-devel",
                "clamav-filesystem",
                "clamav-lib",
                "clamav-scanner-systemd",
                "clamav-server-systemd",
                "clamav-server",
                "clamav-update"
            ],
            "state": "{{ security_package_state }}"
        },
        {
            "enabled": "{{ security_enable_firewalld }}",
            "packages": [
                "firewalld"
            ],
            "state": "{{ security_package_state }}"
        },
        {
            "enabled": "{{ security_rhel7_automatic_package_updates }}",
            "packages": [
                "dnf-automatic"
            ],
            "state": "{{ security_package_state }}"
        },
        {
            "enabled": "{{ security_rhel7_remove_rsh_server }}",
            "packages": [
                "rsh-server"
            ],
            "state": "absent"
        },
        {
            "enabled": "{{ security_rhel7_remove_telnet_server }}",
            "packages": [
                "telnet-server"
            ],
            "state": "absent"
        },
        {
            "enabled": "{{ security_rhel7_remove_tftp_server }}",
            "packages": [
                "tftp-server"
            ],
            "state": "absent"
        },
        {
            "enabled": "{{ security_rhel7_remove_xorg }}",
            "packages": [
                "xorg-x11-server-Xorg"
            ],
            "state": "absent"
        },
        {
            "enabled": "{{ security_rhel7_remove_ypserv }}",
            "packages": [
                "ypserv"
            ],
            "state": "absent"
        }
    ],
    "vsftpd_conf_file": "/etc/vsftpd/vsftpd.conf"
}
ansible_included_var_files
[
    "/home/zuul/src/opendev.org/openstack/ansible-hardening/vars/redhat-10.yml"
]
changed
False