You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-51Lines changed: 9 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,59 +78,17 @@ We remove the following packages:
78
78
79
79
80
80
## Changing sysctl variables
81
-
82
-
If you want to overwrite sysctl-variables, you have to overwrite the *whole* dict, or else only the single overwritten will be actually used.
83
-
So for example if you want to change the IPv4 traffic forwarding variable to `1`, you must pass the whole dict like this:
81
+
+If you want to overwrite sysctl-variables, you can use the `sysctl_overwrite` variable (in older versions you had to overwrite the whole `sysctl_dict`).
82
+
+So for example if you want to change the IPv4 traffic forwarding variable to `1`, do it like this:
# Make sure to ignore ECHO broadcasts, which are only required in broad network analysis.
107
-
net.ipv4.icmp_echo_ignore_broadcasts: 1
108
-
109
-
# There is no reason to accept bogus error responses from ICMP, so ignore them instead.
110
-
net.ipv4.icmp_ignore_bogus_error_responses: 1
111
-
112
-
# Limit the amount of traffic the system uses for ICMP.
113
-
net.ipv4.icmp_ratelimit: 100
114
-
115
-
# Adjust the ICMP ratelimit to include ping, dst unreachable,
116
-
# source quench, ime exceed, param problem, timestamp reply, information reply
117
-
net.ipv4.icmp_ratemask: 88089
118
-
119
-
# Disable IPv6
120
-
net.ipv6.conf.all.disable_ipv6: 1
121
-
122
-
# Protect against wrapping sequence numbers at gigabit speeds
123
-
net.ipv4.tcp_timestamps: 0
124
-
125
-
# Define restriction level for announcing the local source IP
126
-
net.ipv4.conf.all.arp_ignore: 1
127
-
128
-
# Define mode for sending replies in response to
129
-
# received ARP requests that resolve local target IP addresses
130
-
net.ipv4.conf.all.arp_announce: 2
131
-
132
-
# RFC 1337 fix F1
133
-
net.ipv4.tcp_rfc1337: 1
134
92
```
135
93
136
94
Alternatively you can change Ansible's [hash-behaviour](https://docs.ansible.com/ansible/intro_configuration.html#hash-behaviour) to `merge`, then you only have to overwrite the single hash you need to. But please be aware that changing the hash-behaviour changes it for all your playbooks and is not recommended by Ansible.
@@ -152,27 +110,27 @@ bundle install
152
110
### Testing with Docker
153
111
```
154
112
# fast test on one machine
155
-
bundle exec kitchen test default-ubuntu-1204
113
+
bundle exec kitchen test default-ubuntu-1404
156
114
157
115
# test on all machines
158
116
bundle exec kitchen test
159
117
160
118
# for development
161
-
bundle exec kitchen create default-ubuntu-1204
162
-
bundle exec kitchen converge default-ubuntu-1204
119
+
bundle exec kitchen create default-ubuntu-1404
120
+
bundle exec kitchen converge default-ubuntu-1404
163
121
```
164
122
165
123
### Testing with Virtualbox
166
124
```
167
125
# fast test on one machine
168
-
KITCHEN_YAML=".kitchen.vagrant.yml" bundle exec kitchen test default-ubuntu-1204
126
+
KITCHEN_YAML=".kitchen.vagrant.yml" bundle exec kitchen test default-ubuntu-1404
169
127
170
128
# test on all machines
171
129
KITCHEN_YAML=".kitchen.vagrant.yml" bundle exec kitchen test
0 commit comments