puppet連載八:linux優(yōu)化模塊

linux優(yōu)化模塊

在服務端先建立文件limits.con

vi /puppet/soft/limits.conf

  • soft nofile 102400
  • hard nofile 102400
  • soft nproc 102400
  • hard nproc 102400

保存,退出

在服務端建立文件sysctl.conf

vi /puppet/soft/sysctl.conf

關閉ipv6

net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1

避免放大攻擊

net.ipv4.icmp_echo_ignore_broadcasts = 1

開啟惡意icmp錯誤消息保護

net.ipv4.icmp_ignore_bogus_error_responses = 1

關閉路由轉(zhuǎn)發(fā)

net.ipv4.ip_forward = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0

開啟反向路徑過濾

net.ipv4.conf.all.rp_filter = 1
net.ipv4.conf.default.rp_filter = 1

處理無源路由的包

net.ipv4.conf.all.accept_source_route = 0
net.ipv4.conf.default.accept_source_route = 0

關閉sysrq功能

kernel.sysrq = 0

core文件名中添加pid作為擴展名

kernel.core_uses_pid = 1
net.ipv4.tcp_syncookies = 1

修改消息隊列長度

kernel.msgmnb = 65536
kernel.msgmax = 65536

設置最大內(nèi)存共享段大小bytes

kernel.shmmax = 68719476736
kernel.shmall = 4294967296

timewait的數(shù)量,默認180000

net.ipv4.tcp_max_tw_buckets = 6000
net.ipv4.tcp_sack = 1
net.ipv4.tcp_window_scaling = 1
net.ipv4.tcp_rmem = 4096 87380 4194304
net.ipv4.tcp_wmem = 4096 16384 4194304
net.core.wmem_default = 8388608
net.core.rmem_default = 8388608
net.core.rmem_max = 16777216
net.core.wmem_max = 16777216
net.core.netdev_max_backlog = 262144

限制僅僅是為了防止簡單的DoS 攻擊

net.ipv4.tcp_max_orphans = 3276800

未收到客戶端確認信息的連接請求的最大值

net.ipv4.tcp_max_syn_backlog = 262144
net.ipv4.tcp_timestamps = 0

內(nèi)核放棄建立連接之前發(fā)送SYNACK 包的數(shù)量

net.ipv4.tcp_synack_retries = 1

內(nèi)核放棄建立連接之前發(fā)送SYN 包的數(shù)量

net.ipv4.tcp_syn_retries = 1

啟用timewait 快速回收

net.ipv4.tcp_tw_recycle = 1

開啟重用。允許將TIME-WAIT sockets 重新用于新的TCP 連接

net.ipv4.tcp_tw_reuse = 1
net.ipv4.tcp_mem = 94500000 915000000 927000000
net.ipv4.tcp_fin_timeout = 1

當keepalive 起用的時候,TCP 發(fā)送keepalive 消息的頻度。缺省是2 小時

net.ipv4.tcp_keepalive_time = 30

允許系統(tǒng)打開的端口范圍

net.ipv4.ip_local_port_range = 1024 65000

確保無人能修改路由表

net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.default.accept_redirects = 0
net.ipv4.conf.all.secure_redirects = 0
net.ipv4.conf.default.secure_redirects = 0

保存,退出

服務端建立selinux

vi /puppet/soft/selinux
SELINUX=disabled
SELINUXTYPE=targeted

保存退出

服務端更改權(quán)限

vi /etc/puppet/fileserver.conf
[soft]
path /puppet/soft
allow *

保存退出, service httpd restart

更改文件打開數(shù),優(yōu)化網(wǎng)絡并發(fā)性能,關閉路由轉(zhuǎn)發(fā),關閉selinux

mkdir -p /etc/puppet/modules/linuxoptimize/{manifests,templates,files}
vi /etc/puppet/modules/linuxoptimize/manifests/init.pp
class linuxoptimize {
file { "/etc/security/limits.conf":
ensure => present,
owner => "root",
group => "root",
mode => 0755,
source => "puppet:///soft/limits.conf",
backup => ".bak",
}
exec { "sysctl":
command => "sysctl -p",
path => ["/usr/bin","/usr/sbin","/bin","/sbin"],
refreshonly => true,
}
file { "/etc/sysctl.conf":
ensure => present,
owner => "root",
group => "root",
mode => 0755,
source => "puppet:///soft/sysctl.conf",
backup => ".bak",
notify => Exec["sysctl"],
}
exec { "setenforce":
command => "setenforce 0",
path => ["/usr/bin","/usr/sbin","/bin","/sbin"],
refreshonly => true,
}
file{"/etc/sysconfig/selinux":
ensure => present,
owner => "root",
group => "root",
mode => 0755,
source => "puppet:///soft/selinux",
backup => ".bak",
notify => Exec["setenforce"],
}
}

在node中加入

vi /etc/puppet/manifests/nodes/huangat-test.pp
node 'huangat-test' {
include linuxbaseinstall
include linuxoptimize
}

確保/etc/puppet/manifests/site.pp里有

import "nodes/*.pp"

最后編輯于
?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請聯(lián)系作者
【社區(qū)內(nèi)容提示】社區(qū)部分內(nèi)容疑似由AI輔助生成,瀏覽時請結(jié)合常識與多方信息審慎甄別。
平臺聲明:文章內(nèi)容(如有圖片或視頻亦包括在內(nèi))由作者上傳并發(fā)布,文章內(nèi)容僅代表作者本人觀點,簡書系信息發(fā)布平臺,僅提供信息存儲服務。

相關閱讀更多精彩內(nèi)容

友情鏈接更多精彩內(nèi)容