Recently, I was tasked to apply CIS Benchmarks to some of my systems. Fortunately, Red Hat has some Ansible roles that make this process almost trivial.
[ Download now: A system administrator's guide to IT automation. ]
One challenge I encountered was with firewalld. One of the controls in the official CIS Ansible roles ensures that firewalld is enabled and running. However, some of my systems didn't have firewalld enabled, by design. This would mean proceeding to deploy the playbooks, which would cause applications to be inaccessible. That would be a huge cost to the organization.
After some research, I found the community.general.listen_ports_facts Ansible module, which made it possible to find all listening TCP and UDP ports. This module is based on the traditional netstat
command, which is part of the net-tools
package, and the newer ss
command. Because I wasn't sure which systems did not have net-tools
, I made sure net-tools
was installed as part of the process.
My solution
My solution, which is in my Git repository, contains four tasks:
- Install or upgrade the
net-tools
package. - Gather facts on listening ports by loading the
listen_ports_facts
module. - Add TCP ports listed by the
listen_ports_facts
to firewalld. - Display the ports added to the server.
Also, the comunity.general collection
needs to be installed. If it is not installed, you can install it with:
ansible-galaxy collection install community.general
Here's the playbook:
---
- name: Add Listening TCP port to Firewalld
hosts: localhost
gather_facts: true
become: true
tasks:
- name: Install or upgrade the net-tools package
yum:
name: net-tools
state: latest
- name: tcp ports facts
listen_ports_facts:
- name: Add ports to firewall
firewalld:
port: "{{ item }}/tcp"
state: enabled
immediate: true
permanent: true
loop: "{{ ansible_facts.tcp_listen | map(attribute='port') | sort | list }}"
register: ports_added_to_firewalld
- name: print Ports Added
debug:
var: ports_added_to_firewalld
I added this playbook to the role, and it solved my issue.
Future improvements
One issue I've discovered is the inability to filter specific ports on each server. Any ideas are welcome as either issues or pull requests to my Git repository. I did have to remove unwanted ports from a few specific servers but, all in all, this made my process much easier!
About the author
I work as Unix/Linux Administrator with a passion for high availability systems and clusters. I am a student of performance and optimization of systems and DevOps. I have passion for anything IT related and most importantly automation, high availability, and security.
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech
Products
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud services
- See all products
Tools
- Training and certification
- My account
- Customer support
- Developer resources
- Find a partner
- Red Hat Ecosystem Catalog
- Red Hat value calculator
- Documentation
Try, buy, & sell
Communicate
About Red Hat
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Select a language
Red Hat legal and privacy links
- About Red Hat
- Jobs
- Events
- Locations
- Contact Red Hat
- Red Hat Blog
- Diversity, equity, and inclusion
- Cool Stuff Store
- Red Hat Summit