diff --git a/roles/dns/tasks/main.yml b/roles/dns/tasks/main.yml
index 7770df42a45bff99215f5e61f7ccffccd5c9047a..c49435824c93fb71309d69da02972767abcffdfe 100644
--- a/roles/dns/tasks/main.yml
+++ b/roles/dns/tasks/main.yml
@@ -1,6 +1,6 @@
-- name: DNS | Autoremove unneeded packages installed as dependencies
-  dnf:
-    autoremove: yes
+#- name: DNS | Autoremove unneeded packages installed as dependencies
+#  dnf:
+#    autoremove: yes
 
 - name: Disable IPv6
   copy:
@@ -40,6 +40,18 @@
     group: root
     mode: '0644'
 
+- name: Add port 53 udp
+  ansible.posix.firewalld:
+    port: 53/udp
+    permanent: true
+    state: enabled
+
+- name: Add port 53 tcp
+  ansible.posix.firewalld:
+    port: 53/tcp
+    permanent: true
+    state: enabled
+
 - name: Add port 8301 udp
   ansible.posix.firewalld:
     port: 8301/udp
@@ -57,15 +69,15 @@
     name: firewalld
     state: reloaded
 
-- name: Install bind
-  dnf:
-    name: bind
-    state: latest
+      #- name: Install bind
+      #  dnf:
+      #    name: bind
+      #    state: latest
 
-- name: Install bind-utils
-  dnf:
-    name: bind-utils
-    state: latest
+      #- name: Install bind-utils
+      #  dnf:
+      #    name: bind-utils
+      #    state: latest
 
 - name: ensure user named is present
   user:
@@ -142,9 +154,9 @@
     group: root
     mode: '0640'
 
-- name: Reboot a machine  
-  ansible.builtin.reboot:
-    reboot_timeout: 300
+      #- name: Reboot a machine  
+      #  ansible.builtin.reboot:
+      #    reboot_timeout: 300
 
 - name: Create a zone file
   template:
diff --git a/roles/dns/templates/zone.j2 b/roles/dns/templates/zone.j2
index 0c696e2658342eb55a06545e17561e2808c46517..ad4ea802a98a597a1d62983cab51b863c533c7b7 100644
--- a/roles/dns/templates/zone.j2
+++ b/roles/dns/templates/zone.j2
@@ -1,6 +1,6 @@
 $TTL    15M
 @       IN      SOA     ns1.{{ hostname }}.{{ domain_name }}. root.{{ hostname }}.{{ domain_name }}. (
-		     2012020201         ; Serial
+		     2012020207         ; Serial
                             15M         ; Refresh
                              5M         ; Retry
                            120M         ; Expire
diff --git a/roles/email/tasks/main.yml b/roles/email/tasks/main.yml
index 301b6cbb641dd24fd6f99f45bc68c99c3e394e3c..2a76c2512ad024251bd0eac5bb05de3d4357f27c 100644
--- a/roles/email/tasks/main.yml
+++ b/roles/email/tasks/main.yml
@@ -5,8 +5,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart postfix
 
 - name: Add port 25 tcp
   ansible.posix.firewalld:
@@ -43,8 +41,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart dovecot
 
 - name: edit dovecot conf to allow imap
   copy:
@@ -53,8 +49,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart dovecot
 
 - name: change dovecot's auth conf to allow plain and login methods
   copy:
@@ -63,8 +57,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart dovecot
 
 - name: change mail location to ~/mail through 10-mail.conf
   copy:
@@ -73,8 +65,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart dovecot
 
 - name: make a mail dir in ~/
   file:
@@ -97,8 +87,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart dovecot
 
 - name: set dovecot's ss to No in 10-ssl.conf
   copy:
@@ -107,8 +95,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart dovecot
 
 - name: set dovecot's lmtp listener to not let just anyone send emails
   copy:
@@ -117,9 +103,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart dovecot
-      - restart postfix
 
 - name: set postfix to listen on submission port 587
   copy:
@@ -128,8 +111,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart postfix
 
 - name: Ensure packages are installed
   dnf:
@@ -227,6 +208,13 @@
     group: apache
     mode: '0755'
 
+- name: set permissions for /var/www/html
+  file:
+    path: /var/www/html
+    owner: apache
+    group: apache
+    mode: '0551'
+
 - name: Set recursive ownership and permissions for Roundcube
   file:
     path: /var/www/html/roundcubemail
@@ -249,8 +237,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: create mail-errors.log file
   file:
diff --git a/roles/etais/tasks/main.yml b/roles/etais/tasks/main.yml
index 818df7a348acc5aac9e6100fd38680d0c5c52f87..a51621f35ebcdc4198fe76de832c06eef758f44c 100644
--- a/roles/etais/tasks/main.yml
+++ b/roles/etais/tasks/main.yml
@@ -1,3 +1,11 @@
+- name: firewalld permissons
+  file:
+    path: /etc/firewalld/zones
+    state: directory
+    owner: root
+    group: root
+    mode: '0755'
+
 - name: Add user scoring
   user:
     name: scoring
@@ -18,6 +26,13 @@
     group: scoring
     mode: '0600'
 
+- name: Set permissions on authorized_keys file
+  file:
+    path: /home/scoring/.ssh/authorized_keys
+    owner: scoring
+    group: scoring
+    mode: '0600'
+
 - name: Create the /etc/sudoers.d/scoring file
   lineinfile:
     dest: /etc/sudoers.d/scoring
diff --git a/roles/tls/tasks/main.yml b/roles/tls/tasks/main.yml
index 763693712faaaf2dc6d418d60a12c2979d16c49c..377cda30535e6f9a0f50eca8e141a09568ea0ded 100644
--- a/roles/tls/tasks/main.yml
+++ b/roles/tls/tasks/main.yml
@@ -31,6 +31,69 @@
     permanent: true
     state: enabled
 
+- name: add port 465 tcp
+  ansible.posix.firewalld:
+    port: 465/tcp
+    permanent: true
+    state: enabled
+
+- name: add port 587 tcp
+  ansible.posix.firewalld:
+    port: 587/tcp
+    permanent: true
+    state: enabled      
+
+# jargmised on filesystems pordid (nfs ja smb)
+- name: add port 2049 tcp
+  ansible.posix.firewalld:
+    port: 2049/tcp
+    permanent: true
+    state: enabled
+
+- name: add port 139 tcp
+  ansible.posix.firewalld:
+    port: 139/tcp
+    permanent: true
+    state: enabled
+
+# dockeri port 5005 ja 10.labi devops pordid
+- name: add port 5005 tcp
+  ansible.posix.firewalld:
+    port: 5005/tcp
+    permanent: true
+    state: enabled
+
+- name: add port 58080 tcp
+  ansible.posix.firewalld:
+    port: 58080/tcp
+    permanent: true
+    state: enabled
+      
+- name: add port 50080 tcp
+  ansible.posix.firewalld:
+    port: 50080/tcp
+    permanent: true
+    state: enabled
+
+- name: add port 6443 tcp
+  ansible.posix.firewalld:
+    port: 6443/tcp
+    permanent: true
+    state: enabled
+
+# kubernetes
+- name: add port 8080 tcp
+  ansible.posix.firewalld:
+    port: 8080/tcp
+    permanent: true
+    state: enabled
+
+- name: add port 514 tcp
+  ansible.posix.firewalld:
+    port: 514/tcp
+    permanent: true
+    state: enabled
+
 - name: reload firewall 
   ansible.builtin.service: 
     name: firewalld 
@@ -43,8 +106,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: virtual host for secure wordpress
   template:
@@ -53,8 +114,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: virtual host for secure mail 
   template:
@@ -63,8 +122,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: virtual host for secure proxy
   template:
@@ -73,8 +130,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: change postfix main.cf config file
   copy:
@@ -100,3 +155,7 @@
     group: root
     mode: '0644'
 
+- name: install cyrus-sasl-plain
+  dnf:
+    name: cyrus-sasl-plain
+    state: present
diff --git a/roles/web/tasks/main.yml b/roles/web/tasks/main.yml
index 833748cae3784369c06a68c856dddfb1cd392e5b..bd2721f4b6be1a5297bf0831b1ec9263db15a650 100644
--- a/roles/web/tasks/main.yml
+++ b/roles/web/tasks/main.yml
@@ -59,8 +59,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: Disable apache welcome page
   copy:
@@ -77,8 +75,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: install pip
   dnf:
@@ -141,8 +137,6 @@
     owner: proxy
     group: proxy
     mode: '0644'
-    notify:
-      - reload systemctl services
 
 - name: make a proxy service
   copy:
@@ -151,8 +145,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - reload systemctl services
 
 - name: start the proxy service
   systemd_service:
@@ -256,7 +248,7 @@
 
 - name: create www-php-errors.log file
   file:
-    path: /var/log/httpd/var/log/httpd/www-php-errors.log
+    path: /var/log/httpd/www-php-errors.log
     state: touch
     owner: root
     group: root
@@ -269,8 +261,6 @@
     owner: root
     group: root
     mode: '0644'
-    notify:
-      - restart httpd
 
 - name: start php-fpm
   ansible.builtin.systemd_service:
@@ -292,8 +282,6 @@
     dest: /etc/httpd/conf/httpd.conf
     owner: root
     group: root
-    notify:
-      - restart httpd
 
 - name: install modsecurity
   dnf:
diff --git a/testplaybook.yml b/testplaybook.yml
new file mode 100644
index 0000000000000000000000000000000000000000..575392b6e7688ea6e2649042d053cdee001e6702
--- /dev/null
+++ b/testplaybook.yml
@@ -0,0 +1,6 @@
+- hosts: localhost
+  user: centos
+  become: yes
+  become_user: root
+  roles:
+    - tier2  # Change this to tier2 or tier3 as per the role you are preparing with