This repository contains a collection of Ansible roles and playbooks that aim at easing the deployment procedure of ARGO products. The goal for these roles and playbooks has been to be as generic as possible so that they are easily adaptable to different environments and e-Infrastructure requirements. Hence most of the variables used by default in these roles reside under the roles/{role_name}/defaults/main.yml files.
The administrator of the ARGO product being deployed via these Ansible playbooks may use any of the following places in order to successfully overwrite the default values of the variables and adapt the ARGO product to the specific environment and requirements:
roles/{role_name}/vars/main.ymlgroups_vars/{groups_name}host_vars/{inventory_hostname}
Per ARGO product more details on prerequisites and variables are given in the following subsections.
Contains Ansible playbook for the deployment of the ARGO datastore and API service. The play is split into four (4) roles:
- repos (includes tasks for the installation of the required repository definitions)
- has_certificate (task for uploading the certificate file onto the host under the appropriate path)
- mongodb (installation and configuration of mongodb datastore)
- webapi (installation and bootstrap of ARGO api service)
- Obtain a key/certificate pair from a trusted CA and after place them both under roles/has_certificate/files with names
{{inventory_hostname}}.keyand{{inventory_hostname}}.pemrespectively. As{{inventory_hostname}}use the exact name used within theinventoryfile. - Edit inventory and replace
webapi.nodewith the hostname that you intend to deploy the API onto.
- Deploy against CentOS 6.x node
- Make sure
libselinux-pythonis installed on the target node - Ansible version used is
1.7.2
$ ansible-playbook -v webapi.ymlContains Ansible playbook for the deployment of the ARGO Web UI service. The play is split into four (4) roles:
- firewall (configures iptables firewall rules)
- repos (includes tasks for the installation of the required repository definitions)
- has_certificate (task for uploading the certificate file onto the host under the appropriate path)
- webui (installation and bootstrap of ARGO Web UI service)
-
Obtain a key/certificate pair from a trusted CA and after place them both under roles/has_certificate/files with names
{{inventory_hostname}}.keyand{{inventory_hostname}}.pemrespectively. As{{inventory_hostname}}use the exact name used within theinventoryfile. -
Edit inventory and replace
webui.nodewith the hostname that you intend to deploy the Web UI onto. -
Edit
roles/webui/vars/main.ymlfile and change the values of thecertificate_passwordandkeystore_passwordvariables to a stronger value. -
Note that by default the EGI based web UI will be deployed on your target node. To change this behaviour use the
argo_webandbranch_namevariables within theroles/webui/vars/main.ymlfile to point to another upstream lavoisier repository.
- Deploy against CentOS 7.x node
- Ansible version used is
1.9.2
$ ansible-playbook -v webui.ymlContains Ansible playbook for the deployment of the ARGO POEM service. The play is split into four (4) roles:
- firewall (configures iptables firewall rules)
- repos (includes tasks for the installation of the required repository definitions)
- has_certificate (task for uploading the certificate file onto the host under the appropriate path)
- poem (installs and bootstraps poem service)
- Obtain a key/certificate pair from a trusted CA and after place them both under roles/has_certificate/files with names
{{inventory_hostname}}.keyand{{inventory_hostname}}.pemrespectively. As{{inventory_hostname}}use the exact name used within theinventoryfile. - Edit inventory and replace
poem.nodewith the hostname that you intend to deploy the POEM service onto. - Create a
host_vars/{{inventory_hostname}}file and place therein the variables found within theroles/poem/defaults/main.ymlfile in order to overwrite them.- In order to generate a uuid to be used in the place of the
poem_secretvariable you may use theuuidgenlinux cli utility.
- In order to generate a uuid to be used in the place of the
- Deploy against CentOS 6.x node
- Make sure
libselinux-pythonis installed on the target node - Ansible version used is
1.9.2
$ ansible-playbook -v poem.ymlContains Ansible playbook for the deployment of all ARGO components. The play is split into six (6) roles:
- repos (includes tasks for the installation of the required repository definitions)
- ca_bundle (includes a task for the installation of the egi-ca-policy-core bundle)
- has_certificate (task for uploading the certificate file onto the host under the appropriate path)
- consumer (includes tasks for the installation of the ARGO consumer and feed components)
- mongodb (installation and configuration of mongodb datastore)
- webapi (installation and bootstrap of ARGO api service)
- Obtain a key/certificate pair from a trusted CA and after place them both under roles/has_certificate/files with names
{{inventory_hostname}}.keyand{{inventory_hostname}}.pemrespectively. As{{inventory_hostname}}use the exact name used within theinventoryfile. - Edit inventory and replace
standalone.nodewith the hostname that you intend to deploy the complete ARGO stack onto.
- Deploy against CentOS 6.x node
- Make sure
libselinux-pythonis installed on the target node - Ansible version used is
1.7.2
$ ansible-playbook -v standalone.ymlIn case you are using Nagios or Icinga for health monitoring purposes a minimal is_monitored role is included in the repo. The puspose of this role is to install and configure the nrpe service on your target machines. Modify the remote host variable within the roles/is_monitored/defaults/main.yml file and include it in your playbooks.