Skip to content

Latest commit

 

History

History
216 lines (173 loc) · 6.4 KB

Preparing_your_workstation.adoc

File metadata and controls

216 lines (173 loc) · 6.4 KB

Preparing your Workstation to use the Ansible Playbooks

Prerequisites

In order to use these playbooks, you will need to set a few things up.

Software Requirements on workstation

  • Some deployments would require a Red Hat Customer Portal account that has appropriate subscriptions. This is not required for the playbook themselves.

    Note
    Red Hat employee subscriptions can be used

Software required for deployment

Example script to install required software
# Install basic packages
yum install -y  wget python python-boto unzip boto3 tmux git

# Another option to configure python boto is:
git clone git://github.com/boto/boto.git
cd boto
python setup.py install

#Install boto3
pip install boto3

#Install pywinrm if you plan to deploy windows VMs
#pip install pywinrm

# Enable epel repositories for Ansible
cd /tmp
wget https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm
sudo yum -y install `ls *epel*.rpm`

# Install ansible and checked install version (required 2.2.0.0)
yum install -y ansible
ansible --version


## Install aws cli
curl "https://s3.amazonaws.com/aws-cli/awscli-bundle.zip" -o "awscli-bundle.zip"
unzip awscli-bundle.zip
sudo ./awscli-bundle/install -i /usr/local/aws -b /bin/aws
aws --version

Configuring your workstation

Configure the EC2 Credentials

Python, pip and aws-cli Installation Instructions for MacOS Users at: https://docs.aws.amazon.com/cli/latest/userguide/cli-install-macos.html
  • You will need to place your EC2 credentials in the ~/.aws/credentials file:

mkdir ~/.aws
cat << EOF >>  ~/.aws/credentials
[default]
aws_access_key_id = AKIAJAAYOURACCESSKEY
aws_secret_access_key = rT54UYOURSECRETACCESSKEY

EOF
  • Add the SSH Key to the SSH Agent (optional) If your operating system has an SSH agent and you are not using your default configured SSH key, you will need to add the private key you use with your EC2 instances to your SSH agent:

    ssh-add <path to key file>
Note
If you use an SSH config that specifies what keys to use for what hosts this step may not be necessary.

AWS Permissions and Policies

AWS credentials for the account above must be used with the AWS command line tool (detailed below)

  • An AWS IAM account with the following permissions:

    • Policies can be defined for Users, Groups or Roles

    • Navigate to: AWS Dashboard → Identity & Access Management → Select Users or Groups or Roles → Permissions → Inline Policies → Create Policy → Custom Policy

    • Policy Name: openshift (your preference)

    • Policy Document:

      {
          "Version": "2012-10-17",
          "Statement": [
              {
                  "Sid": "Stmt1459269951000",
                  "Effect": "Allow",
                  "Action": [
                      "cloudformation:*",
                      "iam:*",
                      "route53:*",
                      "elasticloadbalancing:*",
                      "ec2:*",
                      "cloudwatch:*",
                      "autoscaling:*",
                      "s3:*"
                  ],
                  "Resource": [
                      "*"
                  ]
              }
          ]
      }
Note
Finer-grained permissions are possible, and pull requests are welcome.

AWS existing resources

  • A route53 public hosted zone is required for the scripts to create the various DNS entries for the resources it creates. Two DNS entries will be created for workshops:

    • master.guid.domain.tld - a DNS entry pointing to the master

    • *.cloudapps.guid.domain.tld - a wildcard DNS entry pointing to the router/infrastructure node

  • An EC2 SSH keypair should be created in advance and you should save the key file to your system.

    REGION=us-west-1
    KEYNAME=ocpworkshop
    openssl genrsa -out ~/.ssh/${KEYNAME}.pem 2048
    openssl rsa -in ~/.ssh/${KEYNAME}.pem -pubout > ~/.ssh/${KEYNAME}.pub
    chmod 400 ~/.ssh/${KEYNAME}.pub
    chmod 400 ~/.ssh/${KEYNAME}.pem
    touch ~/.ssh/config
    chmod 600 ~/.ssh/config
    aws ec2 import-key-pair --key-name ${KEYNAME} --region=$REGION --output=text --public-key-material "`cat ~/.ssh/${KEYNAME}.pub | grep -v PUBLIC`"
    Caution
    Key pairs are created per region, you will need to specify a different keypair for each region or duplicate the keypair into every region.
    REGIONS="ap-southeast-1 ap-southeast-2 OTHER_REGIONS..."
    for REGION in `echo ${REGIONS}` ;
      do
        aws ec2 import-key-pair --key-name ${KEYNAME} --region=$REGION --output=text --public-key-material "`cat ~/.ssh/${KEYNAME}.pub | grep -v PUBLIC`"
      done

Azure

If you want to deploy on azure you will need the Azure client.

in a nutshell (tested on fedora 25)
sudo -i
rpm --import https://packages.microsoft.com/keys/microsoft.asc
cat >> /etc/yum.repos.d/azure-cli.repo <<EOF
[azure-cli]
name=Azure CLI
baseurl=https://packages.microsoft.com/yumrepos/azure-cli
enabled=1
gpgcheck=1
gpgkey=https://packages.microsoft.com/keys/microsoft.asc
EOF

yum check-update
yum install -y azure-cli

# /!\ careful this will update ansible as well
sudo pip install --upgrade pip
sudo pip install --upgrade ansible[azure]

# as user
az login

Service principal

It’s better to use a service principal instead of your main credentials. Refer to the official documentation.

in a nutshell
az ad sp create-for-rbac
az login --service-principal -u <user> -p <password-or-cert> --tenant <tenant>
env_secret_vars.yml
azure_service_principal: "service principal client id"
azure_password: "service principal password or cert"
azure_tenant: "tenant ID"
azure_region: "Azure location, ex: EuropeWest"
azure_subscription_id: "Subscription id"